<Partner Name> RSA ARCHER GRC Platform Implementation Guide. RiskLens <Partner Product>

Size: px
Start display at page:

Download "<Partner Name> RSA ARCHER GRC Platform Implementation Guide. RiskLens <Partner Product>"

Transcription

1 <Partner Name> <Partner Product> RSA ARCHER GRC Platform Implementation Guide Wesley Loeffler, RSA Engineering Last Modified: April 25 th, 2018

2 2.4 Solution Summary The & Archer integration connects a Risk Issue in the RSA Archer GRC Platform s Risk Register to a Cyber Risk Quantification Analysis. The connection adds quantified analysis information directly to the Risk Issue. This allows the Risk Issue to be assessed alongside other issues with FAIR quantified outputs. Analyses can be updated over time and the changes can be sent back to the corresponding Risk Issue with the changes. This integration will allow for both requesting and sending data to/from the RSA Archer GRC Platform. This version of the integration acts as a conduit to coordinate the platforms. It integrates the two platforms for workflow purposes and data communication. Future versions will expand on the integration of FAIR and automatic updates. Partner Integration Overview GRC Solution Type Uses Out Of The Box Application Uses Custom Application Requires On-Demand License IT Security Risk Management & Enterprise & Operational Risk Risk Register Yes (Modified version of Risk Register) No

3 2.4 Partner Product Configuration Before You Begin This section provides instructions for configuring with the RSA Archer GRC Platform. This document is not intended to suggest optimum installation or configuration. It is assumed that the reader has both working knowledge of all products involved, and the ability to perform the tasks outlined in this section. Administrators should have access to the product documentation for all products in order to install the required components. All components must be installed and working prior to the integration. Perform the necessary tests to confirm that this is true before proceeding. *Customers with the Monte Carlo integration should not override the layout when installing the package. Doing so will result in Monte Carlo fields being removed from the layout. Important: The integration described in this guide is being provided as a reference implementation for evaluation and testing purposes. It may or may not meet the needs and use cases for your organization. If additional customizations or enhancements are needed, it is recommended that customers contact RSA Professional Services for assistance. Configuration The steps provided below cover the changes and setup needed to provide access to the API for your RSA Archer GRC Platform Instance. Token Management 1. As a Admin, select Token Management from the Admin drop down

4 Click the New Token button to add a new API Token. 3. Set the Access Level for the new Token. Your RSA Archer GRC Platform Integration will require that the Token you create has Write level access or higher. 4. Make note of the Token Value. It will be used in the Risk Register Custom Object to communicate with the server

5 The Token Value will be inserted inside the Custom Object on the Risk Register layout. For instructions on locating the Custom Object please refer to steps 7 and 8 of the Updating the Custom Object inside Risk Register section. RSA Archer GRC Platform API User This section details the steps necessary for providing user and network credentials needed to communicate with. 1. Navigate to Admin -> Third Party Integrations -> Third Party Integration Settings. 2. Fill in the information for the RSA Archer GRC Platform API User and click Save

6 2.4 RSA Archer Risk Register/ Package Installation The following information details the steps necessary to import and install the Risk Register application. Step 1: Back Up Your Database There is no Undo function for a package installation. Packaging is a powerful feature that can make significant changes to an instance. It is strongly recommended to back up the instance database before installing a package. This process enables a full restoration if necessary. An alternate method for undoing a package installation is to create a package of the affected objects in the target instance before installing the new package. This package provides a snapshot of the instance before the new package is installed, which can be used to help undo the changes made by the package installation. New objects created by the package installation must be manually deleted. Step 2: Import the Package Procedure 1. Go to the Install Packages page. a. From the menu bar, click. b. Under Application Builder, click Install Packages. 2. In the Available Packages section, click Import. 3. Click Add New, then locate and select the package file that you want to import. 4. Click OK. The package file is displayed in the Available Packages section and is ready for installation. Step 3: Map Objects in the Package Procedure 1. In the Available Packages section, select the package you want to map. 2. In the Actions column, click for that package. The analyzer runs and examines the information in the package. The analyzer automatically matches the system IDs of the objects in the package with the objects in the target instances and identifies objects from the package that are successfully mapped to objects in the target instance, objects that are new or exist but are not mapped, and objects that do not exist (the object is in the target but not in the source). Note: This process can take several minutes or more, especially if the package is large, and may time out after 60 minutes. This time-out setting temporarily overrides any IIS time-out settings set to less than 60 minutes. When the analyzer is complete, the Advanced Package Mapping page lists the objects in the package file and corresponding objects in the target instance. The objects are divided

7 2.4 into tabs, depending on whether they are found within Applications, Solutions, Access Roles, Groups, Sub- forms, or Questionnaires. 3. On each tab of the Advanced Mapping Page, review the icons that are displayed next to each object name to determine which objects require you to map them manually. Icon Name Description Awaiting Mapping Review Indicates that the system could not automatically match the object or children of the object to a corresponding object in the target instance. Objects marked with this symbol must be mapped manually through the mapping process. Important: New objects should not be mapped. This icon should remain visible. The mapping process can proceed without mapping all the objects. Note: You can execute the mapping process without mapping Mapping Completed Do Not Map Undo all the objects. The icon is for informational purposes only. Indicates that the object and all child objects are mapped to an object in the target instance. Nothing more needs to be done with these objects in Advanced Package Mapping. Indicates that the object does not exist in the target instance or the object was not mapped through the Do Not Map option. These objects will not be mapped through Advanced Package Mapping, and must be remedied manually. Indicates that a mapped object can be unmapped. This icon is displayed in the Actions column of a mapped object or object flagged as Do Not Map. 4. For each object that requires remediation, do one of the following: To map each item individually, on the Target column, select the object in the target instance to which you want to map the source object. If an object is new or if you do not want to map an object, select Do Not Map from the drop-down list. Important: Ensure that you map all objects to their lowest level. When objects have child or related objects, a drill-down link is provided on the parent object. Child objects must be mapped before parent objects are mapped. For more details, see "Mapping Parent/Child Objects" in the RSA Archer Online Documentation. To automatically map all objects in a tab that have different system IDs but the same object name as an object in the target instance, do the following: a. In the toolbar, click Auto Map. b. Select an option for mapping objects by name

8

9 2.4 Option Ignore case Ignore space Description Select this option to match objects with similar names regardless of the case of the characters in the object names. Select this option to match objects with similar names regardless of whether spaces exist in the object names. c. Click OK. The Confirmation dialog box opens with the total number of mappings performed. These mappings have not been committed to the database yet and can be modified in the Advanced Package Mapping page. d. Click OK. To set all objects in the tab to Do Not Map, in the toolbar, click Do Not Map. Note: To undo the mapping settings for any individual object, click column. in the Actions When all objects are mapped, the icon is displayed in the tab title. The icon is displayed next to the object to indicate that the object will not be mapped. 5. Verify that all other objects are mapped correctly. 6. (Optional) To save your mapping settings so that you can resume working later, see "Exporting and Importing Mapping Settings" in the RSA Archer Online Documentation. 7. Once you have reviewed and mapped all objects, click. 8. Select I understand the implications of performing this operation and click OK. The Advanced Package Mapping process updates the system IDs of the objects in the target instance as defined on the Advanced Package Mapping page. When the mapping is complete, the Import and Install Packages page is displayed. Important: Advanced Package Mapping modifies the system IDs in the target instance. Any Data Feeds and Web Service APIs that use these objects will need to be updated with the new system IDs. Step 4: Install the Package All objects from the source instance are installed in the target instance unless the object cannot be found or is flagged to not be installed in the target instance. A list of conditions that may cause objects not to be installed is provided in the Log Messages section. A log entry is displayed in the Package Installation Log section. Procedure 1. Go to the Install Packages page. a. From the menu bar, click. b. Under Application Builder, click Install Packages. 2. In the Available Packages section, locate the package file that you want to install, and click Install

10 In the Configuration section, select the components of the package that you want to install. To select all components, select the top-level checkbox. To install only specific global reports in an already installed application, select the checkbox associated with each report that you want to install. Note: Items in the package that do not match an existing item in the target instance are selected by default. 4. In the Configuration section, under Install Method, select an option for each selected component. To use the same Install Method for all selected components, select a method from the top-level drop-down list. Note: If you have any existing components that you do not want to modify, select Create New Only. You may have to modify those components after installing the package to use the changes made by the package. 5. In the Configuration section, under Install Option, select an option for each selected component. To use the same Install Option for all selected components, select an option from the top-level drop-down list. Note: If you have any custom fields or formatting in a component that you do not want to lose, select Do Not Override Layout. You may have to modify the layout after installing the package to use the changes made by the package. 6. To deactivate target fields and data-driven events that are not in the package, in the Post- Install Actions section, select the Deactivate target fields and data-driven events that are not in the package checkbox. To rename the deactivated target fields and data-driven events with a user-defined prefix, select the Apply a prefix to all deactivated objects checkbox, and enter a prefix. This can help you identify any fields or data-driven events that you may want to review for cleanup post-install. 7. Click Install. 8. Click OK. Step 5: Review the Package Installation Log 1. Go to the Package Installation Log tab of the Install Packages page. a. From the menu bar, click. b. Under Application Builder, click Install Packages. c. Click the Package Installation Log tab. 2. Click the package that you want to view. 3. In the Package Installation Log page, in the Object Details section, click View All Warnings

11 2.4 RSA Archer GRC Configuration These steps cover the changes required to your RSA Archer GRC Platform instance to support integration with the API. The Custom Object contains the script that will be required for Pre-Production and Production use. Updating the Custom Object inside Risk Register 1. Navigate to Applications by clicking the Admin Toolkit and selecting Applications under the Application Builder. 2. Select the Risk Register Application in Manage Applications. 3. Locate and document the following fields IDs from the Risk Register application: a. Risk (used to populate the RiskNameIDInForm field) b. Risk ID (used to populate the RiskIDInForm field) c. Level ID* d. Analysis Complete Date e. Analysis Request Date f. Loss Exposure Minimum g. Loss Exposure Maximum

12 2.4 h. Loss Exposure 10th i. Loss Exposure 90 th j. Loss Exposure Average k. Quantitative Analysis (used to populate the SubformIDInRiskIssue field) *To determine the Level ID of the Risk Register application click the General tab and select the Leveled (Outline) option in the Structure dropdown box. *Hover your mouse cursor over the Risk Register Name under the Levels section. The Level ID will appear in the bottom right corner of the window

13 Navigate to Sub-Forms by clicking the Admin Toolkit and selecting Sub-Forms located under the Application Builder. 5. Select the Sub-Form located under Manage Sub-Forms. 6. Locate and document the following fields IDs from the Sub-Form: a. Level ID* b. Analysis Complete Date c. Loss Exposure Minimum d. Loss Exposure Maximum e. Loss Exposure 10th f. Loss Exposure 90 th g. Loss Exposure Average

14 2.4 *The Level ID of the Sub-Form can be obtained by either searching the database of your Archer instance or making a Postman Request. The steps for performing a Postman Request have been outlined at the end of this section. 7. Navigate to the Risk Register application. Once inside, click the layout tab and scroll down until you locate the Custom Object

15 Click the down arrow next to the Object and select Edit Custom Object Properties. 9. The documented field IDs will be inserted into the Code section of the Custom Object

16 Insert the Risk Register IDs documented in step 3 into the fields under var riskissueids in the Custom Object. 11. Insert the Sub-Form IDs documented in step 6 into the fields under var subformids in the Custom Object. 12. Insert the Analysis Request Date ID into the var fldid under the success:function() near the bottom of the Custom Object code. 13. Update the baseurl near the top of the Custom Object code. If are you communicating directly with use either the or URL. Communication through middleware uses the URL

17 Create a new RSA Archer GRC Platform user and provide them with permissions to update Risk Register entries. Performing a Postman Request to Obtain the Sub-Form Level ID Postman is an API development tool that can be downloaded free of charge from API calls will be made in Postman to determine the Level ID of the Sub-Form. 1. Navigate to Sub-Forms under the Application Builder. From the Manage Sub-Forms window locate the Sub-Form and hover the mouse cursor over the name. Document the Module ID that appears in the bottom right, as it will be used in a Postman call. 2. Open the Postman application and select POST in the top left dropdown box. Enter the URL of your RSA Archer application followed by /api/core/security/login. Select the Headers tab and enter the values shown below under Key and Value. 3. Click the Body tab to the right of Headers. Enter your Instance, Username, and Password credentials, as shown below. Click the Send button in the top right of the window. Document or copy the SessionToken value shown in the bottom box onto your clipboard

18 Open a new tab and select Get in the dropdown box in the top left. Enter the URL of your RSA Archer application followed by /api/core/system/level/module/moduleid (enter the value of the module ID we documented in step 1 above). Select the Headers tab and input the key and values shown below. Either input or copy and paste the SessionToken obtained in step 3 into the Authorization field and click Send. The Level ID for the Sub-Form will be shown in the bottom box next to the Id field. This value will be input into the Custom Object under the var subformids section

19

20 2.4 RSA Archer / Integration Middleware In order to facilitate improved security with an Archer and integration, middleware is used to provided two-way communication between an Archer instance (via the Archer REST API) and the instance (via the REST API). Infrastructure Requirements The API Middleware project was designed to run inside a corporate network with limited and controlled access to the local (in network) Archer instance and to an external instance. recommends running the middleware project on the following environment: Windows Server 2008 R2 + IIS NET Framework v Installation Requirements middleware cannot be installed as a child application of RSA Archer. Doing so results in an error caused by IIS web application inheritance. In the event that RSA Archer is installed at the root directory, the Middleware must be installed as a second website at the root level. Security Considerations The middleware can operate as a network intermediary so that firewalls do not have to be opened from Archer to out of network IP addresses. The middleware handles authentication to the Archer API. Archer credentials never leave your network (Unless you wish to pass them to the middleware for verification purposes). The middleware is configured by the Archer instance owner, so only the required API calls are mapped. Allowing vary narrow access to the Archer API. The middleware s source is available and can be compiled by the installing agency

21 2.4 Publishing Middleware Web API on IIS 1. Open the Internet Information Services (IIS) Manager application. 2. Navigate to the Default Web Site dropdown and right click the icon. Select the Deploy option then choose Import Application. *Please note that the Middleware should not be installed as a child application of Archer

22 Locate and select the.api.middleware zip file then click the Next button. *Please note that you will not need to import the.api.middleware_source.zip file, but the data contained within is required by.api.middleware.zip. 4. Leave all options checked and click the Next button at the bottom of the window

23 Select the Application Path for the Middleware and click Next. 6. (Optional) If you are updating the Middleware select the No, just append the files in the application package to the destination option and click Next

24 The Installation Progress and Summary box will detail the status of the Middleware integration. Setup Summary 1.) Create an API Token in your instance of 2.) Add a reference to that API token in your custom object code. 3.) Add the necessary fields in your Archer instance to hold analysis data, and reference the IDs in your custom object code. 4.) Update the baseurl variable in the Custom Object to enable communication with. 5.) Enter the credentials and URL for your Archer instance API user into the Admin => Third Party Integrations section of. Once these steps are complete, setup for the middleware itself consists of: 6.) Ensuring that the Middleware application publish package has been imported and is running on your instance of IIS within the desired network. 7.) Ensure that your network (firewall/dmz) has access to port 443 on your Archer Instance as well as to ( or 8.) The Middleware will require the API token (2), and the Archer instance credentials (4) to be placed in the Web.config file, as shown below

25 2.4 Web.config Configuration The following information details the steps necessary for configuring the Web.config file to enable communication through the middleware. 1. Navigate to the web.config file located in the Middleware directory. 2. Input your network credentials into the highlighted fields in the web.config file. ArcherAPIBaseUrl: The address (within your network) at which Archer API endpoints may be accessed. ArcherInstanceName: Name of the Archer instance which you wish to allow communication with your instance of

26 2.4 ArcherDomain: Domain in which the Archer instance resides. ArcherUserName: Name of the User which has Archer API access, used for validation purposes. ArcherPassword: Password for the User which has Archer API access, used for validation purposes. APIBaseURL: The address (external from your network) at which the API endpoints may be accessed. ( APIVersionNumber: Current API version number to access. Currently, only version 1 is available. APIBearerToken: API token created in your instance. The data in appsettings can be protected by using the built in ASP.Net Registration Tool. This will replace the plaintext credentials and addresses with and encrypted section that will be automatically decrypted when needed by IIS. The following article from Microsoft describes the encryption process: Internally, tested this process with the following command to the Registration Tool: PS C:\.\aspnet_regiis -pe "appsettings" -app "/" -prov "RsaProtectedConfigurationProvider" - -pe is the command to encrypt the config file. - appsettings is the target element in the config file to be encrypted. - -app and the forward slash represent the current IIS application in which the target config file exists. - -prov and the following string represent the encryption provider to be used. Note that RsaProtectedConfigurationProvider may not be the provider available or desired in your environment

27 2.4 Requesting a Analysis The following steps can be used to request a analysis after populating a Risk Register record. 1. Populate the Risk Register record with data relevant to your risk. Select the dropdown box next to Assessment Approach and choose Quantitative Analysis. Inherent and Residual Risk will not calculate until the Status is Active. This prevents Under Development risks from being included in the risk rollups. After selecting Quantitative Analysis, the Analysis section will be displayed near the bottom of the window. Note that Inherent Risk is still established Qualitatively

28 Scroll down to the Analysis section and click the Request a New Analysis button. This will send a request to. The Analysis Request Date will display the date of the request and the Request Status will indicate a pending request. A text box at the bottom of the window will indicate the state of the request

29 Navigate to the application and input your credentials to begin the analysis process

30 Select Analysis Process Queue from the Quantification drop down menu. 5. Click the Attach Analysis link to the right of the Analysis Process Queue item. 6. Select the Quantification Analysis to be performed for the Risk Register record. Click the Attach button to finish the request. *For more information on how analyses are facilitated please visit 7. A popup box in the bottom right of the window will indicate that the analysis has been attached to your Risk Register record

31 Return to your Risk Register record in RSA Archer and scroll down to the Analysis section. The values in the left column have been populated based on the results of the analysis, and the text box indicates the analysis is complete. The loss Exposure 90 th field is used to calculate the value of the Residual Risk field. This indicates the level of residual risk remaining after controls are applied. The level of Residual Risk is based on the values shown below: Loss Exposure 90 th Greater than $25 million Greater than $10 million Greater than $5 million Greater than $999 thousand Greater than $0 Residual Risk High Medium High Medium Medium Low Low The values of Residual Risk and Calculated Residual Risk in the Overall Risk section are populated based on the value of Residual Risk in the Analysis section, as shown below. Future requests will replace the existing request in the Analysis, and historical analysis results will be shown in the Quantitative Analysis sub-form, as shown below

32 2.4 Certification Environment for RSA Archer GRC Date Tested: August 11, 2017 Certification Environment Product Name Version Information Operating System RSA Archer GRC 6.2 P3 Virtual Appliance Virtual Appliance

<Partner Name> <Partner Product> RSA ARCHER GRC Platform Implementation Guide. Swimlane 2.x

<Partner Name> <Partner Product> RSA ARCHER GRC Platform Implementation Guide. Swimlane 2.x RSA ARCHER GRC Platform Implementation Guide Jeffrey Carlson, RSA Partner Engineering Last Modified: 11/02/2017 Solution Summary The RSA Archer integration allows Swimlane

More information

<Partner Name> RSA ARCHER GRC Platform Implementation Guide. Gurucul Risk Analytics. <Partner Product>

<Partner Name> RSA ARCHER GRC Platform Implementation Guide. Gurucul Risk Analytics. <Partner Product> RSA ARCHER GRC Platform Implementation Guide Jeffrey Carlson, RSA Partner Engineering Last Modified: August 1 st, 2017 Solution Summary Gurucul is changing the way enterprises

More information

Digital Defense Frontline VM 6.0

Digital Defense Frontline VM 6.0 RSA ARCHER GRC Platform Implementation Guide Digital Defense Jeffrey Carlson, RSA Partner Engineering Last Modified: October 16 th, 2017 Solution Summary Digital Defense

More information

PASSPORTAL PLUGIN DOCUMENTATION

PASSPORTAL PLUGIN DOCUMENTATION Contents Requirements... 2 Install or Update Passportal Plugin Solution Center... 3 Configuring Passportal Plugin... 5 Client mapping... 6 User Class Configuration... 7 About the Screens... 8 Passportal

More information

<Partner Name> RSA ARCHER GRC Platform Implementation Guide. Global-Regulation International Law Search V. 1. <Partner Product>

<Partner Name> RSA ARCHER GRC Platform Implementation Guide. Global-Regulation International Law Search V. 1. <Partner Product> RSA ARCHER GRC Platform Implementation Guide Global-Regulation Jeffrey Carlson, RSA Partner Engineering Last Modified: May 15 th, 2017 Solution Summary Global-Regulation.com

More information

<Partner Name> <Partner Product> RSA Ready Implementation Guide for. Rapid 7 Nexpose Enterprise 6.1

<Partner Name> <Partner Product> RSA Ready Implementation Guide for. Rapid 7 Nexpose Enterprise 6.1 RSA Ready Implementation Guide for Rapid 7 Jeffrey Carlson, RSA Partner Engineering Last Modified: 04/11/2016 Solution Summary Rapid7 Nexpose Enterprise drives the collection

More information

Tenable SecurityCenter Data Feeds for RSA Archer IT Security Vulnerability Program

Tenable SecurityCenter Data Feeds for RSA Archer IT Security Vulnerability Program RSA ARCHER GRC Platform Implementation Guide Tenable SecurityCenter Data Feeds for RSA Archer IT Security Vulnerability Program Wesley Loeffler, RSA Engineering Last Modified:

More information

HP ALM Overview. Exercise Outline. Administration and Customization Lab Guide

HP ALM Overview. Exercise Outline. Administration and Customization Lab Guide HP ALM 11.00 Administration and Customization Lab Guide Overview This Lab Guide contains the exercises for Administration and Customization of HP ALM 11 Essentials training. The labs are designed to enhance

More information

Load Balancing VMware Workspace Portal/Identity Manager

Load Balancing VMware Workspace Portal/Identity Manager Load Balancing VMware Workspace Portal/Identity Manager Overview VMware Workspace Portal/Identity Manager combines applications and desktops in a single, aggregated workspace. Employees can then access

More information

EMS WEB APP Configuration Guide

EMS WEB APP Configuration Guide EMS WEB APP Configuration Guide V44.1 Last Updated: August 14, 2018 EMS Software emssoftware.com/help 800.440.3994 2018 EMS Software, LLC. All Rights Reserved. Table of Contents CHAPTER 1: EMS Web App

More information

OneLogin Integration User Guide

OneLogin Integration User Guide OneLogin Integration User Guide Table of Contents OneLogin Account Setup... 2 Create Account with OneLogin... 2 Setup Application with OneLogin... 2 Setup Required in OneLogin: SSO and AD Connector...

More information

Xton Access Manager GETTING STARTED GUIDE

Xton Access Manager GETTING STARTED GUIDE Xton Access Manager GETTING STARTED GUIDE XTON TECHNOLOGIES, LLC PHILADELPHIA Copyright 2017. Xton Technologies LLC. Contents Introduction... 2 Technical Support... 2 What is Xton Access Manager?... 3

More information

Roxen Content Provider

Roxen Content Provider Roxen Content Provider Generation 3 Templates Purpose This workbook is designed to provide a training and reference tool for placing University of Alaska information on the World Wide Web (WWW) using the

More information

McAfee Firewall Enterprise epolicy Orchestrator Extension

McAfee Firewall Enterprise epolicy Orchestrator Extension Integration Guide Revision A McAfee Firewall Enterprise epolicy Orchestrator Extension COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo,

More information

Attix5 Pro Storage Platform Console

Attix5 Pro Storage Platform Console Attix5 Pro Storage Platform Console V7.0.1 User Manual for Microsoft Windows Your guide to managing the Attix5 Pro backup environment using the Storage Platform Console. 0 Copyright notice and proprietary

More information

<Partner Name> <Partner Product> RSA ARCHER GRC Platform Implementation Guide. WhiteHat Security Sentinel

<Partner Name> <Partner Product> RSA ARCHER GRC Platform Implementation Guide. WhiteHat Security Sentinel RSA ARCHER GRC Platform Implementation Guide WhiteHat Security Jeffrey Carlson, RSA Partner Engineering Last Modified: 12/13/2016 Solution Summary The integration of WhiteHat

More information

Bomgar PA Integration with ServiceNow

Bomgar PA Integration with ServiceNow Bomgar PA Integration with ServiceNow 2017 Bomgar Corporation. All rights reserved worldwide. BOMGAR and the BOMGAR logo are trademarks of Bomgar Corporation; other trademarks shown are the property of

More information

<Partner Name> RSA NETWITNESS Security Operations Implementation Guide. Secdo Platform. <Partner Product>

<Partner Name> RSA NETWITNESS Security Operations Implementation Guide. Secdo Platform. <Partner Product> RSA NETWITNESS Security Operations Implementation Guide Jeffrey Carlson, RSA Partner Engineering Last Modified: November 27 th, 2017 Solution Summary Secdo integrates with

More information

Privileged Access Management Android Access Console 2.2.2

Privileged Access Management Android Access Console 2.2.2 Privileged Access Management Android Access Console 2.2.2 2015 Bomgar Corporation. All rights reserved worldwide. BOMGAR and the BOMGAR logo are trademarks of Bomgar Corporation; other trademarks shown

More information

ALES Wordpress Editor documentation ALES Research websites

ALES Wordpress Editor documentation ALES Research websites ALES Wordpress Editor documentation ALES Research websites Contents Login... 2 Website Dashboard... 3 Editing menu order or structure... 4 Add a new page... 6 Move a page... 6 Select a page to edit...

More information

USER MANUAL. SalesPort Salesforce Customer Portal for WordPress (Lightning Mode) TABLE OF CONTENTS. Version: 3.1.0

USER MANUAL. SalesPort Salesforce Customer Portal for WordPress (Lightning Mode) TABLE OF CONTENTS. Version: 3.1.0 USER MANUAL TABLE OF CONTENTS Introduction...1 Benefits of Customer Portal...1 Prerequisites...1 Installation...2 Salesforce App Installation... 2 Salesforce Lightning... 2 WordPress Manual Plug-in installation...

More information

Partner Integration Portal (PIP) Installation Guide

Partner Integration Portal (PIP) Installation Guide Partner Integration Portal (PIP) Installation Guide Last Update: 12/3/13 Digital Gateway, Inc. All rights reserved Page 1 TABLE OF CONTENTS INSTALLING PARTNER INTEGRATION PORTAL (PIP)... 3 DOWNLOADING

More information

User Documentation. Administrator Manual.

User Documentation. Administrator Manual. User Documentation Administrator Manual Proposal Software 1140 US Highway 287, Suite 400-102 Broomfield, CO 80020 USA Tel: 203.604.6597 www.proposalsoftware.com Table of Contents Open the WebPro Viewer...

More information

Install Guide WINTER '15 REVISION C. C o p y r i g h t C l o u d A p p s L t d

Install Guide WINTER '15 REVISION C. C o p y r i g h t C l o u d A p p s L t d Install Guide WINTER '15 REVISION C C o p y r i g h t 2 0 1 4 C l o u d A p p s L t d 1 Table of Contents Introduction... 3 Version History... 4 Requirements... 5 Salesforce Organisation Types... 5 Salesforce

More information

D&B Optimizer for Microsoft Installation Guide Setup for Optimizer for Microsoft Dynamics. VERSION: 2.3 PUBLICATION DATE: February, 2019

D&B Optimizer for Microsoft Installation Guide Setup for Optimizer for Microsoft Dynamics. VERSION: 2.3 PUBLICATION DATE: February, 2019 D&B Optimizer for Microsoft Installation Guide Setup for Optimizer for Microsoft Dynamics VERSION: 2.3 PUBLICATION DATE: February, 2019 Contents 1. INTRODUCTION... 3 WHAT IS IT?... 3 FEATURES... 3 GETTING

More information

Management Reports Centre. User Guide. Emmanuel Amekuedi

Management Reports Centre. User Guide. Emmanuel Amekuedi Management Reports Centre User Guide Emmanuel Amekuedi Table of Contents Introduction... 3 Overview... 3 Key features... 4 Authentication methods... 4 System requirements... 5 Deployment options... 5 Getting

More information

INTEGRATION TO MICROSOFT EXCHANGE Installation Guide

INTEGRATION TO MICROSOFT EXCHANGE Installation Guide INTEGRATION TO MICROSOFT EXCHANGE Installation Guide V44.1 Last Updated: March 5, 2018 EMS Software emssoftware.com/help 800.440.3994 2018 EMS Software, LLC. All Rights Reserved. Table of Contents CHAPTER

More information

TIBCO Spotfire Automation Services 7.5. User s Manual

TIBCO Spotfire Automation Services 7.5. User s Manual TIBCO Spotfire Automation Services 7.5 User s Manual Revision date: 15 January 2016 Important Information SOME TIBCO SOFTWARE EMBEDS OR BUNDLES OTHER TIBCO SOFTWARE. USE OF SUCH EMBEDDED OR BUNDLED TIBCO

More information

F5 Azure Cloud Try User Guide. F5 Networks, Inc. Rev. September 2016

F5 Azure Cloud Try User Guide. F5 Networks, Inc. Rev. September 2016 F5 Azure Cloud Try User Guide F5 Networks, Inc. Rev. September 2016 Azureinfo@f5.com Table of Contents Introduction... 3 F5 Web Application Firewall Solution, (WAF) Review... 3 Configuring SSO/Pre-authentication

More information

EMC ApplicationXtender Web Access.NET eroom Integration 6.0

EMC ApplicationXtender Web Access.NET eroom Integration 6.0 EMC ApplicationXtender Web Access.NET eroom Integration 6.0 Administrator s Guide 300-008-282 REV A01 EMC Corporation Corporate Headquarters: Hopkinton, MA 01748-9103 1-508-435-1000 www.emc.com Copyright

More information

InCycle InRelease User Guide

InCycle InRelease User Guide InCycle InRelease User Guide ABOUT THIS GUIDE The User Guide for the InCycle InRelease is for administrators and users. The following related documents for InRelease are also available: User Guide, which

More information

PHPRad. PHPRad At a Glance. This tutorial will show you basic functionalities in PHPRad and

PHPRad. PHPRad At a Glance. This tutorial will show you basic functionalities in PHPRad and PHPRad PHPRad At a Glance. This tutorial will show you basic functionalities in PHPRad and Getting Started Creating New Project To create new Project. Just click on the button. Fill In Project properties

More information

Administrative Training Mura CMS Version 5.6

Administrative Training Mura CMS Version 5.6 Administrative Training Mura CMS Version 5.6 Published: March 9, 2012 Table of Contents Mura CMS Overview! 6 Dashboard!... 6 Site Manager!... 6 Drafts!... 6 Components!... 6 Categories!... 6 Content Collections:

More information

LiveNX Upgrade Guide from v5.2.0 to v5.2.1

LiveNX Upgrade Guide from v5.2.0 to v5.2.1 LIVEACTION, INC. LiveNX Upgrade Guide from v5.2.0 to v5.2.1 UPGRADE LiveAction, Inc. 3500 Copyright WEST BAYSHORE 2016 LiveAction, ROAD Inc. All rights reserved. LiveAction, LiveNX, LiveUX, the LiveAction

More information

Agent Console. The Agent Console. The topics in this section provide information about the Agent Console.

Agent Console. The Agent Console. The topics in this section provide information about the Agent Console. Agent Console The topics in this section provide information about the Agent Console. The Agent Console The agent logs into the workstation The agent is automatically logged in to Intradiem; the Agent

More information

<Partner Name> <Partner Product> RSA SECURID ACCESS Implementation Guide. Pulse Connect Secure 8.x

<Partner Name> <Partner Product> RSA SECURID ACCESS Implementation Guide. Pulse Connect Secure 8.x RSA SECURID ACCESS Implementation Guide Pulse Connect Secure 8.x Daniel R. Pintal, RSA Partner Engineering Last Modified: January 24 th, 2018 Solution Summary The Pulse

More information

Percussion Documentation Table of Contents

Percussion Documentation Table of Contents Percussion Documentation Table of Contents Intro to the Percussion Interface... 2 Logging In to Percussion... 2 The Dashboard... 2 Managing Dashboard Gadgets... 3 The Menu... 4 The Finder... 4 Editor view...

More information

DSS User Guide. End User Guide. - i -

DSS User Guide. End User Guide. - i - DSS User Guide End User Guide - i - DSS User Guide Table of Contents End User Guide... 1 Table of Contents... 2 Part 1: Getting Started... 1 How to Log in to the Web Portal... 1 How to Manage Account Settings...

More information

User Guide. BlackBerry Workspaces for Windows. Version 5.5

User Guide. BlackBerry Workspaces for Windows. Version 5.5 User Guide BlackBerry Workspaces for Windows Version 5.5 Published: 2017-03-30 SWD-20170330110027321 Contents Introducing BlackBerry Workspaces for Windows... 6 Getting Started... 7 Setting up and installing

More information

Ipswitch MOVEit File Transfer (DMZ)

Ipswitch MOVEit File Transfer (DMZ) Secured by RSA Implementation Guide for RSA DLP Network Partner Information Last Modified: August 28 th, 2014 Product Information Partner Name Ipswitch Web Site http://www.ipswitch.com/ Product Name Version

More information

<Partner Name> <Partner Product> RSA SECURID ACCESS Implementation Guide. PingIdentity PingFederate 8

<Partner Name> <Partner Product> RSA SECURID ACCESS Implementation Guide. PingIdentity PingFederate 8 RSA SECURID ACCESS Implementation Guide PingIdentity John Sammon & Gina Salvalzo, RSA Partner Engineering Last Modified: February 27 th, 2018 Solution Summary Ping Identity

More information

DocAve Content Shield v2.2 for SharePoint

DocAve Content Shield v2.2 for SharePoint DocAve Content Shield v2.2 for SharePoint User Guide For SharePoint 2007 Revision A Issued August 2012 1 Table of Contents Table of Contents... 2 About DocAve Content Shield for SharePoint... 4 Complementary

More information

Cisco Threat Intelligence Director (TID)

Cisco Threat Intelligence Director (TID) The topics in this chapter describe how to configure and use TID in the Firepower System. Overview, page 1 Using TID Sources to Ingest Feed Data, page 6 Using Access Control to Publish TID Data and Generate

More information

Nextiva Drive The Setup Process Mobility & Storage Option

Nextiva Drive The Setup Process Mobility & Storage Option Nextiva Drive The Setup Process The Setup Process Adding Users 1. Login to your account and click on the Account icon at the top of the page (this is only visible to the administrator). 2. Click Create

More information

Android User Guide. for version 5.3

Android User Guide. for version 5.3 Android User Guide for version 5.3 Contents 1. Installation... 3 1.1. How to install Babelnet... 3 1.2. Enter Babelnet in the search field.... 3 1.3. Safety precautions when using Babelnet on your Android...

More information

QuickStart Training Guide: The Accounting Review Role

QuickStart Training Guide: The Accounting Review Role Accounting Review Role Final Approval of Expense Reports If you are an Accountant who is using ExpensAble Corporate to make final approval of employees expense reports, this information is for you. This

More information

VMware AirWatch - Workspace ONE, Single Sign-on and VMware Identity Manager

VMware AirWatch - Workspace ONE, Single Sign-on and VMware Identity Manager VMware AirWatch - Workspace ONE, Single Sign-on and VMware Identity Table of Contents Lab Overview - HOL-1857-03-UEM - Workspace ONE UEM with App & Access Management... 2 Lab Guidance... 3 Module 1 - Workspace

More information

User Guide. Version R94. English

User Guide. Version R94. English AuthAnvil User Guide Version R94 English March 8, 2017 Copyright Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept EULATOS as updated

More information

Logi Ad Hoc Reporting System Administration Guide

Logi Ad Hoc Reporting System Administration Guide Logi Ad Hoc Reporting System Administration Guide Version 10.3 Last Updated: August 2012 Page 2 Table of Contents INTRODUCTION... 4 Target Audience... 4 Application Architecture... 5 Document Overview...

More information

Using Jive and SharePoint Together

Using Jive and SharePoint Together Using Jive and SharePoint Together Contents 2 Contents Using Jive and SharePoint Together... 3 Viewing SharePoint Content in Jive...3 Using Recent Activity Widgets... 3 Using SharePoint Sites Widgets...

More information

Remote Support 19.1 Web Rep Console

Remote Support 19.1 Web Rep Console Remote Support 19.1 Web Rep Console 2003-2019 BeyondTrust Corporation. All Rights Reserved. BEYONDTRUST, its logo, and JUMP are trademarks of BeyondTrust Corporation. Other trademarks are the property

More information

Contents. Common Site Operations. Home actions. Using SharePoint

Contents. Common Site Operations. Home actions. Using SharePoint This is a companion document to About Share-Point. That document describes the features of a SharePoint website in as much detail as possible with an emphasis on the relationships between features. This

More information

Legal Notes. Regarding Trademarks KYOCERA MITA Corporation

Legal Notes. Regarding Trademarks KYOCERA MITA Corporation Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held liable for any problems arising from

More information

<Partner Name> <Partner Product> RSA NETWITNESS Logs Implementation Guide. PAS Global, LLC ICS 5.5

<Partner Name> <Partner Product> RSA NETWITNESS Logs Implementation Guide. PAS Global, LLC ICS 5.5 RSA NETWITNESS Logs Implementation Guide PAS Global, LLC Daniel R. Pintal, RSA Partner Engineering Last Modified: October 30, 2017 Solution Summary Through the integration

More information

Configuring the SMA 500v Virtual Appliance

Configuring the SMA 500v Virtual Appliance Using the SMA 500v Virtual Appliance Configuring the SMA 500v Virtual Appliance Registering Your Appliance Using the 30-day Trial Version Upgrading Your Appliance Configuring the SMA 500v Virtual Appliance

More information

Managing Your Website with Convert Community. My MU Health and My MU Health Nursing

Managing Your Website with Convert Community. My MU Health and My MU Health Nursing Managing Your Website with Convert Community My MU Health and My MU Health Nursing Managing Your Website with Convert Community LOGGING IN... 4 LOG IN TO CONVERT COMMUNITY... 4 LOG OFF CORRECTLY... 4 GETTING

More information

User Guide. Version R92. English

User Guide. Version R92. English AuthAnvil User Guide Version R92 English October 9, 2015 Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept EULATOS as updated from

More information

Using Jive and SharePoint Together

Using Jive and SharePoint Together Using Jive and SharePoint Together Contents Using Jive and SharePoint Together... 3 Viewing SharePoint Content in Jive... 3 Using Recent Activity Widgets... 3 Using SharePoint Sites Widgets... 4 Using

More information

FileLoader for SharePoint

FileLoader for SharePoint Administrator s Guide FileLoader for SharePoint v. 2.0 Last Updated 6 September 2012 Contents Preface 3 FileLoader Users... 3 Getting Started with FileLoader 4 Configuring Connections to SharePoint 8

More information

Learn how to login to Sitefinity and what possible errors you can get if you do not have proper permissions.

Learn how to login to Sitefinity and what possible errors you can get if you do not have proper permissions. USER GUIDE This guide is intended for users of all levels of expertise. The guide describes in detail Sitefinity user interface - from logging to completing a project. Use it to learn how to create pages

More information

NetExtender for SSL-VPN

NetExtender for SSL-VPN NetExtender for SSL-VPN Document Scope This document describes how to plan, design, implement, and manage the NetExtender feature in a SonicWALL SSL-VPN Environment. This document contains the following

More information

VMware Identity Manager vidm 2.7

VMware Identity Manager vidm 2.7 RSA SECURID ACCESS Standard Agent Implementation Guide VMware Daniel R. Pintal, RSA Partner Engineering Last Modified: August 19, 2016 Solution Summary VMware Identity

More information

How-to Guide: Tenable for McAfee epolicy Orchestrator. Last Updated: April 03, 2018

How-to Guide: Tenable for McAfee epolicy Orchestrator. Last Updated: April 03, 2018 How-to Guide: Tenable for McAfee epolicy Orchestrator Last Updated: April 03, 2018 Table of Contents How-to Guide: Tenable for McAfee epolicy Orchestrator 1 Introduction 3 Integration Requirements 4 Tenable

More information

Administrator Quick Guide

Administrator Quick Guide 1 Administrator Quick Guide Login Screen The first page employees will see when visiting their training site is the login screen. This is where employees must enter their username and password to access

More information

LUCITY SECURITY. This manual covers managing users, groups, and permissions for Lucity. Version: 2017r2

LUCITY SECURITY. This manual covers managing users, groups, and permissions for Lucity. Version: 2017r2 LUCITY SECURITY This manual covers managing users, groups, and permissions for Lucity. Version: 2017r2 CONTENTS SECURITY... 1 Security Program... 2 Getting Started... 3 Setting up a Security Admin User...

More information

Monitoring and Evaluation Tool

Monitoring and Evaluation Tool Monitoring and Evaluation Tool USER MANUAL March, 2014 www.menarid.icarda.org THIS PAGE LEFT EMPTY INTENTIONALLY USER MANUAL Definitions and abbreviations Chart... Graphical representation of M&E project

More information

Pulse Secure Policy Secure

Pulse Secure Policy Secure Policy Secure RSA SecurID Ready Implementation Guide Last Modified: November 19, 2014 Partner Information Product Information Partner Name Pulse Secure Web Site http://www.pulsesecure.net/ Product Name

More information

.NET SAML Consumer Value-Added (VAM) Deployment Guide

.NET SAML Consumer Value-Added (VAM) Deployment Guide .NET SAML Consumer Value-Added (VAM) Deployment Guide Copyright Information SecureAuth is a copyright of SecureAuth Corporation. SecureAuth s IdP software, appliances, and other products and solutions,

More information

Managing the Cisco APIC-EM and Applications

Managing the Cisco APIC-EM and Applications Managing Cisco APIC-EM Using the GUI, page 1 Cisco APIC-EM Application Separation, page 1 Information about Backing Up and Restoring the Cisco APIC-EM, page 4 Updating the Cisco APIC-EM Software, page

More information

DocAve 6 SharePoint Migrator

DocAve 6 SharePoint Migrator DocAve 6 SharePoint Migrator User Guide Service Pack 4, Cumulative Update 2 Revision C Issued July 2014 Table of Contents About SharePoint Migration... 5 Complementary Products... 5 Submitting Documentation

More information

International SOS e-learning Training Hub User Guide

International SOS e-learning Training Hub User Guide International SOS e-learning Training Hub User Guide WELCOME TO THE INTERNATIONAL SOS TRAINING HUB.... 2 STEP 1. ACCESSING THE INTERNATIONAL SOS TRAINING HUB... 2 STEP 2. LOGGING INTO INTERNATIONAL SOS

More information

Administration Guide. Lavastorm Analytics Engine 6.1.1

Administration Guide. Lavastorm Analytics Engine 6.1.1 Administration Guide Lavastorm Analytics Engine 6.1.1 Lavastorm Analytics Engine 6.1.1: Administration Guide Legal notice Copyright THE CONTENTS OF THIS DOCUMENT ARE THE COPYRIGHT OF LIMITED. ALL RIGHTS

More information

SOA Software Intermediary for Microsoft : Install Guide

SOA Software Intermediary for Microsoft : Install Guide SOA Software Intermediary for Microsoft : Install Guide SOA Software Intermediary for Microsoft Install Guide SOAIM_60 August 2013 Copyright Copyright 2013 SOA Software, Inc. All rights reserved. Trademarks

More information

Using Sitecore 5.3.1

Using Sitecore 5.3.1 Using Sitecore 5.3.1 An End-User s Guide to Using and Administrating Sitecore Author: Sitecore Corporation Date: December 12, 2007 Release: Rev. 1.0 Language: English Sitecore is a registered trademark.

More information

GRS Enterprise Synchronization Tool

GRS Enterprise Synchronization Tool GRS Enterprise Synchronization Tool Last Revised: Thursday, April 05, 2018 Page i TABLE OF CONTENTS Anchor End User Guide... Error! Bookmark not defined. Last Revised: Monday, March 12, 2018... 1 Table

More information

SelectSurvey.NET Developers Manual

SelectSurvey.NET Developers Manual Developers Manual (Last updated: 5/6/2016) SelectSurvey.NET Developers Manual Table of Contents: SelectSurvey.NET Developers Manual... 1 Overview... 2 Before Starting - Is your software up to date?...

More information

USING PERFORMANCE PRO An Appraiser s Quickstart Guide. Hrperformancesolutions.net 4/2017 v. 3.9

USING PERFORMANCE PRO An Appraiser s Quickstart Guide. Hrperformancesolutions.net 4/2017 v. 3.9 USING PERFORMANCE PRO An Appraiser s Quickstart Guide Hrperformancesolutions.net 4/2017 v. 3.9 Appraiser Quickstart Guide You have been asked to provide input on an appraisal as a primary appraiser. If

More information

Sophos Mobile in Central

Sophos Mobile in Central startup guide Product Version: 8.1 Contents About this guide... 1 What are the key steps?... 2 Activate Mobile Advanced licenses... 3 Configure settings... 4 Configure personal settings...4 Configure technical

More information

Colligo Engage Outlook App 7.1. Offline Mode - User Guide

Colligo Engage Outlook App 7.1. Offline Mode - User Guide Colligo Engage Outlook App 7.1 Offline Mode - User Guide Contents Colligo Engage Outlook App 1 Benefits 1 Key Features 1 Platforms Supported 1 Installing and Activating Colligo Engage Outlook App 3 Checking

More information

Nintex Reporting 2008 Help

Nintex Reporting 2008 Help Nintex Reporting 2008 Help Last updated: Thursday, 24 December 2009 1 Using Nintex Reporting 2008 1.1 Chart Viewer Web Part 1.2 Importing and Exporting Reports 1.3 Import Nintex report page 1.4 Item Level

More information

Set Up and Manage Salesforce Communities

Set Up and Manage Salesforce Communities Set Up and Manage Salesforce Communities Salesforce, Spring 16 @salesforcedocs Last updated: April 28, 2016 Copyright 2000 2016 salesforce.com, inc. All rights reserved. Salesforce is a registered trademark

More information

Firewall Enterprise epolicy Orchestrator

Firewall Enterprise epolicy Orchestrator Integration Guide McAfee Firewall Enterprise epolicy Orchestrator Extension version 5.2.1 COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted,

More information

RedBeam Inventory Tracking User Manual

RedBeam Inventory Tracking User Manual RedBeam Inventory Tracking User Manual Contact us at www.redbeam.com. Page 1 Table of Contents Table of Contents... 2 Overview... 4 RedBeam Inventory Tracking... 4 PC Prerequisites... 4 Mobile Computer

More information

KYOCERA Net Admin User Guide

KYOCERA Net Admin User Guide KYOCERA Net Admin User Guide Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held liable

More information

RiskyProject Enterprise 7

RiskyProject Enterprise 7 RiskyProject Enterprise 7 Project Risk Management Software RiskyProject Enterprise User Guide Intaver Institute Inc. www.intaver.com email: info@intaver.com COPYRIGHT Copyright 2017 Intaver Institute.

More information

Creating/Updating Your Webpage

Creating/Updating Your Webpage Creating/Updating Your Webpage Getting Started: 1. Go to the website provided previously. 2. Log in with your username & password. 3. Click on your school name, then click on Content Management. 4. Find

More information

AT&T Global Network Client for Mac User s Guide Version 2.0.0

AT&T Global Network Client for Mac User s Guide Version 2.0.0 Version 1.7.0 AT&T Global Network Client for Mac User s Guide Version 2.0.0 experience may vary. This document is not an offer, commitment, representation or warranty by AT&T and is subject to change..

More information

Adobe Document Cloud esign Services. for Salesforce Version 17 Installation and Customization Guide

Adobe Document Cloud esign Services. for Salesforce Version 17 Installation and Customization Guide Adobe Document Cloud esign Services for Salesforce Version 17 Installation and Customization Guide 2015 Adobe Systems Incorporated. All rights reserved. Last Updated: August 28, 2015 Table of Contents

More information

Barracuda Networks NG Firewall 7.0.0

Barracuda Networks NG Firewall 7.0.0 RSA SECURID ACCESS Standard Agent Implementation Guide Barracuda Networks.0 fal, RSA Partner Engineering Last Modified: 10/13/16 Solution Summary The Barracuda NG Firewall

More information

EM L04 Using Workflow to Manage Your Patch Process and Follow CISSP Best Practices

EM L04 Using Workflow to Manage Your Patch Process and Follow CISSP Best Practices EM L04 Using Workflow to Manage Your Patch Process and Follow CISSP Best Practices Hands-On Lab Description Most corporations today have some form of patch process in place. In this session, you will learn

More information

Deploying the Cisco Tetration Analytics Virtual Appliance in Microsoft Azure

Deploying the Cisco Tetration Analytics Virtual Appliance in Microsoft Azure Deploying the Cisco Tetration Analytics Virtual Appliance in Microsoft Azure About, on page 1 Prerequisites for, on page 1, on page 3 AboutDeployingtheCiscoTetrationAnalyticsVirtualAppliance in Microsoft

More information

NTP Software VFM Administration Web Site For Microsoft Azure

NTP Software VFM Administration Web Site For Microsoft Azure NTP Software VFM Administration Web Site For Microsoft Azure User Manual Revision 1.1. - July 2015 This guide details the method for using NTP Software VFM Administration Web Site, from an administrator

More information

LiveNX Upgrade Guide from v5.1.2 to v Windows

LiveNX Upgrade Guide from v5.1.2 to v Windows LIVEACTION, INC. LiveNX Upgrade Guide from v5.1.2 to v5.1.3 - Windows UPGRADE LiveAction, Inc. 3500 Copyright WEST BAYSHORE 2016 LiveAction, ROAD Inc. All rights reserved. LiveAction, LiveNX, LiveUX, the

More information

Bill Analyser User Guide

Bill Analyser User Guide Bill Analyser User Guide emobile.ie/business Contents 1.0 Basic Concepts... 3 1.1 Users and Roles... 3 Standard Users... 3 Global Users... 3 eircom User Roles... 3 Available user roles... 3 1.2 Data Structure...

More information

Application Server The following programs must be preinstalled on the application server before installing BizView:

Application Server The following programs must be preinstalled on the application server before installing BizView: BizView INSTALLATION DESCRIPTION BizView INSTALLATION DESCRIPTION... 1 BizView installation... 1 Prerequisites... 1 Preparations to fulfill prerequisites... 2 Install IIS... 3 Install.Net Framework...

More information

Function. Description

Function. Description Function Check In Get / Checkout Description Checking in a file uploads the file from the user s hard drive into the vault and creates a new file version with any changes to the file that have been saved.

More information

System Center 2012 R2 Lab 4: IT Service Management

System Center 2012 R2 Lab 4: IT Service Management System Center 2012 R2 Lab 4: IT Service Management Hands-On Lab Step-by-Step Guide For the VMs use the following credentials: Username: Contoso\Administrator Password: Passw0rd! Version: 1.5.5 Last updated:

More information

NTP Software VFM. Administration Web Site for NetAppS3. User Manual. Version 5.1

NTP Software VFM. Administration Web Site for NetAppS3. User Manual. Version 5.1 NTP Software VFM Administration Web Site for NetAppS3 User Manual Version 5.1 This guide details the method for using NTP Software VFM Administration Web Site, from an administrator s perspective. Upon

More information

Managing Configurations

Managing Configurations CHAPTER 3 The Configurations page is your starting point for managing device configurations for network elements managed by Cisco Prime Network by using the CM tools. The following table lists the main

More information

Pepkor webcom Quick Reference Guide. Version Date: 2013/12 Version Number: 1.3

Pepkor webcom Quick Reference Guide. Version Date: 2013/12 Version Number: 1.3 Pepkor webcom Quick Reference Guide Version Date: 2013/12 Version Number: 1.3 Table of Contents 1 INTRODUCTION... 4 2 LOGGING IN... 4 3 NAVIGATE INSIDE WEBCOM... 5 3.1 MAIN SECTION 5 3.1.1 Home... 5 3.1.2

More information