<Partner Name> RSA ARCHER GRC Platform Implementation Guide. RiskLens <Partner Product>
|
|
- Philippa Andrews
- 5 years ago
- Views:
Transcription
1 <Partner Name> <Partner Product> RSA ARCHER GRC Platform Implementation Guide Wesley Loeffler, RSA Engineering Last Modified: April 25 th, 2018
2 2.4 Solution Summary The & Archer integration connects a Risk Issue in the RSA Archer GRC Platform s Risk Register to a Cyber Risk Quantification Analysis. The connection adds quantified analysis information directly to the Risk Issue. This allows the Risk Issue to be assessed alongside other issues with FAIR quantified outputs. Analyses can be updated over time and the changes can be sent back to the corresponding Risk Issue with the changes. This integration will allow for both requesting and sending data to/from the RSA Archer GRC Platform. This version of the integration acts as a conduit to coordinate the platforms. It integrates the two platforms for workflow purposes and data communication. Future versions will expand on the integration of FAIR and automatic updates. Partner Integration Overview GRC Solution Type Uses Out Of The Box Application Uses Custom Application Requires On-Demand License IT Security Risk Management & Enterprise & Operational Risk Risk Register Yes (Modified version of Risk Register) No
3 2.4 Partner Product Configuration Before You Begin This section provides instructions for configuring with the RSA Archer GRC Platform. This document is not intended to suggest optimum installation or configuration. It is assumed that the reader has both working knowledge of all products involved, and the ability to perform the tasks outlined in this section. Administrators should have access to the product documentation for all products in order to install the required components. All components must be installed and working prior to the integration. Perform the necessary tests to confirm that this is true before proceeding. *Customers with the Monte Carlo integration should not override the layout when installing the package. Doing so will result in Monte Carlo fields being removed from the layout. Important: The integration described in this guide is being provided as a reference implementation for evaluation and testing purposes. It may or may not meet the needs and use cases for your organization. If additional customizations or enhancements are needed, it is recommended that customers contact RSA Professional Services for assistance. Configuration The steps provided below cover the changes and setup needed to provide access to the API for your RSA Archer GRC Platform Instance. Token Management 1. As a Admin, select Token Management from the Admin drop down
4 Click the New Token button to add a new API Token. 3. Set the Access Level for the new Token. Your RSA Archer GRC Platform Integration will require that the Token you create has Write level access or higher. 4. Make note of the Token Value. It will be used in the Risk Register Custom Object to communicate with the server
5 The Token Value will be inserted inside the Custom Object on the Risk Register layout. For instructions on locating the Custom Object please refer to steps 7 and 8 of the Updating the Custom Object inside Risk Register section. RSA Archer GRC Platform API User This section details the steps necessary for providing user and network credentials needed to communicate with. 1. Navigate to Admin -> Third Party Integrations -> Third Party Integration Settings. 2. Fill in the information for the RSA Archer GRC Platform API User and click Save
6 2.4 RSA Archer Risk Register/ Package Installation The following information details the steps necessary to import and install the Risk Register application. Step 1: Back Up Your Database There is no Undo function for a package installation. Packaging is a powerful feature that can make significant changes to an instance. It is strongly recommended to back up the instance database before installing a package. This process enables a full restoration if necessary. An alternate method for undoing a package installation is to create a package of the affected objects in the target instance before installing the new package. This package provides a snapshot of the instance before the new package is installed, which can be used to help undo the changes made by the package installation. New objects created by the package installation must be manually deleted. Step 2: Import the Package Procedure 1. Go to the Install Packages page. a. From the menu bar, click. b. Under Application Builder, click Install Packages. 2. In the Available Packages section, click Import. 3. Click Add New, then locate and select the package file that you want to import. 4. Click OK. The package file is displayed in the Available Packages section and is ready for installation. Step 3: Map Objects in the Package Procedure 1. In the Available Packages section, select the package you want to map. 2. In the Actions column, click for that package. The analyzer runs and examines the information in the package. The analyzer automatically matches the system IDs of the objects in the package with the objects in the target instances and identifies objects from the package that are successfully mapped to objects in the target instance, objects that are new or exist but are not mapped, and objects that do not exist (the object is in the target but not in the source). Note: This process can take several minutes or more, especially if the package is large, and may time out after 60 minutes. This time-out setting temporarily overrides any IIS time-out settings set to less than 60 minutes. When the analyzer is complete, the Advanced Package Mapping page lists the objects in the package file and corresponding objects in the target instance. The objects are divided
7 2.4 into tabs, depending on whether they are found within Applications, Solutions, Access Roles, Groups, Sub- forms, or Questionnaires. 3. On each tab of the Advanced Mapping Page, review the icons that are displayed next to each object name to determine which objects require you to map them manually. Icon Name Description Awaiting Mapping Review Indicates that the system could not automatically match the object or children of the object to a corresponding object in the target instance. Objects marked with this symbol must be mapped manually through the mapping process. Important: New objects should not be mapped. This icon should remain visible. The mapping process can proceed without mapping all the objects. Note: You can execute the mapping process without mapping Mapping Completed Do Not Map Undo all the objects. The icon is for informational purposes only. Indicates that the object and all child objects are mapped to an object in the target instance. Nothing more needs to be done with these objects in Advanced Package Mapping. Indicates that the object does not exist in the target instance or the object was not mapped through the Do Not Map option. These objects will not be mapped through Advanced Package Mapping, and must be remedied manually. Indicates that a mapped object can be unmapped. This icon is displayed in the Actions column of a mapped object or object flagged as Do Not Map. 4. For each object that requires remediation, do one of the following: To map each item individually, on the Target column, select the object in the target instance to which you want to map the source object. If an object is new or if you do not want to map an object, select Do Not Map from the drop-down list. Important: Ensure that you map all objects to their lowest level. When objects have child or related objects, a drill-down link is provided on the parent object. Child objects must be mapped before parent objects are mapped. For more details, see "Mapping Parent/Child Objects" in the RSA Archer Online Documentation. To automatically map all objects in a tab that have different system IDs but the same object name as an object in the target instance, do the following: a. In the toolbar, click Auto Map. b. Select an option for mapping objects by name
8
9 2.4 Option Ignore case Ignore space Description Select this option to match objects with similar names regardless of the case of the characters in the object names. Select this option to match objects with similar names regardless of whether spaces exist in the object names. c. Click OK. The Confirmation dialog box opens with the total number of mappings performed. These mappings have not been committed to the database yet and can be modified in the Advanced Package Mapping page. d. Click OK. To set all objects in the tab to Do Not Map, in the toolbar, click Do Not Map. Note: To undo the mapping settings for any individual object, click column. in the Actions When all objects are mapped, the icon is displayed in the tab title. The icon is displayed next to the object to indicate that the object will not be mapped. 5. Verify that all other objects are mapped correctly. 6. (Optional) To save your mapping settings so that you can resume working later, see "Exporting and Importing Mapping Settings" in the RSA Archer Online Documentation. 7. Once you have reviewed and mapped all objects, click. 8. Select I understand the implications of performing this operation and click OK. The Advanced Package Mapping process updates the system IDs of the objects in the target instance as defined on the Advanced Package Mapping page. When the mapping is complete, the Import and Install Packages page is displayed. Important: Advanced Package Mapping modifies the system IDs in the target instance. Any Data Feeds and Web Service APIs that use these objects will need to be updated with the new system IDs. Step 4: Install the Package All objects from the source instance are installed in the target instance unless the object cannot be found or is flagged to not be installed in the target instance. A list of conditions that may cause objects not to be installed is provided in the Log Messages section. A log entry is displayed in the Package Installation Log section. Procedure 1. Go to the Install Packages page. a. From the menu bar, click. b. Under Application Builder, click Install Packages. 2. In the Available Packages section, locate the package file that you want to install, and click Install
10 In the Configuration section, select the components of the package that you want to install. To select all components, select the top-level checkbox. To install only specific global reports in an already installed application, select the checkbox associated with each report that you want to install. Note: Items in the package that do not match an existing item in the target instance are selected by default. 4. In the Configuration section, under Install Method, select an option for each selected component. To use the same Install Method for all selected components, select a method from the top-level drop-down list. Note: If you have any existing components that you do not want to modify, select Create New Only. You may have to modify those components after installing the package to use the changes made by the package. 5. In the Configuration section, under Install Option, select an option for each selected component. To use the same Install Option for all selected components, select an option from the top-level drop-down list. Note: If you have any custom fields or formatting in a component that you do not want to lose, select Do Not Override Layout. You may have to modify the layout after installing the package to use the changes made by the package. 6. To deactivate target fields and data-driven events that are not in the package, in the Post- Install Actions section, select the Deactivate target fields and data-driven events that are not in the package checkbox. To rename the deactivated target fields and data-driven events with a user-defined prefix, select the Apply a prefix to all deactivated objects checkbox, and enter a prefix. This can help you identify any fields or data-driven events that you may want to review for cleanup post-install. 7. Click Install. 8. Click OK. Step 5: Review the Package Installation Log 1. Go to the Package Installation Log tab of the Install Packages page. a. From the menu bar, click. b. Under Application Builder, click Install Packages. c. Click the Package Installation Log tab. 2. Click the package that you want to view. 3. In the Package Installation Log page, in the Object Details section, click View All Warnings
11 2.4 RSA Archer GRC Configuration These steps cover the changes required to your RSA Archer GRC Platform instance to support integration with the API. The Custom Object contains the script that will be required for Pre-Production and Production use. Updating the Custom Object inside Risk Register 1. Navigate to Applications by clicking the Admin Toolkit and selecting Applications under the Application Builder. 2. Select the Risk Register Application in Manage Applications. 3. Locate and document the following fields IDs from the Risk Register application: a. Risk (used to populate the RiskNameIDInForm field) b. Risk ID (used to populate the RiskIDInForm field) c. Level ID* d. Analysis Complete Date e. Analysis Request Date f. Loss Exposure Minimum g. Loss Exposure Maximum
12 2.4 h. Loss Exposure 10th i. Loss Exposure 90 th j. Loss Exposure Average k. Quantitative Analysis (used to populate the SubformIDInRiskIssue field) *To determine the Level ID of the Risk Register application click the General tab and select the Leveled (Outline) option in the Structure dropdown box. *Hover your mouse cursor over the Risk Register Name under the Levels section. The Level ID will appear in the bottom right corner of the window
13 Navigate to Sub-Forms by clicking the Admin Toolkit and selecting Sub-Forms located under the Application Builder. 5. Select the Sub-Form located under Manage Sub-Forms. 6. Locate and document the following fields IDs from the Sub-Form: a. Level ID* b. Analysis Complete Date c. Loss Exposure Minimum d. Loss Exposure Maximum e. Loss Exposure 10th f. Loss Exposure 90 th g. Loss Exposure Average
14 2.4 *The Level ID of the Sub-Form can be obtained by either searching the database of your Archer instance or making a Postman Request. The steps for performing a Postman Request have been outlined at the end of this section. 7. Navigate to the Risk Register application. Once inside, click the layout tab and scroll down until you locate the Custom Object
15 Click the down arrow next to the Object and select Edit Custom Object Properties. 9. The documented field IDs will be inserted into the Code section of the Custom Object
16 Insert the Risk Register IDs documented in step 3 into the fields under var riskissueids in the Custom Object. 11. Insert the Sub-Form IDs documented in step 6 into the fields under var subformids in the Custom Object. 12. Insert the Analysis Request Date ID into the var fldid under the success:function() near the bottom of the Custom Object code. 13. Update the baseurl near the top of the Custom Object code. If are you communicating directly with use either the or URL. Communication through middleware uses the URL
17 Create a new RSA Archer GRC Platform user and provide them with permissions to update Risk Register entries. Performing a Postman Request to Obtain the Sub-Form Level ID Postman is an API development tool that can be downloaded free of charge from API calls will be made in Postman to determine the Level ID of the Sub-Form. 1. Navigate to Sub-Forms under the Application Builder. From the Manage Sub-Forms window locate the Sub-Form and hover the mouse cursor over the name. Document the Module ID that appears in the bottom right, as it will be used in a Postman call. 2. Open the Postman application and select POST in the top left dropdown box. Enter the URL of your RSA Archer application followed by /api/core/security/login. Select the Headers tab and enter the values shown below under Key and Value. 3. Click the Body tab to the right of Headers. Enter your Instance, Username, and Password credentials, as shown below. Click the Send button in the top right of the window. Document or copy the SessionToken value shown in the bottom box onto your clipboard
18 Open a new tab and select Get in the dropdown box in the top left. Enter the URL of your RSA Archer application followed by /api/core/system/level/module/moduleid (enter the value of the module ID we documented in step 1 above). Select the Headers tab and input the key and values shown below. Either input or copy and paste the SessionToken obtained in step 3 into the Authorization field and click Send. The Level ID for the Sub-Form will be shown in the bottom box next to the Id field. This value will be input into the Custom Object under the var subformids section
19
20 2.4 RSA Archer / Integration Middleware In order to facilitate improved security with an Archer and integration, middleware is used to provided two-way communication between an Archer instance (via the Archer REST API) and the instance (via the REST API). Infrastructure Requirements The API Middleware project was designed to run inside a corporate network with limited and controlled access to the local (in network) Archer instance and to an external instance. recommends running the middleware project on the following environment: Windows Server 2008 R2 + IIS NET Framework v Installation Requirements middleware cannot be installed as a child application of RSA Archer. Doing so results in an error caused by IIS web application inheritance. In the event that RSA Archer is installed at the root directory, the Middleware must be installed as a second website at the root level. Security Considerations The middleware can operate as a network intermediary so that firewalls do not have to be opened from Archer to out of network IP addresses. The middleware handles authentication to the Archer API. Archer credentials never leave your network (Unless you wish to pass them to the middleware for verification purposes). The middleware is configured by the Archer instance owner, so only the required API calls are mapped. Allowing vary narrow access to the Archer API. The middleware s source is available and can be compiled by the installing agency
21 2.4 Publishing Middleware Web API on IIS 1. Open the Internet Information Services (IIS) Manager application. 2. Navigate to the Default Web Site dropdown and right click the icon. Select the Deploy option then choose Import Application. *Please note that the Middleware should not be installed as a child application of Archer
22 Locate and select the.api.middleware zip file then click the Next button. *Please note that you will not need to import the.api.middleware_source.zip file, but the data contained within is required by.api.middleware.zip. 4. Leave all options checked and click the Next button at the bottom of the window
23 Select the Application Path for the Middleware and click Next. 6. (Optional) If you are updating the Middleware select the No, just append the files in the application package to the destination option and click Next
24 The Installation Progress and Summary box will detail the status of the Middleware integration. Setup Summary 1.) Create an API Token in your instance of 2.) Add a reference to that API token in your custom object code. 3.) Add the necessary fields in your Archer instance to hold analysis data, and reference the IDs in your custom object code. 4.) Update the baseurl variable in the Custom Object to enable communication with. 5.) Enter the credentials and URL for your Archer instance API user into the Admin => Third Party Integrations section of. Once these steps are complete, setup for the middleware itself consists of: 6.) Ensuring that the Middleware application publish package has been imported and is running on your instance of IIS within the desired network. 7.) Ensure that your network (firewall/dmz) has access to port 443 on your Archer Instance as well as to ( or 8.) The Middleware will require the API token (2), and the Archer instance credentials (4) to be placed in the Web.config file, as shown below
25 2.4 Web.config Configuration The following information details the steps necessary for configuring the Web.config file to enable communication through the middleware. 1. Navigate to the web.config file located in the Middleware directory. 2. Input your network credentials into the highlighted fields in the web.config file. ArcherAPIBaseUrl: The address (within your network) at which Archer API endpoints may be accessed. ArcherInstanceName: Name of the Archer instance which you wish to allow communication with your instance of
26 2.4 ArcherDomain: Domain in which the Archer instance resides. ArcherUserName: Name of the User which has Archer API access, used for validation purposes. ArcherPassword: Password for the User which has Archer API access, used for validation purposes. APIBaseURL: The address (external from your network) at which the API endpoints may be accessed. ( APIVersionNumber: Current API version number to access. Currently, only version 1 is available. APIBearerToken: API token created in your instance. The data in appsettings can be protected by using the built in ASP.Net Registration Tool. This will replace the plaintext credentials and addresses with and encrypted section that will be automatically decrypted when needed by IIS. The following article from Microsoft describes the encryption process: Internally, tested this process with the following command to the Registration Tool: PS C:\.\aspnet_regiis -pe "appsettings" -app "/" -prov "RsaProtectedConfigurationProvider" - -pe is the command to encrypt the config file. - appsettings is the target element in the config file to be encrypted. - -app and the forward slash represent the current IIS application in which the target config file exists. - -prov and the following string represent the encryption provider to be used. Note that RsaProtectedConfigurationProvider may not be the provider available or desired in your environment
27 2.4 Requesting a Analysis The following steps can be used to request a analysis after populating a Risk Register record. 1. Populate the Risk Register record with data relevant to your risk. Select the dropdown box next to Assessment Approach and choose Quantitative Analysis. Inherent and Residual Risk will not calculate until the Status is Active. This prevents Under Development risks from being included in the risk rollups. After selecting Quantitative Analysis, the Analysis section will be displayed near the bottom of the window. Note that Inherent Risk is still established Qualitatively
28 Scroll down to the Analysis section and click the Request a New Analysis button. This will send a request to. The Analysis Request Date will display the date of the request and the Request Status will indicate a pending request. A text box at the bottom of the window will indicate the state of the request
29 Navigate to the application and input your credentials to begin the analysis process
30 Select Analysis Process Queue from the Quantification drop down menu. 5. Click the Attach Analysis link to the right of the Analysis Process Queue item. 6. Select the Quantification Analysis to be performed for the Risk Register record. Click the Attach button to finish the request. *For more information on how analyses are facilitated please visit 7. A popup box in the bottom right of the window will indicate that the analysis has been attached to your Risk Register record
31 Return to your Risk Register record in RSA Archer and scroll down to the Analysis section. The values in the left column have been populated based on the results of the analysis, and the text box indicates the analysis is complete. The loss Exposure 90 th field is used to calculate the value of the Residual Risk field. This indicates the level of residual risk remaining after controls are applied. The level of Residual Risk is based on the values shown below: Loss Exposure 90 th Greater than $25 million Greater than $10 million Greater than $5 million Greater than $999 thousand Greater than $0 Residual Risk High Medium High Medium Medium Low Low The values of Residual Risk and Calculated Residual Risk in the Overall Risk section are populated based on the value of Residual Risk in the Analysis section, as shown below. Future requests will replace the existing request in the Analysis, and historical analysis results will be shown in the Quantitative Analysis sub-form, as shown below
32 2.4 Certification Environment for RSA Archer GRC Date Tested: August 11, 2017 Certification Environment Product Name Version Information Operating System RSA Archer GRC 6.2 P3 Virtual Appliance Virtual Appliance
<Partner Name> <Partner Product> RSA ARCHER GRC Platform Implementation Guide. Swimlane 2.x
RSA ARCHER GRC Platform Implementation Guide Jeffrey Carlson, RSA Partner Engineering Last Modified: 11/02/2017 Solution Summary The RSA Archer integration allows Swimlane
More information<Partner Name> RSA ARCHER GRC Platform Implementation Guide. Gurucul Risk Analytics. <Partner Product>
RSA ARCHER GRC Platform Implementation Guide Jeffrey Carlson, RSA Partner Engineering Last Modified: August 1 st, 2017 Solution Summary Gurucul is changing the way enterprises
More informationDigital Defense Frontline VM 6.0
RSA ARCHER GRC Platform Implementation Guide Digital Defense Jeffrey Carlson, RSA Partner Engineering Last Modified: October 16 th, 2017 Solution Summary Digital Defense
More informationPASSPORTAL PLUGIN DOCUMENTATION
Contents Requirements... 2 Install or Update Passportal Plugin Solution Center... 3 Configuring Passportal Plugin... 5 Client mapping... 6 User Class Configuration... 7 About the Screens... 8 Passportal
More information<Partner Name> RSA ARCHER GRC Platform Implementation Guide. Global-Regulation International Law Search V. 1. <Partner Product>
RSA ARCHER GRC Platform Implementation Guide Global-Regulation Jeffrey Carlson, RSA Partner Engineering Last Modified: May 15 th, 2017 Solution Summary Global-Regulation.com
More information<Partner Name> <Partner Product> RSA Ready Implementation Guide for. Rapid 7 Nexpose Enterprise 6.1
RSA Ready Implementation Guide for Rapid 7 Jeffrey Carlson, RSA Partner Engineering Last Modified: 04/11/2016 Solution Summary Rapid7 Nexpose Enterprise drives the collection
More informationTenable SecurityCenter Data Feeds for RSA Archer IT Security Vulnerability Program
RSA ARCHER GRC Platform Implementation Guide Tenable SecurityCenter Data Feeds for RSA Archer IT Security Vulnerability Program Wesley Loeffler, RSA Engineering Last Modified:
More informationHP ALM Overview. Exercise Outline. Administration and Customization Lab Guide
HP ALM 11.00 Administration and Customization Lab Guide Overview This Lab Guide contains the exercises for Administration and Customization of HP ALM 11 Essentials training. The labs are designed to enhance
More informationLoad Balancing VMware Workspace Portal/Identity Manager
Load Balancing VMware Workspace Portal/Identity Manager Overview VMware Workspace Portal/Identity Manager combines applications and desktops in a single, aggregated workspace. Employees can then access
More informationEMS WEB APP Configuration Guide
EMS WEB APP Configuration Guide V44.1 Last Updated: August 14, 2018 EMS Software emssoftware.com/help 800.440.3994 2018 EMS Software, LLC. All Rights Reserved. Table of Contents CHAPTER 1: EMS Web App
More informationOneLogin Integration User Guide
OneLogin Integration User Guide Table of Contents OneLogin Account Setup... 2 Create Account with OneLogin... 2 Setup Application with OneLogin... 2 Setup Required in OneLogin: SSO and AD Connector...
More informationXton Access Manager GETTING STARTED GUIDE
Xton Access Manager GETTING STARTED GUIDE XTON TECHNOLOGIES, LLC PHILADELPHIA Copyright 2017. Xton Technologies LLC. Contents Introduction... 2 Technical Support... 2 What is Xton Access Manager?... 3
More informationRoxen Content Provider
Roxen Content Provider Generation 3 Templates Purpose This workbook is designed to provide a training and reference tool for placing University of Alaska information on the World Wide Web (WWW) using the
More informationMcAfee Firewall Enterprise epolicy Orchestrator Extension
Integration Guide Revision A McAfee Firewall Enterprise epolicy Orchestrator Extension COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo,
More informationAttix5 Pro Storage Platform Console
Attix5 Pro Storage Platform Console V7.0.1 User Manual for Microsoft Windows Your guide to managing the Attix5 Pro backup environment using the Storage Platform Console. 0 Copyright notice and proprietary
More information<Partner Name> <Partner Product> RSA ARCHER GRC Platform Implementation Guide. WhiteHat Security Sentinel
RSA ARCHER GRC Platform Implementation Guide WhiteHat Security Jeffrey Carlson, RSA Partner Engineering Last Modified: 12/13/2016 Solution Summary The integration of WhiteHat
More informationBomgar PA Integration with ServiceNow
Bomgar PA Integration with ServiceNow 2017 Bomgar Corporation. All rights reserved worldwide. BOMGAR and the BOMGAR logo are trademarks of Bomgar Corporation; other trademarks shown are the property of
More information<Partner Name> RSA NETWITNESS Security Operations Implementation Guide. Secdo Platform. <Partner Product>
RSA NETWITNESS Security Operations Implementation Guide Jeffrey Carlson, RSA Partner Engineering Last Modified: November 27 th, 2017 Solution Summary Secdo integrates with
More informationPrivileged Access Management Android Access Console 2.2.2
Privileged Access Management Android Access Console 2.2.2 2015 Bomgar Corporation. All rights reserved worldwide. BOMGAR and the BOMGAR logo are trademarks of Bomgar Corporation; other trademarks shown
More informationALES Wordpress Editor documentation ALES Research websites
ALES Wordpress Editor documentation ALES Research websites Contents Login... 2 Website Dashboard... 3 Editing menu order or structure... 4 Add a new page... 6 Move a page... 6 Select a page to edit...
More informationUSER MANUAL. SalesPort Salesforce Customer Portal for WordPress (Lightning Mode) TABLE OF CONTENTS. Version: 3.1.0
USER MANUAL TABLE OF CONTENTS Introduction...1 Benefits of Customer Portal...1 Prerequisites...1 Installation...2 Salesforce App Installation... 2 Salesforce Lightning... 2 WordPress Manual Plug-in installation...
More informationPartner Integration Portal (PIP) Installation Guide
Partner Integration Portal (PIP) Installation Guide Last Update: 12/3/13 Digital Gateway, Inc. All rights reserved Page 1 TABLE OF CONTENTS INSTALLING PARTNER INTEGRATION PORTAL (PIP)... 3 DOWNLOADING
More informationUser Documentation. Administrator Manual.
User Documentation Administrator Manual Proposal Software 1140 US Highway 287, Suite 400-102 Broomfield, CO 80020 USA Tel: 203.604.6597 www.proposalsoftware.com Table of Contents Open the WebPro Viewer...
More informationInstall Guide WINTER '15 REVISION C. C o p y r i g h t C l o u d A p p s L t d
Install Guide WINTER '15 REVISION C C o p y r i g h t 2 0 1 4 C l o u d A p p s L t d 1 Table of Contents Introduction... 3 Version History... 4 Requirements... 5 Salesforce Organisation Types... 5 Salesforce
More informationD&B Optimizer for Microsoft Installation Guide Setup for Optimizer for Microsoft Dynamics. VERSION: 2.3 PUBLICATION DATE: February, 2019
D&B Optimizer for Microsoft Installation Guide Setup for Optimizer for Microsoft Dynamics VERSION: 2.3 PUBLICATION DATE: February, 2019 Contents 1. INTRODUCTION... 3 WHAT IS IT?... 3 FEATURES... 3 GETTING
More informationManagement Reports Centre. User Guide. Emmanuel Amekuedi
Management Reports Centre User Guide Emmanuel Amekuedi Table of Contents Introduction... 3 Overview... 3 Key features... 4 Authentication methods... 4 System requirements... 5 Deployment options... 5 Getting
More informationINTEGRATION TO MICROSOFT EXCHANGE Installation Guide
INTEGRATION TO MICROSOFT EXCHANGE Installation Guide V44.1 Last Updated: March 5, 2018 EMS Software emssoftware.com/help 800.440.3994 2018 EMS Software, LLC. All Rights Reserved. Table of Contents CHAPTER
More informationTIBCO Spotfire Automation Services 7.5. User s Manual
TIBCO Spotfire Automation Services 7.5 User s Manual Revision date: 15 January 2016 Important Information SOME TIBCO SOFTWARE EMBEDS OR BUNDLES OTHER TIBCO SOFTWARE. USE OF SUCH EMBEDDED OR BUNDLED TIBCO
More informationF5 Azure Cloud Try User Guide. F5 Networks, Inc. Rev. September 2016
F5 Azure Cloud Try User Guide F5 Networks, Inc. Rev. September 2016 Azureinfo@f5.com Table of Contents Introduction... 3 F5 Web Application Firewall Solution, (WAF) Review... 3 Configuring SSO/Pre-authentication
More informationEMC ApplicationXtender Web Access.NET eroom Integration 6.0
EMC ApplicationXtender Web Access.NET eroom Integration 6.0 Administrator s Guide 300-008-282 REV A01 EMC Corporation Corporate Headquarters: Hopkinton, MA 01748-9103 1-508-435-1000 www.emc.com Copyright
More informationInCycle InRelease User Guide
InCycle InRelease User Guide ABOUT THIS GUIDE The User Guide for the InCycle InRelease is for administrators and users. The following related documents for InRelease are also available: User Guide, which
More informationPHPRad. PHPRad At a Glance. This tutorial will show you basic functionalities in PHPRad and
PHPRad PHPRad At a Glance. This tutorial will show you basic functionalities in PHPRad and Getting Started Creating New Project To create new Project. Just click on the button. Fill In Project properties
More informationAdministrative Training Mura CMS Version 5.6
Administrative Training Mura CMS Version 5.6 Published: March 9, 2012 Table of Contents Mura CMS Overview! 6 Dashboard!... 6 Site Manager!... 6 Drafts!... 6 Components!... 6 Categories!... 6 Content Collections:
More informationLiveNX Upgrade Guide from v5.2.0 to v5.2.1
LIVEACTION, INC. LiveNX Upgrade Guide from v5.2.0 to v5.2.1 UPGRADE LiveAction, Inc. 3500 Copyright WEST BAYSHORE 2016 LiveAction, ROAD Inc. All rights reserved. LiveAction, LiveNX, LiveUX, the LiveAction
More informationAgent Console. The Agent Console. The topics in this section provide information about the Agent Console.
Agent Console The topics in this section provide information about the Agent Console. The Agent Console The agent logs into the workstation The agent is automatically logged in to Intradiem; the Agent
More information<Partner Name> <Partner Product> RSA SECURID ACCESS Implementation Guide. Pulse Connect Secure 8.x
RSA SECURID ACCESS Implementation Guide Pulse Connect Secure 8.x Daniel R. Pintal, RSA Partner Engineering Last Modified: January 24 th, 2018 Solution Summary The Pulse
More informationPercussion Documentation Table of Contents
Percussion Documentation Table of Contents Intro to the Percussion Interface... 2 Logging In to Percussion... 2 The Dashboard... 2 Managing Dashboard Gadgets... 3 The Menu... 4 The Finder... 4 Editor view...
More informationDSS User Guide. End User Guide. - i -
DSS User Guide End User Guide - i - DSS User Guide Table of Contents End User Guide... 1 Table of Contents... 2 Part 1: Getting Started... 1 How to Log in to the Web Portal... 1 How to Manage Account Settings...
More informationUser Guide. BlackBerry Workspaces for Windows. Version 5.5
User Guide BlackBerry Workspaces for Windows Version 5.5 Published: 2017-03-30 SWD-20170330110027321 Contents Introducing BlackBerry Workspaces for Windows... 6 Getting Started... 7 Setting up and installing
More informationIpswitch MOVEit File Transfer (DMZ)
Secured by RSA Implementation Guide for RSA DLP Network Partner Information Last Modified: August 28 th, 2014 Product Information Partner Name Ipswitch Web Site http://www.ipswitch.com/ Product Name Version
More information<Partner Name> <Partner Product> RSA SECURID ACCESS Implementation Guide. PingIdentity PingFederate 8
RSA SECURID ACCESS Implementation Guide PingIdentity John Sammon & Gina Salvalzo, RSA Partner Engineering Last Modified: February 27 th, 2018 Solution Summary Ping Identity
More informationDocAve Content Shield v2.2 for SharePoint
DocAve Content Shield v2.2 for SharePoint User Guide For SharePoint 2007 Revision A Issued August 2012 1 Table of Contents Table of Contents... 2 About DocAve Content Shield for SharePoint... 4 Complementary
More informationCisco Threat Intelligence Director (TID)
The topics in this chapter describe how to configure and use TID in the Firepower System. Overview, page 1 Using TID Sources to Ingest Feed Data, page 6 Using Access Control to Publish TID Data and Generate
More informationNextiva Drive The Setup Process Mobility & Storage Option
Nextiva Drive The Setup Process The Setup Process Adding Users 1. Login to your account and click on the Account icon at the top of the page (this is only visible to the administrator). 2. Click Create
More informationAndroid User Guide. for version 5.3
Android User Guide for version 5.3 Contents 1. Installation... 3 1.1. How to install Babelnet... 3 1.2. Enter Babelnet in the search field.... 3 1.3. Safety precautions when using Babelnet on your Android...
More informationQuickStart Training Guide: The Accounting Review Role
Accounting Review Role Final Approval of Expense Reports If you are an Accountant who is using ExpensAble Corporate to make final approval of employees expense reports, this information is for you. This
More informationVMware AirWatch - Workspace ONE, Single Sign-on and VMware Identity Manager
VMware AirWatch - Workspace ONE, Single Sign-on and VMware Identity Table of Contents Lab Overview - HOL-1857-03-UEM - Workspace ONE UEM with App & Access Management... 2 Lab Guidance... 3 Module 1 - Workspace
More informationUser Guide. Version R94. English
AuthAnvil User Guide Version R94 English March 8, 2017 Copyright Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept EULATOS as updated
More informationLogi Ad Hoc Reporting System Administration Guide
Logi Ad Hoc Reporting System Administration Guide Version 10.3 Last Updated: August 2012 Page 2 Table of Contents INTRODUCTION... 4 Target Audience... 4 Application Architecture... 5 Document Overview...
More informationUsing Jive and SharePoint Together
Using Jive and SharePoint Together Contents 2 Contents Using Jive and SharePoint Together... 3 Viewing SharePoint Content in Jive...3 Using Recent Activity Widgets... 3 Using SharePoint Sites Widgets...
More informationRemote Support 19.1 Web Rep Console
Remote Support 19.1 Web Rep Console 2003-2019 BeyondTrust Corporation. All Rights Reserved. BEYONDTRUST, its logo, and JUMP are trademarks of BeyondTrust Corporation. Other trademarks are the property
More informationContents. Common Site Operations. Home actions. Using SharePoint
This is a companion document to About Share-Point. That document describes the features of a SharePoint website in as much detail as possible with an emphasis on the relationships between features. This
More informationLegal Notes. Regarding Trademarks KYOCERA MITA Corporation
Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held liable for any problems arising from
More information<Partner Name> <Partner Product> RSA NETWITNESS Logs Implementation Guide. PAS Global, LLC ICS 5.5
RSA NETWITNESS Logs Implementation Guide PAS Global, LLC Daniel R. Pintal, RSA Partner Engineering Last Modified: October 30, 2017 Solution Summary Through the integration
More informationConfiguring the SMA 500v Virtual Appliance
Using the SMA 500v Virtual Appliance Configuring the SMA 500v Virtual Appliance Registering Your Appliance Using the 30-day Trial Version Upgrading Your Appliance Configuring the SMA 500v Virtual Appliance
More informationManaging Your Website with Convert Community. My MU Health and My MU Health Nursing
Managing Your Website with Convert Community My MU Health and My MU Health Nursing Managing Your Website with Convert Community LOGGING IN... 4 LOG IN TO CONVERT COMMUNITY... 4 LOG OFF CORRECTLY... 4 GETTING
More informationUser Guide. Version R92. English
AuthAnvil User Guide Version R92 English October 9, 2015 Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept EULATOS as updated from
More informationUsing Jive and SharePoint Together
Using Jive and SharePoint Together Contents Using Jive and SharePoint Together... 3 Viewing SharePoint Content in Jive... 3 Using Recent Activity Widgets... 3 Using SharePoint Sites Widgets... 4 Using
More informationFileLoader for SharePoint
Administrator s Guide FileLoader for SharePoint v. 2.0 Last Updated 6 September 2012 Contents Preface 3 FileLoader Users... 3 Getting Started with FileLoader 4 Configuring Connections to SharePoint 8
More informationLearn how to login to Sitefinity and what possible errors you can get if you do not have proper permissions.
USER GUIDE This guide is intended for users of all levels of expertise. The guide describes in detail Sitefinity user interface - from logging to completing a project. Use it to learn how to create pages
More informationNetExtender for SSL-VPN
NetExtender for SSL-VPN Document Scope This document describes how to plan, design, implement, and manage the NetExtender feature in a SonicWALL SSL-VPN Environment. This document contains the following
More informationVMware Identity Manager vidm 2.7
RSA SECURID ACCESS Standard Agent Implementation Guide VMware Daniel R. Pintal, RSA Partner Engineering Last Modified: August 19, 2016 Solution Summary VMware Identity
More informationHow-to Guide: Tenable for McAfee epolicy Orchestrator. Last Updated: April 03, 2018
How-to Guide: Tenable for McAfee epolicy Orchestrator Last Updated: April 03, 2018 Table of Contents How-to Guide: Tenable for McAfee epolicy Orchestrator 1 Introduction 3 Integration Requirements 4 Tenable
More informationAdministrator Quick Guide
1 Administrator Quick Guide Login Screen The first page employees will see when visiting their training site is the login screen. This is where employees must enter their username and password to access
More informationLUCITY SECURITY. This manual covers managing users, groups, and permissions for Lucity. Version: 2017r2
LUCITY SECURITY This manual covers managing users, groups, and permissions for Lucity. Version: 2017r2 CONTENTS SECURITY... 1 Security Program... 2 Getting Started... 3 Setting up a Security Admin User...
More informationMonitoring and Evaluation Tool
Monitoring and Evaluation Tool USER MANUAL March, 2014 www.menarid.icarda.org THIS PAGE LEFT EMPTY INTENTIONALLY USER MANUAL Definitions and abbreviations Chart... Graphical representation of M&E project
More informationPulse Secure Policy Secure
Policy Secure RSA SecurID Ready Implementation Guide Last Modified: November 19, 2014 Partner Information Product Information Partner Name Pulse Secure Web Site http://www.pulsesecure.net/ Product Name
More information.NET SAML Consumer Value-Added (VAM) Deployment Guide
.NET SAML Consumer Value-Added (VAM) Deployment Guide Copyright Information SecureAuth is a copyright of SecureAuth Corporation. SecureAuth s IdP software, appliances, and other products and solutions,
More informationManaging the Cisco APIC-EM and Applications
Managing Cisco APIC-EM Using the GUI, page 1 Cisco APIC-EM Application Separation, page 1 Information about Backing Up and Restoring the Cisco APIC-EM, page 4 Updating the Cisco APIC-EM Software, page
More informationDocAve 6 SharePoint Migrator
DocAve 6 SharePoint Migrator User Guide Service Pack 4, Cumulative Update 2 Revision C Issued July 2014 Table of Contents About SharePoint Migration... 5 Complementary Products... 5 Submitting Documentation
More informationInternational SOS e-learning Training Hub User Guide
International SOS e-learning Training Hub User Guide WELCOME TO THE INTERNATIONAL SOS TRAINING HUB.... 2 STEP 1. ACCESSING THE INTERNATIONAL SOS TRAINING HUB... 2 STEP 2. LOGGING INTO INTERNATIONAL SOS
More informationAdministration Guide. Lavastorm Analytics Engine 6.1.1
Administration Guide Lavastorm Analytics Engine 6.1.1 Lavastorm Analytics Engine 6.1.1: Administration Guide Legal notice Copyright THE CONTENTS OF THIS DOCUMENT ARE THE COPYRIGHT OF LIMITED. ALL RIGHTS
More informationSOA Software Intermediary for Microsoft : Install Guide
SOA Software Intermediary for Microsoft : Install Guide SOA Software Intermediary for Microsoft Install Guide SOAIM_60 August 2013 Copyright Copyright 2013 SOA Software, Inc. All rights reserved. Trademarks
More informationUsing Sitecore 5.3.1
Using Sitecore 5.3.1 An End-User s Guide to Using and Administrating Sitecore Author: Sitecore Corporation Date: December 12, 2007 Release: Rev. 1.0 Language: English Sitecore is a registered trademark.
More informationGRS Enterprise Synchronization Tool
GRS Enterprise Synchronization Tool Last Revised: Thursday, April 05, 2018 Page i TABLE OF CONTENTS Anchor End User Guide... Error! Bookmark not defined. Last Revised: Monday, March 12, 2018... 1 Table
More informationSelectSurvey.NET Developers Manual
Developers Manual (Last updated: 5/6/2016) SelectSurvey.NET Developers Manual Table of Contents: SelectSurvey.NET Developers Manual... 1 Overview... 2 Before Starting - Is your software up to date?...
More informationUSING PERFORMANCE PRO An Appraiser s Quickstart Guide. Hrperformancesolutions.net 4/2017 v. 3.9
USING PERFORMANCE PRO An Appraiser s Quickstart Guide Hrperformancesolutions.net 4/2017 v. 3.9 Appraiser Quickstart Guide You have been asked to provide input on an appraisal as a primary appraiser. If
More informationSophos Mobile in Central
startup guide Product Version: 8.1 Contents About this guide... 1 What are the key steps?... 2 Activate Mobile Advanced licenses... 3 Configure settings... 4 Configure personal settings...4 Configure technical
More informationColligo Engage Outlook App 7.1. Offline Mode - User Guide
Colligo Engage Outlook App 7.1 Offline Mode - User Guide Contents Colligo Engage Outlook App 1 Benefits 1 Key Features 1 Platforms Supported 1 Installing and Activating Colligo Engage Outlook App 3 Checking
More informationNintex Reporting 2008 Help
Nintex Reporting 2008 Help Last updated: Thursday, 24 December 2009 1 Using Nintex Reporting 2008 1.1 Chart Viewer Web Part 1.2 Importing and Exporting Reports 1.3 Import Nintex report page 1.4 Item Level
More informationSet Up and Manage Salesforce Communities
Set Up and Manage Salesforce Communities Salesforce, Spring 16 @salesforcedocs Last updated: April 28, 2016 Copyright 2000 2016 salesforce.com, inc. All rights reserved. Salesforce is a registered trademark
More informationFirewall Enterprise epolicy Orchestrator
Integration Guide McAfee Firewall Enterprise epolicy Orchestrator Extension version 5.2.1 COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted,
More informationRedBeam Inventory Tracking User Manual
RedBeam Inventory Tracking User Manual Contact us at www.redbeam.com. Page 1 Table of Contents Table of Contents... 2 Overview... 4 RedBeam Inventory Tracking... 4 PC Prerequisites... 4 Mobile Computer
More informationKYOCERA Net Admin User Guide
KYOCERA Net Admin User Guide Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held liable
More informationRiskyProject Enterprise 7
RiskyProject Enterprise 7 Project Risk Management Software RiskyProject Enterprise User Guide Intaver Institute Inc. www.intaver.com email: info@intaver.com COPYRIGHT Copyright 2017 Intaver Institute.
More informationCreating/Updating Your Webpage
Creating/Updating Your Webpage Getting Started: 1. Go to the website provided previously. 2. Log in with your username & password. 3. Click on your school name, then click on Content Management. 4. Find
More informationAT&T Global Network Client for Mac User s Guide Version 2.0.0
Version 1.7.0 AT&T Global Network Client for Mac User s Guide Version 2.0.0 experience may vary. This document is not an offer, commitment, representation or warranty by AT&T and is subject to change..
More informationAdobe Document Cloud esign Services. for Salesforce Version 17 Installation and Customization Guide
Adobe Document Cloud esign Services for Salesforce Version 17 Installation and Customization Guide 2015 Adobe Systems Incorporated. All rights reserved. Last Updated: August 28, 2015 Table of Contents
More informationBarracuda Networks NG Firewall 7.0.0
RSA SECURID ACCESS Standard Agent Implementation Guide Barracuda Networks.0 fal, RSA Partner Engineering Last Modified: 10/13/16 Solution Summary The Barracuda NG Firewall
More informationEM L04 Using Workflow to Manage Your Patch Process and Follow CISSP Best Practices
EM L04 Using Workflow to Manage Your Patch Process and Follow CISSP Best Practices Hands-On Lab Description Most corporations today have some form of patch process in place. In this session, you will learn
More informationDeploying the Cisco Tetration Analytics Virtual Appliance in Microsoft Azure
Deploying the Cisco Tetration Analytics Virtual Appliance in Microsoft Azure About, on page 1 Prerequisites for, on page 1, on page 3 AboutDeployingtheCiscoTetrationAnalyticsVirtualAppliance in Microsoft
More informationNTP Software VFM Administration Web Site For Microsoft Azure
NTP Software VFM Administration Web Site For Microsoft Azure User Manual Revision 1.1. - July 2015 This guide details the method for using NTP Software VFM Administration Web Site, from an administrator
More informationLiveNX Upgrade Guide from v5.1.2 to v Windows
LIVEACTION, INC. LiveNX Upgrade Guide from v5.1.2 to v5.1.3 - Windows UPGRADE LiveAction, Inc. 3500 Copyright WEST BAYSHORE 2016 LiveAction, ROAD Inc. All rights reserved. LiveAction, LiveNX, LiveUX, the
More informationBill Analyser User Guide
Bill Analyser User Guide emobile.ie/business Contents 1.0 Basic Concepts... 3 1.1 Users and Roles... 3 Standard Users... 3 Global Users... 3 eircom User Roles... 3 Available user roles... 3 1.2 Data Structure...
More informationApplication Server The following programs must be preinstalled on the application server before installing BizView:
BizView INSTALLATION DESCRIPTION BizView INSTALLATION DESCRIPTION... 1 BizView installation... 1 Prerequisites... 1 Preparations to fulfill prerequisites... 2 Install IIS... 3 Install.Net Framework...
More informationFunction. Description
Function Check In Get / Checkout Description Checking in a file uploads the file from the user s hard drive into the vault and creates a new file version with any changes to the file that have been saved.
More informationSystem Center 2012 R2 Lab 4: IT Service Management
System Center 2012 R2 Lab 4: IT Service Management Hands-On Lab Step-by-Step Guide For the VMs use the following credentials: Username: Contoso\Administrator Password: Passw0rd! Version: 1.5.5 Last updated:
More informationNTP Software VFM. Administration Web Site for NetAppS3. User Manual. Version 5.1
NTP Software VFM Administration Web Site for NetAppS3 User Manual Version 5.1 This guide details the method for using NTP Software VFM Administration Web Site, from an administrator s perspective. Upon
More informationManaging Configurations
CHAPTER 3 The Configurations page is your starting point for managing device configurations for network elements managed by Cisco Prime Network by using the CM tools. The following table lists the main
More informationPepkor webcom Quick Reference Guide. Version Date: 2013/12 Version Number: 1.3
Pepkor webcom Quick Reference Guide Version Date: 2013/12 Version Number: 1.3 Table of Contents 1 INTRODUCTION... 4 2 LOGGING IN... 4 3 NAVIGATE INSIDE WEBCOM... 5 3.1 MAIN SECTION 5 3.1.1 Home... 5 3.1.2
More information