A Foxit Software Company White Paper

Size: px
Start display at page:

Download "A Foxit Software Company White Paper"

Transcription

1 A Foxit Software Company White Paper Foxit Software Company, LLC. June 2009

2 TABLE OF CONTENTS Abstract... 3 Introduction... 4 The Need for Data Security Policies... 4 PDF in the Enterprise... 5 Benefits for IT Professionals... 6 System Components... 7 Microsoft Windows AD RMS Components... 7 Foxit security Suite Components... 9 System Requirements AD RMS Concepts Typical Workflows AD RMS Workflow Protection Method Description of Protection Methods used by Foxit PDF Security Suite shown in diagram Additional AD RMS Technical Resources Conclusion About Foxit Software Company Protecting PDF Documents with Foxit PDF Security Suite 2

3 Abstract Foxit PDF Security Suite for Microsoft Active Directory Rights Management Services delivers cost effective PDF policy protection and PDF reader extensions to any business. 4Protect sensitive PDF documents to prevent loss of valuable company assets 4Manage AD RMS policy templates to insure regulatory compliance and corporate governance 4Automate forms and reduce paper handling This Foxit Software white paper provides a general overview of how the Foxit PDF Security Suite software components work together with *Microsoft Active Directory Rights Management Services to policy protect PDF documents inside and outside the firewall. Included is a glossary of relevant RMS concepts, a description of the Foxit Security Suite functions in the course of typical user scenarios, and a description of the AD RMS protection method used by the Foxit PDF Secure Protector and Foxit PDF Secure Reader clients. *When Microsoft first introduced its enterprise rights management technology, it was named Rights Management Services or RMS. In 2007 Microsoft included this technology along with other identity management and security technologies in it Active Directory product line. The name of their rights management technology was then changed to Active Directory Rights Management Services or AD RMS. For the purposes of this document, AD RMS is used as a general term to describe the Microsoft rights management technology used to protect PDF documents in the system described in this white paper. Protecting PDF Documents with Foxit PDF Security Suite 3

4 Introduction THE NEED FOR DATA SECURITY POLICIES The proliferation of the Internet and connected computer networks continues to make a un-precedented amount of electronic data openly available. This increased openness requires a heightened level of responsibility and accountability for any organization dealing in private or confidential information. Often, the difficult task of finding the right balance between openness and data security falls to the IT department chartered with implementing systems that support regulatory and governance policies. Some challenges in the design of these systems include persistent data protection, support for multiple file formats, and online/offline support. With Windows Server 2007, Microsoft introduced Microsoft Active Directory Rights Management Services (AD RMS). AD RMS helps safeguard digital information from unauthorized use both online and offline, inside and outside of the firewall. In conjunction with AD RMS enabled applications, AD RMS augments an organization's security strategy by protecting information through persistent usage policies. These policies remain with the information whether documents, spreadsheets, presentations, or messages no matter where it goes or how it is stored. In the six years since its introduction, Microsoft AD RMS has gained wide acceptance as an enterprise ready policy protection technology for Microsoft Office document file types. However, AD RMS protection of the PDF file format is not a current feature of Microsoft products. Protecting PDF Documents with Foxit PDF Security Suite 4

5 PDF IN THE ENTERPRISE It has been estimated that 20% of electronic enterprise documents are in PDF format. PDF (Portable Document Format) is the ISO standard for electronic document exchange first popularized by Adobe Systems, Inc. in Since then, an ecosystem of vendors have created tools for the creation of PDF files, and developers have embraced this file format as the basis of publishing, archiving, and electronic forms solutions world-wide. Foxit Software, LLC is the industry leader in OEM licensing of ISO PDF solutions. With over 70 million Foxit PDF Readers in use today, Foxit software has become a high quality, affordable and popular alternative to other PDF software tool suppliers. Building on the success of Foxit PDF ifilter for Microsoft products and services, Foxit has extended AD RMS to easily support all PDF files. Foxit Software's fully ISO compatible PDF technology and award winning software applications are a natural choice for use with Microsoft AD RMS enabled products. Currently Foxit Software is working together with Microsoft and its other AD RMS partners to roll out complete Information Rights Management (IRM) solutions to Windows Server and Sharepoint customers. For IT Professionals and Business leaders who need to improve information security, meet compliance requirements, and save time and money with improved business processes efficiencies through enhanced collaboration and forms usage, Foxit PDF Security Suite is a cost effective enterprise software toolkit that provides Microsoft Active Directory Rights Management Services policy protection of PDF documents and selective enablement of PDF features including forms fill out and document editing for improved efficiencies within and without the enterprise. Protecting PDF Documents with Foxit PDF Security Suite 5

6 BENEFITS FOR IT PROFESSIONALS Enhancing the value of existing IT infrastructure investments by extending AD RMS to PDF documents is a big benefit to IT professionals. Foxit PDF Security Suite makes it easy to: 4Protect sensitive PDF documents to prevent loss of valuable company assets 4Manage AD RMS policy templates associated with PDF documents to insure regulatory compliance and corporate governance 4Reduce paper handling by adding PDF document rights to enable costeffective digital workflows using existing PDF documents Foxit PDF Security Suite provides seamless integration with Microsoft Windows Server and Sharepoint (MOSS 2007) environments. Foxit's simple software toolkit is easily deployed across the enterprise. The Foxit PDF Secure Reader is a freely available download allowing for no hassle maintenance. Protecting PDF Documents with Foxit PDF Security Suite 6

7 System Components MICROSOFT WINDOWS AD RMS COMPONENTS AD RMS technology includes client and server software along with SDKs. 4AD RMS server software is a Web service for Windows Server that handles the XrML-based certification of trusted entities, licensing of rights-protected information, enrollment of servers and users, and administration functions. 4Windows Rights Management client software is a group of Windows APIs that facilitate the machine activation process and allow AD RMS-enabled applications to work with the AD RMS server to provide licenses for publishing and consuming rights-protected information. 4Software development kits (SDKs) for the server and client components include a set of tools, documentation, and sample code that enables software developers to customize their Windows AD RMS server environment and to create RMS-enabled applications. For an end-to-end AD RMS solution, the following is necessary: 4AD RMS for Windows Server AD Rights Management client software (XP only) 4AD RMS-enabled applications (such as Microsoft Office 2003 Editions) or an RMSenabled browser (such as Microsoft Internet Explorer with the Rights Management Add-on) to create and/or view rights-protected information Protecting PDF Documents with Foxit PDF Security Suite 7

8 Figure Deployment of Windows AD RMS 1. Server enrollment. An organization's root Rights Management Services (RMS) server sends its public key along with the RMS version and URL information to the Server Enrollment Service to request an RMS Licensor Certificate. 2. Client setup. Windows APIs that work with RMS-enabled applications are either installed by administrator as part of RMS rollout (via SMS or similar tool) or by downloading from Windows Update. 3. Machine activation. As part of the client software instalation, each client machine connects to the organization's RMS server for machine activation. The RMS server acts as a proxy for the client machine and acquires a unique lockbox and machine certificate from either the hosted Machine Activation Service or via a future hardware appliance that would live inside the organization's network perimeter. Protecting PDF Documents with Foxit PDF Security Suite 8

9 For added protection and interoperability, RMS uses the Extensible Rights Markup Language (XrML), an emerging rights expression language (REL) standard based on XML. XrML offers a common, simple-to-use means for applying rights and usage policies to digital information. It is a flexible, extensible, and interoperable standa-rd equipped to meet any organization's needs, regardless of industry, platform, format, media type, business model, or delivery architecture. FOXIT SECURITY SUITE COMPONENTS Foxit PDF Secure RMS Protector for Windows Foxit desktop application software program installed on machines with Microsoft Active Directory Rights Management Services (AD RMS) clients. Once installed this application extends all Microsoft AD RMS features to any.pdf file. Foxit PDF Secure RMS Protector provides an easy to use graphical user interface and command line interface that allows all users controls to protect documents, manage AD RMS policy templates, and optionally add unique PDF document rights. 4Protect files in a single or multiple directories. 4View permissions in individual templates. 4Distribute specific rights to individual users or groups. 4Set validity date for a users' certificate. 4Add unique PDF document rights to any PDF document. Foxit PDF Secure RMS Protector for Sharepoint Foxit server application software program installed on any Sharepoint server communicating with a Microsoft Active Directory Rights Management Services (AD RMS) server. Once installed this application extends all Microsoft AD RMS features to any.pdf file posted to the Sharepoint Server. Foxit PDF Secure RMS Protector (Sharepoint extensions) seamlessly integrates into a Sharepoint workflow to automatically and transparently extend AD RMS policy protection to any PDF document. Protecting PDF Documents with Foxit PDF Security Suite 9

10 Foxit PDF Secure RMS Reader/Pro (Windows only).foxit client application software program installed on enterprise Windows desktop. Once installed, an end-user wishing to view an AD RMS protected PDF may open a protected file, view permissions, and manage user credentials. 4Open and view a protected PDF file 4View file permissions 4Manage user credentials via the select users dialog box. Foxit also offers its professional version of PDF Secure RMS Reader to allow form filling, commenting, sticky notes and other annotation features if allowed by RMS policy. SYSTEM REQUIREMENTS Foxit PDF Security Suite software is designed to for use with the following Microsoft software: Foxit PDF Secure RMS Protector for Windows 4Windows XP (all versions), Windows Server 2003, Windows Vista (all versions), Windows 7 (all versions); 4Windows XP and Windows Server 2003 only: Microsoft RMS Client 1.0 SP1; 4256MB memory, 10MB free disk space Foxit PDF Secure RMS Protector for Sharepoint 4Microsoft Office SharePoint Server (MOSS) Windows Server 2003 (32-bit and 64-bit) and Windows Server 2008 (32-bit and 64-bit): Microsoft RMS Client 1.0 SP1; 41GB memory, 10MB free disk space Foxit PDF Secure RMS Reader for Windows 4Windows XP (all versions), Windows Vista (all versions), Windows 7 (all versions); 4Windows XP and Windows Server 2003 only: Microsoft RMS Client 1.0 SP1; 4256MB memory, 20MB free disk space Protecting PDF Documents with Foxit PDF Security Suite 10

11 AD RMS Concepts The following topics contain overviews of the major concepts that you should understand before using the Active Directory Rights Management Services (AD RMS) SDK. (Source: Microsoft Developers Network (MSDN). More detailed information about each concept can be found at ) Topic Licenses Description An Active Directory Rights Management Services (AD RMS) licensing server can issue end-user licenses or issuance licenses. Enduser licenses specify the right(s) granted to a specific user to consume protected content. Issuance licenses specify the users who can consume protected content and the rights that can be made available to them. AD RMS licenses are structurally similar to AD RMS certificates. Both are XrML documents and both consist of a certificate chain that ends with a Microsoft root of trust. The purpose of the two documents, however, differs. Licenses typically specify rights and conditions that govern content use. Certificates identify entities such as computers or users by singing them into an AD RMS certificate hierarchy. end-user license (EUL) The license that enables end users to consume protected content. Also known as a use license Issuance (or publishing) license (PL)The license that contains the usage policies for a protected file. Usage policies include a set of usage rights and conditions along with the list of authorized users who can request a use license. Also known as a publishing license. Certificates An Active Directory Rights Management Services certification service can issue the following certificates: Protecting PDF Documents with Foxit PDF Security Suite 11

12 Certificate Description Machine certificate Issued by an AD RMS certification service to identify a computer in the AD RMS certificate hierarchy. Rights account certificate (RAC) Issued by an AD RMS certification service to identify an Active Directory user account in the AD RMS certificate hierarchy. Client licensor certificate (CLC) Issued the AD RMS licensing service to enable offline signing of an issuance license. Certificates Server licensor certificate Identifies an AD RMS server in the AD RMS certificate hierarchy. Beginning with Windows Server 2008, the certificate is created automatically when you install the AD RMS role. Application manifest Identifies an AD RMS application by signing it with the Pre-production or Production certificate provided by Microsoft. Pre-Production certificate Provided by Microsoft to sign a custom application into the Pre-production AD RMS certificate hierarchy. This certificate is used during application development. Production certificate Provided by Microsoft to sign a custom application into the Production AD RMS certificate hierarchy. This certificate is used during application development. Protecting PDF Documents with Foxit PDF Security Suite 12

13 Topic Certificate Hierarchy Templates Extended Policy Template Information Application Manifests Lockboxes Encryption Computer Activation User Activation Server Enrollment Service Discovery Rights Exclusion Revocation Server Transport Protocol Description Introduces the AD RMS Pre-production and Production certificate hierarchy. Introduces pre-defined templates that can be used to apply usage policies when creating a license. Discusses the rights policy of a template that controls how content licenses are to be implemented. Introduces application manifests, a type of certificate that signs your application into the appropriate AD RMS certificate hierarchy. Introduces the components that can be used to create secure environments on AD RMS clients and servers. Discusses encrypting and decrypting content. Introduces computer activation, a process that identifies the computer by signing it into the appropriate AD RMS hierarchy. Introduces user activation, a process that identifies an Active Directory user account in the appropriate AD RMS hierarchy and associates it with a specific computer. Discusses how an AD RMS server is enrolled into the certificate hierarchy. Discusses how an application finds an AD RMS certification, licensing, or publishing Web service. Introduces the common rights used in AD RMS licenses. Discusses how users can be prohibited from acquiring new licenses or certificates. Discusses how AD RMS licenses and certificates can be invalidated after issuance. Discusses the protocols that can be used to communicate with an AD server. Protecting PDF Documents with Foxit PDF Security Suite 13

14 AD RMS WORKFLOW Typical Workflows Author Steps: 1. Author receives a client licensor certificate the first time he or she rightsprotects information. 2. Author defines a set of usage rights and rules for the file. The application creates a "publishing license" and encrypts the file. 3. Author distributes the file. Recipient Steps: 1. Recipient clicks file to open. The application calls to the AD RMS Client, which contacts the RMS server, which validates the user and issues a "use license." 2. Application renders file and enforces rights. Protecting PDF Documents with Foxit PDF Security Suite 14

15 Protection Method Protecting PDF Documents with Foxit PDF Security Suite 15

16 Description of Protection Methods used by Foxit PDF Security Suite shown in diagram 1. The first time an Author uses the protector Client A, this client uses AD RMS, a Rights Account Certificate (RAC) and Client Licensor Certificate (CLC) are received. This happens when an enabled user publishes rights-protected PDF files (Both online and offline). 2. The Foxit PDF Secure Protector creates PDF files and assigns user rights. An enduser license (EUL) is generated at the same time. 3. Foxit PDF Secure Protector generates a content key, and encrypts PDF files with it. (A) Online Publishing The public key of AD RMS server encrypts the content key and sends it to AD RMS server. The server creates and signs a Publishing License (PL) (B) Offline Publishing The public key of CLC encrypts the content key and uses the AD RMS server's public key to encrypt copy of content key. Creates PL and signs with CLC private key. Attaches PL to encrypted PDF file. 4. Author send AD RMS protected PDF file to intended recipient. 5. Recipient receives file and opens it by using Foxit PDF Secure RMS Reader. If the recipient does not have a certificate on the current computer, the AD RMS server will issue one. The recipient will receive an from AD RMS Server, (PDF file notifies Foxit PDF Secure RMS Reader of the AD RMS server URL). Protecting PDF Documents with Foxit PDF Security Suite 16

17 6. Foxit PDF Secure RMS Reader sends request to AD RMS server for use license. If the PDF file is published online the request will be sent to AD RMS server that issued the publishing license; if the PDF file is published offline the request will be set to the server that issued the CLC. RAC and PL are included in the request. The request will be sent to the publisher what issued the CLC RAC and the PL is included in the request. 7. The AD RMS server checks the recipient's authorization status and name, then creates a use license (EUL) for the user. The AD RMS Server decrypts the content key by using its private key and re-encrypts the content key by using the public key of the recipient. Then the AD RMS server adds an encrypted content key to the use license. Since the content key is encrypted by recipient's public key, only the intended recipient is able to open the PDF file. 8. (A) Online Publishing: The AD RMS server then sends the use license information to the recipient's computer. (B) Offline Publishing: The publisher sends the use license information to the recipient's computer. 9. The Foxit PDF Secure RMS Reader then examines the recipient's account certificate information and use license to determine whether any certificate in trust chain needs a revocation list. After the Reader confirms all components are valid, it will grant recipient access to the PDF file. And all proper policies will be applied to the PDF file. Protecting PDF Documents with Foxit PDF Security Suite 17

18 Additional AD RMS Technical Resources Much of the information describing the specifics of Microsoft AD RMS was taken directly from Microsoft publications and the wealth of technical information found on Readers of this white paper may find the following Microsoft resources for AD RMS useful: Microsoft Office Sharepoint Services and AD RMS: Windows Server 8 AD RMS information: Windows Server 2003 RMS information: #EKFAC AD RMS software design: Microsoft is a trademark of Microsoft Corporation in the United States and other countries. Active Directory Sharepoint, Windows Server, and Windows Vista are registered trademarks of Microsoft Corporation in the United States and other countries. Information taken from the Microsoft website(s) is copyrighted by Microsoft Corporation used here by permission. MICROSOFT AND/OR ITS RESPECTIVE SUPPLIERS MAKE NO REPRESENTATIONS ABOUT THE SUITABILITY OF THE INFORMATION CONTAINED IN THE DOCUMENTS AND RELATED GRAPHICS PUBLISHED AS PART OF THE SERVICES FOR ANY PURPOSE. ALL SUCH DOCUMENTS AND RELATED GRAPHICS ARE PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND. MICROSOFT AND/OR ITS RESPECTIVE SUPPLIERS HEREBY DISCLAIM ALL WARRANTIES AND CONDITIONS WITH REGARD TO THIS INFORMATION, INCLUDING ALL WARRANTIES AND CONDITIONS OF MERCHANTABILITY, WHETHER EXPRESS, IMPLIED OR STATUTORY, FITNESS FOR A PARTICULAR PURPOSE, TITLE AND NON-INFRINGEMENT. IN NO EVENT SHALL MICROSOFT AND/OR ITS RESPECTIVE SUPPLIERS BE LIABLE FOR ANY SPECIAL, INDIRECT OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF INFORMATION AVAILABLE FROM THE SERVICES. THE DOCUMENTS AND RELATED GRAPHICS PUBLISHED ON THE SERVICES COULD INCLUDE TECHNICAL INACCURACIES OR TYPOGRAPHICAL ERRORS. CHANGES ARE PERIODICALLY ADDED TO THE INFORMATION HEREIN. MICROSOFT AND/OR ITS RESPECTIVE SUPPLIERS MAY MAKE IMPROVEMENTS AND/OR CHANGES IN THE PRODUCT(S) AND/OR THE PROGRAM(S) DESCRIBED HEREIN AT ANY TIME. Protecting PDF Documents with Foxit PDF Security Suite 18

19 Conclusion Enhancing the value of existing IT infrastructure investments by extending Microsoft Active Directory Rights Management services to PDF documents is a big benefit to IT professionals. By making use of AD RMS policy protection technology as part of a Windows Server or Sharepoint infrastructure, any organization can now protect sensitive PDF documents to prevent loss of valuable company assets, manage AD RMS policy templates associated with PDF documents to insure regulatory compliance and corporate governance and reduce paper handling by adding PDF document rights to enable cost-effective digital workflows using existing PDF documents. Foxit PDF Security Suite provides seamless integration with Microsoft Windows Server and Sharepoint (MOSS 2007) environments. This simple software toolkit is easily installed and deployed across the enterprise. The Foxit PDF Secure Reader is a freely available download allowing for no hassle maintenance Protecting PDF Documents with Foxit PDF Security Suite 19

20 ABOUT FOXIT Foxit Software Company is the industry leader in OEM licensing of ISO PDF solutions. Foxit's award winning software products include software applications for reading, creating, organizing and securing PDF documents. Customers who license Foxit technology for use in their products include Microsoft, Intel, Hewlett Packard and Amdocs. Foxit Software Company employs nearly 150 at offices in California, China, Japan, and France. With over 70 million Foxit PDF Readers in use today, Foxit software has become a high quality, affordable and popular alternative to other PDF software tool suppliers. CONTACT Learn more about the enterprise-wide power of Foxit products by visiting or contacting one of our sales representatives in your area. Foxit Software Company Paseo Padre Parkway, Fremont, CA 94538, USA TEL: MYFOXIT or , , FAX: sales@foxitsoftware.com support@foxitsoftware.com Website: Protecting PDF Documents with Foxit PDF Security Suite 20

BlackBerry Integration With IBM WebSphere Everyplace Access 4.3

BlackBerry Integration With IBM WebSphere Everyplace Access 4.3 BlackBerry Integration With IBM WebSphere Everyplace Access 4.3 Integration Note Research In Motion 2003 Research In Motion Limited. All Rights Reserved. Contents Integration overview... 3 Related resources...

More information

Working with AD RMS Clients

Working with AD RMS Clients Chapter 18: Active Directory Rights Management Services 721 Figure 18-6 Modifying the SCP registration. Working with AD RMS Clients After the AD RMS cluster is deployed and the SCP configured, your next

More information

PRODUCT DESCRIPTIONS AND METRICS

PRODUCT DESCRIPTIONS AND METRICS PRODUCT DESCRIPTIONS AND METRICS Adobe PDM - LiveCycle ES 4.0 OnPremise (2013v3) The Products described in this PDM are OnPremise Software and are governed by the terms of the General Terms, the Exhibit

More information

Secure Messaging Buyer s Guide

Secure Messaging Buyer s Guide Entrust, Inc. North America Sales: 1-888-690-2424 entrust@entrust.com EMEA Sales: +44 (0) 118 953 3000 emea.sales@entrust.com December 2008 Copyright 2008 Entrust. All rights reserved. Entrust is a registered

More information

IBM SPSS Text Analytics for Surveys

IBM SPSS Text Analytics for Surveys Software Product Compatibility Reports Product IBM SPSS Text Analytics for Surveys 4.0.1.0 Contents Included in this report Operating systems Hypervisors (No hypervisors specified for this product) Prerequisites

More information

Symantec Managed PKI. Integration Guide for AirWatch MDM Solution

Symantec Managed PKI. Integration Guide for AirWatch MDM Solution Symantec Managed PKI Integration Guide for AirWatch MDM Solution ii Symantec Managed PKI Integration Guide for AirWatch MDM Solution The software described in this book is furnished under a license agreement

More information

SafeNet Authentication Client

SafeNet Authentication Client SafeNet Authentication Client Integration Guide All information herein is either public information or is the property of and owned solely by Gemalto and/or its subsidiaries who shall have and keep the

More information

Table of Contents. 1 - Specification sheet Product overview Technical specifications Database sizing and growth...

Table of Contents. 1 - Specification sheet Product overview Technical specifications Database sizing and growth... Table of Contents Legal Statement ii 1 - Specification sheet 1-1 1.1 Product overview.... 1-1 1.2 Technical specifications... 1-1 1.3 Database sizing and growth... 1-3 Info HQ Manager v2.1 Specification

More information

Quick Start Guide. BlackBerry Workspaces app for Android. Version 5.0

Quick Start Guide. BlackBerry Workspaces app for Android. Version 5.0 Quick Start Guide BlackBerry Workspaces app for Android Version 5.0 Published: 2017-01-22 SWD-20170122060917401 Contents Overview... 4 Browse workspaces, folders, and files... 5 Create new workspaces,

More information

SonicWALL CDP 2.1 Agent Tool User's Guide

SonicWALL CDP 2.1 Agent Tool User's Guide COMPREHENSIVE INTERNET SECURITY b SonicWALL CDP Series Appliances SonicWALL CDP 2.1 Agent Tool User's Guide SonicWALL CDP Agent Tool User s Guide Version 2.0 SonicWALL, Inc. 1143 Borregas Avenue Sunnyvale,

More information

Foxit Reader Quick Guide

Foxit Reader Quick Guide I Contents Foxit Reader Contents... II Chapter 1 Get Started... 1 Foxit Reader Overview... 1 System Requirements... 1 Install Foxit Reader... 2 Uninstall Foxit Reader... 2 Update Foxit Reader... 2 Workspace...

More information

SafeNet Authentication Service

SafeNet Authentication Service SafeNet Authentication Service Integration Guide Using SafeNet Authentication Service as an Identity Provider for Tableau Server All information herein is either public information or is the property of

More information

SafeNet Authentication Service

SafeNet Authentication Service SafeNet Authentication Service Integration Guide Using SafeNet Authentication Service as an Identity Provider for SonicWALL Secure Remote Access All information herein is either public information or is

More information

Symantec ediscovery Platform

Symantec ediscovery Platform Symantec ediscovery Platform Native Viewer (ActiveX) Installation Guide 7.1.5 Symantec ediscovery Platform : Native Viewer (ActiveX) Installation Guide The software described in this book is furnished

More information

Application Security for Java-based BlackBerry Handhelds

Application Security for Java-based BlackBerry Handhelds Application Security for Java-based Originally posted: February 2003 Latest revision: May 2003 Introduction Corporate data access capabilities supported by the BlackBerry platform enable wireless connectivity

More information

Foxit PDF Secure RMS Protector. (SharePoint Extensions)

Foxit PDF Secure RMS Protector. (SharePoint Extensions) Foxit PDF Secure RMS Protector (SharePoint Extensions) User Manual 2011 Foxit Corporation All rights reserved. Copyright 2011 Foxit Corporation. All Rights Reserved. No part of this document can be reproduced,

More information

hidglobal.com HID ActivOne USER FRIENDLY STRONG AUTHENTICATION

hidglobal.com HID ActivOne USER FRIENDLY STRONG AUTHENTICATION HID ActivOne USER FRIENDLY STRONG AUTHENTICATION We understand IT security is one of the TOUGHEST business challenges today. HID Global is your trusted partner in the fight against data breach due to misused

More information

Quest Collaboration Services 3.6. Installation Guide

Quest Collaboration Services 3.6. Installation Guide Quest Collaboration Services 3.6 Installation Guide 2010 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide

More information

HP Database and Middleware Automation

HP Database and Middleware Automation HP Database and Middleware Automation For Windows Software Version: 10.10 SQL Server Database Refresh User Guide Document Release Date: June 2013 Software Release Date: June 2013 Legal Notices Warranty

More information

Migrating BlackBerry-enabled mailboxes from Microsoft Exchange 5.5 to Microsoft Exchange 2000

Migrating BlackBerry-enabled mailboxes from Microsoft Exchange 5.5 to Microsoft Exchange 2000 Migrating BlackBerry-enabled mailboxes from Originally posted: August 2002 Affected software versions BlackBerry Enterprise for Exchange Summary This document provides an overview of how to migrate a BlackBerry-enabled

More information

No Trade Secrets. Microsoft does not claim any trade secret rights in this documentation.

No Trade Secrets. Microsoft does not claim any trade secret rights in this documentation. [MS-RMSO]: Intellectual Property Rights Notice for Open Specifications Documentation Technical Documentation. Microsoft publishes Open Specifications documentation for protocols, file formats, languages,

More information

Overview. NETRON TECHNICAL NOTE February 2008 Summary

Overview. NETRON TECHNICAL NOTE February 2008 Summary NETRON TECHNICAL NOTE February 2008 Summary The Netron Fusion 3.4 toolset is compatible with Windows Vista (a.k.a. Windows version 6). However, due to changes in the security model, the Installation procedure

More information

SafeNet Authentication Manager

SafeNet Authentication Manager SafeNet Authentication Manager Integration Guide All information herein is either public information or is the property of and owned solely by Gemalto NV. and/or its subsidiaries who shall have and keep

More information

BlackBerry Demonstration Portlets for IBM WebSphere Everyplace Access 4.3

BlackBerry Demonstration Portlets for IBM WebSphere Everyplace Access 4.3 BlackBerry Demonstration Portlets for IBM WebSphere Everyplace Access 4.3 Research In Motion 2003 Research In Motion Limited. All Rights Reserved. Contents Overview... 3 Installing the demo... 3 Configure

More information

Sentinel EMS 4.1. Release Notes

Sentinel EMS 4.1. Release Notes Sentinel EMS 4.1 Release Notes Document Revision History Document Number: 007-013357-001 (Revision B), August 2016 Disclaimer and Copyrights All information herein is either public information or is the

More information

Adobe Connect. Adobe Connect. Deployment Guide

Adobe Connect. Adobe Connect. Deployment Guide Deployment Guide VERSION: 1.0 UPDATED: MARCH 2016 Copyright Notices Copyright 2002-2016 KEMP Technologies, Inc.. All rights reserved.. KEMP Technologies and the KEMP Technologies logo are registered trademarks

More information

Quick Connection Guide

Quick Connection Guide Amazon Web Services Connector Version 1.0 Quick Connection Guide 2004-2013 Ping Identity Corporation. All rights reserved. PingFederate Amazon Web Services Connector Quick Connection Guide Version 1.0

More information

Axway Validation Authority Suite

Axway Validation Authority Suite Axway Validation Authority Suite PKI safeguards for secure applications Around the world, banks, healthcare organizations, governments, and defense agencies rely on public key infrastructures (PKIs) to

More information

SafeNet Authentication Client

SafeNet Authentication Client SafeNet Authentication Client Integration Guide All information herein is either public information or is the property of and owned solely by Gemalto and/or its subsidiaries who shall have and keep the

More information

Foxit PhantomPDF GPO User Guide

Foxit PhantomPDF GPO User Guide 1 Copyright 2012 Foxit Corporation. All Rights Reserved. No part of this document can be reproduced, transferred, distributed or stored in any format without the prior written permission of Foxit. Anti-Grain

More information

Applies To: Windows Server 2008 R2, Windows Server 2008 R2 with SP1

Applies To: Windows Server 2008 R2, Windows Server 2008 R2 with SP1 Administration cmdlets Applies To: Windows Server 2008 R2, Windows Server 2008 R2 with SP1 The Active Directory Rights Management Services () Windows PowerShell administration module gives you the ability

More information

1.0. Quest Enterprise Reporter Discovery Manager USER GUIDE

1.0. Quest Enterprise Reporter Discovery Manager USER GUIDE 1.0 Quest Enterprise Reporter Discovery Manager USER GUIDE 2012 Quest Software. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide

More information

Splunk. Splunk. Deployment Guide

Splunk. Splunk. Deployment Guide Deployment Guide VERSION: 1.0 UPDATED: JULY 2016 Copyright Notices Copyright 2002-2016 KEMP Technologies, Inc.. All rights reserved.. KEMP Technologies and the KEMP Technologies logo are registered trademarks

More information

Ramnish Singh IT Advisor Microsoft Corporation Session Code:

Ramnish Singh IT Advisor Microsoft Corporation Session Code: Ramnish Singh IT Advisor Microsoft Corporation Session Code: Agenda Microsoft s Identity and Access Strategy Geneva Claims Based Access User access challenges Identity Metasystem and claims solution Introducing

More information

LoadMaster VMware Horizon (with View) 6. Deployment Guide

LoadMaster VMware Horizon (with View) 6. Deployment Guide LoadMaster VMware Horizon (with View) 6 Deployment Guide VERSION: 6.0 UPDATED: MARCH 2016 Copyright Notices Copyright 2002-2016 KEMP Technologies, Inc.. All rights reserved.. KEMP Technologies and the

More information

SolarWinds. Patch Manager. Evaluation Guide. Version 2.1.2

SolarWinds. Patch Manager. Evaluation Guide. Version 2.1.2 This PDF is no longer being maintained. Search the SolarWinds Success Center for more information. SolarWinds Patch Manager Version 2.1.2 Evaluation Guide Last Updated: Friday, June 3, 2016 1 About SolarWinds

More information

SafeNet Authentication Client

SafeNet Authentication Client SafeNet Authentication Client Integration Guide All information herein is either public information or is the property of and owned solely by Gemalto NV. and/or its subsidiaries who shall have and keep

More information

PDF SHARE FORMS. Online, Offline, OnDemand. PDF forms and SharePoint are better together. PDF Share Forms Enterprise 3.0.

PDF SHARE FORMS. Online, Offline, OnDemand. PDF forms and SharePoint are better together. PDF Share Forms Enterprise 3.0. PDF SHARE FORMS Online, Offline, OnDemand PDF forms and SharePoint are better together PDF Share Forms Enterprise 3.0 Install Guide SharePoint 2013 Contents Disclaimer...3 Copyright...3 About this guide...3

More information

Getting Started. Citrix Secure Gateway. Version 1.0. Citrix Systems, Inc.

Getting Started. Citrix Secure Gateway. Version 1.0. Citrix Systems, Inc. Getting Started Citrix Secure Gateway Version 1.0 Citrix Systems, Inc. Copyright and Trademark Notice Information in this document is subject to change without notice. Companies, names, and data used in

More information

Terms of Use. Changes. General Use.

Terms of Use. Changes. General Use. Terms of Use THESE TERMS AND CONDITIONS (THE TERMS ) ARE A LEGAL CONTRACT BETWEEN YOU AND SPIN TRANSFER TECHNOLOGIES ( SPIN TRANSFER TECHNOLOGIES, STT, WE OR US ). THE TERMS EXPLAIN HOW YOU ARE PERMITTED

More information

Moodle. Moodle. Deployment Guide

Moodle. Moodle. Deployment Guide Moodle Deployment Guide VERSION: 6.0 UPDATED: MARCH 2016 Copyright Notices Copyright 2002-2016 KEMP Technologies, Inc.. All rights reserved.. KEMP Technologies and the KEMP Technologies logo are registered

More information

Single Sign-On. Introduction

Single Sign-On. Introduction Introduction DeliverySlip seamlessly integrates into your enterprise SSO to give your users total email security and an extra set of robust communications tools. Single sign-on (SSO) systems create a single

More information

Interdomain Federation for IM and Presence Service on Cisco Unified Communications Manager, Release 10.5(1)

Interdomain Federation for IM and Presence Service on Cisco Unified Communications Manager, Release 10.5(1) Interdomain Federation for IM and Presence Service on Cisco Unified Communications Manager, Release 10.5(1) First Published: 2014-01-29 Last Modified: 2017-12-01 Americas Headquarters Cisco Systems, Inc.

More information

SafeNet Authentication Service

SafeNet Authentication Service SafeNet Authentication Service Integration Guide All information herein is either public information or is the property of and owned solely by Gemalto NV. and/or its subsidiaries who shall have and keep

More information

Setting up Quest QoreStor as an RDA Backup Target for NetVault Backup. Technical White Paper

Setting up Quest QoreStor as an RDA Backup Target for NetVault Backup. Technical White Paper Setting up Quest QoreStor as an RDA Backup Target for NetVault Backup Technical White Paper Quest Engineering June 2018 2018 Quest Software Inc. ALL RIGHTS RESERVED. THIS WHITE PAPER IS FOR INFORMATIONAL

More information

Enterprise Vault Setting up Exchange Server and Office 365 for SMTP Archiving and later

Enterprise Vault Setting up Exchange Server and Office 365 for SMTP Archiving and later Enterprise Vault Setting up Exchange Server and Office 365 for SMTP Archiving 12.1 and later Enterprise Vault : Setting up Exchange Server and Office 365 for SMTP Archiving Last updated: 2018-12-03. Legal

More information

Symantec Workflow 7.1 MP1 Release Notes

Symantec Workflow 7.1 MP1 Release Notes Symantec Workflow 7.1 MP1 Release Notes Symantec Workflow 7.1 MP1 Release Notes The software described in this book is furnished under a license agreement and may be used only in accordance with the terms

More information

Copyright PFU LIMITED

Copyright PFU LIMITED -------------------------------------------------------- PaperStream Capture 1.0.12 README File -------------------------------------------------------- Copyright PFU LIMITED 2013-2015 This file contains

More information

Fujitsu ScandAll PRO V2.1.5 README

Fujitsu ScandAll PRO V2.1.5 README -------------------------------------------------------- Fujitsu ScandAll PRO V2.1.5 README -------------------------------------------------------- Copyright PFU Limited 2007-2017 This file contains information

More information

SafeNet Authentication Service

SafeNet Authentication Service SafeNet Authentication Service Integration Guide All information herein is either public information or is the property of and owned solely by Gemalto NV. and/or its subsidiaries who shall have and keep

More information

Apple Inc. Certification Authority Certification Practice Statement

Apple Inc. Certification Authority Certification Practice Statement Apple Inc. Certification Authority Certification Practice Statement Apple Application Integration Sub-CA Apple Application Integration 2 Sub-CA Apple Application Integration - G3 Sub-CA Version 6.2 Effective

More information

Quick Connection Guide

Quick Connection Guide WebEx Connector Version 1.0.1 Quick Connection Guide 2014 Ping Identity Corporation. All rights reserved. PingFederate WebEx Connector Quick Connection Guide Version 1.0.1 March, 2014 Ping Identity Corporation

More information

Security Enhancements

Security Enhancements OVERVIEW Security Enhancements February 9, 2009 Abstract This paper provides an introduction to the security enhancements in Microsoft Windows 7. Built upon the security foundations of Windows Vista, Windows

More information

CERTIFICATE POLICY CIGNA PKI Certificates

CERTIFICATE POLICY CIGNA PKI Certificates CERTIFICATE POLICY CIGNA PKI Certificates Version: 1.1 Effective Date: August 7, 2001 a Copyright 2001 CIGNA 1. Introduction...3 1.1 Important Note for Relying Parties... 3 1.2 Policy Identification...

More information

Installing the Shrew Soft VPN Client

Installing the Shrew Soft VPN Client Windows Install Installing the Shrew Soft VPN Client ShrewVPNWindows201211-01 Global Technology Associates 3505 Lake Lynda Drive Suite 109 Orlando, FL 32817 Tel: +1.407.380.0220 Fax. +1.407.380.6080 Email:

More information

One Identity Active Roles 7.2

One Identity Active Roles 7.2 One Identity December 2017 This document provides information about the Active Roles Add_on Manager7.2. About Active Roles Add_on Manager New features Known issues System requirements Getting started with

More information

Patch Manager INSTALLATION GUIDE. Version Last Updated: September 25, 2017

Patch Manager INSTALLATION GUIDE. Version Last Updated: September 25, 2017 INSTALLATION GUIDE Patch Manager Version 2.1.5 Last Updated: September 25, 2017 Retrieve the latest version from: https://support.solarwinds.com/success_center/patch_manager/patch_manager_documentation

More information

VSP16. Venafi Security Professional 16 Course 04 April 2016

VSP16. Venafi Security Professional 16 Course 04 April 2016 VSP16 Venafi Security Professional 16 Course 04 April 2016 VSP16 Prerequisites Course intended for: IT Professionals who interact with Digital Certificates Also appropriate for: Enterprise Security Officers

More information

Polycom RealPresence Platform Director

Polycom RealPresence Platform Director RELEASE NOTES 3.0.0 April 2016 3725-66007-002B Polycom RealPresence Platform Director Contents What s New in Release 3.0... 3 Polycom RealPresence Clariti Support... 3 Support for Appliance Edition...

More information

SharePoint Farm Reporter Installation Guide

SharePoint Farm Reporter Installation Guide Table of Contents SharePoint Farm Reporter Installation Guide I. PRODUCT DESCRIPTION II. SYSTEM REQUIREMENTS AND RECOMMENDATIONS III. INSTALLATION STEPS IV. CONFIGURING APPLICATION V. UPGRADE SHAREPOINT

More information

PRODUCT DESCRIPTIONS AND METRICS

PRODUCT DESCRIPTIONS AND METRICS PRODUCT DESCRIPTIONS AND METRICS Adobe PDM - Adobe LiveCycle Managed Services (2013v3) The Services described in this PDM are Managed Services and are governed by the terms of the General Terms, the Exhibit

More information

Scan to Digitech v1.0

Scan to Digitech v1.0 Scan to Digitech v1.0 Administrator's Guide June 2009 www.lexmark.com Lexmark and Lexmark with diamond design are trademarks of Lexmark International, Inc., registered in the United States and/or other

More information

Quest VROOM Quick Setup Guide for Quest Rapid Recovery for Windows and Quest Foglight vapp Installers

Quest VROOM Quick Setup Guide for Quest Rapid Recovery for Windows and Quest Foglight vapp Installers Quest VROOM Quick Setup Guide for Quest Rapid Recovery for Windows and Quest Foglight vapp Installers INTRODUCTION Setup of Quest VROOM requires installation of Rapid Recovery and Foglight for Virtualization

More information

Comprehensive Database Security

Comprehensive Database Security Comprehensive Database Security Safeguard against internal and external threats In today s enterprises, databases house some of the most highly sensitive, tightly regulated data the very data that is sought

More information

Symantec Drive Encryption Evaluation Guide

Symantec Drive Encryption Evaluation Guide Symantec Drive Encryption Evaluation Guide Getting Started Installing Symantec Encryption Management Server is the first product deployment step for any Symantec Encryption evaluation (also known as a

More information

AD RMS Key Concepts Deploying AD RMS in complex Scenarios Multiple forests Logically isolated environments Physically isolated environments Centralized licensing Integrating Partners Extranet Active Directory

More information

SafeNet Authentication Client

SafeNet Authentication Client SafeNet Authentication Client Integration Guide All information herein is either public information or is the property of and owned solely by Gemalto and/or its subsidiaries who shall have and keep the

More information

Intel Cluster Ready Allowed Hardware Variances

Intel Cluster Ready Allowed Hardware Variances Intel Cluster Ready Allowed Hardware Variances Solution designs are certified as Intel Cluster Ready with an exact bill of materials for the hardware and the software stack. When instances of the certified

More information

Don t just manage your documents. Mobilize them!

Don t just manage your documents. Mobilize them! Don t just manage your documents Mobilize them! Don t just manage your documents Mobilize them! A simple, secure way to transform how you control your documents across the Internet and in your office.

More information

Cloud Identity Management Tool Quick Start Guide

Cloud Identity Management Tool Quick Start Guide Cloud Identity Management Tool Quick Start Guide Software version 3.0.0 General Information: info@cionsystems.com Online Support: support@cionsystems.com Copyright 2017 CionSystems Inc., All Rights Reserved

More information

TFS WorkstationControl White Paper

TFS WorkstationControl White Paper White Paper Intelligent Public Key Credential Distribution and Workstation Access Control TFS Technology www.tfstech.com Table of Contents Overview 3 Introduction 3 Important Concepts 4 Logon Modes 4 Password

More information

BlackBerry Attachment Service

BlackBerry Attachment Service Contents Introduction... 2... 2 New in version 4.0... 2 System architecture... 3 Network connectivity... 3 Document conversion... 3 Supported formats... 4 Managing the Attachment Service... 4 Installing

More information

Management Console for SharePoint

Management Console for SharePoint Management Console for SharePoint User Guide Copyright Quest Software, Inc. 2009. All rights reserved. This guide contains proprietary information, which is protected by copyright. The software described

More information

Amazing versatility...

Amazing versatility... WorkCentre 7228 / 7235 / 7245 print copy scan fax email Amazing versatility... with office color power WorkCentre 7228 / 7235 / 7245 Essential Complete copying and exceptional network printing give your

More information

Box Connector. Version 2.0. User Guide

Box Connector. Version 2.0. User Guide Box Connector Version 2.0 User Guide 2016 Ping Identity Corporation. All rights reserved. PingFederate Box Connector User Guide Version 2.0 March, 2016 Ping Identity Corporation 1001 17th Street, Suite

More information

SolarWinds Orion Integrated Virtual Infrastructure Monitor Supplement

SolarWinds Orion Integrated Virtual Infrastructure Monitor Supplement This PDF is no longer being maintained. Search the SolarWinds Success Center for more information. SolarWinds Orion Integrated Virtual Infrastructure Monitor Supplement INTEGRATED VIRTUAL INFRASTRUCTURE

More information

Nimsoft Service Desk. Single Sign-On Configuration Guide. [assign the version number for your book]

Nimsoft Service Desk. Single Sign-On Configuration Guide. [assign the version number for your book] Nimsoft Service Desk Single Sign-On Configuration Guide [assign the version number for your book] Legal Notices Copyright 2012, CA. All rights reserved. Warranty The material contained in this document

More information

Perceptive TransForm. Technical Specifications. Version: 8.x Compatible with ImageNow 6.5.x to 6.7.x and Perceptive Content 7.x

Perceptive TransForm. Technical Specifications. Version: 8.x Compatible with ImageNow 6.5.x to 6.7.x and Perceptive Content 7.x Perceptive TransForm Technical s Version: 8.x Compatible with ImageNow 6.5.x to 6.7.x and Perceptive Content 7.x Written by: Product Knowledge, R&D Date: May 2018 2008-2018 Hyland Software, Inc. and its

More information

WORKSHARE SECURITY OVERVIEW

WORKSHARE SECURITY OVERVIEW WORKSHARE SECURITY OVERVIEW April 2016 COMPANY INFORMATION Workshare Security Overview Workshare Ltd. (UK) 20 Fashion Street London E1 6PX UK Workshare Website: www.workshare.com Workshare Inc. (USA) 625

More information

One Identity Active Roles Diagnostic Tools 1.2.0

One Identity Active Roles Diagnostic Tools 1.2.0 1 One Identity Active Roles Diagnostic Tools 1.2.0 Release Notes October 2017 These release notes provide information about the One Identity Active Roles Diagnostic Tools release. About One Identity Active

More information

Developing Java TM 2 Platform, Enterprise Edition (J2EE TM ) Compatible Applications Roles-based Training for Rapid Implementation

Developing Java TM 2 Platform, Enterprise Edition (J2EE TM ) Compatible Applications Roles-based Training for Rapid Implementation Developing Java TM 2 Platform, Enterprise Edition (J2EE TM ) Compatible Applications Roles-based Training for Rapid Implementation By the Sun Educational Services Java Technology Team January, 2001 Copyright

More information

Partner Center: Secure application model

Partner Center: Secure application model Partner Center: Secure application model The information provided in this document is provided "as is" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including

More information

OpenID Cloud Identity Connector. Version 1.3.x. User Guide

OpenID Cloud Identity Connector. Version 1.3.x. User Guide OpenID Cloud Identity Connector Version 1.3.x User Guide 2016 Ping Identity Corporation. All rights reserved. PingFederate OpenID Cloud Identity Connector User Guide Version 1.3.x January, 2016 Ping Identity

More information

Cloud Access Manager How to Configure for SSO to SAP NetWeaver using SAML 2.0

Cloud Access Manager How to Configure for SSO to SAP NetWeaver using SAML 2.0 Cloud Access Manager 8.1.3 How to Configure for SSO to SAP Copyright 2017 One Identity LLC. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described

More information

SafeNet Authentication Service

SafeNet Authentication Service SafeNet Authentication Service Integration Guide All information herein is either public information or is the property of and owned solely by Gemalto NV. and/or its subsidiaries who shall have and keep

More information

SafeNet Authentication Service

SafeNet Authentication Service SafeNet Authentication Service Integration Guide All information herein is either public information or is the property of and owned solely by Gemalto NV. and/or its subsidiaries who shall have and keep

More information

Whitepaper. BlackBerry Workspaces Appliance-X. Version 1.9

Whitepaper. BlackBerry Workspaces Appliance-X. Version 1.9 Whitepaper BlackBerry Workspaces Appliance-X Version 1.9 Published: 2016-12-18 SWD-20161218072621822 Contents Overview... 4 Design requirements... 5 Architecture... 6 Security...8 Legal notice...9 Overview

More information

Hardware and System Software Specification for Cisco Unified Customer Voice Portal 10.5(1)

Hardware and System Software Specification for Cisco Unified Customer Voice Portal 10.5(1) Hardware and System Software Specification for Cisco Unified Customer Voice Portal 10.5(1) First Published: 2014-06-18 Last Modified: 2016-04-07 Americas Headquarters Cisco Systems, Inc. 170 West Tasman

More information

HP Operations Orchestration

HP Operations Orchestration HP Operations Orchestration For the Linux or Windows operating systems Software Version: 9.02 Document Release Date: October 2011 Software Release Date: October 2011 Legal Notices Warranty The only warranties

More information

HP Internet Usage Manager Software Release Notes

HP Internet Usage Manager Software Release Notes HP Internet Usage Manager Software Release Notes Version 7.0 Manufacturing Part Number: N/A E1010 U.S.A. Copyright 2010 Hewlett-Packard Company All rights reserved. Legal Notices The information in this

More information

Enterprise Vault Setting up Exchange Server and Office 365 for SMTP Archiving and later

Enterprise Vault Setting up Exchange Server and Office 365 for SMTP Archiving and later Enterprise Vault Setting up Exchange Server and Office 365 for SMTP Archiving 12.1 and later Enterprise Vault : Setting up Exchange Server and Office 365 for SMTP Archiving Last updated: 2018-06-18. Legal

More information

SSO Integration Overview

SSO Integration Overview SSO Integration Overview 2006-2014 Ping Identity Corporation. All rights reserved. PingFederate SSO Integration Overview Version 7.2 June, 2014 Ping Identity Corporation 1001 17th Street, Suite 100 Denver,

More information

GUI 1.5 Release Notes

GUI 1.5 Release Notes GUI 1.5 Release Notes Released: June 2003 The information contained within this document is subject to change without notice. Copyright 2003 All rights reserved. No part of this documentation may be reproduced,

More information

Interdomain Federation for the IM and Presence Service, Release 10.x

Interdomain Federation for the IM and Presence Service, Release 10.x First Published: 2014-01-29 Last Modified: 2018-11-05 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387)

More information

Rapid Recovery License Portal Version User Guide

Rapid Recovery License Portal Version User Guide Rapid Recovery License Portal Version 6.1.0 User Guide 2017 Quest Software Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide

More information

Hardware/Software Specifications for Self-Hosted Systems (Multi-Server)

Hardware/Software Specifications for Self-Hosted Systems (Multi-Server) Hardware/Software Specifications for Self-Hosted Systems (Multi-Server) EBIX, INC. 1 Ebix Way, Johns Creek, GA 30097 Rev. 01/2016 2016 Ebix, Inc. and its subsidiaries. All Rights Reserved. This software

More information

The Privileged Appliance and Modules (TPAM) 1.0. Diagnostics and Troubleshooting Guide

The Privileged Appliance and Modules (TPAM) 1.0. Diagnostics and Troubleshooting Guide The Privileged Appliance and Modules (TPAM) 1.0 Guide Copyright 2017 One Identity LLC. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in

More information

NTLM NTLM. Feature Description

NTLM NTLM. Feature Description Feature Description VERSION: 6.0 UPDATED: JULY 2016 Copyright Notices Copyright 2002-2016 KEMP Technologies, Inc.. All rights reserved.. KEMP Technologies and the KEMP Technologies logo are registered

More information

Altiris Software Management Solution 7.1 from Symantec User Guide

Altiris Software Management Solution 7.1 from Symantec User Guide Altiris Software Management Solution 7.1 from Symantec User Guide Altiris Software Management Solution 7.1 from Symantec User Guide The software described in this book is furnished under a license agreement

More information

One Identity Password Manager User Guide

One Identity Password Manager User Guide One Identity Password Manager 5.8.2 User Guide Copyright 2018 One Identity LLC. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide

More information