Custod. July 30, 20100
|
|
- Emily Chandler
- 5 years ago
- Views:
Transcription
1 AgriLife Infrmatin Technlgy Custd dian Prcedures and Best Practices July 30, 20100
2 TABLE OF CONTENTS Intrductin.. 3 Custdian Requirements Appendix A - Definitins Appendix B - IT Security & Management Prgram Calendar f Events Appendix C - Terms f Use Appendix D - AgriLife IT Cntact Infrmatin 16 Appendix E - Related Statutes, Plicies and Prcedures Page 2
3 INTRODUCTION What is the bjective f this dcument? Ensure AgriLife and Cllege f Agriculture and Life Sciences IT staff are aware f the requirements t prperly administer University and Agency resurces in accrdance with State, University, and AgriLife Agency rules, regulatins and prcedures. Wh is the audience fr this dcument? University r Agency emplyees that are respnsible fr supprting IT services within an Academic Department, AgriLife Research r AgriLife Extensin Service area f peratin. These staff are als knwn as System administratrs r custdians. Wh/What is a custdian? A custdian is typically an IT manager/resurce respnsible fr implementing wner defined cntrls and access t an infrmatin resurce. Custdians may include state emplyees, vendrs and any third party acting as an agent f, r therwise n behalf f the state entity. Page 3
4 CUSTODIAN REQUIREMENTS Custdians are required t perfrm the fllwing within their assigned areas f peratin. If these requirements are nt fulfilled by the custdian, the department r unit head shall be respnsible fr identifying alternative resurces t fulfill these duties. These requirements apply t all cmputing and infrmatin resurces lcated within Texas A&M University facilities and Texas AgriLife Research r Extensin Service lcatins regardless f funding surce r wner f the system. A. Ensure that all apprpriate persnnel are aware f and cmply with these prcedures. It is recmmended that the custdian assist the unit head in cmmunicating an annual reminder fr cmputer resurce use prcedures. Distribute the AgriLife Best Practices Guideline dcument t emplyees annually. Unit heads shuld guarantee custdians are familiar with and practice all the fllwing requirements t maintain University r Agency based cmputing resurces. B. Create and maintain apprpriate perfrmance standards, cntrl practices, and prcedures designed t prvide reasnable assurance that all emplyees bserve these prcedures. Prcesses and prcedures that shuld be implemented include: A dcumented lgn ID creatin prcess that ensures accunts are authrized befre being issued. Ensuring cntrls are in place t verify accunt and passwrd regulatins are in cmpliance. Emplyee exit prcedures that ensure cmputing lgn IDs and access cntrls are disabled at the time f emplyee departure/terminatin. Implement regular mnitring f lgn IDs t ensure that accunts that have nt been used in mre than 45 days are deactivated and eventually remved. A verificatin prcess t ensure that perating system and applicatin patches are applied t all IT resurces at the earliest pssible cnvenience. Perfrm regular scans f servers and wrkstatins t identify and prtect all cnfidential and sensitive data. Page 4
5 Nte: It is suggested that randm wrkstatin scans be cnducted at quarterly intervals. This requirement is mre restrictive than the annual scanning requirement impsed by the University SAPs. All wrkstatins that are used by persnnel supprting accunting r HR functins shuld be scanned at quarterly intervals. Cnfidential data that is identified must either be remved r encrypted. Scanning tls can be btained frm the fllwing surces: Identity Finder: O/Identity_Finder.php Crnell Spider Spider Utilize the Sphs "Data Cntrl Events" reprt t mnitr mvement f Cnfidential infrmatin t prtable cmputing devices. The reprt is available thrugh the Sphs enterprise cnsle. Please cntact AgriLife IT if yu need assistance in utilizing Sphs Data Cntrl Event functinality. C. Schedule risk and vulnerability assessments at required frequency by the imprtance f the data prcessed. All custdians will participate in either the University r AIT facilitated ISSAC assessment prcess. Utilize the vulnerability scanning resurces available via mysecurity.tamu.edu t ensure all sftware vulnerabilities are identified and remediated Nte: Risk assessments must be perfrmed at least annually n all systems, but we recmmend systems with missin critical r cnfidential data be assessed at a minimum twice per year. D. Prvide technical, physical and prcedural safeguards fr the infrmatin resurces. Technical: Cnduct timely patch management f cmputing systems. Nte: AIT Recmmends a mnthly review f all patches fr servers and wrkstatins and that critical patches be applied as sn as pssible. It is highly recmmended that yu dcument the review f patches as well as dcument the applicatin f these patches (date, systems patched). Auditrs typically request this infrmatin during system IT audits. Physical: Assure cmputing systems are secure (physically and lgically) and that backup media (nsite and ffsite) are prperly secured. Prcedural: Establish and dcument unit based accunt and data management prcedures. (i.e. hw wrkstatins hard drive data is remved r destryed befre surplus r re-issue) E. Assist wners in evaluating the cst-effectiveness f cntrls and mnitring. Custdian and data wner must determine the value f the data and implement apprpriate, cst effective, security safeguards t ensure the prtectin f the data. Page 5
6 F. Cnduct reviews f physical security implementatins and develp/update emergency prcedures fr physical security f IT resurces Annually review physical security implementatins and develp r update emergency prcedures fr physical security f IT resurces. Nte: These prcedures shuld be written and include what steps t take and wh t cntact in an emergency (see Sectin H fr training requirements). G. Review access permissins and remve access fr individuals wh are n lnger emplyed r n lnger require access t IT resurces. At a minimum f twice annually, custdians must review access permissins and remve access fr individuals wh are n lnger emplyed r n lnger require access t IT resurces. Nte: AIT strngly suggests that yu develp a wrkflw prcess that disables and remves accunts as emplyees n lnger require access. H. Ensure infrmatin resurces are prtected frm envirnmental hazards. Designated emplyees must be trained t mnitr envirnmental cntrl prcedures and equipment. Designated emplyees must als be trained in desired respnse prcedures in case f emergencies, equipment r facilities prblems. Recmmended training prcedures include: Actin plans/prcedures fr pwer lss r disruptin. At a minimum, dcumentin shuld be prvided t the department r unit head detailing the level f availability, cmputing resurces will prvide, in the event f pwer lss. Actin plans/prcedures fr envirnmental hazards such as fire, r fld/water incursin. At a minimum, ff site strage f missin critical infrmatin data shuld be prvided. This includes regular testing and recvery prcedures fr this data. Actin plans/prcedures fr disruptins in envirnmental cntrls such as cling. At a minimum, a dcument shuld be prvided t the department r unit head stating what level f availability will be fr cmputer resurces in the event f disrupted cling. I. Implement a written disaster recvery plan fr infrmatin resurces. Custdians are required t dcument a Disaster Recvery plan (fr all IT resurces) with AgriLife IT and update the plan each August. (Link: AIT Disaster Recvery Dcumentatin Applicatin) Perfrm tests f Disaster Recvery prcedures at annual intervals. Dcumentatin must als be kept f these test events and their results (i.e. enhancements, changes, r issues nted). Where applicable, dcumentatin shuld be revised t detail required changes identified frm the testing prcedures. J. Implement system identificatin and lgn banners in accrdance with state requirements fr all infrmatin resurces (Windws, Mac, Linux, etc.). Registry mdificatin files fr Windws systems and instructins fr implementing banners n Mac systems are available at the AIT Security page at - Page 6
7 Required banner cntent MUST include: This cmputer system and all data herein are fficial State f Texas resurces and as such are available nly fr authrized purpses by authrized users. Use fr any ther purpse may result in administrative r disciplinary actins r criminal prsecutin against the user. Usage is subject t mnitring and security testing. The user shuld have n expectatin f privacy except as therwise prvided by applicable privacy laws. K. Implement the mnitring techniques and prcedures fr detecting, reprting, and investigating incidents. Incidents must be reprted t securityhelp@ag.tamu.edu r via the web frm at Fr Departments/Centers using Sphs, yur Anti-Virus / MalWare reprts will be autmatically rlled int the ISO mnthly DIR reprt. Departments nt yet utilizing Sphs are required t submit a Mnthly Anti-Virus / Malware reprt t the AIT Infrmatin Security Officer. All ther security incidents shuld be reprted t the ISO using the and web site link abve. L. Perfrm a review f system lgs at regular intervals fr infrmatin resurces perfrming missin critical r cnfidential peratins. Utilize lg scanning utilities t review system lgs husing cnfidential infrmatin r perfrming missin critical peratins. Server lgs shuld be rutinely mnitred and reviewed fr bth peratinal quality assurance purprses as well as security. AIT recmmends either a weekly r mnthly scheduled prcedure t perfrm this activity. M. Verify that User security guidelines are distributed t all emplyees, understd by emplyees and are fllwed. AIT recmmends distributin f the frmal user guidelines t all staff at annual intervals. Annual distributin f the User Best Practices dcument t all staff. N. Cnfirm that emplyees attaching persnal systems t AgriLife (University r System) netwrks are fllwing the same guidelines required fr state wned systems. These include the fllwing: Current and wrking Anti-virus/Anti-malware prduct installed Page 7
8 Operating system and applicatin patches are current. N peer-t-peer file sharing applicatins are installed that culd be prviding unlicensed cpyrighted cntent. Nte: Cllege: Peer-t-Peer file sharing applicatins are currently still apprved by University prcedures Agencies: Peer-t-Peer file sharing applicatins have been prhibited withut frmal apprval as f Feb 2010 (See Agency Cmputer Use Guidelines fr details) Cnfidential and r persnally identifiable infrmatin is identified and prperly prtected All user accunts have passwrds that meet recmmended passwrd guidelines and are nt set t aut-lgin Files and Flders n prtable devices cntaining agency missin critical r cnfidential infrmatin are encrypted O. Implement Management Cntrls described belw. The paragraphs belw ffer high level descriptins f management cntrl strategies yu shuld be aware f and implement. The titles f each are links t mre specific infrmatin. In additin t the University SAP reference, specific AgriLife restrictins r guidelines may exist. Please refer t Appendix C fr references t the applicable agency prcedures. If additinal clarificatin is needed, please cntact the AgriLife Infrmatin Security Officer at Securityhelp@ag.tamu.edu PHYSICAL SECURITY It is plicy t prtect cmputer hardware, sftware, data, and dcumentatin frm misuse, theft, unauthrized access, and envirnmental hazards. ACCOUNTS AND PASSWORDS The cnfidentiality and integrity f data stred n cmputer systems must be prtected by access cntrls t ensure that nly authrized users have access. This access must be restricted t nly thse capabilities that are apprpriate t each user's jb duties. INTERNET AND A variety f University SAPs and Agency prcedures describe plicies and cntrls that shuld be in place and administered regarding the use f Internet and services. This access shuld be primarily restricted t thse activities that are apprpriate fr each user's jb duties. Page 8
9 COMPUTER VIRUS PROTECTION and WORKSTATION SECURITY/INTEGRITY Cmputer viruses, trjans, wrms, spyware, and ther such malicius applicatins are prgrams designed t make unauthrized changes t prgrams and data, and therefre, can cause destructin r disclsure f agency resurces. Sphs is the frmally supprted and funded anti-virus, and data-leakage tl in Texas A&M AgriLife and the Cllege f Agriculture and Life Sciences and is prvided at n cst t all emplyees. BACKUP AND RECOVERY All electrnic infrmatin cnsidered f institutinal value must be cpied nt backup strage media n a regular basis (i.e., backed up) fr disaster recvery and business cntinuity purpses. This sectin utlines the minimum requirements fr the creatin and retentin f backups. Special backup needs, identified thrugh risk analysis, which exceed these requirements shuld be implemented n an individual basis. DATA CLASSIFICATION/PROTECTION In accrdance with the definitins applied t Cnfidential and Sensitive data in the Definitins sectin f this dcument (Appendix A), security cntrls must be implemented t prtect data apprpriate t data value r risk (f access/use by anther party). CHANGE MANAGEMENT Change management prcedure describes the requirements fr managing changes in a ratinal and predictable manner s that staff and clients can plan accrdingly. Changes require serius frethught, careful mnitring, and fllw-up evaluatin t reduce negative impact t the user cmmunity and t increase the value f infrmatin resurces. INCIDENT MANAGEMENT This prcedure describes the requirements fr dealing with cmputer security incidents. INTRUSION DETECTION Intrusin detectin plays an imprtant rle in implementing and enfrcing an rganizatinal security plicy. Intrusin detectin prvides tw imprtant functins in prtecting infrmatin resurces: AgriLife IT recmmends that a weekly r mnthly review be perfrmed n all cmputing platfrms if autmated tls are nt in use. All servers and wrkstatins shuld have audit lgging enabled fr the purpse f creating and maintaining an activity lg. All suspected and/r cnfirmed instances f successful intrusins shuld be reprted t the AgriLife IT Infrmatin Security fficer. Page 9
10 NETWORK CONFIGURATION The netwrk cnfiguratin prcedures establish a prcess fr any expansin and use f the netwrk infrastructure. AgriLife netwrk infrastructure is prvided by Texas A&M University and TTVN. It is imprtant that the infrastructure, which includes cabling and the assciated 'active equipment', cntinues t develp with sufficient flexibility t meet demands while remaining capable f expliting develpments in high speed netwrking. This apprach allws fr implementatin f enhanced user services. Nte: Cllege: All netwrking planning and updates shuld be crdinated with Texas A&M University CIS netwrking team in accrdance with CIS plicies and service regulatins. Agencies: As f July 2010, all netwrking planning and updates shuld be crdinated with the AgriLife IT Netwrk Engineer. This includes all changes t firewall, netwrk switch, wireless access pints, and ruters. PORTABLE COMPUTING The purpse f AgriLife prtable cmputing security prcedures is t establish the prcess fr the use f mbile cmputing devices and their cnnectin t the netwrk.prtable cmputing devices (laptp cmputers, phnes, remvable strage devices) are becming increasingly pwerful and affrdable. Their small size and functinality are making these devices mre desirable as replacements fr desktp devices. Hwever, the prtability ffered by these devices increases the security expsure. Nte: All prtable cmputing devices shuld be encrypted when handling cnfidential infrmatin. Prtable devices pssessing cnfidential infrmatin must be prtected by a passwrd lgin. All unattended prtable devices cntaining cnfidential infrmatin must be physically secured. SECURITY MONITORING Security Mnitring is used t cnfirm the security practices and cntrls in place are are effective. Mnitring cnsists f activities such as the review f: user accunt lgs, applicatin lgs, data backup recvery lgs, autmated intrusin detectin system lgs, etc. The purpse f the security mnitring plicy is t ensure that infrmatin resurce security cntrls are in place, are effective, and are nt being bypassed. One f the benefits f security mnitring is the early identificatin f wrngding r new security vulnerabilities. The security mnitring prcedure applies t all individuals that are respnsible fr the installatin f new infrmatin resurces, the peratins f existing infrmatin resurces, and individuals charged with infrmatin resurces security. Page 10
11 PLATFORM HARDENING Servers are relied upn t stre and deliver data in a secure, reliable fashin. There must be assurance that data cnfidentiality, integrity and availability are maintained. One f the required steps is t ensure that the servers are installed and maintained t prevent unauthrized access, unauthrized use, and disruptins in service. The purpse f server hardening prcedures is t describe the requirements fr installing a new server in a secure fashin and maintaining the integrity f server. Dcumentatin n server hardening is available at - SYSTEMS DEVELOPMENT AND ACQUISITION The purpse f the system develpment prcedure is t describe the requirements fr develping and/r implementing new applicatin sftware. This prcedure is designed accrding t Texas Administrative Cde Rule Infrmatin Resurces Security Safeguards, sectin Security Plicies. NOTE: Any third-party cntractrs r in-huse sftware develpers are required t meet all security plicies when develping sftware fr public access n State f Texas infrmatin resurces. These plicies and standards must be maintained n a regular basis. It is recmmended that apprpriate budget and resurce plans be established fr all custm web based sftware implementatins. Inability t regularly maintain r meet these standards culd result in an immediate "take-dwn" request frm Texas A&M System r AgriLife IT administratin. VENDOR ACCESS Vendrs play an imprtant rle in the supprt f custmer peratins, hardware and sftware management. Vendrs can remtely view, cpy and mdify data and audit lgs, crrect sftware and perating systems prblems, mnitr and fine tune system perfrmance, mnitr hardware perfrmance and errrs, mdify envirnmental systems, and reset alarm threshlds. Setting limits and cntrls n what can be seen, cpied, mdified, and cntrlled by vendrs will eliminate r reduce the risk f lss f revenue, liability, lss f trust, and embarrassment t AgriLife. The purpse f vendr access prcedures is t establish the prcess fr vendr access t AgriLife infrmatin resurces and supprt services (A/C, UPS, PDU, fire suppressin, etc.), vendr respnsibilities, and prtectin f infrmatin. The vendr access prcedure applies t all individuals wh are respnsible fr the installatin f new infrmatin resurces assets, and the peratins and maintenance f existing infrmatin resurces and wh d r may allw vendr access fr maintenance, mnitring and trubleshting purpses. TRAINING AND ACKNOWLEDGEMENT New emplyees will receive training n infrmatin security measures and requirements and be required t acknwledge receptin and acceptance f the prvisins f this rule, by signing AgriLife Frm AG-415, Emplyee Acknwledgment. All emplyees are expected t review and acknwledge the prvisins f this rule every tw years, and will d s thrugh classes ffered in HRCnnect, the TAMUS Human Resurces ffice s nline training venue. Nn-emplyee users f infrmatin resurces will be issued a Page 11
12 cpy f these infrmatin security guidelines and required t sign an acknwledgment frm prir t being granted access. ADMINISTRATOR / SPECIAL ACCESS Technical supprt staff, security administratrs, custdians and thers may have special access requirements.. The granting, cntrlling and mnitring f these accunts is imprtant t an verall security prgram. The purpse f the administratr/special access management prcedure is t establish the prcess fr the creatin, use, mnitring, cntrl and remval f accunts with special access privilege. PRIVACY Privacy plicies are used t establish the respnsibilities and limits fr custdians and users in prviding AgriLife and TAMU infrmatin resurces privacy. Authrized AgriLife IT staff have the right t examine infrmatin n infrmatin resurces under the cntrl r custdy f any AgriLife agency r Cllege f Agriculture and Life Sciences The general right t privacy is extended t the electrnic envirnment as far as pssible. Hwever, there shuld be n expectatin f privacy beynd that which is expressly prvided by applicable privacy laws. Privacy is limited by the Texas Public Infrmatin Act, administrative review, custdians, and audits. Page 12
13 Appendix A - Definitins A. Owner f an Infrmatin Resurce - A persn respnsible fr a business functin and fr determining cntrls and access t infrmatin resurces supprting that business functin. Fr example, the wner is typically the Unit head, Directr r their designee. B. Custdian f an Infrmatin Resurce - A persn respnsible fr implementing wner defined cntrls and access t an infrmatin resurce. Custdians may include state emplyees, vendrs, and any third party acting as an agent f, r therwise n behalf f the state entity. Fr example, the custdian is typically an IT manager r resurce. C. User f an Infrmatin Resurce - An individual r autmated applicatin authrized t access an infrmatin resurce in accrdance with the wner defined cntrls and access rules. D. Cnfidential data - data that is excluded frm disclsure under requirements frm federal r state law. This can include but is nt limited t: persnnel recrds, health recrds, financial recrds, address infrmatin, student educatin recrds, credit card, scial security, r drivers license numbers. E. Sensitive data - Sensitive data may be subject t disclsure r release under the Texas Public Infrmatin Act, hwever AgriLife r the data wner has decided that the data must have the same r equivalent level f prtectin as Cnfidential data. Examples f sensitive data include: Operatinal infrmatin, persnnel recrds, infrmatin security prcedures, internal cmmunicatin. F. Missin critical - data which if access t was unavailable, an essential missin f the University, agency r department wuld nt be able t be cntinued, and r wuld cause a significant financial lss t be incurred, wuld cause institutinal embarrassment t take place, wuld cause an inability t cmply with federal regulatins r legal bligatin, r culd cause a pssible clsure f a agency r University department. G. Prtable Cmputing Device Any device ther than a desktp cmputer that can stre data, access the Internet r AgriLife netwrks, systems r applicatins. Examples include ntebk cmputers, internet enabled phnes, net bk cmputers, and prtable memry devices such as USB drives and memry sticks Page 13
14 Appendix B - IT Security and Management Prgram Calend dar f Events Page 14
15 Appendix C - Terms f use Electrnic files created, sent, received, r stred n Infrmatin Resurces wned, leased, administered, r therwise under the custdy and cntrl f AgriLife are the prperty f the agency. Vilatin f these prcedures may result in disciplinary actin up t and including terminatin fr emplyees and tempraries; a terminatin f emplyment relatins in the case f cntractrs r cnsultants; r dismissal fr interns and vlunteers. Additinally, individuals are subject t lss f access privileges fr AgriLife Infrmatin Resurces, and ptentially civil, r criminal prsecutin. Page 15
16 Appendix D - Cntact Infrmatin AgriLife Infrmatin Technlgy Cntacts Chuck Braden Infrmatin Security Officer jcbraden@ag.tamu.edu Phne: Tm Lyster IT Crdinatr - Cllege f Agriculture and Life Sciences, AgriLife Research tlyster@tamu.edu Phne: Jim Segers IT Crdinatr - Texas AgriLife Extensin Service j-segers@tamu.edu Phne: Alan Kurk IT Directr - Texas A&M AgriLife akurk@tamu.edu Phne: Page 16
17 Appendix E - Related Statutes, Plicies, r Requirements Texas Admin. Cde Ch. 202, Infrmatin Security Standards Texas Admin. Cde Ch. 206, State Web Sites Texas Admin. Cde Ch. 213, Electrnic and Infrmatin Resurces System Plicy 29.01, Infrmatin Resurces System Regulatin , Electrnic Infrmatin Services Access and Security Texas AgriLife Research - Infrmatin Security, Cmputer Use, and Sftware Installatin/Use (Rev ) Texas AgriLife Extensin Service - Infrmatin Security, Cmputer Use, and Sftware Installatin/Use (Rev ) Page 17
Software Usage Policy Template
Sftware Usage Plicy Template This template is t accmpany the article: The Sftware Usage Plicy - An Indispensible Part f Yu SAM Tlbx The full article can be fund here: http://www.itassetmanagement.net/tag/plicy-template/
More informationPatch Management Policy
Patch Management Plicy (Versin 1) Dcument Cntrl Infrmatin: Date: 21/5/18 Master Tracking Name Patch Management Plicy Master Tracking Reference Owning Service / Department Exeter IT Issue: 1 Apprvals: Authrs:
More informationTexas A&M Veterinary Medical Diagnostic Laboratory Procedures V0.01 Information Resource Procedures
Texas A&M Veterinary Medical Diagnstic Labratry Prcedures 29.01.03.V0.01 Infrmatin Resurce Prcedures Revised: January 23, 2017 Next Scheduled Review: January 23, 2022 Click t View Revisin Histry PROCEDURE
More informationTown of Warner, New Hampshire Information Security Policy
Twn f Warner, New Hampshire Infrmatin Security Plicy Date Adpted: Bard f Selectmen David E. Hartman David Karrick, Jr. Clyde Carsn Table f Cntents Table f Cntents 1 Intrductin 2 Ethics and Acceptable Use
More informationSecurity of Information Technology Resources
CORNELL UNIVERSITY POLICY LIBRARY Security f Infrmatin Technlgy Resurces Technlgies Chapter: 4, Security and Vice President fr Infrmatin Technlgies Originally Issued: June 1, 2004 Last Full Review: December
More informationOverview of Data Furnisher Batch Processing
Overview f Data Furnisher Batch Prcessing Nvember 2018 Page 1 f 9 Table f Cntents 1. Purpse... 3 2. Overview... 3 3. Batch Interface Implementatin Variatins... 4 4. Batch Interface Implementatin Stages...
More informationUNSW Technology Policy:
UNSW Technlgy Plicy: UNSW Plicy Respnsible Officer Cntact Officer Apprving Authrity UNSW Data Netwrk Cnnectin Plicy Chief Infrmatin Officer Manager Infrastructure Services Supprt UNSW IT Services Ph: x
More informationHP Server Virtualization Solution Planning & Design
Cnsulting & Integratin Infrastructure Services HP Server Virtualizatin Slutin Planning & Design Service descriptin Hewlett-Packard Cnsulting & Integratin Infrastructure Cnsulting Packaged Services (HP
More informationIHIS Research Access Request Guidelines
Eservices: https://sumc.service-nw.cm/ 1. FOR NEWLY HIRED EMPLOYEES: Use On-barding Services & On-Barding Guide Frm Please Nte the fields required fr Research IHIS access are the same as thse utlined in
More informationCaseWare Working Papers. Data Store user guide
CaseWare Wrking Papers Data Stre user guide Index 1. What is a Data Stre?... 3 1.1. When using a Data Stre, the fllwing features are available:... 3 1.1.1.1. Integratin with Windws Active Directry... 3
More informationUNIVERSITY OF MIAMI POLICY AND PROCEDURE MANUAL
UNIVERSITY OF MIAMI POLICY AND PROCEDURE MANUAL TITLE: Electrnic Data Prtectin and Encryptin REFERENCE: Refrmat CATEGORY: Infrmatin Technlgy PAGE: 1 SUPERSEDES: POL-UMIT- A175-014-01 APPROVER: David Ertel
More informationMHS BYOD Policy MUDGEE HIGH SCHOOL STUDENT BRING YOUR OWN DEVICE (BYOD) POLICY
MHS BYOD Plicy MUDGEE HIGH SCHOOL STUDENT BRING YOUR OWN DEVICE (BYOD) POLICY Intrductin This dcument prvides advice and directin t students wh chse t use BYOD t access the Department f Educatin (DOE)
More informationABELMed Platform Setup Conventions
ABELMed Platfrm Setup Cnventins 1 Intrductin 1.1 Purpse f this dcument The purpse f this dcument is t prvide prspective ABELMed licensees and their hardware vendrs with the infrmatin that they will require
More informationABELDent Platform Setup Conventions
ABELDent Platfrm Setup Cnventins 1 Intrductin 1.1 Purpse f this dcument The purpse f this dcument is t prvide prspective ABELDent licensees and their hardware vendrs with the infrmatin that they will require
More informationYour New Service Request Process: Technical Support Reference Guide for Cisco Customer Journey Platform
Supprt Guide Yur New Service Request Prcess: Technical Supprt Reference Guide fr Cisc Custmer Jurney Platfrm September 2018 2018 Cisc and/r its affiliates. All rights reserved. This dcument is Cisc Public
More informationOATS Registration and User Entitlement Guide
OATS Registratin and User Entitlement Guide The OATS Registratin and Entitlement Guide prvides the fllwing infrmatin: OATS Registratin The prcess and dcumentatin required fr a firm r Service Prvider t
More informationSingle File Upload Guide
Single File Uplad Guide August 15, 2018 Versin 9.6.134.78 Single File Uplad Guide 1 Fr the mst recent versin f this dcument, visit ur dcumentatin website. Single File Uplad Guide 2 Table f Cntents 1 Single
More informationDisaster Recovery. Practical Applications. Eric LaFollette. Director of Information Resources Lake County Clerk of Courts
Disaster Recvery Practical Applicatins Eric LaFllette Directr f Infrmatin Resurces Lake Cunty Clerk f Curts Presentatin Outline Imprtance f a plan Disaster Recvery Scenaris Disaster Recvery Basics Lake
More informationImagine for MSDNAA Student SetUp Instructions
Imagine fr MSDNAA Student SetUp Instructins --2016-- September 2016 Genesee Cmmunity Cllege 2004. Micrsft and MSDN Academic Alliance are registered trademarks f Micrsft Crpratin. All rights reserved. ELMS
More informationIntroduction to Mindjet on-premise
Intrductin t Mindjet n-premise Mindjet Crpratin Tll Free: 877-Mindjet 1160 Battery Street East San Francisc CA 94111 USA Phne: 415-229-4200 Fax: 415-229-4201 www.mindjet.cm 2012 Mindjet. All Rights Reserved
More informationRISKMAN REFERENCE GUIDE TO USER MANAGEMENT (Non-Network Logins)
Intrductin This reference guide is aimed at managers wh will be respnsible fr managing users within RiskMan where RiskMan is nt cnfigured t use netwrk lgins. This guide is used in cnjunctin with the respective
More informationClassFlow Administrator User Guide
ClassFlw Administratr User Guide ClassFlw User Engagement Team April 2017 www.classflw.cm 1 Cntents Overview... 3 User Management... 3 Manual Entry via the User Management Page... 4 Creating Individual
More informationERS IT Portfolio Report
Administratin and Operatins Cmmittee ERS IT Prtfli Reprt July 15 th, 2014 1 Agenda Infrmatin Technlgy Prjects Summary Applicatin Stats What s Next IT Prtfli 2 Infrmatin Technlgy Prjects Summary Remte Office
More informationManaging User Accounts
A variety f user types are available in Lighthuse Transactin Manager (LTM) with cnfigurable permissins that allw the Accunt Administratr and administratr-type users fr the accunt t manage the abilities
More informationQuick Guide on implementing SQL Manage for SAP Business One
Quick Guide n implementing SQL Manage fr SAP Business One The purpse f this dcument is t guide yu thrugh the quick prcess f implementing SQL Manage fr SAP B1 SQL Server databases. SQL Manage is a ttal
More informationCustomer Information. Agilent 2100 Bioanalyzer System Startup Service G2949CA - Checklist
This checklist is used t prvide guidance and clarificatin n aspects f the auxillary Startup Service (G2949CA) including Security Pack Installatin and Familiarizatin f yur Agilent 2100 Bianalyzer System
More informationUpdate: Users are updated when their information changes (examples: Job Title or Department). o
Learn Basic User Integratin Batch File Prcessing The Learn Basic User Integratin is designed t manage the rganizatinal changes cmpanies are challenged with n a daily basis. Withut a basic type f integratin,
More informationInternet/Intranet Publishing Guidelines
Muntain View-Ls Alts Unin High Schl District In trductin Internet/Intranet Publishing Guidelines Using the Internet t further the educatinal prcess, gals and bjectives is a natural extensin f Muntain View-Ls
More informationRelease Notes Version: - v18.13 For ClickSoftware StreetSmart September 22, 2018
Release Ntes Versin: - v18.13 Fr ClickSftware StreetSmart September 22, 2018 Cpyright Ntice Cpyright 2018 ClickSftware Technlgies Ltd. All rights reserved. N part f this publicatin may be cpied withut
More informationMcGill University Firewall Sharing Services Service Description and Service Level Agreement. Prepared by Network and Communications Services
McGill University Firewall Sharing Services Service Descriptin and Service Level Agreement Prepared by Netwrk and Cmmunicatins Services Revisin Histry Versin Date Summary f changes Apprved by 1.0 February
More informationS4S Support Services. Audit4 version 14+ Aug Copyright 2017 S4S Pty Ltd. S4S Pty Ltd. Phone: Web:
S4S Pty Ltd ABN: 26 104 845 909 Phne: 1300 133 308 Web: http://www.s4s.cm.au Audit4 versin 14+ Aug 2018 Cpyright S4S Pty Ltd S4S Supprt prvides cmprehensive services s that yu can get the maximum benefit
More informationPlease contact technical support if you have questions about the directory that your organization uses for user management.
Overview ACTIVE DATA CALENDAR LDAP/AD IMPLEMENTATION GUIDE Active Data Calendar allws fr the use f single authenticatin fr users lgging int the administrative area f the applicatin thrugh LDAP/AD. LDAP
More informationAdmin Report Kit for Exchange Server
Admin Reprt Kit fr Exchange Server Reprting tl fr Micrsft Exchange Server Prduct Overview Admin Reprt Kit fr Exchange Server (ARKES) is an Exchange Server Management and Reprting slutin that addresses
More informationAccess the site directly by navigating to in your web browser.
GENERAL QUESTIONS Hw d I access the nline reprting system? Yu can access the nline system in ne f tw ways. G t the IHCDA website at https://www.in.gv/myihcda/rhtc.htm and scrll dwn the page t Cmpliance
More informationService Level Agreement
Service Level Agreement Infrastructure Supprt Service This Infrastructure Supprt Service Level Agreement ( SLA ) is incrprated int the Qute executed by TekLinks and Custmer fr Infrastructure Supprt Services
More informationBlackBerry Server Installation and Upgrade Service
Server and Upgrade Service Prgram Descriptin ( Install and Upgrade Service Prgram Descriptin ) NOTE: This dcument includes all attached Annexes, is prvided fr infrmatinal purpses nly, and des nt cnstitute
More informationAvePoint Pipeline Pro 2.0 for Microsoft Dynamics CRM
AvePint Pipeline Pr 2.0 fr Micrsft Dynamics CRM Installatin and Cnfiguratin Guide Revisin E Issued April 2014 1 Table f Cntents Abut AvePint Pipeline Pr... 3 Required Permissins... 4 Overview f Installatin
More informationPoint-to-Point Encryption (P2PE)
Payment Card Industry (PCI) Pint-t-Pint Encryptin (P2PE) Template fr P2PE Applicatin Reprt n Validatin (Applicatin P-ROV) Applicatin P-ROV Template Fr Applicatins used with PCI P2PE Hardware/Hardware Standard
More informationPRIVACY AND E-COMMERCE POLICY STATEMENT
PRIVACY AND E-COMMERCE POLICY STATEMENT Tel-Tru Manufacturing Cmpany ( Tel-Tru ) is dedicated t develping lng-lasting relatinships that are built n trust. Tel-Tru is cmmitted t respecting the wishes f
More informationMySabre API RELEASE NOTES MYSABRE API VERSION 2.0 (PART OF MYSABRE RELEASE 7.0) OCTOBER 28, 2006 PRODUCTION
MySabre API RELEASE NOTES MYSABRE API VERSION 2.0 (PART OF MYSABRE RELEASE 7.0) OCTOBER 28, 2006 PRODUCTION These release ntes pertain t the Prductin release fr MySabre Release 7.0 cntaining MySabre API
More informationCXA-206-1I Citrix XenApp 6.5 Administration
CXA-206-1I Citrix XenApp 6.5 Administratin Citrix XenApp 6.5 Administratin training curse prvides the fundatin necessary fr administratrs t effectively centralize and manage applicatins in the datacenter
More informationForcepoint UEBA Management of Personal Data
Frcepint UEBA Management f Persnal Data 2018 Frcepint LLC. All Rights Reserved Dcument Classificatin: Public FPWSCMPD-2018MAY24 Frcepint UEBA Management f Persnal Data CONTENTS Disclaimer... 2 General...
More informationTPP: Date: October, 2012 Product: ShoreTel PathSolutions System version: ShoreTel 13.x
I n n v a t i n N e t w r k A p p N t e TPP: 10320 Date: Octber, 2012 Prduct: ShreTel PathSlutins System versin: ShreTel 13.x Abstract PathSlutins sftware can find the rt-cause f vice quality prblems in
More informationService Level Agreement
Service Level Agreement Infrastructure Supprt Service This Infrastructure Supprt Service Level Agreement ( SLA ) is incrprated int the Qute executed by TekLinks and Custmer fr Infrastructure Supprt Services
More informationRequest for Proposal Technology Services Maintenance and Support
Request fr Prpsal Technlgy Services Maintenance and Supprt Maintenance and Supprt July 19, 2014 Celerity Tenacia Charter Schl is seeking an IT cnsulting firm t manage Maintenance f ur Netwrk Systems beginning
More informationAll members of the UNNC Community and users of the University network.
Bulk Email Plicy Audience: All members f the UNNC Cmmunity and users f the University netwrk. Definitin: Bulk email, by definitin, is unslicited email sent quickly in large quantities, and is recgnized
More informationProficy* SmartSignal 6.1 Installation Guide
Prficy* SmartSignal 6.1 IG_P-SS_6.1 R0 Prficy* SmartSignal 6.1 Disclaimer f Warranties and Liability The infrmatin cntained in this manual is believed t be accurate and reliable. Hwever, GE Intelligent
More informationE. G. S. Pillay Engineering College, Nagapattinam Computer Science and Engineering
IT2042 - Infrmatin Security 1-1 E. G. S. Pillay Engineering Cllege, Nagapattinam Cmputer Science and Engineering Elective II IT 2042 INFORMATION SECURITY VIII Sem CSE QUESTION BANK - UNIT-IV 1) What is
More informationBMC Remedyforce Integration with Remote Support
BMC Remedyfrce Integratin with Remte Supprt 2003-2018 BeyndTrust, Inc. All Rights Reserved. BEYONDTRUST, its lg, and JUMP are trademarks f BeyndTrust, Inc. Other trademarks are the prperty f their respective
More informationCSC IT practix Recommendations
CSC IT practix Recmmendatins CSC Healthcare 17 th June 2015 Versin 3.1 www.csc.cm/glbalhealthcare Cntents 1 Imprtant infrmatin 3 2 IT Specificatins 4 2.1 Wrkstatins... 4 2.2 Minimum Server with 1-5 wrkstatins
More informationAvePoint Timeline Enterprise for Microsoft Dynamics CRM
AvePint Timeline Enterprise 1.0.2 fr Micrsft Dynamics CRM Installatin and Cnfiguratin Guide Revisin B Issued Nvember 2013 Timeline Enterprise fr Micrsft Dynamics CRM Install and Cnfig 1 Table f Cntents
More informationAras Innovator Viewer Add-Ons
Aras Innvatr Viewer Add-Ons Aras Innvatr 9.2 Dcument #: 9.2.02232009 Last Mdified: 4/1/2010 Aras Crpratin ARAS CORPORATION Cpyright 2010 All rights reserved Aras Crpratin 300 Brickstne Square Suite 904
More informationVMware AirWatch Certificate Authentication for Cisco IPSec VPN
VMware AirWatch Certificate Authenticatin fr Cisc IPSec VPN Fr VMware AirWatch Have dcumentatin feedback? Submit a Dcumentatin Feedback supprt ticket using the Supprt Wizard n supprt.air-watch.cm. This
More informationMilestone XProtect. NVR Installer s Guide
Milestne XPrtect NVR Installer s Guide Target Audience fr this Dcument This guide is relevant fr peple respnsible fr delivering and installing Milestne XPrtect NVR surveillance systems. If yu are a Milestne
More informationGroup Policy Manager Quick start Guide
Grup Plicy Manager Quick start Guide Sftware versin 4.0.0.0 General Infrmatin: inf@cinsystems.cm Online Supprt: supprt@cinsystems.cm Cpyright CinSystems Inc., All Rights Reserved Page 1 CinSystems Inc.
More informationE-Lock Policy Manager White Paper
White Paper Table f Cntents 1 INTRODUCTION... 3 2 ABOUT THE POLICY MANAGER... 3 3 HOW E-LOCK POLICY MANAGER WORKS... 3 4 WHAT CAN I DO WITH THE POLICY MANAGER?... 4 4.1 THINGS YOU CONTROL IN SIGNING...
More informationWELMEC Guide on evaluation of Purely Digital Parts
WELMEC 10.10 2016 Guide n evaluatin f Purely Digital Parts WELMEC is a cperatin between the legal metrlgy authrities f the Member States f the Eurpean Unin and EFTA. This dcument is ne f a number f Guides
More informationPerformance of usage of MindSphere depends on the bandwidth of your internet connection.
MindSphere MindAccess User Data Sheet MindAccess User prvides yu with an Accunt in rder t access the MindSphere Platfrm. This allws yu t cnfigure Assets and Users, access Applicatins and stre data. Such
More informationUSD 373 s General Guidelines for Web Page Publishing. The USD 373 Internet community domain address will be located at
8-14-08 District Web Pages USD 373 s General Guidelines fr Web Page Publishing General Guidelines The purpse f any USD 373 publicatin is t share infrmatin regarding issues, events, persnnel, students and
More informationMySabre API RELEASE NOTES MYSABRE API VERSION 2.1 (PART OF MYSABRE RELEASE 7.1) DECEMBER 02, 2006 PRODUCTION
MySabre API RELEASE NOTES MYSABRE API VERSION 2.1 (PART OF MYSABRE RELEASE 7.1) DECEMBER 02, 2006 PRODUCTION These release ntes pertain t the Prductin release fr MySabre Release 7.1 cntaining MySabre API
More informationCLIENT. Corporation. Hosting Services. August 24, Marc Gray Flywire Technology CLIENT. 104 West Candler St Winder, GA
CLIENT Crpratin Hsting Services August 24, 2011 PRESENTED TO: PRESENTED BY: Marc Gray Flywire Technlgy CLIENT 104 West Candler St Winder, GA 30680 770-771-5299 Marc@ flywiretechnlgy.cm TABLE OF CONTENTS
More informationUPGRADING TO DISCOVERY 2005
Centennial Discvery 2005 Why Shuld I Upgrade? Discvery 2005 is the culminatin f ver 18 mnths wrth f research and develpment and represents a substantial leap frward in audit and decisin-supprt technlgy.
More informationFiveContractor.com User Manual
FiveCntractr.cm User Manual Fr Use by Five Brthers Vendrs Distributin authrized t current Five Brthers Custmers nly. Other requests fr this dcument shall be referred t Five Brthers, 12220 East Thirteen
More informationNCTA-Certified Cloud Technologist (NCT) Exam NCT-110
NCTA-Certified Clud Technlgist (NCT) Exam NCT-110 Exam Infrmatin Candidate Eligibility: The NCTA-Certified Clud Technlgist (NCT) exam requires n applicatin fee, supprting dcumentatin, nr ther eligibility
More informationContingency Planning Template
Cntingency Planning Template Prject Name: U.S. Department f Husing and Urban Develpment Octber, 2010 Cntigency Planning Template (V1.0) Ntes t the Authr [This dcument is a template f a Security Apprach
More informationTIBCO Statistica Options Configuration
TIBCO Statistica Optins Cnfiguratin Sftware Release 13.3 June 2017 Tw-Secnd Advantage Imprtant Infrmatin SOME TIBCO SOFTWARE EMBEDS OR BUNDLES OTHER TIBCO SOFTWARE. USE OF SUCH EMBEDDED OR BUNDLED TIBCO
More informationDate: October User guide. Integration through ONVIF driver. Partner Self-test. Prepared By: Devices & Integrations Team, Milestone Systems
Date: Octber 2018 User guide Integratin thrugh ONVIF driver. Prepared By: Devices & Integratins Team, Milestne Systems 2 Welcme t the User Guide fr Online Test Tl The aim f this dcument is t prvide guidance
More informationOASIS SUBMISSIONS FOR FLORIDA: SYSTEM FUNCTIONS
OASIS SUBMISSIONS FOR FLORIDA: SYSTEM FUNCTIONS OASIS SYSTEM FUNCTIONS... 2 ESTABLISHING THE COMMUNICATION CONNECTION... 2 ACCESSING THE OASIS SYSTEM... 3 SUBMITTING OASIS DATA FILES... 5 OASIS INITIAL
More informationCustodial Integrator. Release Notes. Version 3.11 (TLM)
Custdial Integratr Release Ntes Versin 3.11 (TLM) 2018 Mrningstar. All Rights Reserved. Custdial Integratr Prduct Versin: V3.11.001 Dcument Versin: 020 Dcument Issue Date: December 14, 2018 Technical Supprt:
More informationAvigilon Control Center Server User Guide. Version 6.4
Avigiln Cntrl Center Server User Guide Versin 6.4 2006-2017, Avigiln Crpratin. All rights reserved. AVIGILON, the AVIGILON lg, AVIGILON CONTROL CENTER, ACC, and TRUSTED SECURITY SOLUTIONS.AVIGILON, the
More informationWorldShip PRE-INSTALLATION INSTRUCTIONS: INSTALLATION INSTRUCTIONS: Window (if available) Install on a Single or Workgroup Workstation
PRE-INSTALLATION INSTRUCTIONS: This dcument discusses using the WrldShip DVD t install WrldShip. Yu can als install WrldShip frm the Web. G t the fllwing Web page and click the apprpriate dwnlad link:
More informationBMC Remedyforce Integration with Bomgar Remote Support
BMC Remedyfrce Integratin with Bmgar Remte Supprt 2017 Bmgar Crpratin. All rights reserved wrldwide. BOMGAR and the BOMGAR lg are trademarks f Bmgar Crpratin; ther trademarks shwn are the prperty f their
More informationBANNER BASICS. What is Banner? Banner Environment. My Banner. Pages. What is it? What form do you use? Steps to create a personal menu
BANNER BASICS What is Banner? Definitin Prduct Mdules Self-Service-Fish R Net Lg int Banner Banner Envirnment The Main Windw My Banner Pages What is it? What frm d yu use? Steps t create a persnal menu
More informationAvigilon Control Center Server User Guide. Version 6.8
Avigiln Cntrl Center Server User Guide Versin 6.8 2006-2018, Avigiln Crpratin. All rights reserved. AVIGILON, the AVIGILON lg, AVIGILON CONTROL CENTER, ACC, and TRUSTED SECURITY SOLUTIONS.AVIGILON, the
More informationEDS-Site Entry User Manual
EDS- Revisin Histry Versin Date Authr/Organizatin Descriptin 1.0 2011-06-08 Jn Pelster First Draft 2012 Gvernment f Alberta Page 2 f 14 Disclaimer In this disclaimer prvisin: Crwn means Her Majesty the
More informationAdverse Action Letters
Adverse Actin Letters Setup and Usage Instructins The FRS Adverse Actin Letter mdule was designed t prvide yu with a very elabrate and sphisticated slutin t help autmate and handle all f yur Adverse Actin
More informationIntro. to Computer Repair & Advanced Computer Repair
Intr. t Cmputer Repair & Advanced Cmputer Repair Grades 10-12 Draft Feb. 2004 Killingly Public Schls COMPUTER REPAIR Installatin, Cnfiguratin and Upgrading CONTENT STANDARD 9-12 C.R 1: The student will
More informationPrivacy Policy. Information We Collect. Information You Choose to Give Us. Information We Get When You Use Our Services
Privacy Plicy Last Mdified: September 26, 2016 Pictry is a fast and fun way t share memes with yur friends and the wrld arund yu. Yu can send a Pictry game t friends and view the pictures they submit in
More informationRELEASE NOTES. HYCU Data Protection for Nutanix
RELEASE NOTES HYCU Data Prtectin fr Nutanix Versin: 3.0.0 Prduct release date: April 2018 Dcument release date: April 2018 Legal ntices Cpyright ntice 2017 2018 HYCU. All rights reserved. This dcument
More informationDell EqualLogic PS Series Arrays: Expanding Windows Basic Disk Partitions
TECHNICAL REPORT Dell EqualLgic PS Series Arrays: Expanding Windws Basic Disk Partitins ABSTRACT This Technical Reprt describes hw t expand Micrsft Windws basic disk vlumes after increasing the size f
More informationDELL EMC PERSONALIZED SUPPORT SERVICES
DELL EMC PERSONALIZED SUPPORT SERVICES Optimize yur Dell EMC investment based n yur unique requirements ESSENTIALS Dell EMC Persnalized Supprt Services: Custmize and enhance yur Dell EMC Custmer Service
More informationADSS Server Evaluation Quick Guide
ADSS Server Evaluatin Quick Guide This dcument aims t prvide a quick d this and it wrks guide t evaluating ADSS Enterprise Server as a PDF Signing Server bth fr server-side signing and als fr client-side
More informationTroubleshooting of network problems is find and solve with the help of hardware and software is called troubleshooting tools.
Q.1 What is Trubleshting Tls? List their types? Trubleshting f netwrk prblems is find and slve with the help f hardware and sftware is called trubleshting tls. Trubleshting Tls - Hardware Tls They are
More informationManaging Your Access To The Open Banking Directory How To Guide
Managing Yur Access T The Open Banking Directry Hw T Guide Date: June 2018 Versin: v2.0 Classificatin: PUBLIC OPEN BANKING LIMITED 2018 Page 1 f 32 Cntents 1. Intrductin 3 2. Signing Up 4 3. Lgging In
More informationLiveEngage and Microsoft Dynamics Integration Guide Document Version: 1.0 September 2017
LiveEngage and Micrsft Dynamics Integratin Guide Dcument Versin: 1.0 September 2017 Cntents Intrductin... 3 Step 1: Sign Up... 3 CRM Widget Signing Up... 3 Step 2: Cnfiguring the CRM Widget... 4 Accessing
More informationCAMPBELL COUNTY GILLETTE, WYOMING
CAMPBELL COUNTY GILLETTE, WYOMING System Supprt Analyst I System Supprt Analyst II Senir System Supprt Analyst Class specificatins are intended t present a descriptive list f the range f duties perfrmed
More informationElement Creator for Enterprise Architect
Element Creatr User Guide Element Creatr fr Enterprise Architect Element Creatr fr Enterprise Architect... 1 Disclaimer... 2 Dependencies... 2 Overview... 2 Limitatins... 3 Installatin... 4 Verifying the
More informationApp Orchestration 2.6
App Orchestratin 2.6 Terminlgy in App Orchestratin 2.6 Last Updated: July 8, 2015 Page 1 Terminlgy Cntents Elements f App Orchestratin... 3 Dmains... 3 Multi-Datacenter Deplyments... 4 Delivery Sites...
More informationRefreshing Axiom TEST with a Current Copy of Production Axiom EPM June 20, 2014
Refreshing Axim TEST with a Current Cpy f Prductin Axim EPM June 20, 2014 Refreshing Axim TEST If yu maintain an Axim TEST envirnment yu will want t refresh it with a current cpy f yur PROD database when
More informationTDR and Trend Micro. Integration Guide
TDR and Trend Micr Integratin Guide i WatchGuard Technlgies, Inc. TDR and Trend Micr Deplyment Overview Threat Detectin and Respnse (TDR) is a cllectin f advanced malware defense tls that crrelate threat
More informationHPE AppPulse Mobile. Software Version: 2.1. IT Operations Management Integration Guide
HPE AppPulse Mbile Sftware Versin: 2.1 IT Operatins Management Integratin Guide Dcument Release Date: Nvember 2015 Cntents Overview: The IT Operatins Management Integratin 3 System Requirements 3 Hw t
More informationSOLA and Lifecycle Manager Integration Guide
SOLA and Lifecycle Manager Integratin Guide SOLA and Lifecycle Manager Integratin Guide Versin: 7.0 July, 2015 Cpyright Cpyright 2015 Akana, Inc. All rights reserved. Trademarks All prduct and cmpany names
More informationDIVAR IP 3000 Field Installation Guide
CCTV IP Netwrk Vide Technical Brief DIVAR IP 3000 Field Installatin Guide 1 DIVAR IP 3000 Field Installatin Guide Overview The purpse f this guide is t prvide the step-by-step prcess f installing a DIVAR
More informationTDR & Bitdefender. Integration Guide
TDR & Bitdefender Integratin Guide TDR and Bitdefender Deplyment Overview Threat Detectin and Respnse (TDR) is a cllectin f advanced malware defense tls that crrelate threat indicatrs frm Firebxes and
More informationHow to Guide. DocAve Extender for MOSS 2007 and SPS Installing DocAve Extender and Configuring a Basic SharePoint to Cloud Extension
Hw t Guide DcAve Extender fr MOSS 2007 and SPS 2010 Installing DcAve Extender and Cnfiguring a Basic SharePint t Clud Extensin This dcument is intended fr anyne wishing t familiarize themselves with the
More informationSUB-USER ADMINISTRATION HELP GUIDE
P a g e 1 SUB-USER ADMINISTRATION HELP GUIDE Welcme t Prsperity Bank. Any previusly created Sub-User lgin frm the F&M system befre Friday, May 16 cnverted t the Prsperity system. Once lgged n t the Prsperity
More informationAppendix B t Data Security Classificatin Plicy Allwed University Systems fr Data Security Classificatins Date f initial publicatin: June 6, 2017 Date f latest revisin: N/A St. Thmas Service r System Public
More informationInvestor Services Online Quick Reference Guide FTP Delivery
The File Transfer Prtcl (FTP) feature f Investr Services Online enables yu t autmatically transmit any reprt frm Investr Services Online n t yur cmpany s FTP servers thrugh a secure methd f cmmunicatin
More informationWave IP 4.5. CRMLink Desktop User Guide
Wave IP 4.5 CRMLink Desktp User Guide 2015 by Vertical Cmmunicatins, Inc. All rights reserved. Vertical Cmmunicatins and the Vertical Cmmunicatins lg and cmbinatins theref and Vertical ViewPint, Wave Cntact
More informationCONTROL-COMMAND. Software Technical Specifications for ThomX Suppliers 1.INTRODUCTION TECHNICAL REQUIREMENTS... 2
Réf. ThmX-NT-SI-CC001 Table f Cntents Sftware Technical Specificatins fr ThmX Authr : Philippe Page 1 / 9 1.INTRODUCTION... 2 2.TECHNICAL REQUIREMENTS... 2 3.DOCUMENTATION REQUIREMENTS... 4 4.COMPUTING
More information