Ellipse 8 Licence Audit. Contents

Size: px
Start display at page:

Download "Ellipse 8 Licence Audit. Contents"

Transcription

1 Licence Audit Guide

2 Ellipse 8 Licence Audit Contents Ellipse 8 Licence Audit 2 Commercial In Confidence 3 Introduction 4 Purpose 4 Scope 4 Compliance with Licence Restrictions 4 Audit Process Description 5 Process Definition 5 Ellipse 8 Audit Process 5 Session Auditing 5 Method 1 - Session Auditing Using HTTP Access Logs 5 Method 2 - Session Auditing Using the ABB Audit Service Daemon 6 Audit Period 7 Audit Report 7 Audit Algorithm, Parameters and Assumptions 7 Named Users 7 Impact of the ABB Audit Service on Running System(s) 7 Audit Deliverables 7 Instructions for Using an Audit Script 8 Preparing the Audit Script 8 List of Scripts Provided 8 Operating Instructions 8 Execution of ABB Audit Service/Daemon 8 Collect and Transfer the Logs to ABB 9 Appliance Method 9 1. Identify Guest VMs 9 2. Identify EFS path 9 3. Collect Logs 9 4. Save the Files and Provide to ABB 10 Non Appliance Method Identify Guest VMs Identify EFS path Collect Logs Save the Files and Provide to ABB 11

3 Commercial In Confidence Copyright 2018 ABB All Rights Reserved Confidential and Proprietary Legal Disclaimer The product described in this documentation may be connected to, and/or communicate information and data via, a network interface, which should be connected to a secure network. It is your sole responsibility to ensure a secure connection to the network and to establish and maintain appropriate measures (such as but not limited to the installation of firewalls, application of authentication measures, encryption of data, installation of antivirus programs, etc.) to protect the product, the network, your systems, and the interface against any kind of security breach, unauthorised access, interference, intrusion, leakage, damage, or corruption or theft of data. We are not liable for damages or losses related to any such security breach, unauthorised access, interference, intrusion, leakage, damage, or corruption or theft of data.

4 Introduction ABB Enterprise Software will, from time to time, exercise its rights to audit its customers for licence and software usage compliance as provided for in the contractual documents between the parties. After conducting a compliance audit, ABB Enterprise Software will provide an audit report documenting its findings. A copy of the audit report will be provided to the customer. The parties will then meet and discuss the contents of the audit report, including any remediation required to ensure compliance with the licence agreements in place. Purpose The purpose of the compliance audit is to determine if the customer is utilising ABB Enterprise Software as per the terms and conditions detailed within software licence agreements with ABB Enterprise Software. Compliance is determined by the collection and reporting of statistics generated from the customers production system logs. The log information is generated by the Ellipse online transaction system and accurately represents user access and application usage. This log information will form the basis of an audit report for consideration by ABB Enterprise Software and the customer in light of the current contracted terms and conditions. Scope The scope of the compliance audit covers two separate parts. 1. Compliance with licence restrictions based on Concurrent Users and Named Users. 2. Ellipse Software Usage based on modules enabled within the Ellipse 8 system. Compliance with Licence Restrictions Regardless of the licence restrictions defined within the contract between the parties, log data captured by the Ellipse transaction system logs will provide the necessary information that represents user access and will form the basis of the Ellipse user licence compliance report over a sample period of 32 days.

5 Audit Process Description The method with which the customer production environment is deployed will determine the method used to perform the compliance audit. The audit process itself involves the following steps: Review of the customer contract, customer production environment and business cycle with the customer is required to determine the parameters of the audit process and identify if any technical component upgrades are necessary. Installation and operation of an ABB provide audit service to be executed on all operating systems cooperating to provide the Ellipose runtime environment. The most typical server types are Ellipse Online, Ellipse Batch and Ellipse Web Services. The ABB audit service is non-intrusive to a customer s production system. The ABB audit service executes over a 32 day period. The ABB audit service produces log files that need to be collected and aggregated via a standard compression utility like zip/gzip. The collected logs are sent to ABB for analysis and reporting of user licence compliance and application usage. The customer should keep the logs for possible reanalysis should it be required. Preparation of the audit results such as user licence compliance report (concurrent or named user) and the application usage report. Review of the audit reports with the customer. Process Definition The following describes the overall audit process: 1. Installation of the abbauditd service. 2. Starting the abbauditd service on all the operating systems cooperating to provide the logical Ellipse environment. This includes ensuring the service (1) starts automatically on server restart (in case it occurs unplanned) and (2) continues to record session data. 3. Collect the abbauditd service log files from each of the running application operating systems (gests / VMs). 4. Collect module information from the production system. 5. Collect the last logged on user information from the production system. 6. Forward the logs to ABB for analysis. Customers may have more than one online application server running in support of production. The logs from each of application servers must be collected and forwarded to ABB. In some installations this may translate to multiple application servers across multiple Appliances. Ellipse 8 Audit Process The Ellipse 8 audit process involves extracting session statistics from each Application Server instance cooperating to provide a logical Ellipse environment, in nearly all cases this will be the live system, usually called Production. A more detailed description of the process is provided following. Session Auditing The audit is initially carried out by analysing concurrent users through the HTTP access logs which are held on the Command/Control VM in var/log/httpd (method 1). If the number of concurrent users is near to or more than the licence allows then a detailed assessment of concurrent users is done using method 2. Method 1 - Session Auditing Using HTTP Access Logs Concurrent user usage is assessed by reviewing any log that starts with audit_log existing in the var/log/httpd directory. The log needs to contain 32 or more days of usage. Steps 1. Go to var/log/httpd directory. 2. Extract copies of logs starting with audit_log. This may require performance multiple times to collect the required logs. 3. Send logs to ABB Enterprise Software (in zipped format). 4. ABB analyses logs for concurrent user levels.

6 5. ABB reviews Concurrent User licence agains concurrent user levels. 6. ABB reponds either indicating that either: a. concurrent users levels fit within licence and that concludes the Ellipse Audit. b. there is a requirement investigate the usage further, such as method 2 below. The session length is calculated to the last time user activity is recorded, even though they may still be logged in. Method 2 - Session Auditing Using the ABB Audit Service Daemon This section describes a more thorough approach to assessing concurrent users. The diagram below shows a typical Ellipse 8 environment showing the use of several servers cooperating to provide an Ellipse environment. Figure 1: Ellipse 8 Production Environment There are several types of servers that make up a running Ellipse 8 system which ABB is interested in when it comes to an Ellipse 8 audit. These include: Online (usually two or more instances in production). Ellipse Web Services (EWS). All of the above Ellipse 8 server types should have the abbauditd service installed and started. Install and start abbauditd service Task Customer Responsible

7 Collect abbauditd log files Attach ZIP file Salesforce case Process log files and produce audit report Customer Customer ABB The server types Batch and MIB do not run workloads that are the subject of an Ellipse 8 audit and therefore do NOT require installation of any services nor collection of any data. Audit Period An Ellipse licence audit should run for at least 32 days and should include at least one business month end period of processing. The abbauditd service, assuming it was installed correctly, is configured to restart automatically if the system running JBoss happens to restart for any reason. It should be noted that on restart, the abbauditd service will create new a audit directory and resume logging into the new directory. This means that at the end of the audit period, there may be several audit log folders containing valid audit data. ABB recommends that ALL audit log folders present are aggregated in the final zip sent to ABB. Audit Report ABB will analyse the log files and produce a report outlining the audit findings. A sample report titled Ellipse Sample Licence Audit Report is included with the documentation. Audit Algorithm, Parameters and Assumptions The abbauditd service collects JMX mbean attributes relating to HTTP sessions active in the JBoss server. At 30 minute intervals, a Jboss utility is used to query a JMX mbean tracking HTTP session data and the result recorded to a service log file. User log offs reduce the JMX mbean active session counter, user logons increase the JMX mbean active session counter. High values for session inactivity timeout (MSEPRF controlled) coupled with users that do not logoff will have the effect of increasing the number of concurrent users the system records. After a period of user session inactivity (MSEPRF controlled) the system will terminate a user from the system. User timeouts as a result of inactivity will have the effect of reducing the JMX mbean active session counter. Named Users The following SQL is requested to be executed on completion of the ABB audit service log data collection and included in the final bundle provided to ABB. The SQL will produce a listing of all named users that have accessed the Ellipse system and their last logged in date. The query will have no impact on the production system performance or integrity. SET PAGESIZE 50 SELECT entity, TO_CHAR(TO_DATE(MAX(last_acc_date), 'YYYYMMDD'), 'DD-MON-YYYY') AS last_login FROM msf020 WHERE entry_type = 'S' AND last_acc_date > '19%' GROUP BY entity ORDER BY max(last_acc_date); SPOOL OFF; Impact of the ABB Audit Service on Running System(s) The abbauditd service is configured to collect a small group of very specific runtime statistics using a standard JBoss utility at an sampling interval (30mins) well below any rate of sampling that might impact system operations. The abbauditd service can therefore be started at any time and will not cause any adverse system performance. The abbauditd service will accumulate approximately 2MB per day per operating system running the service. Audit Deliverables An audit report will be produced and will contain the following information. 1. Audit log details, period of capture, and various audit file statistics. 2. A table of the Maximum Concurrent users for each day of the audit period.

8 3. A graph showing a typical day during the audit period. 4. A list of all the users who have used the system during the audit period. 5. A list of the software modules that are active during the period. Instructions for Using an Audit Script This section outlines the installation and usage of the Ellipse session audit script. Do not attempt to upgrade any appliance during the audit period. Maintenance activities on the Appliance should be limited to restarting the virtual machines (VM) only. Preparing the Audit Script List of Scripts Provided audit.sh abbauditd Operating Instructions 1. Copy the audit.sh and abbauditd script to each Appliance host. 2. Set the APPLIANCE_HOST_FQDN variable to the fully qualified hostname of the appliance. Any string that uniquely identifies one Appliance from another is all that is required here. Figure 1: Set the Appliance Host 3. Copy the updated script for each of the Appliance VM to the following location: scp audit.sh [target_vm]:/usr/local/bin/ scp abbauditd [target_vm]:/etc/init.d/ 4. Execute the following command for each of the Appliance VM. ssh [target_vm] 'chmod +x /usr/local/bin/audit.sh' ssh [target_vm] 'chmod +x /etc/init.d/abbauditd' ssh [target_vm] 'chkconfig --add abbauditd && chkconfig abbauditd on' Execution of ABB Audit Service/Daemon Using SSH, login to each Ellipse guest VM associated with the Ellipse environment to be audited. In a clustered Appliance topology (more than one physical Appliance serving production workload), this typically translates to anywhere from 2-4 guests / operating systems (eg. ellipse01, ellipse02, ellips03 and ews01) per Appliance. To start the ABB audit service, issue the following command as root: service abbauditd start To verify that the ABB audit service is running, issue the following command as root: service abbauditd status

9 Collect and Transfer the Logs to ABB The following approach is used to collect and forward the log files from each Ellipse environment (in-stance) to ABB for analysis. 1. Identify Guest VMs. 2. Identify EFS path. 3. Collect Logs. This step needs to be done for each environment. 4. Save the files and provide to ABB. ABB are then able to produce a licence auditing report that can be provided to customers. All of these files will be found either in the Ellipse file system directory, or in the JBoss server directory. These need to be collected for each environment that is created. Appliance Method To locate the Ellipse log files for an appliance based installation running a Linux/JBoss deployment use the following information. 1. Identify Guest VMs Each environment (instance) created requires logs to be collected. For example: Development Test Support Production 2. Identify EFS path The EFS path can be in the following directories depending on the appliance version. For an Ellipse 8.4+ appliance, ellipse.fs.root will be: /appliance/data/efs. For an Ellipse 8.3 appliance, ellipse.fs.root will be: /mincom/data/efs. ellipse.fs.root is a JVM system property defined for every Ellipse online, batch and EWS server instance. The hostname is the fully qualified host name of the instance and is of the form servertypeservertypeseq.environmentname.domain..note:: servertype and servertypeseq have no delimiter between them in the formation of the host-name. domain is internal for Ellipse 8.3 and ventyxinternal for Ellipse You will need to iterate through all occurrences of servertype and servertypeseq for the target envi-ronmentname. For example the support environment. ellipse01.el83sup.internal. 3. Collect Logs The required audit logs are located in: <ELLIPSE_FS_ROOT>/<ENVIRONMENT_NAME>/log/<HOSTNAME>-ports-default/ For example: /mincom/data/efs/el83sup/log/ellipse01.el83sup.internal-ports-default The required monitoring logs are located in:

10 <ELLIPSE_FS_ROOT>/<ENVIRONMENT_NAME>/monitoring/<HOSTNAME>/ For example: /mincom/data/efs/el83sup/monitoring/ellipse01.el83sup.internal 4. Save the Files and Provide to ABB To save the log files: 1. From the environmentname directory create a compressed file containing the relevant hostname subdirectories. 2. Ensure that you select the subdirectories of log and monitoring for the Ellipse instances that are to be analysed: [root@ellipse01 efs]# zip -r /tmp/el83sup_logs.zip \ log/ellipse01.el83sup.internal-ports-default \ monitoring/ellipse01.el83sup.internal 3. Zip the monitoring and log files for that environment. 4. Go to the next environment and perform steps 1 to 3 until all environments are collected. 5. When all compressed files have been created, ship them to ABB using the following information: Subject: Licence Audit Logs for Review < address> Text: The attached zip file contains the Licence Audit logs for <company name> and has been virus checked prior to sending Non Appliance Method To locate the Ellipse log files for a non-appliance based installation running a Linux/JBoss deploy-ment use the following information. 1. Identify Guest VMs The following VM s require logs to be collected: Ellipse Online Ellipse Batch Ellipse EWS 2. Identify EFS path The EFS path is in the following directory in the appliance version. For an Ellipse 8.5+ non appliance, refer to ellipse.conf: /etc/jboss-as/ellipse.conf For an Ellipse 8.3 and Ellipse 8.4 non appliance, refer to run.conf within the JBoss install directory: <INSTALL_DIR>/jboss GA/bin/run.conf ellipse.fs.root is a JVM system property defined for every Ellipse online, batch and EWS server instance. You will need to iterate through all hosts within each environment. For example the support environment is el83sup. 3. Collect Logs The required audit logs are located in: <ELLIPSE_FS_ROOT>/<ENVIRONMENT_NAME>/log/<HOSTNAME>-ports-default/ For example: /mincom/data/efs/el83sup/log/ellipse01.el83sup.internal-ports-default The required monitoring logs are located in:

11 <ELLIPSE_FS_ROOT>/<ENVIRONMENT_NAME>/monitoring/<HOSTNAME>/ For example: /mincom/data/efs/el83sup/monitoring/ellipse01.el83sup.internal 4. Save the Files and Provide to ABB To save the log files: 1. From the environmentname directory create a ZIP file containing the relevant hostname sub-directories. 2. Ensure that you select the subdirectories of log and monitoring for the Ellipse instances that are to be analysed: [root@ellipse01 efs]# zip -r /tmp/el83sup_logs.zip \ log/ellipse01.el83sup.internal-ports-default \ monitoring/ellipse01.el83sup.internal 3. Zip the monitoring and log files for that environment. 4. Go to the next environment and perform steps 1 to 3 until all environments are collected. 5. When all compressed files have been created, ship them to ABB using the following information: Subject: Licence Audit Logs for Review < address> Text: The attached zip file contains the Licence Audit logs for <company name> and has been virus checked prior to sending.

Ellipse Support. Contents

Ellipse Support. Contents Ellipse Support Ellipse Support Contents Ellipse Support 2 Commercial In Confidence 3 Preface 4 Mission 5 Scope 5 Introduction 6 What do you need to know about tuning and configuration? 6 How does a customer

More information

Ellipse Legacy Conversion Guide

Ellipse Legacy Conversion Guide Ellipse Legacy Conversion Guide Ellipse 8 Legacy Conversion Guide Contents Ellipse 8 Legacy Conversion Guide 2 Commercial In Confidence 3 Conversion for Ellipse versions 5 & 6 to 8 4 Additional Components

More information

Ellipse Web Services Overview

Ellipse Web Services Overview Ellipse Web Services Overview Ellipse Web Services Overview Contents Ellipse Web Services Overview 2 Commercial In Confidence 3 Introduction 4 Purpose 4 Scope 4 References 4 Definitions 4 Background 5

More information

Develop Java Webservice Client

Develop Java Webservice Client Develop Java Webservice Client Develop Java Webservice Client Contents Develop Java Webservice Client 2 Commercial In Confidence 3 Preface 4 Summary information 4 Confidentiality 4 Document Control 4 Who

More information

VIP Troubleshooting Guide

VIP Troubleshooting Guide VIP Troubleshooting Guide EIP Trouble Shooting Guide Contents EIP Trouble Shooting Guide 2 Commercial In Confidence 3 Preface Information 4 Overview 5 Server Tuning and Troubleshooting 6 Memory Settings

More information

LinkOne Webview Setup Guide

LinkOne Webview Setup Guide LinkOne Webview Setup Guide LinkOne Webview - Integration with Ellipse 8 Contents LinkOne Webview - Integration with Ellipse 8 2 Commercial In Confidence 3 Preface 4 Summary information 4 Confidentiality

More information

esoms Suite / Mobile Operator Rounds User Guide

esoms Suite / Mobile Operator Rounds User Guide esoms Suite / Mobile Operator Rounds User Guide Release 2.2 GMDDB-1008-1606-03 June 2016 Copyright 2016 ABB All Rights Reserved Confidential and Proprietary June 2016 Legal Disclaimer The product described

More information

CounterACT VMware vsphere Plugin

CounterACT VMware vsphere Plugin CounterACT VMware vsphere Plugin Configuration Guide Version 2.0.0 Table of Contents About VMware vsphere Integration... 4 Use Cases... 4 Additional VMware Documentation... 4 About this Plugin... 5 What

More information

Product Guide Revision B. McAfee Cloud Workload Security 5.0.0

Product Guide Revision B. McAfee Cloud Workload Security 5.0.0 Product Guide Revision B McAfee Cloud Workload Security 5.0.0 COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee

More information

EIP Installation Guide

EIP Installation Guide EIP Installation Guide Ellipse Integration Platform Installation Guide Contents Ellipse Integration Platform Installation Guide 2 Commercial In Confidence 4 Preface 5 Summary Information 5 Confidentiality

More information

VMware AirWatch Content Gateway for Linux. VMware Workspace ONE UEM 1811 Unified Access Gateway

VMware AirWatch Content Gateway for Linux. VMware Workspace ONE UEM 1811 Unified Access Gateway VMware AirWatch Content Gateway for Linux VMware Workspace ONE UEM 1811 Unified Access Gateway You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/

More information

Synchronizer Installation Notes and Examples

Synchronizer Installation Notes and Examples .1 November 2017 Table of Contents Pre-Install Integration Decisions Page 4 Synchronizer Installer Walk-Through Page 24 Synchronizer Integration Points Page 5 First Few Screens Page 25 Install-Time Integration

More information

EventTracker: Virtual Appliance

EventTracker: Virtual Appliance EventTracker: Virtual Appliance Quick Start Guide Version 8.1 Build 9 Publication Date: Feb. 8, 2016 EventTracker 8815 Centre Park Drive Columbia MD 21045 www.eventtracker.com Abstract The EventTracker

More information

EventTracker: Virtual Appliance

EventTracker: Virtual Appliance Quick Start Guide Version 7.6 Publication Date: Sep 18, 2014 EventTracker 8815 Centre Park Drive Columbia MD 21045 www.eventtracker.com Abstract The EventTracker Virtual Appliance enables you to capture

More information

Catalogue Adapter. Contents

Catalogue Adapter. Contents Catalogue Adapter Catalogue Adapter Contents Catalogue Adapter 2 Commercial In Confidence 3 Catalogue Adapter 4 Overview 4 OAGIS Message 4 Foreign Keys 4 Concurrent Updates 4 Methods 4 Sync 4 Sync Message

More information

An Oracle White Paper October Release Notes - V Oracle Utilities Application Framework

An Oracle White Paper October Release Notes - V Oracle Utilities Application Framework An Oracle White Paper October 2012 Release Notes - V4.2.0.0.0 Oracle Utilities Application Framework Introduction... 2 Disclaimer... 2 Deprecation of Functionality... 2 New or Changed Features... 4 Native

More information

SECURITY DOCUMENT. 550archi

SECURITY DOCUMENT. 550archi SECURITY DOCUMENT 550archi Documentation for XTM Version 10.3 Published by XTM International Ltd. Copyright XTM International Ltd. All rights reserved. No part of this publication may be reproduced or

More information

Cyber Security Advisory

Cyber Security Advisory Ellipse201703 2017-11-27 English 1.0 1/7 Ellipse8 Security Vulnerability ABBVU-PSSW-201703 Update Date: 11/21/2017 Notice The information in this document is subject to change without notice, and should

More information

Installing Enterprise Switch Manager

Installing Enterprise Switch Manager Installing Enterprise Switch Manager NN47300-300 Document status: Standard Document version: 0401 Document date: 26 March 2008 All Rights Reserved The information in this document is subject to change

More information

c360 Audit Installation Guide

c360 Audit Installation Guide c360 Audit Installation Guide Microsoft Dynamics CRM 4.0 compatible c360 Solutions, Inc. www.c360.com Products@c360.com Table of Contents c360 Audit Installation Guide... 1 Table of Contents... 2 Overview

More information

Symantec Ghost Solution Suite Web Console - Getting Started Guide

Symantec Ghost Solution Suite Web Console - Getting Started Guide Symantec Ghost Solution Suite Web Console - Getting Started Guide Symantec Ghost Solution Suite Web Console- Getting Started Guide Documentation version: 3.3 RU1 Legal Notice Copyright 2019 Symantec Corporation.

More information

WELCOME TO ITIL FOUNDATIONS PREP CLASS AUBREY KAIGLER

WELCOME TO ITIL FOUNDATIONS PREP CLASS AUBREY KAIGLER WELCOME TO ITIL FOUNDATIONS PREP CLASS AUBREY KAIGLER 2 Demand Management Demand management: The process used to make investmentrelated decisions across the enterprise. Pattern Pattern of of Business Activity

More information

IT Services IT LOGGING POLICY

IT Services IT LOGGING POLICY IT LOGGING POLICY UoW IT Logging Policy -Restricted- 1 Contents 1. Overview... 3 2. Purpose... 3 3. Scope... 3 4. General Requirements... 3 5. Activities to be logged... 4 6. Formatting, Transmission and

More information

VMware AirWatch Content Gateway Guide for Linux For Linux

VMware AirWatch Content Gateway Guide for Linux For Linux VMware AirWatch Content Gateway Guide for Linux For Linux Workspace ONE UEM v9.7 Have documentation feedback? Submit a Documentation Feedback support ticket using the Support Wizard on support.air-watch.com.

More information

EventTracker: Virtual Appliance

EventTracker: Virtual Appliance Quick Start Guide Version 7.5 Publication Date: Nov 18, 2013 EventTracker 8815 Centre Park Drive Columbia MD 21045 www.eventtracker.com About This Guide Abstract The EventTracker Virtual Appliance enables

More information

Acceptable Use and Publishing Policy

Acceptable Use and Publishing Policy 1. Purpose This Policy outlines the principles, guidelines and requirements of acceptable use of and publishing to ecreators Pty Ltd (ecreators) hosting products and services. The purpose of this Policy

More information

Centrix WorkSpace Discovery Installation Guide. Version 1.0

Centrix WorkSpace Discovery Installation Guide. Version 1.0 Centrix WorkSpace Discovery Installation Guide Version 1.0 The latest software version and documentation for this product can be downloaded here: http://www.centrixsoftware.com/downloads/discovery If you

More information

Pacific Knowledge Systems. RippleDown Deployment Guide: v8.0.5

Pacific Knowledge Systems. RippleDown Deployment Guide: v8.0.5 Pacific Knowledge Systems RippleDown Deployment Guide: v8.0.5 Copyright Notice The information provided in this User's Guide is subject to change without notice and is not a commitment by Pacific Knowledge

More information

Protection! User Guide. A d m i n i s t r a t o r G u i d e. v L i c e n s i n g S e r v e r. Protect your investments with Protection!

Protection! User Guide. A d m i n i s t r a t o r G u i d e. v L i c e n s i n g S e r v e r. Protect your investments with Protection! jproductivity LLC Protect your investments with Protection! User Guide Protection! L i c e n s i n g S e r v e r v 4. 9 A d m i n i s t r a t o r G u i d e tm http://www.jproductivity.com Notice of Copyright

More information

Ensuring Desktop Central Compliance to Payment Card Industry (PCI) Data Security Standard

Ensuring Desktop Central Compliance to Payment Card Industry (PCI) Data Security Standard Ensuring Desktop Central Compliance to Payment Card Industry (PCI) Data Security Standard Introduction Manage Engine Desktop Central is part of ManageEngine family that represents entire IT infrastructure

More information

Service Level Agreement (SLA) and Service Level Objectives (SLO)

Service Level Agreement (SLA) and Service Level Objectives (SLO) Service Level Agreement (SLA) and Service Level Objectives (SLO) Ver 1.4 Table of Contents 1. Overview.... 3 2. Definitions.... 3 3. Credit Standards... 3 3.1 Datacenter... 4 3.2 Infrastructure... 4 3.3

More information

A: Administering System Center Configuration Manager

A: Administering System Center Configuration Manager 20703-1A: Administering System Center Configuration Manager Duration: 5 days; Instructor-led WHAT YOU WILL LEARN This five-day course describes how to use Configuration Manager and its associated site

More information

ForeScout CounterACT. Plugin. Configuration Guide. Version 2.1

ForeScout CounterACT. Plugin. Configuration Guide. Version 2.1 ForeScout CounterACT Hybrid Cloud Module: VMware vsphere Plugin Version 2.1 Table of Contents About VMware vsphere Integration... 4 Use Cases... 4 Additional VMware Documentation... 4 About this Plugin...

More information

Installing Enterprise Switch Manager

Installing Enterprise Switch Manager Installing Enterprise Switch Manager ATTENTION Clicking on a PDF hyperlink takes you to the appropriate page If necessary, scroll up or down the page to see the beginning of the referenced section NN47300-300

More information

Read the following information carefully, before you begin an upgrade.

Read the following information carefully, before you begin an upgrade. Read the following information carefully, before you begin an upgrade. Review Supported Upgrade Paths, page 1 Review Time Taken for Upgrade, page 1 Review Available Cisco APIC-EM Ports, page 2 Securing

More information

vcloud Usage Meter 3.5 User's Guide vcloud Usage Meter 3.5

vcloud Usage Meter 3.5 User's Guide vcloud Usage Meter 3.5 vcloud Usage Meter 3.5 User's Guide vcloud Usage Meter 3.5 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ If you have comments about this documentation,

More information

SCADAvantage Version Product update

SCADAvantage Version Product update SCADAvantage Version 5.6.1 Product update NOTICE This document contains information about one or more ABB products and may include a description of or a reference to one or more standards that may be

More information

vsphere Replication for Disaster Recovery to Cloud

vsphere Replication for Disaster Recovery to Cloud vsphere Replication for Disaster Recovery to Cloud vsphere Replication 6.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced

More information

Installing and Configuring VMware Identity Manager Connector (Windows) OCT 2018 VMware Identity Manager VMware Identity Manager 3.

Installing and Configuring VMware Identity Manager Connector (Windows) OCT 2018 VMware Identity Manager VMware Identity Manager 3. Installing and Configuring VMware Identity Manager Connector 2018.8.1.0 (Windows) OCT 2018 VMware Identity Manager VMware Identity Manager 3.3 You can find the most up-to-date technical documentation on

More information

KYOCERA Net Admin User Guide

KYOCERA Net Admin User Guide KYOCERA Net Admin User Guide Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held liable

More information

Licensing the Application CHAPTER

Licensing the Application CHAPTER CHAPTER 5 Licensing Application, Configuring E-mail, Cisco.com, Proxy Settings, RCP, SCP Settings, Security, Backup, Authentication Settings and Idle Timeout Settings, Browser and Server Security Mode

More information

Abstract. Avaya Solution & Interoperability Test Lab

Abstract. Avaya Solution & Interoperability Test Lab Avaya Solution & Interoperability Test Lab Application Notes for configuring blackchair Spotlight Session Manager Audit V6 with Avaya Aura System Manager R7.1 and Avaya Aura Session Manager R7.1 Issue

More information

CounterACT VMware vsphere Plugin

CounterACT VMware vsphere Plugin Configuration Guide Version 2.0.1 Table of Contents About VMware vsphere Integration... 4 Use Cases... 4 Additional VMware Documentation... 4 About this Plugin... 5 What to Do... 5 Requirements... 5 CounterACT

More information

Cloudera s Enterprise Data Hub on the Amazon Web Services Cloud: Quick Start Reference Deployment October 2014

Cloudera s Enterprise Data Hub on the Amazon Web Services Cloud: Quick Start Reference Deployment October 2014 Cloudera s Enterprise Data Hub on the Amazon Web Services Cloud: Quick Start Reference Deployment October 2014 Karthik Krishnan Page 1 of 20 Table of Contents Table of Contents... 2 Abstract... 3 What

More information

Deploying VMware Identity Manager in the DMZ. JULY 2018 VMware Identity Manager 3.2

Deploying VMware Identity Manager in the DMZ. JULY 2018 VMware Identity Manager 3.2 Deploying VMware Identity Manager in the DMZ JULY 2018 VMware Identity Manager 3.2 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ If you have

More information

DameWare Server. Administrator Guide

DameWare Server. Administrator Guide DameWare Server Administrator Guide About DameWare Contact Information Team Contact Information Sales 1.866.270.1449 General Support Technical Support Customer Service User Forums http://www.dameware.com/customers.aspx

More information

McAfee Cloud Workload Security Product Guide

McAfee Cloud Workload Security Product Guide Revision B McAfee Cloud Workload Security 5.1.0 Product Guide (McAfee epolicy Orchestrator) COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection,

More information

PlateSpin Transformation Manager Appliance Guide. June 2018

PlateSpin Transformation Manager Appliance Guide. June 2018 PlateSpin Transformation Manager Appliance Guide June 2018 Legal Notice For information about legal notices, trademarks, disclaimers, warranties, export and other use restrictions, U.S. Government rights,

More information

vsphere Replication for Disaster Recovery to Cloud vsphere Replication 6.5

vsphere Replication for Disaster Recovery to Cloud vsphere Replication 6.5 vsphere Replication for Disaster Recovery to Cloud vsphere Replication 6.5 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ If you have comments

More information

Sparta Systems TrackWise Digital Solution

Sparta Systems TrackWise Digital Solution Systems TrackWise Digital Solution 21 CFR Part 11 and Annex 11 Assessment February 2018 Systems TrackWise Digital Solution Introduction The purpose of this document is to outline the roles and responsibilities

More information

Veritas NetBackup OpenStorage Solutions Guide for Disk

Veritas NetBackup OpenStorage Solutions Guide for Disk Veritas NetBackup OpenStorage Solutions Guide for Disk UNIX, Windows, Linux Release 8.0 Veritas NetBackup OpenStorage Solutions Guide for Disk Legal Notice Copyright 2016 Veritas Technologies LLC. All

More information

ForeScout Extended Module for Palo Alto Networks Next Generation Firewall

ForeScout Extended Module for Palo Alto Networks Next Generation Firewall ForeScout Extended Module for Palo Alto Networks Next Generation Firewall Version 1.2 Table of Contents About the Palo Alto Networks Next-Generation Firewall Integration... 4 Use Cases... 4 Roll-out Dynamic

More information

Exchange Online Technical Overview. CCAP Exchange Online Overview 10/27/ /28/2011

Exchange Online Technical Overview. CCAP Exchange Online Overview 10/27/ /28/2011 Exchange Online Technical Overview CCAP Exchange Online Overview 10/27/2011-10/28/2011 Exchange Online: Trusted, Familiar and Robust Co-Existence 2 Microsoft Confidential The Benefits of Exchange Online

More information

vcloud Usage Meter User's Guide 3.5

vcloud Usage Meter User's Guide 3.5 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of this document, see http://www.vmware.com/support/pubs.

More information

System 800xA Public Address System User Manual

System 800xA Public Address System User Manual System 800xA Public Address System User Manual System Version 6.0 Power and productivity for a better world System 800xA Public Address System User Manual System Version 6.0 NOTICE This document contains

More information

CloudLink SecureVM. Administration Guide. Version 4.0 P/N REV 01

CloudLink SecureVM. Administration Guide. Version 4.0 P/N REV 01 CloudLink SecureVM Version 4.0 Administration Guide P/N 302-002-056 REV 01 Copyright 2015 EMC Corporation. All rights reserved. Published June 2015 EMC believes the information in this publication is accurate

More information

DEPLOYMENT ROADMAP May 2015

DEPLOYMENT ROADMAP May 2015 DEPLOYMENT ROADMAP May 2015 Copyright and Disclaimer This document, as well as the software described in it, is furnished under license of the Instant Technologies Software Evaluation Agreement and may

More information

Archiving Service Reports Guide

Archiving Service Reports Guide Email Archiving Service Reports Guide This guide is for Compliance and IT administrators reporting on the Email Archiving service. Service Version: ArchivingP_3.5 2009-07-31 Copyrights This documentation

More information

Course A: Administering System Center Configuration Manager

Course A: Administering System Center Configuration Manager Course 20703-1A: Administering System Center Configuration Manager Overview: This five-day course describes how to use Configuration Manager and its associated site systems to efficiently manage network

More information

Position Opening Adapter

Position Opening Adapter Position Opening Adapter Position Opening Adapter Contents Position Opening Adapter 2 Commercial In Confidence 3 Position Opening Adapter 4 Overview 4 Events 4 OAGIS Message 4 Foreign Keys 5 Concurrent

More information

How Managed File Transfer Addresses HIPAA Requirements for ephi

How Managed File Transfer Addresses HIPAA Requirements for ephi How Managed File Transfer Addresses HIPAA Requirements for ephi INTRODUCTION These new requirements have effectively made traditional File Transfer Protocol (FTP) file sharing ill-advised, if not obsolete.

More information

Netwrix Auditor Add-on for Nutanix Files

Netwrix Auditor Add-on for Nutanix Files Netwrix Auditor Add-on for Nutanix Files Quick-Start Guide Version: 9.7 11/27/2018 Legal Notice The information in this publication is furnished for information use only, and does not constitute a commitment

More information

Prerequisites for Using Enterprise Manager with Your Primavera Applications

Prerequisites for Using Enterprise Manager with Your Primavera Applications Oracle Enterprise Manager For Oracle Construction and Engineering Configuration Guide for On Premises Version 18 August 2018 Contents Introduction... 5 Prerequisites for Using Enterprise Manager with

More information

vsphere Replication for Disaster Recovery to Cloud vsphere Replication 8.1

vsphere Replication for Disaster Recovery to Cloud vsphere Replication 8.1 vsphere Replication for Disaster Recovery to Cloud vsphere Replication 8.1 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ If you have comments

More information

PCI DSS. Compliance and Validation Guide VERSION PCI DSS. Compliance and Validation Guide

PCI DSS. Compliance and Validation Guide VERSION PCI DSS. Compliance and Validation Guide PCI DSS VERSION 1.1 1 PCI DSS Table of contents 1. Understanding the Payment Card Industry Data Security Standard... 3 1.1. What is PCI DSS?... 3 2. Merchant Levels and Validation Requirements... 3 2.1.

More information

Sophos Enterprise Console

Sophos Enterprise Console advanced startup guide Product Version: 5.5 Contents About this guide... 1 Planning installation... 2 Planning the installation of Enterprise Console... 2 Planning database security... 4 Planning the computer

More information

Microsoft Exchange Server 2007 Implementation and Maintenance

Microsoft Exchange Server 2007 Implementation and Maintenance Microsoft Exchange Server 2007 Implementation and Maintenance Chapter 1 Exchange Server 2007 Deployment 1.1 Overview, Hardware & Editions 1.2 Exchange Server, Windows & Active Directory 1.3 Administration

More information

MOC 6232A: Implementing a Microsoft SQL Server 2008 Database

MOC 6232A: Implementing a Microsoft SQL Server 2008 Database MOC 6232A: Implementing a Microsoft SQL Server 2008 Database Course Number: 6232A Course Length: 5 Days Course Overview This course provides students with the knowledge and skills to implement a Microsoft

More information

USER GUIDE. Backup and Recovery for Nutanix

USER GUIDE. Backup and Recovery for Nutanix USER GUIDE Backup and Recovery for Nutanix Version: 1.5.2 Product release date: October 2017 Document release date: October 2017 Legal notices Copyright notice 2017 Comtrade Software. All rights reserved.

More information

ADMINISTERING SYSTEM CENTER CONFIGURATION MANAGER

ADMINISTERING SYSTEM CENTER CONFIGURATION MANAGER ADMINISTERING SYSTEM CENTER CONFIGURATION MANAGER Course Code: 20703-1a Duration 5 days Introduction This five-day course describes how to use Configuration and its associated site systems to efficiently

More information

MD-101: Modern Desktop Administrator Part 2

MD-101: Modern Desktop Administrator Part 2 Days: 5 Description: This five-day course is for Desktop Administrators that deploy, configure, secure, manage, and monitor devices and client applications in an enterprise environment. As desktops has

More information

File Reputation Filtering and File Analysis

File Reputation Filtering and File Analysis This chapter contains the following sections: Overview of, page 1 Configuring File Reputation and Analysis Features, page 5 File Reputation and File Analysis Reporting and Tracking, page 14 Taking Action

More information

UPGRADE GUIDE. Campaign Manager 6.0

UPGRADE GUIDE. Campaign Manager 6.0 UPGRADE GUIDE Campaign Manager 6.0 VERSION CONTROL Version Date Author Changes 1.0 28 April 2017 D Cooper Release RELATED DOCUMENTS The related documents are located in the Alterian product help. Name

More information

Your guide to the Payment Card Industry Data Security Standard (PCI DSS) banksa.com.au

Your guide to the Payment Card Industry Data Security Standard (PCI DSS) banksa.com.au Your guide to the Payment Card Industry Data Security Standard (PCI DSS) 1 13 13 76 banksa.com.au CONTENTS Page Contents 1 Introduction 2 What are the 12 key requirements of PCIDSS? 3 Protect your business

More information

Oil and Gas SCADAvantage TM Product Update version ABB

Oil and Gas SCADAvantage TM Product Update version ABB Oil and Gas SCADAvantage TM Product Update version 5.6.3 ABB 3 SCADAvantage Product Update version 5.6.3 Notice Trademarks This document contains information about one or more ABB products and may include

More information

Administering System Center Configuration Manager

Administering System Center Configuration Manager Administering System Center Configuration Manager Course 20703-1A 5 Days Instructor-led, Hands on Course Information This five-day course describes how to use Configuration Manager and its associated site

More information

WHITE PAPER: BEST PRACTICES. Sizing and Scalability Recommendations for Symantec Endpoint Protection. Symantec Enterprise Security Solutions Group

WHITE PAPER: BEST PRACTICES. Sizing and Scalability Recommendations for Symantec Endpoint Protection. Symantec Enterprise Security Solutions Group WHITE PAPER: BEST PRACTICES Sizing and Scalability Recommendations for Symantec Rev 2.2 Symantec Enterprise Security Solutions Group White Paper: Symantec Best Practices Contents Introduction... 4 The

More information

Dell EMC Ready System for VDI on VxRail

Dell EMC Ready System for VDI on VxRail Dell EMC Ready System for VDI on VxRail Citrix XenDesktop for Dell EMC VxRail Hyperconverged Appliance April 2018 H16968.1 Deployment Guide Abstract This deployment guide provides instructions for deploying

More information

Dell EMC Ready Architectures for VDI

Dell EMC Ready Architectures for VDI Dell EMC Ready Architectures for VDI Designs for Citrix XenDesktop and XenApp for Dell EMC XC Family September 2018 H17388 Deployment Guide Abstract This deployment guide provides instructions for deploying

More information

1.0. Quest Enterprise Reporter Discovery Manager USER GUIDE

1.0. Quest Enterprise Reporter Discovery Manager USER GUIDE 1.0 Quest Enterprise Reporter Discovery Manager USER GUIDE 2012 Quest Software. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide

More information

Administering System Center Configuration Manager

Administering System Center Configuration Manager Administering System Center Configuration Manager 20703-1; 5 Days; Instructor-led Course Description This five-day course describes how to use Configuration Manager and its associated site systems to efficiently

More information

EURONEXT FILE SERVICES

EURONEXT FILE SERVICES EURONEXT FILE SERVICES Scope and audience: This technical note intends to provide general technical information about Euronext s File Services (EFS), a file service mechanism that will be used during the

More information

SDR Guide to Complete the SDR

SDR Guide to Complete the SDR I. General Information You must list the Yale Servers & if Virtual their host Business Associate Agreement (BAA ) in place. Required for the new HIPAA rules Contract questions are critical if using 3 Lock

More information

CounterACT Macintosh/Linux Property Scanner Plugin

CounterACT Macintosh/Linux Property Scanner Plugin CounterACT Macintosh/Linux Property Scanner Plugin Version 7.0.1 and Above Table of Contents About the Macintosh/Linux Property Scanner Plugin... 4 Requirements... 4 Supported Operating Systems... 4 Accessing

More information

NetScaler for Apps and Desktops CNS-222; 5 Days; Instructor-led

NetScaler for Apps and Desktops CNS-222; 5 Days; Instructor-led NetScaler for Apps and Desktops CNS-222; 5 Days; Instructor-led Course Description Designed for students with little or no previous NetScaler, NetScaler Gateway or Unified Gateway experience, this course

More information

vrealize Suite Lifecycle Manager 1.0 Installation and Management vrealize Suite 2017

vrealize Suite Lifecycle Manager 1.0 Installation and Management vrealize Suite 2017 vrealize Suite Lifecycle Manager 1.0 Installation and Management vrealize Suite 2017 vrealize Suite Lifecycle Manager 1.0 Installation and Management You can find the most up-to-date technical documentation

More information

Goverlan Remote Administration Suite

Goverlan Remote Administration Suite manage IT complexity simply REMOTE ADMINISTRATION SUITE Goverlan Remote Administration Suite IT Governance made easy Get broad-scope, enterprise-level administration of your users & machines along with

More information

CS 356 Operating System Security. Fall 2013

CS 356 Operating System Security. Fall 2013 CS 356 Operating System Security Fall 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists Chapter 5 Database

More information

BSA Sizing Guide v. 1.0

BSA Sizing Guide v. 1.0 Best Practices & Architecture BSA Sizing Guide v. 1.0 For versions 8.5-8.7 Nitin Maini, Sean Berry 03 May 2016 Table of Contents Purpose & Audience 3 Scope 3 Capacity & Workload Basics 3 BSA Basics...

More information

Installing Cisco Virtual Switch Update Manager

Installing Cisco Virtual Switch Update Manager This chapter contains the following sections: Information About Cisco Virtual Switch Update Manager, page 1 Compatibility Information for Cisco VSUM, page 1 System Requirements Cisco VSUM, page 2 Prerequisites,

More information

The Balabit s Privileged Session Management 5 F5 Azure Reference Guide

The Balabit s Privileged Session Management 5 F5 Azure Reference Guide The Balabit s Privileged Session Management 5 F5 Azure Reference Guide March 12, 2018 Abstract Administrator Guide for Balabit s Privileged Session Management (PSM) Copyright 1996-2018 Balabit, a One Identity

More information

Installing Cisco Virtual Switch Update Manager

Installing Cisco Virtual Switch Update Manager This chapter contains the following sections: Information About Cisco Virtual Switch Update Manager, page 1 Compatibility Information for Cisco Virtual Switch Update Manager, page 1 System Requirements

More information

Sophos Enterprise Console advanced startup guide

Sophos Enterprise Console advanced startup guide Sophos Enterprise Console advanced startup guide For distributed installations Product version: 5.3 Document date: April 2015 Contents 1 About this guide...4 2 Planning installation...5 2.1 Planning the

More information

means an integration element to a certain software, format or function through use of the HP software product.

means an integration element to a certain software, format or function through use of the HP software product. Additional License Authorizations For HP Automation Center software products Products and suites covered Products E-LTU or E-Media available * Non-Production use category ** HP Automation Insight Yes Class

More information

SailPoint IdentityIQ Integration with the BeyondInsight Platform. Providing Complete Visibility and Auditing of Identities

SailPoint IdentityIQ Integration with the BeyondInsight Platform. Providing Complete Visibility and Auditing of Identities SailPoint IdentityIQ Integration with the BeyondInsight Platform Providing Complete Visibility and Auditing of Identities Table of Contents Executive Summary... 3 Identity and Access Management... 5 BeyondTrust

More information

Cisco Meeting Management

Cisco Meeting Management Cisco Meeting Management Cisco Meeting Management 1.1 User Guide for Administrators September 19, 2018 Cisco Systems, Inc. www.cisco.com Contents 1 Introduction 4 1.1 The software 4 2 Deployment overview

More information

CloudShell 7.1 GA. Installation Guide. Release Date: September Document Version: 2.0

CloudShell 7.1 GA. Installation Guide. Release Date: September Document Version: 2.0 CloudShell 7.1 GA Installation Guide Release Date: September 2016 Document Version: 2.0 Legal notice Information in this document is subject to change without notice. Without limiting the rights under

More information

DATA PROCESSING TERMS

DATA PROCESSING TERMS DATA PROCESSING TERMS Safetica Technologies s.r.o. These Data Processing Terms (hereinafter the Terms ) govern the rights and obligations between the Software User (hereinafter the User ) and Safetica

More information

Certification Report

Certification Report Certification Report EAL 4+ Evaluation of Firewall Enterprise v8.2.0 and Firewall Enterprise Control Center v5.2.0 Issued by: Communications Security Establishment Canada Certification Body Canadian Common

More information

BEETLE /mopos Tablet Mobile POS solution

BEETLE /mopos Tablet Mobile POS solution BEETLE /mopos Tablet Mobile POS solution Windows 8.1 Security Advice (July 2015) We would like to know your opinion on this publication. Please send us a copy of this page if you have any constructive

More information