Device and Application Control

Size: px
Start display at page:

Download "Device and Application Control"

Transcription

1 Device and Application Control powered by HEAT Software Commercial Product Assurance (CPA) Compliance Version 5.1 Update 1

2 Commercial Product Assurance (CPA) Compliance Contents Contents Welcome! Getting CPA Compliance Up and Running Installing a New System for CPA Compliance New Installation Configuration Checklist Configuring an Existing System for CPA Compliance Understanding CPA Compliance Mode CPA Compliance Mode Configuration Window Application Control Requirements for CPA Compliance CPA Compliance Statuses Using CPA Compliance Mode Enabling Full CPA Compliance Mode Switching to Partial Compliance Mode Disabling CPA Compliance Mode Copyright 2017, Ivanti. All Rights Reserved. Terms of Use. Page 2 of 32

3 Welcome! Welcome! We're going to guide you through the process of configuring Ivanti Device and Application Control to enforce Commercial Product Assurance (CPA) compliance with Application Control in your environment. CPA Compliance Mode meets the Software Execution Control characteristic published by the Communications-Electronic Security Group (CESG) of the United Kingdom. Any government, public sector, or commercial industries that access UK government accredited networks are required to run CPA-accredited software in a compliant configuration. This includes all systems that process OFFICIAL Tier data. A simple click ensures you achieve a secure configuration as recommended for CESG compliant endpoints. The version of Ivanti Device and Application Control evaluated by the CESG was 4.6 SR2 Build 439 ( ), but they recommend that the latest available version of the product be deployed. CPA Compliance Mode will change settings throughout your environment, which can result in changes to endpoint behavior. Read this guide thoroughly and retain it for future reference. Getting CPA Compliance Up and Running Learn how to install or upgrade Ivanti Device and Application Control 4.6 SR2 (build 439) to get CPA Compliance in your environment. 3

4

5 Installing a New System for CPA Compliance Installing a New System for CPA Compliance Installation of Application Control with CPA Compliance Mode on a new system requires some preparation and planning, but is a fairly straightforward process. Following your initial setup of the database server and your compliance policy, each endpoint you add to the system will automatically meet the CPA requirements. Consult the Ivanti Device and Application Control SR2 Setup Guide for detailed installation instructions. 1. If you haven t already, get your CPA license file. Contact your Ivanti Sales Rep. 2. Copy the license file to the \\Windows\System32 or \\Windows \SysWOW64 folder. 3. Download Ivanti Device and Application Control 4.6 from the Self Service Portal. The version evaluated by the CESG was 4.6 SR2 Build 439 ( ), but they recommend that the latest available version of the product be deployed. 4. Install the Database: a. Log in to the computer as an administrative user with access to a Microsoft SQL Server b. From the location where you saved the Ivanti Device and Application Control application software, run the \server\db\setup.exe file. The Installation Wizard Welcome Page opens. c. Complete the wizard. 5. Install the Application Server: a. Log in with administrative user access to the computer where you are installing the Application Server. b. From the location where you saved the Ivanti Device and Application Control application software, run \server\sxs\setup.exe.the Installation Wizard Welcome page opens. c. Complete the wizard. 5

6 Chapter 2: Installing a New System for CPA Compliance 6. Deploy the Ivanti Device and Application Control client to endpoints with the CPA license using the Client Deployment tool. Ensure the license is in the same folder as the client installer and set the license file via the CDT > Packages > Set License option. 6

7 New Installation Configuration Checklist New Installation Configuration Checklist If you have never used Application Control before, follow this configuration path. Consult the Application Control User Guide for detailed instructions. Identify all the Computers/Users Groups that need to be CPA compliant These are all the endpoints that access UK government accredited networks and have access to OFFICIAL Tier data. Determine what software is authorized to run in the CPA environment Review your company s list of authorized software and version that is required in the enterprise for each type of system, including servers, workstations, and laptops. Discover what software is currently running in your environment Use the Authorization Wizard tool to scan endpoints in your environment to identify executable filenames and their associated hashes, which Ivanti Device and Application Control will collect and store in logs. Compare your scan results with the authorized software list (created in the list item above). The amount of unauthorized software you detect can be large. Work with endpoint users to identify what software they need and update the authorized software list accordingly. See Using the Authorization Wizard in the Application Control 4.6 User Guide. Create custom file groups and required parent-child relationships File groups simplify the process of administering large numbers of executable, script, and macro files for users. Instead of individually authorizing files, you can group files together logically by creating file groups. See Adding a File Group in the Application Control 4.6 User Guide. Assign scanned files to the files groups After you create the necessary file groups and required parent-child relationships, assign executable files, scripts, and macros to the file groups. See Assigning Files to File Groups in the Application Control 4.6 User Guide. 7

8 Chapter 3: Configuring a New System for CPA Compliance Set the Full CPA Compliance Mode Date Decide when you want to start enforcing full CPA compliance mode in your environment. Keep in mind it can take up to 1 month to correctly configure and test the options. Configure Policy Settings to Meet CPA Compliance Create policies with settings that meet CPA compliance requirements. This involves enabling all the settings as shown in the CPA compliance dialog box (see the Application Control Option Settings Required for CPA Compliance). Send an Introductory to Affected Users Notify endpoint users prior to the Full CPA Compliance Mode date to introduce them to Application Control and the software they are authorized to run in your environment. Test the Full CPA Compliance Mode Settings on a Small Number of Endpoints Select a small number of endpoints (no more than 10) that give you the widest cross-section of variability within the organization and test how they are affected by the full CPA compliance mode settings. Apply Policies with CPA Compliance Settings to All Endpoints Monitor activity in your environment and help users adjust to the new restrictions. 8

9 Configuring an Existing System for CPA Compliance Configuring an Existing System for CPA Compliance Follow this configuration path if you are familiar with Application Control and already using it in your environment. CPA Compliance Mode will change settings throughout your environment, which can result in changes to endpoint behavior. Prepare carefully. Set the Full CPA Compliance Mode Date Decide when you want to start enforcing full CPA compliance mode in your environment. Keep in mind it can take up to 1 month to correctly configure and test the options. Configure Policy Settings to Meet CPA Compliance Create policies with settings that meet CPA compliance requirements. This involves enabling all the settings as shown in the CPA compliance mode window (see Application Control Option Settings Required for CPA Compliance) Send an Introductory to Affected Users Notify endpoint users prior to the Full CPA Compliance Mode date to introduce them to Application Control and the software they are authorized to run in your environment. Test the Full CPA Compliance Mode Settings on a Small Number of Endpoints Select a small number of endpoints (no more than 10) that give you the widest cross-section of variability within the organization and test how they are affected by the full CPA compliance mode settings. Apply Policies with CPA Compliance Settings to All Endpoints Monitor activity in your environment post and help users adjust to the new restrictions. 9

10 Chapter 4: Configuring a New System for CPA Compliance Install the CPA license and enable FULL CPA compliance Mode Copy the license file to the \\Windows\System32 or \\Windows \SysWOW64 folder and restart the SXS service. Full CPA Compliance mode will be enabled. Understanding CPA Compliance Mode Let's learn about the concepts and UI elements you need to understand to use CPA Compliance Mode effectively. 10

11 CPA Compliance Mode Configuration Window CPA Compliance Mode Configuration Window Use this window to configure CPA compliance in your environment and check its status. You will see this window the first time you log into the Server Management Console after installing the CPA license. It can be displayed at any time by selecting Tools > Configure CPA Compliance Mode. 11

12 Chapter 5: CPA Compliance Mode Configuration Window 12

13 Application Control Requirements for CPA Compliance Application Control Requirements for CPA Compliance You must set specific Application Control options in your environment to be fully complaint with the CESG's Software Execution Control requirements. The CPA Compliance Mode Configuration dialog enables you to set the required options in one click. Execution Blocking set to Blocking mode Local Authorization set to Disabled Client Hardening set to Basic (Computer and User/Group options) The execution of unauthorized executable files is blocked. (Computer options) Users are prevented from locally authorizing files to execute. (Computer options) Users with administrative privileges are prevented from uninstalling the Ivanti Device and Application Control agent, as well as deleting local shadow files and log entries. You can remain CPA compliant by setting the more restrictive Extended option (valid salt value required to deactivate the agent). 13

14 Chapter 6: Requirements for CPA Compliance Execution Log set to Log Everything (Computer and User/Group options) Every denied access or every executable file access event is logged. Macro and Script protection set to Deny All Marco and Script log set to Log Everything Relaxed Logon set to No relax logon The volume of logged events produced by this CPA Software Execution Control characteristic can overwhelm your database in very large deployments. You can, with the approval of your company s certification authority, change this logging option to the less detailed Log Access Denied. You will remain CPA compliant and reduce the logged events to only those applications which are blocked. Be aware you are no longer capturing the allowed application executions. (User/Group options) All VBScripts, JScript, or macros not centrally authorized are prevented from running. (User/Group options) A log entry is created for every macro and script execution access event. (User/Group options) Blocks without delay the running of unauthorized logon scripts. 14

15 CPA Compliance Statuses CPA Compliance Statuses Your CPA compliance status will always be visible at the top of the CPA Compliance Mode Configuration window, as well as in the Management Console s Connection panel. CPA Compliance mode enabled All options required to achieve CPA compliance are set for Computers and Users/Groups in your environment. Partial CPA Compliance mode enabled At least one option required to achieve CPA compliance is not set for Computers or Users/Groups in your environment. You will be in this mode when preparing to enable full compliance (for example, ensuring that settings do not disrupt the functioning of endpoints). CPA Compliance mode is disabled You are not enforcing CPA compliance requirements in your environment. In this option you are licensed for CPA Compliance Mode, but have chosen to not enforce the required settings. Using CPA Compliance Mode Learn about the tasks that can be performed and how they can enforce the CESG's Commercial Product Assurance (CPA) compliance for Application Control in your environment. 15

16

17 Enabling Full CPA Compliance Mode Enabling Full CPA Compliance Mode You can enforce full CPA Application Control setting requirements in your environment by just selecting the Enable CPA Compliance mode settings check box and clicking OK. CPA Compliance Mode will change settings throughout your environment, which can result in changes to endpoint behavior. 1. Select Tools > Configure CPA Compliance Mode. The CPA Compliance Mode window displays. 2. Select the Enable CPA Compliance mode settings check box. Ensure all the check boxes in the Computer and Users/Groups sections are selected. 3. Click Apply. A dialog displays asking if you are sure you want to enable CPA Compliance mode. 17

18 Chapter 8: Switching from Enabled to Disabled Mode 4. Click Yes. A dialog displays asking if you want to send the new options to clients immediately. 5. Click Yesto send the options immediately (this can take several minutes to complete) or No to wait until the next client boot. 6. Click OK. Result CPA Compliance mode is enabled and your environment is compliant with CESG's requirements for Software Execution Control. What in the console indicates I'm in Compliance mode? The status in the CPA Compliance Mode Configuration window and Connection panel display that you are in compliance mode. 18

19 Enabling Full CPA Compliance Mode What options can I change in Tools > Default Options? You can change no options. If you attempt to, a message displays. With the approval of your company's certification authority you can change these options and remain CPA compliant: Client Hardening to Basic or Extended. Execution Log to Log Everything, Log Access Denied, or Log Denied and Unmanaged Execution. Macro and Script Log to Log Everything, Log access denied, or Log non whitelisted Execution. 19

20 Chapter 8: Switching from Enabled to Disabled Mode A warning message will display when you change these settings. Am I CPA compliant when in Compliance Mode? Yes, your environment fully meets CPA compliance requirements because all the required option settings are enforced. 20

21 Switching to Partial Compliance Mode Switching to Partial Compliance Mode Use this mode when preparing to enable full compliance or investigating if specific settings are disrupting the functioning of endpoints. 1. Select Tools > Configure CPA Compliance Mode. The CPA Compliance Mode window displays. 2. Clear one or more of the option settings. 3. Click Apply. A dialog displays asking if you are sure you want to enable Partial Compliance mode. 4. Click Yes. A dialog displays asking if you want to send the new options to clients immediately. 5. Click Yesto send the options immediately (this can take several minutes to complete ) or No to wait until the next client boot. Result Partial CPA Compliance mode is enabled and your environment is no longer compliant. 21

22 Chapter 9: Switching to Partial Compliance Mode What in the console indicates I'm in Partial compliance mode? The status in the CPA Compliance Mode Configuration window and Connection panel display that you are in partial compliance mode. What options can I change in Tools > Default Options? You can only change without restrictions those options you cleared in the window. If you attempt to change an enforced option, a message displays. With the approval of your company's certification authority you can also change these options: Client Hardening to Basic or Extended. Execution Log to Log Everything, Log Access Denied, or Log Denied and Unmanaged Execution. Macro and Script Log to Log Everything, Log access denied, or Log non whitelisted Execution. 22

23 Switching to Partial Compliance Mode A warning message will display when you change these settings. Am I CPA compliant when in Partial Compliance Mode? No, you do not meet the CPA compliance requirements because one or more required option settings are not enforced. 23

24

25 Disabling CPA Compliance Mode Disabling CPA Compliance Mode You can stop enforcing all CPA Application Control setting requirements in your environment by just clearing the Enable CPA Compliance mode settings check box. 1. Select Tools > Configure CPA Compliance Mode. The CPA Compliance Mode window displays. 2. Clear the Enable CPA Compliance mode settings check box. All the checkboxes in the Computer and User/Group options sections will clear as well. 3. Click Apply. A dialog displays asking if you are sure you want to disable CPA Compliance mode. 4. Click Yes. A dialog displays asking if you want to send the new options to clients immediately. 25

26 Chapter 10: Switching from Enabled to Disabled Mode 5. Click Yesto send the options immediately (this can take several minutes to complete ) or No to wait until the next client boot. Result CPA Compliance mode is disabled and your environment is no longer compliant. What in the console indicates I'm in Disabled mode? The status in the CPA Compliance Mode Configuration window and Connection panel display that you are in disabled mode. What options can I change in Tools > Default Options? You can change any options without restrictions as no enforcement is taking place. 26

27 Disabling CPA Compliance Mode Am I CPA compliant when Compliance Mode is disabled? No, you do not meet the CPA compliance requirements because no required option settings are enforced. 27

ForeScout CounterACT. Ensure Instant Messaging and Peer to Peer Compliance. How-to Guide. Version 8.0

ForeScout CounterACT. Ensure Instant Messaging and Peer to Peer Compliance. How-to Guide. Version 8.0 ForeScout CounterACT Ensure Instant Messaging and Peer to Peer Compliance How-to Guide Version 8.0 Table of Contents About Ensuring Instant Messaging and Peer to Peer Compliance... 3 Prerequisites... 3

More information

Ivanti Device and Application Control 5.1. Quick Start Guide

Ivanti Device and Application Control 5.1. Quick Start Guide Ivanti Device and Application Control 5.1 Quick Start Guide Notices Version Information Ivanti Device and Application Control Quick Start Guide - Ivanti Device and Application Control Version 5.1 - Published:

More information

Ivanti Device and Application Control 5.1 U1. Quick Start Guide

Ivanti Device and Application Control 5.1 U1. Quick Start Guide Ivanti Device and Application Control 5.1 U1 Quick Start Guide Notices Version Information Ivanti Device and Application Control Quick Start Guide - Ivanti Device and Application Control Version 5.1 Update

More information

ForeScout Extended Module for IBM BigFix

ForeScout Extended Module for IBM BigFix ForeScout Extended Module for IBM BigFix Version 1.0.0 Table of Contents About this Integration... 4 Use Cases... 4 Additional BigFix Documentation... 4 About this Module... 4 Concepts, Components, Considerations...

More information

IBM Endpoint Manager. OS Deployment V3.5 User's Guide

IBM Endpoint Manager. OS Deployment V3.5 User's Guide IBM Endpoint Manager OS Deployment V3.5 User's Guide IBM Endpoint Manager OS Deployment V3.5 User's Guide Note Before using this information and the product it supports, read the information in Notices

More information

Central Administration Console Installation and User's Guide

Central Administration Console Installation and User's Guide IBM Tivoli Storage Manager FastBack for Workstations Version 7.1 Central Administration Console Installation and User's Guide SC27-2808-03 IBM Tivoli Storage Manager FastBack for Workstations Version

More information

Ivanti Device and Application Control 5.1. Application Control User Guide

Ivanti Device and Application Control 5.1. Application Control User Guide Ivanti Device and Application Control 5.1 Application Control User Guide Notices Version Information Ivanti Device and Application Control Application Control User Guide - Ivanti Device and Application

More information

ForeScout Extended Module for IBM BigFix

ForeScout Extended Module for IBM BigFix Version 1.1 Table of Contents About BigFix Integration... 4 Use Cases... 4 Additional BigFix Documentation... 4 About this Module... 4 About Support for Dual Stack Environments... 5 Concepts, Components,

More information

Acronis Data Cloud plugin for ConnectWise Automate

Acronis Data Cloud plugin for ConnectWise Automate Acronis Data Cloud plugin for ConnectWise Automate USER S GUIDE Revision: 17.01.2018 Table of contents 1 Introduction...3 2 What s new in Update 3...3 3 What s new in Update 2...3 4 What s new in Update

More information

Contents George Road, Tampa, FL

Contents George Road, Tampa, FL 1 Contents CONTACTING VEEAM SOFTWARE... 5 Customer Support... 5 Online Support... 5 Company Contacts... 5 About this Guide... 6 About VEEAM Endpoint Backup For LabTech... 7 How It Works... 8 Discovery...

More information

Forescout. eyeextend for IBM BigFix. Configuration Guide. Version 1.2

Forescout. eyeextend for IBM BigFix. Configuration Guide. Version 1.2 Forescout Version 1.2 Contact Information Forescout Technologies, Inc. 190 West Tasman Drive San Jose, CA 95134 USA https://www.forescout.com/support/ Toll-Free (US): 1.866.377.8771 Tel (Intl): 1.408.213.3191

More information

Ivanti Device and Application Control 5.1 U1. Setup Guide

Ivanti Device and Application Control 5.1 U1. Setup Guide Ivanti Device and Application Control 5.1 U1 Setup Guide Notices Version Information Ivanti Device and Application Control Setup Guide - Ivanti Device and Application Control Version 5.1 Update 1 - Published:

More information

ForeScout Extended Module for Carbon Black

ForeScout Extended Module for Carbon Black ForeScout Extended Module for Carbon Black Version 1.0 Table of Contents About the Carbon Black Integration... 4 Advanced Threat Detection with the IOC Scanner Plugin... 4 Use Cases... 5 Carbon Black Agent

More information

Acronis Data Cloud plugin for ConnectWise Automate

Acronis Data Cloud plugin for ConnectWise Automate Acronis Data Cloud plugin for ConnectWise Automate USER'S GUIDE Revision: 24.08.2018 Table of contents 1 Introduction...3 2 What's new in Update 4...3 3 What's new in Update 3...3 4 What's new in Update

More information

ZENworks 2017 Full Disk Encryption Pre-Boot Authentication Reference. December 2016

ZENworks 2017 Full Disk Encryption Pre-Boot Authentication Reference. December 2016 ZENworks 2017 Full Disk Encryption Pre-Boot Authentication Reference December 2016 Legal Notice For information about legal notices, trademarks, disclaimers, warranties, export and other use restrictions,

More information

Business Insights Dashboard

Business Insights Dashboard Business Insights Dashboard Sage 500 ERP 2000-2013 Sage Software, Inc. All rights reserved. Sage, the Sage logos, and the Sage product and service names mentioned herein are registered trademarks or trademarks

More information

Version Installation Guide. 1 Bocada Installation Guide

Version Installation Guide. 1 Bocada Installation Guide Version 19.4 Installation Guide 1 Bocada Installation Guide Copyright 2019 Bocada LLC. All Rights Reserved. Bocada and BackupReport are registered trademarks of Bocada LLC. Vision, Prism, vpconnect, and

More information

Symantec Endpoint Protection Installation Guide

Symantec Endpoint Protection Installation Guide Symantec Endpoint Protection 11.0 Installation Guide SYMANTEC ENDPOINT PROTECTION 11.0 TABLE OF CONTENTS A NEW SECURITY APPLICATION... 1 INTRODUCTION... 1 WHAT IS SYMANTEC ENDPOINT PROTECTION (SEP) 11.0?...

More information

Anti-Executable Enterprise User Guide

Anti-Executable Enterprise User Guide 1 2 Last modified: October, 2015 1999-2015 Faronics Corporation. All rights reserved. Faronics, Deep Freeze, Faronics Core Console, Faronics Anti-Executable, Faronics Device Filter, Faronics Power Save,

More information

Carbon Black PCI Compliance Mapping Checklist

Carbon Black PCI Compliance Mapping Checklist Carbon Black PCI Compliance Mapping Checklist The following table identifies selected PCI 3.0 requirements, the test definition per the PCI validation plan and how Carbon Black Enterprise Protection and

More information

Privileged Identity App Launcher and Session Recording

Privileged Identity App Launcher and Session Recording Privileged Identity App Launcher and Session Recording 2018 Bomgar Corporation. All rights reserved worldwide. BOMGAR and the BOMGAR logo are trademarks of Bomgar Corporation; other trademarks shown are

More information

Getting Started with. Version

Getting Started with. Version Getting Started with Version 10.1.0.0 Copyright RES Software Development B.V. All rights reserved. Commercial Computer Software documentation/data Restricted Rights. RES and RES ONE are registered trademarks

More information

ForeScout Extended Module for Symantec Endpoint Protection

ForeScout Extended Module for Symantec Endpoint Protection ForeScout Extended Module for Symantec Endpoint Protection Version 1.0.0 Table of Contents About the Symantec Endpoint Protection Integration... 4 Use Cases... 4 Additional Symantec Endpoint Protection

More information

McAfee Application Control Linux Product Guide. (McAfee epolicy Orchestrator)

McAfee Application Control Linux Product Guide. (McAfee epolicy Orchestrator) McAfee Application Control 6.2.0 - Linux Product Guide (McAfee epolicy Orchestrator) COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy

More information

ForeScout CounterACT. Ensure Antivirus Compliance. How-to Guide. Version 8.0

ForeScout CounterACT. Ensure Antivirus Compliance. How-to Guide. Version 8.0 ForeScout CounterACT Ensure Antivirus Compliance How-to Guide Version 8.0 Table of Contents About Ensuring Antivirus Compliance... 3 Prerequisites... 3 Create and Apply an Antivirus Policy... 4 Evaluate

More information

McAfee Rogue Database Detection For use with epolicy Orchestrator Software

McAfee Rogue Database Detection For use with epolicy Orchestrator Software McAfee Rogue Database Detection 1.0.0 For use with epolicy Orchestrator 4.6.0 Software COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo,

More information

ER/Studio XE/Enterprise

ER/Studio XE/Enterprise Product Documentation ER/Studio XE/Enterprise Upgrade Guide Published April 8, 2013 2013 Embarcadero Technologies, Inc. Embarcadero, the Embarcadero Technologies logos, and all other Embarcadero Technologies

More information

Ivanti Device and Application Control 5.1. Administrator Guide

Ivanti Device and Application Control 5.1. Administrator Guide Ivanti Device and Application Control 5.1 Administrator Guide Notices Version Information Ivanti Device and Application Control Administrator Guide - Ivanti Device and Application Control Version 5.1

More information

Quick Start Guide. Kaseya 2009

Quick Start Guide. Kaseya 2009 Agent Configuration and Deployment Quick Start Guide Kaseya 2009 February 13, 2010 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private Sector

More information

Parallels Management Suite for Microsoft SCCM 2007

Parallels Management Suite for Microsoft SCCM 2007 Parallels Management Suite for Microsoft SCCM 2007 Administrator's Guide Copyright 1999-2013 Parallels IP Holdings GmbH and its affiliates. All rights reserved. Parallels IP Holdings GmbH Vordergasse 59

More information

Pearl Echo.Suite Quick Start Installation Guide

Pearl Echo.Suite Quick Start Installation Guide WORKSTATION SERVER Pearl Echo.Suite Quick Start Installation Guide Your initial test setup should take between 5 and 15 minutes. For detailed automated deployment instructions and configuration settings

More information

Authentication Services ActiveRoles Integration Pack 2.1.x. Administration Guide

Authentication Services ActiveRoles Integration Pack 2.1.x. Administration Guide Authentication Services ActiveRoles Integration Pack 2.1.x Administration Guide Copyright 2017 One Identity LLC. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright.

More information

9 Steps to Protect Against Ransomware

9 Steps to Protect Against Ransomware 9 Steps to Protect Against Ransomware IT Support Analyst Task Overview Security Manager Security Dashboard Self Service log Secur Devices With Vulnerabilities Critical Important/High Moderate/Medium 40

More information

Windows Intune Trial Guide Getting the most from your Windows Intune trial. Simplify PC management. Amplify productivity.

Windows Intune Trial Guide Getting the most from your Windows Intune trial. Simplify PC management. Amplify productivity. Windows Intune Trial Guide Getting the most from your Windows Intune trial. Simplify PC management. Amplify productivity. CONTENTS 2 Overview 2 Trial Setup 3 Getting Started with the Administration Console

More information

Microsoft Administering System Center Configuration Manager

Microsoft Administering System Center Configuration Manager 1800 ULEARN (853 276) www.ddls.com.au Microsoft 20703-1 Administering System Center Configuration Manager Length 5 days Price $4290.00 (inc GST) Version A Overview This five-day course describes how to

More information

COPYRIGHTED MATERIAL. Setting Up Your Site Hierarchy

COPYRIGHTED MATERIAL. Setting Up Your Site Hierarchy 49508c01.qxd:WroxPro 10/4/06 12:38 AM Page 1 Setting Up Your Site Hierarchy In this book, I ll discuss the steps you need to take to ensure that Systems Management Server (SMS) 2003 is administrated successfully

More information

ZENworks 2017 Update 1 Full Disk Encryption Pre-Boot Authentication Reference. July 2017

ZENworks 2017 Update 1 Full Disk Encryption Pre-Boot Authentication Reference. July 2017 ZENworks 2017 Update 1 Full Disk Encryption Pre-Boot Authentication Reference July 2017 Legal Notice For information about legal notices, trademarks, disclaimers, warranties, export and other use restrictions,

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the product described herein without notice. Before installing and using the product, review the readme files, release

More information

Quick Start Guide. Version R92. English

Quick Start Guide. Version R92. English Agent Configuration and Deployment Quick Start Guide Version R92 English October 23, 2015 Copyright Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in

More information

Service Manager. Installation and Deployment Guide

Service Manager. Installation and Deployment Guide Service Manager powered by HEAT Installation and Deployment Guide 2017.2 Copyright Notice This document contains the confidential information and/or proprietary property of Ivanti, Inc. and its affiliates

More information

NetIQ Reporting Center Reporting Guide. February 2018

NetIQ Reporting Center Reporting Guide. February 2018 NetIQ Reporting Center Reporting Guide February 2018 Legal Notice For information about NetIQ legal notices, disclaimers, warranties, export and other use restrictions, U.S. Government restricted rights,

More information

USER GUIDE. CTERA Agent for Windows. June 2016 Version 5.5

USER GUIDE. CTERA Agent for Windows. June 2016 Version 5.5 USER GUIDE CTERA Agent for Windows June 2016 Version 5.5 Copyright 2009-2016 CTERA Networks Ltd. All rights reserved. No part of this document may be reproduced in any form or by any means without written

More information

Course A: Administering System Center Configuration Manager

Course A: Administering System Center Configuration Manager Course 20703-1A: Administering System Center Configuration Manager Overview: This five-day course describes how to use Configuration Manager and its associated site systems to efficiently manage network

More information

Installation Guide. McAfee Endpoint Security for Servers 5.0.0

Installation Guide. McAfee Endpoint Security for Servers 5.0.0 Installation Guide McAfee Endpoint Security for Servers 5.0.0 COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee

More information

McAfee Boot Attestation Service 3.5.0

McAfee Boot Attestation Service 3.5.0 Product Guide McAfee Boot Attestation Service 3.5.0 For use with epolicy Orchestrator 4.6.7, 4.6.8, 5.1.0 Software COPYRIGHT Copyright 2014 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the product described herein without notice. Before installing and using the product, review the readme files, release

More information

Centrify Infrastructure Services

Centrify Infrastructure Services Centrify Infrastructure Services Evaluation Guide for Windows November 2017 (release 2017.2) Centrify Corporation Legal notice This document and the software described in this document are furnished under

More information

Comodo Endpoint Security Manager Professional Edition Software Version 3.5

Comodo Endpoint Security Manager Professional Edition Software Version 3.5 1 Comodo Endpoint Security Manager Professional Edition Software Version 3.5 Quick Start Guide Guide Version 3.5.030116 Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013 Comodo Endpoint Security

More information

CA GovernanceMinder. CA IdentityMinder Integration Guide

CA GovernanceMinder. CA IdentityMinder Integration Guide CA GovernanceMinder CA IdentityMinder Integration Guide 12.6.00 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation

More information

Managed Security Services - Endpoint Managed Security on Cloud

Managed Security Services - Endpoint Managed Security on Cloud Services Description Managed Security Services - Endpoint Managed Security on Cloud The services described herein are governed by the terms and conditions of the agreement specified in the Order Document

More information

McAfee Application Control Windows Installation Guide. (McAfee epolicy Orchestrator)

McAfee Application Control Windows Installation Guide. (McAfee epolicy Orchestrator) McAfee Application Control 8.1.0 - Windows Installation Guide (McAfee epolicy Orchestrator) COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection,

More information

Dell Wyse Windows 10 IoT Enterprise for Latitude 5280 Mobile Thin Client. BIOS Upgrade Guide

Dell Wyse Windows 10 IoT Enterprise for Latitude 5280 Mobile Thin Client. BIOS Upgrade Guide Dell Wyse Windows 10 IoT Enterprise for Latitude 5280 Mobile Thin Client BIOS Upgrade Guide Notes, cautions, and warnings NOTE: A NOTE indicates important information that helps you make better use of

More information

Comodo Endpoint Security Manager Software Version 3.4

Comodo Endpoint Security Manager Software Version 3.4 Cert dialog Comodo Endpoint Security Manager Software Version 3.4 How to Upgrade CESM from Version 3.3 to 3.4 Guide Version 3.4.072415 Comodo Security Solutions, Inc. 1255 Broad Street Clifton, NJ 07013

More information

Interface Reference. McAfee Application Control Windows Interface Reference Guide. Add Installer page. (McAfee epolicy Orchestrator)

Interface Reference. McAfee Application Control Windows Interface Reference Guide. Add Installer page. (McAfee epolicy Orchestrator) McAfee Application Control 8.1.0 - Windows Interface Reference Guide (McAfee epolicy Orchestrator) Interface Reference Add Installer page Add an existing installer to the McAfee epo repository. Table 1

More information

Software Delivery Solution 6.1 SP1 HF2 for Windows Release Notes

Software Delivery Solution 6.1 SP1 HF2 for Windows Release Notes Software Delivery Solution 6.1 SP1 HF2 for Windows Release Notes February 17, 2006 NOTICE The content in this document represents the current view of Altiris as of the date of publication. Because Altiris

More information

Citrix Connector Citrix Systems, Inc. All rights reserved. p.1. About this release. System requirements. Technical overview.

Citrix Connector Citrix Systems, Inc. All rights reserved. p.1. About this release. System requirements. Technical overview. Citrix Connector 3.1 May 02, 2016 About this release System requirements Technical overview Plan Install Citrix Connector Upgrade Create applications Deploy applications to machine catalogs Publish applications

More information

filesmart Archive Printer Driver Install - Version 4.6

filesmart Archive Printer Driver Install - Version 4.6 filesmart Archive Printer Driver Install - Version 4.6 Overview This document will guide you through the process of installing the filesmart printer drivers. There are six different printer drivers available

More information

IBM Endpoint Manager. OS Deployment V3.8 User's Guide - DRAFT for Beta V.1.0 (do not distribute)

IBM Endpoint Manager. OS Deployment V3.8 User's Guide - DRAFT for Beta V.1.0 (do not distribute) IBM Endpoint Manager OS Deployment V3.8 User's Guide - DRAFT for Beta V.1.0 (do not distribute) IBM Endpoint Manager OS Deployment V3.8 User's Guide - DRAFT for Beta V.1.0 (do not distribute) Note Before

More information

SPAR. Installation Guide. Workflow for SharePoint. ITLAQ Technologies

SPAR. Installation Guide. Workflow for SharePoint. ITLAQ Technologies SPAR Workflow for SharePoint 0 ITLAQ Technologies www.itlaq.com Table of Contents I. System Requirements...2 II. Install SPARK Workflow on your environment...2 III. Obtain SPARK Workflow License...7 IV.

More information

Administering System Center Configuration Manager

Administering System Center Configuration Manager Course 20703-1A: Administering System Center Configuration Manager Course Outline Module 1: Managing computers and mobile devices in the enterprise This module describes the features of Configuration Manager

More information

ADMINISTERING SYSTEM CENTER CONFIGURATION MANAGER

ADMINISTERING SYSTEM CENTER CONFIGURATION MANAGER ADMINISTERING SYSTEM CENTER CONFIGURATION MANAGER Course Code: 20703-1a Duration 5 days Introduction This five-day course describes how to use Configuration and its associated site systems to efficiently

More information

Administering System Center Configuration Manager

Administering System Center Configuration Manager Administering System Center Configuration Manager Course 20703-1A 5 Days Instructor-led, Hands on Course Information This five-day course describes how to use Configuration Manager and its associated site

More information

Ensure Instant Messaging and Peer to Peer Compliance

Ensure Instant Messaging and Peer to Peer Compliance Ensure Instant Messaging and Peer to Peer Compliance How-to Guide CounterACT Version 7.0.0 Table of Contents About Ensuring Instant Messaging and Peer to Peer Compliance... 3 Prerequisites... 3 Create

More information

ForeScout Extended Module for Bromium Secure Platform

ForeScout Extended Module for Bromium Secure Platform ForeScout Extended Module for Bromium Secure Platform Version 1.3.0 Table of Contents About the Bromium Integration... 3 Additional Bromium Secure Platform Documentation... 3 About This Module... 3 How

More information

ForeScout CounterACT. Configuration Guide. Version 1.2

ForeScout CounterACT. Configuration Guide. Version 1.2 ForeScout CounterACT Core Extensions Module: DNS Enforce Plugin Version 1.2 Table of Contents About the DNS Enforce Plugin... 3 What to Do... 4 Requirements... 4 Configure the Plugin... 4 Target IP...

More information

DefendX Software Control-Audit for Hitachi Installation Guide

DefendX Software Control-Audit for Hitachi Installation Guide DefendX Software Control-Audit for Hitachi Installation Guide Version 4.1 This guide details the method for the installation and initial configuration of DefendX Software Control-Audit for NAS, Hitachi

More information

Client Installation and User's Guide

Client Installation and User's Guide IBM Tivoli Storage Manager FastBack for Workstations Version 7.1 Client Installation and User's Guide SC27-2809-03 IBM Tivoli Storage Manager FastBack for Workstations Version 7.1 Client Installation

More information

Administering System Center Configuration Manager

Administering System Center Configuration Manager Administering System Center Configuration Manager 20703-1; 5 Days; Instructor-led Course Description This five-day course describes how to use Configuration Manager and its associated site systems to efficiently

More information

ER/Studio XE/Enterprise

ER/Studio XE/Enterprise Product Documentation ER/Studio XE/Enterprise Upgrade Guide Published September 15, 2014 2014 Embarcadero Technologies, Inc. Embarcadero, the Embarcadero Technologies logos, and all other Embarcadero Technologies

More information

ForeScout CounterACT. Centralized Licensing. How-to Guide. Version 8.0

ForeScout CounterACT. Centralized Licensing. How-to Guide. Version 8.0 Centralized Licensing Version 8.0 Table of Contents About License Management... 3 Default Licensing Modes in CounterACT... 4 Centralized Licensing Mode... 5 About Centralized Licenses... 5 Deployment ID...

More information

Administering System Center Configuration Manager ( A)

Administering System Center Configuration Manager ( A) Administering System Center Configuration Manager (20703-1A) Duration: 5 Days Price: $895 Delivery Option: Attend via MOC On-Demand Students Will Learn Describing the features Configuration Manager and

More information

MobiControl v13: Package Rules to Profiles Migration Guide. January 2016

MobiControl v13: Package Rules to Profiles Migration Guide. January 2016 MobiControl v13: Package Rules to Profiles Migration Guide January 2016 Copyright 2016 SOTI Inc. All rights reserved. This documentation and the software described in this document are furnished under

More information

CaliberRDM. Installation Guide

CaliberRDM. Installation Guide CaliberRDM Installation Guide Borland Software Corporation 4 Hutton Centre Dr., Suite 900 Santa Ana, CA 92707 Copyright 2010 Micro Focus (IP) Limited. All Rights Reserved. CaliberRDM contains derivative

More information

ImageNow eforms. Getting Started Guide. ImageNow Version: 6.7. x

ImageNow eforms. Getting Started Guide. ImageNow Version: 6.7. x ImageNow eforms Getting Started Guide ImageNow Version: 6.7. x Written by: Product Documentation, R&D Date: September 2016 2014 Perceptive Software. All rights reserved CaptureNow, ImageNow, Interact,

More information

ForeScout Extended Module for VMware AirWatch MDM

ForeScout Extended Module for VMware AirWatch MDM ForeScout Extended Module for VMware AirWatch MDM Version 1.7.2 Table of Contents About the AirWatch MDM Integration... 4 Additional AirWatch Documentation... 4 About this Module... 4 How it Works... 5

More information

10747D: ADMINISTERING SYSTEM CENTER 2012 CONFIGURATION MANAGER

10747D: ADMINISTERING SYSTEM CENTER 2012 CONFIGURATION MANAGER 10747D: ADMINISTERING SYSTEM CENTER 2012 CONFIGURATION MANAGER DURATION 5 days INTRODUCTION This course describes how to configure and manage a System Center 2012 R2 Configuration Manager site and its

More information

NetIQ Advanced Authentication Framework. Deployment Guide. Version 5.1.0

NetIQ Advanced Authentication Framework. Deployment Guide. Version 5.1.0 NetIQ Advanced Authentication Framework Deployment Guide Version 5.1.0 Table of Contents 1 Table of Contents 2 Introduction 3 About This Document 3 NetIQ Advanced Authentication Framework Deployment 4

More information

Course 10324A: Implementing and Managing Microsoft Desktop Virtualization

Course 10324A: Implementing and Managing Microsoft Desktop Virtualization Course 10324A: Implementing and Managing Microsoft Desktop Virtualization Length: 5 days Audience: IT Professionals OVERVIEW This five-day, instructor-led course provides you with the knowledge and skills

More information

Kaldeera Workflow Designer 2009 Administrator's Guide

Kaldeera Workflow Designer 2009 Administrator's Guide Kaldeera Workflow Designer 2009 Administrator's Guide version 1.0 Generated January 12, 2009 Index Chapter 1: Introduction... 3 Kaldeera Workflow Designer 2009 Overview... 3 Chapter 2: Installation and

More information

Dell Wyse Windows 10 IoT Enterprise for Latitude 3480 mobile thin client. BIOS upgrade guide

Dell Wyse Windows 10 IoT Enterprise for Latitude 3480 mobile thin client. BIOS upgrade guide Dell Wyse Windows 10 IoT Enterprise for Latitude 3480 mobile thin client BIOS upgrade guide Notes, cautions, and warnings NOTE: A NOTE indicates important information that helps you make better use of

More information

Course 10747D: Administering System Center 2012 Configuration Manager Exam Code:

Course 10747D: Administering System Center 2012 Configuration Manager Exam Code: Course 10747D: Administering System Center 2012 Configuration Manager Exam Code: 70-243 Course Outline Module 1: Overview of System Center 2012 R2 Configuration Manager In this module, you will learn about

More information

NTP Software Storage Investigator TM User Guide

NTP Software Storage Investigator TM User Guide NTP Software Storage Investigator TM User Guide Abstract This guide details the method for using NTP Software Storage Investigator. Upon completion of the steps within this document, NTP Software Storage

More information

ForeScout CounterACT. (AWS) Plugin. Configuration Guide. Version 1.3

ForeScout CounterACT. (AWS) Plugin. Configuration Guide. Version 1.3 ForeScout CounterACT Hybrid Cloud Module: Amazon Web Services (AWS) Plugin Version 1.3 Table of Contents Amazon Web Services Plugin Overview... 4 Use Cases... 5 Providing Consolidated Visibility... 5 Dynamic

More information

Comodo Offline Updater Utility Software Version

Comodo Offline Updater Utility Software Version Comodo Offline Updater Utility Software Version 1.2.30701.2 i User Guide Guide Version 1.2.011811 Comodo Security Solutions 525 Washington Blvd. Jersey City, NJ 07310 Table of Contents 1.Introduction to

More information

Endpoint Security Policies Reference

Endpoint Security Policies Reference www.novell.com/documentation Endpoint Security Policies Reference ZENworks 11 Support Pack 3 February 2014 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents

More information

Comodo Endpoint Security Manager Professional Edition Software Version 3.3

Comodo Endpoint Security Manager Professional Edition Software Version 3.3 Comodo Endpoint Security Manager Professional Edition Software Version 3.3 Quick Start Guide Guide Version 3.2.022615 Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013 Comodo Endpoint Security

More information

Data Sheet: Endpoint Security Symantec Network Access Control Starter Edition Simplified endpoint enforcement

Data Sheet: Endpoint Security Symantec Network Access Control Starter Edition Simplified endpoint enforcement Simplified endpoint enforcement Overview makes it easy to begin implementing a network access control solution. It offers a subset of Symantec Network Access Control functionality that can be completely

More information

HORTICOPIA Professional

HORTICOPIA Professional HORTICOPIA Professional Networking User Guide Horticopia, Inc. www.horticopia.com October 2017 Table of Contents I. Quick Start 2 II. System Requirements 3 III. Installing HORTICOPIA Professional 4 1.

More information

Installation Guide For IM Sequencer 6.0

Installation Guide For IM Sequencer 6.0 Installation Guide For IM Sequencer 6.0 Copyright 2007-2015 Traxion. All rights reserved. The software contains proprietary information of Traxion. It is provided under a license agreement containing restrictions

More information

ForeScout Extended Module for Advanced Compliance

ForeScout Extended Module for Advanced Compliance ForeScout Extended Module for Advanced Compliance Version 1.2 Table of Contents About Advanced Compliance Integration... 4 Use Cases... 4 Additional Documentation... 6 About This Module... 6 About Support

More information

Taking SAP Contact Center End-User Applications into Use

Taking SAP Contact Center End-User Applications into Use Last updated on: 18.05.2018 Responsible IPK Taking SAP Contact Center End-User Applications into Use Contents 1. Introduction... 3 1.1. Communication Desktop (CDT)... 3 Prerequisites... 3... 4 Limitations

More information

Administering System Center Configuration Manager

Administering System Center Configuration Manager Administering System Center Configuration Manager Duration: 5 Days Course Code: M20703-1 Version: A Overview: This five-day course describes how to use Configuration Manager and its associated site systems

More information

DriveLock Security Awareness. Manual

DriveLock Security Awareness. Manual DriveLock Security Awareness Manual DriveLock SE 2018 Table of Contents 1 WELCOME TO DRIVELOCK SECURITY AWARENESS! 4 2 BASICS 5 2.1 DriveLock Security Awareness 5 2.2 The Security Awareness Content AddOn

More information

Kaseya 2. Quick Start Guide. for VSA 6.1

Kaseya 2. Quick Start Guide. for VSA 6.1 Kaseya 2 Agent Configuration and Deployment Quick Start Guide for VSA 6.1 May 16, 2011 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private

More information

Software Installation with Microsoft SQL 2008

Software Installation with Microsoft SQL 2008 Agency Information Manager Software Installation with Microsoft SQL 2008 Revised: 3.7.2012 2012 Vertafore, Inc. All Rights Reserved. This software and documentation are copyrighted materials. Law prohibits

More information

Forescout. eyeextend for Palo Alto Networks Wildfire. Configuration Guide. Version 2.2

Forescout. eyeextend for Palo Alto Networks Wildfire. Configuration Guide. Version 2.2 Forescout Version 2.2 Contact Information Forescout Technologies, Inc. 190 West Tasman Drive San Jose, CA 95134 USA https://www.forescout.com/support/ Toll-Free (US): 1.866.377.8771 Tel (Intl): 1.408.213.3191

More information

CCH Central Suite and above. Update Guide. (Updated 20 th April 2018)

CCH Central Suite and above. Update Guide. (Updated 20 th April 2018) CCH Central Suite 2018.1 and above Update Guide (Updated 20 th April 2018) Legal Notice Disclaimer Wolters Kluwer (UK) Limited has made every effort to ensure the accuracy and completeness of this Update

More information

Managing Modular Infrastructure by using OpenManage Essentials (OME)

Managing Modular Infrastructure by using OpenManage Essentials (OME) Managing Modular Infrastructure by using OpenManage Essentials (OME) This technical white paper describes how to manage the modular infrastructure by using Dell EMC OME. Dell Engineering June 2017 A Dell

More information

ForeScout Amazon Web Services (AWS) Plugin

ForeScout Amazon Web Services (AWS) Plugin ForeScout Amazon Web Services (AWS) Plugin Version 1.1.1 and above Table of Contents Amazon Web Services Plugin Overview... 4 Use Cases... 5 Providing Consolidated Visibility... 5 Dynamic Segmentation

More information

Administering System Center 2012 Configuration Manager

Administering System Center 2012 Configuration Manager Administering System Center 2012 Configuration Manager Duration: 5 Days Course Code:10747D About this Course This course describes how to configure and manage a System Center 2012 R Configuration Manager

More information