Getting Started. A Getting Started Guide for Locum SecureAudit MANUAL RELATIVE TO VERSION 17.0 LOCUM SOFTWARE SERVICES LIMITED

Size: px
Start display at page:

Download "Getting Started. A Getting Started Guide for Locum SecureAudit MANUAL RELATIVE TO VERSION 17.0 LOCUM SOFTWARE SERVICES LIMITED"

Transcription

1 Getting Started A Getting Started Guide for Locum SecureAudit MANUAL RELATIVE TO VERSION 17.0 LOCUM SOFTWARE SERVICES LIMITED Locum House, 84 Brown Street, Sheffield, S1 2BS, England Telephone: +44 (0) enquiries@locumsoftware.com Web:

2 Contents Contents... i System Requirements... 3 Windows Requirements... 3 MCP Requirements... 3 Network Requirements... 3 License Requirements... 3 Pre-requisites... 4 Installing SecureAudit and SecurityCenter on a Windows System... 4 Privilege Requirements... 4 First Steps... 5 Familiarise yourself with SecureAudit... 5 The SecureAudit Client Main Window... 5 Configuring a Connection... 7 About Connections... 7 Creating a New Connection... 7 The SecureAudit Client Database... 9 Creating a SecureAudit Client Database... 9 Reports To Create a Report Scheduling Reports Importing Scheduled (Host) Reports Correlation Reports Exporting Files to PDF The Visual Data Manager dialog Graphs The Generate Graph dialog Bar Graphs Line Graphs Pie Charts Role-Based Access Control Best Practices Index... i Contents i

3 System Requirements Windows Requirements SecureAudit Client runs on various Windows operating systems. Refer to the appropriate compatibility matrix on the Unisys Product Support Website. The matrices are accessible from the Compatibility link on the left pane. MCP Requirements SecureAudit requires an MCP version level equivalent to the SecureAudit version level, or one version higher or lower. For example, a 17.0 version of SecureAudit will run on MCP versions 16.0, 17.0 and Network Requirements SecureAudit Client expects the following port numbers to be available to the MCP host through any local firewalls: 139 NetBios 445 SMB SecureAudit non-ssl connection SecureAudit SSL connection License Requirements For customers who have the full Safe & Secure product marketed by Locum, the SecureAudit license will be embedded in the Safe & Secure license. The following explanation is valid for customers who have acquired SecureAudit via the Unisys release mechanisms, and who do not have the full Safe & Secure package marketed by Locum. No license key is required to run SecureAudit in Summary mode. For full functionality you must have a Unisys-supplied license key for SecureAudit (style xxx-lse-lse) that is compatible with the version of SecureAudit Host that is installed. For example, to use SecureAudit Host version , key LSE-LSE is required. This key will be valid on any MCP level from 57.1 to 59.1, providing it is used with the 17.0 level of SecureAudit Host. To order license keys and to obtain pricing information, contact your system supplier or Unisys representative. For a full explanation of the Unisys License Key mechanism, refer to the Guide to Unisys Licensing document, available in the Support section of the Locum website at Note that Try & Buy keys are available to allow a short evaluation period for the software. Try & Buy keys offer full functionality for a limited time and are available online at System Requirements 3

4 Pre-requisites Installing SecureAudit and SecurityCenter on a Windows System To be able to use SecureAudit Client, the Unisys SecurityCenter software must have previously been installed on both the Security Administrator Windows workstation and its MCP component on the MCP server. For information on how to install SecurityCenter, refer to the following Unisys documentation: Simple Installation Operations Guide Installation Center Operations Guide To install SecurityCenter client, access to the SecurityCenter directory of the INSTALLS share of your MCP server is necessary. The INSTALLS share should be visible by browsing the MCP host in the Windows network. For convenience, a local disk drive can also be mapped to the INSTALLS share after browsing to the appropriate location. Please refer to the Unisys Client Access Services Guide for information on how to connect to an MCP share. If no current version of SecurityCenter exists on the security administrator's workstation, run the 'SecurityCntr.msi' file in the INSTALLS\SecurityCenter directory. If a current version does exist, and this is an update to the current IC level of the current mark release, then ICUpdate.vbs should be run. If this is an update to a newer mark level, you must remove the current version, using Windows Add/Remove Programs, before installing the newer version. Refer to the Migration Guide for guidance in this area. Once SecurityCenter has been installed on the Windows workstation, SecureAudit Client will then be available as a snap-in within the SecurityCenter software. Privilege Requirements After installing the software for the first time, a user must have a minimum privilege of PU (Privileged User) status to run SecureAudit. If security administrator status is authorised, only a security administrator (a user marked as SECADMIN) can run SecureAudit. Such a user is allowed access to all the functions of the software. SecureAudit is enabled to use the Unisys RBAC (Role Based Access Control) implementation for applications. This is an alternative mechanism to the traditional privileges and allows the customer to define with fine granularity which users are allowed to use which functions of the software. For more information on this topic, refer to the Role Based Access Control section of this document. Pre-requisites 4

5 Familiarise yourself with SecureAudit First Steps Locum SecureAudit is a powerful auditing tool for checking ClearPath MCP systems and reporting on a wide range of events. It can be used in conjunction with Locum Software s full Safe & Secure suite to provide a comprehensive package to analyse and secure your systems. SecureAudit has two components: the Host, which runs on ClearPath MCP systems, and the Windows PC-based Client which provides a graphical user interface (GUI). While you can run SecureAudit Host in stand-alone mode directly on ClearPath MCP systems, the Client provides a user-friendly method of easily selecting and running reports. Reports run directly on the ClearPath MCP system are presented in a text format, but reports run through the SecureAudit Client can be viewed in a number of different ways, including bar and line graphs, and pie charts and can be output to PDF format. It is also possible to schedule reports and to import them from the host at a later time. For more information, see the Reports section. The SecureAudit Client Main Window The SecureAudit Client Main Window is divided into five areas. At the top of the Main Window are the Menu Bar and the Toolbar. On the left is the console tree. In the middle is the Main Window, on the right is the action pane and at the bottom of the main window is the status bar. This displays information about whatever you have currently selected. You can choose which elements of the SecureAudit Client window to show or hide by using the Customize View dialog. To access this, select either the Customize View option on the Program menu on the Toolbar, or the Customize option from the View menu on the Menu Bar. From the Customize View dialog, you can choose to show or hide the following items: Console tree Standard menus (Action and View) Standard toolbar Status bar Description bar Taskpad navigation tabs Action pane Snap-in Menus Snap-in Toolbars First Steps 5

6 The SecureAudit Client Main Window The SecureAudit Client Menu Bar The Menu Bar contains the Program and Help menus., File, Action, View, Favorites, Window The SecureAudit Client Toolbar The Toolbar contains a number of shortcut icons. Consulting the Online Help To access SecureAudit s Online Help, select Help Topics from the Help menu on the Menu Bar. Alternatively, many of SecureAudit s dialog boxes contain either a Help button or icon you can click to view the Help topic specific to the dialog you are viewing. First Steps 6

7 About Connections Configuring a Connection Connection icons represent ClearPath MCP systems to which SecureAudit may connect, and appear in the connections pane of the Main Window. The Installation process may have created a connection icon for each licensed system. If a connection was not created via the Installation process, you will need to create a connection for each ClearPath MCP system on which you intend to perform administrative functions. It is possible to arrange connections in to logical groups. You can also copy an existing connection. When connecting to a ClearPath MCP system you will be asked to supply your logon details. A successful logon will cause the colour of the connection icon for that system to change from red to green and various menus on the Menu Bar to become available. Creating a New Connection To create a new connection, follow these steps: 1. In the Console tree view panel, select, and then click on the Toolbar. The Host Details dialog will open. 2. This dialog contains three property pages: General contains general options relating to the new connection. Options allows you to specify an RBAC preferred role. Advanced contains logging options. 3. Fill out the following options on the General page: Group Name allows you to organise connections into groups. Type in a new group name or select a group from the dropdown menu. Connection Name type in the name of the new connection. This does not have to be the same as the server you are connecting to. Hostname or IP Address type in the name of the system you want to connect to, or type in the IP address of the system. Socket type in the socket number that you want to use. The default socket number is 28350, and it is recommended that this not be changed unless there is a conflict with other applications. Startup Job enter the location of the SecureAudit WFL job which initiates SecureAudit Host on the ClearPath MCP system. For example: locum\secureaudit\wfl Family this field is optional. It specifies the MCP family location of the SecureAudit WFL job. If left blank, the family specification of the running usercode will be used. 4. Click OK. The Connection will be created. Configuring a Connection 7

8 Establishing Multiple Connections You do not need to disconnect from one ClearPath MCP system before connecting to another. If you wish to establish multiple connections, repeat the logon procedure for each system you wish to connect to. Configuring a Connection 8

9 The SecureAudit Client Database The SecureAudit Client database is an SQLite database which contains data from the MCP host systems according to the report queries which have been run. When report queries are run, they retrieve the relevant information from the selected MCP system. This data is then stored in the database. Report queries are saved to the database under their respective report categories. When they are opened, the query is re-run and the report produced again. You do not have to have an active connection to view a saved report query. Note that newer versions of SecureAudit Client may contain reports which are unavailable in older versions of the Client. Please ensure you are running the latest version of SecureAudit Client in order to be able to access all reports. Creating a SecureAudit Client Database When you run SecureAudit Client for the first time, you will be prompted to specify a database. This is where SecureAudit Client will store connection details and any reports you produce. You can only have one database at a time. It is possible to share your database among SecureAudit Clients installed on multiple PCs, as long as they all have network access to the location where the database is stored. Multiple SecureAudit Clients can access the shared database concurrently. To create a database, follow these steps: 1. When you run SecureAudit Client for the first time, you will be prompted to create a new database or open an existing file. Browse to the location on your PC or a network drive where you want to save the database. 2. Type in a name for the database. The file must have the file extension.db. 3. Click OK. An empty database will be created. Accessing a Saved Database 1. Click on the Toolbar. The Create new database or open existing dialog will open. 2. Browse to the location where the database you want to access is stored, and select it. 3. Click OK. SecureAudit Client will open the database. The SecureAudit Client Database 9

10 Reports SecureAudit Client allows you to create the following reports: COMS Cfile Events DMSII Database Events File Accesses File Status Events Guardfile Activity Installation Records Logon Violations MCS Initializations Password Changes Privileged Actions Program Executions Role Based Access Control Run-time Usercode Changes Session Information System Commands System Security Violations Unauthorised File Accesses Unsuccessful Password Changes User Validations Userdata Changes Window Accesses The following reports are only available if you have Safe & Secure installed on the host system: Administrator Audit Censor Command Usage Chain Events DMSII File Activity Overdue Users Timestamp Verification Web-originated Accesses Reports 10

11 To Create a Report 1. Click on the Toolbar. The Request Data dialog will open. 2. Complete the required fields on the Source Data tab: Host system select the required host from the dropdown list. Timerange select Today, Yesterday, Last n days, or Custom: the latter option allows you to select a time period you want to run reports for. 3. On the Reports tab, choose the report(s) you want to run by checking the checkbox beside each one, or click the All button to run all reports. 4. Click Start to begin creating reports. If you are creating more than one report, this may take a little time. Once the report creation has finished, if you have created a single report, the report will be displayed on your screen. If you have created multiple reports, they will automatically be saved to the database. The Request Data Dialog- Source Data Tab Reports 11

12 Scheduling Reports You can schedule reports to be run automatically on MCP systems and have the resulting data imported into the SecureAudit Client database for you to view at a later time. You may create up to five schedules per usercode per host. To create a schedule, follow the subsequent steps: 1. Select the host that you want to create a schedule for, and either: a. From the Action menu on the Menu Bar select Schedule Options or b. Click the button on the Toolbar. 2. The Create/Modify Schedule on [host name] dialog will open. Click the New Schedule button. 3. The Schedule details on the General tab will be set to their defaults. Alter the schedule details as required. 4. Click the Reports tab. Alter the Report Timerange options as required and select the reports that you want to run automatically. You can select all reports by clicking the All button. 5. Click Apply to send the schedule to the host system. The reports generated will be placed into the specified output directory under the user s usercode. Importing Scheduled (Host) Reports When a Schedule sessions runs, SecureAudit Host will write a file with an.sca extension to the location specified when the schedule was created, or by default, to the primary family for the usercode under which SecureAudit host is running. The next time you connect from SecureAudit Client, the host will look for.sca files created under your connecting usercode. A message will be displayed telling you how many.sca files there are, if any. To import the.sca files, follow the instructions below. 1. Select the host from which you want to import the.sca file(s). You must have an open connection to the selected host. Either from the Action menu on the Menu Bar, select the Import Host Reports option or click the button on the Toolbar. The [host name]: Available Report Files dialog will open. 2. A list of available.sca files will be displayed. These will have been created under the usercode with which you are currently connected to the host. Select the file you want to import, and click the Import File button. 3. Upon confirmation, the file will be imported. When the import has finished, a message will be displayed listing the number or reports, the number of duplicate or incompatible reports which have been dropped from the import, and the total number of reports which have been successfully imported. Reports 12

13 Correlation Reports A correlation report is a customisable report which allows you to select the query you want to run on a selected host system. It allows you to set specific parameters to produce targeted reports. For example, you can produce a query which checks to see all events on a particular host system involving a specified originating usercode and where the associated text includes password over the last 7 days. To access the Correlation Report dialog, click the Toolbar. button on the The Correlation Report dialog contains three tabs: Originating Host this tab contains a dropdown list of all SecureAudit host systems that you have defined within SecureAudit Client. From here you may select the SecureAudit host system on which you want to run your query. Time Range this tab contains options allowing you to define your query s time range. Conditions this tab allows you to add one or more conditions to your query. Note that you must set at least one condition in order to run the query. The Correlation Report Dialog Reports 13

14 Exporting Files to PDF You can export report files to a PDF (portable document format) file, which can be saved then printed in a readable format. There are two ways to export a report to PDF. You can either: 1. Select the report you want to print and click the button on the Toolbar, or; 2. From the database, select the report and open it, then click the Print to PDF button. The Print to PDF dialog will open and you will be able to alter page setup options. The report will be saved in PDF format, which you can then open up and print. Files are named SCA_DDMMYYYY_hhmmss.pdf. To change the destination of saved PDF files, see the Client Options section of the Online Help Reports 14

15 The Visual Data Manager dialog The Visual Data Manager dialog provides a useful overview of the SecureAudit database and the information contained within it. To access the Visual Data Manager dialog, either right-click on the connection or the database and choose Visual Data Manager from the Database option on the contextual menu, or go to the Action Menu on the Menu Bar, select Database, and then Visual Data Manager. The Visual Data Manager Dialog- General/Info Tab The dialog contains the General tab and the Data Manager tab. The General tab The top part of the report contains the following information about your database: The Visual Data Manager dialog 15

16 Location the location where your database is stored, including the full name of your database. Jet Version the version of Microsoft s Jet Engine which was used to create the database. Size (on disk) the size of the database in Mb and bytes. Date Created the date on which the database was created. The bottom part of the dialog contains two further tabs: Info contains statistical information on the data stored in the database: o The number of saved queries you have saved in the database. o The number of connections to MCP SecureAudit Host systems you have defined within your database. o Each type of query together with the number of records stored for each query. Graph provides a bar chart of all query types, showing in visual form the numbers of records each query has. This should demonstrate if you have an abnormally high number of any particular event in comparison with the other events as shown in your records. The Visual Data Manager Dialog- General/Graph Tab The Visual Data Manager dialog 16

17 The Data Manager tab The Data Manager tab contains two further tabs: Actions allows you to compact the database. This tab also displays when the database was last compacted. If you choose to compact the database, a message will be displayed to inform you if the operation has been successful or not. Data Retention allows you to specify how long you wish data and report queries to be stored in the database. The policy is disabled by default; to enable the policy, check the Enable Retention Policy checkbox. The Visual Data Manager Dialog- Data Manager/Data Retention Tab The Visual Data Manager dialog 17

18 Graphs There are several kinds of graphs which you can generate within SecureAudit Client, depending on which report you want to view in graph form. You can only produce a graph for one report at a time. You can produce the following graphs for all reports except the Correlation report, for which no graphs are available: Vertical Bar Chart Line Graph Pie Chart The Generate Graph dialog The Generate Graph dialog can be accessed via the button on the Toolbar once you have selected a report in the Main Window, or from the Create Graph button when you have a report open. You can also access the Generate Graph dialog by right-clicking a report and selecting Create Graph from the contextual menu. The Generate Graph Dialog- Data Source Tab Graphs 18

19 The Generate Graph dialog consists of three sections: Graph Type allows you to select the type of graph you want to create. Data Source tab allows you to specify what data is included in your graph. Graph Options tab allows you to specify viewing options for each graph type, for example, whether the legend or a grid is displayed, whether percentages and labels are included, and line thickness. It is possible to save a graph by clicking the Save button from an open graph. You can choose to save the graph as the following file types: jpg bmp gif png pcx Bar Graphs The Bar Graph is designed to help you view the change in records over time. To this end, you can either choose to display daily change or monthly change from the Data Source tab, Frequency section. An example Bar Graph for the System Security Violations Report Graphs 19

20 Line Graphs Line Graphs are designed to help you view the change in records over time. As with Bar Graphs, you can either choose to display daily change or monthly change from the Data Source tab, Frequency section. An example Line Graph for the Logon Violations Report Pie Charts Pie charts are designed to help you view up to 10 items as a percentage value of the total records displayed. You must select between 1 and 10 items from those listed for the report for any one pie chart. An example Pie Chart for the Program Executions Report Graphs 20

21 Role-Based Access Control Role-Based Access Control (RBAC) is available with SecureAudit. RBAC is an effective approach to authorising access for users based on their roles within the organisation. The model is based on the concept of users, roles and permissions. SecureAudit is a member of the Locum realm. The realm may be enabled by the definition of a single role and user within the realm. Note that once the realm is enabled, the traditional MCP privileges of PU and SECADMIN are ignored and the permissions allocated to the user s role are the only determining factor used for authorisation. If a user does not hold a particular permission, the functions associated with that permission are unavailable to the user. Within the Client, these functions will be greyed out. The administration of RBAC, such as the setting up of roles, associating users with roles and allocating permissions to roles, is accomplished through Unisys SecurityCenter Client. The Locum realm and list of permissions within the realm are pre-defined, and established during installation of SecurityCenter. Once you are connected to SecureAudit, the Role Picker dialog will appear, allowing you to select an appropriate role from the Role List. It is possible to switch roles during your session by right-clicking on the connection and selecting Request Role List from the context menu. Role-Based Access Control 21

22 Best Practices Each of the reports has security relevance. The importance of each will vary from site to site, depending on such factors as the size and type of the workload and the complexity of the security policy in force throughout the company. The following table shows the reports which are deemed to be the lowest common denominators, and therefore probably of most use to most sites. Report Security Violations Logon Violations System Commands Unauthorised File Accesses Password Changes Window Accesses COMS Cfile Events File Status Events Run-time Usercode Changes Userdatafile Changes DMSII Database Events Guardfile Activity Suggested Frequency Daily Statistics Daily Statistics Daily Statistics Daily Daily Daily (with window filter) Weekly Daily (with appropriate filter) Daily Daily Daily Daily The Daily Statistics reports give an overview of activity, allowing forensic ad hoc reports (whether full or filtered) to be performed should there be suspicious activity identified by the statistics. Time-line graphs can be performed on a daily or monthly basis and are extremely useful in identifying trends. It is recommended that the reports are generated via the scheduling function, which allows data collection to be performed on the MCP host without the need for SecureAudit Client to be up and running. When the Client is next initiated, the user is presented with the option of downloading and importing the data to the local database. Within the Visual Data Manager, you can use the Retention Policy to manage report queries. You can set up a policy to remove queries and optionally the associated data once they reach a set age, specified in days. Best Practices 22

23 Reports generated by the Client have several output formats. For presentation to auditors, output to PDF is usually advised. Note that you can rearrange the order of the columns on each report to your liking. Do this via the Customised Columns tab on the Client Options dialog. Columns which you don t want to see can be hidden by deselecting the checkbox next to the Data Item. If you have multiple MCP servers, it can be advantageous to use the Group Name field in the Connection Properties dialog to organise connections into groups, for example, Production or Test. As with many other things, security issues are continually evolving. More threats and vulnerabilities become exposed over periods of time. In addition, each MCP release may introduce new security functionality. Because of these, regular and periodic security reviews should be undertaken, and as a result of these, or as part of these, the SecureAudit schedule should be amended accordingly. Best Practices 23

24 Index Best Practices...22 Connections... 7 About... 7 Creating... 7 Multiple... 8 First Steps... 5 Graphs...18 Bar...19 Generate Graph dialog...18 Line...20 Pie Charts...20 Installation... 4 Privilege Requirements... 4 Online Help... 6 RBAC...21 Reports...10 Correlation Creating Exporting Files to PDF Importing Scheduling SecureAudit Client Database... 9 Creating... 9 The Visual Data Manager dialog SecureAudit Client Main Window... 5 Menu Bar... 6 Toolbar... 6 System Requirements... 3 License Requirements... 3 MCP Requirements... 3 Network Requirements... 3 Windows Requirements... 3 Index i

Client Installation and User's Guide

Client Installation and User's Guide IBM Tivoli Storage Manager FastBack for Workstations Version 7.1.1 Client Installation and User's Guide SC27-2809-04 IBM Tivoli Storage Manager FastBack for Workstations Version 7.1.1 Client Installation

More information

User Manual For SmartRoom Managers

User Manual For SmartRoom Managers User Manual For SmartRoom Managers Table of Contents 1.0 Login 2.0 Confidentiality Agreement 3.0 Software Installation 4.0 Dashboard 5.0 Document Review and Index Maintenance 5.1 View by Index 5.1.1 Index

More information

Client Installation and User's Guide

Client Installation and User's Guide IBM Tivoli Storage Manager FastBack for Workstations Version 7.1 Client Installation and User's Guide SC27-2809-03 IBM Tivoli Storage Manager FastBack for Workstations Version 7.1 Client Installation

More information

Nintex Reporting 2008 Help

Nintex Reporting 2008 Help Nintex Reporting 2008 Help Last updated: Thursday, 24 December 2009 1 Using Nintex Reporting 2008 1.1 Chart Viewer Web Part 1.2 Importing and Exporting Reports 1.3 Import Nintex report page 1.4 Item Level

More information

Top Producer for Palm Handhelds

Top Producer for Palm Handhelds Top Producer for Palm Handhelds Quick Setup Top Producer Systems Phone number: 1-800-830-8300 Email: support@topproducer.com www.topproducer.com Fax: 604.270.6365 Top Producer for Palm handhelds Quick

More information

OTObase. Reference Manual. Doc. No EN/05 Part No EN

OTObase. Reference Manual. Doc. No EN/05 Part No EN OTObase Reference Manual Doc. No. 7-50-1410-EN/05 Part No. 7-50-14100-EN Copyright notice 2013, 2018 GN Otometrics A/S. All rights reserved. Otometrics, the Otometrics Icon, AURICAL, MADSEN, ICS and HORTMANN

More information

Server Edition USER MANUAL. For Mac OS X

Server Edition USER MANUAL. For Mac OS X Server Edition USER MANUAL For Mac OS X Copyright Notice & Proprietary Information Redstor Limited, 2016. All rights reserved. Trademarks - Mac, Leopard, Snow Leopard, Lion and Mountain Lion are registered

More information

HarePoint Analytics. For SharePoint. User Manual

HarePoint Analytics. For SharePoint. User Manual HarePoint Analytics For SharePoint User Manual HarePoint Analytics for SharePoint 2013 product version: 15.5 HarePoint Analytics for SharePoint 2016 product version: 16.0 04/27/2017 2 Introduction HarePoint.Com

More information

Primo Analytics Workshop. BIBSYS Konferansen 20 March 2018

Primo Analytics Workshop. BIBSYS Konferansen 20 March 2018 Primo Analytics Workshop BIBSYS Konferansen 20 March 2018 Objectives By the end of this session, you will: Understand what is Primo Analytics and OBI. Have a high-level view of how Primo Analytics is working.

More information

A Guide to Creating QuickReports

A Guide to Creating QuickReports A Guide to Creating QuickReports Use QuickReports to produce lists, summaries and charts from the data in SupportDesk. If in the Windows application Access QuickReports, from Reporting within the Explorer

More information

WinView. Getting Started Guide

WinView. Getting Started Guide WinView Getting Started Guide Version 4.3.12 June 2006 Copyright 2006 Mincom Limited All rights reserved. No part of this document may be reproduced, transferred, sold or otherwise disposed of without

More information

ISF Watchkeeper 3 Getting Started Users Guide

ISF Watchkeeper 3 Getting Started Users Guide ISF Watchkeeper 3 Getting Started Users Guide ISF Watchkeeper is a computer software program, for use on board ships. The software is designed for maintaining records of seafarers hours of work and rest,

More information

User Guide. FTR Manager For more information visit

User Guide. FTR Manager For more information visit FTR Manager 5.7.1 TABLE OF CONTENTS INTRODUCTION... 4 Overview... 4 About This Document... 4 GETTING STARTED... 5 Installation... 5 Starting FTR Manager... 5 To start Manager in Windows 7 or Windows 10

More information

Top Producer for Palm handhelds

Top Producer for Palm handhelds Top Producer for Palm handhelds User Guide Top Producer Systems Phone number: 1-800-830-8300 E-mail: support@topproducer.com Web site: www.topproducer.com Fax number: 604.270.6365 Top Producer for Palm

More information

NETWRIX WINDOWS SERVER CHANGE REPORTER

NETWRIX WINDOWS SERVER CHANGE REPORTER NETWRIX WINDOWS SERVER CHANGE REPORTER ADMINISTRATOR S GUIDE Product Version: 4.0 June 2013. Legal Notice The information in this publication is furnished for information use only, and does not constitute

More information

The Whimsical World of MCP Security Options

The Whimsical World of MCP Security Options LOCUM SOFTWARE SERVICES LTD SECURITY SOLUTIONS SOFTWARE The Whimsical World of MCP Security Options UN4017 V - September 11th 2013 Kevin Stones Technical Director, Locum Technology Partner Overview Introduction

More information

Comodo LoginPro Software Version 1.0

Comodo LoginPro Software Version 1.0 Comodo LoginPro Software Version 1.0 User Guide Guide Version 1.0.102512 Comodo Security Solutions 1255 Broad Street STE 100 Clifton, NJ 07013 Table of Contents 1.Introduction to Comodo LoginPro... 3 1.1.System

More information

ACH Concentration Service User Guide

ACH Concentration Service User Guide User Guide March 2008 Original Publication 5/2005 Version 9.0 NOTICE We have made every effort to ensure the accuracy of this manual. However, JPMorgan Chase Bank, N.A. and Metavante Corporation make no

More information

Colligo Engage Outlook App 7.1. Offline Mode - User Guide

Colligo Engage Outlook App 7.1. Offline Mode - User Guide Colligo Engage Outlook App 7.1 Offline Mode - User Guide Contents Colligo Engage Outlook App 1 Benefits 1 Key Features 1 Platforms Supported 1 Installing and Activating Colligo Engage Outlook App 3 Checking

More information

CenterStone. Reports User Guide. Manhattan Software Inc. World Leading Real Estate, Asset & Facilities Management Software.

CenterStone. Reports User Guide. Manhattan Software Inc. World Leading Real Estate, Asset & Facilities Management Software. CenterStone Reports User Guide Version 1 Manhattan Software Inc. World Leading Real Estate, Asset & Facilities Management Software The information contained herein is the property of Manhattan Software,

More information

The following topics describe how to work with reports in the Firepower System:

The following topics describe how to work with reports in the Firepower System: The following topics describe how to work with reports in the Firepower System: Introduction to Reports Introduction to Reports, on page 1 Risk Reports, on page 1 Standard Reports, on page 2 About Working

More information

Working with Reports

Working with Reports The following topics describe how to work with reports in the Firepower System: Introduction to Reports, page 1 Risk Reports, page 1 Standard Reports, page 2 About Working with Generated Reports, page

More information

Business Insight Authoring

Business Insight Authoring Business Insight Authoring Getting Started Guide ImageNow Version: 6.7.x Written by: Product Documentation, R&D Date: August 2016 2014 Perceptive Software. All rights reserved CaptureNow, ImageNow, Interact,

More information

Relativity Designer Installation Guide

Relativity Designer Installation Guide Liant Software Corporation Relativity Designer Installation Guide Version 5 Copyright 1994-2003 by Liant Software Corporation. All rights reserved. Printed in U.S.A. No part of this publication may be

More information

Netwrix Auditor for Active Directory

Netwrix Auditor for Active Directory Netwrix Auditor for Active Directory Quick-Start Guide Version: 8.0 4/22/2016 Legal Notice The information in this publication is furnished for information use only, and does not constitute a commitment

More information

Layers. About PDF layers. Show or hide layers

Layers. About PDF layers. Show or hide layers 1 Layers About PDF layers You can view, navigate, and print layered content in PDFs created from applications such as InDesign, AutoCAD, and Visio. You can control the display of layers using the default

More information

EMCO Ping Monitor Enterprise 6. Copyright EMCO. All rights reserved.

EMCO Ping Monitor Enterprise 6. Copyright EMCO. All rights reserved. Copyright 2001-2017 EMCO. All rights reserved. Company web site: emcosoftware.com Support e-mail: support@emcosoftware.com Table of Contents Chapter... 1: Introduction 4 Chapter... 2: Getting Started 6

More information

Xton Access Manager GETTING STARTED GUIDE

Xton Access Manager GETTING STARTED GUIDE Xton Access Manager GETTING STARTED GUIDE XTON TECHNOLOGIES, LLC PHILADELPHIA Copyright 2017. Xton Technologies LLC. Contents Introduction... 2 Technical Support... 2 What is Xton Access Manager?... 3

More information

HBS Training - IT Solutions. PlanWeb. Intermediate

HBS Training - IT Solutions. PlanWeb. Intermediate HBS Training - IT Solutions PlanWeb Intermediate CONTENTS Logging on to the system...3 The PlanWeb Window...5 The Tool Bar...6 The Status Bar...6 The Map Window...6 The Information Window...7 Changing

More information

Newforma Contact Directory Quick Reference Guide

Newforma Contact Directory Quick Reference Guide Newforma Contact Directory Quick Reference Guide This topic provides a reference for the Newforma Contact Directory. Purpose The Newforma Contact Directory gives users access to the central list of companies

More information

Symantec Enterprise Vault

Symantec Enterprise Vault Symantec Enterprise Vault Guide for Microsoft Outlook 2010/2013 Users 11.0 Light Outlook Add-In Symantec Enterprise Vault: Guide for Microsoft Outlook 2010/2013 Users The software described in this book

More information

Management Interface User Guide

Management Interface User Guide Management Interface User Guide VIDEO Powered by Table of Contents Accessing the management interface 4 Creating your user account 4 Signing-in 4 Forgot your password 4 Media players menu 5 Checking Player

More information

Access Gateway Client User's Guide

Access Gateway Client User's Guide Sysgem Access Gateway Access Gateway Client User's Guide Sysgem AG Sysgem is a trademark of Sysgem AG. Other brands and products are registered trademarks of their respective holders. 2013-2015 Sysgem

More information

Attix5 Pro Storage Platform Console

Attix5 Pro Storage Platform Console Attix5 Pro Storage Platform Console V7.0.1 User Manual for Microsoft Windows Your guide to managing the Attix5 Pro backup environment using the Storage Platform Console. 0 Copyright notice and proprietary

More information

Integrate Saint Security Suite. EventTracker v8.x and above

Integrate Saint Security Suite. EventTracker v8.x and above EventTracker v8.x and above Publication Date: June 6, 2018 Abstract This guide provides instructions to configure Saint Security Suite to send crucial events to EventTracker Enterprise by means of syslog.

More information

Sophos Central Admin. help

Sophos Central Admin. help help Contents About Sophos Central... 1 Activate Your License...2 Endpoint Protection...3 Dashboard...3 Alerts...4 Root Cause Analysis...9 Logs & Reports... 11 People... 24 Computers...33 Computer Groups...40

More information

TIBCO Spotfire Automation Services 7.5. User s Manual

TIBCO Spotfire Automation Services 7.5. User s Manual TIBCO Spotfire Automation Services 7.5 User s Manual Revision date: 15 January 2016 Important Information SOME TIBCO SOFTWARE EMBEDS OR BUNDLES OTHER TIBCO SOFTWARE. USE OF SUCH EMBEDDED OR BUNDLED TIBCO

More information

User Guide. 3CX Enhanced Billing Codes. Version

User Guide. 3CX Enhanced Billing Codes. Version User Guide 3CX Enhanced Billing Codes Version 15.5.54 "Copyright VoIPTools, LLC 2011-2017" Information in this document is subject to change without notice. No part of this document may be reproduced or

More information

NETWRIX PASSWORD EXPIRATION NOTIFIER

NETWRIX PASSWORD EXPIRATION NOTIFIER NETWRIX PASSWORD EXPIRATION NOTIFIER ADMINISTRATOR S GUIDE Product Version: 3.3 January 2013 Legal Notice The information in this publication is furnished for information use only, and does not constitute

More information

SCOUT SUSPENSE TRACKER Version 10.0

SCOUT SUSPENSE TRACKER Version 10.0 SCOUT SUSPENSE TRACKER Version 10.0 USER S MANUAL For Civilian Personnel Management Service (CPMS) HPC-COM LLC Help Desk 800-795-1902 Updated: February 2011 Table of Contents SCOUT Suspense Tracker V10.0

More information

#define 4 User Guide. Version 4.0. CGI Group Inc.

#define 4 User Guide. Version 4.0. CGI Group Inc. #define 4 User Guide Version 4.0 CGI Group Inc. Table of Contents Section Slides Wiki 5-7 Tickets 8-12 Files 13-15 Planning 16-21 Cooperate 22-24 Settings 25-31 Agile Features 32-34 Desktop Applications

More information

Server Edition USER MANUAL. For Microsoft Windows

Server Edition USER MANUAL. For Microsoft Windows Server Edition USER MANUAL For Microsoft Windows Copyright Notice & Proprietary Information Redstor Limited, 2016. All rights reserved. Trademarks - Microsoft, Windows, Microsoft Windows, Microsoft Windows

More information

Interface Reference topics

Interface Reference topics McAfee Content Security Reporter 2.6.x Interface Reference Guide Interface Reference topics Edit Permission Set page (Permission Sets page) Specify Content Security Reporter permissions and grant user

More information

Creating Dashboard Widgets. Version: 16.0

Creating Dashboard Widgets. Version: 16.0 Creating Dashboard Widgets Version: 16.0 Copyright 2017 Intellicus Technologies This document and its content is copyrighted material of Intellicus Technologies. The content may not be copied or derived

More information

Server Edition. V8 Peregrine User Manual. for Microsoft Windows

Server Edition. V8 Peregrine User Manual. for Microsoft Windows Server Edition V8 Peregrine User Manual for Microsoft Windows Copyright Notice and Proprietary Information All rights reserved. Attix5, 2015 Trademarks - Microsoft, Windows, Microsoft Windows, Microsoft

More information

SnapCenter Software 4.1. Administration Guide. December _C0 Updated for 4.1.1

SnapCenter Software 4.1. Administration Guide. December _C0 Updated for 4.1.1 SnapCenter Software 4.1 Administration Guide December 2018 215-13391_C0 doccomments@netapp.com Updated for 4.1.1 Table of Contents 3 Contents Deciding whether to read the SnapCenter Administration information...

More information

Workspace Administrator Help File

Workspace Administrator Help File Workspace Administrator Help File Table of Contents HotDocs Workspace Help File... 1 Getting Started with Workspace... 3 What is HotDocs Workspace?... 3 Getting Started with Workspace... 3 To access Workspace...

More information

Open. Select the database and click. Print. Set printing options using the dropdown menus, then click the

Open. Select the database and click. Print. Set printing options using the dropdown menus, then click the The Original Quick Reference Guides Microsoft Access 2010 Access is a tool for creating and managing databases collections of related records structured in an easily accessible format such as a table,

More information

EvaluNet XT v1.2. Setup Guide

EvaluNet XT v1.2. Setup Guide 2 EvaluNet XT v1.2 Setup Guide Table of Contents 1 INTRODUCTION 2 1.1 HOW IS EVALUNET XT STRUCTURED? 2 1.2 SYSTEM REQUIREMENTS 2 1.3 NETWORK SETUP DETAILS 2 1.4 PEER-TO-PEER NETWORKS 3 1.5 LINUX SETUP

More information

Desktop & Laptop Edition

Desktop & Laptop Edition Desktop & Laptop Edition USER MANUAL For Mac OS X Copyright Notice & Proprietary Information Redstor Limited, 2016. All rights reserved. Trademarks - Mac, Leopard, Snow Leopard, Lion and Mountain Lion

More information

SARS ANYWHERE ADMINISTRATION MANUAL APPENDICES

SARS ANYWHERE ADMINISTRATION MANUAL APPENDICES SARS ANYWHERE ADMINISTRATION MANUAL APPENDICES APPENDIX A HELP FILE The Help feature is a convenient and quick way to obtain more information about SARS Anywhere topics. There are four ways to use the

More information

How to use the Sales Based Availability Dashboard

How to use the Sales Based Availability Dashboard How to use the Sales Based Availability Dashboard Supplier Guide Sept 2017 v1 1 Contents What is Sales Based Availability and why is it important?... 3 How is Sales Based Availability calculated and how

More information

Halcyon Spooled File Manager GUI. v8.0 User Guide

Halcyon Spooled File Manager GUI. v8.0 User Guide Halcyon Spooled File Manager GUI v8.0 User Guide Copyright Copyright HelpSystems, LLC. All rights reserved. www.helpsystems.com US: +1 952-933-0609 Outside the U.S.: +44 (0) 870 120 3148 IBM, AS/400, OS/400,

More information

PISCES Installation and Getting Started 1

PISCES Installation and Getting Started 1 This document will walk you through the PISCES setup process and get you started accessing the suite of available tools. It will begin with what options to choose during the actual installation and the

More information

Perceptive Nolij Web. Administrator Guide. Version: 6.8.x

Perceptive Nolij Web. Administrator Guide. Version: 6.8.x Perceptive Nolij Web Administrator Guide Version: 6.8.x Written by: Product Knowledge, R&D Date: June 2018 Copyright 2014-2018 Hyland Software, Inc. and its affiliates.. Table of Contents Introduction...

More information

Impossible Solutions, Inc. JDF Ticket Creator & DP2 to Indigo scripts Reference Manual Rev

Impossible Solutions, Inc. JDF Ticket Creator & DP2 to Indigo scripts Reference Manual Rev Impossible Solutions, Inc. JDF Ticket Creator & DP2 to Indigo scripts Reference Manual Rev. 06.29.09 Overview: This reference manual will cover two separate applications that work together to produce a

More information

Print Audit 6. Print Audit 6 Documentation Apr :07. Version: Date:

Print Audit 6. Print Audit 6 Documentation Apr :07. Version: Date: Print Audit 6 Version: Date: 37 21-Apr-2015 23:07 Table of Contents Browse Documents:..................................................... 3 Database Documentation.................................................

More information

Miami s Quick Start Guide for Using. Snap 9 Professional. to Create a Paper Keyed Survey. Miami s Survey Solutions

Miami s Quick Start Guide for Using. Snap 9 Professional. to Create a Paper Keyed Survey. Miami s Survey Solutions Miami s Quick Start Guide for Using Snap 9 Professional to Create a Paper Keyed Survey 1 Miami s Survey Solutions Snap 9 Professional Getting Started This Quick Start Guide is intended to help you become

More information

Use Active Directory To Simulate InfoPath User Roles

Use Active Directory To Simulate InfoPath User Roles Page 1 of 7 Use Active Directory To Simulate InfoPath User Roles You can leverage the information returned by the Active Directory web service to simulate InfoPath User Roles, which are disabled in browser

More information

ForeScout Extended Module for Tenable Vulnerability Management

ForeScout Extended Module for Tenable Vulnerability Management ForeScout Extended Module for Tenable Vulnerability Management Version 2.7.1 Table of Contents About Tenable Vulnerability Management Module... 4 Compatible Tenable Vulnerability Products... 4 About Support

More information

Using SupportDesk. House-on-the-Hill Software Ltd. SupportDesk Green

Using SupportDesk. House-on-the-Hill Software Ltd. SupportDesk Green Using SupportDesk House-on-the-Hill Software Ltd SupportDesk Green Software Copyright 1993-2007 House-On-The-Hill Software Ltd. All Rights Reserved. Manual Copyright 1993-2007 House-On-The-Hill Software

More information

Cox Business Online Backup Administrator Guide. Version 2.0

Cox Business Online Backup Administrator Guide. Version 2.0 Cox Business Online Backup Administrator Guide Version 2.0 2012 by Cox Communications. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means, electronic,

More information

Installation and Configuration Guide

Installation and Configuration Guide Sysgem SysMan Utilities (Professional Edition) Installation and Configuration Guide By Sysgem AG Sysgem is a trademark of Sysgem AG. Other brands and products are registered trademarks of their respective

More information

SIMPLIFi Compliance Software User Manual

SIMPLIFi Compliance Software User Manual SIMPLIFi Compliance Software User Manual Version 1.7 2013 Simplifi-Solutions Ltd, Environmental Center, Unit B5, The Gordon Manley Building, Lancaster University, LA1 4WA Telephone: 01524 510431 Email:

More information

BDM Hyperion Workspace Basics

BDM Hyperion Workspace Basics BDM Hyperion Workspace Basics Contents of this Guide - Toolbars & Buttons Workspace User Interface 1 Standard Toolbar 3 Explore Toolbar 3 File extensions and icons 4 Folders 4 Browsing Folders 4 Root folder

More information

Intellicus Enterprise Reporting and BI Platform

Intellicus Enterprise Reporting and BI Platform Designing Adhoc Reports Intellicus Enterprise Reporting and BI Platform Intellicus Technologies info@intellicus.com www.intellicus.com Designing Adhoc Reports i Copyright 2012 Intellicus Technologies This

More information

Electronic Sales Platform User s Manual

Electronic Sales Platform User s Manual Electronic Sales Platform User s Manual Version 1.1 2018 St. Petersburg 2 CONTENTS Preface... 3 1 Introduction... 4 1.1 Workstation Requirements and Settings... 4 1.2 Starting application... 5 2 Summary

More information

DATASTREAM CHART STUDIO GETTING STARTED

DATASTREAM CHART STUDIO GETTING STARTED DATASTREAM DATASTREAM CHART STUDIO GETTING STARTED Thomson Reuters Training Quick and easy access to Technical Analysis charts and data is essential in today s fast moving markets. The Datastream Chart

More information

Getting Started with Solar Eclipse. Release 8.6.5

Getting Started with Solar Eclipse. Release 8.6.5 Getting Started with Solar Eclipse Release 8.6.5 Legal Notices 2009 Activant Solutions Inc. All rights reserved. Unauthorized reproduction is a violation of applicable laws. Activant and the Activant logo

More information

User Agent Preparing the Windows Environment and Installing the User Agent. How-To

User Agent Preparing the Windows Environment and Installing the User Agent. How-To User Agent 1.1.5 Preparing the Windows Environment and Installing the User Agent How-To CONTENTS Introduction to the User Agent... 2 Selecting the User Account to Run the User Agent... 3 Setting Access

More information

Product Documentation SAP Business ByDesign August Analytics

Product Documentation SAP Business ByDesign August Analytics Product Documentation PUBLIC Analytics Table Of Contents 1 Analytics.... 5 2 Business Background... 6 2.1 Overview of Analytics... 6 2.2 Overview of Reports in SAP Business ByDesign... 12 2.3 Reports

More information

SAS Visual Analytics 8.2: Working with Report Content

SAS Visual Analytics 8.2: Working with Report Content SAS Visual Analytics 8.2: Working with Report Content About Objects After selecting your data source and data items, add one or more objects to display the results. SAS Visual Analytics provides objects

More information

Configuration and Administration Guide

Configuration and Administration Guide Sysgem Access Gateway Configuration and Administration Guide Sysgem AG Sysgem is a trademark of Sysgem AG. Other brands and products are registered trademarks of their respective holders. 2013-2015 Sysgem

More information

Zen Internet. Online Data Backup. Zen Vault Express for Mac. Issue:

Zen Internet. Online Data Backup. Zen Vault Express for Mac. Issue: Zen Internet Online Data Backup Zen Vault Express for Mac Issue: 2.0.08 Tel: 01706 90200 Fax: 01706 902005 E-mail: info@zen.co.uk Web: www.zen.co.uk Zen Internet 2015 Contents 1 Introduction... 3 1.1 System

More information

CITO2 Installation & User Instructions

CITO2 Installation & User Instructions CITO2 Installation & User Instructions DD 56107 Stoneridge Electronics Ltd 1. Installation...4 1.1. System Requirements...4 1.2. Installing CITO2...4 1.3. Uninstalling CITO2...4 2. Starting and closing

More information

Business Intelligence Launch Pad User Guide SAP BusinessObjects Business Intelligence Platform 4.1 Support Package 1

Business Intelligence Launch Pad User Guide SAP BusinessObjects Business Intelligence Platform 4.1 Support Package 1 Business Intelligence Launch Pad User Guide SAP BusinessObjects Business Intelligence Platform 4.1 Support Package 1 Copyright 2013 SAP AG or an SAP affiliate company. All rights reserved. No part of this

More information

FileLoader for SharePoint

FileLoader for SharePoint End User's Guide FileLoader for SharePoint v. 2.0 Last Updated 6 September 2012 3 Contents Preface 4 FileLoader Users... 4 Getting Started with FileLoader 5 Configuring Connections to SharePoint 7 Disconnecting

More information

NovaBACKUP CMon v19.0

NovaBACKUP CMon v19.0 June 2017 NovaBACKUP CMon v19.0 User Manual Features and specifications are subject to change without notice. The information provided herein is provided for informational and planning purposes only. 2017

More information

Protection! User Guide. A d m i n i s t r a t o r G u i d e. v L i c e n s i n g S e r v e r. Protect your investments with Protection!

Protection! User Guide. A d m i n i s t r a t o r G u i d e. v L i c e n s i n g S e r v e r. Protect your investments with Protection! jproductivity LLC Protect your investments with Protection! User Guide Protection! L i c e n s i n g S e r v e r v 4. 9 A d m i n i s t r a t o r G u i d e tm http://www.jproductivity.com Notice of Copyright

More information

Sage Estimating (SQL) v17.11

Sage Estimating (SQL) v17.11 Sage Estimating (SQL) v17.11 Installation and Administration Guide July 2017 This is a publication of Sage Software, Inc. 2017 The Sage Group plc or its licensors. All rights reserved. Sage, Sage logos,

More information

Exporting Data in Version 3.6

Exporting Data in Version 3.6 The modern, fast and easy to use risk analysis tool Exporting Data in Version 3.6 BowTie Pro Westhill Business Centre Arnhall Business Park Westhill, Aberdeenshire, AB32 6UF, UK Tel: +44 (0) 1224 51 50

More information

Quick Guide Copyright Bureau van Dijk 2010 Last updated September 2010

Quick Guide Copyright Bureau van Dijk 2010 Last updated September 2010 Quick Guide Copyright Bureau van Dijk 2010 Last updated September 2010 Table Of Contents 1.0. INTRODUCTION... 1 1.1. HOW IT HELP YOU... 1 1.2. COVERAGE... 2 1.3. SOFTWARE OVERVIEW... 2 1.4. SYSTEM REQUIREMENTS...

More information

Securit Version 6.2 Service Pack 1. Quick Start Guide. September 2006

Securit Version 6.2 Service Pack 1. Quick Start Guide. September 2006 Securit 4400 Version 6.2 Service Pack 1 Quick Start Guide September 2006 QSG003 - Securit 4400 Quick Start Guide 1 Securit 4400 Quick Start Guide 1 Introduction 3 1.1 About Securit 4400 3 2 Installation

More information

IFS Data Migration Excel Add-In

IFS Data Migration Excel Add-In IFS Data Migration Excel Add-In User Manual for IFS Data Migration Excel Add-In Contents Figures... 2 1 IFS Data Migration Excel Add-In... 2 1.1 Overview... 3 2 User Interface... 3 2.1 Ribbon... 3 2.2

More information

5 MANAGING USER ACCOUNTS AND GROUPS

5 MANAGING USER ACCOUNTS AND GROUPS MANAGING USER ACCOUNTS AND GROUPS.1 Introduction to user accounts Objectives.2 Types of User Accounts.2.1 Local User Account.2.2 Built-in User Account.2.3 Domain User Account.3 User Profile.3.1 Content

More information

User Guide. FTR Reporter For more information, visit

User Guide. FTR Reporter For more information, visit FTR Reporter 5.7.1 For more information, visit www.fortherecord.com TABLE OF CONTENTS INTRODUCTION... 5 Overview... 5 About This Document... 5 GETTING STARTED... 6 Installation... 6 Starting Reporter...

More information

Electronic Appraisal Delivery (EAD) Portal. FHA EAD General User Guide

Electronic Appraisal Delivery (EAD) Portal. FHA EAD General User Guide Electronic Appraisal Delivery (EAD) Portal FHA EAD General User Guide Last Updated: October 2015 FHA EAD General User Guide Page 2 of 87 Version 1.3.1 TABLE OF CONTENTS INTRODUCTION... 6 WHAT IS THE ELECTRONIC

More information

User Guide. 3CX Enhanced Billing Codes. Version

User Guide. 3CX Enhanced Billing Codes. Version User Guide 3CX Enhanced Billing Codes Version 15.5.54 "Copyright VoIPTools, LLC 2011-2018" Information in this document is subject to change without notice. No part of this document may be reproduced or

More information

8 MANAGING SHARED FOLDERS & DATA

8 MANAGING SHARED FOLDERS & DATA MANAGING SHARED FOLDERS & DATA STORAGE.1 Introduction to Windows XP File Structure.1.1 File.1.2 Folder.1.3 Drives.2 Windows XP files and folders Sharing.2.1 Simple File Sharing.2.2 Levels of access to

More information

Microsoft Outlook 2003 Microsoft screen shots used in accordance with Microsoft rules to be viewed at URL

Microsoft Outlook 2003 Microsoft screen shots used in accordance with Microsoft rules to be viewed at URL Microsoft Outlook 2003 Microsoft screen shots used in accordance with Microsoft rules to be viewed at URL http://www.microsoft.com/permission/copyrgt/cop-img.htm#screenshot Compiled by: Charmaine Morris

More information

FirstClass and the NLC Intranet. Version 12

FirstClass and the NLC Intranet. Version 12 FirstClass and the NLC Intranet Version 12 Date Modified 15/06/2016 Use of the FirstClass E-mail system Introduction Please read the following in conjunction with the Internet and E-mail Policies issued

More information

SSC Campus Front Desk User Guide University of Oregon

SSC Campus Front Desk User Guide University of Oregon SSC Campus Front Desk User Guide University of Oregon Office of Academic Advising 5/3/2016 Table of Contents Advising Center... 1 Appointments... 2 Schedule an Appointment... 2 Cancel an Appointment...

More information

DRoster Employee Scheduler User Manual

DRoster Employee Scheduler User Manual DRoster Employee Scheduler Copyright 2006 Kappix Contents 1 Introduction... 3 2 Installing DRoster... 4 2.1 Installation Requirements... 4 2.2 Installation Modes... 4 2.3 Installation... 5 3 The DRoster

More information

Chapter A2: BankLink Books clients

Chapter A2: BankLink Books clients Chapter A2: BankLink Books clients This chapter is aimed at BankLink Administrators This Chapter covers the options available for processing in BankLink Books. The BankLink Service Agreement permits you

More information

bv-control User Guide for NetWare v8.00 BindView Corporation 5151 San Felipe, Suite 2500 Houston, TX 77056

bv-control User Guide for NetWare v8.00 BindView Corporation 5151 San Felipe, Suite 2500 Houston, TX 77056 bv-control for NetWare v8.00 User Guide BindView Corporation 5151 San Felipe, Suite 2500 Houston, TX 77056 COPYRIGHT Copyright 1999-2004 BindView Corporation. All rights reserved. BindView Corporation

More information

Section 11 Toolkit. User Guide

Section 11 Toolkit. User Guide Section 11 Toolkit User Guide Section 11 toolkit User Guide http://www.optimise4success.co.uk/section11 Virtual College Ltd Marsel House Stephensons Way Ilkley LS29 8DD United Kingdom Telephone: 01943

More information

AMPHIRE SOLUTIONS. Electronic Community Manual

AMPHIRE SOLUTIONS. Electronic Community Manual AMPHIRE SOLUTIONS Electronic Community Manual Table of Contents THE ELECTRONIC COMMUNITY 3 1. Welcome to the Amphire Connect Community! 3 Minimum System Requirements 3 2. Logging in to the Amphire Community

More information

Documentation for the new Self Admin

Documentation for the new Self Admin Documentation for the new Self Admin The following documentation describes the structure of the new Self Admin site along with the purpose of each site section. The improvements that have been made to

More information

User Guide For Version 4.0

User Guide For Version 4.0 User Guide For Version 4.0 Easy-to-use, Complete Cyber Cafe Management Software by icafe Manager User Guide Contents Chapter 1: Introduction 7 1.1 About the Manual 7 1.2 Intended Audience 7 1.3 Conventions

More information

Integrate Sophos Enterprise Console. EventTracker v8.x and above

Integrate Sophos Enterprise Console. EventTracker v8.x and above Integrate Sophos Enterprise Console EventTracker v8.x and above Publication Date: September 22, 2017 Abstract This guide provides instructions to configure Sophos Enterprise Console to send the events

More information