Getting Started. A Getting Started Guide for Locum SecureAudit MANUAL RELATIVE TO VERSION 17.0 LOCUM SOFTWARE SERVICES LIMITED
|
|
- Dina Carroll
- 5 years ago
- Views:
Transcription
1 Getting Started A Getting Started Guide for Locum SecureAudit MANUAL RELATIVE TO VERSION 17.0 LOCUM SOFTWARE SERVICES LIMITED Locum House, 84 Brown Street, Sheffield, S1 2BS, England Telephone: +44 (0) enquiries@locumsoftware.com Web:
2 Contents Contents... i System Requirements... 3 Windows Requirements... 3 MCP Requirements... 3 Network Requirements... 3 License Requirements... 3 Pre-requisites... 4 Installing SecureAudit and SecurityCenter on a Windows System... 4 Privilege Requirements... 4 First Steps... 5 Familiarise yourself with SecureAudit... 5 The SecureAudit Client Main Window... 5 Configuring a Connection... 7 About Connections... 7 Creating a New Connection... 7 The SecureAudit Client Database... 9 Creating a SecureAudit Client Database... 9 Reports To Create a Report Scheduling Reports Importing Scheduled (Host) Reports Correlation Reports Exporting Files to PDF The Visual Data Manager dialog Graphs The Generate Graph dialog Bar Graphs Line Graphs Pie Charts Role-Based Access Control Best Practices Index... i Contents i
3 System Requirements Windows Requirements SecureAudit Client runs on various Windows operating systems. Refer to the appropriate compatibility matrix on the Unisys Product Support Website. The matrices are accessible from the Compatibility link on the left pane. MCP Requirements SecureAudit requires an MCP version level equivalent to the SecureAudit version level, or one version higher or lower. For example, a 17.0 version of SecureAudit will run on MCP versions 16.0, 17.0 and Network Requirements SecureAudit Client expects the following port numbers to be available to the MCP host through any local firewalls: 139 NetBios 445 SMB SecureAudit non-ssl connection SecureAudit SSL connection License Requirements For customers who have the full Safe & Secure product marketed by Locum, the SecureAudit license will be embedded in the Safe & Secure license. The following explanation is valid for customers who have acquired SecureAudit via the Unisys release mechanisms, and who do not have the full Safe & Secure package marketed by Locum. No license key is required to run SecureAudit in Summary mode. For full functionality you must have a Unisys-supplied license key for SecureAudit (style xxx-lse-lse) that is compatible with the version of SecureAudit Host that is installed. For example, to use SecureAudit Host version , key LSE-LSE is required. This key will be valid on any MCP level from 57.1 to 59.1, providing it is used with the 17.0 level of SecureAudit Host. To order license keys and to obtain pricing information, contact your system supplier or Unisys representative. For a full explanation of the Unisys License Key mechanism, refer to the Guide to Unisys Licensing document, available in the Support section of the Locum website at Note that Try & Buy keys are available to allow a short evaluation period for the software. Try & Buy keys offer full functionality for a limited time and are available online at System Requirements 3
4 Pre-requisites Installing SecureAudit and SecurityCenter on a Windows System To be able to use SecureAudit Client, the Unisys SecurityCenter software must have previously been installed on both the Security Administrator Windows workstation and its MCP component on the MCP server. For information on how to install SecurityCenter, refer to the following Unisys documentation: Simple Installation Operations Guide Installation Center Operations Guide To install SecurityCenter client, access to the SecurityCenter directory of the INSTALLS share of your MCP server is necessary. The INSTALLS share should be visible by browsing the MCP host in the Windows network. For convenience, a local disk drive can also be mapped to the INSTALLS share after browsing to the appropriate location. Please refer to the Unisys Client Access Services Guide for information on how to connect to an MCP share. If no current version of SecurityCenter exists on the security administrator's workstation, run the 'SecurityCntr.msi' file in the INSTALLS\SecurityCenter directory. If a current version does exist, and this is an update to the current IC level of the current mark release, then ICUpdate.vbs should be run. If this is an update to a newer mark level, you must remove the current version, using Windows Add/Remove Programs, before installing the newer version. Refer to the Migration Guide for guidance in this area. Once SecurityCenter has been installed on the Windows workstation, SecureAudit Client will then be available as a snap-in within the SecurityCenter software. Privilege Requirements After installing the software for the first time, a user must have a minimum privilege of PU (Privileged User) status to run SecureAudit. If security administrator status is authorised, only a security administrator (a user marked as SECADMIN) can run SecureAudit. Such a user is allowed access to all the functions of the software. SecureAudit is enabled to use the Unisys RBAC (Role Based Access Control) implementation for applications. This is an alternative mechanism to the traditional privileges and allows the customer to define with fine granularity which users are allowed to use which functions of the software. For more information on this topic, refer to the Role Based Access Control section of this document. Pre-requisites 4
5 Familiarise yourself with SecureAudit First Steps Locum SecureAudit is a powerful auditing tool for checking ClearPath MCP systems and reporting on a wide range of events. It can be used in conjunction with Locum Software s full Safe & Secure suite to provide a comprehensive package to analyse and secure your systems. SecureAudit has two components: the Host, which runs on ClearPath MCP systems, and the Windows PC-based Client which provides a graphical user interface (GUI). While you can run SecureAudit Host in stand-alone mode directly on ClearPath MCP systems, the Client provides a user-friendly method of easily selecting and running reports. Reports run directly on the ClearPath MCP system are presented in a text format, but reports run through the SecureAudit Client can be viewed in a number of different ways, including bar and line graphs, and pie charts and can be output to PDF format. It is also possible to schedule reports and to import them from the host at a later time. For more information, see the Reports section. The SecureAudit Client Main Window The SecureAudit Client Main Window is divided into five areas. At the top of the Main Window are the Menu Bar and the Toolbar. On the left is the console tree. In the middle is the Main Window, on the right is the action pane and at the bottom of the main window is the status bar. This displays information about whatever you have currently selected. You can choose which elements of the SecureAudit Client window to show or hide by using the Customize View dialog. To access this, select either the Customize View option on the Program menu on the Toolbar, or the Customize option from the View menu on the Menu Bar. From the Customize View dialog, you can choose to show or hide the following items: Console tree Standard menus (Action and View) Standard toolbar Status bar Description bar Taskpad navigation tabs Action pane Snap-in Menus Snap-in Toolbars First Steps 5
6 The SecureAudit Client Main Window The SecureAudit Client Menu Bar The Menu Bar contains the Program and Help menus., File, Action, View, Favorites, Window The SecureAudit Client Toolbar The Toolbar contains a number of shortcut icons. Consulting the Online Help To access SecureAudit s Online Help, select Help Topics from the Help menu on the Menu Bar. Alternatively, many of SecureAudit s dialog boxes contain either a Help button or icon you can click to view the Help topic specific to the dialog you are viewing. First Steps 6
7 About Connections Configuring a Connection Connection icons represent ClearPath MCP systems to which SecureAudit may connect, and appear in the connections pane of the Main Window. The Installation process may have created a connection icon for each licensed system. If a connection was not created via the Installation process, you will need to create a connection for each ClearPath MCP system on which you intend to perform administrative functions. It is possible to arrange connections in to logical groups. You can also copy an existing connection. When connecting to a ClearPath MCP system you will be asked to supply your logon details. A successful logon will cause the colour of the connection icon for that system to change from red to green and various menus on the Menu Bar to become available. Creating a New Connection To create a new connection, follow these steps: 1. In the Console tree view panel, select, and then click on the Toolbar. The Host Details dialog will open. 2. This dialog contains three property pages: General contains general options relating to the new connection. Options allows you to specify an RBAC preferred role. Advanced contains logging options. 3. Fill out the following options on the General page: Group Name allows you to organise connections into groups. Type in a new group name or select a group from the dropdown menu. Connection Name type in the name of the new connection. This does not have to be the same as the server you are connecting to. Hostname or IP Address type in the name of the system you want to connect to, or type in the IP address of the system. Socket type in the socket number that you want to use. The default socket number is 28350, and it is recommended that this not be changed unless there is a conflict with other applications. Startup Job enter the location of the SecureAudit WFL job which initiates SecureAudit Host on the ClearPath MCP system. For example: locum\secureaudit\wfl Family this field is optional. It specifies the MCP family location of the SecureAudit WFL job. If left blank, the family specification of the running usercode will be used. 4. Click OK. The Connection will be created. Configuring a Connection 7
8 Establishing Multiple Connections You do not need to disconnect from one ClearPath MCP system before connecting to another. If you wish to establish multiple connections, repeat the logon procedure for each system you wish to connect to. Configuring a Connection 8
9 The SecureAudit Client Database The SecureAudit Client database is an SQLite database which contains data from the MCP host systems according to the report queries which have been run. When report queries are run, they retrieve the relevant information from the selected MCP system. This data is then stored in the database. Report queries are saved to the database under their respective report categories. When they are opened, the query is re-run and the report produced again. You do not have to have an active connection to view a saved report query. Note that newer versions of SecureAudit Client may contain reports which are unavailable in older versions of the Client. Please ensure you are running the latest version of SecureAudit Client in order to be able to access all reports. Creating a SecureAudit Client Database When you run SecureAudit Client for the first time, you will be prompted to specify a database. This is where SecureAudit Client will store connection details and any reports you produce. You can only have one database at a time. It is possible to share your database among SecureAudit Clients installed on multiple PCs, as long as they all have network access to the location where the database is stored. Multiple SecureAudit Clients can access the shared database concurrently. To create a database, follow these steps: 1. When you run SecureAudit Client for the first time, you will be prompted to create a new database or open an existing file. Browse to the location on your PC or a network drive where you want to save the database. 2. Type in a name for the database. The file must have the file extension.db. 3. Click OK. An empty database will be created. Accessing a Saved Database 1. Click on the Toolbar. The Create new database or open existing dialog will open. 2. Browse to the location where the database you want to access is stored, and select it. 3. Click OK. SecureAudit Client will open the database. The SecureAudit Client Database 9
10 Reports SecureAudit Client allows you to create the following reports: COMS Cfile Events DMSII Database Events File Accesses File Status Events Guardfile Activity Installation Records Logon Violations MCS Initializations Password Changes Privileged Actions Program Executions Role Based Access Control Run-time Usercode Changes Session Information System Commands System Security Violations Unauthorised File Accesses Unsuccessful Password Changes User Validations Userdata Changes Window Accesses The following reports are only available if you have Safe & Secure installed on the host system: Administrator Audit Censor Command Usage Chain Events DMSII File Activity Overdue Users Timestamp Verification Web-originated Accesses Reports 10
11 To Create a Report 1. Click on the Toolbar. The Request Data dialog will open. 2. Complete the required fields on the Source Data tab: Host system select the required host from the dropdown list. Timerange select Today, Yesterday, Last n days, or Custom: the latter option allows you to select a time period you want to run reports for. 3. On the Reports tab, choose the report(s) you want to run by checking the checkbox beside each one, or click the All button to run all reports. 4. Click Start to begin creating reports. If you are creating more than one report, this may take a little time. Once the report creation has finished, if you have created a single report, the report will be displayed on your screen. If you have created multiple reports, they will automatically be saved to the database. The Request Data Dialog- Source Data Tab Reports 11
12 Scheduling Reports You can schedule reports to be run automatically on MCP systems and have the resulting data imported into the SecureAudit Client database for you to view at a later time. You may create up to five schedules per usercode per host. To create a schedule, follow the subsequent steps: 1. Select the host that you want to create a schedule for, and either: a. From the Action menu on the Menu Bar select Schedule Options or b. Click the button on the Toolbar. 2. The Create/Modify Schedule on [host name] dialog will open. Click the New Schedule button. 3. The Schedule details on the General tab will be set to their defaults. Alter the schedule details as required. 4. Click the Reports tab. Alter the Report Timerange options as required and select the reports that you want to run automatically. You can select all reports by clicking the All button. 5. Click Apply to send the schedule to the host system. The reports generated will be placed into the specified output directory under the user s usercode. Importing Scheduled (Host) Reports When a Schedule sessions runs, SecureAudit Host will write a file with an.sca extension to the location specified when the schedule was created, or by default, to the primary family for the usercode under which SecureAudit host is running. The next time you connect from SecureAudit Client, the host will look for.sca files created under your connecting usercode. A message will be displayed telling you how many.sca files there are, if any. To import the.sca files, follow the instructions below. 1. Select the host from which you want to import the.sca file(s). You must have an open connection to the selected host. Either from the Action menu on the Menu Bar, select the Import Host Reports option or click the button on the Toolbar. The [host name]: Available Report Files dialog will open. 2. A list of available.sca files will be displayed. These will have been created under the usercode with which you are currently connected to the host. Select the file you want to import, and click the Import File button. 3. Upon confirmation, the file will be imported. When the import has finished, a message will be displayed listing the number or reports, the number of duplicate or incompatible reports which have been dropped from the import, and the total number of reports which have been successfully imported. Reports 12
13 Correlation Reports A correlation report is a customisable report which allows you to select the query you want to run on a selected host system. It allows you to set specific parameters to produce targeted reports. For example, you can produce a query which checks to see all events on a particular host system involving a specified originating usercode and where the associated text includes password over the last 7 days. To access the Correlation Report dialog, click the Toolbar. button on the The Correlation Report dialog contains three tabs: Originating Host this tab contains a dropdown list of all SecureAudit host systems that you have defined within SecureAudit Client. From here you may select the SecureAudit host system on which you want to run your query. Time Range this tab contains options allowing you to define your query s time range. Conditions this tab allows you to add one or more conditions to your query. Note that you must set at least one condition in order to run the query. The Correlation Report Dialog Reports 13
14 Exporting Files to PDF You can export report files to a PDF (portable document format) file, which can be saved then printed in a readable format. There are two ways to export a report to PDF. You can either: 1. Select the report you want to print and click the button on the Toolbar, or; 2. From the database, select the report and open it, then click the Print to PDF button. The Print to PDF dialog will open and you will be able to alter page setup options. The report will be saved in PDF format, which you can then open up and print. Files are named SCA_DDMMYYYY_hhmmss.pdf. To change the destination of saved PDF files, see the Client Options section of the Online Help Reports 14
15 The Visual Data Manager dialog The Visual Data Manager dialog provides a useful overview of the SecureAudit database and the information contained within it. To access the Visual Data Manager dialog, either right-click on the connection or the database and choose Visual Data Manager from the Database option on the contextual menu, or go to the Action Menu on the Menu Bar, select Database, and then Visual Data Manager. The Visual Data Manager Dialog- General/Info Tab The dialog contains the General tab and the Data Manager tab. The General tab The top part of the report contains the following information about your database: The Visual Data Manager dialog 15
16 Location the location where your database is stored, including the full name of your database. Jet Version the version of Microsoft s Jet Engine which was used to create the database. Size (on disk) the size of the database in Mb and bytes. Date Created the date on which the database was created. The bottom part of the dialog contains two further tabs: Info contains statistical information on the data stored in the database: o The number of saved queries you have saved in the database. o The number of connections to MCP SecureAudit Host systems you have defined within your database. o Each type of query together with the number of records stored for each query. Graph provides a bar chart of all query types, showing in visual form the numbers of records each query has. This should demonstrate if you have an abnormally high number of any particular event in comparison with the other events as shown in your records. The Visual Data Manager Dialog- General/Graph Tab The Visual Data Manager dialog 16
17 The Data Manager tab The Data Manager tab contains two further tabs: Actions allows you to compact the database. This tab also displays when the database was last compacted. If you choose to compact the database, a message will be displayed to inform you if the operation has been successful or not. Data Retention allows you to specify how long you wish data and report queries to be stored in the database. The policy is disabled by default; to enable the policy, check the Enable Retention Policy checkbox. The Visual Data Manager Dialog- Data Manager/Data Retention Tab The Visual Data Manager dialog 17
18 Graphs There are several kinds of graphs which you can generate within SecureAudit Client, depending on which report you want to view in graph form. You can only produce a graph for one report at a time. You can produce the following graphs for all reports except the Correlation report, for which no graphs are available: Vertical Bar Chart Line Graph Pie Chart The Generate Graph dialog The Generate Graph dialog can be accessed via the button on the Toolbar once you have selected a report in the Main Window, or from the Create Graph button when you have a report open. You can also access the Generate Graph dialog by right-clicking a report and selecting Create Graph from the contextual menu. The Generate Graph Dialog- Data Source Tab Graphs 18
19 The Generate Graph dialog consists of three sections: Graph Type allows you to select the type of graph you want to create. Data Source tab allows you to specify what data is included in your graph. Graph Options tab allows you to specify viewing options for each graph type, for example, whether the legend or a grid is displayed, whether percentages and labels are included, and line thickness. It is possible to save a graph by clicking the Save button from an open graph. You can choose to save the graph as the following file types: jpg bmp gif png pcx Bar Graphs The Bar Graph is designed to help you view the change in records over time. To this end, you can either choose to display daily change or monthly change from the Data Source tab, Frequency section. An example Bar Graph for the System Security Violations Report Graphs 19
20 Line Graphs Line Graphs are designed to help you view the change in records over time. As with Bar Graphs, you can either choose to display daily change or monthly change from the Data Source tab, Frequency section. An example Line Graph for the Logon Violations Report Pie Charts Pie charts are designed to help you view up to 10 items as a percentage value of the total records displayed. You must select between 1 and 10 items from those listed for the report for any one pie chart. An example Pie Chart for the Program Executions Report Graphs 20
21 Role-Based Access Control Role-Based Access Control (RBAC) is available with SecureAudit. RBAC is an effective approach to authorising access for users based on their roles within the organisation. The model is based on the concept of users, roles and permissions. SecureAudit is a member of the Locum realm. The realm may be enabled by the definition of a single role and user within the realm. Note that once the realm is enabled, the traditional MCP privileges of PU and SECADMIN are ignored and the permissions allocated to the user s role are the only determining factor used for authorisation. If a user does not hold a particular permission, the functions associated with that permission are unavailable to the user. Within the Client, these functions will be greyed out. The administration of RBAC, such as the setting up of roles, associating users with roles and allocating permissions to roles, is accomplished through Unisys SecurityCenter Client. The Locum realm and list of permissions within the realm are pre-defined, and established during installation of SecurityCenter. Once you are connected to SecureAudit, the Role Picker dialog will appear, allowing you to select an appropriate role from the Role List. It is possible to switch roles during your session by right-clicking on the connection and selecting Request Role List from the context menu. Role-Based Access Control 21
22 Best Practices Each of the reports has security relevance. The importance of each will vary from site to site, depending on such factors as the size and type of the workload and the complexity of the security policy in force throughout the company. The following table shows the reports which are deemed to be the lowest common denominators, and therefore probably of most use to most sites. Report Security Violations Logon Violations System Commands Unauthorised File Accesses Password Changes Window Accesses COMS Cfile Events File Status Events Run-time Usercode Changes Userdatafile Changes DMSII Database Events Guardfile Activity Suggested Frequency Daily Statistics Daily Statistics Daily Statistics Daily Daily Daily (with window filter) Weekly Daily (with appropriate filter) Daily Daily Daily Daily The Daily Statistics reports give an overview of activity, allowing forensic ad hoc reports (whether full or filtered) to be performed should there be suspicious activity identified by the statistics. Time-line graphs can be performed on a daily or monthly basis and are extremely useful in identifying trends. It is recommended that the reports are generated via the scheduling function, which allows data collection to be performed on the MCP host without the need for SecureAudit Client to be up and running. When the Client is next initiated, the user is presented with the option of downloading and importing the data to the local database. Within the Visual Data Manager, you can use the Retention Policy to manage report queries. You can set up a policy to remove queries and optionally the associated data once they reach a set age, specified in days. Best Practices 22
23 Reports generated by the Client have several output formats. For presentation to auditors, output to PDF is usually advised. Note that you can rearrange the order of the columns on each report to your liking. Do this via the Customised Columns tab on the Client Options dialog. Columns which you don t want to see can be hidden by deselecting the checkbox next to the Data Item. If you have multiple MCP servers, it can be advantageous to use the Group Name field in the Connection Properties dialog to organise connections into groups, for example, Production or Test. As with many other things, security issues are continually evolving. More threats and vulnerabilities become exposed over periods of time. In addition, each MCP release may introduce new security functionality. Because of these, regular and periodic security reviews should be undertaken, and as a result of these, or as part of these, the SecureAudit schedule should be amended accordingly. Best Practices 23
24 Index Best Practices...22 Connections... 7 About... 7 Creating... 7 Multiple... 8 First Steps... 5 Graphs...18 Bar...19 Generate Graph dialog...18 Line...20 Pie Charts...20 Installation... 4 Privilege Requirements... 4 Online Help... 6 RBAC...21 Reports...10 Correlation Creating Exporting Files to PDF Importing Scheduling SecureAudit Client Database... 9 Creating... 9 The Visual Data Manager dialog SecureAudit Client Main Window... 5 Menu Bar... 6 Toolbar... 6 System Requirements... 3 License Requirements... 3 MCP Requirements... 3 Network Requirements... 3 Windows Requirements... 3 Index i
Client Installation and User's Guide
IBM Tivoli Storage Manager FastBack for Workstations Version 7.1.1 Client Installation and User's Guide SC27-2809-04 IBM Tivoli Storage Manager FastBack for Workstations Version 7.1.1 Client Installation
More informationUser Manual For SmartRoom Managers
User Manual For SmartRoom Managers Table of Contents 1.0 Login 2.0 Confidentiality Agreement 3.0 Software Installation 4.0 Dashboard 5.0 Document Review and Index Maintenance 5.1 View by Index 5.1.1 Index
More informationClient Installation and User's Guide
IBM Tivoli Storage Manager FastBack for Workstations Version 7.1 Client Installation and User's Guide SC27-2809-03 IBM Tivoli Storage Manager FastBack for Workstations Version 7.1 Client Installation
More informationNintex Reporting 2008 Help
Nintex Reporting 2008 Help Last updated: Thursday, 24 December 2009 1 Using Nintex Reporting 2008 1.1 Chart Viewer Web Part 1.2 Importing and Exporting Reports 1.3 Import Nintex report page 1.4 Item Level
More informationTop Producer for Palm Handhelds
Top Producer for Palm Handhelds Quick Setup Top Producer Systems Phone number: 1-800-830-8300 Email: support@topproducer.com www.topproducer.com Fax: 604.270.6365 Top Producer for Palm handhelds Quick
More informationOTObase. Reference Manual. Doc. No EN/05 Part No EN
OTObase Reference Manual Doc. No. 7-50-1410-EN/05 Part No. 7-50-14100-EN Copyright notice 2013, 2018 GN Otometrics A/S. All rights reserved. Otometrics, the Otometrics Icon, AURICAL, MADSEN, ICS and HORTMANN
More informationServer Edition USER MANUAL. For Mac OS X
Server Edition USER MANUAL For Mac OS X Copyright Notice & Proprietary Information Redstor Limited, 2016. All rights reserved. Trademarks - Mac, Leopard, Snow Leopard, Lion and Mountain Lion are registered
More informationHarePoint Analytics. For SharePoint. User Manual
HarePoint Analytics For SharePoint User Manual HarePoint Analytics for SharePoint 2013 product version: 15.5 HarePoint Analytics for SharePoint 2016 product version: 16.0 04/27/2017 2 Introduction HarePoint.Com
More informationPrimo Analytics Workshop. BIBSYS Konferansen 20 March 2018
Primo Analytics Workshop BIBSYS Konferansen 20 March 2018 Objectives By the end of this session, you will: Understand what is Primo Analytics and OBI. Have a high-level view of how Primo Analytics is working.
More informationA Guide to Creating QuickReports
A Guide to Creating QuickReports Use QuickReports to produce lists, summaries and charts from the data in SupportDesk. If in the Windows application Access QuickReports, from Reporting within the Explorer
More informationWinView. Getting Started Guide
WinView Getting Started Guide Version 4.3.12 June 2006 Copyright 2006 Mincom Limited All rights reserved. No part of this document may be reproduced, transferred, sold or otherwise disposed of without
More informationISF Watchkeeper 3 Getting Started Users Guide
ISF Watchkeeper 3 Getting Started Users Guide ISF Watchkeeper is a computer software program, for use on board ships. The software is designed for maintaining records of seafarers hours of work and rest,
More informationUser Guide. FTR Manager For more information visit
FTR Manager 5.7.1 TABLE OF CONTENTS INTRODUCTION... 4 Overview... 4 About This Document... 4 GETTING STARTED... 5 Installation... 5 Starting FTR Manager... 5 To start Manager in Windows 7 or Windows 10
More informationTop Producer for Palm handhelds
Top Producer for Palm handhelds User Guide Top Producer Systems Phone number: 1-800-830-8300 E-mail: support@topproducer.com Web site: www.topproducer.com Fax number: 604.270.6365 Top Producer for Palm
More informationNETWRIX WINDOWS SERVER CHANGE REPORTER
NETWRIX WINDOWS SERVER CHANGE REPORTER ADMINISTRATOR S GUIDE Product Version: 4.0 June 2013. Legal Notice The information in this publication is furnished for information use only, and does not constitute
More informationThe Whimsical World of MCP Security Options
LOCUM SOFTWARE SERVICES LTD SECURITY SOLUTIONS SOFTWARE The Whimsical World of MCP Security Options UN4017 V - September 11th 2013 Kevin Stones Technical Director, Locum Technology Partner Overview Introduction
More informationComodo LoginPro Software Version 1.0
Comodo LoginPro Software Version 1.0 User Guide Guide Version 1.0.102512 Comodo Security Solutions 1255 Broad Street STE 100 Clifton, NJ 07013 Table of Contents 1.Introduction to Comodo LoginPro... 3 1.1.System
More informationACH Concentration Service User Guide
User Guide March 2008 Original Publication 5/2005 Version 9.0 NOTICE We have made every effort to ensure the accuracy of this manual. However, JPMorgan Chase Bank, N.A. and Metavante Corporation make no
More informationColligo Engage Outlook App 7.1. Offline Mode - User Guide
Colligo Engage Outlook App 7.1 Offline Mode - User Guide Contents Colligo Engage Outlook App 1 Benefits 1 Key Features 1 Platforms Supported 1 Installing and Activating Colligo Engage Outlook App 3 Checking
More informationCenterStone. Reports User Guide. Manhattan Software Inc. World Leading Real Estate, Asset & Facilities Management Software.
CenterStone Reports User Guide Version 1 Manhattan Software Inc. World Leading Real Estate, Asset & Facilities Management Software The information contained herein is the property of Manhattan Software,
More informationThe following topics describe how to work with reports in the Firepower System:
The following topics describe how to work with reports in the Firepower System: Introduction to Reports Introduction to Reports, on page 1 Risk Reports, on page 1 Standard Reports, on page 2 About Working
More informationWorking with Reports
The following topics describe how to work with reports in the Firepower System: Introduction to Reports, page 1 Risk Reports, page 1 Standard Reports, page 2 About Working with Generated Reports, page
More informationBusiness Insight Authoring
Business Insight Authoring Getting Started Guide ImageNow Version: 6.7.x Written by: Product Documentation, R&D Date: August 2016 2014 Perceptive Software. All rights reserved CaptureNow, ImageNow, Interact,
More informationRelativity Designer Installation Guide
Liant Software Corporation Relativity Designer Installation Guide Version 5 Copyright 1994-2003 by Liant Software Corporation. All rights reserved. Printed in U.S.A. No part of this publication may be
More informationNetwrix Auditor for Active Directory
Netwrix Auditor for Active Directory Quick-Start Guide Version: 8.0 4/22/2016 Legal Notice The information in this publication is furnished for information use only, and does not constitute a commitment
More informationLayers. About PDF layers. Show or hide layers
1 Layers About PDF layers You can view, navigate, and print layered content in PDFs created from applications such as InDesign, AutoCAD, and Visio. You can control the display of layers using the default
More informationEMCO Ping Monitor Enterprise 6. Copyright EMCO. All rights reserved.
Copyright 2001-2017 EMCO. All rights reserved. Company web site: emcosoftware.com Support e-mail: support@emcosoftware.com Table of Contents Chapter... 1: Introduction 4 Chapter... 2: Getting Started 6
More informationXton Access Manager GETTING STARTED GUIDE
Xton Access Manager GETTING STARTED GUIDE XTON TECHNOLOGIES, LLC PHILADELPHIA Copyright 2017. Xton Technologies LLC. Contents Introduction... 2 Technical Support... 2 What is Xton Access Manager?... 3
More informationHBS Training - IT Solutions. PlanWeb. Intermediate
HBS Training - IT Solutions PlanWeb Intermediate CONTENTS Logging on to the system...3 The PlanWeb Window...5 The Tool Bar...6 The Status Bar...6 The Map Window...6 The Information Window...7 Changing
More informationNewforma Contact Directory Quick Reference Guide
Newforma Contact Directory Quick Reference Guide This topic provides a reference for the Newforma Contact Directory. Purpose The Newforma Contact Directory gives users access to the central list of companies
More informationSymantec Enterprise Vault
Symantec Enterprise Vault Guide for Microsoft Outlook 2010/2013 Users 11.0 Light Outlook Add-In Symantec Enterprise Vault: Guide for Microsoft Outlook 2010/2013 Users The software described in this book
More informationManagement Interface User Guide
Management Interface User Guide VIDEO Powered by Table of Contents Accessing the management interface 4 Creating your user account 4 Signing-in 4 Forgot your password 4 Media players menu 5 Checking Player
More informationAccess Gateway Client User's Guide
Sysgem Access Gateway Access Gateway Client User's Guide Sysgem AG Sysgem is a trademark of Sysgem AG. Other brands and products are registered trademarks of their respective holders. 2013-2015 Sysgem
More informationAttix5 Pro Storage Platform Console
Attix5 Pro Storage Platform Console V7.0.1 User Manual for Microsoft Windows Your guide to managing the Attix5 Pro backup environment using the Storage Platform Console. 0 Copyright notice and proprietary
More informationIntegrate Saint Security Suite. EventTracker v8.x and above
EventTracker v8.x and above Publication Date: June 6, 2018 Abstract This guide provides instructions to configure Saint Security Suite to send crucial events to EventTracker Enterprise by means of syslog.
More informationSophos Central Admin. help
help Contents About Sophos Central... 1 Activate Your License...2 Endpoint Protection...3 Dashboard...3 Alerts...4 Root Cause Analysis...9 Logs & Reports... 11 People... 24 Computers...33 Computer Groups...40
More informationTIBCO Spotfire Automation Services 7.5. User s Manual
TIBCO Spotfire Automation Services 7.5 User s Manual Revision date: 15 January 2016 Important Information SOME TIBCO SOFTWARE EMBEDS OR BUNDLES OTHER TIBCO SOFTWARE. USE OF SUCH EMBEDDED OR BUNDLED TIBCO
More informationUser Guide. 3CX Enhanced Billing Codes. Version
User Guide 3CX Enhanced Billing Codes Version 15.5.54 "Copyright VoIPTools, LLC 2011-2017" Information in this document is subject to change without notice. No part of this document may be reproduced or
More informationNETWRIX PASSWORD EXPIRATION NOTIFIER
NETWRIX PASSWORD EXPIRATION NOTIFIER ADMINISTRATOR S GUIDE Product Version: 3.3 January 2013 Legal Notice The information in this publication is furnished for information use only, and does not constitute
More informationSCOUT SUSPENSE TRACKER Version 10.0
SCOUT SUSPENSE TRACKER Version 10.0 USER S MANUAL For Civilian Personnel Management Service (CPMS) HPC-COM LLC Help Desk 800-795-1902 Updated: February 2011 Table of Contents SCOUT Suspense Tracker V10.0
More information#define 4 User Guide. Version 4.0. CGI Group Inc.
#define 4 User Guide Version 4.0 CGI Group Inc. Table of Contents Section Slides Wiki 5-7 Tickets 8-12 Files 13-15 Planning 16-21 Cooperate 22-24 Settings 25-31 Agile Features 32-34 Desktop Applications
More informationServer Edition USER MANUAL. For Microsoft Windows
Server Edition USER MANUAL For Microsoft Windows Copyright Notice & Proprietary Information Redstor Limited, 2016. All rights reserved. Trademarks - Microsoft, Windows, Microsoft Windows, Microsoft Windows
More informationInterface Reference topics
McAfee Content Security Reporter 2.6.x Interface Reference Guide Interface Reference topics Edit Permission Set page (Permission Sets page) Specify Content Security Reporter permissions and grant user
More informationCreating Dashboard Widgets. Version: 16.0
Creating Dashboard Widgets Version: 16.0 Copyright 2017 Intellicus Technologies This document and its content is copyrighted material of Intellicus Technologies. The content may not be copied or derived
More informationServer Edition. V8 Peregrine User Manual. for Microsoft Windows
Server Edition V8 Peregrine User Manual for Microsoft Windows Copyright Notice and Proprietary Information All rights reserved. Attix5, 2015 Trademarks - Microsoft, Windows, Microsoft Windows, Microsoft
More informationSnapCenter Software 4.1. Administration Guide. December _C0 Updated for 4.1.1
SnapCenter Software 4.1 Administration Guide December 2018 215-13391_C0 doccomments@netapp.com Updated for 4.1.1 Table of Contents 3 Contents Deciding whether to read the SnapCenter Administration information...
More informationWorkspace Administrator Help File
Workspace Administrator Help File Table of Contents HotDocs Workspace Help File... 1 Getting Started with Workspace... 3 What is HotDocs Workspace?... 3 Getting Started with Workspace... 3 To access Workspace...
More informationOpen. Select the database and click. Print. Set printing options using the dropdown menus, then click the
The Original Quick Reference Guides Microsoft Access 2010 Access is a tool for creating and managing databases collections of related records structured in an easily accessible format such as a table,
More informationEvaluNet XT v1.2. Setup Guide
2 EvaluNet XT v1.2 Setup Guide Table of Contents 1 INTRODUCTION 2 1.1 HOW IS EVALUNET XT STRUCTURED? 2 1.2 SYSTEM REQUIREMENTS 2 1.3 NETWORK SETUP DETAILS 2 1.4 PEER-TO-PEER NETWORKS 3 1.5 LINUX SETUP
More informationDesktop & Laptop Edition
Desktop & Laptop Edition USER MANUAL For Mac OS X Copyright Notice & Proprietary Information Redstor Limited, 2016. All rights reserved. Trademarks - Mac, Leopard, Snow Leopard, Lion and Mountain Lion
More informationSARS ANYWHERE ADMINISTRATION MANUAL APPENDICES
SARS ANYWHERE ADMINISTRATION MANUAL APPENDICES APPENDIX A HELP FILE The Help feature is a convenient and quick way to obtain more information about SARS Anywhere topics. There are four ways to use the
More informationHow to use the Sales Based Availability Dashboard
How to use the Sales Based Availability Dashboard Supplier Guide Sept 2017 v1 1 Contents What is Sales Based Availability and why is it important?... 3 How is Sales Based Availability calculated and how
More informationHalcyon Spooled File Manager GUI. v8.0 User Guide
Halcyon Spooled File Manager GUI v8.0 User Guide Copyright Copyright HelpSystems, LLC. All rights reserved. www.helpsystems.com US: +1 952-933-0609 Outside the U.S.: +44 (0) 870 120 3148 IBM, AS/400, OS/400,
More informationPISCES Installation and Getting Started 1
This document will walk you through the PISCES setup process and get you started accessing the suite of available tools. It will begin with what options to choose during the actual installation and the
More informationPerceptive Nolij Web. Administrator Guide. Version: 6.8.x
Perceptive Nolij Web Administrator Guide Version: 6.8.x Written by: Product Knowledge, R&D Date: June 2018 Copyright 2014-2018 Hyland Software, Inc. and its affiliates.. Table of Contents Introduction...
More informationImpossible Solutions, Inc. JDF Ticket Creator & DP2 to Indigo scripts Reference Manual Rev
Impossible Solutions, Inc. JDF Ticket Creator & DP2 to Indigo scripts Reference Manual Rev. 06.29.09 Overview: This reference manual will cover two separate applications that work together to produce a
More informationPrint Audit 6. Print Audit 6 Documentation Apr :07. Version: Date:
Print Audit 6 Version: Date: 37 21-Apr-2015 23:07 Table of Contents Browse Documents:..................................................... 3 Database Documentation.................................................
More informationMiami s Quick Start Guide for Using. Snap 9 Professional. to Create a Paper Keyed Survey. Miami s Survey Solutions
Miami s Quick Start Guide for Using Snap 9 Professional to Create a Paper Keyed Survey 1 Miami s Survey Solutions Snap 9 Professional Getting Started This Quick Start Guide is intended to help you become
More informationUse Active Directory To Simulate InfoPath User Roles
Page 1 of 7 Use Active Directory To Simulate InfoPath User Roles You can leverage the information returned by the Active Directory web service to simulate InfoPath User Roles, which are disabled in browser
More informationForeScout Extended Module for Tenable Vulnerability Management
ForeScout Extended Module for Tenable Vulnerability Management Version 2.7.1 Table of Contents About Tenable Vulnerability Management Module... 4 Compatible Tenable Vulnerability Products... 4 About Support
More informationUsing SupportDesk. House-on-the-Hill Software Ltd. SupportDesk Green
Using SupportDesk House-on-the-Hill Software Ltd SupportDesk Green Software Copyright 1993-2007 House-On-The-Hill Software Ltd. All Rights Reserved. Manual Copyright 1993-2007 House-On-The-Hill Software
More informationCox Business Online Backup Administrator Guide. Version 2.0
Cox Business Online Backup Administrator Guide Version 2.0 2012 by Cox Communications. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means, electronic,
More informationInstallation and Configuration Guide
Sysgem SysMan Utilities (Professional Edition) Installation and Configuration Guide By Sysgem AG Sysgem is a trademark of Sysgem AG. Other brands and products are registered trademarks of their respective
More informationSIMPLIFi Compliance Software User Manual
SIMPLIFi Compliance Software User Manual Version 1.7 2013 Simplifi-Solutions Ltd, Environmental Center, Unit B5, The Gordon Manley Building, Lancaster University, LA1 4WA Telephone: 01524 510431 Email:
More informationBDM Hyperion Workspace Basics
BDM Hyperion Workspace Basics Contents of this Guide - Toolbars & Buttons Workspace User Interface 1 Standard Toolbar 3 Explore Toolbar 3 File extensions and icons 4 Folders 4 Browsing Folders 4 Root folder
More informationIntellicus Enterprise Reporting and BI Platform
Designing Adhoc Reports Intellicus Enterprise Reporting and BI Platform Intellicus Technologies info@intellicus.com www.intellicus.com Designing Adhoc Reports i Copyright 2012 Intellicus Technologies This
More informationElectronic Sales Platform User s Manual
Electronic Sales Platform User s Manual Version 1.1 2018 St. Petersburg 2 CONTENTS Preface... 3 1 Introduction... 4 1.1 Workstation Requirements and Settings... 4 1.2 Starting application... 5 2 Summary
More informationDATASTREAM CHART STUDIO GETTING STARTED
DATASTREAM DATASTREAM CHART STUDIO GETTING STARTED Thomson Reuters Training Quick and easy access to Technical Analysis charts and data is essential in today s fast moving markets. The Datastream Chart
More informationGetting Started with Solar Eclipse. Release 8.6.5
Getting Started with Solar Eclipse Release 8.6.5 Legal Notices 2009 Activant Solutions Inc. All rights reserved. Unauthorized reproduction is a violation of applicable laws. Activant and the Activant logo
More informationUser Agent Preparing the Windows Environment and Installing the User Agent. How-To
User Agent 1.1.5 Preparing the Windows Environment and Installing the User Agent How-To CONTENTS Introduction to the User Agent... 2 Selecting the User Account to Run the User Agent... 3 Setting Access
More informationProduct Documentation SAP Business ByDesign August Analytics
Product Documentation PUBLIC Analytics Table Of Contents 1 Analytics.... 5 2 Business Background... 6 2.1 Overview of Analytics... 6 2.2 Overview of Reports in SAP Business ByDesign... 12 2.3 Reports
More informationSAS Visual Analytics 8.2: Working with Report Content
SAS Visual Analytics 8.2: Working with Report Content About Objects After selecting your data source and data items, add one or more objects to display the results. SAS Visual Analytics provides objects
More informationConfiguration and Administration Guide
Sysgem Access Gateway Configuration and Administration Guide Sysgem AG Sysgem is a trademark of Sysgem AG. Other brands and products are registered trademarks of their respective holders. 2013-2015 Sysgem
More informationZen Internet. Online Data Backup. Zen Vault Express for Mac. Issue:
Zen Internet Online Data Backup Zen Vault Express for Mac Issue: 2.0.08 Tel: 01706 90200 Fax: 01706 902005 E-mail: info@zen.co.uk Web: www.zen.co.uk Zen Internet 2015 Contents 1 Introduction... 3 1.1 System
More informationCITO2 Installation & User Instructions
CITO2 Installation & User Instructions DD 56107 Stoneridge Electronics Ltd 1. Installation...4 1.1. System Requirements...4 1.2. Installing CITO2...4 1.3. Uninstalling CITO2...4 2. Starting and closing
More informationBusiness Intelligence Launch Pad User Guide SAP BusinessObjects Business Intelligence Platform 4.1 Support Package 1
Business Intelligence Launch Pad User Guide SAP BusinessObjects Business Intelligence Platform 4.1 Support Package 1 Copyright 2013 SAP AG or an SAP affiliate company. All rights reserved. No part of this
More informationFileLoader for SharePoint
End User's Guide FileLoader for SharePoint v. 2.0 Last Updated 6 September 2012 3 Contents Preface 4 FileLoader Users... 4 Getting Started with FileLoader 5 Configuring Connections to SharePoint 7 Disconnecting
More informationNovaBACKUP CMon v19.0
June 2017 NovaBACKUP CMon v19.0 User Manual Features and specifications are subject to change without notice. The information provided herein is provided for informational and planning purposes only. 2017
More informationProtection! User Guide. A d m i n i s t r a t o r G u i d e. v L i c e n s i n g S e r v e r. Protect your investments with Protection!
jproductivity LLC Protect your investments with Protection! User Guide Protection! L i c e n s i n g S e r v e r v 4. 9 A d m i n i s t r a t o r G u i d e tm http://www.jproductivity.com Notice of Copyright
More informationSage Estimating (SQL) v17.11
Sage Estimating (SQL) v17.11 Installation and Administration Guide July 2017 This is a publication of Sage Software, Inc. 2017 The Sage Group plc or its licensors. All rights reserved. Sage, Sage logos,
More informationExporting Data in Version 3.6
The modern, fast and easy to use risk analysis tool Exporting Data in Version 3.6 BowTie Pro Westhill Business Centre Arnhall Business Park Westhill, Aberdeenshire, AB32 6UF, UK Tel: +44 (0) 1224 51 50
More informationQuick Guide Copyright Bureau van Dijk 2010 Last updated September 2010
Quick Guide Copyright Bureau van Dijk 2010 Last updated September 2010 Table Of Contents 1.0. INTRODUCTION... 1 1.1. HOW IT HELP YOU... 1 1.2. COVERAGE... 2 1.3. SOFTWARE OVERVIEW... 2 1.4. SYSTEM REQUIREMENTS...
More informationSecurit Version 6.2 Service Pack 1. Quick Start Guide. September 2006
Securit 4400 Version 6.2 Service Pack 1 Quick Start Guide September 2006 QSG003 - Securit 4400 Quick Start Guide 1 Securit 4400 Quick Start Guide 1 Introduction 3 1.1 About Securit 4400 3 2 Installation
More informationIFS Data Migration Excel Add-In
IFS Data Migration Excel Add-In User Manual for IFS Data Migration Excel Add-In Contents Figures... 2 1 IFS Data Migration Excel Add-In... 2 1.1 Overview... 3 2 User Interface... 3 2.1 Ribbon... 3 2.2
More information5 MANAGING USER ACCOUNTS AND GROUPS
MANAGING USER ACCOUNTS AND GROUPS.1 Introduction to user accounts Objectives.2 Types of User Accounts.2.1 Local User Account.2.2 Built-in User Account.2.3 Domain User Account.3 User Profile.3.1 Content
More informationUser Guide. FTR Reporter For more information, visit
FTR Reporter 5.7.1 For more information, visit www.fortherecord.com TABLE OF CONTENTS INTRODUCTION... 5 Overview... 5 About This Document... 5 GETTING STARTED... 6 Installation... 6 Starting Reporter...
More informationElectronic Appraisal Delivery (EAD) Portal. FHA EAD General User Guide
Electronic Appraisal Delivery (EAD) Portal FHA EAD General User Guide Last Updated: October 2015 FHA EAD General User Guide Page 2 of 87 Version 1.3.1 TABLE OF CONTENTS INTRODUCTION... 6 WHAT IS THE ELECTRONIC
More informationUser Guide. 3CX Enhanced Billing Codes. Version
User Guide 3CX Enhanced Billing Codes Version 15.5.54 "Copyright VoIPTools, LLC 2011-2018" Information in this document is subject to change without notice. No part of this document may be reproduced or
More information8 MANAGING SHARED FOLDERS & DATA
MANAGING SHARED FOLDERS & DATA STORAGE.1 Introduction to Windows XP File Structure.1.1 File.1.2 Folder.1.3 Drives.2 Windows XP files and folders Sharing.2.1 Simple File Sharing.2.2 Levels of access to
More informationMicrosoft Outlook 2003 Microsoft screen shots used in accordance with Microsoft rules to be viewed at URL
Microsoft Outlook 2003 Microsoft screen shots used in accordance with Microsoft rules to be viewed at URL http://www.microsoft.com/permission/copyrgt/cop-img.htm#screenshot Compiled by: Charmaine Morris
More informationFirstClass and the NLC Intranet. Version 12
FirstClass and the NLC Intranet Version 12 Date Modified 15/06/2016 Use of the FirstClass E-mail system Introduction Please read the following in conjunction with the Internet and E-mail Policies issued
More informationSSC Campus Front Desk User Guide University of Oregon
SSC Campus Front Desk User Guide University of Oregon Office of Academic Advising 5/3/2016 Table of Contents Advising Center... 1 Appointments... 2 Schedule an Appointment... 2 Cancel an Appointment...
More informationDRoster Employee Scheduler User Manual
DRoster Employee Scheduler Copyright 2006 Kappix Contents 1 Introduction... 3 2 Installing DRoster... 4 2.1 Installation Requirements... 4 2.2 Installation Modes... 4 2.3 Installation... 5 3 The DRoster
More informationChapter A2: BankLink Books clients
Chapter A2: BankLink Books clients This chapter is aimed at BankLink Administrators This Chapter covers the options available for processing in BankLink Books. The BankLink Service Agreement permits you
More informationbv-control User Guide for NetWare v8.00 BindView Corporation 5151 San Felipe, Suite 2500 Houston, TX 77056
bv-control for NetWare v8.00 User Guide BindView Corporation 5151 San Felipe, Suite 2500 Houston, TX 77056 COPYRIGHT Copyright 1999-2004 BindView Corporation. All rights reserved. BindView Corporation
More informationSection 11 Toolkit. User Guide
Section 11 Toolkit User Guide Section 11 toolkit User Guide http://www.optimise4success.co.uk/section11 Virtual College Ltd Marsel House Stephensons Way Ilkley LS29 8DD United Kingdom Telephone: 01943
More informationAMPHIRE SOLUTIONS. Electronic Community Manual
AMPHIRE SOLUTIONS Electronic Community Manual Table of Contents THE ELECTRONIC COMMUNITY 3 1. Welcome to the Amphire Connect Community! 3 Minimum System Requirements 3 2. Logging in to the Amphire Community
More informationDocumentation for the new Self Admin
Documentation for the new Self Admin The following documentation describes the structure of the new Self Admin site along with the purpose of each site section. The improvements that have been made to
More informationUser Guide For Version 4.0
User Guide For Version 4.0 Easy-to-use, Complete Cyber Cafe Management Software by icafe Manager User Guide Contents Chapter 1: Introduction 7 1.1 About the Manual 7 1.2 Intended Audience 7 1.3 Conventions
More informationIntegrate Sophos Enterprise Console. EventTracker v8.x and above
Integrate Sophos Enterprise Console EventTracker v8.x and above Publication Date: September 22, 2017 Abstract This guide provides instructions to configure Sophos Enterprise Console to send the events
More information