HP JetAdvantage Security Manager. User Guide

Size: px
Start display at page:

Download "HP JetAdvantage Security Manager. User Guide"

Transcription

1 HP JetAdvantage Security Manager User Guide

2 Copyright 2017 HP Development Company, L.P. Reproduction, adaptation, or translation without prior written permission is prohibited, except as allowed under the copyright laws. The information contained herein is subject to change without notice. The only warranties for HP products and services are set forth in the express warranty statements accompanying such products and services. Nothing herein should be construed as constituting an additional warranty. HP shall not be liable for technical or editorial errors or omissions contained herein. Applicable product: J8023AA Edition 10, 12/2017 (version 3.1) Microsoft, Windows, Windows XP, Windows Vista, and Windows Server are U.S. registered trademarks of Microsoft Corporation. Adobe, Acrobat, and PostScript are trademarks of Adobe Systems Incorporated. VMware is a registered trademark of VMware, Inc.

3 Table of contents 1 Introduction Getting started with Security Manager... 3 Access the Security Manager application... 3 Features of the Security Manager... 3 Common controls and notifications... 6 What you must provide Setting up Security Manager... 9 Verify device remediation and hostname resolution Install licenses Set up Instant On Security Configure the server settings Set up global credentials Using Security Manager Create a security policy Policies page navigation Create a policy Edit a policy Policy editor icons Set severity, remediation, and unsupported behavior to policy items in Quick Settings Set policy options for a single item Set policy options for all the items or for a category Export and Import policies Add and edit device information Create a group Manual Group Automatic Group Discover devices ENWW iii

4 Add devices using Automatic Discovery Add devices using Manual Discovery Devices page navigation Export device addresses Edit device and group information Manage Groups Move Rename Edit Auto Group Filter Delete Add, remove, or delete a device from a group Assign a license manually Set device credentials Set SSL/TLS enforcement Assess and remediate Run or Schedule an assessment or remediation Task page navigation Modify a task View assessment results View results from the Devices page View results from the Reports page Run reports Export and Scheduling reports Appendix A Use the Security Manager certificate management solution Appendix B Network port assignments Appendix C Legal statements End User License Agreement Copyrights log4net license nhibernate license iv ENWW

5 1 Introduction HP JetAdvantage Security Manager (Security Manager) is a security compliance solution for a fleet of HP products. It enables administrators to create a security policy to reduce network risks and monitor security for a fleet of printers. The key benefits of using Security Manager are the following:: Easily and quickly create device security policies. Intelligent prompts guide you through the process by providing advice and recommendations as you configure the policy. Add device IP addresses or hostnames using the following methods: Import a text or XML file that contains the device information. Automatically or manually discover devices. Automatically assess/remediate devices when they are first connected to the network using the Security Manager Instant-On Security feature and allowing automatic remediation. Create a schedule to run assessments or assess/remediate devices at preset intervals. To learn more about Security Manager see the following topics: Getting started with Security Manager Setting up Security Manager Using Security Manager ENWW 1

6 2 Chapter 1 Introduction ENWW

7 2 Getting started with Security Manager Security Manager version 3.1 is a web-based application supported by the following browsers: Internet Explorer (IE) 11 or newer versions. Chrome To view the main topics in Security Manager Home page, see Introduction The following sections will help you to get started with Security Manager: Access the Security Manager application Features of the Security Manager Common controls and notifications What you must provide Access the Security Manager application Follow these steps to log into Security Manager: 1. Install Security Manager. For Security Manager installation instructions, see the HP JetAdvantage Security Manager Installation and Setup Guide. 2. Make sure you have a supported web browser, and then open HP JetAdvantage Security Manager. 3. Type your windows domain username (Domain\username), password, and then click Login. If using a local username to the desktop (.\localusername), make sure to add the user name to the Administrator group or HPIPSC group or HPIPSC_Guest Group. If the login operation fails, Security Manager displays an error notification message. Features of the Security Manager The Security Manager features are always present on the top menu tabs, providing a user to easily access each function. The top menu tabs include: Dashboard ENWW Access the Security Manager application 3

8 The Dashboard page is the default page that displays after a successful login. It provides a graphical overview of the device fleet which includes the following information: Number of devices: The total number of devices in the fleet and the number of licensed and unlicensed devices. The number of licenses for the devices. Assessment status of the devices. Not assessed status of the devices. Policies The Policies page displays information of the number of policies and the status for each policy (valid, invalid, or new). It allows you to create, edit, and import policies. Devices The Devices page displays information of the number of devices on the network, device identity information (IP address, hostname, and model name), whether a device is supported, whether a license is assigned, date assessed, most recent policy name used, and a group name associated with a device. Icons indicate whether the device passed the assessment and the device status. Use the Devices page to perform the following tasks: Create a group to associate devices to the group and manage these groups. Discover devices connected to the network, and add them to a group. Create a task to assess or assess and remediate a group of devices. Assign licenses, set credentials and verify devices. Tasks The Tasks page displays information of the status of tasks (completed, in progress, or scheduled), name and type of a task, associated policy, group name, and the schedule of the tasks (the task last ran and the task schedule to run). It provides options to create and schedule new assessment /remediation tasks. You can schedule a task to run once or to repeat as necessary, such as daily, weekly, or monthly. Use the New Task icon from the Policies, Devices, or Tasks pages to create a new task, and then view the assessments /remediations of devices in the Task page. Reports The Reports page provides options to run reports that display information about devices, policies, and assessments. Use the Executive Summary report in the Reports page to review recommendations and device status. For more information about the various reports (Devices assessed, Devices not assessed, Policy items assessed, Recommendations, and Remediations), see, Run reports. Settings icon ( ) Displays the following options: 4 Chapter 2 Getting started with Security Manager ENWW

9 Settings: Allows you to configure global settings. About HPSM: Displays a graphical overview of the software. Help: Provides information and instructions for Security Manager. Profile icon ( ) Displays the username (role assigned to a user), and a Logout button. Security Manager assigns the following roles to users: Administrator: Enables a user to access all features and perform all operations in Security Manager. Guest: Enables a user to only view the Dashboard and Reports pages, it does not allow any interactive operation. By default, the domain user account used for installing Security Manager is the administrator. To add additional users, the administrator will add the domain user to an appropriate group based on a specific role. ENWW Features of the Security Manager 5

10 Common controls and notifications This section provides the controls and notifications consistent across all pages in Security Manager. Common controls in the Devices, Policies and Tasks list panel: Filter - Sorts or filters the contents displayed in a list panel based on a filter criteria. Search - Searches for strings in the list panel. Sort Allows every column in the device list panel to be sorted. Click the arrow next to a column heading to sort the column. To change the order of the columns, you can drag and drop the columns. Common notification types: All notifications are dismissed after five seconds. Success message: A message displays in a green slide out for a successful operation. Information message: A message displays in a blue slide when the system provides information of the operation. Failure message: A message displays in a red slide out for a failed operation. 6 Chapter 2 Getting started with Security Manager ENWW

11 What you must provide The following are the basic requirements to use Security Manager: A supported Microsoft Windows computer. The following Microsoft Windows 64-bit operating systems are supported: Windows Server 2016, 2012, and 2012 R2 Windows 10, 8.1, and 8. Security Manager is supported in a VMware environment. Requirements: Microsoft Windows Server 2012 R2 or later (64-bit versions) is a compatible guest operating system in VMware ESX and ESXi versions 4.0 Update 4 or later. A supported HP device (printer, MFP, or digital sender). For a current list of supported HP devices, go to The latest HP device firmware version. HP recommends that you install the latest firmware version to ensure that the devices contain the latest security updates and features. For firmware upgrade instructions, see the setup or user guides provided with the device. The latest HP Jetdirect firmware version. You must use V.40.xx or later. For firmware upgrade instructions, see the setup or use guides provided with the HP Jetdirect product. ENWW What you must provide 7

12 8 Chapter 2 Getting started with Security Manager ENWW

13 3 Setting up Security Manager Use the instructions in this section to set up the Security Manager settings. Configure the Security Manager settings: 1. Log into Security Manager and select the Settings icon ( ), and then select the Settings option. 2. In the left navigation pane, select one of the following menus and configure the settings: General - Enables device remediation and hostname resolution. Licenses - Installs Security Manager licenses. Instant-On Security - Discovers and configures devices when they are first connected to the network. Automated Output - Sets up settings and notifications. Global Credentials - Sets up global credentials to verify device credentials. To view the main topics in Security Manager Home page, see Introduction Verify device remediation and hostname resolution Install licenses Set up Instant On Security Configure the server settings Set up global credentials ENWW 9

14 Verify device remediation and hostname resolution HP recommends to verify the global remediation setting that controls whether an out-of-compliance device is remediated (corrected) during the assessment process. To control how individual out-of-compliance policy items are processed during remediation, use the policy's Quick Settings (Policy). For more information, see Set severity, remediation, and unsupported behavior to policy items in Quick Settings. Security Manager resolves IP addresses to hostnames only during the initial discovery. To resolve IP addresses to hostnames at a later time, delete the device, and then add the device again. Follow these steps to set the device remediation and hostname resolution option: 1. Log into Security Manager, select the Settings icon ( ) and then select the Settings option. 2. On the left navigation pane, in the General menu, select the appropriate remediation option for devices. Enable device remediation (Remediate and Report) - This is the default option selected and enables to remediate out-of-compliance devices. Disable device remediation (Report Only) - Select this option to not remediate out-of-compliance devices. When set to Disable device remediation (Report Only) option, the setting applies to all policies and takes precedence over an individual policy's advanced remediation settings (Quick Settings (Policy)). To prevent accidental changes to devices on the network, disable device remediation. 3. In the Hostname Resolution section, enable or disable the Resolve IP addresses to hostnames when devices are added option. By default, this option is set to enabled and allows Security Manager to resolve IP addresses to hostnames when devices are added. When set to enabled, this option requires that the DNS entry functions in both directions. Otherwise, the device import fails. To disable the option, select to clear the check box. 4. Click Save. The Save button is disabled, if the default options are selected. 10 Chapter 3 Setting up Security Manager ENWW

15 Install licenses Licenses are provided using a license file. Install a Security Manager device license to assess and remediate the devices on the network. Without a device license, all other actions are available, such as sorting, filtering, and verifying. Security Manager is installed with a demonstration license that allows a limited assessment for up to 20 devices. Only a demonstration policy is available for use and the Policy Editor is limited to a few items. This license is overridden when a trial or full license is installed. Contact your HP representative for more information. If HP JetAdvantage Security Manager service is not running, an error message will display on the Security Manager application. The purchase of Security Manager should include device licenses. Licenses are node locked using the device's MAC address. After licenses are installed, devices are automatically licensed when the following actions occur: when adding devices using a text or xml file. For more information, see Add devices using Manual Discovery. when discovering devices using the Instant-On Security feature. For more information, see Set up Instant On Security. If there are insufficient licenses available during an import, the devices are added but not licensed. For devices that are not licensed, add licenses in the Settings page, and then use the Assign Licenses icon located in the device toolbar in the Devices page. To reduce the risk of depleting all the licenses, make sure that there is a sufficient quantity before importing. To return licenses to the license pool, delete the licensed device. Deleting a licensed device removes that device's historical data. Follow these steps to install licenses or add additional licenses: 1. Log into Security Manager, select the Settings icon ( ), and then select the Settings option. 2. On the left navigation pane, click Licenses. 3. Click Add Licenses. 4. Locate where the license file (.lic) is stored in the file browser, and then double-click to open the file. Security Manager reads the license file and updates the Settings page with the available licenses and expiration information. If an error displays, the causes are: Security Manager cannot connect to the license server. Security Manager tried to update a demonstration license. A new demonstration license will not override an existing demonstration license. Security Manager tried to install a demonstration license when a normal license is currently installed. ENWW Install licenses 11

16 Security Manager tried to install the same license file. Security Manager tried to install a corrupted or invalid license file. 12 Chapter 3 Setting up Security Manager ENWW

17 Set up Instant On Security HP Enterprise printers running the latest firmware version use the Instant-On Security and the HP Device Announcement Agent features to automatically discover and configure devices when they are first connected to the network. Automatic assessment/ remediation of newly discovered devices requires a device license and a valid initial assessment policy. To implement Instant-On Security, the device must support HP Device Announcement Agent, which is found in firmware version 11.3 (released December 2011) or later. For a list of devices that include HP Device Announcement Agent, go to Automatic discovery requires that the Accept Device Announcements feature is enabled (disabled by default) and the device's HP Device Announcement Agent feature is enabled (enabled by default). In addition, the corporate DNS server must be configured with an entry that points the hostname hp-print-mgmt to the IP address of the Security Manager server. When the device announcement agent is activated on a compatible printer, the HP device announcement agent looks for a host with the DNS hostname of hp-print-mgmt. If found, the device announces itself directly to Security Manager. If Accept Device Announcements is enabled and the device passes the minimum authentication requirements, the device is automatically added to Security Manager. If Allow Automatic Remediation is enabled, an automatic assessment/ remediation of the device occurs. A device is not added to Security Manager if it fails the minimum authentication required for the assessment. When the device announcement agent is enabled, it announces itself to the Security Manager server in the following situations: When the device is turned on. When a cold reset is performed on the device. When the IP stack comes up (for example, after a network configuration change). When the configuration server IP address changes (use this if a DNS entry cannot be used). When the HP Device Announcement Agent feature is enabled using the check box in the device HP Embedded Web Server or the device control panel. When Accept Device Announcements is enabled, each device that passes the authentication is assigned a device license from the license pool. Follow these steps to set up Instant-On Security: The Instant-On Security feature might fail, if IPsec, Windows firewall, or other firewalls does not allow communication with Security Manager using port To activate Instant-On Security and automatic remediation, request the site administrator to add an entry in the corporate DNS server that points hp-print-mgmt to the IP address of the Security Manager server. 2. Click the Settings, icon, and then select the Settings option. 3. In the left navigation pane, select Instant-On Security. ENWW Set up Instant On Security 13

18 4. Select the Accept Device Announcements check box, and then click OK in the confirmation dialog box to enable communication with port Select a setting to specify the minimum authentication required for the assessment. The default setting is the No Authentication (Out of the Box) option. Mutual Authentication a. Select this option for the highest authentication level and then click Select Certificate. This authentication method is most secure and requires certificates to be configured on the device and in Security Manager. This enables the Security Manager server and the device to verify that the certificate for the other is valid. When the device announces itself or other events occur, such as an IP address change or cold reset, the device and the Security Manager server communicate using the secure socket layer (SSL) to validate certificates before automatic remediation occurs. The certificates must be valid identity certificates signed by a trusted certificate authority and installed on the Security Manager server and each device. Each device must be set to require mutual authentication using certificates during a pre-staging process. Because certificates remain after a cold reset, this method of Instant-On Security provides protection even if a cold reset is performed on the device. b. On the Select Certificate window, select a certificate from the list of certificates found on the Security Manager server, and then click Select. Optionally, you can use Security Manager to manage the identity certificates on the Security Manager server and the devices. No Authentication (Out of the Box) a. Select this option to not use any authentication. This is the simplest authentication method because no pre-staging is required. Security Manager automatically configures devices to be compliant with the security policy when they are taken out of the box and connected to the network. This method also works on devices when a cold reset is performed because no authentication is required for auto discovery, assessment, and remediation. b. To restrict and control the devices entering Security Manager, select the Use Device Serial Number List check box, and then click Add Device Serial Number(s). c. Select one of the following methods to add serial numbers on the Add Device Serial Number(s) window: Type the printer s serial number in the Device Serial Number text box, and then click Add to list. Click Add from file, locate the xml or text file from your file browser, open the file in Security Manager, and then click Add. Security Manager uses the list of serial numbers to accept a device the first time, and then automatically removes the serial number from the list. It recognizes all future announcements by that device as a valid device. 6. Create a valid policy from the Policies page. For instructions, see Create a policy You must create a valid initial policy to use with Automatic Remediation. 7. Select the Allow Automatic Remediation check box to activate automatic remediation. 14 Chapter 3 Setting up Security Manager ENWW

19 8. Select a policy from the Initial Assessment Policy drop down box to ensure new devices are compatible with the requirement. The valid policies are sorted in the list from the oldest to latest policy. This policy is used for newly announced devices and ensures that the device is fully compliant with the requirements. The selected Initial Assessment Policy is used once for the initial remediation. After the initial assessment, Security Manager uses the most recently applied policy. If the policies are not valid, a No valid policies message displays in the Initial Assessment Policy text box and the Save button is disabled. 9. Click Save to save the entries. If HP JetAdvantage Security Manager service is not running, the Security Manager application will not save the entries, and display an error message. After configuring the Instant-On Security settings, devices powered on will automatically populate and remediate in Security Manager. Devices automatically discovered display in the Instant-On Auto Discovered column in the Devices page. ENWW Set up Instant On Security 15

20 Configure the server settings Use the Automated Output setting option to configure the server to authenticate and send notifications when scheduled tasks are completed. Follow these steps to configure server settings: 1. Log into Security Manager, select the Settings icon ( ) and then select the Settings option. 2. On the left navigation pane, click Automated Output. 3. In the Settings section, type the information required to identify the server. SMTP Server Contains the hostname or IP address of the server. Port Contains the network port to use to contact the server. By default, the network port is set to 25. Enable SSL Enables or disables the use of SSL when working with the server. By default, this option is set to enabled. Use Default Credentials Sets whether user credentials need to be supplied or not. If enabled, then the Username, Password, and Domain text boxes are disabled (grayed out). Username Provides the name used to log into the SMTP ( ) server. Password The password used to log into the SMTP server. The characters are encrypted when typed. Domain (Optional) The username is often related to a domain. If so, then the domain is needed to qualify the username. 4. In the Automatic Notification Settings, type the information required. Subject The subject used in the that is sent. From Address The address used as the sending in the message. Recipient(s) An addresses of one or more recipient. Addresses (if more than one) must be separated by a space, comma, or semicolon. If an address is incorrect, tasks will run for a longer time and fail. 5. Send a test . a. Click Send Test button to make sure that the server and the configured settings are correct. b. Check your for the test Click Save. Click Yes to confirm the changes to the settings in the confirmation dialog box. 16 Chapter 3 Setting up Security Manager ENWW

21 Set up global credentials Global credentials are used as part of the device verification process when performing tasks which include device discovery, verifying devices, assess only, assess and remediate of a device and setting the Instant-On Security feature. Use the Global Credentials feature to set global credentials for all existing devices and custom groups. When verifying devices, Security Manager first attempts to check the assigned device credentials for a device. If the verification fails with device credentials, it checks the device s default credentials. If the default credentials verification fails, it verifies the device with the global credentials. The device, default, and global credentials are also applicable for Assess Only and Assess and Remediate policies on a device. Follow these steps to set up the Global Credentials: 1. Log into Security Manager, select the Settings icon ( ) and then select the Settings option. 2. On the left navigation pane, click Global Credentials. 3. On the SNMP Credentials section, complete the following steps to set the SNMPv1/v2 Read, Read/Write or/and SNMPv3 credentials: a. Select the Set v1/v2 Read Community Name check box, type the SNMP v1/v2 Community name in the first text box, and then type the name again in the second text box to confirm. b. Select the Set v1/v2 R/W Community Name check box, type the SNMP v1/v2 Read/ Write Community name in the first text box, and then type the name again in the second text box to confirm. c. Select the Set v3 Credentials check box, and then complete the following steps to set the SNMP v3 credentials: i. Type the SNMP name in the User Name text box. ii. iii. iv. Type the Authentication Passphrase, and then type the passphrase again to confirm. Select the Authentication Protocol (MD5 or SHA). Type the Privacy Passphrase, and then type the passphrase again to confirm. v. Select the Privacy Protocol (DES or AES). 4. On the Other Credentials section, complete the following tasks to set credentials in the HP Embedded Web Server, file system, and PJL: a. Select the Set Admin (EWS) Password check box, type the administrative password set in the HP Embedded Web Server, and then type the password again to confirm. b. Select the Set File System Password check box, type the password for the file system on the device, and then type the password again to confirm. c. Select the Set PJL Password check box, type the password for the Printer Job Language on the device, and then type the password again to confirm. d. Select the Set Bootloader Password check box, type the password for the bootloader on the device, and then type the password again to confirm. 5. Click Save. ENWW Set up global credentials 17

22 18 Chapter 3 Setting up Security Manager ENWW

23 4 Using Security Manager This section discusses how to add and edit device information, create a policy, assess and remediate, and run reports. To view the main topics in Security Manager Home page, see Introduction This section provides information on the following topics: Create a security policy Add and edit device information Assess and remediate Run reports Export and Scheduling reports ENWW 19

24 Create a security policy Use the Policies page to create, edit, and import a policy. Select a policy or policies to configure the settings using the Policy Editor and the policy buttons displayed in the Policies page. A new policy is initially invalid. You must provide the device credentials and configure any required settings using the Policy Editor. This section focuses on the following topics: Policies page navigation Create a policy Edit a policy Export and Import policies Policies page navigation The Policies toolbar icons located in the Policies page allows you to modify a policy. Total policies selected control Displays the number of policies selected in the Policies page. Policies toolbar icons: This toolbar is located above the Policies list panel and allows you to modify a policy. Policies toolbar icons Refresh Updates the Policies list panel. New Task Allows you to create a new task, set a policy, and schedule Assessment or Assessment and Remediation tasks for a device group or multiple groups. A task cannot be created for an individual device. Set as Instant On Policy Sets valid policies as an instant-on policy. Make sure to select the Accept Device Announcements option in the Settings tab. Create a policy Rename Allows you to type a new name for a policy. Make sure not to use names that are existing in the Policy page. Edit Displays the Policy Editor page. Export Exports the selected valid policy to an.xml file. Delete Deletes the selected policy. Unlock Unlocks a policy. Follow these steps to create a new policy: 20 Chapter 4 Using Security Manager ENWW

25 1. Log into Security Manager, and then select the Policies tab. 2. Hover on the left navigation pane, and then select the New Policy icon ( ). 3. Complete the following steps on the New Policy window to create a policy: a. Type a name for the policy in the Policy Name text box. Use a policy name that indicates its purpose, such as Initial Instant-On Policy. b. Select a template from the Selected Template drop-down list. Click the Help icon ( ) for more information of the Security Manager templates. Security Manager includes the following policies: HP Security Manager Base Policy: Use this template for a new policy. It includes specific credentials that are vital for a secure policy. HP recommends that you select this policy to use as a template. HP Security Manager Limited Policy: This template is designed primarily for assessments only as it provides a quick look of a secure fleet. It contains a minimal amount of security related features. Blank Policy: This template does not have any pre-defined settings and is used to create a security policy from scratch. After you choose a policy name and template to use, you can modify it to suit your needs. c. Click Save. The new policy automatically displays in the Policies page. To set a policy for a single item, see Set policy options for a single item To globally set the advanced remediation options (severity, remediation and unsupported behavior) in a specific category or the entire policy, see Set severity, remediation, and unsupported behavior to policy items in Quick Settings. Edit a policy Use the Policy Editor to set security settings on a device group so that each device in the group complies with the company security policies. The Policy Editor page displays the policy icon (new, valid, or invalid) and the selected policy name. The main categories of the policy settings display on the top navigation bar and the left navigation pane displays the sub categories of the policy settings These categories also display the number of policy items selected in parenthesis. The check boxes displayed in the Related Policy Items section located on the right panel are visual indicators representing the enabled status of the policy items and are always disabled. Only one policy can be selected for configuring at a time. A policy is automatically locked when an administrator configures the settings in the Policy Editor and is unlocked when it is closed. If another user tries to open a policy when it is being edited, a Policy In Use dialog box displays stating that the policy is edited and only a read option is available. Policy editor icons ENWW Create a security policy 21

26 Set severity, remediation, and unsupported behavior to policy items in Quick Settings Policy editor icons The following lists the icons used in the policy editor category panel. The following table lists the icons used in the policy editor. Policy editor icons (Green padlock) (Yellow padlock) (Red padlock) (Information bubble ) (Red text box) (Yellow text box) Grayed field Description The selected setting adds more security and is the recommended security option. The selected setting provides some security, other choices might provide a more secure policy. The selected setting is less secure. Provides information about a setting. Click the bubble to display the information of a setting. Indicates an error. A list of errors displays on an error panel. Indicates a warning. The information provided for the settings might cause issues on some devices or in certain situations. Information is required for this setting. Set severity, remediation, and unsupported behavior to policy items in Quick Settings The Quick Settings function allows a user to set the severity, remediation, and unsupported setting on policy items in the Security Manager Settings located in the main category or sub category policy settings or in the Quick Settings (Policy) window. A policy can be set to include or exclude items. The following settings can be set at the top level: Include All Items: This setting at the top level creates a valid policy that includes all the recommended settings. Exclude All Items: This setting at the top level deselects all the items in the policy. Quick Settings can be configured for selected policy items. Items can also be included or excluded at the sub category level. Remediation options are available for each item in the policy and can include the severity level reported during an assessment, whether to remediate a failure, and how to report an unsupported feature. You can use the policy's default remediation settings, individually set the options for each item in the policy, or set remediation options to apply to a specific policy category. Set Severity: Indicates the security risk of the assessed feature when it is not in compliance with the policy. Set Remediation: Indicates whether the item is remediated during an assessment and remediation task. When global remediation is set to Disable device remediation (Report Only), this setting applies to all policies and takes precedence over a policy's advanced remediation settings. For more information about the global remediation setting, see Verify device remediation and hostname resolution. 22 Chapter 4 Using Security Manager ENWW

27 Enable: Security Manager changes out-of-compliance items on the device to match the policy's setting. Disable: Security Manager reports out-of-compliance items, but does not change the item on the device. Set Unsupported Behavior: Defines how Security Manager reports a feature that a device does not support during an assessment. This is useful when creating a single policy for use across a fleet of devices. Instead of failing when a specific feature is not supported, set the policy to ignore the item. Fail: Security Manager reports a failure when the item does not exist on the device. Ignore (default): Security Manager does not report the item. For example, if a device does not support a FAX PIN, Security Manager does not report that a FAX PIN is blank. Set policy options for a single item After a policy is created, follow these steps to configure the policy setting items and to set the severity, remediation, and unsupported behavior options for specific items in a policy: 1. Log into Security Manager, and then select the Policies tab. 2. On the Policies page, select a policy from the policies panel, and then click on the Edit button. 3. On the Policy Editor page, select a policy setting from the main category located in the top navigation tabs. 4. On the left navigation pane, select a sub category policy setting. 5. Select a Quick Settings policy item panel check box to enable the policy settings. 6. Click a policy item arrow to expand a policy item panel. 7. In the Security Manager Settings section, set the Severity option to High, Medium, or Low. 8. Set the Remediation option to Enable or Disable. 9. Set the Unsupported option to Fail or Ignore. 10. Configure the required policy settings To ensure a valid policy, click the Authentication tab, select the Credentials sub category, and then make sure to configure the following settings: For example, click the Authentication tab, select the Credentials sub category, and then configure the following settings: Admin (EWS) Password SNMPv1/v2 Read Community Name and SNMPv1/v2 Read/Write Community Name File System Password PJL Password Remote Configuration Password 11. Click Validate and then click Save. ENWW Create a security policy 23

28 For invalid policy settings, the policy items will display in red font. An error panel will display below the policy item panel name and will include the number of errors and list the details of the errors. 12. Click Preview to view the policies. To cancel, click Cancel. Set policy options for all the items or for a category Follow these steps to set the severity, remediation, and unsupported behavior options for all the items in the policy or for a category: 1. Log into Security Manager, and then select the Policies tab. 2. Select a policy from the policies panel, and then click on the Edit button. 3. On the Policy Editor page, select Quick Settings (Policy) from the main category located in the top navigation tabs. 4. In the Quick Settings (Policy) window, select the Policy Item inclusion check box, and then select an option in the Policy Item inclusion drop-down list. 5. Select the Severity check box, and then select a High, Medium, or Low option. 6. Select the Remediation check box, and then select the Enable or Disable option. 7. Select the Unsupported Behavior check box, and then select the Fail or Ignore option. Export and Import policies Export a policy Valid policies can be imported into a compatible version of Security Manager. Policies are encrypted with a passphrase to protect sensitive data, such as passwords and network information. A passphrase must be provided to import each policy. 1. Log into Security Manager, and then select the Policies tab. 2. On the Policies page, click on the check box to select a policy. An invalid (incomplete) policy cannot be exported and is grayed-out. 3. On the Policies toolbar, click the Export icon. Only one policy can be exported at a time. 4. Enter the passphrase to use for this policy, and then click OK. The passphrase can be any characters up to a maximum of 80 characters. The Export policy file is downloaded in the Downloads folder. 24 Chapter 4 Using Security Manager ENWW

29 Import a policy 1. Log into Security Manager, and then select the Policies tab. 2. Hover on the left navigation pane, and then click the Import Policies icon ( ). 3. Locate the folder where the policy is stored, select the.xml file, and then click Open. 4. In the Import Policy window, type the passphrase for the policy (.xml file), and then click Import to import the file in Security Manager. If the passphrase is not correct, an Import Policy Error window displays and requests the user to type the correct passphrase. An error message will also display if the imported file is not valid. If the invalid file is imported again with a valid policy file, it is not required to change the policy name for the imported file. If the same policy is imported, an error message displays and you will have to type a new policy name. ENWW Create a security policy 25

30 Add and edit device information Create a group Manual Group Security Manager enables you to add devices using any of the following features: Discover Devices in the Devices page. For more information, see Discover devices Accept Device Announcements option in the Instant-On Security setting. For more information, see Set up Instant On Security. When adding devices, Security Manager can resolve IP addresses to hostnames only if the Resolve IP addresses to hostnames when devices are added option is selected in the General settings. For more information, see Verify device remediation and hostname resolution. Use the Devices page to discover devices, and then associate these devices to a group. The Devices toolbar icons in the Devices page allows you to modify the device information. For an overview of the icons and controls on the Devices page, see Devices page navigation. Security Manager licensing occurs automatically when devices are added. For more information, see Install licenses. Create a group Discover devices Devices page navigation Export device addresses Edit device and group information A group is a collection of devices. In Security Manager, the All Devices Group is the default master group and cannot be changed. You can create a group and the new group will always be a sub group to the All Devices Group. The Groups section displays the device group names in a hierarchical order. Devices can be categorized in one of the following groups: Manual Group Automatic Group To assign devices to a Manual group, create a group, and then manually assign devices to the group. A Manual group cannot be created under an Automatic group. Follow these steps to create a Manual group: 1. Log into Security Manager, and then select the Devices tab. 2. Hover on the left navigation pane, and then click the Manage Groups icon ( ). 26 Chapter 4 Using Security Manager ENWW

31 3. On the Manage Groups window, create a group in the New Group section. a. On the Group Name text box, type a name for a device group. The maximum length for this text box is 256 characters. b. In the Group Type drop-down list, select Manual. c. In the Parent Group drop-down list, select a group (All Groups, for example), click Add, and then click Close. The new group will be set as a sub group to All Groups. Automatic Group 4. On the Devices page, click on the check box to select a device. You can also use the Filter or Search text box to search for devices. 5. Click on the Add to Group icon. 6. On the Add to Group window, select a group from the Select Group to Add.. drop-down list, and then click Add. The new group will be set as a sub group to All Groups. For more information about editing a Manual Group, see Manage Groups Devices can be assigned based on a specified filter criteria. The filter criteria set on a Automatic Group is scheduled to run every 24 hours. Follow these steps to create an Automatic group: 1. Log into Security Manager, and then select the Devices tab. 2. Hover on the left navigation pane, and then click the Manage Groups icon ( ). 3. On the Manage Groups window, create a group in the New Group section. a. On the Group Name text box, type a name for a device group. The maximum length for this text box is 256 characters. b. In the Group Type drop-down list, select Automatic, and then click Specify Filter Criteria. c. In the Filter Criteria window, select the following criteria in the Add Filter section, and then click Add. Device Property NOT operator Function Value Options d. Click Save to save the settings, and then on the Manage Groups window, click Close. The new group will be set as a sub group to All Groups. ENWW Add and edit device information 27

32 For more information about editing an Automatic Group, see Manage Groups Discover devices The Discover Devices feature in the Devices page enables you to add devices to a group by using the Automatic or Manual discovery options. Add devices using Automatic Discovery Add devices using Manual Discovery Add devices using Automatic Discovery Use the Automatic discovery type option to discover devices connected to a network and to add them to a device group. Security Manager will use the credentials set in the Global Credentials when discovering devices. Follow these steps to automatically discover and add devices in the Devices page: 1. Log into Security Manager, and then select the Devices tab. 2. Hover on the left navigation pane, and then click the Discover Devices icon ( ). 3. Select a group from the Group to Add drop-down list. The default group is set to Add Devices. 4. In the Discovery Type list box, select the Automatic option. 5. Select one of the following options in the Automatic Discovery section: Number of Network Hops : Select the number of network hops or routers required to traverse in the multicast query. The default is 4 hops. This option uses a multicast UDP discovery mechanism to ask HP devices to identify themselves. Range: Type an IP address in the Start Address and End Address text boxes to initiate a discovery using an IP range. This option scans the given IP address range for all devices that are supported by Security Manager. Invalid IP addresses will disable the Discover button. 6. Click Discover. fails. A successful discovery will display a green slider and an error message displays if the discovery Add devices using Manual Discovery Use the Manual discovery type to discover devices by entering IP address or by using a text or xml file to add devices to a group. To add a file for discovery, use a plain text editor to create a text file or valid.xml file, type one IP address or hostname per line, and then make sure to note the location of the saved file. 28 Chapter 4 Using Security Manager ENWW

33 Security Manager will use the credentials set in the Global Credentials when discovering devices. Follow these steps to manually discover and add devices in the Devices page: 1. Log into Security Manager, and then select the Devices tab. 2. Hover on the left navigation pane, and then click the Discover Devices icon ( ). 3. Select a group from the Group to Add drop-down list. The default group set is All Devices. 4. In the Discovery Type list box, select the Manual option. 5. On the Manual Discovery section, use one of the following methods to add devices: Security Manager displays an error if an unknown IP address or hostname is entered. Type an IP address or hostname of a device in the IP Address/Hostname text box, and then click Add to list for Discovery. Each valid IP address and hostname is displayed in the Devices section. Click Add from file for Discovery, select the text or.xml file that contains a list of device IP addresses or hostnames, and then click Open. If the file is readable, the valid IP addresses and hostnames are displayed in the Devices section. A dialog box displays for the invalid addresses found in the file. These IP addresses will not be included in the Devices section. To exit from the dialog box, click Close. HP Web Jetadmin can be used to export an.xml file that can be imported into Security Manager. At a minimum, the device IP address must be exported. By default the devices listed in the Devices section sorts the devices by the IP address column. 6. To remove an IP address or hostname from the Devices section, select the IP address or hostname row in the Discover Devices window, and then click Delete. 7. Click Discover to add the IP addresses and hostnames listed in the Devices section. To close the Discover Devices window, click Cancel or the Exit button. Devices page navigation This section provides an overview of the icons and controls in the Devices page. Total devices selected control Displays the number of devices selected in the Devices page. Devices toolbar icons: This toolbar is located above the Devices list panel and allows you to modify the discovered devices. Devices toolbar icons Refresh Updates the devices list panel. Column Organizer Allows you to select or deselect the columns to display in the Devices list panel or use the Reset to Default button. ENWW Add and edit device information 29

34 New Task Allows you to create, assess or assess and remediate, and schedule a task for a device group or multiple groups. A task cannot be created for an individual device. Verify Initiates a verification task on the selected devices or groups To view the status of the verification, click the Tasks page. EWS Web Opens an HP Embedded Web Server (EWS) in a the default browser using the device's IP address or hostname. Add to Group Adds a device to a different group. Remove from Group Removes a device from a group. Assign Licenses Assign licenses to the selected devices. Remove Licenses By default, Remove licenses is enabled. Set Credentials Set device credentials to the selected devices to assess/remediate. Set SSL/TLS Enforcement Enable or disable validation of the ID certificate whenever Security Manager communicates with the HP device. Reset to Not Assessed Reset the Device Status to unassessed and will remove recommendations and assessment information. Export Device Export the selected devices to an.xml file. Delete Deletes the selected devices. Device List Panel: Lists the devices discovered and information of the devices in columns. Examples are the following: IP Address Displays a Device Properties window listing information of the device status, identification and credentials. It also provides recommendations for a device. Assessment status Displays icons for devices that are not assessed, assessed, low risk failure, medium risk failure and high risk failure. Export device addresses Follow these steps to export information about individual devices or a group of devices to an xml file: 1. Log into Security Manager, and then select the Devices tab. 2. On the Devices page, click the check box in the first column to select a device in the Devices list panel or a group from All Devices. 3. Click the Export Devices icon located in the Devices toolbar icons. 4. When the file browser opens, browse to a location to store the device file, provide a file name, and then click Save. Edit device and group information In Security Manager, the Manage groups feature in the Devices page allows you to add, move, remove and delete devices from a group. This changes the hierarchy in the Groups section. 30 Chapter 4 Using Security Manager ENWW

HP JETADVANTAGE SECURITY MANAGER. Adding and Tracking Devices

HP JETADVANTAGE SECURITY MANAGER. Adding and Tracking Devices HP JETADVANTAGE SECURITY MANAGER Adding and Tracking Devices CONTENTS Overview... 2 General Description... 2 Detailed Description... 5 Resolve IP Address to Hostname... 5 Resolve Hostname/DNS Alias to

More information

KYOCERA Net Admin User Guide

KYOCERA Net Admin User Guide KYOCERA Net Admin User Guide Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held liable

More information

HP JETADVANTAGE SECURITY MANAGER. Credential Management

HP JETADVANTAGE SECURITY MANAGER. Credential Management HP JETADVANTAGE SECURITY MANAGER Credential Management CONTENTS Overview... 2 Credential Types... 2 Admin (EWS) Password... 3 SNMPv1/v2... 4 SNMPv3... 5 File System Password... 6 PJL Password... 6 Remote

More information

Configuring Security Mitigation Settings for Security Bulletin HPSBPI03569 Protecting Solution Installation Settings

Configuring Security Mitigation Settings for Security Bulletin HPSBPI03569 Protecting Solution Installation Settings Technical White Paper Configuring Security Mitigation Settings for Security Bulletin HPSBPI03569 Protecting Solution Installation Settings Table of contents Overview... 2 Using the Embedded Web Server

More information

Legal Notes. Regarding Trademarks KYOCERA MITA Corporation

Legal Notes. Regarding Trademarks KYOCERA MITA Corporation Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held liable for any problems arising from

More information

HP SmartTracker. User Guide

HP SmartTracker. User Guide HP SmartTracker User Guide 2018 HP Development Company, L.P. Edition 3 Legal notices The information contained herein is subject to change without notice. The only warranties for HP Products and services

More information

LASERJET ENTERPRISE M4555 MFP SERIES. Quick Reference Guide

LASERJET ENTERPRISE M4555 MFP SERIES. Quick Reference Guide LASERJET ENTERPRISE M4555 MFP SERIES Quick Reference Guide Reduce or enlarge a copy image 1. From the Home screen, touch the Copy button. 2. Touch the Reduce/Enlarge button. 3. Select one of the predefined

More information

HP Web Jetadmin Report Generation Plug-in

HP Web Jetadmin Report Generation Plug-in HP Web Jetadmin Report Generation Plug-in HP Web Jetadmin Report Generation Plug-in Reference Manual Copyright notice 2006 Copyright Hewlett-Packard Development Company, L.P. Reproduction, adaptation

More information

HP Designjets and HP Security Features

HP Designjets and HP Security Features HP Designjets and HP Security Features Overview and solutions for managing Security features in HP Designjets using the printers Embedded Web Server technology, Front Panel and Web Jetadmin Table of contents

More information

HP Easy Printer Care. System Administrator's Guide

HP Easy Printer Care. System Administrator's Guide HP Easy Printer Care System Administrator's Guide HP Easy Printer Care System Administrator's Guide Copyright and license 2006 Copyright Hewlett-Packard Development Company, L.P. Reproduction, adaptation

More information

KYOCERA Net Viewer User Guide Supplement

KYOCERA Net Viewer User Guide Supplement KYOCERA Net Viewer User Guide Supplement Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be

More information

HP SmartTracker. Installation guide

HP SmartTracker. Installation guide HP SmartTracker Installation guide Edition 1 Copyright 2017 HP Development Company, L.P. Legal notices The information contained herein is subject to change without notice. The only warranties for HP products

More information

KYOCERA Net Viewer User Guide

KYOCERA Net Viewer User Guide KYOCERA Net Viewer User Guide Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held liable

More information

KYOCERA Device Manager User Guide

KYOCERA Device Manager User Guide KYOCERA Device Manager User Guide Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held

More information

KMnet Viewer. User Guide

KMnet Viewer. User Guide KMnet Viewer User Guide Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change for improvement without notice. We cannot be

More information

KYOCERA Net Viewer 5.3 User Guide

KYOCERA Net Viewer 5.3 User Guide KYOCERA Net Viewer. User Guide Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held liable

More information

HP PRINTER SECURITY PLUG-IN

HP PRINTER SECURITY PLUG-IN HP PRINTER SECURITY PLUG-IN For Microsoft System Center Configuration Manager (SCCM) CONTENTS Overview... 2 Installation... 2 SQL Permissions... 3 Using a Different SQL Account... 4 Licensing... 5 Launching

More information

Legal Notes. Regarding Trademarks. Models supported by the KX printer driver KYOCERA MITA Corporation

Legal Notes. Regarding Trademarks. Models supported by the KX printer driver KYOCERA MITA Corporation Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held liable for any problems arising from

More information

Legal Notes. Regarding Trademarks KYOCERA MITA Corporation

Legal Notes. Regarding Trademarks KYOCERA MITA Corporation Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held liable for any problems arising from

More information

Equitrac Integrated for Konica Minolta

Equitrac Integrated for Konica Minolta Equitrac Integrated for Konica Minolta 1.2 Setup Guide 2014 Equitrac Integrated for Konica Minolta Setup Guide Document Revision History Revision Date Revision List August 9, 2013 Updated for Equitrac

More information

Equitrac Integrated for Konica Minolta. Setup Guide Equitrac Corporation

Equitrac Integrated for Konica Minolta. Setup Guide Equitrac Corporation Equitrac Integrated for Konica Minolta 1.2 Setup Guide 2012 Equitrac Corporation Equitrac Integrated for Konica Minolta Setup Guide Document Revision History Revision Date Revision List November 1, 2012

More information

HP Operations Manager

HP Operations Manager HP Operations Manager Software Version: 9.22 UNIX and Linux operating systems Java GUI Operator s Guide Document Release Date: December 2016 Software Release Date: December 2016 Legal Notices Warranty

More information

HP PageWide Managed Color P75250dn Firmware Readme

HP PageWide Managed Color P75250dn Firmware Readme HP PageWide Managed Color P75250dn Firmware Readme Product Name(s): HP PageWide Managed Color P75250dn Model Number(s): Y3Z49A This document contains information for the firmware revision number: Firmware

More information

Veeam ONE. Version 8.0. User Guide for VMware vsphere Environments

Veeam ONE. Version 8.0. User Guide for VMware vsphere Environments Veeam ONE Version 8.0 User Guide for VMware vsphere Environments July, 2015 2015 Veeam Software. All rights reserved. All trademarks are the property of their respective owners. No part of this publication

More information

HP Database and Middleware Automation

HP Database and Middleware Automation HP Database and Middleware Automation For Windows Software Version: 10.10 SQL Server Database Refresh User Guide Document Release Date: June 2013 Software Release Date: June 2013 Legal Notices Warranty

More information

HP Roam - Business Deployment Guide

HP Roam - Business Deployment Guide HP Roam - Business Deployment Guide Copyright 2018 HP Development Company, L.P. January 2019 The information contained herein is subject to change without notice. The only warranties for HP products and

More information

ForeScout Extended Module for Tenable Vulnerability Management

ForeScout Extended Module for Tenable Vulnerability Management ForeScout Extended Module for Tenable Vulnerability Management Version 2.7.1 Table of Contents About Tenable Vulnerability Management Module... 4 Compatible Tenable Vulnerability Products... 4 About Support

More information

ZENworks 2017 Audit Management Reference. December 2016

ZENworks 2017 Audit Management Reference. December 2016 ZENworks 2017 Audit Management Reference December 2016 Legal Notice For information about legal notices, trademarks, disclaimers, warranties, export and other use restrictions, U.S. Government rights,

More information

HP-UX Software and Patching Management Using HP Server Automation

HP-UX Software and Patching Management Using HP Server Automation HP-UX Software and Patching Management Using HP Server Automation Software Version 7.84, released August 2010 Overview... 2 Patch Management for HP-UX Prerequisites... 2 HP-UX Patching Features... 2 Importing

More information

Printer Driver User Guide

Printer Driver User Guide PRINT ECOSYS P500cdn ECOSYS P500cdw ECOSYS P50cdn ECOSYS P50cdw ECOSYS P505cdn ECOSYS P506cdn ECOSYS P506cdw Printer Driver User Guide PRINT COPY SCAN FAX ECOSYS M550cdn ECOSYS M550cdw ECOSYS M55cdn ECOSYS

More information

Legal Notes. Regarding Trademarks. Models supported by the KX printer driver KYOCERA Document Solutions Inc.

Legal Notes. Regarding Trademarks. Models supported by the KX printer driver KYOCERA Document Solutions Inc. Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held liable for any problems arising from

More information

Printer Driver User Guide

Printer Driver User Guide PRINT COPY SCAN FAX TASKalfa 700i TASKalfa 800i Printer Driver User Guide Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change

More information

ForeScout Extended Module for VMware AirWatch MDM

ForeScout Extended Module for VMware AirWatch MDM ForeScout Extended Module for VMware AirWatch MDM Version 1.7.2 Table of Contents About the AirWatch MDM Integration... 4 Additional AirWatch Documentation... 4 About this Module... 4 How it Works... 5

More information

Legal Notes. Regarding Trademarks. Models supported by the KX printer driver KYOCERA MITA Corporation

Legal Notes. Regarding Trademarks. Models supported by the KX printer driver KYOCERA MITA Corporation Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held liable for any problems arising from

More information

HP LaserJet MFP Analog Fax Accessory 300. Supplemental Information

HP LaserJet MFP Analog Fax Accessory 300. Supplemental Information HP LaserJet MFP Analog Fax Accessory 300 Supplemental Information HP LaserJet MFP Analog Fax Accessory 300 Supplemental Information Copyright Information 2005 Copyright Hewlett-Packard Development Company,

More information

Printer Driver User Guide

Printer Driver User Guide PRINT COPY SCAN FAX TASKalfa 0i TASKalfa i Printer Driver User Guide Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change

More information

Administrator's Guide

Administrator's Guide Administrator's Guide Contents Administrator's Guide... 7 Using Web Config Network Configuration Software... 8 About Web Config... 8 Accessing Web Config... 8 Changing the Administrator Password in Web

More information

Printer Driver User Guide

Printer Driver User Guide PRINT COPY SCAN FAX ECOSYS M660idn ECOSYS M655idn ECOSYS M65idn ECOSYS M65dn Printer Driver User Guide PRINT COPY SCAN ECOSYS M5idn ECOSTS M5dn Legal Notes Unauthorized reproduction of all or part of this

More information

KYOCERA Net Admin Installation Guide

KYOCERA Net Admin Installation Guide KYOCERA Net Admin Guide Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held liable for

More information

Widgets for SAP BusinessObjects Business Intelligence Platform User Guide SAP BusinessObjects Business Intelligence platform 4.1 Support Package 2

Widgets for SAP BusinessObjects Business Intelligence Platform User Guide SAP BusinessObjects Business Intelligence platform 4.1 Support Package 2 Widgets for SAP BusinessObjects Business Intelligence Platform User Guide SAP BusinessObjects Business Intelligence platform 4.1 Support Package 2 Copyright 2013 SAP AG or an SAP affiliate company. All

More information

Project and Portfolio Management Center

Project and Portfolio Management Center Project and Portfolio Management Center Software Version: 9.42 Getting Started Go to HELP CENTER ONLINE http://admhelp.microfocus.com/ppm/ Document Release Date: September 2017 Software Release Date: September

More information

NETWORK PRINT MONITOR User Guide

NETWORK PRINT MONITOR User Guide NETWORK PRINT MONITOR User Guide Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change for improvement without notice. We

More information

ForeScout CounterACT. Assessment Engine. Configuration Guide. Version 1.0

ForeScout CounterACT. Assessment Engine. Configuration Guide. Version 1.0 ForeScout CounterACT Core Extensions Module: IoT Posture Assessment Engine Version 1.0 Table of Contents About the IoT Posture Assessment Engine... 3 View All Endpoints Having a Security Risk... 3 Assess

More information

Perceptive Data Transfer

Perceptive Data Transfer Perceptive Data Transfer User Guide Version: 6.5.x Written by: Product Knowledge, R&D Date: September 2016 2015 Lexmark International Technology, S.A. All rights reserved. Lexmark is a trademark of Lexmark

More information

Calendar & Buttons Dashboard Menu Features My Profile My Favorites Watch List Adding a New Request...

Calendar & Buttons Dashboard Menu Features My Profile My Favorites Watch List Adding a New Request... remitview User Guide 1 TABLE OF CONTENTS INTRODUCTION... 3 Calendar & Buttons... 3 GETTING STARTED.... 5 Dashboard.... 7 Menu Features... 8 PROFILE.... 10 My Profile... 10 My Favorites... 12 Watch List...

More information

IDOL Site Admin. Software Version: User Guide

IDOL Site Admin. Software Version: User Guide IDOL Site Admin Software Version: 11.5 User Guide Document Release Date: October 2017 Software Release Date: October 2017 Legal notices Warranty The only warranties for Hewlett Packard Enterprise Development

More information

Legal Notes. Regarding Trademarks. Models supported by the KX printer driver KYOCERA MITA Corporation

Legal Notes. Regarding Trademarks. Models supported by the KX printer driver KYOCERA MITA Corporation Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held liable for any problems arising from

More information

HP Color LaserJet Managed E55040 Series Firmware Readme

HP Color LaserJet Managed E55040 Series Firmware Readme HP Color LaserJet Managed E55040 Series Firmware Readme Product Name(s): Color LaserJet Managed E55040dw Model Number(s): 3GX98A This document contains information for the firmware revision number: Firmware

More information

HP Management Integration Framework 1.7

HP Management Integration Framework 1.7 HP Management Integration Framework 1.7 Administrator Guide Abstract This document describes the use of HP Management Integration Framework interfaces and is intended for administrators involved in the

More information

DocAve for Salesforce 2.1

DocAve for Salesforce 2.1 DocAve for Salesforce 2.1 This document is intended for anyone wishing to familiarize themselves with the user interface and basic functionality of AvePoint s DocAve for Salesforce tool. System Requirements

More information

ForeScout Extended Module for Qualys VM

ForeScout Extended Module for Qualys VM ForeScout Extended Module for Qualys VM Version 1.2.1 Table of Contents About the Qualys VM Integration... 3 Additional Qualys VM Documentation... 3 About This Module... 3 Components... 4 Considerations...

More information

HP JETADVANTAGE SECURITY MANAGER

HP JETADVANTAGE SECURITY MANAGER HP JETADVANTAGE SECURITY MANAGER Policy Editor Settings CONTENTS Introduction... 5 Spoofing Identity... 5 Tampering with Data... 5 Repudiation... 6 Information Disclosure... 6 Denial of Service... 6 Elevation

More information

Early Data Analyzer Web User Guide

Early Data Analyzer Web User Guide Early Data Analyzer Web User Guide Early Data Analyzer, Version 1.4 About Early Data Analyzer Web Getting Started Installing Early Data Analyzer Web Opening a Case About the Case Dashboard Filtering Tagging

More information

Dell License Manager Version 1.2 User s Guide

Dell License Manager Version 1.2 User s Guide Dell License Manager Version 1.2 User s Guide Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your computer. CAUTION: A CAUTION indicates either

More information

Legal Notes. Regarding Trademarks. Models supported by the KX printer driver KYOCERA Document Solutions Inc.

Legal Notes. Regarding Trademarks. Models supported by the KX printer driver KYOCERA Document Solutions Inc. Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held liable for any problems arising from

More information

ForeScout Extended Module for Palo Alto Networks Next Generation Firewall

ForeScout Extended Module for Palo Alto Networks Next Generation Firewall ForeScout Extended Module for Palo Alto Networks Next Generation Firewall Version 1.2 Table of Contents About the Palo Alto Networks Next-Generation Firewall Integration... 4 Use Cases... 4 Roll-out Dynamic

More information

HP Intelligent Management Center Remote Site Manager

HP Intelligent Management Center Remote Site Manager HP Intelligent Management Center Remote Site Manager Administrator Guide Abstract This guide contains comprehensive information for network administrators, engineers, and operators who manage the IMC Remote

More information

HPE ALM Excel Add-in. Microsoft Excel Add-in Guide. Software Version: Go to HELP CENTER ONLINE

HPE ALM Excel Add-in. Microsoft Excel Add-in Guide. Software Version: Go to HELP CENTER ONLINE HPE ALM Excel Add-in Software Version: 12.55 Microsoft Excel Add-in Guide Go to HELP CENTER ONLINE http://alm-help.saas.hpe.com Document Release Date: August 2017 Software Release Date: August 2017 Legal

More information

ForeScout Extended Module for MaaS360

ForeScout Extended Module for MaaS360 Version 1.8 Table of Contents About MaaS360 Integration... 4 Additional ForeScout MDM Documentation... 4 About this Module... 4 How it Works... 5 Continuous Query Refresh... 5 Offsite Device Management...

More information

Printing System Driver User Guide

Printing System Driver User Guide Printing System Driver User Guide Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change for improvement without notice. We

More information

Forescout. Configuration Guide. Version 2.4

Forescout. Configuration Guide. Version 2.4 Forescout Version 2.4 Contact Information Forescout Technologies, Inc. 190 West Tasman Drive San Jose, CA 95134 USA https://www.forescout.com/support/ Toll-Free (US): 1.866.377.8771 Tel (Intl): 1.408.213.3191

More information

Dell EMC License Manager Version 1.5 User's Guide

Dell EMC License Manager Version 1.5 User's Guide Dell EMC License Manager Version 1.5 User's Guide Notes, cautions, and warnings NOTE: A NOTE indicates important information that helps you make better use of your product. CAUTION: A CAUTION indicates

More information

KYOCERA Net Device Manager User Guide

KYOCERA Net Device Manager User Guide KYOCERA Net Device Manager User Guide Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held

More information

Udocx for Office 365 HP MFP Deployment Guide

Udocx for Office 365 HP MFP Deployment Guide Udocx for Office 365 HP MFP Deployment Guide Version 1.3 Introduction This document describes the required steps to connect your HP MFP device to Udocx. The result of the configuration is that the Udocx

More information

DSS User Guide. End User Guide. - i -

DSS User Guide. End User Guide. - i - DSS User Guide End User Guide - i - DSS User Guide Table of Contents End User Guide... 1 Table of Contents... 2 Part 1: Getting Started... 1 How to Log in to the Web Portal... 1 How to Manage Account Settings...

More information

CA Output Management Web Viewer

CA Output Management Web Viewer CA Output Management Web Viewer User Guide Release 12.1.00 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation

More information

User Guide. Illustra Connect Version C0

User Guide. Illustra Connect Version C0 User Guide Illustra Connect Version.0 8200-114-01 C0 Notice The information in this manual was current when published. The manufacturer reserves the right to revise and improve its products. All specifications

More information

Authorized Send User s Guide Version 4.0

Authorized Send User s Guide Version 4.0 Canon Authorized Send User s Guide Version 4.0 08011-40-UD1-003 This page is intentionally left blank. 2 Authorized Send User s Guide Contents Preface...5 How to Use This Manual... 5 Symbols Used in This

More information

Virtual Recovery Assistant user s guide

Virtual Recovery Assistant user s guide Virtual Recovery Assistant user s guide Part number: T2558-96323 Second edition: March 2009 Copyright 2009 Hewlett-Packard Development Company, L.P. Hewlett-Packard Company makes no warranty of any kind

More information

CounterACT Wireless Plugin

CounterACT Wireless Plugin CounterACT Wireless Plugin Version 1.7.0 Table of Contents About the Wireless Plugin... 4 Wireless Network Access Device Terminology... 5 How It Works... 6 About WLAN Controller/Lightweight Access Points...

More information

HP UFT Connection Agent

HP UFT Connection Agent HP UFT Connection Agent Software Version: For UFT 12.53 User Guide Document Release Date: June 2016 Software Release Date: June 2016 Legal Notices Warranty The only warranties for Hewlett Packard Enterprise

More information

Configuring Embedded LDAP Authentication

Configuring Embedded LDAP Authentication HP Restricted Configuring Embedded LDAP Authentication configure Configuring Embedded LDAP Authentication For HP product models: LaserJet 4345mfp, LaserJet 9040mfp, LaserJet 9050mfp, LaserJet 9500mfp,

More information

Legal Notes. Regarding Trademarks. Models supported by the KX printer driver. Copyright 2009 KYOCERA MITA Corporation All rights reserved.

Legal Notes. Regarding Trademarks. Models supported by the KX printer driver. Copyright 2009 KYOCERA MITA Corporation All rights reserved. Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change for improvement without notice. We cannot be held liable for any problems

More information

Forescout. eyeextend for IBM BigFix. Configuration Guide. Version 1.2

Forescout. eyeextend for IBM BigFix. Configuration Guide. Version 1.2 Forescout Version 1.2 Contact Information Forescout Technologies, Inc. 190 West Tasman Drive San Jose, CA 95134 USA https://www.forescout.com/support/ Toll-Free (US): 1.866.377.8771 Tel (Intl): 1.408.213.3191

More information

SAP BusinessObjects Live Office User Guide SAP BusinessObjects Business Intelligence platform 4.1 Support Package 2

SAP BusinessObjects Live Office User Guide SAP BusinessObjects Business Intelligence platform 4.1 Support Package 2 SAP BusinessObjects Live Office User Guide SAP BusinessObjects Business Intelligence platform 4.1 Support Package 2 Copyright 2013 SAP AG or an SAP affiliate company. All rights reserved. No part of this

More information

ForeScout Extended Module for Advanced Compliance

ForeScout Extended Module for Advanced Compliance ForeScout Extended Module for Advanced Compliance Version 1.2 Table of Contents About Advanced Compliance Integration... 4 Use Cases... 4 Additional Documentation... 6 About This Module... 6 About Support

More information

IBM Proventia Management SiteProtector Policies and Responses Configuration Guide

IBM Proventia Management SiteProtector Policies and Responses Configuration Guide IBM Internet Security Systems IBM Proventia Management SiteProtector Policies and Responses Configuration Guide Version2.0,ServicePack8.1 Note Before using this information and the product it supports,

More information

Plexxi Connect vsphere Plugin User Guide Releases through 2.5.0

Plexxi Connect vsphere Plugin User Guide Releases through 2.5.0 Plexxi HCN Plexxi Connect vsphere Plugin User Guide Releases 2.3.0 through 2.5.0 December 13, 2017 100 Innovative Way - Suite 3322 Nashua, NH 03062 Tel. +1.888.630.PLEX (7539) www.plexxi.com Legal Notices

More information

HP ALM. Software Version: patch 2. Business Views Microsoft Excel Add-in User Guide

HP ALM. Software Version: patch 2. Business Views Microsoft Excel Add-in User Guide HP ALM Software Version: 12.21 patch 2 Business Views Microsoft Excel Add-in User Guide Document Release Date: September 2016 Software Release Date: September 2016 Legal Notices Warranty The only warranties

More information

Authorized Send User s Guide Version 3.5

Authorized Send User s Guide Version 3.5 Canon Authorized Send User s Guide Version 3.5 08011-35-UD1-004 This page is intentionally left blank. 2 Authorized Send User s Guide Contents Preface...5 How to Use This Manual... 5 Symbols Used in This

More information

HPE Intelligent Management Center

HPE Intelligent Management Center HPE Intelligent Management Center Service Health Manager Administrator Guide Abstract This guide provides introductory, configuration, and usage information for Service Health Manager (SHM). It is for

More information

NETWRIX WINDOWS SERVER CHANGE REPORTER

NETWRIX WINDOWS SERVER CHANGE REPORTER NETWRIX WINDOWS SERVER CHANGE REPORTER ADMINISTRATOR S GUIDE Product Version: 4.0 June 2013. Legal Notice The information in this publication is furnished for information use only, and does not constitute

More information

Equitrac Embedded for Ricoh Basic. Setup Guide Equitrac Corporation

Equitrac Embedded for Ricoh Basic. Setup Guide Equitrac Corporation Equitrac Embedded for Ricoh Basic 1.1 Setup Guide 2012 Equitrac Corporation Equitrac Embedded for Ricoh Basic Setup Guide Document History Revision Date Revision List November 2, 2012 Update for Equitrac

More information

Exchange Pro 4.4. User Guide. March 2017

Exchange Pro 4.4. User Guide. March 2017 Exchange Pro 4.4 User Guide March 2017 Table of Contents 1. Introduction to Exchange Pro... 5 About this Document... 5 Supported Mailbox Migration Paths... 6 Supported Public Folders Migration Paths...

More information

Legal Notes. Regarding Trademarks. Models supported by the GX printer driver KYOCERA Document Solutions Inc.

Legal Notes. Regarding Trademarks. Models supported by the GX printer driver KYOCERA Document Solutions Inc. Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held liable for any problems arising from

More information

Schneider Electric License Manager

Schneider Electric License Manager Schneider Electric License Manager EIO0000001070 11/2012 Schneider Electric License Manager User Manual 12/2012 EIO0000001070.01 www.schneider-electric.com The information provided in this documentation

More information

Embedded for Xerox EPA-EIP Setup Guide

Embedded for Xerox EPA-EIP Setup Guide Embedded for Xerox EPA-EIP Setup Guide 2016 XRX-EPA-EIP-20160315 Equitrac Embedded for Xerox EPA-EIP Setup Guide Document History Date Description of Revision Changes March 15, 2016 Updated for Equitrac

More information

F5 BIG-IQ Centralized Management: Device. Version 5.3

F5 BIG-IQ Centralized Management: Device. Version 5.3 F5 BIG-IQ Centralized Management: Device Version 5.3 Table of Contents Table of Contents BIG-IQ Centralized Management Overview... 5 About BIG-IQ Centralized Management... 5 Device Discovery and Basic

More information

Authorized Send User s Guide for imagerunner Machines Version 4.1

Authorized Send User s Guide for imagerunner Machines Version 4.1 Canon Authorized Send User s Guide for imagerunner Machines Version 4.1 08011-41-UD1-003 This page is intentionally left blank. 2 Authorized Send User s Guide for imagerunner Machines Contents Preface...5

More information

Version 4.1 June Xerox Device Agent (XDA) Lite User Guide

Version 4.1 June Xerox Device Agent (XDA) Lite User Guide Version 4.1 June 2013 Xerox Device Agent (XDA) Lite User Guide 2008-2013 Xerox Corporation. All rights reserved. Xerox and Xerox and Design are trademarks of Xerox Corporation in the US and/or other countries.

More information

HP BladeSystem Management Pack (v 1.x) for Microsoft System Center User Guide

HP BladeSystem Management Pack (v 1.x) for Microsoft System Center User Guide HP BladeSystem Management Pack (v 1.x) for Microsoft System Center User Guide Abstract This guide provides information on using the HP BladeSystem Management Pack for System Center version 1.x to manage

More information

hp l1619a smart attachment module

hp l1619a smart attachment module hp l1619a smart attachment module user s guide Smart Attachment Module 1 Notice This manual and any examples contained herein are provided as is and are subject to change without notice. Hewlett-Packard

More information

HP Intelligent Management Center Branch Intelligent Management System (BIMS) User Guide

HP Intelligent Management Center Branch Intelligent Management System (BIMS) User Guide HP Intelligent Management Center Branch Intelligent Management System (BIMS) User Guide Abstract This guide contains basic information for network administrators, engineers, and operators who use the Branch

More information

Sophos Enterprise Console Help. Product version: 5.3

Sophos Enterprise Console Help. Product version: 5.3 Sophos Enterprise Console Help Product version: 5.3 Document date: September 2015 Contents 1 About Sophos Enterprise Console 5.3...6 2 Guide to the Enterprise Console interface...7 2.1 User interface layout...7

More information

VMware AirWatch Product Provisioning and Staging for Windows Rugged Guide Using Product Provisioning for managing Windows Rugged devices.

VMware AirWatch Product Provisioning and Staging for Windows Rugged Guide Using Product Provisioning for managing Windows Rugged devices. VMware AirWatch Product Provisioning and Staging for Windows Rugged Guide Using Product Provisioning for managing Windows Rugged devices. AirWatch v9.2 Have documentation feedback? Submit a Documentation

More information

Manage Your Device Inventory

Manage Your Device Inventory About Device Inventory, page 1 Device Inventory and Cisco ISE Authentication, page 7 Device Inventory Tasks, page 7 Add a Device Manually, page 8 Filter Devices, page 12 Change Devices Layout View, page

More information

Xerox App Gallery App Gallery User Guide. Version 5.0 September P06709

Xerox App Gallery App Gallery User Guide. Version 5.0 September P06709 Xerox App Gallery App Gallery User Guide Version 5.0 September 2018 702P06709 2018 Xerox Corporation. All rights reserved. Xerox, Xerox and Design, ConnectKey, VersaLink, AltaLink, Xerox Extensible Interface

More information

Enterprise Vault.cloud CloudLink Google Account Synchronization Guide. CloudLink to 4.0.3

Enterprise Vault.cloud CloudLink Google Account Synchronization Guide. CloudLink to 4.0.3 Enterprise Vault.cloud CloudLink Google Account Synchronization Guide CloudLink 4.0.1 to 4.0.3 Enterprise Vault.cloud: CloudLink Google Account Synchronization Guide Last updated: 2018-06-08. Legal Notice

More information

GRS Enterprise Synchronization Tool

GRS Enterprise Synchronization Tool GRS Enterprise Synchronization Tool Last Revised: Thursday, April 05, 2018 Page i TABLE OF CONTENTS Anchor End User Guide... Error! Bookmark not defined. Last Revised: Monday, March 12, 2018... 1 Table

More information

File Management Utility User Guide

File Management Utility User Guide File Management Utility User Guide Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held

More information