Mission Control for the Microsoft Cloud. 5nine Cloud Security. Web Portal Version 12.o. Getting Started Guide

Size: px
Start display at page:

Download "Mission Control for the Microsoft Cloud. 5nine Cloud Security. Web Portal Version 12.o. Getting Started Guide"

Transcription

1 Mission Control for the Microsoft Cloud 5nine Cloud Security Web Portal Version 12.o Getting Started Guide

2 2018 5nine Software Inc. All rights reserved. All trademarks are the property of their respective owners. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system, or translated into any language in any form by any means, without written permission from 5nine Software Inc. (5nine). The information contained in this document represents the current view of 5nine on the issue discussed as of the date of publication and is subject to change without notice. 5nine shall not be liable for technical or editorial errors or omissions contained herein. 5nine makes no warranties, expressed or implied, in this document. 5nine may have patents, patent applications, trademark, copyright or other intellectual property rights covering the subject matter of this document. All other trademarks mentioned herein are the property of their respective owners. Except as expressly provided in any written license agreement from 5nine, the furnishing of this document does not give you any license to these patents, trademarks, copyrights or other intellectual property. Important! Please read the Software License Agreement before using the accompanying software program(s). Using any part of the software indicates that you accept the terms of the Software License Agreement. Unified Management and Security Platform for the Microsoft Cloud 1

3 Table of Contents Summary... 3 System Requirements... 4 Installation nine Cloud Security Web Portal Operations... 8 Log in... 8 Log out... 9 Hosts management... 9 Security tenants and users Virtual machines management Notifications Virtual Firewall Firewall dashboard Configuring Virtual Firewall Rules Security Groups Rules Templates Virtual Firewall Logs Antivirus Antivirus dashboard Antivirus Settings Creating Antivirus Jobs Quarantine IDS nine Smart Firewall for Azure Uninstall Unified Management and Security Platform for the Microsoft Cloud 2

4 Summary 5nine Cloud Security Web Portal presents a web user interface for 5nine Cloud Security for Hyper-V and 5nine Smart Firewall for Azure products. It contains all main features of Cloud Security: virtual firewall protection, antivirus, intrusion detection (IDS) and traffic anomalies detection. 5nine Cloud Security Web Portal also supports multi-tenancy. Additionally, the web portal includes the following VM management functions: start, shutdown, turn off, pause/resume, save and reset virtual machine. Unified Management and Security Platform for the Microsoft Cloud 3

5 System Requirements Supported Operating Systems: Microsoft Windows Server 2016 Microsoft Windows Server 2012 R2 Microsoft Windows Server 2012 Microsoft Windows Server 2008 R2 SP1 (with.net 4.5 additionally installed) Software Prerequisites: Enable the following roles and features on management server:.net Framework 4.5.NET Framework 3.5 ASP.NET 4.5. Web Server IIS. Web Server Security (required: all except Digest Authentication, IP and Domain Restrictions, URL Authorization). Web Server Application Development:.NET Extensibility 4.5. Web Server Application Development: ASP.NET 4.5. Web Server Application Development: ISAPI Extensions and ISAPI Filters. Web Server Management Tools: IIS Management Console. Web Server Management Tools: Management Service. Unified Management and Security Platform for the Microsoft Cloud 4

6 Installation Attention. Make sure all 5nine Cloud Security basic components are properly installed. In current release, Web Portal should be installed onto the same server with 5nine Cloud Security Management Service. To install 5nine Cloud Security Web Portal, first run the single setup launcher application: Unified Management and Security Platform for the Microsoft Cloud 5

7 Select CloudSecurity Web and click Install. The 5nine Cloud Security Web Portal Setup wizard will open: Click Next to start pre-configuration process. Read and accept the SLA (software license agreement). Click Next. Unified Management and Security Platform for the Microsoft Cloud 6

8 Click Install to start the 5nine Cloud Security Web Portal installation process. Wait until the following screen appears and then click Finish to complete the 5nine Cloud Security Web Portal installation process. Unified Management and Security Platform for the Microsoft Cloud 7

9 Upon installation, the 5nine-CloudSecurity-Web site will appear in IIS Manager on your server. There is no need to additionally configure it, unless you need to change the default port, which is set to If you change it, make sure the port is not being used by any other application. 5nine Cloud Security Web Portal Operations Open your browser and type the following URL: Change the port to your custom one if required. Log in The Welcome dialog will appear. Login is required to start working with the web portal: A custom user Global Admin is required to login to Web Portal. Create the one using 5nine Cloud Security management console, menu Settings User Management and Settings Permissions management; assign Security Administrator and Auditor roles as shown on the pictures below: Unified Management and Security Platform for the Microsoft Cloud 8

10 After the successful login, the portal will open: Features are listed in the menu on the left side and details of the selected feature on the right side. Log out To log out, click on the user s icon to the right from the welcome greeting, and then click Log Out: Hosts management If hosts are not added already, first thing to do is adding hosts to Cloud Security protection. This operation can be done using any other 5nine Cloud Security interface (e.g., standalone management console) and will apply across all of them as well as any other action. Unified Management and Security Platform for the Microsoft Cloud 9

11 To add host(s) for monitoring, select Infrastructure Hosts. Then click the Add Host button: Just like adding hosts using 5nine Cloud Security management console, there are the following options: - Adding host by name or IP. Just type the name or IP address into the Name/IP field on the Host Selection block. - Using Active Directory (AD) or IP range search to find hypervisors and then select the required ones from the list. Select the corresponding search option on the Host Unified Management and Security Platform for the Microsoft Cloud 10

12 Selection block: Active directory or IP range (for the last one specify the required range), then click the Find Hosts button to start the search: In the Found hosts field select hosts by checking the corresponding boxes against each one that you need to add (or check the one on the header line to select all found servers). - Set the host connection credentials on the Authentication block: Ø Use default credentials. This option will use the account under which you are currently working. Ø Active directory. This option will let you specify any account. Type domain\user and password. Contact your network administrator if required. - Click the Add Host button to add selected host(s). To change host connection credentials click the Credentials button: Unified Management and Security Platform for the Microsoft Cloud 11

13 Specify default or new custom credentials for host connection and click Save: Unified Management and Security Platform for the Microsoft Cloud 12

14 To add and join the host into a group, click the Add Host Group button. Type in the name of the group and select hosts to add them into the group. Then click ADD GROUP. The host list will update accordingly: To edit host group, click the Edit Host Group button. Actions are the same as when adding the host group. To remove the host group, select it and click the Remove Host Group button. Unified Management and Security Platform for the Microsoft Cloud 13

15 To remove the host from monitoring, select it and click the Remove Hosts button on the Infrastructure Hosts tab: Security tenants and users 5nine Cloud Security Web Portal has the following interface elements for operations with tenants and users: There are two tabs: Tenants and Users. Unified Management and Security Platform for the Microsoft Cloud 14

16 On the Tenants tab you can add, edit and remove tenants. Add tenant: - Click the Add Tenant button to open the Add Tenant wizard: - Type in the name and select VMs to assign to the tenant. Use filter to select VMs for convenience. Click Next. Unified Management and Security Platform for the Microsoft Cloud 15

17 - Set tenant permissions: you may use default or set individual permissions. Click Finish to complete the operation. Edit tenant. Click the Edit Tenant button. Edit tenant actions are the same as when creating a tenant. Unified Management and Security Platform for the Microsoft Cloud 16

18 Edit default permissions. Click the Edit default permissions button and set the defaults: Click Save when complete. To remove tenant, select it and click the Remove tenant button: On the Users tab you can add, edit and remove users: Note. Web portal allows working with custom users only. Domain users operations are not supported. Unified Management and Security Platform for the Microsoft Cloud 17

19 Add custom user. Click the Add User button and specify parameters for the new user: Select tenant to create the tenant user or Global Group to create the global user. Specify password and user permissions: - Security Administrator. This role grants the full permissions on the Hyper-V implementation for the user. The user assigned to this role will act as a global administrator or a tenant administrator, depending on which group it is assigned to. - Auditor. The user will be able to view the whole Hyper-V implementation or a tenant depending on which user is selected. In this role, the user can review virtual firewall and IDS logs but cannot apply any changes. Click OK to complete the operation. Unified Management and Security Platform for the Microsoft Cloud 18

20 Edit custom user. Click the Edit User button to edit the user. Only password can be changed with this operation: Specify and confirm the new password and click OK. Edit user roles. Click the Edit Roles button to edit the user roles: Check or clear roles as required and click SAVE. Unified Management and Security Platform for the Microsoft Cloud 19

21 To remove the user, select it and click the Remove User button: Virtual machines management The web interface provides all basic operations with virtual machines in the environment protected by 5nine Cloud Security: configuring and managing security features virtual firewall, IDS, traffic scanner, network anomalies detection and antivirus. Additionally, it also provides basic virtual machine management operations: start, shut down, turn off, save, pause/resume and reset. To manage virtual machines, select Infrastructure All Virtual Machines: There are checkboxes against each virtual machine on the left side, use them to apply actions to a virtual machine set security features states, review/edit VM settings and perform VM management operations. Security features state control and VM management operations are allowed in group actions select multiple VMs to perform group operations. To enable/disable a security feature, click the corresponding button on the control ribbon above VMs: You will easily see, which feature is enabled (green mark), and which is disabled (gray mark): Unified Management and Security Platform for the Microsoft Cloud 20

22 To perform VM management actions, use the corresponding VM Management drop-down menu commands for the one or more selected VMs: Unified Management and Security Platform for the Microsoft Cloud 21

23 Click the VM Settings button to review/edit VM settings (allowed for a single VM at a time): All settings are standard as they are represented in 5nine Cloud Security Management console. Unified Management and Security Platform for the Microsoft Cloud 22

24 Click on the VM name to get inside and review firewall rules (details are described below) and see various security features logs. Example, network anomalies detection log: Notifications In the right-upper corner there is an icon located to the left from the welcome greeting, which displays if there are new messages about last actions performed on the portal: Click on it to open system messages: Unified Management and Security Platform for the Microsoft Cloud 23

25 There is information for the latest actions, and list of them with visual status icons (green circle success, red circle failure). Failed actions has the! sign on the right hand. Click on it to see the details. Click green mark on the right of each message to dismiss it or the Dismiss Completed button on the header to dismiss all latest messages at once. Virtual Firewall 5nine Cloud Security web portal provides all basic operations with virtual firewall protection: configuring rules, managing VM protection status, reviewing filtering logs. Firewall dashboard Firewall dashboard contains consolidated graphical data for the protected environment: Dashboard has three blocks: VM Firewall Status, Top 5 VMs with highest traffic and Average Traffic Profile. The VM Firewall Status block displays intuitive graphical dispersion (with percentage and numbers) of VMs with enabled and disabled virtual firewall protection. Unified Management and Security Platform for the Microsoft Cloud 24

26 The Top 5 VMs with highest traffic block displays the list of VMs having the most traffic. A filter is configurable to display the desired data: The Average Traffic Profile block displays average total traffic for the configured period. The period is set using filter: Unified Management and Security Platform for the Microsoft Cloud 25

27 Data can be printed or exported into the one of available formats: Each block has the View details link, which leads you to the required section of the portal to get the detailed data on the corresponding subject. Configuring Virtual Firewall Rules 5nine Cloud Security Web portal provides managing all type of virtual firewall rules as it s represented in the standalone management console: global rules, user-defined security group rules and local rules. Global rules are configured in the Firewall Global Rules section: Unified Management and Security Platform for the Microsoft Cloud 26

28 There are checkboxes against each rule on the left side, use them to apply actions to a particular rule edit or remove. Removing rule is allowed in the group action select multiple rules to perform group removal. Local rules are configured in the Infrastructure All Virtual Machines section individually for each VM. Click on the required VM name to get inside and set ARP/L2 and IP rules for this VM: Security group rules are configured in the Infrastructure VM Groups section. Click on the required VM group name to get inside and set ARP/L2 and IP rules for this group: Note. VM Group(s) must be created before adding group rules. Refer to the Security Groups subsection below. Rules of all three types are configured in the same way as described below. Unified Management and Security Platform for the Microsoft Cloud 27

29 Click the Add ARP/L2 Rule button to add the new ARP/L2 rule: Unified Management and Security Platform for the Microsoft Cloud 28

30 Unified Management and Security Platform for the Microsoft Cloud 29

31 Click the Add IP Rule button to add the new IP rule: Unified Management and Security Platform for the Microsoft Cloud 30

32 Select the required rule and click the Edit Rule button. Edit rule process is the same as when adding a new rule. Select the required rule(s) and click the Remove Rule button to remove rule(s). Group action is allowed when removing rules. Security Groups Security VM groups are configured in the Infrastructure VM Groups section. To create a security group, click the Add VM Group button. Unified Management and Security Platform for the Microsoft Cloud 31

33 Configure the security group parameters, including VM group membership, and click the Add Group button in the below dialog window: To edit or remove a security group, select it by clicking a checkbox on the left side against the group and then click the Edit VM Group/Remove VM Groups buttons accordingly. Multiple group removal is allowed in the single action when more than one group is marked in the group list. Rules Templates Rules templates are configured in the Infrastructure Templates section. Unified Management and Security Platform for the Microsoft Cloud 32

34 To create a new template, click the Add Template button: Enter the name for the new template and click the Add Template button. To edit the rules template, select the template by checking the checkbox against the template and then click Edit Template button. To delete rules template, select the template by checking the checkbox against the template and then click Remove Templates button. Group removal action is allowed. To add rules into the template, select the template and click on its name to get inside: Adding, editing and removing rules in templates are done in the same way as it s done for security groups, global and local rules as described above. Rules in templates will be stored so they can be easily applied in the future to VM or security group. To apply template, select the corresponding object VM or a group, and then click the Use template button: Unified Management and Security Platform for the Microsoft Cloud 33

35 You can customize some parameters remote IPs and MACs before applying a template: Click OK to add rules from the template to the selected object. Virtual Firewall Logs Virtual firewall logs can be reviewed either in the Firewall Logs section of the portal or inside VM in the Infrastructure All Virtual Machines section. To view firewall log on global level, open the Firewall Logs section of the portal. You have to select the exact VM to see the filtering log before. The first VM as appears in the list is selected by default. Click the Search button to find and select the required VM: Unified Management and Security Platform for the Microsoft Cloud 34

36 Then find the required VM and click the Apply button in the Find VM dialog as shown below. Use the search filter for convenience. Unified Management and Security Platform for the Microsoft Cloud 35

37 The VM filtering log records will appear in the portal: Unified Management and Security Platform for the Microsoft Cloud 36

38 To view firewall log on VM level, open the Infrastructure All Virtual Machines section of the portal, find the required VM and click its name to get inside. Then select the Filtering Log tab: The resulting virtual firewall log entries can be filtered by using firewall log entry filter: Set the required filtering parameters and click the Apply filters button. Unified Management and Security Platform for the Microsoft Cloud 37

39 Antivirus 5nine Cloud Security web portal provides agentless anti-malware scans for virtual machines and Hyper-V hosts: immediate anti-malware scans, recurring anti-malware scans by user-defined schedules and delayed one-time anti-malware scans. Antivirus dashboard Antivirus dashboard contains consolidated graphical views of the environments anti-malware protection status. First two blocks Protected VMs and Infected VMs display graphical views (with percentage and numbers) of the VMs included/not included into AV scans and clean/infected VMs that have already been scanned: Unified Management and Security Platform for the Microsoft Cloud 38

40 Other blocks: Signature Updates, Top 5 Threats and Latest Quarantine Events display data for signature databases on protected Hyper-V hosts, top 5 viruses detected during scans and latest quarantine records: A filter is configurable for the top 5 threats: Unified Management and Security Platform for the Microsoft Cloud 39

41 Each block has the View details link, which leads you to the required section of the portal to get the detailed data on the corresponding subject. Antivirus Settings 5nine Cloud Security web portal provides general antivirus settings that are required for AV operation. They are configured in Antivirus Settings section of the portal. Action on virus, definitions update frequency and workload orchestration: Host definitions information, force update and proxy settings (if required): Unified Management and Security Platform for the Microsoft Cloud 40

42 Scan extensions, exclusions and always blocked lists: Creating Antivirus Jobs Antivirus job is created in the Antivirus Jobs or AV Scheduled Jobs sections of the portal. Each one of them has the Create VM Scan button to create scan for virtual machines, and the Create Host Scan button to create scan for Hyper-V host. Unified Management and Security Platform for the Microsoft Cloud 41

43 Click the required button to create either host(s) or VM(s) AV scan job. The Create VM (Host) scan wizard will open, similar to the one in standalone management console. Go through the wizard and set the required parameters for the job: Type the name and select objects: Unified Management and Security Platform for the Microsoft Cloud 42

44 Select extensions: Select exclusions and other scan parameters: Unified Management and Security Platform for the Microsoft Cloud 43

45 Set the always blocked locations and/or files if required: Set the schedule and click Finish to create the job: Unified Management and Security Platform for the Microsoft Cloud 44

46 The job will appear in the Antivirus Jobs section if the job runs immediately and in the Antivirus Scheduled jobs section if it is scheduled or deferred job. All currently active and already completed jobs are shown in the Antivirus Jobs section: Filter is available to display jobs: Unified Management and Security Platform for the Microsoft Cloud 45

47 To view log of the particular antivirus job, select it and click the View Log button: Quarantine All quarantine events are displayed in the Antivirus Quarantine section of the portal: Unified Management and Security Platform for the Microsoft Cloud 46

48 Filter is available to select quarantine entries: You can control the threats that are moved to the quarantine folder. You can take the following actions: - Cancel Quarantine/Restore for pending events or already moved to quarantine accordingly. - Remove File/Remove from Quarantine to permanently remove suspicious file from the system. Unified Management and Security Platform for the Microsoft Cloud 47

49 IDS The Intrusion Detection System (IDS) is configured in the Intrusion Detection section of the portal. First tab Logs displays IDS logs in accordance with filter settings: Second tab Settings displays definitions, update frequency and proxy settings: Unified Management and Security Platform for the Microsoft Cloud 48

50 5nine Smart Firewall for Azure The 5nine Cloud Security Web Portal has menu option for the 5nine Smart Firewall for Azure solution. Customers that have purchased Smart Firewall for Azure will be able to use the web portal as the user interface to use the solution. Select the Smart Firewall for Azure menu option to launch it in a new browser tab. Login with your Live ID associated with your Azure subscription. Unified Management and Security Platform for the Microsoft Cloud 49

51 You can create firewall rules the same as the standard console. View logs Unified Management and Security Platform for the Microsoft Cloud 50

52 Azure Billing Please refer to the 5nine Smart Firewall getting started guide for more information. Uninstall To uninstall Web Portal from your server, use the same single setup launcher application as when installing the product: Select CloudSecurity Web, click Uninstall and confirm the operation. Unified Management and Security Platform for the Microsoft Cloud 51

5nine Cloud Security for Hyper-V. Version 6.0

5nine Cloud Security for Hyper-V. Version 6.0 5nine Cloud Security for Hyper-V Version 6.0 July 2015 2015 5nine Software All rights reserved. All trademarks are the property of their respective owners. No part of this publication may be reproduced,

More information

Mission Control for the Microsoft Cloud. 5nine Cloud Security. Version 11

Mission Control for the Microsoft Cloud. 5nine Cloud Security. Version 11 Mission Control for the Microsoft Cloud 5nine Cloud Security Version 11 Getting Started Guide November 2017 2017 5nine Software Inc. All rights reserved. All trademarks are the property of their respective

More information

All rights reserved. All trademarks are the property of their respective owners.

All rights reserved. All trademarks are the property of their respective owners. 2017 5nine Software Inc. All rights reserved. All trademarks are the property of their respective owners. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval

More information

All rights reserved. All trademarks are the property of their respective owners.

All rights reserved. All trademarks are the property of their respective owners. 2017 5nine Software Inc. All rights reserved. All trademarks are the property of their respective owners. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval

More information

Integrate Microsoft Antimalware. EventTracker v8.x and above

Integrate Microsoft Antimalware. EventTracker v8.x and above Integrate Microsoft Antimalware EventTracker v8.x and above Publication Date: September 6, 2017 Abstract This guide provides instructions to configure Microsoft Antimalware to send logs to EventTracker

More information

Integrate Bluecoat Content Analysis. EventTracker v9.x and above

Integrate Bluecoat Content Analysis. EventTracker v9.x and above EventTracker v9.x and above Publication Date: June 8, 2018 Abstract This guide provides instructions to configure a Bluecoat Content Analysis to send its syslog to EventTracker Enterprise. Scope The configurations

More information

Integrate Sophos Enterprise Console. EventTracker v8.x and above

Integrate Sophos Enterprise Console. EventTracker v8.x and above Integrate Sophos Enterprise Console EventTracker v8.x and above Publication Date: September 22, 2017 Abstract This guide provides instructions to configure Sophos Enterprise Console to send the events

More information

Sophos Anti-Virus standalone startup guide. For Windows and Mac OS X

Sophos Anti-Virus standalone startup guide. For Windows and Mac OS X Sophos Anti-Virus standalone startup guide For Windows and Mac OS X Document date: June 2007 Contents 1 What you need for installation...4 2 Installing Sophos Anti-Virus for Windows...5 3 Installing Sophos

More information

PHD Virtual Backup Exporter. version 6.5 Users Guide. Document Release Date: August 26,

PHD Virtual Backup Exporter. version 6.5 Users Guide. Document Release Date: August 26, PHD Virtual Backup Exporter version 6.5 Users Guide Document Release Date: August 26, 2013 www.phdvirtual.com i PHD Virtual Backup Exporter - Users Guide Legal Notices PHD Virtual Backup Exporter Users

More information

Integrate Barracuda Spam Firewall

Integrate Barracuda Spam Firewall Integrate Barracuda Spam Firewall Publication Date: November 10, 2015 Abstract This guide provides instructions to configure Barracuda Spam Firewall to send the events to EventTracker. Scope The configurations

More information

Veeam Universal Application Item Recovery

Veeam Universal Application Item Recovery Veeam Universal Application Item Recovery Version 9.5 User Guide November, 2016 2016 Veeam Software. All rights reserved. All trademarks are the property of their respective owners. No part of this publication

More information

Integrate Microsoft Office 365. EventTracker v8.x and above

Integrate Microsoft Office 365. EventTracker v8.x and above EventTracker v8.x and above Publication Date: March 5, 2017 Abstract This guide provides instructions to configure Office 365 to generate logs for critical events. Once EventTracker is configured to collect

More information

Installation Guide Worksoft Analyze

Installation Guide Worksoft Analyze Installation Guide Worksoft Analyze Worksoft, Inc. 15851 Dallas Parkway, Suite 855 Addison, TX 75001 www.worksoft.com 866-836-1773 Worksoft Analyze Installation Guide Version 1.0.0 Copyright 2018 by Worksoft,

More information

TA Instruments TA Update. Getting Started Guide

TA Instruments TA Update. Getting Started Guide TA Instruments TA Update Getting Started Guide Revision A Issued April 2005 2005 by TA Instruments 109 Lukens Drive New Castle, DE 19720 Notice The material contained in this manual, and in the online

More information

Integrate Fortinet Firewall. EventTracker v8.x and above

Integrate Fortinet Firewall. EventTracker v8.x and above EventTracker v8.x and above Publication Date: October 31, 2017 Abstract This guide provides instructions to configure Fortinet Firewall to send crucial events to EventTracker Enterprise by means of syslog.

More information

Antivirus Solution Guide for Clustered Data ONTAP: Sophos

Antivirus Solution Guide for Clustered Data ONTAP: Sophos Technical Report Antivirus Solution Guide for Clustered Data ONTAP: Sophos Saurabh Singh and Brahmanna Chowdary Kodavali, NetApp July 2016 TR-4309 Abstract An antivirus solution is key for enterprises

More information

Getting Started with Tally.Developer 9 Alpha

Getting Started with Tally.Developer 9 Alpha Getting Started with Tally.Developer 9 Alpha The information contained in this document is current as of the date of publication and subject to change. Because Tally must respond to changing market conditions,

More information

NTP Software File Auditor for Windows Edition

NTP Software File Auditor for Windows Edition NTP Software File Auditor for Windows Edition An NTP Software Installation Guide Abstract This guide provides a short introduction to installation and initial configuration of NTP Software File Auditor

More information

Integrate Akamai Web Application Firewall EventTracker v8.x and above

Integrate Akamai Web Application Firewall EventTracker v8.x and above Integrate Akamai Web Application Firewall EventTracker v8.x and above Publication Date: May 29, 2017 Abstract This guide helps you in configuring Akamai WAF and EventTracker to receive events. In this

More information

Integrate Palo Alto Traps. EventTracker v8.x and above

Integrate Palo Alto Traps. EventTracker v8.x and above EventTracker v8.x and above Publication Date: August 16, 2018 Abstract This guide provides instructions to configure Palo Alto Traps to send its syslog to EventTracker Enterprise. Scope The configurations

More information

Sophos Endpoint Security and Control standalone startup guide

Sophos Endpoint Security and Control standalone startup guide Sophos Endpoint Security and Control standalone startup guide Sophos Endpoint Security and Control, version 9.5 Sophos Anti-Virus for Mac OS X, version 7 Document date: June 2010 Contents 1 Before you

More information

AvePoint Online Services for Partners 2

AvePoint Online Services for Partners 2 AvePoint Online Services for Partners 2 User Guide Service Pack 1 Issued June 2017 Table of Contents What s New in this Guide...4 About...5 Submitting Documentation Feedback to AvePoint...6 Browser Support

More information

Installation Guide. EventTracker Enterprise. Install Guide Centre Park Drive Publication Date: Aug 03, U.S. Toll Free:

Installation Guide. EventTracker Enterprise. Install Guide Centre Park Drive Publication Date: Aug 03, U.S. Toll Free: EventTracker Enterprise Install Guide 8815 Centre Park Drive Publication Date: Aug 03, 2010 Columbia MD 21045 U.S. Toll Free: 877.333.1433 Abstract The purpose of this document is to help users install

More information

Protegent Total Security Solution USER GUIDE Unistal Systems Pvt. Ltd. All rights Reserved Page 1

Protegent Total Security Solution USER GUIDE Unistal Systems Pvt. Ltd. All rights Reserved Page 1 Protegent Total Security Solution USER GUIDE 2007-2017 Unistal Systems Pvt. Ltd. All rights Reserved Page 1 Table of Contents PROTEGENT TOTAL SECURITY...3 INSTALLATION...4 REGISTERING PROTEGENT TOTAL SECURITY...

More information

Implementing and Supporting Windows Intune

Implementing and Supporting Windows Intune Implementing and Supporting Windows Intune Lab 4: Managing System Services Lab Manual Information in this document, including URL and other Internet Web site references, is subject to change without notice.

More information

Integrate Cisco IronPort Security Appliance (ESA)

Integrate Cisco IronPort  Security Appliance (ESA) Integrate Cisco IronPort Email Security Appliance (ESA) Publication Date: January 4, 2017 Abstract This guide provides instructions to configure Cisco IronPort Email Security Appliance (ESA) to send the

More information

Sophos Endpoint Security and Control standalone startup guide

Sophos Endpoint Security and Control standalone startup guide Sophos Endpoint Security and Control standalone startup guide Sophos Endpoint Security and Control for Windows, version 10.0 Sophos Anti-Virus for Mac OS X, version 7 Document date: December 2011 Contents

More information

Installation Guide. McAfee Web Gateway. for Riverbed Services Platform

Installation Guide. McAfee Web Gateway. for Riverbed Services Platform Installation Guide McAfee Web Gateway for Riverbed Services Platform COPYRIGHT Copyright 2010 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed,

More information

Integrating Cyberoam UTM

Integrating Cyberoam UTM Integrating Cyberoam UTM EventTracker Enterprise Publication Date: Jan 6, 2016 EventTracker 8815 Centre Park Drive Columbia MD 21045 www.eventtracker.com Abstract This guide helps you in configuring Cyberoam

More information

CloudHealth. AWS and Azure On-Boarding

CloudHealth. AWS and Azure On-Boarding CloudHealth AWS and Azure On-Boarding Contents 1. Enabling AWS Accounts... 3 1.1 Setup Usage & Billing Reports... 3 1.2 Setting Up a Read-Only IAM Role... 3 1.3 CloudTrail Setup... 5 1.4 Cost and Usage

More information

AvePoint Permissions Manager

AvePoint Permissions Manager User Guide Issued July 2017 1 Table of Contents What s New in this Guide...4 About...5 Supported Browsers...7 Submit Documentation Feedback to AvePoint...8 Integrate with AvePoint Online Services...9 AvePoint

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the product described herein without notice. Before installing and using the product, review the readme files, release

More information

Sophos Anti-Virus for NetApp Storage Systems

Sophos Anti-Virus for NetApp Storage Systems Sophos Anti-Virus for NetApp Storage Systems user guide Product Version: 3.0 Contents About this guide... 1 About Sophos Anti-Virus for NetApp Storage Systems...2 System requirements... 4 Before you install

More information

x10data Application Platform v7.1 Installation Guide

x10data Application Platform v7.1 Installation Guide Copyright Copyright 2010 Automated Data Capture (ADC) Technologies, Incorporated. All rights reserved. Complying with all applicable copyright laws is the responsibility of the user. Without limiting the

More information

McAfee Cloud Workload Security Suite Amazon Machine Image Installation Guide

McAfee Cloud Workload Security Suite Amazon Machine Image Installation Guide McAfee Cloud Workload Security Suite Amazon Machine Image Installation Guide COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator,

More information

Integrating Microsoft Forefront Threat Management Gateway (TMG)

Integrating Microsoft Forefront Threat Management Gateway (TMG) Integrating Microsoft Forefront Threat Management Gateway (TMG) EventTracker v7.x Publication Date: Sep 16, 2014 EventTracker 8815 Centre Park Drive Columbia MD 21045 www.eventtracker.com Abstract This

More information

Integrate Microsoft ATP. EventTracker v8.x and above

Integrate Microsoft ATP. EventTracker v8.x and above EventTracker v8.x and above Publication Date: August 20, 2018 Abstract This guide provides instructions to configure a Microsoft ATP to send its syslog to EventTracker Enterprise. Scope The configurations

More information

Integrate TippingPoint EventTracker Enterprise

Integrate TippingPoint EventTracker Enterprise Integrate TippingPoint EventTracker Enterprise Publication Date: Nov. 7, 2016 EventTracker 8815 Centre Park Drive Columbia MD 21045 www.eventtracker.com Abstract This guide provides instructions to configure

More information

One Identity Active Roles 7.2. Azure AD and Office 365 Management Administrator Guide

One Identity Active Roles 7.2. Azure AD and Office 365 Management Administrator Guide One Identity Active Roles 7.2 Azure AD and Office 365 Management Administrator Copyright 2017 One Identity LLC. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright.

More information

Integrate Viper business antivirus EventTracker Enterprise

Integrate Viper business antivirus EventTracker Enterprise Integrate Viper business antivirus EventTracker Enterprise Publication Date: June 2, 2016 EventTracker 8815 Centre Park Drive Columbia MD 21045 www.eventtracker.com Abstract This guide provides instructions

More information

Notices. Third Party Project Usage. Sample Code in Documentation

Notices. Third Party Project Usage. Sample Code in Documentation Malwarebytes for Mac User Guide Version 3.3.0 2 May 2018 Notices Malwarebytes products and related documentation are provided under a license agreement containing restrictions on use and disclosure and

More information

Virtual Appliance User s Guide

Virtual Appliance User s Guide Cast Iron Integration Appliance Virtual Appliance User s Guide Version 4.5 July 2009 Cast Iron Virtual Appliance User s Guide Version 4.5 July 2009 Copyright 2009 Cast Iron Systems. All rights reserved.

More information

Scribe Insight Installation Guide. Version August 10, 2011

Scribe Insight Installation Guide. Version August 10, 2011 Scribe Insight Installation Guide Version 7.0.2 August 10, 2011 www.scribesoft.com Important Notice No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form

More information

One Identity Starling Identity Analytics & Risk Intelligence. User Guide

One Identity Starling Identity Analytics & Risk Intelligence. User Guide One Identity Starling Identity Analytics & Risk Intelligence User Guide Copyright 2019 One Identity LLC. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software

More information

October J. Polycom Cloud Services Portal

October J. Polycom Cloud Services Portal October 2018 3725-42461-001J Polycom Cloud Services Portal Copyright 2018, Polycom, Inc. All rights reserved. No part of this document may be reproduced, translated into another language or format, or

More information

Installation Guide Worksoft Certify Execution Suite

Installation Guide Worksoft Certify Execution Suite Installation Guide Worksoft Certify Execution Suite Worksoft, Inc. 15851 Dallas Parkway, Suite 855 Addison, TX 75001 www.worksoft.com 866-836-1773 Worksoft Certify Execution Suite Installation Guide Version

More information

AppSpace Installation Guide. Release 4.1.1

AppSpace Installation Guide. Release 4.1.1 AppSpace Installation Guide Release 4.1.1 Disclaimer Information in this document is subject to change without notice. Copyright 2012 Nexus On-Demand All rights reserved. No part of this publication may

More information

Integrate Symantec Messaging Gateway. EventTracker v9.x and above

Integrate Symantec Messaging Gateway. EventTracker v9.x and above Integrate Symantec Messaging Gateway EventTracker v9.x and above Publication Date: May 9, 2018 Abstract This guide provides instructions to configure a Symantec Messaging Gateway to send its syslog to

More information

5nine V2V Easy Converter Version 8

5nine V2V Easy Converter Version 8 Mission Control for the Microsoft Cloud 5nine V2V Easy Converter Version 8 GETTING STARTED GUIDE March 2017 2017 5nine Software Inc. All rights reserved. All trademarks are the property of their respective

More information

MOVE AntiVirus page-level reference

MOVE AntiVirus page-level reference McAfee MOVE AntiVirus 4.7.0 Interface Reference Guide (McAfee epolicy Orchestrator) MOVE AntiVirus page-level reference General page (Configuration tab) Allows you to configure your McAfee epo details,

More information

Inventorying Microsoft Azure. Inventorying Microsoft Azure Information with Docusnap X

Inventorying Microsoft Azure. Inventorying Microsoft Azure Information with Docusnap X Inventorying Microsoft Azure Inventorying Microsoft Azure Information with Docusnap X TITLE Inventorying Microsoft Azure AUTHOR Docusnap Consulting DATE 2/7/2018 VERSION 1.0 valid from January 25, 2018

More information

Metalogix Essentials for Office Creating a Backup

Metalogix Essentials for Office Creating a Backup Metalogix Essentials for Office 365 2.1 2018 Quest Software Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished

More information

SMB Live. Modernize with Hybrid Cloud. Lab 1: Exploring Windows Server 2012 R2 & Hyper-V

SMB Live. Modernize with Hybrid Cloud. Lab 1: Exploring Windows Server 2012 R2 & Hyper-V SMB Live Modernize with Hybrid Cloud Lab 1: Exploring Windows Server 2012 R2 & Hyper-V Terms of Use 2013 Microsoft Corporation. All rights reserved. Information in this document, including URL and other

More information

Notices. Third Party Project Usage. Sample Code in Documentation

Notices. Third Party Project Usage. Sample Code in Documentation Malwarebytes for Mac User Guide Version 3.4.0 7 August 2018 Notices Malwarebytes products and related documentation are provided under a license agreement containing restrictions on use and disclosure

More information

Quest VROOM Quick Setup Guide for Quest Rapid Recovery and Foglight Windows Installers

Quest VROOM Quick Setup Guide for Quest Rapid Recovery and Foglight Windows Installers Quest VROOM Quick Setup Guide for Quest Rapid Recovery and Foglight Windows Installers INTRODUCTION Setup of Quest VROOM requires installation of Rapid Recovery and Foglight for Virtualization on two separate

More information

Yubico with Centrify for Mac - Deployment Guide

Yubico with Centrify for Mac - Deployment Guide CENTRIFY DEPLOYMENT GUIDE Yubico with Centrify for Mac - Deployment Guide Abstract Centrify provides mobile device management and single sign-on services that you can trust and count on as a critical component

More information

Veeam ONE. Version 8.0. User Guide for VMware vsphere Environments

Veeam ONE. Version 8.0. User Guide for VMware vsphere Environments Veeam ONE Version 8.0 User Guide for VMware vsphere Environments July, 2015 2015 Veeam Software. All rights reserved. All trademarks are the property of their respective owners. No part of this publication

More information

ForeScout Extended Module for Palo Alto Networks Next Generation Firewall

ForeScout Extended Module for Palo Alto Networks Next Generation Firewall ForeScout Extended Module for Palo Alto Networks Next Generation Firewall Version 1.2 Table of Contents About the Palo Alto Networks Next-Generation Firewall Integration... 4 Use Cases... 4 Roll-out Dynamic

More information

INSTALLATION AND SETUP VMware Workspace ONE

INSTALLATION AND SETUP VMware Workspace ONE GUIDE NOVEMBER 2018 PRINTED 9 JANUARY 2019 VMware Workspace ONE Table of Contents Installation and Setup Introduction Prerequisites Signing Up for a Free Trial Launching the Workspace ONE UEM Console Navigating

More information

A Quick start Guide. Version General Information: Online Support:

A Quick start Guide. Version General Information: Online Support: A Quick start Guide Version 3.0.0.4 General Information: info@cionsystems.com Online Support: support@cionsystems.com Copyright 2017 CionSystems Inc., All Rights Reserved Page 1 2017 CionSystems Inc. ALL

More information

December P Xerox FreeFlow Core Installation Guide

December P Xerox FreeFlow Core Installation Guide 5.1.0.0 December 2017 702P06246 2017 Xerox Corporation. All rights reserved. Xerox, Xerox and Design, and FreeFlow are trademarks of Xerox Corporation in the United States and/or other countries. This

More information

Issued March FLY for Dropbox Installation and Configuration Guide

Issued March FLY for Dropbox Installation and Configuration Guide FLY for Dropbox Installation and Configuration Guide Issued March 2018 FLY for Dropbox Installation and Configuration Guide 1 Table of Contents About This Guide... 3 Uninstalling FLY for Dropbox... 4 Installing

More information

Integrate Malwarebytes EventTracker Enterprise

Integrate Malwarebytes EventTracker Enterprise Integrate Malwarebytes EventTracker Enterprise Publication Date: Aug. 12, 2016 EventTracker 8815 Centre Park Drive Columbia MD 21045 www.eventtracker.com Abstract This guide provides instructions to configure

More information

Quest VROOM Quick Setup Guide for Quest Rapid Recovery and Foglight Windows Installers

Quest VROOM Quick Setup Guide for Quest Rapid Recovery and Foglight Windows Installers Quest VROOM Quick Setup Guide for Quest Rapid Recovery and Foglight Windows Installers INTRODUCTION Setup of Quest VROOM requires installation of Rapid Recovery and Foglight for Virtualization on two separate

More information

Notices. Third Party Project Usage. Sample Code in Documentation

Notices. Third Party Project Usage. Sample Code in Documentation Malwarebytes for Mac User Guide Version 3.7 28 February 2019 Notices Malwarebytes products and related documentation are provided under a license agreement containing restrictions on use and disclosure

More information

Dynamic Work Order System (DWOS) Installation Guide

Dynamic Work Order System (DWOS) Installation Guide Dynamic Work Order System (DWOS) Installation Guide The Future of Job Shop Software 4506 Hwy. 20 Suite 200 Niceville, FL 32578 Phone (800) 725-7304 Support@ds2corp.com www.getdwos.com Copyright Notice

More information

Notices. Third Party Project Usage. Sample Code in Documentation

Notices. Third Party Project Usage. Sample Code in Documentation Malwarebytes for Mac User Guide Version 3.1.1 2 November 2017 Notices Malwarebytes products and related documentation are provided under a license agreement containing restrictions on use and disclosure

More information

Patch Manager INSTALLATION GUIDE. Version Last Updated: September 25, 2017

Patch Manager INSTALLATION GUIDE. Version Last Updated: September 25, 2017 INSTALLATION GUIDE Patch Manager Version 2.1.5 Last Updated: September 25, 2017 Retrieve the latest version from: https://support.solarwinds.com/success_center/patch_manager/patch_manager_documentation

More information

5nine Manager with Bitdefender Antivirus. Version 9.1

5nine Manager with Bitdefender Antivirus. Version 9.1 5nine Manager with Bitdefender Antivirus Version 9.1 September 2016 11 Table of Contents Summary... 7 System requirements... 9 Installation... 11 5nine Manager with Antivirus Management Service installation...

More information

Installation Guide Worksoft Certify Execution Suite

Installation Guide Worksoft Certify Execution Suite Installation Guide Worksoft Certify Execution Suite Worksoft, Inc. 15851 Dallas Parkway, Suite 855 Addison, TX 75001 www.worksoft.com 866-836-1773 Worksoft Certify Execution Suite Installation Guide Version

More information

Veeam Backup & Replication

Veeam Backup & Replication Veeam Backup & Replication Version 9.5 Veeam Agent Management Guide December, 2017 2017 Veeam Software. All rights reserved. All trademarks are the property of their respective owners. No part of this

More information

WatchGuard XTMv Setup Guide Fireware XTM v11.8

WatchGuard XTMv Setup Guide Fireware XTM v11.8 WatchGuard XTMv Setup Guide Fireware XTM v11.8 All XTMv Editions Copyright and Patent Information Copyright 1998 2013 WatchGuard Technologies, Inc. All rights reserved. WatchGuard, the WatchGuard logo,

More information

Sabre Customer Virtual Private Network Launcher (SCVPNLauncher)

Sabre Customer Virtual Private Network Launcher (SCVPNLauncher) Sabre Customer Virtual Private Network Launcher (SCVPNLauncher) User s Guide Sabre Travel Network This document provides detailed information for the install/uninstall, operation, configuration and troubleshooting

More information

Integrate Cb Defense. EventTracker v8.x and above

Integrate Cb Defense. EventTracker v8.x and above EventTracker v8.x and above Publication Date: June 18, 2018 Abstract This guide helps you in configuring Cb Defense with EventTracker to receive Cb Defense events. In this guide, you will find the detailed

More information

Locate your Advanced Tools and Applications

Locate your Advanced Tools and Applications WordPress is an easy-to-use weblog system, providing numerous features like categories, ratings, as well as plugins installation. This installer application will easily install the WordPress tool to a

More information

5nine Manager Datacenter. Version 2.1

5nine Manager Datacenter. Version 2.1 5nine Manager Datacenter Version 2.1 Getting Started Guide January 2018 Contents Introduction... 2 Summary... 2 System Architecture... 2 Plugins... 3 Deployment and Configuration... 4 System requirements...

More information

Veeam Cloud Connect. Version 8.0. Administrator Guide

Veeam Cloud Connect. Version 8.0. Administrator Guide Veeam Cloud Connect Version 8.0 Administrator Guide June, 2015 2015 Veeam Software. All rights reserved. All trademarks are the property of their respective owners. No part of this publication may be reproduced,

More information

Total Protection Service

Total Protection Service User Guide McAfee Total Protection Service for Microsoft Windows Home Server COPYRIGHT Copyright 2008 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed,

More information

Integrate Sophos Appliance. EventTracker v8.x and above

Integrate Sophos  Appliance. EventTracker v8.x and above EventTracker v8.x and above Publication Date: December 26, 2017 Abstract This guide provides instructions to configure a Sophos Email Appliance to send its syslog to EventTracker Enterprise Scope The configurations

More information

NTP Software File Auditor for Hitachi

NTP Software File Auditor for Hitachi NTP Software File Auditor for Hitachi Installation Guide Version 3.3 This guide details the method for the installation and initial configuration of NTP Software File Auditor for NAS, Hitachi Edition,

More information

Installation Guide Worksoft Certify

Installation Guide Worksoft Certify Installation Guide Worksoft Certify Worksoft, Inc. 15851 Dallas Parkway, Suite 855 Addison, TX 75001 www.worksoft.com 866-836-1773 Worksoft Certify Installation Guide Version 9.0.3 Copyright 2017 by Worksoft,

More information

escan Quick Reference and Installation Guide This document provides information to install escan and serves as a quick reference to run key tasks.

escan Quick Reference and Installation Guide This document provides information to install escan and serves as a quick reference to run key tasks. This document provides information to install escan and serves as a quick reference to run key tasks. escan Quick Reference and Installation Guide escan Quick Reference Guide 1 escan User Guide The software

More information

Dell Migration Solutions for SharePoint 4.8. User Guide

Dell Migration Solutions for SharePoint 4.8. User Guide Dell Migration Solutions for SharePoint 4.8 2015 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under

More information

Scan to Digitech v1.0

Scan to Digitech v1.0 Scan to Digitech v1.0 Administrator's Guide June 2009 www.lexmark.com Lexmark and Lexmark with diamond design are trademarks of Lexmark International, Inc., registered in the United States and/or other

More information

HPE Security Fortify WebInspect Enterprise Software Version: Windows operating systems. Installation and Implementation Guide

HPE Security Fortify WebInspect Enterprise Software Version: Windows operating systems. Installation and Implementation Guide HPE Security Fortify WebInspect Enterprise Software Version: 17.10 Windows operating systems Installation and Implementation Guide Document Release Date: May 2017 Software Release Date: April 2017 Legal

More information

Getting Started with. Management Portal. Version

Getting Started with. Management Portal. Version Getting Started with Management Portal Version 10.1.0.0 Copyright RES Software Development B.V. All rights reserved. Commercial Computer Software documentation/data Restricted Rights. RES and RES ONE are

More information

SecureAPlus User Guide. Version 3.4

SecureAPlus User Guide. Version 3.4 SecureAPlus User Guide Version 3.4 September 2015 Copyright Information Information in this document is subject to change without notice. Companies, names and data used in examples herein are fictitious

More information

Veeam Backup & Replication. Version 9.0

Veeam Backup & Replication. Version 9.0 Veeam Backup & Replication Version 9.0 May, 2016 2016 Veeam Software. All rights reserved. All trademarks are the property of their respective owners. No part of this publication may be reproduced, transmitted,

More information

Installation Manual. and User Guide

Installation Manual. and User Guide Installation Manual and User Guide ESET Mobile Antivirus For Windows Mobile Copyright 2009 by ESET, spol. s r. o. ESET Mobile Antivirus For Windows Mobile was developed by ESET, spol. s r.o. For more information

More information

Quest Recovery Manager for Active Directory 9.0. Quick Start Guide

Quest Recovery Manager for Active Directory 9.0. Quick Start Guide Quest Recovery Manager for Active Directory 9.0 Quick Start Guide Copyright 2017 Quest Software Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software

More information

One Identity Starling Two-Factor AD FS Adapter 6.0. Administrator Guide

One Identity Starling Two-Factor AD FS Adapter 6.0. Administrator Guide One Identity Adapter 6.0 Administrator Guide Copyright 2017 Quest Software Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide

More information

Integrate Check Point Firewall. EventTracker v8.x and above

Integrate Check Point Firewall. EventTracker v8.x and above EventTracker v8.x and above Publication Date: March 23, 2017 Abstract This guide helps you in configuring Check Point and EventTracker to receive Check Point events. You will find the detailed procedures

More information

Integrate Veeam Backup and Replication. EventTracker v9.x and above

Integrate Veeam Backup and Replication. EventTracker v9.x and above Integrate Veeam Backup and Replication EventTracker v9.x and above Publication Date: September 27, 2018 Abstract This guide provides instructions to configure VEEAM to send the event logs to EventTracker

More information

Assessment - OMS Gateway and Data Collection Machine Setup. Prerequisites

Assessment - OMS Gateway and Data Collection Machine Setup. Prerequisites Assessment - OMS Gateway and Data Collection Machine Setup Prerequisites Ensure that you have reviewed the information in the assessment s prerequisites and configuration document before continuing the

More information

Veeam Backup & Replication

Veeam Backup & Replication Veeam Backup & Replication Version 9.x Application Events February, 2017 1 Veeam Backup & Replication Application Events REV 1 2017 Veeam Software. All rights reserved. All trademarks are the property

More information

Enterprise Vault.cloud CloudLink Google Account Synchronization Guide. CloudLink to 4.0.3

Enterprise Vault.cloud CloudLink Google Account Synchronization Guide. CloudLink to 4.0.3 Enterprise Vault.cloud CloudLink Google Account Synchronization Guide CloudLink 4.0.1 to 4.0.3 Enterprise Vault.cloud: CloudLink Google Account Synchronization Guide Last updated: 2018-06-08. Legal Notice

More information

Log & Event Manager UPGRADE GUIDE. Version Last Updated: Thursday, May 25, 2017

Log & Event Manager UPGRADE GUIDE. Version Last Updated: Thursday, May 25, 2017 UPGRADE GUIDE Log & Event Manager Version 6.3.1 Last Updated: Thursday, May 25, 2017 Retrieve the latest version from: https://support.solarwinds.com/success_center/log_event_manager_(lem)/lem_documentation

More information

271 Waverley Oaks Rd. Telephone: Suite 206 Waltham, MA USA

271 Waverley Oaks Rd. Telephone: Suite 206 Waltham, MA USA Contacting Leostream Leostream Corporation http://www.leostream.com 271 Waverley Oaks Rd. Telephone: +1 781 890 2019 Suite 206 Waltham, MA 02452 USA To submit an enhancement request, email features@leostream.com.

More information

Privileged Identity App Launcher and Session Recording

Privileged Identity App Launcher and Session Recording Privileged Identity App Launcher and Session Recording 2018 Bomgar Corporation. All rights reserved worldwide. BOMGAR and the BOMGAR logo are trademarks of Bomgar Corporation; other trademarks shown are

More information

Avira Free Mac Security Version HowTo

Avira Free Mac Security Version HowTo Avira Free Mac Security Version 2.0.4 HowTo Table of contents 1. Introduction... 3 1.1 Features... 3 1.2 System Requirements...4 2. Installation...4 2.1 Installation with the install wizard...4 2.2 Installation

More information