Mission Control for the Microsoft Cloud. 5nine Cloud Security. Web Portal Version 12.o. Getting Started Guide
|
|
- Richard Harvey
- 5 years ago
- Views:
Transcription
1 Mission Control for the Microsoft Cloud 5nine Cloud Security Web Portal Version 12.o Getting Started Guide
2 2018 5nine Software Inc. All rights reserved. All trademarks are the property of their respective owners. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system, or translated into any language in any form by any means, without written permission from 5nine Software Inc. (5nine). The information contained in this document represents the current view of 5nine on the issue discussed as of the date of publication and is subject to change without notice. 5nine shall not be liable for technical or editorial errors or omissions contained herein. 5nine makes no warranties, expressed or implied, in this document. 5nine may have patents, patent applications, trademark, copyright or other intellectual property rights covering the subject matter of this document. All other trademarks mentioned herein are the property of their respective owners. Except as expressly provided in any written license agreement from 5nine, the furnishing of this document does not give you any license to these patents, trademarks, copyrights or other intellectual property. Important! Please read the Software License Agreement before using the accompanying software program(s). Using any part of the software indicates that you accept the terms of the Software License Agreement. Unified Management and Security Platform for the Microsoft Cloud 1
3 Table of Contents Summary... 3 System Requirements... 4 Installation nine Cloud Security Web Portal Operations... 8 Log in... 8 Log out... 9 Hosts management... 9 Security tenants and users Virtual machines management Notifications Virtual Firewall Firewall dashboard Configuring Virtual Firewall Rules Security Groups Rules Templates Virtual Firewall Logs Antivirus Antivirus dashboard Antivirus Settings Creating Antivirus Jobs Quarantine IDS nine Smart Firewall for Azure Uninstall Unified Management and Security Platform for the Microsoft Cloud 2
4 Summary 5nine Cloud Security Web Portal presents a web user interface for 5nine Cloud Security for Hyper-V and 5nine Smart Firewall for Azure products. It contains all main features of Cloud Security: virtual firewall protection, antivirus, intrusion detection (IDS) and traffic anomalies detection. 5nine Cloud Security Web Portal also supports multi-tenancy. Additionally, the web portal includes the following VM management functions: start, shutdown, turn off, pause/resume, save and reset virtual machine. Unified Management and Security Platform for the Microsoft Cloud 3
5 System Requirements Supported Operating Systems: Microsoft Windows Server 2016 Microsoft Windows Server 2012 R2 Microsoft Windows Server 2012 Microsoft Windows Server 2008 R2 SP1 (with.net 4.5 additionally installed) Software Prerequisites: Enable the following roles and features on management server:.net Framework 4.5.NET Framework 3.5 ASP.NET 4.5. Web Server IIS. Web Server Security (required: all except Digest Authentication, IP and Domain Restrictions, URL Authorization). Web Server Application Development:.NET Extensibility 4.5. Web Server Application Development: ASP.NET 4.5. Web Server Application Development: ISAPI Extensions and ISAPI Filters. Web Server Management Tools: IIS Management Console. Web Server Management Tools: Management Service. Unified Management and Security Platform for the Microsoft Cloud 4
6 Installation Attention. Make sure all 5nine Cloud Security basic components are properly installed. In current release, Web Portal should be installed onto the same server with 5nine Cloud Security Management Service. To install 5nine Cloud Security Web Portal, first run the single setup launcher application: Unified Management and Security Platform for the Microsoft Cloud 5
7 Select CloudSecurity Web and click Install. The 5nine Cloud Security Web Portal Setup wizard will open: Click Next to start pre-configuration process. Read and accept the SLA (software license agreement). Click Next. Unified Management and Security Platform for the Microsoft Cloud 6
8 Click Install to start the 5nine Cloud Security Web Portal installation process. Wait until the following screen appears and then click Finish to complete the 5nine Cloud Security Web Portal installation process. Unified Management and Security Platform for the Microsoft Cloud 7
9 Upon installation, the 5nine-CloudSecurity-Web site will appear in IIS Manager on your server. There is no need to additionally configure it, unless you need to change the default port, which is set to If you change it, make sure the port is not being used by any other application. 5nine Cloud Security Web Portal Operations Open your browser and type the following URL: Change the port to your custom one if required. Log in The Welcome dialog will appear. Login is required to start working with the web portal: A custom user Global Admin is required to login to Web Portal. Create the one using 5nine Cloud Security management console, menu Settings User Management and Settings Permissions management; assign Security Administrator and Auditor roles as shown on the pictures below: Unified Management and Security Platform for the Microsoft Cloud 8
10 After the successful login, the portal will open: Features are listed in the menu on the left side and details of the selected feature on the right side. Log out To log out, click on the user s icon to the right from the welcome greeting, and then click Log Out: Hosts management If hosts are not added already, first thing to do is adding hosts to Cloud Security protection. This operation can be done using any other 5nine Cloud Security interface (e.g., standalone management console) and will apply across all of them as well as any other action. Unified Management and Security Platform for the Microsoft Cloud 9
11 To add host(s) for monitoring, select Infrastructure Hosts. Then click the Add Host button: Just like adding hosts using 5nine Cloud Security management console, there are the following options: - Adding host by name or IP. Just type the name or IP address into the Name/IP field on the Host Selection block. - Using Active Directory (AD) or IP range search to find hypervisors and then select the required ones from the list. Select the corresponding search option on the Host Unified Management and Security Platform for the Microsoft Cloud 10
12 Selection block: Active directory or IP range (for the last one specify the required range), then click the Find Hosts button to start the search: In the Found hosts field select hosts by checking the corresponding boxes against each one that you need to add (or check the one on the header line to select all found servers). - Set the host connection credentials on the Authentication block: Ø Use default credentials. This option will use the account under which you are currently working. Ø Active directory. This option will let you specify any account. Type domain\user and password. Contact your network administrator if required. - Click the Add Host button to add selected host(s). To change host connection credentials click the Credentials button: Unified Management and Security Platform for the Microsoft Cloud 11
13 Specify default or new custom credentials for host connection and click Save: Unified Management and Security Platform for the Microsoft Cloud 12
14 To add and join the host into a group, click the Add Host Group button. Type in the name of the group and select hosts to add them into the group. Then click ADD GROUP. The host list will update accordingly: To edit host group, click the Edit Host Group button. Actions are the same as when adding the host group. To remove the host group, select it and click the Remove Host Group button. Unified Management and Security Platform for the Microsoft Cloud 13
15 To remove the host from monitoring, select it and click the Remove Hosts button on the Infrastructure Hosts tab: Security tenants and users 5nine Cloud Security Web Portal has the following interface elements for operations with tenants and users: There are two tabs: Tenants and Users. Unified Management and Security Platform for the Microsoft Cloud 14
16 On the Tenants tab you can add, edit and remove tenants. Add tenant: - Click the Add Tenant button to open the Add Tenant wizard: - Type in the name and select VMs to assign to the tenant. Use filter to select VMs for convenience. Click Next. Unified Management and Security Platform for the Microsoft Cloud 15
17 - Set tenant permissions: you may use default or set individual permissions. Click Finish to complete the operation. Edit tenant. Click the Edit Tenant button. Edit tenant actions are the same as when creating a tenant. Unified Management and Security Platform for the Microsoft Cloud 16
18 Edit default permissions. Click the Edit default permissions button and set the defaults: Click Save when complete. To remove tenant, select it and click the Remove tenant button: On the Users tab you can add, edit and remove users: Note. Web portal allows working with custom users only. Domain users operations are not supported. Unified Management and Security Platform for the Microsoft Cloud 17
19 Add custom user. Click the Add User button and specify parameters for the new user: Select tenant to create the tenant user or Global Group to create the global user. Specify password and user permissions: - Security Administrator. This role grants the full permissions on the Hyper-V implementation for the user. The user assigned to this role will act as a global administrator or a tenant administrator, depending on which group it is assigned to. - Auditor. The user will be able to view the whole Hyper-V implementation or a tenant depending on which user is selected. In this role, the user can review virtual firewall and IDS logs but cannot apply any changes. Click OK to complete the operation. Unified Management and Security Platform for the Microsoft Cloud 18
20 Edit custom user. Click the Edit User button to edit the user. Only password can be changed with this operation: Specify and confirm the new password and click OK. Edit user roles. Click the Edit Roles button to edit the user roles: Check or clear roles as required and click SAVE. Unified Management and Security Platform for the Microsoft Cloud 19
21 To remove the user, select it and click the Remove User button: Virtual machines management The web interface provides all basic operations with virtual machines in the environment protected by 5nine Cloud Security: configuring and managing security features virtual firewall, IDS, traffic scanner, network anomalies detection and antivirus. Additionally, it also provides basic virtual machine management operations: start, shut down, turn off, save, pause/resume and reset. To manage virtual machines, select Infrastructure All Virtual Machines: There are checkboxes against each virtual machine on the left side, use them to apply actions to a virtual machine set security features states, review/edit VM settings and perform VM management operations. Security features state control and VM management operations are allowed in group actions select multiple VMs to perform group operations. To enable/disable a security feature, click the corresponding button on the control ribbon above VMs: You will easily see, which feature is enabled (green mark), and which is disabled (gray mark): Unified Management and Security Platform for the Microsoft Cloud 20
22 To perform VM management actions, use the corresponding VM Management drop-down menu commands for the one or more selected VMs: Unified Management and Security Platform for the Microsoft Cloud 21
23 Click the VM Settings button to review/edit VM settings (allowed for a single VM at a time): All settings are standard as they are represented in 5nine Cloud Security Management console. Unified Management and Security Platform for the Microsoft Cloud 22
24 Click on the VM name to get inside and review firewall rules (details are described below) and see various security features logs. Example, network anomalies detection log: Notifications In the right-upper corner there is an icon located to the left from the welcome greeting, which displays if there are new messages about last actions performed on the portal: Click on it to open system messages: Unified Management and Security Platform for the Microsoft Cloud 23
25 There is information for the latest actions, and list of them with visual status icons (green circle success, red circle failure). Failed actions has the! sign on the right hand. Click on it to see the details. Click green mark on the right of each message to dismiss it or the Dismiss Completed button on the header to dismiss all latest messages at once. Virtual Firewall 5nine Cloud Security web portal provides all basic operations with virtual firewall protection: configuring rules, managing VM protection status, reviewing filtering logs. Firewall dashboard Firewall dashboard contains consolidated graphical data for the protected environment: Dashboard has three blocks: VM Firewall Status, Top 5 VMs with highest traffic and Average Traffic Profile. The VM Firewall Status block displays intuitive graphical dispersion (with percentage and numbers) of VMs with enabled and disabled virtual firewall protection. Unified Management and Security Platform for the Microsoft Cloud 24
26 The Top 5 VMs with highest traffic block displays the list of VMs having the most traffic. A filter is configurable to display the desired data: The Average Traffic Profile block displays average total traffic for the configured period. The period is set using filter: Unified Management and Security Platform for the Microsoft Cloud 25
27 Data can be printed or exported into the one of available formats: Each block has the View details link, which leads you to the required section of the portal to get the detailed data on the corresponding subject. Configuring Virtual Firewall Rules 5nine Cloud Security Web portal provides managing all type of virtual firewall rules as it s represented in the standalone management console: global rules, user-defined security group rules and local rules. Global rules are configured in the Firewall Global Rules section: Unified Management and Security Platform for the Microsoft Cloud 26
28 There are checkboxes against each rule on the left side, use them to apply actions to a particular rule edit or remove. Removing rule is allowed in the group action select multiple rules to perform group removal. Local rules are configured in the Infrastructure All Virtual Machines section individually for each VM. Click on the required VM name to get inside and set ARP/L2 and IP rules for this VM: Security group rules are configured in the Infrastructure VM Groups section. Click on the required VM group name to get inside and set ARP/L2 and IP rules for this group: Note. VM Group(s) must be created before adding group rules. Refer to the Security Groups subsection below. Rules of all three types are configured in the same way as described below. Unified Management and Security Platform for the Microsoft Cloud 27
29 Click the Add ARP/L2 Rule button to add the new ARP/L2 rule: Unified Management and Security Platform for the Microsoft Cloud 28
30 Unified Management and Security Platform for the Microsoft Cloud 29
31 Click the Add IP Rule button to add the new IP rule: Unified Management and Security Platform for the Microsoft Cloud 30
32 Select the required rule and click the Edit Rule button. Edit rule process is the same as when adding a new rule. Select the required rule(s) and click the Remove Rule button to remove rule(s). Group action is allowed when removing rules. Security Groups Security VM groups are configured in the Infrastructure VM Groups section. To create a security group, click the Add VM Group button. Unified Management and Security Platform for the Microsoft Cloud 31
33 Configure the security group parameters, including VM group membership, and click the Add Group button in the below dialog window: To edit or remove a security group, select it by clicking a checkbox on the left side against the group and then click the Edit VM Group/Remove VM Groups buttons accordingly. Multiple group removal is allowed in the single action when more than one group is marked in the group list. Rules Templates Rules templates are configured in the Infrastructure Templates section. Unified Management and Security Platform for the Microsoft Cloud 32
34 To create a new template, click the Add Template button: Enter the name for the new template and click the Add Template button. To edit the rules template, select the template by checking the checkbox against the template and then click Edit Template button. To delete rules template, select the template by checking the checkbox against the template and then click Remove Templates button. Group removal action is allowed. To add rules into the template, select the template and click on its name to get inside: Adding, editing and removing rules in templates are done in the same way as it s done for security groups, global and local rules as described above. Rules in templates will be stored so they can be easily applied in the future to VM or security group. To apply template, select the corresponding object VM or a group, and then click the Use template button: Unified Management and Security Platform for the Microsoft Cloud 33
35 You can customize some parameters remote IPs and MACs before applying a template: Click OK to add rules from the template to the selected object. Virtual Firewall Logs Virtual firewall logs can be reviewed either in the Firewall Logs section of the portal or inside VM in the Infrastructure All Virtual Machines section. To view firewall log on global level, open the Firewall Logs section of the portal. You have to select the exact VM to see the filtering log before. The first VM as appears in the list is selected by default. Click the Search button to find and select the required VM: Unified Management and Security Platform for the Microsoft Cloud 34
36 Then find the required VM and click the Apply button in the Find VM dialog as shown below. Use the search filter for convenience. Unified Management and Security Platform for the Microsoft Cloud 35
37 The VM filtering log records will appear in the portal: Unified Management and Security Platform for the Microsoft Cloud 36
38 To view firewall log on VM level, open the Infrastructure All Virtual Machines section of the portal, find the required VM and click its name to get inside. Then select the Filtering Log tab: The resulting virtual firewall log entries can be filtered by using firewall log entry filter: Set the required filtering parameters and click the Apply filters button. Unified Management and Security Platform for the Microsoft Cloud 37
39 Antivirus 5nine Cloud Security web portal provides agentless anti-malware scans for virtual machines and Hyper-V hosts: immediate anti-malware scans, recurring anti-malware scans by user-defined schedules and delayed one-time anti-malware scans. Antivirus dashboard Antivirus dashboard contains consolidated graphical views of the environments anti-malware protection status. First two blocks Protected VMs and Infected VMs display graphical views (with percentage and numbers) of the VMs included/not included into AV scans and clean/infected VMs that have already been scanned: Unified Management and Security Platform for the Microsoft Cloud 38
40 Other blocks: Signature Updates, Top 5 Threats and Latest Quarantine Events display data for signature databases on protected Hyper-V hosts, top 5 viruses detected during scans and latest quarantine records: A filter is configurable for the top 5 threats: Unified Management and Security Platform for the Microsoft Cloud 39
41 Each block has the View details link, which leads you to the required section of the portal to get the detailed data on the corresponding subject. Antivirus Settings 5nine Cloud Security web portal provides general antivirus settings that are required for AV operation. They are configured in Antivirus Settings section of the portal. Action on virus, definitions update frequency and workload orchestration: Host definitions information, force update and proxy settings (if required): Unified Management and Security Platform for the Microsoft Cloud 40
42 Scan extensions, exclusions and always blocked lists: Creating Antivirus Jobs Antivirus job is created in the Antivirus Jobs or AV Scheduled Jobs sections of the portal. Each one of them has the Create VM Scan button to create scan for virtual machines, and the Create Host Scan button to create scan for Hyper-V host. Unified Management and Security Platform for the Microsoft Cloud 41
43 Click the required button to create either host(s) or VM(s) AV scan job. The Create VM (Host) scan wizard will open, similar to the one in standalone management console. Go through the wizard and set the required parameters for the job: Type the name and select objects: Unified Management and Security Platform for the Microsoft Cloud 42
44 Select extensions: Select exclusions and other scan parameters: Unified Management and Security Platform for the Microsoft Cloud 43
45 Set the always blocked locations and/or files if required: Set the schedule and click Finish to create the job: Unified Management and Security Platform for the Microsoft Cloud 44
46 The job will appear in the Antivirus Jobs section if the job runs immediately and in the Antivirus Scheduled jobs section if it is scheduled or deferred job. All currently active and already completed jobs are shown in the Antivirus Jobs section: Filter is available to display jobs: Unified Management and Security Platform for the Microsoft Cloud 45
47 To view log of the particular antivirus job, select it and click the View Log button: Quarantine All quarantine events are displayed in the Antivirus Quarantine section of the portal: Unified Management and Security Platform for the Microsoft Cloud 46
48 Filter is available to select quarantine entries: You can control the threats that are moved to the quarantine folder. You can take the following actions: - Cancel Quarantine/Restore for pending events or already moved to quarantine accordingly. - Remove File/Remove from Quarantine to permanently remove suspicious file from the system. Unified Management and Security Platform for the Microsoft Cloud 47
49 IDS The Intrusion Detection System (IDS) is configured in the Intrusion Detection section of the portal. First tab Logs displays IDS logs in accordance with filter settings: Second tab Settings displays definitions, update frequency and proxy settings: Unified Management and Security Platform for the Microsoft Cloud 48
50 5nine Smart Firewall for Azure The 5nine Cloud Security Web Portal has menu option for the 5nine Smart Firewall for Azure solution. Customers that have purchased Smart Firewall for Azure will be able to use the web portal as the user interface to use the solution. Select the Smart Firewall for Azure menu option to launch it in a new browser tab. Login with your Live ID associated with your Azure subscription. Unified Management and Security Platform for the Microsoft Cloud 49
51 You can create firewall rules the same as the standard console. View logs Unified Management and Security Platform for the Microsoft Cloud 50
52 Azure Billing Please refer to the 5nine Smart Firewall getting started guide for more information. Uninstall To uninstall Web Portal from your server, use the same single setup launcher application as when installing the product: Select CloudSecurity Web, click Uninstall and confirm the operation. Unified Management and Security Platform for the Microsoft Cloud 51
5nine Cloud Security for Hyper-V. Version 6.0
5nine Cloud Security for Hyper-V Version 6.0 July 2015 2015 5nine Software All rights reserved. All trademarks are the property of their respective owners. No part of this publication may be reproduced,
More informationMission Control for the Microsoft Cloud. 5nine Cloud Security. Version 11
Mission Control for the Microsoft Cloud 5nine Cloud Security Version 11 Getting Started Guide November 2017 2017 5nine Software Inc. All rights reserved. All trademarks are the property of their respective
More informationAll rights reserved. All trademarks are the property of their respective owners.
2017 5nine Software Inc. All rights reserved. All trademarks are the property of their respective owners. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval
More informationAll rights reserved. All trademarks are the property of their respective owners.
2017 5nine Software Inc. All rights reserved. All trademarks are the property of their respective owners. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval
More informationIntegrate Microsoft Antimalware. EventTracker v8.x and above
Integrate Microsoft Antimalware EventTracker v8.x and above Publication Date: September 6, 2017 Abstract This guide provides instructions to configure Microsoft Antimalware to send logs to EventTracker
More informationIntegrate Bluecoat Content Analysis. EventTracker v9.x and above
EventTracker v9.x and above Publication Date: June 8, 2018 Abstract This guide provides instructions to configure a Bluecoat Content Analysis to send its syslog to EventTracker Enterprise. Scope The configurations
More informationIntegrate Sophos Enterprise Console. EventTracker v8.x and above
Integrate Sophos Enterprise Console EventTracker v8.x and above Publication Date: September 22, 2017 Abstract This guide provides instructions to configure Sophos Enterprise Console to send the events
More informationSophos Anti-Virus standalone startup guide. For Windows and Mac OS X
Sophos Anti-Virus standalone startup guide For Windows and Mac OS X Document date: June 2007 Contents 1 What you need for installation...4 2 Installing Sophos Anti-Virus for Windows...5 3 Installing Sophos
More informationPHD Virtual Backup Exporter. version 6.5 Users Guide. Document Release Date: August 26,
PHD Virtual Backup Exporter version 6.5 Users Guide Document Release Date: August 26, 2013 www.phdvirtual.com i PHD Virtual Backup Exporter - Users Guide Legal Notices PHD Virtual Backup Exporter Users
More informationIntegrate Barracuda Spam Firewall
Integrate Barracuda Spam Firewall Publication Date: November 10, 2015 Abstract This guide provides instructions to configure Barracuda Spam Firewall to send the events to EventTracker. Scope The configurations
More informationVeeam Universal Application Item Recovery
Veeam Universal Application Item Recovery Version 9.5 User Guide November, 2016 2016 Veeam Software. All rights reserved. All trademarks are the property of their respective owners. No part of this publication
More informationIntegrate Microsoft Office 365. EventTracker v8.x and above
EventTracker v8.x and above Publication Date: March 5, 2017 Abstract This guide provides instructions to configure Office 365 to generate logs for critical events. Once EventTracker is configured to collect
More informationInstallation Guide Worksoft Analyze
Installation Guide Worksoft Analyze Worksoft, Inc. 15851 Dallas Parkway, Suite 855 Addison, TX 75001 www.worksoft.com 866-836-1773 Worksoft Analyze Installation Guide Version 1.0.0 Copyright 2018 by Worksoft,
More informationTA Instruments TA Update. Getting Started Guide
TA Instruments TA Update Getting Started Guide Revision A Issued April 2005 2005 by TA Instruments 109 Lukens Drive New Castle, DE 19720 Notice The material contained in this manual, and in the online
More informationIntegrate Fortinet Firewall. EventTracker v8.x and above
EventTracker v8.x and above Publication Date: October 31, 2017 Abstract This guide provides instructions to configure Fortinet Firewall to send crucial events to EventTracker Enterprise by means of syslog.
More informationAntivirus Solution Guide for Clustered Data ONTAP: Sophos
Technical Report Antivirus Solution Guide for Clustered Data ONTAP: Sophos Saurabh Singh and Brahmanna Chowdary Kodavali, NetApp July 2016 TR-4309 Abstract An antivirus solution is key for enterprises
More informationGetting Started with Tally.Developer 9 Alpha
Getting Started with Tally.Developer 9 Alpha The information contained in this document is current as of the date of publication and subject to change. Because Tally must respond to changing market conditions,
More informationNTP Software File Auditor for Windows Edition
NTP Software File Auditor for Windows Edition An NTP Software Installation Guide Abstract This guide provides a short introduction to installation and initial configuration of NTP Software File Auditor
More informationIntegrate Akamai Web Application Firewall EventTracker v8.x and above
Integrate Akamai Web Application Firewall EventTracker v8.x and above Publication Date: May 29, 2017 Abstract This guide helps you in configuring Akamai WAF and EventTracker to receive events. In this
More informationIntegrate Palo Alto Traps. EventTracker v8.x and above
EventTracker v8.x and above Publication Date: August 16, 2018 Abstract This guide provides instructions to configure Palo Alto Traps to send its syslog to EventTracker Enterprise. Scope The configurations
More informationSophos Endpoint Security and Control standalone startup guide
Sophos Endpoint Security and Control standalone startup guide Sophos Endpoint Security and Control, version 9.5 Sophos Anti-Virus for Mac OS X, version 7 Document date: June 2010 Contents 1 Before you
More informationAvePoint Online Services for Partners 2
AvePoint Online Services for Partners 2 User Guide Service Pack 1 Issued June 2017 Table of Contents What s New in this Guide...4 About...5 Submitting Documentation Feedback to AvePoint...6 Browser Support
More informationInstallation Guide. EventTracker Enterprise. Install Guide Centre Park Drive Publication Date: Aug 03, U.S. Toll Free:
EventTracker Enterprise Install Guide 8815 Centre Park Drive Publication Date: Aug 03, 2010 Columbia MD 21045 U.S. Toll Free: 877.333.1433 Abstract The purpose of this document is to help users install
More informationProtegent Total Security Solution USER GUIDE Unistal Systems Pvt. Ltd. All rights Reserved Page 1
Protegent Total Security Solution USER GUIDE 2007-2017 Unistal Systems Pvt. Ltd. All rights Reserved Page 1 Table of Contents PROTEGENT TOTAL SECURITY...3 INSTALLATION...4 REGISTERING PROTEGENT TOTAL SECURITY...
More informationImplementing and Supporting Windows Intune
Implementing and Supporting Windows Intune Lab 4: Managing System Services Lab Manual Information in this document, including URL and other Internet Web site references, is subject to change without notice.
More informationIntegrate Cisco IronPort Security Appliance (ESA)
Integrate Cisco IronPort Email Security Appliance (ESA) Publication Date: January 4, 2017 Abstract This guide provides instructions to configure Cisco IronPort Email Security Appliance (ESA) to send the
More informationSophos Endpoint Security and Control standalone startup guide
Sophos Endpoint Security and Control standalone startup guide Sophos Endpoint Security and Control for Windows, version 10.0 Sophos Anti-Virus for Mac OS X, version 7 Document date: December 2011 Contents
More informationInstallation Guide. McAfee Web Gateway. for Riverbed Services Platform
Installation Guide McAfee Web Gateway for Riverbed Services Platform COPYRIGHT Copyright 2010 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed,
More informationIntegrating Cyberoam UTM
Integrating Cyberoam UTM EventTracker Enterprise Publication Date: Jan 6, 2016 EventTracker 8815 Centre Park Drive Columbia MD 21045 www.eventtracker.com Abstract This guide helps you in configuring Cyberoam
More informationCloudHealth. AWS and Azure On-Boarding
CloudHealth AWS and Azure On-Boarding Contents 1. Enabling AWS Accounts... 3 1.1 Setup Usage & Billing Reports... 3 1.2 Setting Up a Read-Only IAM Role... 3 1.3 CloudTrail Setup... 5 1.4 Cost and Usage
More informationAvePoint Permissions Manager
User Guide Issued July 2017 1 Table of Contents What s New in this Guide...4 About...5 Supported Browsers...7 Submit Documentation Feedback to AvePoint...8 Integrate with AvePoint Online Services...9 AvePoint
More informationTrend Micro Incorporated reserves the right to make changes to this document and to the product described herein without notice. Before installing and using the product, review the readme files, release
More informationSophos Anti-Virus for NetApp Storage Systems
Sophos Anti-Virus for NetApp Storage Systems user guide Product Version: 3.0 Contents About this guide... 1 About Sophos Anti-Virus for NetApp Storage Systems...2 System requirements... 4 Before you install
More informationx10data Application Platform v7.1 Installation Guide
Copyright Copyright 2010 Automated Data Capture (ADC) Technologies, Incorporated. All rights reserved. Complying with all applicable copyright laws is the responsibility of the user. Without limiting the
More informationMcAfee Cloud Workload Security Suite Amazon Machine Image Installation Guide
McAfee Cloud Workload Security Suite Amazon Machine Image Installation Guide COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator,
More informationIntegrating Microsoft Forefront Threat Management Gateway (TMG)
Integrating Microsoft Forefront Threat Management Gateway (TMG) EventTracker v7.x Publication Date: Sep 16, 2014 EventTracker 8815 Centre Park Drive Columbia MD 21045 www.eventtracker.com Abstract This
More informationIntegrate Microsoft ATP. EventTracker v8.x and above
EventTracker v8.x and above Publication Date: August 20, 2018 Abstract This guide provides instructions to configure a Microsoft ATP to send its syslog to EventTracker Enterprise. Scope The configurations
More informationIntegrate TippingPoint EventTracker Enterprise
Integrate TippingPoint EventTracker Enterprise Publication Date: Nov. 7, 2016 EventTracker 8815 Centre Park Drive Columbia MD 21045 www.eventtracker.com Abstract This guide provides instructions to configure
More informationOne Identity Active Roles 7.2. Azure AD and Office 365 Management Administrator Guide
One Identity Active Roles 7.2 Azure AD and Office 365 Management Administrator Copyright 2017 One Identity LLC. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright.
More informationIntegrate Viper business antivirus EventTracker Enterprise
Integrate Viper business antivirus EventTracker Enterprise Publication Date: June 2, 2016 EventTracker 8815 Centre Park Drive Columbia MD 21045 www.eventtracker.com Abstract This guide provides instructions
More informationNotices. Third Party Project Usage. Sample Code in Documentation
Malwarebytes for Mac User Guide Version 3.3.0 2 May 2018 Notices Malwarebytes products and related documentation are provided under a license agreement containing restrictions on use and disclosure and
More informationVirtual Appliance User s Guide
Cast Iron Integration Appliance Virtual Appliance User s Guide Version 4.5 July 2009 Cast Iron Virtual Appliance User s Guide Version 4.5 July 2009 Copyright 2009 Cast Iron Systems. All rights reserved.
More informationScribe Insight Installation Guide. Version August 10, 2011
Scribe Insight Installation Guide Version 7.0.2 August 10, 2011 www.scribesoft.com Important Notice No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form
More informationOne Identity Starling Identity Analytics & Risk Intelligence. User Guide
One Identity Starling Identity Analytics & Risk Intelligence User Guide Copyright 2019 One Identity LLC. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software
More informationOctober J. Polycom Cloud Services Portal
October 2018 3725-42461-001J Polycom Cloud Services Portal Copyright 2018, Polycom, Inc. All rights reserved. No part of this document may be reproduced, translated into another language or format, or
More informationInstallation Guide Worksoft Certify Execution Suite
Installation Guide Worksoft Certify Execution Suite Worksoft, Inc. 15851 Dallas Parkway, Suite 855 Addison, TX 75001 www.worksoft.com 866-836-1773 Worksoft Certify Execution Suite Installation Guide Version
More informationAppSpace Installation Guide. Release 4.1.1
AppSpace Installation Guide Release 4.1.1 Disclaimer Information in this document is subject to change without notice. Copyright 2012 Nexus On-Demand All rights reserved. No part of this publication may
More informationIntegrate Symantec Messaging Gateway. EventTracker v9.x and above
Integrate Symantec Messaging Gateway EventTracker v9.x and above Publication Date: May 9, 2018 Abstract This guide provides instructions to configure a Symantec Messaging Gateway to send its syslog to
More information5nine V2V Easy Converter Version 8
Mission Control for the Microsoft Cloud 5nine V2V Easy Converter Version 8 GETTING STARTED GUIDE March 2017 2017 5nine Software Inc. All rights reserved. All trademarks are the property of their respective
More informationMOVE AntiVirus page-level reference
McAfee MOVE AntiVirus 4.7.0 Interface Reference Guide (McAfee epolicy Orchestrator) MOVE AntiVirus page-level reference General page (Configuration tab) Allows you to configure your McAfee epo details,
More informationInventorying Microsoft Azure. Inventorying Microsoft Azure Information with Docusnap X
Inventorying Microsoft Azure Inventorying Microsoft Azure Information with Docusnap X TITLE Inventorying Microsoft Azure AUTHOR Docusnap Consulting DATE 2/7/2018 VERSION 1.0 valid from January 25, 2018
More informationMetalogix Essentials for Office Creating a Backup
Metalogix Essentials for Office 365 2.1 2018 Quest Software Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished
More informationSMB Live. Modernize with Hybrid Cloud. Lab 1: Exploring Windows Server 2012 R2 & Hyper-V
SMB Live Modernize with Hybrid Cloud Lab 1: Exploring Windows Server 2012 R2 & Hyper-V Terms of Use 2013 Microsoft Corporation. All rights reserved. Information in this document, including URL and other
More informationNotices. Third Party Project Usage. Sample Code in Documentation
Malwarebytes for Mac User Guide Version 3.4.0 7 August 2018 Notices Malwarebytes products and related documentation are provided under a license agreement containing restrictions on use and disclosure
More informationQuest VROOM Quick Setup Guide for Quest Rapid Recovery and Foglight Windows Installers
Quest VROOM Quick Setup Guide for Quest Rapid Recovery and Foglight Windows Installers INTRODUCTION Setup of Quest VROOM requires installation of Rapid Recovery and Foglight for Virtualization on two separate
More informationYubico with Centrify for Mac - Deployment Guide
CENTRIFY DEPLOYMENT GUIDE Yubico with Centrify for Mac - Deployment Guide Abstract Centrify provides mobile device management and single sign-on services that you can trust and count on as a critical component
More informationVeeam ONE. Version 8.0. User Guide for VMware vsphere Environments
Veeam ONE Version 8.0 User Guide for VMware vsphere Environments July, 2015 2015 Veeam Software. All rights reserved. All trademarks are the property of their respective owners. No part of this publication
More informationForeScout Extended Module for Palo Alto Networks Next Generation Firewall
ForeScout Extended Module for Palo Alto Networks Next Generation Firewall Version 1.2 Table of Contents About the Palo Alto Networks Next-Generation Firewall Integration... 4 Use Cases... 4 Roll-out Dynamic
More informationINSTALLATION AND SETUP VMware Workspace ONE
GUIDE NOVEMBER 2018 PRINTED 9 JANUARY 2019 VMware Workspace ONE Table of Contents Installation and Setup Introduction Prerequisites Signing Up for a Free Trial Launching the Workspace ONE UEM Console Navigating
More informationA Quick start Guide. Version General Information: Online Support:
A Quick start Guide Version 3.0.0.4 General Information: info@cionsystems.com Online Support: support@cionsystems.com Copyright 2017 CionSystems Inc., All Rights Reserved Page 1 2017 CionSystems Inc. ALL
More informationDecember P Xerox FreeFlow Core Installation Guide
5.1.0.0 December 2017 702P06246 2017 Xerox Corporation. All rights reserved. Xerox, Xerox and Design, and FreeFlow are trademarks of Xerox Corporation in the United States and/or other countries. This
More informationIssued March FLY for Dropbox Installation and Configuration Guide
FLY for Dropbox Installation and Configuration Guide Issued March 2018 FLY for Dropbox Installation and Configuration Guide 1 Table of Contents About This Guide... 3 Uninstalling FLY for Dropbox... 4 Installing
More informationIntegrate Malwarebytes EventTracker Enterprise
Integrate Malwarebytes EventTracker Enterprise Publication Date: Aug. 12, 2016 EventTracker 8815 Centre Park Drive Columbia MD 21045 www.eventtracker.com Abstract This guide provides instructions to configure
More informationQuest VROOM Quick Setup Guide for Quest Rapid Recovery and Foglight Windows Installers
Quest VROOM Quick Setup Guide for Quest Rapid Recovery and Foglight Windows Installers INTRODUCTION Setup of Quest VROOM requires installation of Rapid Recovery and Foglight for Virtualization on two separate
More informationNotices. Third Party Project Usage. Sample Code in Documentation
Malwarebytes for Mac User Guide Version 3.7 28 February 2019 Notices Malwarebytes products and related documentation are provided under a license agreement containing restrictions on use and disclosure
More informationDynamic Work Order System (DWOS) Installation Guide
Dynamic Work Order System (DWOS) Installation Guide The Future of Job Shop Software 4506 Hwy. 20 Suite 200 Niceville, FL 32578 Phone (800) 725-7304 Support@ds2corp.com www.getdwos.com Copyright Notice
More informationNotices. Third Party Project Usage. Sample Code in Documentation
Malwarebytes for Mac User Guide Version 3.1.1 2 November 2017 Notices Malwarebytes products and related documentation are provided under a license agreement containing restrictions on use and disclosure
More informationPatch Manager INSTALLATION GUIDE. Version Last Updated: September 25, 2017
INSTALLATION GUIDE Patch Manager Version 2.1.5 Last Updated: September 25, 2017 Retrieve the latest version from: https://support.solarwinds.com/success_center/patch_manager/patch_manager_documentation
More information5nine Manager with Bitdefender Antivirus. Version 9.1
5nine Manager with Bitdefender Antivirus Version 9.1 September 2016 11 Table of Contents Summary... 7 System requirements... 9 Installation... 11 5nine Manager with Antivirus Management Service installation...
More informationInstallation Guide Worksoft Certify Execution Suite
Installation Guide Worksoft Certify Execution Suite Worksoft, Inc. 15851 Dallas Parkway, Suite 855 Addison, TX 75001 www.worksoft.com 866-836-1773 Worksoft Certify Execution Suite Installation Guide Version
More informationVeeam Backup & Replication
Veeam Backup & Replication Version 9.5 Veeam Agent Management Guide December, 2017 2017 Veeam Software. All rights reserved. All trademarks are the property of their respective owners. No part of this
More informationWatchGuard XTMv Setup Guide Fireware XTM v11.8
WatchGuard XTMv Setup Guide Fireware XTM v11.8 All XTMv Editions Copyright and Patent Information Copyright 1998 2013 WatchGuard Technologies, Inc. All rights reserved. WatchGuard, the WatchGuard logo,
More informationSabre Customer Virtual Private Network Launcher (SCVPNLauncher)
Sabre Customer Virtual Private Network Launcher (SCVPNLauncher) User s Guide Sabre Travel Network This document provides detailed information for the install/uninstall, operation, configuration and troubleshooting
More informationIntegrate Cb Defense. EventTracker v8.x and above
EventTracker v8.x and above Publication Date: June 18, 2018 Abstract This guide helps you in configuring Cb Defense with EventTracker to receive Cb Defense events. In this guide, you will find the detailed
More informationLocate your Advanced Tools and Applications
WordPress is an easy-to-use weblog system, providing numerous features like categories, ratings, as well as plugins installation. This installer application will easily install the WordPress tool to a
More information5nine Manager Datacenter. Version 2.1
5nine Manager Datacenter Version 2.1 Getting Started Guide January 2018 Contents Introduction... 2 Summary... 2 System Architecture... 2 Plugins... 3 Deployment and Configuration... 4 System requirements...
More informationVeeam Cloud Connect. Version 8.0. Administrator Guide
Veeam Cloud Connect Version 8.0 Administrator Guide June, 2015 2015 Veeam Software. All rights reserved. All trademarks are the property of their respective owners. No part of this publication may be reproduced,
More informationTotal Protection Service
User Guide McAfee Total Protection Service for Microsoft Windows Home Server COPYRIGHT Copyright 2008 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed,
More informationIntegrate Sophos Appliance. EventTracker v8.x and above
EventTracker v8.x and above Publication Date: December 26, 2017 Abstract This guide provides instructions to configure a Sophos Email Appliance to send its syslog to EventTracker Enterprise Scope The configurations
More informationNTP Software File Auditor for Hitachi
NTP Software File Auditor for Hitachi Installation Guide Version 3.3 This guide details the method for the installation and initial configuration of NTP Software File Auditor for NAS, Hitachi Edition,
More informationInstallation Guide Worksoft Certify
Installation Guide Worksoft Certify Worksoft, Inc. 15851 Dallas Parkway, Suite 855 Addison, TX 75001 www.worksoft.com 866-836-1773 Worksoft Certify Installation Guide Version 9.0.3 Copyright 2017 by Worksoft,
More informationescan Quick Reference and Installation Guide This document provides information to install escan and serves as a quick reference to run key tasks.
This document provides information to install escan and serves as a quick reference to run key tasks. escan Quick Reference and Installation Guide escan Quick Reference Guide 1 escan User Guide The software
More informationDell Migration Solutions for SharePoint 4.8. User Guide
Dell Migration Solutions for SharePoint 4.8 2015 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under
More informationScan to Digitech v1.0
Scan to Digitech v1.0 Administrator's Guide June 2009 www.lexmark.com Lexmark and Lexmark with diamond design are trademarks of Lexmark International, Inc., registered in the United States and/or other
More informationHPE Security Fortify WebInspect Enterprise Software Version: Windows operating systems. Installation and Implementation Guide
HPE Security Fortify WebInspect Enterprise Software Version: 17.10 Windows operating systems Installation and Implementation Guide Document Release Date: May 2017 Software Release Date: April 2017 Legal
More informationGetting Started with. Management Portal. Version
Getting Started with Management Portal Version 10.1.0.0 Copyright RES Software Development B.V. All rights reserved. Commercial Computer Software documentation/data Restricted Rights. RES and RES ONE are
More informationSecureAPlus User Guide. Version 3.4
SecureAPlus User Guide Version 3.4 September 2015 Copyright Information Information in this document is subject to change without notice. Companies, names and data used in examples herein are fictitious
More informationVeeam Backup & Replication. Version 9.0
Veeam Backup & Replication Version 9.0 May, 2016 2016 Veeam Software. All rights reserved. All trademarks are the property of their respective owners. No part of this publication may be reproduced, transmitted,
More informationInstallation Manual. and User Guide
Installation Manual and User Guide ESET Mobile Antivirus For Windows Mobile Copyright 2009 by ESET, spol. s r. o. ESET Mobile Antivirus For Windows Mobile was developed by ESET, spol. s r.o. For more information
More informationQuest Recovery Manager for Active Directory 9.0. Quick Start Guide
Quest Recovery Manager for Active Directory 9.0 Quick Start Guide Copyright 2017 Quest Software Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software
More informationOne Identity Starling Two-Factor AD FS Adapter 6.0. Administrator Guide
One Identity Adapter 6.0 Administrator Guide Copyright 2017 Quest Software Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide
More informationIntegrate Check Point Firewall. EventTracker v8.x and above
EventTracker v8.x and above Publication Date: March 23, 2017 Abstract This guide helps you in configuring Check Point and EventTracker to receive Check Point events. You will find the detailed procedures
More informationIntegrate Veeam Backup and Replication. EventTracker v9.x and above
Integrate Veeam Backup and Replication EventTracker v9.x and above Publication Date: September 27, 2018 Abstract This guide provides instructions to configure VEEAM to send the event logs to EventTracker
More informationAssessment - OMS Gateway and Data Collection Machine Setup. Prerequisites
Assessment - OMS Gateway and Data Collection Machine Setup Prerequisites Ensure that you have reviewed the information in the assessment s prerequisites and configuration document before continuing the
More informationVeeam Backup & Replication
Veeam Backup & Replication Version 9.x Application Events February, 2017 1 Veeam Backup & Replication Application Events REV 1 2017 Veeam Software. All rights reserved. All trademarks are the property
More informationEnterprise Vault.cloud CloudLink Google Account Synchronization Guide. CloudLink to 4.0.3
Enterprise Vault.cloud CloudLink Google Account Synchronization Guide CloudLink 4.0.1 to 4.0.3 Enterprise Vault.cloud: CloudLink Google Account Synchronization Guide Last updated: 2018-06-08. Legal Notice
More informationLog & Event Manager UPGRADE GUIDE. Version Last Updated: Thursday, May 25, 2017
UPGRADE GUIDE Log & Event Manager Version 6.3.1 Last Updated: Thursday, May 25, 2017 Retrieve the latest version from: https://support.solarwinds.com/success_center/log_event_manager_(lem)/lem_documentation
More information271 Waverley Oaks Rd. Telephone: Suite 206 Waltham, MA USA
Contacting Leostream Leostream Corporation http://www.leostream.com 271 Waverley Oaks Rd. Telephone: +1 781 890 2019 Suite 206 Waltham, MA 02452 USA To submit an enhancement request, email features@leostream.com.
More informationPrivileged Identity App Launcher and Session Recording
Privileged Identity App Launcher and Session Recording 2018 Bomgar Corporation. All rights reserved worldwide. BOMGAR and the BOMGAR logo are trademarks of Bomgar Corporation; other trademarks shown are
More informationAvira Free Mac Security Version HowTo
Avira Free Mac Security Version 2.0.4 HowTo Table of contents 1. Introduction... 3 1.1 Features... 3 1.2 System Requirements...4 2. Installation...4 2.1 Installation with the install wizard...4 2.2 Installation
More information