Automate Consulting Services

Size: px
Start display at page:

Download "Automate Consulting Services"

Transcription

1 Automate Consulting Services Remote Consulting hours Remote consulting sessions provide another option to receive personalized consulting based on your specific needs. Our experienced and knowledgeable team of consultants will work with you and your team to gain a deeper understanding of how to maximize your use of all that is possible within Automate. Remote consulting hours are available to be scheduled in one hour blocks. We conduct interactive sessions with your technicians to cover a vast array of topics and demonstrate proper and efficient use of your Automate platform Topic Options Scheduling Identify your topics or needs, or schedule a FREE scoping call to determine them. Call your Service Core Automate Functions & Features Scripting Ignite Client Access and Usage Permissions Dataviews and Heads-up Displays SNMP Windows Patching Ticket Management Virtualization Manager Automation Redirectors and Tunnels Inventory Management New Release Functions & Features Monitoring and Alerting General Q & A Coordinator when you are ready. We will schedule your virtual appointment after receipt of the topics list based on your needs and your customized solution plan. * Consulting Sessions covering 3rd Party integrations require the integration to be complete and functioning prior to the session. Excluding PSA integrations. Topic Details 3rd Party Integration* PSA - ConnectWise A/V ESET PSA - AutoTask A/V Vipre Backup - ShadowProtect Hitman Pro Backup Monitoring (General) Anti-Virus (General) 3rd Party Patching Contact Us Session Length = 1 hour One Year Expiration Service Coordinator , Option 5 An explanation of what is covered in each topic s session can be found by clicking on the topic or scrolling down. Consulting Options The consulting sessions are to maximize your training knowledge. These are not intended for creating custom configurations (scripts or monitors) or for extensive troubleshooting of environmental issues.

2 Consulting Topic Descriptions Scripting The Introductory Scripting consulting session will give a partner a basic understanding of Automate scripting. The session will include discussion of the script editor, script usage, basic script functions and a walk-through of an existing simple software deployment script. Planning a Script Finding a Script Writing and Modifying Scripts Documenting Script Type Selection Using IF Dropdown Command Editing Ignite The primary goal of this consulting session is to explain Ignite and its relationship to the onboarding process, service plans, monitors & alerting and alert templates. What is Ignite? The Onboarding Group Default Automate Ignite Properties Ticket Throttling Permissions The permissions consulting session will give a partner a general overview of permissions in Automate. The session will include discussion of user, client, group, script, and contact permissions. Permissions in Automate, as documented, are detailed under each component. Permissions can be set at the user, client, group, script, and contact objects. User classes are a key component of the methodology. Permissions are assigned to the user class and then the user class is assigned to the user. User Client Group Script Contact

3 Dataviews and Heads-up Displays Heads up displays, or HUD s, are customizable collections of multiple types of Automate asset information, which can be organized into one concise view. In many cases, the HUDs are built from collections of information known as Dataviews, but can also be assembled from other pieces of data like custom sensors, web pages, alerts, images and graphs. In many cases Partners display these Dataviews in NOC/Help Desk areas, allowing technicians fast and up-to-date information about their managed devices. Overview Dataviews HUDs Sensor Panels, Monitor Overviews, Data Graphs SNMP Automate mainly focuses on using SNMP to get information, particularly information pertaining to device status (e.g. enabled/disabled) and usage (e.g. how many pages a printer has printed) through network monitors. Intro to SNMP OIDS (Object Identifiers) MIBS Monitoring an individual device Monitoring same device types Creating Internal Monitors for Collected Data Traps Self-Collection Windows Patching The patching consulting session will give a partner a general overview of patching in Automate. The session will include discussion of patching functionality & usage, enabling patching, patch management, automated approval and patch denial. Enabling Patching and prerequisites Manual Patching Patch Manager Patching Templates Automatic patching Ignite Patching Denials and Overrides Ticket Management Ticket Management provides Best Practices for cleaning up noisy items. Automate 2012 and beyond utilized Ignite Monitoring package which has several hundred default monitors set to Microsoft or Vendor requisites many of which are not real-time or possible in production. The Ticketing session will cover where these come from and how to tone them down after a client has onboarded their partners and begun ticketing and monitoring. Service Tickets Sensor Tickets Software Tickets (Classifications) Perf Tickets Offline Servers Tickets Reports/Product Keys Tickets

4 Virtualization Manager Virtualization is an industry must-have. Automate has engineered a Virtualization Manager that will help you monitor virtual environments for your clients. We can speak to the configuration and usage of the Virtualization Manager. Enabling the Virtualization Manager Solution Configuring the Virtualization Manager s global settings Configuring monitor overrides on individual Host/Guest settings. Managing virtual environments Client Access and Usage There are times when a Partners client needs or wants access to the Automate environment. Enabling In-House support or the Client Portal will fulfill the clients request without giving them unnecessary access to the standard Control Center. This limits possibility of clients viewing privileged information or making unwanted changes in the Control Center. In-House Support Client Portal Managing Tickets in the Web Control Center Permissions Permissions exist at the user, client, group and script levels and we can guide you in how to manage the permissions for each. Review of the default user class permissions Managing users Managing user classes Managing client permissions Group permissions Script permissions Redirectors and Tunnels Tunnels allow you to create a direct connection from the Control Center to an agent computer. This is established with a tunnel connection. Once this tunnel connection is running, redirectors can be established across this tunnel. Multiple redirectors can run at the same time on a single tunnel, connecting to different destinations. Starting tunnels and redirectors Using HTTP & HTTPS Connect Using proxies Using RDP Using Telnet

5 Automation Learn how to leverage extra data fields, searches and groups together to assist you in your own automated solutions. Create custom Extra Data Fields Create custom searches Create custom groups Tie all three together for automation purposes Use case scenarios explained General Q & A Have general product questions or would prefer to get training on a subject when the need occurs, you can utilize remote consulting hours for any type of product questions that you may have. Questions to be submitted ahead of the scheduled call. Inventory Management License Management allows you to manage your clients software inventory. Once licenses and the license count have been entered, Automate can automatically alert you when a client has exceeded the number of licenses. Adding product licenses Modifying a License Deleting a License Exporting Licenses Creating an Over License Monitor New Release Functions and Features Upgrading from a previous version of Automate to the latest release? We can assist in bringing you up to speed with what has changed and what new features have been introduced in the latest revision of Automate. New features like ScreenConnect Functionality changes such as user permissions Web Portal Easily manage service tickets and access client computers 24/7, from any location and any web browser. Technician use of the Web Control Center Client use of the Client Portal Web portal access permissions

6 Monitoring and Alerting Automate Monitors are used to evaluate the condition of any device and then perform an action when a specified threshold is reached, once reached you will also want to control how you are alerted to the condition. Internal monitors overview Remote monitors overview Different use cases for each and why one should be used over the other Monitor creation and configuration Alert template creation and configuration PSA - ConnectWise ConnectWise Integration is used to sync Clients to Companies, Contacts, Assets to Configurations and Tickets. This session is intended to describe and provide Best practice suggestions for your ConnectWise Integration. What is the ConnectWise Plugin? Setup Wizard Asset Management Synchronization Ticket Management Remediation PSA - AutoTask AutoTask Integration is used to sync Clients to Companies, Contacts, Assets to Configurations and Tickets. This session is intended to describe and provide Best practice suggestions for your AutoTask Integration. What is the AutoTask Plugin? Setup Wizard Asset Management Synchronization Ticket Management Remediation Anti-Virus (General) Antivirus product monitoring can be accomplished through Automate antivirus definitions when official integration is not available, we can walk you through this process. Create an antivirus definition for specific products Detect if this product is installed Is the product running? Is the antivirus product up to date?

7 Backup Monitoring (General) Backup product monitoring can be accomplished through Automate event log monitors when official integration is not available, we can walk you through this process. Creation of event log monitors for basic backup monitoring This is not a fully integrated management or monitoring solution A/V ESET AV management is all about finding the balance between protection and performance. When configuring your AV software, focus first on the software already installed in the environment you are deploying to. Then make the appropriate file and folder exclusions to ensure you can have your AV products features turned on without impacting the overall performance of the end users workstations, and any critical application servers such as SQL servers, and file servers. Enable ESET Remote Plugin Creating ESET Default Parent Policy Configure ESET Remote Plugin Create Default ESET AV Policy Create Group ESET AV Policies Deploy ESET Agents A/V Vipre The Vipre A/V Management consulting session provides an overview of the functionality and usage of the Automate Vipre A/V manager plugin. Enable the VIPRE Remote Plugin Creating a VIPRE Default Parent Policy Configure VIPRE Remote Plugin to enable communication between the VIPRE and Automate servers Creating a Default VIPRE Antivirus Policy Creating Group VIPRE Antivirus Policies Deploying VIPRE Agents Backup ShadowProtect The ShadowProtect Backup Management consulting session provides an overview of the functionality and usage of the Automate LTBackup manager plugin, and is specifically geared towards partners using ShadowProtect. Additional topics include license management, backup agent deployment and activation, backup job creation and monitoring using the LTBackup Manager plug-in. Different backup types and restore procedures (general overview) Industry standard Best Practices Automate server prerequisites Licensing how-to Installation method and walk through Creating backup jobs on agent Creating backup jobs via LT Backup console Backup Management - Editing/Deleting backup jobs Monitors available for ShadowProtect Dataviews available for ShadowProtect

8 HitManPro In today s IT environment, relying on a single malware vendor is not sufficient to guarantee complete network protection. You need a second source of defense to ascertain that your clients are secure from cyber threats. HitmanPro is a second opinion scanner designed to rescue computers that have become infected with viruses, Trojans, rootkits and other malware, despite continuous protection from up-to-date antivirus software. Creation of event log monitors for basic backup monitoring Plugin installation & configuration Monitoring of malware detected by HitManPro Reporting on Antimalware health Submitting false positives 3 rd Party Patching* 3 rd Party Patching extends Automate s Microsoft update patching to third party applications with seamless integration to close security holes and guard against attacks. 3 rd Party Patching downloads all updates from their server and automatically pushes patches to your client computers. With 3 rd Party Patching, it s easy to provide third party patch management to you clients and increase recurring monthly revenue for your business. Enabling Patching and prerequisites Manual Patching Patch Manager Patching Templates Automatic patching Ignite Patching Denials and Overrides *Requires 3 rd Party Patching license

ConnectWise Automate. What is ConnectWise Automate?

ConnectWise Automate. What is ConnectWise Automate? What is ConnectWise Automate? ConnectWise Automate is a remote monitoring and management tool (RMM) that allows us to actively track the health and performance of your IT network. We compile that data

More information

ESET Remote Administrator v6 Getting Started Guide for MSPs January 2017

ESET Remote Administrator v6 Getting Started Guide for MSPs January 2017 ESET Remote Administrator v6 Getting Started Guide for MSPs January 2017 Table of Contents Table of Contents... 2 Environmental Pre-requisites... 3 Installing ESET Remote Administrator (ERA)... 4 Configuring

More information

Solution Overview. A Technical Whitepaper. Version 1.0. CJ Wright PRODUCT MANAGER, MID-MARKET

Solution Overview. A Technical Whitepaper. Version 1.0. CJ Wright PRODUCT MANAGER, MID-MARKET 2015 Solution Overview A Technical Whitepaper Version 1.0 CJ Wright PRODUCT MANAGER, MID-MARKET CWRIGHT@LABTECHSOFTWARE.COM Contents CONTENTS 1 USING THIS GUIDE 4 Navigating This Document 4 LABTECH OVERVIEW

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the service described herein without notice. Before installing and using the service, review the readme files, release

More information

Contents George Road, Tampa, FL

Contents George Road, Tampa, FL 1 Contents CONTACTING VEEAM SOFTWARE... 5 Customer Support... 5 Online Support... 5 Company Contacts... 5 About this Guide... 6 About VEEAM Endpoint Backup For LabTech... 7 How It Works... 8 Discovery...

More information

ConRes IaaS Management Services for Microsoft Azure

ConRes IaaS Management Services for Microsoft Azure ConRes IaaS Management Services for Microsoft Azure Table of Contents 1. 2. 3. 4. 5. 6. 7. Introduction... 3 Pre-requisites... 3 Onboarding Infrastructure to ConRes IaaS Management Services for Azure...

More information

ForeScout Extended Module for HPE ArcSight

ForeScout Extended Module for HPE ArcSight ForeScout Extended Module for HPE ArcSight Version 2.7.1 Table of Contents About the HPE ArcSight Integration... 4 Use Cases... 4 Send Endpoint Status, Compliance, or Property Changes from CounterACT to

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the service described herein without notice. Before installing and using the service, review the readme files, release

More information

Ryan KS office thesee

Ryan KS office thesee SERVERR and WORKSTATION REMOTE MANAGEMENT SERVICES Ryan Dental Systems Dental Computer Systems Support and Sales 303 2 nd Street, PO Box 194, Inland NE 68954 5506 SW 31stPh: 402-461-5575 Terrace Topeka

More information

A: Administering System Center Configuration Manager

A: Administering System Center Configuration Manager 20703-1A: Administering System Center Configuration Manager Duration: 5 days; Instructor-led WHAT YOU WILL LEARN This five-day course describes how to use Configuration Manager and its associated site

More information

PTS Customer Protection Agreement

PTS Customer Protection Agreement PTS Customer Protection Agreement Revised: July 26, 2017 Thank you for choosing as your IT provider. Customer s Network environments with the most success have an in-house Network Administrator or someone

More information

Statement of Work. LabTech Implementation Bronze. LabTech Software 4110 George Road Suite 200 Tampa, FL 33634

Statement of Work. LabTech Implementation Bronze. LabTech Software 4110 George Road Suite 200 Tampa, FL 33634 Statement of Work LabTech Implementation Bronze LabTech Software 4110 George Road Suite 200 Tampa, FL 33634 US Direct: 813.397.4600 UK: 0844.544.1690 AUS: 3.8652.1797 www.labtechsoftware.com Contents Section

More information

Leading the Way. in Managed Services

Leading the Way. in Managed Services Leading the Way in Managed Services Managed Services Infrastructure Overview By combining Desktop maintenance and Server IntelliMonitoring with automated scripting tools and leading technology Partners,

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the product described herein without notice. Before installing and using the product, review the readme files, release

More information

Installation Guide. 3CX CRM Plugin for ConnectWise. Single Tenant Version

Installation Guide. 3CX CRM Plugin for ConnectWise. Single Tenant Version Installation Guide 3CX CRM Plugin for ConnectWise Single Tenant Version "Copyright VoIPTools, LLC 2011-2016" Information in this document is subject to change without notice. No part of this document may

More information

Acronis Data Cloud plugin for ConnectWise Automate

Acronis Data Cloud plugin for ConnectWise Automate Acronis Data Cloud plugin for ConnectWise Automate USER'S GUIDE Revision: 24.08.2018 Table of contents 1 Introduction...3 2 What's new in Update 4...3 3 What's new in Update 3...3 4 What's new in Update

More information

Administering System Center Configuration Manager

Administering System Center Configuration Manager Administering System Center Configuration Manager Course 20703-1A 5 Days Instructor-led, Hands on Course Information This five-day course describes how to use Configuration Manager and its associated site

More information

ADMINISTERING SYSTEM CENTER CONFIGURATION MANAGER

ADMINISTERING SYSTEM CENTER CONFIGURATION MANAGER ADMINISTERING SYSTEM CENTER CONFIGURATION MANAGER Course Code: 20703-1a Duration 5 days Introduction This five-day course describes how to use Configuration and its associated site systems to efficiently

More information

"Charting the Course... MOC A: Administering System Center Configuration Manager. Course Summary

Charting the Course... MOC A: Administering System Center Configuration Manager. Course Summary MOC 20703-1A: Administering System Center Configuration Manager Course Summary Description This five-day course describes how to use Configuration Manager and its associated site systems to efficiently

More information

Administering System Center Configuration Manager

Administering System Center Configuration Manager Administering System Center Configuration Manager 20703-1; 5 Days; Instructor-led Course Description This five-day course describes how to use Configuration Manager and its associated site systems to efficiently

More information

Course A: Administering System Center Configuration Manager

Course A: Administering System Center Configuration Manager Course 20703-1A: Administering System Center Configuration Manager Overview: This five-day course describes how to use Configuration Manager and its associated site systems to efficiently manage network

More information

ForeScout Extended Module for Symantec Endpoint Protection

ForeScout Extended Module for Symantec Endpoint Protection ForeScout Extended Module for Symantec Endpoint Protection Version 1.0.0 Table of Contents About the Symantec Endpoint Protection Integration... 4 Use Cases... 4 Additional Symantec Endpoint Protection

More information

Comodo ONE Software Version 3.2

Comodo ONE Software Version 3.2 rat Comodo ONE Software Version 3.2 Remote Monitoring and Management Quick Start Guide Guide Version 6.1.082316 Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013 Comodo ONE - Remote Monitoring

More information

CounterACT Check Point Threat Prevention Module

CounterACT Check Point Threat Prevention Module CounterACT Check Point Threat Prevention Module Version 1.0.0 Table of Contents About the Check Point Threat Prevention Integration... 4 Use Cases... 4 Additional Check Point Threat Prevention Documentation...

More information

Administering System Center Configuration Manager ( A)

Administering System Center Configuration Manager ( A) Administering System Center Configuration Manager (20703-1A) Duration: 5 Days Price: $895 Delivery Option: Attend via MOC On-Demand Students Will Learn Describing the features Configuration Manager and

More information

Acronis Data Cloud plugin for ConnectWise Automate

Acronis Data Cloud plugin for ConnectWise Automate Acronis Data Cloud plugin for ConnectWise Automate USER S GUIDE Revision: 17.01.2018 Table of contents 1 Introduction...3 2 What s new in Update 3...3 3 What s new in Update 2...3 4 What s new in Update

More information

Ensuring Desktop Central Compliance to Payment Card Industry (PCI) Data Security Standard

Ensuring Desktop Central Compliance to Payment Card Industry (PCI) Data Security Standard Ensuring Desktop Central Compliance to Payment Card Industry (PCI) Data Security Standard Introduction Manage Engine Desktop Central is part of ManageEngine family that represents entire IT infrastructure

More information

Getting started with System Center Essentials 2007

Getting started with System Center Essentials 2007 At a glance: Installing and upgrading Configuring Essentials 2007 Troubleshooting steps Getting started with System Center Essentials 2007 David Mills System Center Essentials 2007 is a new IT management

More information

Administering System Center Configuration Manager

Administering System Center Configuration Manager Course 20703-1A: Administering System Center Configuration Manager Course Outline Module 1: Managing computers and mobile devices in the enterprise This module describes the features of Configuration Manager

More information

Duration Level Technology Delivery Method Training Credits. System Center Configuration Manager

Duration Level Technology Delivery Method Training Credits. System Center Configuration Manager NE-20703-1A Administering System Center Summary Duration Level Technology Delivery Method Training Credits 5 Days Advanced System Center Classroom ILT Virtual ILT On Demand SATV Introduction This 5-day

More information

Microsoft Administering System Center Configuration Manager

Microsoft Administering System Center Configuration Manager 1800 ULEARN (853 276) www.ddls.com.au Microsoft 20703-1 Administering System Center Configuration Manager Length 5 days Price $4290.00 (inc GST) Version A Overview This five-day course describes how to

More information

Agent and Agent Browser. Updated Friday, January 26, Autotask Corporation

Agent and Agent Browser. Updated Friday, January 26, Autotask Corporation Agent and Agent Browser Updated Friday, January 26, 2018 2018 Autotask Corporation Table of Contents Table of Contents 2 The AEM Agent and Agent Browser 3 AEM Agent 5 Privacy Mode 9 Agent Browser 11 Agent

More information

Managed Security Services - Endpoint Managed Security on Cloud

Managed Security Services - Endpoint Managed Security on Cloud Services Description Managed Security Services - Endpoint Managed Security on Cloud The services described herein are governed by the terms and conditions of the agreement specified in the Order Document

More information

ForeScout Extended Module for ArcSight

ForeScout Extended Module for ArcSight Version 2.8 Table of Contents About the ArcSight Integration... 4 Use Cases... 4 Send Endpoint Status, Compliance, or Property Changes from CounterACT to ArcSight... 5 SmartConnector Health and Compliance

More information

Antivirus Solution Guide for Clustered Data ONTAP: Symantec

Antivirus Solution Guide for Clustered Data ONTAP: Symantec Technical Report Antivirus Solution Guide for Clustered Data ONTAP: Symantec Saurabh Singh and Brahmanna Chowdary Kodavali, NetApp July 2016 TR-4304 Abstract An antivirus solution is key for enterprises

More information

KASPERSKY LAB. Kaspersky Administration Kit version 6.0. Reference Book

KASPERSKY LAB. Kaspersky Administration Kit version 6.0. Reference Book KASPERSKY LAB Kaspersky Administration Kit version 6.0 Reference Book KASPERSKY ADMINISTRATION KIT VERSION 6.0 Reference Book Kaspersky Lab Ltd. Visit our website: http://www.kaspersky.com/ Revision date:

More information

KASPERSKY SECURITY CENTER 10 & KASPERSKY SECURITY FOR SERVER

KASPERSKY SECURITY CENTER 10 & KASPERSKY SECURITY FOR SERVER KASPERSKY SECURITY CENTER 10 & KASPERSKY SECURITY FOR SERVER Testing of Installation base on the AWS server Abstract This document create to present the result of testing installation of KSC 10 and the

More information

Request for Proposal Technology Services, Maintenance and Support

Request for Proposal Technology Services, Maintenance and Support Maintenance and Support April 26 th, 2018 Request for Proposal Technology Services, Maintenance and Support Celerity Schools Louisiana Inc. is seeking an IT consulting firm to manage Maintenance of our

More information

Symantec Endpoint Protection Integration Component User's Guide. Version 7.0

Symantec Endpoint Protection Integration Component User's Guide. Version 7.0 Symantec Endpoint Protection Integration Component User's Guide Version 7.0 The software described in this book is furnished under a license agreement and may be used only in accordance with the terms

More information

ADVANCED AEM INTEGRATION

ADVANCED AEM INTEGRATION ADVANCED AEM INTEGRATION Table of Contents ONE UNIFIED PLATFORM... 3 1. Problem Statement... 3 2. Lessons learned from other RMM Integrations... 3 3. Advanced AEM Integration - Benefits... 4 INSTANT UNDERSTANDING

More information

SOLUTION OVERVIEW. Enterprise-grade security management solution providing visibility, management and reporting across all OSes.

SOLUTION OVERVIEW. Enterprise-grade security management solution providing visibility, management and reporting across all OSes. SOLUTION OVERVIEW Enterprise-grade security management solution providing visibility, management and reporting across all OSes. What is an endpoint security management console? ESET Security Management

More information

Course overview CompTIA A Official Study Guide

Course overview CompTIA A Official Study Guide Course overview CompTIA A+ 220-801 Official Study Guide (G183eng ver092) Overview CompTIA A+ courses are intended for students wishing to qualify with CompTIA A+ Certification. A+ certification is designed

More information

Configuring Antivirus Devices

Configuring Antivirus Devices CHAPTER 9 Revised: November 11, 2007 Antivirus (AV) devices provide detection and prevention against known viruses and anomalies. This chapter describes how to configure and add the following devices and

More information

WHITE PAPER: DELL MANAGEMENT CONSOLE TRIGGERS NETBACKUP 7 JOBS

WHITE PAPER: DELL MANAGEMENT CONSOLE TRIGGERS NETBACKUP 7 JOBS WHITE PAPER: DELL MANAGEMENT CONSOLE TRIGGERS NETBACKUP 7 JOBS White Paper: Dell Management Console Integrates with NetBackup 7 March 2010 Third-party information brought to you courtesy of Dell. Revision

More information

A: Administering System Center Configuration Manager

A: Administering System Center Configuration Manager 20703-1A: Administering System Center Configuration Manager Course Details Course Code: 20703-1A Duration: Notes: 5 days This course syllabus should be used to determine whether the course is appropriate

More information

ADMINISTERING SYSTEM CENTER 2012 CONFIGURATION MANAGER

ADMINISTERING SYSTEM CENTER 2012 CONFIGURATION MANAGER CENTER OF KNOWLEDGE, PATH TO SUCCESS Website: ADMINISTERING SYSTEM CENTER 2012 CONFIGURATION MANAGER Course 10747D; Duration: 5 Days; Instructor-led WHAT YOU WILL LEARN This course describes how to configure

More information

Integrate Microsoft Antimalware. EventTracker v8.x and above

Integrate Microsoft Antimalware. EventTracker v8.x and above Integrate Microsoft Antimalware EventTracker v8.x and above Publication Date: September 6, 2017 Abstract This guide provides instructions to configure Microsoft Antimalware to send logs to EventTracker

More information

Zemana Endpoint Security Administration Guide. Version

Zemana Endpoint Security Administration Guide. Version Zemana Endpoint Security Administration Guide Version 1.9.290 Introduction 4 What is Zemana Endpoint Security? 4 What is Zemana Control Center? 4 How do Endpoint Agents and Control Center communicate with

More information

Prevx 3.0 v Product Overview - Core Functionality. April, includes overviews of. MyPrevx, Prevx 3.0 Enterprise,

Prevx 3.0 v Product Overview - Core Functionality. April, includes overviews of. MyPrevx, Prevx 3.0 Enterprise, Prevx 3.0 v3.0.1.65 Product Overview - Core Functionality April, 2009 includes overviews of MyPrevx, Prevx 3.0 Enterprise, and Prevx 3.0 Banking and Ecommerce editions Copyright Prevx Limited 2007,2008,2009

More information

Endpoint Security Manager

Endpoint Security Manager Comodo Endpoint Security Manager Software Version 1.6 CIS Configuration Editor Version 1.6.010511 Comodo Security Solutions 1255 Broad Street STE 100 Clifton, NJ 07013 Table of Contents 1.Introduction

More information

ForeScout Extended Module for Carbon Black

ForeScout Extended Module for Carbon Black ForeScout Extended Module for Carbon Black Version 1.0 Table of Contents About the Carbon Black Integration... 4 Advanced Threat Detection with the IOC Scanner Plugin... 4 Use Cases... 5 Carbon Black Agent

More information

ForeScout CounterACT. Resiliency Solutions. CounterACT Version 8.0

ForeScout CounterACT. Resiliency Solutions. CounterACT Version 8.0 ForeScout CounterACT Resiliency Solutions CounterACT Version 8.0 Table of Contents About ForeScout Resiliency Solutions... 4 Comparison of Resiliency Solutions for Appliances... 5 Choosing the Right Solution

More information

Categories Administrative Security Categories 57 Alerts Hidden Categories 2 Asset Intelligence Total 59 Client Push Client Status Total Reports 541

Categories Administrative Security Categories 57 Alerts Hidden Categories 2 Asset Intelligence Total 59 Client Push Client Status Total Reports 541 Categories Administrative Security Categories 57 Alerts Hidden Categories 2 Asset Intelligence Total 59 Client Push Client Status Total Reports 541 Compliance and Settings Management Device Management

More information

Content for Sophos- Theory and lab session

Content for Sophos- Theory and lab session Content for Sophos- Theory and lab session Module 1 : Enduser Protection deployment scenarios Review of Enduser Protection features and components Factors to consider when designing solutions Single site

More information

The professional IT management platform

The professional IT management platform The professional IT management platform Total Control of Your IT Infrastructure Whether you are administrating your own IT, or providing services to your clients, with ITbrain you amaze with proactivity.

More information

Proactive Performance Monitoring for Citrix XenApp & XenDesktop

Proactive Performance Monitoring for Citrix XenApp & XenDesktop Proactive Performance Monitoring for Citrix XenApp & XenDesktop TECHNOLOGY OVERVIEW In approximately one week, support tickets dropped by 25% Our customers were complaining about persistent slowness with

More information

WhatsConfigured v3.1 User Guide

WhatsConfigured v3.1 User Guide WhatsConfigured v3.1 User Guide Contents Table of Contents Welcome to WhatsConfigured v3.1 Finding more information and updates... 1 Sending feedback... 2 Deploying WhatsConfigured STEP 1: Prepare the

More information

Altiris Software Management Solution 7.1 from Symantec User Guide

Altiris Software Management Solution 7.1 from Symantec User Guide Altiris Software Management Solution 7.1 from Symantec User Guide Altiris Software Management Solution 7.1 from Symantec User Guide The software described in this book is furnished under a license agreement

More information

ESET REMOTE ADMINISTRATOR PLUG-IN FOR KASEYA. Technical Setup and User Guide

ESET REMOTE ADMINISTRATOR PLUG-IN FOR KASEYA. Technical Setup and User Guide ESET REMOTE ADMINISTRATOR PLUG-IN FOR KASEYA Technical Setup and User Guide ESET REMOTE ADMINISTRATOR PLUG-INFOR KASEYA Copyright 2014 by ESET, spol. s r.o. ESET REMOTE ADMINISTRATOR Plug-in FOR KASEYA

More information

Trend Micro. Apex One as a Service / Apex One. Best Practice Guide for Malware Protection. 1 Best Practice Guide Apex One as a Service / Apex Central

Trend Micro. Apex One as a Service / Apex One. Best Practice Guide for Malware Protection. 1 Best Practice Guide Apex One as a Service / Apex Central Trend Micro Apex One as a Service / Apex One Best Practice Guide for Malware Protection 1 Best Practice Guide Apex One as a Service / Apex Central Information in this document is subject to change without

More information

VMware vsphere. Administration VMware Inc. All rights reserved

VMware vsphere. Administration VMware Inc. All rights reserved VMware vsphere Administration 2010 VMware Inc. All rights reserved Permissions Privileges Hierarchical by category Roles Defined set of one or more privileges System and sample roles provided Privileges

More information

CONTENTS. Technology Overview. Workflow Integration. Sample Customers. How It Works

CONTENTS. Technology Overview. Workflow Integration. Sample Customers. How It Works NetBrain s Adaptive Network Automation platform integrates with existing IT workflows to improve data visibility and streamline network assessment. NetBrain relieves engineers from manual CLIdigging and

More information

VMware vcenter Configuration Manager Administration Guide vcenter Configuration Manager 5.7

VMware vcenter Configuration Manager Administration Guide vcenter Configuration Manager 5.7 VMware vcenter Configuration Manager Administration Guide vcenter Configuration Manager 5.7 This document supports the version of each product listed and supports all subsequent versions until the document

More information

Administering System Center Configuration Manager ( )

Administering System Center Configuration Manager ( ) Administering System Center Configuration Manager (20703-1) Formato do curso: Presencial Localidade: Lisboa Data: 30 Set. 2019 a 04 Out. 2019 Preço: 1670 Horário: Laboral - das 09h30 às 17h30 Nível: Avançado

More information

Detector Service Delivery System (SDS) Version 3.0

Detector Service Delivery System (SDS) Version 3.0 Detector Service Delivery System (SDS) Version 3.0 Detecting and Responding to IT Security Policy Violations Quick Start Guide 2018 RapidFire Tools, Inc. All rights reserved. V20180112 Contents Overview

More information

ForeScout CounterACT Resiliency Solutions

ForeScout CounterACT Resiliency Solutions ForeScout CounterACT Resiliency Solutions User Guide CounterACT Version 7.0.0 About CounterACT Resiliency Solutions Table of Contents About CounterACT Resiliency Solutions... 5 Comparison of Resiliency

More information

Course 10747D: Administering System Center 2012 Configuration Manager Exam Code:

Course 10747D: Administering System Center 2012 Configuration Manager Exam Code: Course 10747D: Administering System Center 2012 Configuration Manager Exam Code: 70-243 Course Outline Module 1: Overview of System Center 2012 R2 Configuration Manager In this module, you will learn about

More information

ENDNOTE SECURITY OVERVIEW INCLUDING ENDNOTE DESKTOP AND ONLINE

ENDNOTE SECURITY OVERVIEW INCLUDING ENDNOTE DESKTOP AND ONLINE ENDNOTE SECURITY OVERVIEW INCLUDING ENDNOTE DESKTOP AND ONLINE INTRODUCTION In line with commercial industry standards, the data center used by EndNote employs a dedicated security team to protect our

More information

Sophos Central Partner. help

Sophos Central Partner. help help Contents About help...1 About...2 Dashboard... 3 Alerts...4 Logs... 5 Audit Logs...5 Sophos Central...7 Sophos Central customers...7 Sophos Central Licenses... 7 Managed Customer Usage... 9 Trial

More information

10747D: ADMINISTERING SYSTEM CENTER 2012 CONFIGURATION MANAGER

10747D: ADMINISTERING SYSTEM CENTER 2012 CONFIGURATION MANAGER 10747D: ADMINISTERING SYSTEM CENTER 2012 CONFIGURATION MANAGER DURATION 5 days INTRODUCTION This course describes how to configure and manage a System Center 2012 R2 Configuration Manager site and its

More information

VMware Mirage Web Manager Guide

VMware Mirage Web Manager Guide Mirage 5.3 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of this document,

More information

Administering System Center Configuration Manager

Administering System Center Configuration Manager Administering System Center Configuration Manager Duration: 5 Days Course Code: M20703-1 Version: A Overview: This five-day course describes how to use Configuration Manager and its associated site systems

More information

McAfee Network Security Platform

McAfee Network Security Platform McAfee Network Security Platform 9.2 (Quick Tour) McAfee Network Security Platform [formerly McAfee IntruShield ] is a combination of network appliances and software that accurately detects and prevents

More information

"Charting the Course to Your Success!" MOC D Administering System Center 2012 Configuration Manager. Course Summary

Charting the Course to Your Success! MOC D Administering System Center 2012 Configuration Manager. Course Summary Description Course Summary This course describes how to configure and manage a site and its associated site systems. The course focuses on day-to-day management tasks for. Objectives At the end of this

More information

IBM Proventia Management SiteProtector Policies and Responses Configuration Guide

IBM Proventia Management SiteProtector Policies and Responses Configuration Guide IBM Internet Security Systems IBM Proventia Management SiteProtector Policies and Responses Configuration Guide Version2.0,ServicePack8.1 Note Before using this information and the product it supports,

More information

CompTIA A+ Certification ( ) Study Guide Table of Contents

CompTIA A+ Certification ( ) Study Guide Table of Contents CompTIA A+ Certification (220-902) Study Guide Table of Contents Course Introduction About This Course About CompTIA Certifications Module 1 / Supporting Windows 1 Module 1 / Unit 1 Windows Operating System

More information

Kaseya IT Services KASEYA IT SERVICES PROGRAM CATALOG 2014 Q3

Kaseya IT Services KASEYA IT SERVICES PROGRAM CATALOG 2014 Q3 Kaseya IT Services KASEYA IT SERVICES PROGRAM CATALOG 2014 Q3 Kaseya is dedicated to perfecting the IT Service experience through continuous technology innovation and the highest standards of Service.

More information

n Learn about the Security+ exam n Learn basic terminology and the basic approaches n Implement security configuration parameters on network

n Learn about the Security+ exam n Learn basic terminology and the basic approaches n Implement security configuration parameters on network Always Remember Chapter #1: Network Device Configuration There is no 100 percent secure system, and there is nothing that is foolproof! 2 Outline Learn about the Security+ exam Learn basic terminology

More information

Product overview. McAfee Web Protection Hybrid Integration Guide. Overview

Product overview. McAfee Web Protection Hybrid Integration Guide. Overview McAfee Web Protection Hybrid Integration Guide Product overview Overview The McAfee Web Protection hybrid solution is the integration of McAfee Web Gateway and McAfee Web Gateway Cloud Service (McAfee

More information

TECHNICAL DESCRIPTION

TECHNICAL DESCRIPTION TECHNICAL DESCRIPTION Product Snow Inventory Version 5 Release date 2016-09-27 Document date 2017-11-24 CONTENTS 1 Introduction... 3 1.1 What s new?... 3 2 Platform overview... 4 2.1 Architecture... 4

More information

Client Health Key Features Datasheet. Client Health Key Features Datasheet

Client Health Key Features Datasheet. Client Health Key Features Datasheet Client Health Key Features Datasheet Client Health Key Features Datasheet Introducing the fastest way to manage endpoint health and security at scale Are you spending countless hours trying to find and

More information

Network Security Platform Overview

Network Security Platform Overview Quick Tour Revision B McAfee Network Security Platform 8.1 Network Security Platform Overview McAfee Network Security Platform [formerly McAfee IntruShield ] is a combination of network appliances and

More information

SERVICE DESCRIPTION MANAGED FIREWALL/VPN

SERVICE DESCRIPTION MANAGED FIREWALL/VPN Contents Service Overview.... 3 Key Features... 3 Service Features... 3 Responsibilities... 5 Additional Services.... 5 Implementation... 6 Validation... 6 Implementation Process.... 6 Customer Kick-Off...

More information

Viewing System Status, page 404. Backing Up and Restoring a Configuration, page 416. Managing Certificates for Authentication, page 418

Viewing System Status, page 404. Backing Up and Restoring a Configuration, page 416. Managing Certificates for Authentication, page 418 This chapter describes how to maintain the configuration and firmware, reboot or reset the security appliance, manage the security license and digital certificates, and configure other features to help

More information

Administering System Center 2012 Configuration Manager

Administering System Center 2012 Configuration Manager Administering System Center 2012 Configuration Manager Duration: 5 Days Course Code:10747D About this Course This course describes how to configure and manage a System Center 2012 R Configuration Manager

More information

ESET Remote Administrator 6. Version 6.0 Product Details

ESET Remote Administrator 6. Version 6.0 Product Details ESET Remote Administrator 6 Version 6.0 Product Details ESET Remote Administrator 6.0 is a successor to ESET Remote Administrator V5.x, however represents a major step forward, completely new generation

More information

ITSM SERVICES. Delivering Technology Solutions With Passion

ITSM SERVICES. Delivering Technology Solutions With Passion ITSM SERVICES Delivering Technology Solutions With Passion 02 CONTENTS OVERVIEW CLIENTS SOLUTIONS WHAT WE DO PROFESSIONAL SERVICES Overview IT Pillars is a dynamic company, which has served, over the past

More information

Version v November 2015

Version v November 2015 Service Description HPE Quality Center Enterprise on Software-as-a-Service Version v2.0 26 November 2015 This Service Description describes the components and services included in HPE Quality Center Enterprise

More information

for businesses with more than 25 seats

for businesses with more than 25 seats for businesses with more than 25 seats ESET Business Solutions 1/6 Whether your business is just starting out or is established, there are a few things that you should expect from the software you use

More information

Software Center Update Publisher (SCUP) / Software Update Point (SUP) APSCNLAN Support

Software Center Update Publisher (SCUP) / Software Update Point (SUP) APSCNLAN Support Software Center Update Publisher (SCUP) / Software Update Point (SUP) APSCNLAN Support Table of Contents Setup WSUS and SCUP... 1 Setup WSUS for System Center Software Update Point (SUP)... 1 Installing

More information

INSIDE. Symantec AntiVirus for Microsoft Internet Security and Acceleration (ISA) Server. Enhanced virus protection for Web and SMTP traffic

INSIDE. Symantec AntiVirus for Microsoft Internet Security and Acceleration (ISA) Server. Enhanced virus protection for Web and SMTP traffic Virus Protection & Content Filtering TECHNOLOGY BRIEF Symantec AntiVirus for Microsoft Internet Security and Acceleration (ISA) Server Enhanced virus protection for Web and SMTP traffic INSIDE The need

More information

ESET REMOTE ADMINISTRATOR PLUG-IN FOR CONNECTWISE Technical Setup and User Guide

ESET REMOTE ADMINISTRATOR PLUG-IN FOR CONNECTWISE Technical Setup and User Guide ESET REMOTE ADMINISTRATOR PLUG-IN FOR CONNECTWISE Technical Setup and User Guide ESET REMOTE ADMINISTRATOR PLUG-INFOR CONNECTWISE Copyright 2017 by ESET, spol. s r.o. ESET Remote Administrator Plug-in

More information

Defense-in-Depth Against Malicious Software. Speaker name Title Group Microsoft Corporation

Defense-in-Depth Against Malicious Software. Speaker name Title Group Microsoft Corporation Defense-in-Depth Against Malicious Software Speaker name Title Group Microsoft Corporation Agenda Understanding the Characteristics of Malicious Software Malware Defense-in-Depth Malware Defense for Client

More information

Comodo ONE Software Version 3.3

Comodo ONE Software Version 3.3 rat Comodo ONE Software Version 3.3 Remote Monitoring and Management Quick Start Guide Guide Version 6.1.032817 Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013 Comodo ONE - Remote Monitoring

More information

User Guide. Version R95. English

User Guide. Version R95. English Software Management User Guide Version R95 English September 22, 2017 Copyright Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept

More information

Vendor: Microsoft. Exam Code: Exam Name: TS: Microsoft System Center Operations Manager 2007, Configuring. Version: Demo

Vendor: Microsoft. Exam Code: Exam Name: TS: Microsoft System Center Operations Manager 2007, Configuring. Version: Demo Vendor: Microsoft Exam Code: 70-400 Exam Name: TS: Microsoft System Center Operations Manager 2007, Configuring Version: Demo Question: 1 You have a System Center Operations Manager 2007 environment. You

More information

10747D: Administering System Center 2012 Configuration Manager

10747D: Administering System Center 2012 Configuration Manager 10747D: Administering System Center 2012 Course Details Course Code: 10747D Elements of this syllabus are subject to change. About this course Duration: Notes: 5 days This course syllabus should be used

More information

KYOCERA Net Admin User Guide

KYOCERA Net Admin User Guide KYOCERA Net Admin User Guide Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held liable

More information

Integration with Tenable Security Center

Integration with Tenable Security Center DEPLOYMENT GUIDE Integration with Tenable Security Center Outbound API 2017 Infoblox Inc. All rights reserved. Integration with Tenable Security Center August 2017 Page 1 of 10 Contents Introduction...

More information

Performing an ObserveIT Upgrade Using the Interactive Installer

Performing an ObserveIT Upgrade Using the Interactive Installer Performing an ObserveIT Upgrade Using the Interactive Installer ABOUT THIS DOCUMENT This document contains detailed procedures and instructions on how to upgrade ObserveIT by using the interactive "One

More information