INTRODUCTION PRE-CONFIGURATION
|
|
- Bethanie Houston
- 6 years ago
- Views:
Transcription
1 INTRODUCTION This article has been written to assist Office 365 (O365) tenant administrators implement and apply configurations for Identillect Technologies implementation of our Secure Send product offering. Secure Send provides the functionality needed to trigger a behind-the-scenes secure message delivery based on pre-defined keywords and patterns that warrant such action. Almost all of these configuration steps can be performed manually using the Exchange Admin Center in Office 365 user interface (UI). The pre-requisite step of disabling the Transport Neutral Encapsulation Format (TNEF) must be done using a PowerShell script. Note: This task is made up of a series of complex actions and should be handled by administrative personnel familiar with PowerShell and the O365 environment at an administrative level. Note: This article assumes that the O365 tenant these steps will be performed in has been implemented and is already being used at a production level. Note: The Pre-Configuration section of this article is mandatory. Please perform this action before moving forward. PRE-CONFIGURATION To successfully implement Identillect Technologies Secure Scan offering for the O365 environment, you must first disable Transport Neutral Encapsulation Format (TNEF). You can find more information on TNEF here. O365 tenant implementations do vary, as such, TNEF may already be disabled within your environment. If that is the case, you may skip this section. If TNEF is enabled, within your O365 tenant, please run the following commands omitting non-executed lines (#) or create a PowerShell script from all lines: # Disabling TNEF #Command to connect to Exchange Online $UserCredential = Get-Credential #Connect-msolservice -credential $UserCredential $Session = New-PSSession -ConfigurationName Microsoft.Exchange -ConnectionUri -Credential $UserCredential -Authentication Basic -AllowRedirection Import-PSSession $Session Write-Output "Imported Exchange Online PowerShell Session" # Disable TNEF
2 Set-RemoteDomain Default -TNEFEnabled $false Write-Output "Disabled TNEF" #Command to disconnect the remote session Remove-PSSession $Session Write-Output "Removed PS Session" Note: To re-enable TNEF at any time, simply set the Set-RemoteDomain Default -TNEFEnabled variable to $true CONFIGURATION Note: The configuration for Identillect Technologies Secure Scan for O365 offering is configured within the Exchange Online Admin Center. You must be an administrator for your O365 tenant to complete the following steps. Note: This article assumes you ve already signed into the Exchange Online Admin Center. Note: Screens may vary. Click Admin.
3 Expand Admin centers and click Exchange. Creating the Connector Identillect Technologies Secure Scan leverages our SMTP network to deliver secure messages. The following actions will guide you through establishing that connector. Click connectors under the mail flow category. Click the + icon to begin building the new connector.
4 Match the values with the provided screen and click Next. Match the values with the provided screen and click Next.
5 Choose the radio button for Only when I have a transport rule set up that redirects messages to this connector and click Next. Choose the radio button for Route through these smart hosts, click the + icon, and add securescan.identillect.com as the name for the new smart host and click Next. Choose the radio button for Any digital certificate, including self-signed certificates and click Next. Click Next to confirm the connector settings. Validating the Connector Validating the connector is a requirement to save the connection state.
6 Click the + icon to provide the test (s) of your choice and click Validate. Click Close and then click Save. Click Validate to begin the validation process.
7 Click Finish to close the general results screen. Note: If you d like to get more information for each validation task that is run, simply double-click the item. Click Close when you re done. This completes the process for creating and validating the connector.
8 Creating Mail Flow Rules Identillect Technologies Secure Scan for O365 offering utilizes keywords and patterns to determine what should be delivered as a secure message. The following actions will help you build the dictionary that will trigger the Secure Scan process and redirect messages to our SMTP network. Note: These actions assume that you are back in the Exchange Admin Center with access to all administrator categories. Click rules in the mail flow category. Click the + icon and click Create a new rule You ll now be presented with the new rule dialog. The following section(s) will walk you through fleshing out your Secure Scan dictionary.
9 Creating Mail Flow Rules Subject or Body Words The following steps will walk you through developing your dictionary for any trigger words/phrases contained within the subject or body of the message. Click More options to be presented with the full option set for the new rule dialog. Enter Secure Scan Keywords for Subject and Body in the Name: field. In the Apply this rule if drop-down field, choose the following nested options: The sender... > is external/internal. The value should be set to Inside the organization. Click the add condition button. Choose the following nested options: The subject or body > subject or body includes any of these words. This will launch the specify words or phrases dialog. The specify words or phrases dialog is where you will supply the words or phrases you want to trigger the Secure Scan process and redirect messages to our secure back-end. Entering words or phrases is as simple as typing in the word or phrase and clicking the + icon to add it to the dictionary. Words/Phrases we recommend are as follows: Social Security Number Credit Card Number SSN DOB Password Once you ve completed building out this list, click OK and move on.
10 In the *Do the following drop-down field, choose the following nested options: Redirect the message to > the following connector. In the select connector dialog, choose the Secure Scan SMTP connector you created earlier and click OK. To help prevent calendaring message items like meeting/appointment invites from getting captured by Secure Scan, add the following exception: Click add exception and choose the following nested options: The message properties > include the message type Select Calendaring from the drop-down options and click OK. Your mail flow rule should look similar to this: Click Save. Important Note: For organizations with existing mail flow rules, the rules created for Secure Scan should have a lower priority than the existing rules.
11 Creating Mail Flow Rules Attachment Words or Phrases The following steps will walk you through developing your dictionary for any trigger words/phrases contained within any attachments added to the message. Click the + icon and click Create a new rule Click More options to be presented with the full option set for the new rule dialog. Enter Secure Scan Keywords for Attachments in the Name: field. In the Apply this rule if drop-down field, choose the following nested options: The sender... > is external/internal. The value should be set to Inside the organization. Click the add condition button. Choose the following nested options: Any attachment > content includes any of these words. This will launch the specify words or phrases dialog. Recommendations for this list are the same as those provided in the previous mail flow section for Subject and Body Words or Phrases. Feel free to build out the list in greater detail. Click OK when you ve completed this action. In the *Do the following drop-down field, choose the following nested options: Redirect the message to > the following connector. In the select connector dialog, choose the Secure Scan SMTP connector you created earlier and click OK. To help prevent calendaring message items like meeting/appointment invites from getting captured by Secure Scan, add the following exception: Click add exception and choose the following nested options: The message properties > include the message type Select Calendaring from the drop-down options and click OK.
12 Your mail flow rule should look similar to this: Click Save. Creating Mail Flow Rules Text Patterns in the Subject or Body The following steps will walk you through developing your dictionary for any trigger text patterns contained within the subject or body of an message. We strongly recommend creating a separate mail flow rule for each pattern type you will be scanning for (i.e. xxx-xx-xxxx).
13 Click the + icon and click Create a new rule Click More options to be presented with the full option set for the new rule dialog. Enter US Social Security Number in the Name: field. In the Apply this rule if drop-down field, choose the following nested options: The sender... > is external/internal. The value should be set to Inside the organization. Click the add condition button. Choose the following nested options: The subject or body > subject or body matches these text patterns. This will launch the specify words or phrases dialog. As done in previous sections, you ll use the specify words or phrases dialog to populate your dictionary. Here you ll be using complex expressions to locate and take action on common patterns that may need to be delivered securely, such as social security numbers or phone numbers. For social security numbers, you may want to use the following regular expressions: SSN plain (no spaces or hyphens): \b(?!( ))\d{3}(?!00)\d{2}(?!0000)\d{4}\b SSN with hyphens: \b(?!( ))\d{3}-(?!00)\d{2}-(?!0000)\d{4}\b SSN with spaces: \b(?!( ))\d{3}[ ](?!00)\d{2}[ ](?!0000)\d{4}\b Once you ve completed building out this list, click OK and move on.
14 In the *Do the following drop-down field, choose the following nested options: Redirect the message to > the following connector. In the select connector dialog, choose the Secure Scan SMTP connector you created earlier and click OK. To help prevent calendaring message items like meeting/appointment invites from getting captured by Secure Scan, add the following exception: Click add exception and choose the following nested options: The message properties > include the message type Select Calendaring from the drop-down options and click OK. Your mail flow rule should look similar to this: Click Save.
15 To create regular expressions for patterns consistent with credit card number providers, follow the same steps used to create a rule for social security numbers but use the following patterns for credit card numbers: Amex plain (no spaces or hyphens): \b3[47][0-9]{13}\b Amex with hyphens: \b3[47][0-9]{2}-[0-9]{6}-[0-9]{5}\b Amex with spaces: \b3[47][0-9]{2}[ ][0-9]{6}[ ][0-9]{5}\b Visa plain (no spaces or hyphens): \b4[0-9]{12}(?:[0-9]{3})?\b Visa with hyphens: \b4[0-9]{3}-[0-9]{4}-[0-9]{4}-[0-9](?:[0-9]{3})?\b Visa with spaces: \b4[0-9]{3}[ ][0-9]{4}[ ][0-9]{4}[ ][0-9](?:[0-9]{3})?\b MasterCard plain (no spaces or hyphens): \b5[1-5][0-9]{14}\b \b2[2-7][0-9]{14}\b MasterCard with hyphens: \b5[1-5][0-9]{2}-[0-9]{4}-[0-9]{4}-[0-9]{4}\b \b2[2-7][0-9]{2}-[0-9]{4}-[0-9]{4}-[0-9]{4}\b MasterCard with spaces: \b5[1-5][0-9]{2}[ ][0-9]{4}[ ][0-9]{4}[ ][0-9]{4}\b \b2[2-7][0-9]{2}[ ][0-9]{4}[ ][0-9]{4}[ ][0-9]{4}\b IMPORTANT NOTE: It is crucial that you test these pattern matching rules to make sure that they are selecting the text patterns that you want. Failure to do so may result in messages being delivered without Identillect Technologies secure framework. Creating Mail Flow Rules Text Patterns in Attachments
16 The following steps will walk you through developing your dictionary for any trigger text patterns contained within attachments added to an message. We strongly recommend creating a separate mail flow rule for each pattern type you will be scanning for (i.e. xxx-xx-xxxx). Click the + icon and click Create a new rule Click More options to be presented with the full option set for the new rule dialog. Enter Secure Scan Keywords for Attachments in the Name: field. In the Apply this rule if drop-down field, choose the following nested options: The sender... > is external/internal. The value should be set to Inside the organization. Click the add condition button. Choose the following nested options: Any attachment > content includes any of these words. This will launch the specify words or phrases dialog. To help prevent calendaring message items like meeting/appointment invites from getting captured by Secure Scan, add the following exception: Click add exception and choose the following nested options: The message properties > include the message type Select Calendaring from the drop-down options and click OK. The same regular expressions apply for attachments as they do for subject and body. Simply replicate the actions you took in the previous sections to create the dictionary for scanning attachments for trigger patterns with Identillect Technologies Secure Scan offering.
17 Disabling Mail Flow Rules If you find the need to turn off the Secure Scan functionality outlined in this article, the process couldn t be simpler. Click Admin. Expand Admin centers and click Exchange. Click rules under the mail flow section.
18 Uncheck any rules that apply to the Secure Scan functionality. Secure Scan will no longer function. This concludes the workflow for adding Identillect Technologies Secure Scan for O365 to an O365 Tenant.
Calendar updated presence
Calendar updated presence Setting up MiCloud and Microsoft Exchange Server Table of Contents Copyright 2016 Mitel Networks Corporation 1. Preconditions and assumptions... 1 2. Presence synchronization
More informationCloud Secure. Microsoft Office 365. Configuration Guide. Product Release Document Revisions Published Date
Cloud Secure Microsoft Office 365 Configuration Guide Product Release Document Revisions Published Date 8.3R3 2.0 November 2017 Pulse Secure, LLC 2700 Zanker Road, Suite 200 San Jose CA 95134 https://www.pulsesecure.net.
More information365 Migration Playbook: GoDaddy IMAP to 365
365 Migration Playbook: GoDaddy IMAP to 365 GoDaddy IMAP to 365 Migration Playbook Prepared by Nick Ross Sales Engineer (nross@pax8.com) Table of Contents Planning Phase 1: Gather All the Necessary Credentials...
More informationRSA NetWitness Platform
RSA NetWitness Platform Event Source Log Configuration Guide Microsoft Office 365 Last Modified: Thursday, June 7, 2018 Event Source Product Information: Vendor: Microsoft Event Source: Office 365 Versions:
More informationHow to Configure Envelope (SMTP) Journaling for Microsoft Exchange Server 2013 and Newer Premium Journaling
How to Configure Envelope (SMTP) for Microsoft Exchange Server 2013 and Newer Premium This article refers to Legacy Release firmware or higher, and a MicrosoftExchange Server 2013 or 2016 environment utilizing
More informationHow to Configure Envelope (SMTP) Journaling for Microsoft Exchange Server 2013 and Newer Standard Journaling
How to Configure Envelope (SMTP) for Microsoft Exchange Server 2013 and Newer Standard This article refers to Legacy Release firmware or higher, and a Microsoft Exchange Server 2013 or 2016 environment utilizing
More informationGODADDY TO OFFICE 365 MIGRATION PLAYBOOK
GODADDY TO OFFICE 365 MIGRATION PLAYBOOK PROPERTY OF T-MINUS 365. ALL RIGHTS RESERVED. Table of Contents Planning Phase 1: Gather All the Necessary Credentials... 3 Planning Phase 2: Gather and Audit all
More informationHow to Configure Office 365 for Inbound and Outbound Mail
How to Configure Office 365 for Inbound and Outbound Mail You can configure Microsoft Office 365 with the Barracuda Email Security Service as your inbound and/or outbound mail gateway. If you make setting
More informationEnterprise Vault Setting up Exchange Server and Office 365 for SMTP Archiving and later
Enterprise Vault Setting up Exchange Server and Office 365 for SMTP Archiving 12.1 and later Enterprise Vault : Setting up Exchange Server and Office 365 for SMTP Archiving Last updated: 2018-06-18. Legal
More informationEnterprise Vault Setting up Exchange Server and Office 365 for SMTP Archiving and later
Enterprise Vault Setting up Exchange Server and Office 365 for SMTP Archiving 12.1 and later Enterprise Vault : Setting up Exchange Server and Office 365 for SMTP Archiving Last updated: 2018-12-03. Legal
More informationCalendar coexistence. Free/busy lookup services between G Suite, Office 365 and Exchange
Calendar coexistence Free/busy lookup services between G Suite, Office 365 and Exchange Copyright 2017 CLOUDIWAY. All rights reserved. Use of any CLOUDIWAY solution is governed by the license agreement
More informationOffice 365 PowerShell Daily Admin Tasks Version 1.0
Version 1.0 Ahmed Abdelwahed MCT ahmed@ Table of Contents Connect O365 Using PowerShell... 3 Create New Account... 3 Set User Photo... 3 Remove user photo... 3 Create Dynamic Distribution Group... 4 Add
More informationStep 4 - Choose Your Deployment
https://campus.barracuda.com/doc/51190798/ CONFIGURE G SUITE JOURNALING You must configure G Suite to send archived mail directly to the Barracuda Cloud Archiving Service. Google IP address ranges and user
More informationMicrosoft O365 Integration Guide
Microsoft O365 Integration Guide SecurAccess Integration Guide Version 1.0 08/18 O365 (via ADFS) Integration Guide Contents 1.1 SOLUTION SUMMARY... 3 1.2 GUIDE USAGE... 3 1.3 PREREQUISITES... 3 1.4 AUTHENTICATION...
More informationOffice 365 Standalone Security
The standalone Email Security option is available for purchase only through the Barracuda Self-Service Gateway or Barracuda MSP. Once you complete the Essentials for Office 365 Wizard, the Essentials page
More informationCA Mobile Device Management Configure Access Control for Using Exchange PowerShell cmdlets
CA Mobile Device Management Configure Access Control for Email Using Exchange PowerShell cmdlets This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter
More informationOracle Big Data Cloud Service, Oracle Storage Cloud Service, Oracle Database Cloud Service
Demo Introduction Keywords: Oracle Big Data Cloud Service, Oracle Storage Cloud Service, Oracle Database Cloud Service Goal of Demo: Oracle Big Data Preparation Cloud Services can ingest data from various
More informationSUITE TO OFFICE 365 MIGRATION PLAYBOOK
SUITE TO OFFICE 365 MIGRATION PLAYBOOK PROPERTY OF T-MINUS 365. ALL RIGHTS RESERVED. Table of Contents Planning Phase 1: Gather All the Necessary Credentials... 3 Prep Work Phase 1: Prepare G Suite Environment...
More informationMicrosoft Surface Hub Microsoft Surface Hub administrator's guide Intro to Microsoft Surface Hub Prepare your environment for Microsoft Surface Hub
Table of Contents Microsoft Surface Hub Microsoft Surface Hub administrator's guide Intro to Microsoft Surface Hub Prepare your environment for Microsoft Surface Hub Set up Microsoft Surface Hub Manage
More informationZetafax Exchange Online Connector Setup Guide Equisys Ltd
Zetafax Exchange Online Connector Setup Guide Zetafax Exchange Online Connector Setup Guide All rights reserved. No parts of this work may be reproduced in any form or by any means - graphic, electronic,
More informationSecuring Office 365 with Okta
Securing Office 365 with Okta Index Background Terms & Definitions Introduction Office 365 Authentication Methods Securing Federated Office 365 Using Okta Known Email Clients that Support Modern Authentication
More informationStep 3 - Deploy Compliance Edition for Exchange 2013 and Newer
Step 3 - Deploy Compliance Edition for Exchange 2013 and Newer Use this article to deploy the Barracuda Cloud Archiving Service component for Exchange Server 2013 and newer in your environment. You must
More informationRoomWizard Exchange Connector. Complete Implementation/Upgrade Guide Microsoft Exchange On-Premises Microsoft Office 365
RoomWizard Exchange Connector Complete Implementation/Upgrade Guide Microsoft Exchange On-Premises Microsoft Office 365 Table of Contents RoomWizard Exchange Connector... 1 Getting Started... 4 Before
More informationAdministration Guide
Administration Guide This guide will cover how to customize and lock down the SCOM 2012 Maintenance Mode Scheduler for your end users. Table of Contents Customize Look and Feel... 2 Enable Auditing of
More informationIBM Atlas Policy Distribution Administrators Guide: IER Connector. for IBM Atlas Suite v6
IBM Atlas Policy Distribution Administrators Guide: IER Connector for IBM Atlas Suite v6 IBM Atlas Policy Distribution: IER Connector This edition applies to version 6.0 of IBM Atlas Suite (product numbers
More informationTABLE OF CONTENTS. BookIT Room Scheduling Solution
USER GUIDE WWW.BOOKIT.TECH AUGUST 2017 1 2 3 4 5 6 7 8 9 WHAT S IN THE BOX SYSTEM REQUIREMENTS Hardware Exchange / Office 365 Google SETUP Mounting îsurface mounting îrecess mounting îmullion mounting
More informationOne Identity Manager Administration Guide for Connecting to Exchange Online
One Identity Manager 8.0.1 Administration Guide for Connecting to Copyright 2018 One Identity LLC. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software
More informationQuest Migration Manager Migrating to Microsoft Office 365
Quest Migration Manager 8.14 Migrating to Microsoft Office 365 2018 Quest Software Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in
More informationSearching Crashes Outlook
Barton's IT Services Limited PC Support for Home & Business Address: 33 Award Road, Stapehill, Wimborne, Dorset BH21 7NT Email: info@bartonsit.co.uk Company Number: 6683832 Phone: 01202 861077 Mob: 07868
More informationLong Term Disability Online Payment Instructions
If you are paying for Medical AND Dental: Long Term Disability Online Payment Instructions 1. On the Insurance Payments home screen, select Long Term Disability. 1 2. You will enter your Medical payment
More informationDocAve Content Shield v2.2 for SharePoint
DocAve Content Shield v2.2 for SharePoint User Guide For SharePoint 2010 Revision A Issued August 2012 1 Table of Contents Table of Contents... 2 About DocAve Content Shield for SharePoint... 4 Complementary
More informationMeeting Room App v1.2.2 User Guide
Meeting Room App v1.2.2 User Guide Sony Corporation Table of Contents Overview... 2 Requirements... 3 Installation and execution... 5 Install application of Display... 5 Install application of PC (Basic
More informationZL UA Exchange 2013 Archiving Configuration Guide
ZL UA Exchange 2013 Archiving Configuration Guide Version 8.0 January 2014 ZL Technologies, Inc. Copyright 2014 ZL Technologies, Inc.All rights reserved ZL Technologies, Inc. ( ZLTI, formerly known as
More informationManaging Spam. To access the spam settings in admin panel: 1. Login to the admin panel by entering valid login credentials.
Email Defense Admin Panel Managing Spam The admin panel enables you to configure spam settings for messages. Tuning your spam settings can help you reduce the number of spam messages that get through to
More informationIntegrate your CSP Direct Agreement
Overview: - The information needed to integrate your CSP Direct tenant is contained in this PDF Guide. You will be asked to create and access various authentication keys and which you need to do in the
More informationOrbital provide a secure (SSL) Mailserver to protect your privacy and accounts.
Email Configuration This document is designed to help our clients in setting up email accounts on popular devices and email client software. Orbital provide a secure (SSL) Mailserver to protect your privacy
More informationOracle Connector for Outlook Clinic Version
Oracle Connector for Outlook Clinic Version 9.0426 2 Required Information: 1. Your name:. 2. Your Kerberos Principle (username/e-mail):. 3. Your e-mail address:. 4. Your post office server po.mit.edu (i.e.
More informationSetup Guide for AD FS 3.0 on the Apprenda Platform
Setup Guide for AD FS 3.0 on the Apprenda Platform Last Updated for Apprenda 6.5.2 The Apprenda Platform leverages Active Directory Federation Services (AD FS) to support identity federation. AD FS and
More informationEntrust PartnerLink Login Instructions
Entrust PartnerLink Login Instructions Contents Introduction... 4 Purpose 4 Overview 4 Prerequisites 4 Instructions... 5 Entrust is a registered trademark of Entrust, Inc. in the United States and certain
More informationVMware AirWatch Cloud Connector Guide ACC Installation and Integration
VMware AirWatch Cloud Connector Guide ACC Installation and Integration Workspace ONE UEM v1810 Have documentation feedback? Submit a Documentation Feedback support ticket using the Support Wizard on support.air-watch.com.
More informationTECHNICAL TRAINING LAB INSTRUCTIONS
In this lab, you are going to add some batch fields for associating batch-level data with every document in your batch. You will learn how to configure and test an optical mark recognition (OMR) zone for
More informationConfiguration Guide. Requires Vorex version 3.9 or later and VSA version or later. English
Kaseya v2 Integration of VSA with Vorex Configuration Guide Requires Vorex version 3.9 or later and VSA version 9.3.0.11 or later English September 15, 2017 Copyright Agreement The purchase and use of
More informationLong Term Disability Online Payment Instructions
If you are paying for Medical ONLY: Long Term Disability Online Payment Instructions 1. On the Insurance Payments home screen, select Long Term Disability. 2. Enter the payment amount for Medical only
More informationDocAve Content Shield v2.2 for SharePoint
DocAve Content Shield v2.2 for SharePoint User Guide For SharePoint 2007 Revision A Issued August 2012 1 Table of Contents Table of Contents... 2 About DocAve Content Shield for SharePoint... 4 Complementary
More informationEvents User Guide for Microsoft Office Live Meeting from Global Crossing
for Microsoft Office Live Meeting from Global Crossing Contents Events User Guide for... 1 Microsoft Office Live Meeting from Global Crossing... 1 Contents... 1 Introduction... 2 About This Guide... 2
More informationConnecting to the NJITSecure wireless network.
Connecting to the NJITSecure wireless network. 1. Start by going to the Start menu and selecting Control Panel 2. Your control Panel will most likely be in Category view, you will need to change it to
More informationTechnology Note. ER/Studio: Upgrading from Repository (v ) to Team Server 2016+
Technology Note ER/Studio: Upgrading from Repository (v6.5-7.0) to Team Server 2016+ Updated 03/13/2017 ER/Studio: Upgrading from Repository (v6.5-7.0) to Team Server 2016+ With the release of ER/Studio
More informationConfiguring SAP Targets and Runtime Users
CHAPTER 4 Before you can create or run processes in your SAP environment, you must create the targets on which the processes will run. Targets are used to define specific environments where activities,
More informationEnabling the Bullhorn and Calendar Integration with Google Apps
Enabling the Bullhorn Email and Calendar Integration with Google Apps If you are interested in enabling this integration, please send a request to switch@bullhorn.com. Note that these instructions are
More informationMulti-Environment PowerShell console AD, Exchange and PowerCLI in one happy place!
Multi-Environment PowerShell console AD, Exchange and PowerCLI in one happy place! With the increase in the use of PowerShell as part of an administrator s toolkit, it can be challening with multiple shells
More informationQuest Desktop Authority Full Build Update Release Notes
Quest Desktop Authority Full Build Update 10.1.0.1006 Release Notes January 5, 2018 Version 10.1.0.1006 Importance: Mandatory Contents Readme Resolved Issues Compatibility of This Update Installing This
More informationEnterprise Vault.cloud Journaling Guide
Enterprise Vault.cloud Journaling Guide Enterprise Vault.cloud: Journaling Guide Last updated: 2018-01-30. Legal Notice Copyright 2018 Veritas Technologies LLC. All rights reserved. Veritas, the Veritas
More informationAuthor: Information Security Office Date Last Revised: 01/18/2012. Identity Finder User Guide
Author: Information Security Office Date Last Revised: 01/18/2012 Identity Finder User Guide Table of Contents Quick Start Guide... 3 User Manual... 5 What is PII (Personal Identifiable Information)?...
More informationAutoStore s Integration for Fujitsu Network Scanner 6000ns
AutoStore s Integration for Fujitsu Network Scanner 6000ns NSi has developed a new Capture component that allows Fujitsu network scanner 6000ns to be used to capture paper documents into AutoStore workflows.
More informationSMB Partner Tech Series
ModernBiz Grow E fficiently Track 1 SMB Partner Tech Series Office 365 Labs: Getting started with SharePoint Online, Office 365 Groups, Skype broadcasting, and Security and Compliance features Page 1 Copyright
More information1 Covene Cohesion Administrator Guide A Modular Platform for Video Conferencing Management October 9, 2017
1 Covene Cohesion Administrator Guide A Modular Platform for Video Conferencing Management October 9, 2017 Software Version 4.5 Document Revision 1.0 2017 Covene LLC, All Rights Reserved. Covene, the Covene
More informationAppSpider Enterprise. Getting Started Guide
AppSpider Enterprise Getting Started Guide Contents Contents 2 About AppSpider Enterprise 4 Getting Started (System Administrator) 5 Login 5 Client 6 Add Client 7 Cloud Engines 8 Scanner Groups 8 Account
More informationWorkshare Risk Analytics. Installation Guide
Workshare Risk Analytics Installation Guide Workshare Risk Analytics 1.4 July 2018 Workshare Risk Analytics Installation Guide Table of Contents Chapter 1: Introduction...3 What is Risk Analytics...4 System
More informationQuest Desktop Authority Full Build Update Release Notes
Quest Desktop Authority Full Build Update 10.2.0.256 Release Notes July 13, 2018 Version 10.2.0.256 Importance: Mandatory Contents Readme Resolved Issues Compatibility of This Update Installing This Update
More informationSkype for Business. Creating and Joining a Skype for Business Meeting
Skype for Business Creating and Joining a Skype for Business Meeting Table of Contents Create A Skype for Business Meeting... 3 Outlook 2013/2016 for PC... 3 Outlook 2016 for Mac... 4 Outlook Web App (http://email.miami.edu)...
More informationSBCSC Staff BYOD (bring your own device) Instructions: 08/11/2016
SBCSC Staff BYOD (bring your own device) Instructions: 08/11/2016 Teachers and staff, use these instructions to get a personal device of yours attached to the SBCSC BYOD wireless network. Once connected,
More informationVAM. PeopleSoft Value-Added Module (VAM) Deployment Guide
VAM PeopleSoft Value-Added Module (VAM) Deployment Guide Copyright Information 2018. SecureAuth is a registered trademark of SecureAuth Corporation. SecureAuth s IdP software, appliances, and other products
More informationVMware Workspace ONE UEM VMware AirWatch Cloud Connector
VMware AirWatch Cloud Connector VMware Workspace ONE UEM 1811 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ If you have comments about this
More informationPortfolioCenter. Exporting PortfolioCenter Data for Use with Tamarac Advisor
PortfolioCenter Tamarac Advisor Document ID: spt011058 Document Date: December 2, 2009 1997-2009 Schwab Performance Technologies Two Hannover Square, 13th Floor 434 Fayetteville Street Mall Raleigh, NC
More informationWeb Intelligence Rich Client Getting Started Business Objects 4.1
User Guide Web Intelligence Rich Client Getting Started Business Objects 4.1 Web Intelligence Rich Client Getting Started User Guide Contents Purpose of this Guide... 3 About Web Intelligence 4.1... 3
More informationBroadSoft Training FAQ
BroadSoft Training FAQ BroadSoft Learning Center Release 1.0 BroadSoft Training FAQ Common Questions How do I sign up for Certification courses? o There are two methods to enroll into Certification or
More informationAttach2Dynamics User Manual. Attach2Dynamics - User Manual. P a g e 1 of 23
Attach2Dynamics - User Manual P a g e 1 of 23 Content Introduction... 3 Configuring Connectors... 3 Authenticate... 9 Entity Configuration... 10 Visibility of Attach2Dynamics button... 12 Use of Attach2Dynamics...
More informationVMware AirWatch PowerShell Integration Guide Securing your infrastructure
VMware AirWatch PowerShell Integration Guide Securing your email infrastructure AirWatch v9.1 Have documentation feedback? Submit a Documentation Feedback support ticket using the Support Wizard on support.air-watch.com.
More informationMarketo ON24 Adapter. User Guide Version 4.1. Updated May 3, 2013
Marketo ON24 Adapter User Guide Version 4.1 Updated May 3, 2013 CONTENTS EVENT INTEGRATION OVERVIEW... 2 BEFORE YOU BEGIN... 3 REQUIREMENTS... 3 HOW TO CREATE AN EVENT IN MARKETO WITH AN ON24 INTEGRATION...
More informationNTP Software VFM. Administration Web Site for EMC Atmos User Manual. Version 6.1
NTP Software VFM Administration Web Site for EMC Atmos User Manual Version 6.1 This guide details the method for using NTP Software VFM Administration Web Site, from an administrator s perspective. Upon
More informationNew Dropbox Users (don t have a Dropbox account set up with your Exeter account)
The setup process will determine if you already have a Dropbox account associated with an Exeter email address, and if so, you'll be given a choice to move those contents to your Phillips Exeter Dropbox
More informationTable of Contents. VMware AirWatch: Technology Partner Integration
Table of Contents Lab Overview - HOL-1857-08-UEM - Workspace ONE UEM - Technology Partner Integration... 2 Lab Guidance... 3 Module 1 - F5 Integration with Workspace ONE UEM (30 min)... 9 Introduction...
More informationNETWRIX GROUP POLICY CHANGE REPORTER
NETWRIX GROUP POLICY CHANGE REPORTER ADMINISTRATOR S GUIDE Product Version: 7.2 November 2012. Legal Notice The information in this publication is furnished for information use only, and does not constitute
More informationZL UA Configuring Exchange 2010 for Archiving Guide. Version 7.0
ZL UA Configuring Exchange 2010 for Archiving Guide Version 7.0 ZL Technologies, Inc. Copyright 2011 ZL Technologies, Inc.All rights reserved ZL Technologies, Inc. ( ZLTI, formerly known as ZipLip ) and
More informationXcalenets Console Setup Guide. Xcalenets Console Setup Guide (Standalone version)
Xcalenets Console Setup Guide Xcalenets Console Setup Guide (Standalone version) 1 Content CONTENT... 2 Getting Started to Xcalenets Console Setup... 3 Account Level Introduction... 3 Login Console Setup...
More informationConfiguring Single Sign-on from the VMware Identity Manager Service to Marketo
Configuring Single Sign-on from the VMware Identity Manager Service to Marketo VMware Identity Manager JANUARY 2016 V1 Configuring Single Sign-On from VMware Identity Manager to Marketo Table of Contents
More informationSR L09 - Messaging Gateway, Encryption and Data Loss Prevention: Three Great Things Even Better Together Hands-On Lab
SR L09 - Messaging Gateway, Encryption and Data Loss Prevention: Three Great Things Even Better Together Hands-On Lab Description The messaging gateway has emerged as a key point of control for managing
More informationMicrosoft Lync Room System Deployment Guide Microsoft Lync Server 2013
Microsoft Lync Room System Deployment Guide Microsoft Lync Server 2013 Published: February 2014 This document is provided as-is. Information and views expressed in this document, including URL and other
More informationAutomating Administration with Windows PowerShell
Automating Administration with Windows PowerShell 10961; 5 Days, Instructor-led Course Description Learn how with Windows PowerShell 4.0, you can remotely manage multiple Windows based servers and automate
More informationHelp Document Series: Connecting to your Exchange mailbox via Outlook from off-campus
Help Document Series: Connecting to your Exchange mailbox via Outlook from off-campus This document will take you through setting up your Clark Exchange mailbox in Outlook 2003 from off-campus. This will
More informationExecuting PowerShell Agent Commands
This chapter contains the following sections: Cisco UCS Director Orchestrator Workflow and PowerShell Command, page 1 Execute PowerShell Command Task, page 2 Execute Native PowerShell Command Task, page
More informationIntegration Guide. PingFederate SAML Integration Guide (SP-Initiated Workflow)
Integration Guide PingFederate SAML Integration Guide (SP-Initiated Workflow) Copyright Information 2018. SecureAuth is a registered trademark of SecureAuth Corporation. SecureAuth s IdP software, appliances,
More informationWorkspace Administrator Help File
Workspace Administrator Help File Table of Contents HotDocs Workspace Help File... 1 Getting Started with Workspace... 3 What is HotDocs Workspace?... 3 Getting Started with Workspace... 3 To access Workspace...
More informationConfiguring SharePoint 2007
26636.book Page 77 Thursday, February 14, 2008 4:38 PM Chapter 3 Configuring SharePoint 2007 MICROSOFT EXAM OBJECTIVES COVERED IN THIS CHAPTER: Manage Administration Manage Central Admin UI Manage the
More informationConfiguring 802.1X Settings on the WAP351
Article ID: 5078 Configuring 802.1X Settings on the WAP351 Objective IEEE 802.1X authentication allows the WAP device to gain access to a secured wired network. You can configure the WAP device as an 802.1X
More informationParent User Guide.
Parent User Guide www.intellimedia.ca Table of Contents INTRODUCTION 3 PARENT USER INSTRUCTIONS 4 PARENT ACCESS TO SCHOOLENGAGE 5 NEW PARENT SIGN UP 5 EXISTING PARENT SIGN IN PARENT PORTAL 7 EXISTING PARENT
More informationSPAR. Installation Guide. Workflow for SharePoint. ITLAQ Technologies
SPAR Workflow for SharePoint 0 ITLAQ Technologies www.itlaq.com Table of Contents I. System Requirements...2 II. Install SPARK Workflow on your environment...2 III. Obtain SPARK Workflow License...7 IV.
More informationTechnology Note. ER/Studio: Upgrading from Repository (v ) to Team Server 17.x
Technology Note ER/Studio: Upgrading from Repository (v6.5-7.0) to Team Server 17.x Updated 07/09/2018 ER/Studio: Upgrading from Repository (v6.5-7.0) to Team Server 17.x With the release of ER/Studio
More informationWDD Fall 2016Group 4 Project Report
WDD 5633-2 Fall 2016Group 4 Project Report A Web Database Application on Loan Service System Devi Sai Geetha Alapati #7 Mohan Krishna Bhimanadam #24 Rohit Yadav Nethi #8 Bhavana Ganne #11 Prathyusha Mandala
More informationStep 1 - Set Up Essentials for Office 365
For each Barracuda Cloud Control account, you can have either a linked Barracuda Email Security Gateway appliance or a Barracuda Email Security Service subscription. You cannot use a single Barracuda Cloud
More informationIBM Lotus Sametime Media Manager Cluster Deployment Walk-through Part VI- Bandwidth Manager IBM Corporation
IBM Lotus Sametime 8.5.2 Media Manager Cluster Deployment Walk-through Part VI- Bandwidth Manager Prerequisites for this part of the walk-through We've completed parts I, II, II, IV, and V Lotus Domino
More informationDocAve 6 SharePoint Migrator
DocAve 6 SharePoint Migrator User Guide Service Pack 4, Cumulative Update 2 Revision C Issued July 2014 Table of Contents About SharePoint Migration... 5 Complementary Products... 5 Submitting Documentation
More information[Type here] ID Capture V1.0
ID CAPTURE USER GUIDE V 1.0 03/02/2016 Contents Installing... 2 Installation Requirements... 2 Installation... 3 Installing USB Camera... 3 Getting Started... 4 Orientation... 5 Configuring... 6 System...
More informationWelcome to Cart32, Sincerely, Cart32 Support Team
Welcome to Cart32, The purpose of the Getting Started Guide is to cover the basic settings required to start using Cart32. There is an Introduction section to familiarize new users with the Cart32 software
More informationManaging User Roles and Users in LMS
7 CHAPTER This chapter explains the following: Managing Roles Managing Users Managing Roles A role is a collection of privileges that dictate the type of system access you have. The Manage User Roles workflow
More informationVMware AirWatch: Directory and Certificate Authority
Table of Contents Lab Overview - HOL-1857-06-UEM - VMware AirWatch: Directory and Certificate Authority Integration... 2 Lab Guidance... 3 Module 1 - Advanced AirWatch Configuration, AD Integration/Certificates
More informationNETWRIX WINDOWS SERVER CHANGE REPORTER
NETWRIX WINDOWS SERVER CHANGE REPORTER ADMINISTRATOR S GUIDE Product Version: 4.0 June 2013. Legal Notice The information in this publication is furnished for information use only, and does not constitute
More informationAlert Configuration on the Cisco WAP121 and WAP321 Access Point
Email Alert Configuration on the Cisco WAP121 and WAP321 Access Point Objective System events are activities in the system that may require attention and necessary actions to be taken in order to run the
More informationIntegrate your CSP Direct Agreement
Overview: - The information needed to integrate your CSP Direct tenant is contained in this PDF Guide. You will be asked to create and access various authentication keys and which you need to do in the
More informationExecuting PowerShell Agent Commands
This chapter contains the following sections: Cisco UCS Director Orchestrator Workflow and PowerShell Command, page 1 Execute PowerShell Command Task, page 2 Execute Native PowerShell Command Task, page
More information