INTRODUCTION PRE-CONFIGURATION

Size: px
Start display at page:

Download "INTRODUCTION PRE-CONFIGURATION"

Transcription

1 INTRODUCTION This article has been written to assist Office 365 (O365) tenant administrators implement and apply configurations for Identillect Technologies implementation of our Secure Send product offering. Secure Send provides the functionality needed to trigger a behind-the-scenes secure message delivery based on pre-defined keywords and patterns that warrant such action. Almost all of these configuration steps can be performed manually using the Exchange Admin Center in Office 365 user interface (UI). The pre-requisite step of disabling the Transport Neutral Encapsulation Format (TNEF) must be done using a PowerShell script. Note: This task is made up of a series of complex actions and should be handled by administrative personnel familiar with PowerShell and the O365 environment at an administrative level. Note: This article assumes that the O365 tenant these steps will be performed in has been implemented and is already being used at a production level. Note: The Pre-Configuration section of this article is mandatory. Please perform this action before moving forward. PRE-CONFIGURATION To successfully implement Identillect Technologies Secure Scan offering for the O365 environment, you must first disable Transport Neutral Encapsulation Format (TNEF). You can find more information on TNEF here. O365 tenant implementations do vary, as such, TNEF may already be disabled within your environment. If that is the case, you may skip this section. If TNEF is enabled, within your O365 tenant, please run the following commands omitting non-executed lines (#) or create a PowerShell script from all lines: # Disabling TNEF #Command to connect to Exchange Online $UserCredential = Get-Credential #Connect-msolservice -credential $UserCredential $Session = New-PSSession -ConfigurationName Microsoft.Exchange -ConnectionUri -Credential $UserCredential -Authentication Basic -AllowRedirection Import-PSSession $Session Write-Output "Imported Exchange Online PowerShell Session" # Disable TNEF

2 Set-RemoteDomain Default -TNEFEnabled $false Write-Output "Disabled TNEF" #Command to disconnect the remote session Remove-PSSession $Session Write-Output "Removed PS Session" Note: To re-enable TNEF at any time, simply set the Set-RemoteDomain Default -TNEFEnabled variable to $true CONFIGURATION Note: The configuration for Identillect Technologies Secure Scan for O365 offering is configured within the Exchange Online Admin Center. You must be an administrator for your O365 tenant to complete the following steps. Note: This article assumes you ve already signed into the Exchange Online Admin Center. Note: Screens may vary. Click Admin.

3 Expand Admin centers and click Exchange. Creating the Connector Identillect Technologies Secure Scan leverages our SMTP network to deliver secure messages. The following actions will guide you through establishing that connector. Click connectors under the mail flow category. Click the + icon to begin building the new connector.

4 Match the values with the provided screen and click Next. Match the values with the provided screen and click Next.

5 Choose the radio button for Only when I have a transport rule set up that redirects messages to this connector and click Next. Choose the radio button for Route through these smart hosts, click the + icon, and add securescan.identillect.com as the name for the new smart host and click Next. Choose the radio button for Any digital certificate, including self-signed certificates and click Next. Click Next to confirm the connector settings. Validating the Connector Validating the connector is a requirement to save the connection state.

6 Click the + icon to provide the test (s) of your choice and click Validate. Click Close and then click Save. Click Validate to begin the validation process.

7 Click Finish to close the general results screen. Note: If you d like to get more information for each validation task that is run, simply double-click the item. Click Close when you re done. This completes the process for creating and validating the connector.

8 Creating Mail Flow Rules Identillect Technologies Secure Scan for O365 offering utilizes keywords and patterns to determine what should be delivered as a secure message. The following actions will help you build the dictionary that will trigger the Secure Scan process and redirect messages to our SMTP network. Note: These actions assume that you are back in the Exchange Admin Center with access to all administrator categories. Click rules in the mail flow category. Click the + icon and click Create a new rule You ll now be presented with the new rule dialog. The following section(s) will walk you through fleshing out your Secure Scan dictionary.

9 Creating Mail Flow Rules Subject or Body Words The following steps will walk you through developing your dictionary for any trigger words/phrases contained within the subject or body of the message. Click More options to be presented with the full option set for the new rule dialog. Enter Secure Scan Keywords for Subject and Body in the Name: field. In the Apply this rule if drop-down field, choose the following nested options: The sender... > is external/internal. The value should be set to Inside the organization. Click the add condition button. Choose the following nested options: The subject or body > subject or body includes any of these words. This will launch the specify words or phrases dialog. The specify words or phrases dialog is where you will supply the words or phrases you want to trigger the Secure Scan process and redirect messages to our secure back-end. Entering words or phrases is as simple as typing in the word or phrase and clicking the + icon to add it to the dictionary. Words/Phrases we recommend are as follows: Social Security Number Credit Card Number SSN DOB Password Once you ve completed building out this list, click OK and move on.

10 In the *Do the following drop-down field, choose the following nested options: Redirect the message to > the following connector. In the select connector dialog, choose the Secure Scan SMTP connector you created earlier and click OK. To help prevent calendaring message items like meeting/appointment invites from getting captured by Secure Scan, add the following exception: Click add exception and choose the following nested options: The message properties > include the message type Select Calendaring from the drop-down options and click OK. Your mail flow rule should look similar to this: Click Save. Important Note: For organizations with existing mail flow rules, the rules created for Secure Scan should have a lower priority than the existing rules.

11 Creating Mail Flow Rules Attachment Words or Phrases The following steps will walk you through developing your dictionary for any trigger words/phrases contained within any attachments added to the message. Click the + icon and click Create a new rule Click More options to be presented with the full option set for the new rule dialog. Enter Secure Scan Keywords for Attachments in the Name: field. In the Apply this rule if drop-down field, choose the following nested options: The sender... > is external/internal. The value should be set to Inside the organization. Click the add condition button. Choose the following nested options: Any attachment > content includes any of these words. This will launch the specify words or phrases dialog. Recommendations for this list are the same as those provided in the previous mail flow section for Subject and Body Words or Phrases. Feel free to build out the list in greater detail. Click OK when you ve completed this action. In the *Do the following drop-down field, choose the following nested options: Redirect the message to > the following connector. In the select connector dialog, choose the Secure Scan SMTP connector you created earlier and click OK. To help prevent calendaring message items like meeting/appointment invites from getting captured by Secure Scan, add the following exception: Click add exception and choose the following nested options: The message properties > include the message type Select Calendaring from the drop-down options and click OK.

12 Your mail flow rule should look similar to this: Click Save. Creating Mail Flow Rules Text Patterns in the Subject or Body The following steps will walk you through developing your dictionary for any trigger text patterns contained within the subject or body of an message. We strongly recommend creating a separate mail flow rule for each pattern type you will be scanning for (i.e. xxx-xx-xxxx).

13 Click the + icon and click Create a new rule Click More options to be presented with the full option set for the new rule dialog. Enter US Social Security Number in the Name: field. In the Apply this rule if drop-down field, choose the following nested options: The sender... > is external/internal. The value should be set to Inside the organization. Click the add condition button. Choose the following nested options: The subject or body > subject or body matches these text patterns. This will launch the specify words or phrases dialog. As done in previous sections, you ll use the specify words or phrases dialog to populate your dictionary. Here you ll be using complex expressions to locate and take action on common patterns that may need to be delivered securely, such as social security numbers or phone numbers. For social security numbers, you may want to use the following regular expressions: SSN plain (no spaces or hyphens): \b(?!( ))\d{3}(?!00)\d{2}(?!0000)\d{4}\b SSN with hyphens: \b(?!( ))\d{3}-(?!00)\d{2}-(?!0000)\d{4}\b SSN with spaces: \b(?!( ))\d{3}[ ](?!00)\d{2}[ ](?!0000)\d{4}\b Once you ve completed building out this list, click OK and move on.

14 In the *Do the following drop-down field, choose the following nested options: Redirect the message to > the following connector. In the select connector dialog, choose the Secure Scan SMTP connector you created earlier and click OK. To help prevent calendaring message items like meeting/appointment invites from getting captured by Secure Scan, add the following exception: Click add exception and choose the following nested options: The message properties > include the message type Select Calendaring from the drop-down options and click OK. Your mail flow rule should look similar to this: Click Save.

15 To create regular expressions for patterns consistent with credit card number providers, follow the same steps used to create a rule for social security numbers but use the following patterns for credit card numbers: Amex plain (no spaces or hyphens): \b3[47][0-9]{13}\b Amex with hyphens: \b3[47][0-9]{2}-[0-9]{6}-[0-9]{5}\b Amex with spaces: \b3[47][0-9]{2}[ ][0-9]{6}[ ][0-9]{5}\b Visa plain (no spaces or hyphens): \b4[0-9]{12}(?:[0-9]{3})?\b Visa with hyphens: \b4[0-9]{3}-[0-9]{4}-[0-9]{4}-[0-9](?:[0-9]{3})?\b Visa with spaces: \b4[0-9]{3}[ ][0-9]{4}[ ][0-9]{4}[ ][0-9](?:[0-9]{3})?\b MasterCard plain (no spaces or hyphens): \b5[1-5][0-9]{14}\b \b2[2-7][0-9]{14}\b MasterCard with hyphens: \b5[1-5][0-9]{2}-[0-9]{4}-[0-9]{4}-[0-9]{4}\b \b2[2-7][0-9]{2}-[0-9]{4}-[0-9]{4}-[0-9]{4}\b MasterCard with spaces: \b5[1-5][0-9]{2}[ ][0-9]{4}[ ][0-9]{4}[ ][0-9]{4}\b \b2[2-7][0-9]{2}[ ][0-9]{4}[ ][0-9]{4}[ ][0-9]{4}\b IMPORTANT NOTE: It is crucial that you test these pattern matching rules to make sure that they are selecting the text patterns that you want. Failure to do so may result in messages being delivered without Identillect Technologies secure framework. Creating Mail Flow Rules Text Patterns in Attachments

16 The following steps will walk you through developing your dictionary for any trigger text patterns contained within attachments added to an message. We strongly recommend creating a separate mail flow rule for each pattern type you will be scanning for (i.e. xxx-xx-xxxx). Click the + icon and click Create a new rule Click More options to be presented with the full option set for the new rule dialog. Enter Secure Scan Keywords for Attachments in the Name: field. In the Apply this rule if drop-down field, choose the following nested options: The sender... > is external/internal. The value should be set to Inside the organization. Click the add condition button. Choose the following nested options: Any attachment > content includes any of these words. This will launch the specify words or phrases dialog. To help prevent calendaring message items like meeting/appointment invites from getting captured by Secure Scan, add the following exception: Click add exception and choose the following nested options: The message properties > include the message type Select Calendaring from the drop-down options and click OK. The same regular expressions apply for attachments as they do for subject and body. Simply replicate the actions you took in the previous sections to create the dictionary for scanning attachments for trigger patterns with Identillect Technologies Secure Scan offering.

17 Disabling Mail Flow Rules If you find the need to turn off the Secure Scan functionality outlined in this article, the process couldn t be simpler. Click Admin. Expand Admin centers and click Exchange. Click rules under the mail flow section.

18 Uncheck any rules that apply to the Secure Scan functionality. Secure Scan will no longer function. This concludes the workflow for adding Identillect Technologies Secure Scan for O365 to an O365 Tenant.

Calendar updated presence

Calendar updated presence Calendar updated presence Setting up MiCloud and Microsoft Exchange Server Table of Contents Copyright 2016 Mitel Networks Corporation 1. Preconditions and assumptions... 1 2. Presence synchronization

More information

Cloud Secure. Microsoft Office 365. Configuration Guide. Product Release Document Revisions Published Date

Cloud Secure. Microsoft Office 365. Configuration Guide. Product Release Document Revisions Published Date Cloud Secure Microsoft Office 365 Configuration Guide Product Release Document Revisions Published Date 8.3R3 2.0 November 2017 Pulse Secure, LLC 2700 Zanker Road, Suite 200 San Jose CA 95134 https://www.pulsesecure.net.

More information

365 Migration Playbook: GoDaddy IMAP to 365

365 Migration Playbook: GoDaddy IMAP to 365 365 Migration Playbook: GoDaddy IMAP to 365 GoDaddy IMAP to 365 Migration Playbook Prepared by Nick Ross Sales Engineer (nross@pax8.com) Table of Contents Planning Phase 1: Gather All the Necessary Credentials...

More information

RSA NetWitness Platform

RSA NetWitness Platform RSA NetWitness Platform Event Source Log Configuration Guide Microsoft Office 365 Last Modified: Thursday, June 7, 2018 Event Source Product Information: Vendor: Microsoft Event Source: Office 365 Versions:

More information

How to Configure Envelope (SMTP) Journaling for Microsoft Exchange Server 2013 and Newer Premium Journaling

How to Configure Envelope (SMTP) Journaling for Microsoft Exchange Server 2013 and Newer Premium Journaling How to Configure Envelope (SMTP) for Microsoft Exchange Server 2013 and Newer Premium This article refers to Legacy Release firmware or higher, and a MicrosoftExchange Server 2013 or 2016 environment utilizing

More information

How to Configure Envelope (SMTP) Journaling for Microsoft Exchange Server 2013 and Newer Standard Journaling

How to Configure Envelope (SMTP) Journaling for Microsoft Exchange Server 2013 and Newer Standard Journaling How to Configure Envelope (SMTP) for Microsoft Exchange Server 2013 and Newer Standard This article refers to Legacy Release firmware or higher, and a Microsoft Exchange Server 2013 or 2016 environment utilizing

More information

GODADDY TO OFFICE 365 MIGRATION PLAYBOOK

GODADDY TO OFFICE 365 MIGRATION PLAYBOOK GODADDY TO OFFICE 365 MIGRATION PLAYBOOK PROPERTY OF T-MINUS 365. ALL RIGHTS RESERVED. Table of Contents Planning Phase 1: Gather All the Necessary Credentials... 3 Planning Phase 2: Gather and Audit all

More information

How to Configure Office 365 for Inbound and Outbound Mail

How to Configure Office 365 for Inbound and Outbound Mail How to Configure Office 365 for Inbound and Outbound Mail You can configure Microsoft Office 365 with the Barracuda Email Security Service as your inbound and/or outbound mail gateway. If you make setting

More information

Enterprise Vault Setting up Exchange Server and Office 365 for SMTP Archiving and later

Enterprise Vault Setting up Exchange Server and Office 365 for SMTP Archiving and later Enterprise Vault Setting up Exchange Server and Office 365 for SMTP Archiving 12.1 and later Enterprise Vault : Setting up Exchange Server and Office 365 for SMTP Archiving Last updated: 2018-06-18. Legal

More information

Enterprise Vault Setting up Exchange Server and Office 365 for SMTP Archiving and later

Enterprise Vault Setting up Exchange Server and Office 365 for SMTP Archiving and later Enterprise Vault Setting up Exchange Server and Office 365 for SMTP Archiving 12.1 and later Enterprise Vault : Setting up Exchange Server and Office 365 for SMTP Archiving Last updated: 2018-12-03. Legal

More information

Calendar coexistence. Free/busy lookup services between G Suite, Office 365 and Exchange

Calendar coexistence. Free/busy lookup services between G Suite, Office 365 and Exchange Calendar coexistence Free/busy lookup services between G Suite, Office 365 and Exchange Copyright 2017 CLOUDIWAY. All rights reserved. Use of any CLOUDIWAY solution is governed by the license agreement

More information

Office 365 PowerShell Daily Admin Tasks Version 1.0

Office 365 PowerShell Daily Admin Tasks Version 1.0 Version 1.0 Ahmed Abdelwahed MCT ahmed@ Table of Contents Connect O365 Using PowerShell... 3 Create New Account... 3 Set User Photo... 3 Remove user photo... 3 Create Dynamic Distribution Group... 4 Add

More information

Step 4 - Choose Your Deployment

Step 4 - Choose Your Deployment https://campus.barracuda.com/doc/51190798/ CONFIGURE G SUITE JOURNALING You must configure G Suite to send archived mail directly to the Barracuda Cloud Archiving Service. Google IP address ranges and user

More information

Microsoft O365 Integration Guide

Microsoft O365 Integration Guide Microsoft O365 Integration Guide SecurAccess Integration Guide Version 1.0 08/18 O365 (via ADFS) Integration Guide Contents 1.1 SOLUTION SUMMARY... 3 1.2 GUIDE USAGE... 3 1.3 PREREQUISITES... 3 1.4 AUTHENTICATION...

More information

Office 365 Standalone Security

Office 365 Standalone  Security The standalone Email Security option is available for purchase only through the Barracuda Self-Service Gateway or Barracuda MSP. Once you complete the Essentials for Office 365 Wizard, the Essentials page

More information

CA Mobile Device Management Configure Access Control for Using Exchange PowerShell cmdlets

CA Mobile Device Management Configure Access Control for  Using Exchange PowerShell cmdlets CA Mobile Device Management Configure Access Control for Email Using Exchange PowerShell cmdlets This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter

More information

Oracle Big Data Cloud Service, Oracle Storage Cloud Service, Oracle Database Cloud Service

Oracle Big Data Cloud Service, Oracle Storage Cloud Service, Oracle Database Cloud Service Demo Introduction Keywords: Oracle Big Data Cloud Service, Oracle Storage Cloud Service, Oracle Database Cloud Service Goal of Demo: Oracle Big Data Preparation Cloud Services can ingest data from various

More information

SUITE TO OFFICE 365 MIGRATION PLAYBOOK

SUITE TO OFFICE 365 MIGRATION PLAYBOOK SUITE TO OFFICE 365 MIGRATION PLAYBOOK PROPERTY OF T-MINUS 365. ALL RIGHTS RESERVED. Table of Contents Planning Phase 1: Gather All the Necessary Credentials... 3 Prep Work Phase 1: Prepare G Suite Environment...

More information

Microsoft Surface Hub Microsoft Surface Hub administrator's guide Intro to Microsoft Surface Hub Prepare your environment for Microsoft Surface Hub

Microsoft Surface Hub Microsoft Surface Hub administrator's guide Intro to Microsoft Surface Hub Prepare your environment for Microsoft Surface Hub Table of Contents Microsoft Surface Hub Microsoft Surface Hub administrator's guide Intro to Microsoft Surface Hub Prepare your environment for Microsoft Surface Hub Set up Microsoft Surface Hub Manage

More information

Zetafax Exchange Online Connector Setup Guide Equisys Ltd

Zetafax Exchange Online Connector Setup Guide Equisys Ltd Zetafax Exchange Online Connector Setup Guide Zetafax Exchange Online Connector Setup Guide All rights reserved. No parts of this work may be reproduced in any form or by any means - graphic, electronic,

More information

Securing Office 365 with Okta

Securing Office 365 with Okta Securing Office 365 with Okta Index Background Terms & Definitions Introduction Office 365 Authentication Methods Securing Federated Office 365 Using Okta Known Email Clients that Support Modern Authentication

More information

Step 3 - Deploy Compliance Edition for Exchange 2013 and Newer

Step 3 - Deploy Compliance Edition for Exchange 2013 and Newer Step 3 - Deploy Compliance Edition for Exchange 2013 and Newer Use this article to deploy the Barracuda Cloud Archiving Service component for Exchange Server 2013 and newer in your environment. You must

More information

RoomWizard Exchange Connector. Complete Implementation/Upgrade Guide Microsoft Exchange On-Premises Microsoft Office 365

RoomWizard Exchange Connector. Complete Implementation/Upgrade Guide Microsoft Exchange On-Premises Microsoft Office 365 RoomWizard Exchange Connector Complete Implementation/Upgrade Guide Microsoft Exchange On-Premises Microsoft Office 365 Table of Contents RoomWizard Exchange Connector... 1 Getting Started... 4 Before

More information

Administration Guide

Administration Guide Administration Guide This guide will cover how to customize and lock down the SCOM 2012 Maintenance Mode Scheduler for your end users. Table of Contents Customize Look and Feel... 2 Enable Auditing of

More information

IBM Atlas Policy Distribution Administrators Guide: IER Connector. for IBM Atlas Suite v6

IBM Atlas Policy Distribution Administrators Guide: IER Connector. for IBM Atlas Suite v6 IBM Atlas Policy Distribution Administrators Guide: IER Connector for IBM Atlas Suite v6 IBM Atlas Policy Distribution: IER Connector This edition applies to version 6.0 of IBM Atlas Suite (product numbers

More information

TABLE OF CONTENTS. BookIT Room Scheduling Solution

TABLE OF CONTENTS. BookIT Room Scheduling Solution USER GUIDE WWW.BOOKIT.TECH AUGUST 2017 1 2 3 4 5 6 7 8 9 WHAT S IN THE BOX SYSTEM REQUIREMENTS Hardware Exchange / Office 365 Google SETUP Mounting îsurface mounting îrecess mounting îmullion mounting

More information

One Identity Manager Administration Guide for Connecting to Exchange Online

One Identity Manager Administration Guide for Connecting to Exchange Online One Identity Manager 8.0.1 Administration Guide for Connecting to Copyright 2018 One Identity LLC. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software

More information

Quest Migration Manager Migrating to Microsoft Office 365

Quest Migration Manager Migrating to Microsoft Office 365 Quest Migration Manager 8.14 Migrating to Microsoft Office 365 2018 Quest Software Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in

More information

Searching Crashes Outlook

Searching Crashes Outlook Barton's IT Services Limited PC Support for Home & Business Address: 33 Award Road, Stapehill, Wimborne, Dorset BH21 7NT Email: info@bartonsit.co.uk Company Number: 6683832 Phone: 01202 861077 Mob: 07868

More information

Long Term Disability Online Payment Instructions

Long Term Disability Online Payment Instructions If you are paying for Medical AND Dental: Long Term Disability Online Payment Instructions 1. On the Insurance Payments home screen, select Long Term Disability. 1 2. You will enter your Medical payment

More information

DocAve Content Shield v2.2 for SharePoint

DocAve Content Shield v2.2 for SharePoint DocAve Content Shield v2.2 for SharePoint User Guide For SharePoint 2010 Revision A Issued August 2012 1 Table of Contents Table of Contents... 2 About DocAve Content Shield for SharePoint... 4 Complementary

More information

Meeting Room App v1.2.2 User Guide

Meeting Room App v1.2.2 User Guide Meeting Room App v1.2.2 User Guide Sony Corporation Table of Contents Overview... 2 Requirements... 3 Installation and execution... 5 Install application of Display... 5 Install application of PC (Basic

More information

ZL UA Exchange 2013 Archiving Configuration Guide

ZL UA Exchange 2013 Archiving Configuration Guide ZL UA Exchange 2013 Archiving Configuration Guide Version 8.0 January 2014 ZL Technologies, Inc. Copyright 2014 ZL Technologies, Inc.All rights reserved ZL Technologies, Inc. ( ZLTI, formerly known as

More information

Managing Spam. To access the spam settings in admin panel: 1. Login to the admin panel by entering valid login credentials.

Managing Spam. To access the spam settings in admin panel: 1. Login to the admin panel by entering valid login credentials. Email Defense Admin Panel Managing Spam The admin panel enables you to configure spam settings for messages. Tuning your spam settings can help you reduce the number of spam messages that get through to

More information

Integrate your CSP Direct Agreement

Integrate your CSP Direct Agreement Overview: - The information needed to integrate your CSP Direct tenant is contained in this PDF Guide. You will be asked to create and access various authentication keys and which you need to do in the

More information

Orbital provide a secure (SSL) Mailserver to protect your privacy and accounts.

Orbital provide a secure (SSL) Mailserver to protect your privacy and  accounts. Email Configuration This document is designed to help our clients in setting up email accounts on popular devices and email client software. Orbital provide a secure (SSL) Mailserver to protect your privacy

More information

Oracle Connector for Outlook Clinic Version

Oracle Connector for Outlook Clinic Version Oracle Connector for Outlook Clinic Version 9.0426 2 Required Information: 1. Your name:. 2. Your Kerberos Principle (username/e-mail):. 3. Your e-mail address:. 4. Your post office server po.mit.edu (i.e.

More information

Setup Guide for AD FS 3.0 on the Apprenda Platform

Setup Guide for AD FS 3.0 on the Apprenda Platform Setup Guide for AD FS 3.0 on the Apprenda Platform Last Updated for Apprenda 6.5.2 The Apprenda Platform leverages Active Directory Federation Services (AD FS) to support identity federation. AD FS and

More information

Entrust PartnerLink Login Instructions

Entrust PartnerLink Login Instructions Entrust PartnerLink Login Instructions Contents Introduction... 4 Purpose 4 Overview 4 Prerequisites 4 Instructions... 5 Entrust is a registered trademark of Entrust, Inc. in the United States and certain

More information

VMware AirWatch Cloud Connector Guide ACC Installation and Integration

VMware AirWatch Cloud Connector Guide ACC Installation and Integration VMware AirWatch Cloud Connector Guide ACC Installation and Integration Workspace ONE UEM v1810 Have documentation feedback? Submit a Documentation Feedback support ticket using the Support Wizard on support.air-watch.com.

More information

TECHNICAL TRAINING LAB INSTRUCTIONS

TECHNICAL TRAINING LAB INSTRUCTIONS In this lab, you are going to add some batch fields for associating batch-level data with every document in your batch. You will learn how to configure and test an optical mark recognition (OMR) zone for

More information

Configuration Guide. Requires Vorex version 3.9 or later and VSA version or later. English

Configuration Guide. Requires Vorex version 3.9 or later and VSA version or later. English Kaseya v2 Integration of VSA with Vorex Configuration Guide Requires Vorex version 3.9 or later and VSA version 9.3.0.11 or later English September 15, 2017 Copyright Agreement The purchase and use of

More information

Long Term Disability Online Payment Instructions

Long Term Disability Online Payment Instructions If you are paying for Medical ONLY: Long Term Disability Online Payment Instructions 1. On the Insurance Payments home screen, select Long Term Disability. 2. Enter the payment amount for Medical only

More information

DocAve Content Shield v2.2 for SharePoint

DocAve Content Shield v2.2 for SharePoint DocAve Content Shield v2.2 for SharePoint User Guide For SharePoint 2007 Revision A Issued August 2012 1 Table of Contents Table of Contents... 2 About DocAve Content Shield for SharePoint... 4 Complementary

More information

Events User Guide for Microsoft Office Live Meeting from Global Crossing

Events User Guide for Microsoft Office Live Meeting from Global Crossing for Microsoft Office Live Meeting from Global Crossing Contents Events User Guide for... 1 Microsoft Office Live Meeting from Global Crossing... 1 Contents... 1 Introduction... 2 About This Guide... 2

More information

Connecting to the NJITSecure wireless network.

Connecting to the NJITSecure wireless network. Connecting to the NJITSecure wireless network. 1. Start by going to the Start menu and selecting Control Panel 2. Your control Panel will most likely be in Category view, you will need to change it to

More information

Technology Note. ER/Studio: Upgrading from Repository (v ) to Team Server 2016+

Technology Note. ER/Studio: Upgrading from Repository (v ) to Team Server 2016+ Technology Note ER/Studio: Upgrading from Repository (v6.5-7.0) to Team Server 2016+ Updated 03/13/2017 ER/Studio: Upgrading from Repository (v6.5-7.0) to Team Server 2016+ With the release of ER/Studio

More information

Configuring SAP Targets and Runtime Users

Configuring SAP Targets and Runtime Users CHAPTER 4 Before you can create or run processes in your SAP environment, you must create the targets on which the processes will run. Targets are used to define specific environments where activities,

More information

Enabling the Bullhorn and Calendar Integration with Google Apps

Enabling the Bullhorn  and Calendar Integration with Google Apps Enabling the Bullhorn Email and Calendar Integration with Google Apps If you are interested in enabling this integration, please send a request to switch@bullhorn.com. Note that these instructions are

More information

Multi-Environment PowerShell console AD, Exchange and PowerCLI in one happy place!

Multi-Environment PowerShell console AD, Exchange and PowerCLI in one happy place! Multi-Environment PowerShell console AD, Exchange and PowerCLI in one happy place! With the increase in the use of PowerShell as part of an administrator s toolkit, it can be challening with multiple shells

More information

Quest Desktop Authority Full Build Update Release Notes

Quest Desktop Authority Full Build Update Release Notes Quest Desktop Authority Full Build Update 10.1.0.1006 Release Notes January 5, 2018 Version 10.1.0.1006 Importance: Mandatory Contents Readme Resolved Issues Compatibility of This Update Installing This

More information

Enterprise Vault.cloud Journaling Guide

Enterprise Vault.cloud Journaling Guide Enterprise Vault.cloud Journaling Guide Enterprise Vault.cloud: Journaling Guide Last updated: 2018-01-30. Legal Notice Copyright 2018 Veritas Technologies LLC. All rights reserved. Veritas, the Veritas

More information

Author: Information Security Office Date Last Revised: 01/18/2012. Identity Finder User Guide

Author: Information Security Office Date Last Revised: 01/18/2012. Identity Finder User Guide Author: Information Security Office Date Last Revised: 01/18/2012 Identity Finder User Guide Table of Contents Quick Start Guide... 3 User Manual... 5 What is PII (Personal Identifiable Information)?...

More information

AutoStore s Integration for Fujitsu Network Scanner 6000ns

AutoStore s Integration for Fujitsu Network Scanner 6000ns AutoStore s Integration for Fujitsu Network Scanner 6000ns NSi has developed a new Capture component that allows Fujitsu network scanner 6000ns to be used to capture paper documents into AutoStore workflows.

More information

SMB Partner Tech Series

SMB Partner Tech Series ModernBiz Grow E fficiently Track 1 SMB Partner Tech Series Office 365 Labs: Getting started with SharePoint Online, Office 365 Groups, Skype broadcasting, and Security and Compliance features Page 1 Copyright

More information

1 Covene Cohesion Administrator Guide A Modular Platform for Video Conferencing Management October 9, 2017

1 Covene Cohesion Administrator Guide A Modular Platform for Video Conferencing Management October 9, 2017 1 Covene Cohesion Administrator Guide A Modular Platform for Video Conferencing Management October 9, 2017 Software Version 4.5 Document Revision 1.0 2017 Covene LLC, All Rights Reserved. Covene, the Covene

More information

AppSpider Enterprise. Getting Started Guide

AppSpider Enterprise. Getting Started Guide AppSpider Enterprise Getting Started Guide Contents Contents 2 About AppSpider Enterprise 4 Getting Started (System Administrator) 5 Login 5 Client 6 Add Client 7 Cloud Engines 8 Scanner Groups 8 Account

More information

Workshare Risk Analytics. Installation Guide

Workshare Risk Analytics. Installation Guide Workshare Risk Analytics Installation Guide Workshare Risk Analytics 1.4 July 2018 Workshare Risk Analytics Installation Guide Table of Contents Chapter 1: Introduction...3 What is Risk Analytics...4 System

More information

Quest Desktop Authority Full Build Update Release Notes

Quest Desktop Authority Full Build Update Release Notes Quest Desktop Authority Full Build Update 10.2.0.256 Release Notes July 13, 2018 Version 10.2.0.256 Importance: Mandatory Contents Readme Resolved Issues Compatibility of This Update Installing This Update

More information

Skype for Business. Creating and Joining a Skype for Business Meeting

Skype for Business. Creating and Joining a Skype for Business Meeting Skype for Business Creating and Joining a Skype for Business Meeting Table of Contents Create A Skype for Business Meeting... 3 Outlook 2013/2016 for PC... 3 Outlook 2016 for Mac... 4 Outlook Web App (http://email.miami.edu)...

More information

SBCSC Staff BYOD (bring your own device) Instructions: 08/11/2016

SBCSC Staff BYOD (bring your own device) Instructions: 08/11/2016 SBCSC Staff BYOD (bring your own device) Instructions: 08/11/2016 Teachers and staff, use these instructions to get a personal device of yours attached to the SBCSC BYOD wireless network. Once connected,

More information

VAM. PeopleSoft Value-Added Module (VAM) Deployment Guide

VAM. PeopleSoft Value-Added Module (VAM) Deployment Guide VAM PeopleSoft Value-Added Module (VAM) Deployment Guide Copyright Information 2018. SecureAuth is a registered trademark of SecureAuth Corporation. SecureAuth s IdP software, appliances, and other products

More information

VMware Workspace ONE UEM VMware AirWatch Cloud Connector

VMware Workspace ONE UEM VMware AirWatch Cloud Connector VMware AirWatch Cloud Connector VMware Workspace ONE UEM 1811 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ If you have comments about this

More information

PortfolioCenter. Exporting PortfolioCenter Data for Use with Tamarac Advisor

PortfolioCenter. Exporting PortfolioCenter Data for Use with Tamarac Advisor PortfolioCenter Tamarac Advisor Document ID: spt011058 Document Date: December 2, 2009 1997-2009 Schwab Performance Technologies Two Hannover Square, 13th Floor 434 Fayetteville Street Mall Raleigh, NC

More information

Web Intelligence Rich Client Getting Started Business Objects 4.1

Web Intelligence Rich Client Getting Started Business Objects 4.1 User Guide Web Intelligence Rich Client Getting Started Business Objects 4.1 Web Intelligence Rich Client Getting Started User Guide Contents Purpose of this Guide... 3 About Web Intelligence 4.1... 3

More information

BroadSoft Training FAQ

BroadSoft Training FAQ BroadSoft Training FAQ BroadSoft Learning Center Release 1.0 BroadSoft Training FAQ Common Questions How do I sign up for Certification courses? o There are two methods to enroll into Certification or

More information

Attach2Dynamics User Manual. Attach2Dynamics - User Manual. P a g e 1 of 23

Attach2Dynamics User Manual. Attach2Dynamics - User Manual. P a g e 1 of 23 Attach2Dynamics - User Manual P a g e 1 of 23 Content Introduction... 3 Configuring Connectors... 3 Authenticate... 9 Entity Configuration... 10 Visibility of Attach2Dynamics button... 12 Use of Attach2Dynamics...

More information

VMware AirWatch PowerShell Integration Guide Securing your infrastructure

VMware AirWatch PowerShell Integration Guide Securing your  infrastructure VMware AirWatch PowerShell Integration Guide Securing your email infrastructure AirWatch v9.1 Have documentation feedback? Submit a Documentation Feedback support ticket using the Support Wizard on support.air-watch.com.

More information

Marketo ON24 Adapter. User Guide Version 4.1. Updated May 3, 2013

Marketo ON24 Adapter. User Guide Version 4.1. Updated May 3, 2013 Marketo ON24 Adapter User Guide Version 4.1 Updated May 3, 2013 CONTENTS EVENT INTEGRATION OVERVIEW... 2 BEFORE YOU BEGIN... 3 REQUIREMENTS... 3 HOW TO CREATE AN EVENT IN MARKETO WITH AN ON24 INTEGRATION...

More information

NTP Software VFM. Administration Web Site for EMC Atmos User Manual. Version 6.1

NTP Software VFM. Administration Web Site for EMC Atmos User Manual. Version 6.1 NTP Software VFM Administration Web Site for EMC Atmos User Manual Version 6.1 This guide details the method for using NTP Software VFM Administration Web Site, from an administrator s perspective. Upon

More information

New Dropbox Users (don t have a Dropbox account set up with your Exeter account)

New Dropbox Users (don t have a Dropbox account set up with your Exeter  account) The setup process will determine if you already have a Dropbox account associated with an Exeter email address, and if so, you'll be given a choice to move those contents to your Phillips Exeter Dropbox

More information

Table of Contents. VMware AirWatch: Technology Partner Integration

Table of Contents. VMware AirWatch: Technology Partner Integration Table of Contents Lab Overview - HOL-1857-08-UEM - Workspace ONE UEM - Technology Partner Integration... 2 Lab Guidance... 3 Module 1 - F5 Integration with Workspace ONE UEM (30 min)... 9 Introduction...

More information

NETWRIX GROUP POLICY CHANGE REPORTER

NETWRIX GROUP POLICY CHANGE REPORTER NETWRIX GROUP POLICY CHANGE REPORTER ADMINISTRATOR S GUIDE Product Version: 7.2 November 2012. Legal Notice The information in this publication is furnished for information use only, and does not constitute

More information

ZL UA Configuring Exchange 2010 for Archiving Guide. Version 7.0

ZL UA Configuring Exchange 2010 for Archiving Guide. Version 7.0 ZL UA Configuring Exchange 2010 for Archiving Guide Version 7.0 ZL Technologies, Inc. Copyright 2011 ZL Technologies, Inc.All rights reserved ZL Technologies, Inc. ( ZLTI, formerly known as ZipLip ) and

More information

Xcalenets Console Setup Guide. Xcalenets Console Setup Guide (Standalone version)

Xcalenets Console Setup Guide. Xcalenets Console Setup Guide (Standalone version) Xcalenets Console Setup Guide Xcalenets Console Setup Guide (Standalone version) 1 Content CONTENT... 2 Getting Started to Xcalenets Console Setup... 3 Account Level Introduction... 3 Login Console Setup...

More information

Configuring Single Sign-on from the VMware Identity Manager Service to Marketo

Configuring Single Sign-on from the VMware Identity Manager Service to Marketo Configuring Single Sign-on from the VMware Identity Manager Service to Marketo VMware Identity Manager JANUARY 2016 V1 Configuring Single Sign-On from VMware Identity Manager to Marketo Table of Contents

More information

SR L09 - Messaging Gateway, Encryption and Data Loss Prevention: Three Great Things Even Better Together Hands-On Lab

SR L09 - Messaging Gateway, Encryption and Data Loss Prevention: Three Great Things Even Better Together Hands-On Lab SR L09 - Messaging Gateway, Encryption and Data Loss Prevention: Three Great Things Even Better Together Hands-On Lab Description The messaging gateway has emerged as a key point of control for managing

More information

Microsoft Lync Room System Deployment Guide Microsoft Lync Server 2013

Microsoft Lync Room System Deployment Guide Microsoft Lync Server 2013 Microsoft Lync Room System Deployment Guide Microsoft Lync Server 2013 Published: February 2014 This document is provided as-is. Information and views expressed in this document, including URL and other

More information

Automating Administration with Windows PowerShell

Automating Administration with Windows PowerShell Automating Administration with Windows PowerShell 10961; 5 Days, Instructor-led Course Description Learn how with Windows PowerShell 4.0, you can remotely manage multiple Windows based servers and automate

More information

Help Document Series: Connecting to your Exchange mailbox via Outlook from off-campus

Help Document Series: Connecting to your Exchange mailbox via Outlook from off-campus Help Document Series: Connecting to your Exchange mailbox via Outlook from off-campus This document will take you through setting up your Clark Exchange mailbox in Outlook 2003 from off-campus. This will

More information

Executing PowerShell Agent Commands

Executing PowerShell Agent Commands This chapter contains the following sections: Cisco UCS Director Orchestrator Workflow and PowerShell Command, page 1 Execute PowerShell Command Task, page 2 Execute Native PowerShell Command Task, page

More information

Integration Guide. PingFederate SAML Integration Guide (SP-Initiated Workflow)

Integration Guide. PingFederate SAML Integration Guide (SP-Initiated Workflow) Integration Guide PingFederate SAML Integration Guide (SP-Initiated Workflow) Copyright Information 2018. SecureAuth is a registered trademark of SecureAuth Corporation. SecureAuth s IdP software, appliances,

More information

Workspace Administrator Help File

Workspace Administrator Help File Workspace Administrator Help File Table of Contents HotDocs Workspace Help File... 1 Getting Started with Workspace... 3 What is HotDocs Workspace?... 3 Getting Started with Workspace... 3 To access Workspace...

More information

Configuring SharePoint 2007

Configuring SharePoint 2007 26636.book Page 77 Thursday, February 14, 2008 4:38 PM Chapter 3 Configuring SharePoint 2007 MICROSOFT EXAM OBJECTIVES COVERED IN THIS CHAPTER: Manage Administration Manage Central Admin UI Manage the

More information

Configuring 802.1X Settings on the WAP351

Configuring 802.1X Settings on the WAP351 Article ID: 5078 Configuring 802.1X Settings on the WAP351 Objective IEEE 802.1X authentication allows the WAP device to gain access to a secured wired network. You can configure the WAP device as an 802.1X

More information

Parent User Guide.

Parent User Guide. Parent User Guide www.intellimedia.ca Table of Contents INTRODUCTION 3 PARENT USER INSTRUCTIONS 4 PARENT ACCESS TO SCHOOLENGAGE 5 NEW PARENT SIGN UP 5 EXISTING PARENT SIGN IN PARENT PORTAL 7 EXISTING PARENT

More information

SPAR. Installation Guide. Workflow for SharePoint. ITLAQ Technologies

SPAR. Installation Guide. Workflow for SharePoint. ITLAQ Technologies SPAR Workflow for SharePoint 0 ITLAQ Technologies www.itlaq.com Table of Contents I. System Requirements...2 II. Install SPARK Workflow on your environment...2 III. Obtain SPARK Workflow License...7 IV.

More information

Technology Note. ER/Studio: Upgrading from Repository (v ) to Team Server 17.x

Technology Note. ER/Studio: Upgrading from Repository (v ) to Team Server 17.x Technology Note ER/Studio: Upgrading from Repository (v6.5-7.0) to Team Server 17.x Updated 07/09/2018 ER/Studio: Upgrading from Repository (v6.5-7.0) to Team Server 17.x With the release of ER/Studio

More information

WDD Fall 2016Group 4 Project Report

WDD Fall 2016Group 4 Project Report WDD 5633-2 Fall 2016Group 4 Project Report A Web Database Application on Loan Service System Devi Sai Geetha Alapati #7 Mohan Krishna Bhimanadam #24 Rohit Yadav Nethi #8 Bhavana Ganne #11 Prathyusha Mandala

More information

Step 1 - Set Up Essentials for Office 365

Step 1 - Set Up Essentials for Office 365 For each Barracuda Cloud Control account, you can have either a linked Barracuda Email Security Gateway appliance or a Barracuda Email Security Service subscription. You cannot use a single Barracuda Cloud

More information

IBM Lotus Sametime Media Manager Cluster Deployment Walk-through Part VI- Bandwidth Manager IBM Corporation

IBM Lotus Sametime Media Manager Cluster Deployment Walk-through Part VI- Bandwidth Manager IBM Corporation IBM Lotus Sametime 8.5.2 Media Manager Cluster Deployment Walk-through Part VI- Bandwidth Manager Prerequisites for this part of the walk-through We've completed parts I, II, II, IV, and V Lotus Domino

More information

DocAve 6 SharePoint Migrator

DocAve 6 SharePoint Migrator DocAve 6 SharePoint Migrator User Guide Service Pack 4, Cumulative Update 2 Revision C Issued July 2014 Table of Contents About SharePoint Migration... 5 Complementary Products... 5 Submitting Documentation

More information

[Type here] ID Capture V1.0

[Type here] ID Capture V1.0 ID CAPTURE USER GUIDE V 1.0 03/02/2016 Contents Installing... 2 Installation Requirements... 2 Installation... 3 Installing USB Camera... 3 Getting Started... 4 Orientation... 5 Configuring... 6 System...

More information

Welcome to Cart32, Sincerely, Cart32 Support Team

Welcome to Cart32, Sincerely, Cart32 Support Team Welcome to Cart32, The purpose of the Getting Started Guide is to cover the basic settings required to start using Cart32. There is an Introduction section to familiarize new users with the Cart32 software

More information

Managing User Roles and Users in LMS

Managing User Roles and Users in LMS 7 CHAPTER This chapter explains the following: Managing Roles Managing Users Managing Roles A role is a collection of privileges that dictate the type of system access you have. The Manage User Roles workflow

More information

VMware AirWatch: Directory and Certificate Authority

VMware AirWatch: Directory and Certificate Authority Table of Contents Lab Overview - HOL-1857-06-UEM - VMware AirWatch: Directory and Certificate Authority Integration... 2 Lab Guidance... 3 Module 1 - Advanced AirWatch Configuration, AD Integration/Certificates

More information

NETWRIX WINDOWS SERVER CHANGE REPORTER

NETWRIX WINDOWS SERVER CHANGE REPORTER NETWRIX WINDOWS SERVER CHANGE REPORTER ADMINISTRATOR S GUIDE Product Version: 4.0 June 2013. Legal Notice The information in this publication is furnished for information use only, and does not constitute

More information

Alert Configuration on the Cisco WAP121 and WAP321 Access Point

Alert Configuration on the Cisco WAP121 and WAP321 Access Point Email Alert Configuration on the Cisco WAP121 and WAP321 Access Point Objective System events are activities in the system that may require attention and necessary actions to be taken in order to run the

More information

Integrate your CSP Direct Agreement

Integrate your CSP Direct Agreement Overview: - The information needed to integrate your CSP Direct tenant is contained in this PDF Guide. You will be asked to create and access various authentication keys and which you need to do in the

More information

Executing PowerShell Agent Commands

Executing PowerShell Agent Commands This chapter contains the following sections: Cisco UCS Director Orchestrator Workflow and PowerShell Command, page 1 Execute PowerShell Command Task, page 2 Execute Native PowerShell Command Task, page

More information