How to create or export a list of unassigned DIGIPASS in IDENTIKEY Authentication Server?

Size: px
Start display at page:

Download "How to create or export a list of unassigned DIGIPASS in IDENTIKEY Authentication Server?"

Transcription

1 KB How to create or export a list of unassigned DIGIPASS in IDENTIKEY Authentication Server? Creation date: 01/12/2009 Last Review: 11/12/2012 Revision number: 2 Document type: How To Security status: EXTERNAL Summary Depending on the data store used (AD or ODBC) there are different possibilities in IDENTIKEY Authentication Server to create a list of unassigned DIGIPASS. This article gives an overview and procedure. Details. The different possibilities to generate a list of unassigned DIGIPASS are: 1. Use the IDENTIKEY Authentication Server web administration to make a list of unassigned DIGIPASS. This method can be used when an ODBC database is used as data store. With this method, you can generate a list on the display, but you cannot export it to a file. In the web administration tool, select Find/manage from the DIGIPASS tab: In the screen with selection criteria, use the No radio button for the Assigned? property as shown in the screenshot below. Then press the Search button. Page 1 of 9

2 The result page will show a list of the unassigned DIGIPASS: 2. Use the Saved Query Unassigned Digipass. This method can be used when AD is used as data store. With this method, you can generate a list on the display, but you cannot export it to a file. When the IDENTIKEY Authentication Server Active Directory Users and Computers (ADUC) extensions are installed, a number of saved queries are installed. Open and select the Saved Query Unassigned Digipass in the ADUC as shown in the screenshot below. You can right-click a DIGIPASS from the result pane and open its properties to check its exact location in AD from the Object tab. Page 2 of 9

3 3. Use the reporting in the web administration to generate an XML list of unassigned DIGIPASS. This method can be used with AD and ODBC data store. Select the Define report option from the REPORTS tab: Enter a report name and select List analysis as Type of report. Press the NEXT button: Page 3 of 9

4 Select Grouping Level = Digipass and Data source = Digipass. Then press the NEXT button: Add a query with the values as shown in the screenshot below. Then press the NEXT button. Press the NEXT button in the Query overview screen: Page 4 of 9

5 Set the report permissions as desired and press the NEXT button: Select the radio button use default XML template only and press the NEXT button: Confirm the overview screen with the FINISH button: Page 5 of 9

6 Select the option List from the REPORTS tab and select the report we just created: Press the RUN button from the available actions: Page 6 of 9

7 Select the report options as shown in the screenshot below: Do not add any runtime queries, just press the NEXT button: (the query has been configured in the report definition) View the report by selecting the Open link: The report is also available from the directory C:\Program Files\VASCO\Identikey 3.1\reports Page 7 of 9

8 4. Use a TCL script to generate a list of unassigned DIGIPASS on the screen and in a text file. This method can be used with AD and ODBC data store. The TCL script to be used is shown below: (put the script in a textfile with name Create List Unassigned DIGIPASS.TCL ) puts "\n\ntcl script to create a list of all Unassigned DIGIPASS Devices. For each DP, return:\n\ \tserial number\n\ \tdomain of the DIGIPASS\n\ \tdigipass Type\n" #open output file set out [open "test.txt" w] Page 8 of 9

9 # get a list of all DPs that are Unassigned in a variable dplist set dplist [digipass query {status unassigned} {serial_no domain dp_type}] puts "Number of DP found: [llength $dplist]" puts "\n\n" # for each unassigned DIGIPASS that has been found, output the data (serial_no, domain and DP_type) to display and file. foreach dp $dplist { # output to the console puts "[lindex $dp 1], [lindex $dp 3], [lindex $dp 5]" # output to the file puts $out "[lindex $dp 1], [lindex $dp 3], [lindex $dp 5]" } #close output file close $out Execute the TCL script with the command dpadmincmd as shown below for an ODBC data store: Execute the TCL script with the command dpadmincmd as shown below for an AD data store: Page 9 of 9

Running TCL Scripts on an IDENTIKEY Appliance. Creation date: 24/06/2016 Last Review: 26/07/2016 Revision number: 2

Running TCL Scripts on an IDENTIKEY Appliance. Creation date: 24/06/2016 Last Review: 26/07/2016 Revision number: 2 KB 160094 Running TCL Scripts on an IDENTIKEY Appliance Creation date: 24/06/2016 Last Review: 26/07/2016 Revision number: 2 Document type: How To Security status: EXTERNAL Summary Executing a TCL script

More information

Creation date: 03/01/2011 Last Review: 12/12/2012 Revision number: 3

Creation date: 03/01/2011 Last Review: 12/12/2012 Revision number: 3 KB 160004 How to define custom reports in IDENTIKEY Server? Creation date: 03/01/2011 Last Review: 12/12/2012 Revision number: 3 Document type: How To Security status: EXTERNAL Summary IDENTIKEY Authentication

More information

DIGIPASS en/de-cryption problem after migration from IDENTIKEY Authentication Server 3.2 AD to 3.4 AD.

DIGIPASS en/de-cryption problem after migration from IDENTIKEY Authentication Server 3.2 AD to 3.4 AD. KB 120159 DIGIPASS en/de-cryption problem after migration from IDENTIKEY Authentication Server 3.2 AD to 3.4 AD. Creation date: 05/10/2012 Last Review: 12/12/2012 Revision number: 2 Document type: How

More information

How to force IDENTIKEY Authentication Server 3.3 AD configuration wizard to ask encryption key again?

How to force IDENTIKEY Authentication Server 3.3 AD configuration wizard to ask encryption key again? KB 120135 How to force IDENTIKEY Authentication Server 3.3 AD configuration wizard to ask encryption key again? Creation date: 15/09/2011 Last Review: 11/12/2012 Revision number: 4 Document type: How To

More information

Creation date: 23/06/2017 Last Review: 23/06/2017 Revision number: 2

Creation date: 23/06/2017 Last Review: 23/06/2017 Revision number: 2 KB 160125 IDENTIKEY Authentication Server (IAS) 3.12 Introduces Maker/Checker Authorization. This article describes how it works, how to configure it and how to test it. Creation date: 23/06/2017 Last

More information

Migration from VACMAN Middleware 3.0 AD to IDENTIKEY Authentication Server 3.3 AD.

Migration from VACMAN Middleware 3.0 AD to IDENTIKEY Authentication Server 3.3 AD. KB 120134 Migration from VACMAN Middleware 3.0 AD to IDENTIKEY Authentication Server 3.3 AD. Creation date: 05/09/2011 Last Review: 11/12/2012 Revision number: 7 Document type: How To Security status:

More information

Creation date: 19/03/2010 Last Review: 08/06/2010 Revision number: 3

Creation date: 19/03/2010 Last Review: 08/06/2010 Revision number: 3 KB 110064 How To install a Citrix or OWA Filter with axsguard Identifier? Creation date: 19/03/2010 Last Review: 08/06/2010 Revision number: 3 Document type: How To Security status: EXTERNAL Summary This

More information

Authenticate an IIS Forms page with DIGIPASS Authentication Module for OWA. Creation date: 17/06/2016 Last Review: 17/06/2016 Revision number: 2

Authenticate an IIS Forms page with DIGIPASS Authentication Module for OWA. Creation date: 17/06/2016 Last Review: 17/06/2016 Revision number: 2 KB 160091 Authenticate an IIS Forms page with DIGIPASS Authentication Module for OWA Creation date: 17/06/2016 Last Review: 17/06/2016 Revision number: 2 Document type: How To Security status: EXTERNAL

More information

How to enable and read the full trace file for IDENTIKEY Authentication Server 3.1, step by step.

How to enable and read the full trace file for IDENTIKEY Authentication Server 3.1, step by step. KB 150021 How to enable and read the full trace file for IDENTIKEY Authentication Server 3.1, step by step. Creation date: 27/11/2009 Last Review: 10/12/2012 Revision number: 3 Document type: How To Security

More information

MDC Configuration for provider MessageBird on IDENTIKEY Server 3.5. Creation date: 07/02/2014 Last Review: 7/02/2014 Revision number: 1

MDC Configuration for provider MessageBird on IDENTIKEY Server 3.5. Creation date: 07/02/2014 Last Review: 7/02/2014 Revision number: 1 KB 120185 MDC Configuration for provider MessageBird on IDENTIKEY Server 3.5. Creation date: 07/02/2014 Last Review: 7/02/2014 Revision number: 1 Document type: How To Security status: EXTERNAL Summary

More information

How to enable and read the full trace file for IDENTIKEY Authentication Server 3.4, step by step.

How to enable and read the full trace file for IDENTIKEY Authentication Server 3.4, step by step. KB 160032 How to enable and read the full trace file for IDENTIKEY Authentication Server 3.4, step by step. Creation date: 10/09/2013 Last Review: 10/09/2013 Revision number: 2 Document type: How To Security

More information

IDENTIKEY Authentication Server

IDENTIKEY Authentication Server IDENTIKEY Authentication Server Release Notes 3.8 1. Introduction 1. Introduction Welcome to IDENTIKEY Authentication Server 3.8! This document covers the following topics: New features and enhancements

More information

Note: You can click the black arrow in the upper righthand corner to close and reopen the Navigation Pane. 2. Click the New Worklist button.

Note: You can click the black arrow in the upper righthand corner to close and reopen the Navigation Pane. 2. Click the New Worklist button. This Desktop Procedure demonstrates the steps for creating an Issue Worklist and an Activity Worklist in QIM, viewing the Worklist in the QIM Worklists screen, and exporting the Worklist to an Excel document.

More information

Invalid upgrade path error when trying to upgrade from IAS3.10 to IAS3.11. Creation date: 22/11/2016 Last Review: 7/12/2016 Revision number: 2

Invalid upgrade path error when trying to upgrade from IAS3.10 to IAS3.11. Creation date: 22/11/2016 Last Review: 7/12/2016 Revision number: 2 KB 150180 Invalid upgrade path error when trying to upgrade from IAS3.10 to IAS3.11. Creation date: 22/11/2016 Last Review: 7/12/2016 Revision number: 2 Document type: Known-Issue Security status: EXTERNAL

More information

Logon to Windows Vista using smartcard and CertiID in a Windows 2008 environment.

Logon to Windows Vista using smartcard and CertiID in a Windows 2008 environment. KB 140013 Logon to Windows Vista using smartcard and CertiID in a Windows 2008 environment. Creation date: 15/05/2009 Last Review: 02/06/2009 Revision number: 2 Document type: How To Security status: EXTERNAL

More information

How Do I Inspect Error Logs in Warehouse Builder?

How Do I Inspect Error Logs in Warehouse Builder? 10 How Do I Inspect Error Logs in Warehouse Builder? Scenario While working with Warehouse Builder, the designers need to access log files and check on different types of errors. This case study outlines

More information

Module 2: Managing Your Resources Lesson 5: Configuring System Settings and Properties Learn

Module 2: Managing Your Resources Lesson 5: Configuring System Settings and Properties Learn Module 2: Managing Your Resources Lesson 5: Configuring System Settings and Properties Learn Welcome to Module 2, Lesson 5. In this lesson, you will learn how to use the Administration Console to configure

More information

Envelope Journaling for Microsoft Exchange 2003 Version 1.0

Envelope Journaling for Microsoft Exchange 2003 Version 1.0 Barracuda Message Archiver Organizations using Microsoft Exchange 2003 can take advantage of its envelope journaling feature to send all messages along with all recipient information directly to the Barracuda

More information

User Account Manager

User Account Manager CHAPTER 4 Note User accounts can be accessed only when operating in Internal Directory mode. To access User tasks, log in to the system (see Logging In section on page 2-1). Then, from the Home page, click

More information

ADSelfService Plus Client Software Installation via Group Policy Objects (GPOs)

ADSelfService Plus Client Software Installation via Group Policy Objects (GPOs) ADSelfService Plus Client Software Installation via Group Policy Objects (GPOs) Contents Document Summary:... 3 ADSelfService Plus Client Software:... 3 ADSelfService Plus Client Software Installation

More information

User Guide. Application Security for Workspace Environment Management - Preview V2/ September 2017

User Guide. Application Security for Workspace Environment Management - Preview V2/ September 2017 User Guide Application Security for Workspace Environment Management - Preview V2/ September 2017 Software version: 4.4.5 Release date: September 2017 Document revision: 2 Copyright 2017 Citrix Systems,

More information

Workspace Administrator Help File

Workspace Administrator Help File Workspace Administrator Help File Table of Contents HotDocs Workspace Help File... 1 Getting Started with Workspace... 3 What is HotDocs Workspace?... 3 Getting Started with Workspace... 3 To access Workspace...

More information

DiskBoss DATA MANAGEMENT

DiskBoss DATA MANAGEMENT DiskBoss DATA MANAGEMENT Disk Change Monitor Version 9.3 May 2018 www.diskboss.com info@flexense.com 1 1 Product Overview DiskBoss is an automated, policy-based data management solution allowing one to

More information

DiskBoss DATA MANAGEMENT

DiskBoss DATA MANAGEMENT DiskBoss DATA MANAGEMENT File Integrity Monitor Version 9.3 May 2018 www.diskboss.com info@flexense.com 1 1 Product Overview DiskBoss is an automated, policy-based data management solution allowing one

More information

Copyright Tools4ever B.V. All rights reserved.

Copyright Tools4ever B.V. All rights reserved. Copyright Tools4ever B.V. All rights reserved. No part of the contents of this user guide may be reproduced or transmitted in any form or by any means without the written permission of Tools4ever. DISCLAIMER

More information

Export Order/List/Items to Spreadsheet (CSV format)

Export Order/List/Items to Spreadsheet (CSV format) Export Order/List/Items to Spreadsheet (CSV format) Who: Why: Contract Administrator You can export a list of Orders, the details of an individual Order or a list of Items from an Order to CSV format.

More information

DiskBoss DATA MANAGEMENT

DiskBoss DATA MANAGEMENT DiskBoss DATA MANAGEMENT File Delete and Data Wiping Version 9.3 May 2018 www.diskboss.com info@flexense.com 1 1 Product Overview DiskBoss is an automated, policy-based data management solution allowing

More information

Copyright

Copyright This video will look at creating a relying party trust in Active Directory Federation Services. A relying party trust is required in order to create claims that will be used by the resource partner. In

More information

Installation and Configuration Guide

Installation and Configuration Guide Installation and Configuration Guide 1 Document Versions: Date Version Description June 14, 2014 1.0 Initial Release March 14, 2016 1.1 Minor Changes June 21, 2017 1.2 Added Trusted Publishers 2 Installing

More information

Giovanni Carnovale Technical Account Manager Southeast Europe VASCO Data Security

Giovanni Carnovale Technical Account Manager Southeast Europe VASCO Data Security Giovanni Carnovale Technical Account Manager Southeast Europe The concept of strong authentication Something you have Something you know We authenticate the world 2 Authenticate where? We authenticate

More information

Configuring SAML-based Single Sign-on for Informatica Web Applications

Configuring SAML-based Single Sign-on for Informatica Web Applications Configuring SAML-based Single Sign-on for Informatica Web Applications Copyright Informatica LLC 2017. Informatica LLC. Informatica, the Informatica logo, Informatica Big Data Management, and Informatica

More information

DIGIPASS Authentication for NETASQ

DIGIPASS Authentication for NETASQ DIGIPASS Authentication for NETASQ With IDENTIKEY Server 2010 Integration VASCO Data Security. Guideline All rights reserved. Page 1 of 19 Disclaimer Disclaimer of Warranties and Limitations of Liabilities

More information

DiskSavvy Disk Space Analyzer. DiskSavvy DISK SPACE ANALYZER. User Manual. Version Dec Flexense Ltd.

DiskSavvy Disk Space Analyzer. DiskSavvy DISK SPACE ANALYZER. User Manual. Version Dec Flexense Ltd. DiskSavvy DISK SPACE ANALYZER User Manual Version 10.3 Dec 2017 www.disksavvy.com info@flexense.com 1 1 Product Overview...3 2 Product Versions...7 3 Using Desktop Versions...8 3.1 Product Installation

More information

KASPERSKY LAB. Kaspersky Administration Kit version 6.0. Reference Book

KASPERSKY LAB. Kaspersky Administration Kit version 6.0. Reference Book KASPERSKY LAB Kaspersky Administration Kit version 6.0 Reference Book KASPERSKY ADMINISTRATION KIT VERSION 6.0 Reference Book Kaspersky Lab Ltd. Visit our website: http://www.kaspersky.com/ Revision date:

More information

Ubiquity Server Manual

Ubiquity Server Manual Ubiquity Server Manual Compatible with version 9.0 Introduction Ubiquity is the ASEM software solution for remote access and remote assistance on Industrial PCs and operator panels based on Windows operating

More information

Installation and Configuration Guide

Installation and Configuration Guide Installation and Configuration Guide 1 Document Versions: Date Version Description June, 14, 2014 1.0 Initial Release March, 14, 2016 1.1 Minor Changes 2 Installing SCUP 2011: Install WSUS (If needed).

More information

User support Marketing Director profile Management of manual campaigns DataCar CRM, Expert version

User support Marketing Director profile Management of manual campaigns DataCar CRM, Expert version Contents 1 Manual campaigns... 2 1.1 - Creating a manual campaign... 2 1.2 - Campaign supervision page... 6 Page 1 of 14 1 Manual campaigns The application's manual campaigns enable you to meet specific

More information

Quick Troubleshooting Guide: Authentication Issues

Quick Troubleshooting Guide: Authentication Issues Defender Quick Troubleshooting Guide: Authentication Issues Introduction This guide is provided for use by Defender administrators to help troubleshoot common Defender authentication issues. It also provides

More information

ELM Server Exchange Edition ArchiveWeb version 5.5

ELM Server Exchange Edition ArchiveWeb version 5.5 ELM Server Exchange Edition ArchiveWeb version 5.5 Copyright 2016 Lexmark. All rights reserved. Lexmark is a trademark of Lexmark International, Inc., registered in the U.S. and/or other countries. All

More information

Script Portlet Installation and Configuration with Websphere Portal v8.5. Adinarayana H

Script Portlet Installation and Configuration with Websphere Portal v8.5. Adinarayana H Script Portlet Installation and Configuration with Websphere Portal v8.5 Adinarayana H Table Of Contents 1. Script Portlet Overview 2. Script Portlet Download Process 3. Script Portlet Installation with

More information

citrix MetaFrame Password Manager2.0:Adminsitration

citrix MetaFrame Password Manager2.0:Adminsitration citrix MetaFrame Password Manager2.0:Adminsitration Number: 1Y0-972 Passing Score: 800 Time Limit: 120 min File Version: 62.24 http://www.gratisexam.com/ CITRIX 1Y0-972 EXAM QUESTIONS & ANSWERS Exam Name:

More information

Custom Report Builder Installation Instruction and User Guide February 2010

Custom Report Builder Installation Instruction and User Guide February 2010 Installation Instruction and User Guide February 2010 Columbia, MD www.qualitytrainingsystems.com info@qualitytrainingsystems.com Contents Introduction... 1 1. Installing... 1 Download and Install CRB...

More information

BEAWebLogic. Portal. MobileAware Interaction Server Installation Guide

BEAWebLogic. Portal. MobileAware Interaction Server Installation Guide BEAWebLogic Portal MobileAware Interaction Server Installation Guide Version 8.1 with Service Pack 3 (MobileAware Version 1.0) Document Revised: September 2004 Copyright Copyright 2004 BEA Systems, Inc.

More information

Internetbank AB.LV System. User Manual Internetbank AB.LV

Internetbank AB.LV System. User Manual Internetbank AB.LV Internetbank AB.LV System User Manual Internetbank AB.LV 2008 Contents 1. Preface... 1-1 2. Terminology... 2-1 2.1. Hyperlink... 2-1 2.2. Output field... 2-1 2.3. Input field... 2-2 2.4. Drop-down list

More information

User Manual. ARK for SharePoint-2007

User Manual. ARK for SharePoint-2007 User Manual ARK for SharePoint-2007 Table of Contents 1 About ARKSP (Admin Report Kit for SharePoint) 1 1.1 About ARKSP 1 1.2 Who can use ARKSP? 1 1.3 System Requirements 2 1.4 How to activate the software?

More information

1. ECI Hosted Clients Installing Release 6.3 for the First Time (ECI Hosted) Upgrading to Release 6.3SP2 (ECI Hosted)

1. ECI Hosted Clients Installing Release 6.3 for the First Time (ECI Hosted) Upgrading to Release 6.3SP2 (ECI Hosted) 1. ECI Hosted Clients........................................................................................... 2 1.1 Installing Release 6.3 for the First Time (ECI Hosted)...........................................................

More information

Comodo Next Generation Security Information and Event Management Software Version 1.4

Comodo Next Generation Security Information and Event Management Software Version 1.4 rat Comodo Next Generation Security Information and Event Management Software Version 1.4 Administrator Guide Guide Version 1.4.101915 Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013 Table

More information

Package Manager. Managing Cisco VXC Manager Packages CHAPTER

Package Manager. Managing Cisco VXC Manager Packages CHAPTER CHAPTER 3 This chapter describes how to perform routine Cisco VXC Manager package management tasks using the Administrator Console. It provides information on managing the Cisco VXC Manager packages (software,

More information

VMware Mirage Web Manager Guide

VMware Mirage Web Manager Guide Mirage 5.3 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of this document,

More information

IBM Security Identity Manager Version Administration Topics

IBM Security Identity Manager Version Administration Topics IBM Security Identity Manager Version 6.0.0.5 Administration Topics IBM Security Identity Manager Version 6.0.0.5 Administration Topics ii IBM Security Identity Manager Version 6.0.0.5: Administration

More information

Installing Blank SiriusSQL Database 4.0

Installing Blank SiriusSQL Database 4.0 Installing Blank SiriusSQL Database 4.0 (ONLY APPLICABLE IF YOU START WITH SiriusSQL 4005A OR HIGHER!) To install a new blank SiriusSQL database, follow these steps. Copy and Unzip Files 1) Browse to \\Fileserver04\f-drive\V40\Sirius.FS\Data

More information

Click Studios. Passwordstate. Remote Session Launcher. Installation Instructions

Click Studios. Passwordstate. Remote Session Launcher. Installation Instructions Passwordstate Remote Session Launcher Installation Instructions This document and the information controlled therein is the property of Click Studios. It must not be reproduced in whole/part, or otherwise

More information

Encode Rule Explorer App v1.0.2 for IBM QRadar Documentation

Encode Rule Explorer App v1.0.2 for IBM QRadar Documentation Encode Rule Explorer App v.0.2 for IBM QRadar Documentation Encode Rule Explorer App for IBM QRadar, Copyright 207 Encode SA, All rights reserved. Revision to This Document Date Revision Description 30

More information

Qualys CloudView v1.x

Qualys CloudView v1.x Qualys CloudView v1.x Version 1.6 September 18, 2018 Here s what s new in Qualys CloudView 1.6! Download Datalist in CSV Format Connector Creation: External ID now Editable Customize Dashboards and Widgets

More information

2. Once logged in as a CFO Council member, under the Resources drop down, choose Thomson Reuters Checkpoint

2. Once logged in as a CFO Council member, under the Resources drop down, choose Thomson Reuters Checkpoint . You must login to the CUNA Councils website first to authenticate your CFO Council membership www.cunacouncils.org. Use the gray Sign In button in the right column on the home page.. Once logged in as

More information

REST API Operations. 8.0 Release. 12/1/2015 Version 8.0.0

REST API Operations. 8.0 Release. 12/1/2015 Version 8.0.0 REST API Operations 8.0 Release 12/1/2015 Version 8.0.0 Table of Contents Business Object Operations... 3 Search Operations... 6 Security Operations... 8 Service Operations... 11 Business Object Operations

More information

SAP Roambi SAP Roambi Cloud SAP BusinessObjects Enterprise Plugin Guide

SAP Roambi SAP Roambi Cloud SAP BusinessObjects Enterprise Plugin Guide SAP Roambi 2017-10-31 SAP Roambi Cloud SAP BusinessObjects Enterprise Plugin Guide 1 Table of Contents I. Overview Introduction How it Works II. Setup Requirements Roambi Requirements Created a Roambi

More information

DOCUMENT REVISION HISTORY

DOCUMENT REVISION HISTORY DOCUMENT REVISION HISTORY Rev. No. Changes Date 000 New Document 10 Jan. 2011 001 Document Revision: 06 Jun. 2011 - Addition of section on MYSQL backup and restore. 002 Document Revision: 22 Jul. 2011

More information

Security Permissions in TCR 2.x

Security Permissions in TCR 2.x Security Permissions in TCR 2.x Dan Krissell November 10, 2011 Contents Overview... 2 Authentication... 2 Authorization... 2 Where do I find my users and groups to assign access?... 3 How to implement

More information

Kaspersky Administration Kit 8.0 REFERENCE GUIDE

Kaspersky Administration Kit 8.0 REFERENCE GUIDE Kaspersky Administration Kit 8.0 REFERENCE GUIDE P R O G R A M V E R S I O N : 8. 0 C R I T I C A L F I X 1 Dear User! Thank you for choosing our product. We hope that this documentation will help you

More information

TIBCO ActiveMatrix BPM Spotfire Visualizations

TIBCO ActiveMatrix BPM Spotfire Visualizations TIBCO ActiveMatrix BPM Spotfire Visualizations Software Release 3.0 May 2014 Two-Second Advantage 2 Important Information SOME TIBCO SOFTWARE EMBEDS OR BUNDLES OTHER TIBCO SOFTWARE. USE OF SUCH EMBEDDED

More information

Version 1.0 Last updated: August 11, 2017 Author: Albert Wang & Mike Hull

Version 1.0 Last updated: August 11, 2017 Author: Albert Wang & Mike Hull IIS Configuration Guidelines for running: Sterling Gentran:Server HTTP Gateway Sterling Gentran:Server HTTP Message Forwarder on Microsoft Windows Server 2012 Version 1.0 Last updated: August 11, 2017

More information

Working with Databases

Working with Databases Working with Databases TM Control Panel User Guide Working with Databases 1 CP offers you to use databases for storing, querying and retrieving information. CP for Windows currently supports MS SQL, PostgreSQL

More information

Access Office Integration for Excel

Access Office Integration for Excel Access Office Integration for Excel Introduction The following document has been designed to guide you through the process of downloading Dimensions data in to Excel via the Access Office Integration tool.

More information

Comodo cwatch Network Software Version 2.23

Comodo cwatch Network Software Version 2.23 rat Comodo cwatch Network Software Version 2.23 Administrator Guide Guide Version 2.23.060618 Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013 Table of Contents 1 Introduction to Comodo cwatch

More information

Installation Guide. Mobile Print for Business version 1.0. July 2014 Issue 1.0

Installation Guide. Mobile Print for Business version 1.0. July 2014 Issue 1.0 Installation Guide Mobile Print for Business version 1.0 July 2014 Issue 1.0 Fuji Xerox Australia 101 Waterloo Road North Ryde NSW 2113 For technical queries please contact the Fuji Xerox Australia Customer

More information

DIGIPASS Authentication for O2 Succendo

DIGIPASS Authentication for O2 Succendo DIGIPASS Authentication for O2 Succendo for IDENTIKEY Authentication Server IDENTIKEY Appliance 2009 Integration VASCO Data Security. Guideline All rights reserved. Page 1 of 30 Disclaimer Disclaimer of

More information

Department Administration

Department Administration Department Administration Best Practices Version: 7.2.x Written by: Product Knowledge, R&D Date: April 2017 2017 Lexmark. All rights reserved. Lexmark is a trademark of Lexmark International Inc., registered

More information

Manually Configuring IIS

Manually Configuring IIS Manually Configuring IIS This application note describes how to manually configure Microsoft's Internet Information Server (IIS) and the ProHelp EPM Web Reporting option. This configuration is typically

More information

Performance Monitors Setup Guide

Performance Monitors Setup Guide Performance Monitors Setup Guide Version 1.0 2017 EQ-PERF-MON-20170530 Equitrac Performance Monitors Setup Guide Document Revision History Revision Date May 30, 2017 Revision List Initial Release 2017

More information

Hyper-V Rapid Recovery - Recovery in Place

Hyper-V Rapid Recovery - Recovery in Place Applicable Products These instructions apply to the following products: Barracuda Intronis Backup - MSP Hyper-V Rapid Recovery Restore Tabs The following table provides a description of the page features.

More information

Enabling SAML Authentication in an Informatica 10.2.x Domain

Enabling SAML Authentication in an Informatica 10.2.x Domain Enabling SAML Authentication in an Informatica 10.2.x Domain Copyright Informatica LLC 2017, 2018. Informatica, the Informatica logo, Informatica Big Data Management, and Informatica PowerCenter are trademarks

More information

How to deploy fonts using Configuration Manager 2012 R2

How to deploy fonts using Configuration Manager 2012 R2 In this post we will see steps on how to deploy fonts using Configuration Manager 2012 R2. If you have been tasked with deploying fonts using SCCM this post should help you. A font is a set of printable

More information

Manage and Generate Reports

Manage and Generate Reports Report Manager, page 1 Generate Reports, page 3 Trust Self-Signed Certificate for Live Data Reports, page 4 Report Viewer, page 4 Save an Existing Stock Report, page 7 Import Reports, page 7 Export Reports,

More information

Installing and Configuring Worldox/Web Mobile

Installing and Configuring Worldox/Web Mobile Installing and Configuring Worldox/Web Mobile SETUP GUIDE v 1.1 Revised 6/16/2009 REVISION HISTORY Version Date Author Description 1.0 10/20/2008 Michael Devito Revised and expanded original draft document.

More information

Time Machine Web Console Installation Guide

Time Machine Web Console Installation Guide 1 Time Machine Web Console Installation Guide The following is a quick guide to setting up and deploying Solution-Soft s Time Machine Web Console under Microsoft IIS Web Server 8. This paper will walk

More information

DIGIPASS Authentication for Cisco ASA 5500 Series

DIGIPASS Authentication for Cisco ASA 5500 Series DIGIPASS Authentication for Cisco ASA 5500 Series With Vasco VACMAN Middleware 3.0 2008 VASCO Data Security. All rights reserved. Page 1 of 35 Integration Guideline Disclaimer Disclaimer of Warranties

More information

Moving a File (Event-Based)

Moving a File (Event-Based) Moving a File (Event-Based) This topic describes how to move a file from a source location to a destination location. A channel is used, which listens for any new files matching the defined filter criteria

More information

Interface Reference. McAfee Application Control Windows Interface Reference Guide. Add Installer page. (McAfee epolicy Orchestrator)

Interface Reference. McAfee Application Control Windows Interface Reference Guide. Add Installer page. (McAfee epolicy Orchestrator) McAfee Application Control 8.1.0 - Windows Interface Reference Guide (McAfee epolicy Orchestrator) Interface Reference Add Installer page Add an existing installer to the McAfee epo repository. Table 1

More information

Welcome to this review guide for the configuration and use of Database Fields. Requirements. Contact Us. Create a Database Fields index in ZyINDEX

Welcome to this review guide for the configuration and use of Database Fields. Requirements. Contact Us. Create a Database Fields index in ZyINDEX Welcome to this review guide for the configuration and use of Database Fields In this review guide you will learn how to configure Database Fields, which will enable you to store your manual key fields

More information

Type the following command to copy the pkcs12 file to the /opt/qradar/conf/key_certificates directory:

Type the following command to copy the pkcs12 file to the /opt/qradar/conf/key_certificates directory: Event and flow retention 89 Step 5 Step 6 Step 7 Step 8 Type the following command to copy the pkcs12 file to the /opt/qradar/conf/key_certificates directory: cp /opt/qradar/conf/key_certificates

More information

PACS - Setup Version 8.1

PACS - Setup Version 8.1 PACS - Setup Version 8.1 PACS - Setup 1 of 74 Information in this document is subject to change without notice. Companies, names, and data used in examples are fictitious unless otherwise noted. No part

More information

UiPath Orchestrator Azure Installation

UiPath Orchestrator Azure Installation UiPath Orchestrator Azure Installation Revision History Date Version Author Description 9 th June 2016 2016.1 M.B. Applied Template 8 th June 2016 2016.2 C.S. Created Document UiPath Orchestrator Azure

More information

FUJITSU Cloud Service S5 Setup and Configuration of the FTP Service under Windows 2008/2012 Server

FUJITSU Cloud Service S5 Setup and Configuration of the FTP Service under Windows 2008/2012 Server FUJITSU Cloud Service S5 Setup and Configuration of the FTP Service under Windows 2008/2012 Server This guide details steps required to install and configure a basic FTP server on a Windows 2008/2012 VM

More information

DiskBoss DATA MANAGEMENT

DiskBoss DATA MANAGEMENT DiskBoss DATA MANAGEMENT Duplicate Files Search Version 9.1 Apr 2018 www.diskboss.com info@flexense.com 1 1 DiskBoss Overview DiskBoss is an automated, policy-based data management solution allowing one

More information

Bitvise Tunnelier Installation Guide

Bitvise Tunnelier Installation Guide Bitvise Tunnelier Installation Guide Revised Oct 20 th, 2010 CONTENTS Introduction... 1 Installation... 2 Download Software... 2 Install Software... 2 Tunnelier Configuration... 3 Add Tunnelier to Windows

More information

Importing and Characterizing Server Data Using SCE with Windows Perfmon Overview

Importing and Characterizing Server Data Using SCE with Windows Perfmon Overview Importing and Characterizing Server Data Using SCE with Windows Perfmon Overview This tutorial is intended to help in collecting data from a server in order to perform advanced server modeling. This tutorial

More information

Cognos Analytics Reporting User Interface

Cognos Analytics Reporting User Interface September 12, 2017 (v12.2.2 - BI v11) Cognos Analytics Reporting User Interface Business Intelligence Cognos Analytics Reporting Cognos Analytics Reporting is a Web-based tool used to create ad-hoc reports

More information

Product Guide. McAfee Endpoint Upgrade Assistant 1.4.0

Product Guide. McAfee Endpoint Upgrade Assistant 1.4.0 Product Guide McAfee Endpoint Upgrade Assistant 1.4.0 COPYRIGHT Copyright 2017 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee epo,

More information

Sccm 2007 Manually Copy Packages To Distribution Point

Sccm 2007 Manually Copy Packages To Distribution Point Sccm 2007 Manually Copy Packages To Distribution Point We're running SCCM 2007 R3 build 4.00.6487.2000 on Server 2008 sp2 (32) bit. issue if I try and copy an existing package using "Manage Distribution

More information

Main Window. Overview. Do this Click the New Report link. Create a New Report.

Main Window. Overview. Do this Click the New Report link. Create a New Report. Overview Main Window Create a new report from a table or existing view Create a new report by defining a custom join Work with your custom reports Open a recently accessed custom report Work with reports

More information

VMware AirWatch Database Migration Guide A sample procedure for migrating your AirWatch database

VMware AirWatch Database Migration Guide A sample procedure for migrating your AirWatch database VMware AirWatch Database Migration Guide A sample procedure for migrating your AirWatch database For multiple versions Have documentation feedback? Submit a Documentation Feedback support ticket using

More information

Dealing with Event Viewer

Dealing with Event Viewer Dealing with Event Viewer Event Viewer is a troubleshooting tool in Microsoft Windows 2000.This how-to article will describe how to use Event Viewer. Event Viewer displays detailed information about system

More information

XIA Links. Administrator's Guide. Version: 3.0. Copyright 2017, CENTREL Solutions

XIA Links. Administrator's Guide. Version: 3.0. Copyright 2017, CENTREL Solutions Administrator's Guide Version: 3.0 Copyright 2017, CENTREL Solutions Table of contents About... 4 Installation... 6 Installation Requirements (Server)... 7 Prerequisites (Windows Server 2016)... 9 Prerequisites

More information

McAfee epolicy Orchestrator Release Notes

McAfee epolicy Orchestrator Release Notes McAfee epolicy Orchestrator 5.9.1 Release Notes Contents About this release What's new Resolved issues Known issues Installation information Getting product information by email Where to find product documentation

More information

EasyLobby Database Setup EasyLobby Family of Products Version 10.0

EasyLobby Database Setup EasyLobby Family of Products Version 10.0 EasyLobby Database Setup EasyLobby Family of Products Version 10.0 Introduction This document describes how to set up the EasyLobby 10.0 database on Microsoft SQL Server or Oracle, how to setup an ODBC

More information

GFI WebMonitor 2009 ReportPack. Manual. By GFI Software Ltd.

GFI WebMonitor 2009 ReportPack. Manual. By GFI Software Ltd. GFI WebMonitor 2009 ReportPack Manual By GFI Software Ltd. http://www.gfi.com E-mail: info@gfi.com Information in this document is subject to change without notice. Companies, names, and data used in examples

More information

KOFAX TO LASERFICHE RELEASE SCRIPTS

KOFAX TO LASERFICHE RELEASE SCRIPTS KOFAX TO LASERFICHE RELEASE SCRIPTS TECHNICAL & USER DOCUMENTATION Updated: August 2006 Copyright 2004 2006 BLUELAKE SOFTWARE All Rights Reserved Overview: Bluelake Software sells and supports two flavors

More information

Enabling Smart Card Logon for Linux Using Centrify Suite

Enabling Smart Card Logon for Linux Using Centrify Suite DoD Public Key Enablement (PKE) Reference Guide Enabling Smart Card Logon for Linux Using Centrify Suite 2012.4 Contact: dodpke@mail.mil URL: http://iase.disa.mil/pki-pke/ URL: http://iase.disa.smil.mil/pki-pke/

More information

3E Online Analytics Help Guide

3E Online Analytics Help Guide Document Revision History Date Version Change Reference November 16, 2009 AA Original version Table of Contents 1.0 Introduction... 1 2.0 Payroll Menus... 2 3.0 Filtering and Sorting... 3 4.0 Column Selection...

More information