Demonstration Instructions

Size: px
Start display at page:

Download "Demonstration Instructions"

Transcription

1 Demonstration Instructions Digital Defence Ltd. Secure Mobile Version th July 2010

2 Table of Contents TABLE OF CONTENTS DEMONSTRATION INSTRUCTIONS PREREQUISITES PROCEDURE... 3 Solution Center Demonstration Template

3 1. Demonstration Instructions This will demonstrate the procedures to use the solution. 1.1 Prerequisites Prerequisite Notes Procedure 1 Install the demo application. If installed by scanning the MSP barcode, the installer file is located in the \Application folder. The Demo application is the Secure Mobile client side of the software with a pre-built Product Encryption Key (PEK) of DEMO-DEMO-DEMO- DEMO. Select OK to reset the device. 2 Reset the device. Select OK and setup the user password. Solution Center Demonstration Template 3

4 By default, the security setting requires only encrypted storage cards to be used. 3 Encrypt a storage card. Upon insertion of any storage card containing files*, the following message box will be displayed. *Be careful with cards containing large quantities of data, the initial encryption can take anywhere from 1 minute to 2 hours (dependant on processor speed, roughly 3 minutes for every 100MB on 600MHz processor). 4 Encrypting a card. Wait for the files to be encrypted. Open File Explorer to view the Storage Card that has been encrypted. This shows that access to the files is exactly the same as it is without encryption. 5 Using a Storage Card This will also show the generation of the EncRecovery.exe and EncRecovery.bin files. These files are generated (and continually updated) as plain unencrypted files. The EncRecovery.exe file is to be executed if the device has been factory reset. The executable will install Secure Mobile with the last known security policy. Solution Center Demonstration Template 4

5 5a Using a Storage Card Open the files contained in the Storage Card to show the immediate access to files. The encrypted files are decrypted in real-time as they are accessed. 5b Using a Storage Card Remove the Storage Card from the device and insert the card into a card reader to show that the files are in fact encrypted. 6 Access the Secure Mobile settings. Navigate to the System Settings (or Programs area) on the device and select the Secure Mobile icon. 7 Access the Security Settings Select the Settings icon. Solution Center Demonstration Template 5

6 8 Setup the Manager Password Select OK and setup the manager password. This password is used to remove access of the Security Settings from the user. i.e the user must have knowledge of the Manager Password in order to access the settings. 9 Setup the Login security policy. Select the Login icon. 9a Setup the Login security policy. Setup the Grace Period. This is the period of time that must elapse before authentication is required to access the device after a power off. Fingerprint authentication is currently not supported for any Motorola devices. Solution Center Demonstration Template 6

7 Setup the Device Authentication to use LDAP (Active Directory). 9b Setup the Login security policy The username and password credentials can be stored on a remote LDAP server. If the mobile device does not have network connectivity at the time of authentication, the previously used credentials will authenticate the user. 10 Setup the Password security policy. Select the Password icon from the Settings pane. Select suitable values for password rules to describe a requirement for the enforcement of password strength. 11 Setup the Encryption security policy. Select the Encryption icon from the Settings pane. The default setting is to only allow access to cards that are encrypted. Never encrypt forces only unencrypted cards to be used, any encrypted card that is inserted will force the deletion of encrypted files. Can read plain cards will allow plain files to be read only in an encrypted card. A change to the encryption setting is only in effect on newly inserted storage cards. Persistent Storage refers to any onboard persistent storage folder. Solution Center Demonstration Template 7

8 Select the Wipe Device icon from the Settings pane. The lockout user policy is also set in this screen. 12 Setup the Wipe Device security policy. If not docked refers to a connection to a PC. Keep recovery facility. refers to the EncRecovery files. Select the device to lockout the user after 6 failed login attempts to demonstrate how a user can be locked out. 13 Setup the Recovery security policy. Select the Recovery icon from the Settings pane. The Local Recovery refers to the ability to use the PEK* to recover a password. The Mobile Recovery refers to the generation (and update) of the EncRecovery files. *PEK for the demo version is DEMO-DEMO-DEMO-DEMO, without the - characters. 14 Setup the Access. Select the Access icon from the Settings pane. Select the appropriate checkboxes to show how access to comms ports and applications can be denied. Applications can also be denied access to encryption via the Encryption White/Black listing setting. Solution Center Demonstration Template 8

9 15 Setup the Wi-Fi Access Select the Wi-Fi combo-box to Select. Then select the Edit->WiFi menu to display the list of approved Wi-Fi networks. A Wi-Fi network is defined by its {SSID : MAC Address} pair. Any Wi-Fi network can be defined in this setting by selecting the New menu option from the Wi-Fi Settings screen. 15a Setup the Wi-Fi Access Select the View menu option to switch between the view of Wi-Fi Networks in Range and the list of Approved Wi-Fi Networks. Selecting a Wi-Fi network in the list will toggle the network from being approved to being denied. A green tick icon represents a Wi-Fi network which is on the approved list. 16 Setup the Phone Number Access Select the Phone combo-box to Select. Then select the Edit->Phone menu to display the list of approved Phone Numbers which can be called and received. A special phone number * can be used to represent all phone numbers. Solution Center Demonstration Template 9

10 16a Setup the Phone Number Access Select the View menu option to switch between the view of Outgoing Calls and the list of Incoming Calls. Selecting a phone number in the list will toggle the network from being approved to being denied. A green tick icon represents a phone number which is on the approved list. 17 Setup the USB Access Select the USB combo-box to Select. Then select the Edit->USB menu to display the list of approved types of USB connections. Note: A PC connection is an RNDIS USB connection type. 17a Setup the USB Access Selecting a type of USB connection will toggle the USB Type from being approved to being denied. A green tick icon represents a USB Type which is on the approved list. Solution Center Demonstration Template 10

11 Select the Applications combo-box to Black Listed. Then select the Edit->Applications->Black List menu to display the list of applications (.exe files) which are un-approved for execution. 18 Setup the Application Black List Access A Black List refers to System Executable Files (files which are included in the device by default, i.e. they re stored in the ROM). Exe Files in the Black List are those files which are denied access to be executed. A White List refers to Third-Party application files (.exe files). Exe Files in the White List are those files which are approved to be executed. 18a Setup the Application Black List Access Select the View menu option to switch between the view of All System Exe Files and the list of System Exe Files in a specific folder. Selecting an exe file in the list will toggle the file from being approved to being denied. A red cross icon represents an executable file which is on the denied list. The \windows\pword.exe file represents the Office Word application. The \windows\fexplore.exe file represents the File Explorer application. The \windows\rapiclnt.exe file represents the Active Sync application. 18b Setup the Application Black List Access Once the Black List (or White List) has been changed a system reset is required. The Black List can be demonstrated by attempting to execute the file which was selected on the list. In this case attempting to execute the Office->Word application will demonstrate the Black List. Solution Center Demonstration Template 11

12 18c Setup the Application Black List Access The popup notification window will indicate the application is prohibited from use. 19 Setup the Encryption Black List Access Select the Applications combo-box to Black Listed. Then select the Edit->Applications->Black List Encryption menu to display the list of applications (.exe files) which are un-approved for access to encrypted data. A Black List refers to System Executable Files (files which are included in the device by default, i.e. they re stored in the ROM). Exe Files in the Encryption Black List are those files which are denied access to read and write encrypted data. A White List refers to Third-Party application files (.exe files). Exe Files in the Encryption White List are those files which are approved to read and write encrypted data. 19a Setup the Encryption Black List Access Select the View menu option to switch between the view of All System Exe Files and the list of System Exe Files in a specific folder. Selecting an exe file in the list will toggle the file from being approved to being denied. A red cross icon represents an executable file which is on the denied list. The \windows\pword.exe file represents the Office Word application. The \windows\fexplore.exe file represents the File Explorer application. The \windows\rapiclnt.exe file represents the Active Sync application. Solution Center Demonstration Template 12

13 19b Setup the Encryption Black List Access The Black List can be demonstrated by attempting to use an encrypted file, or create and write to an encrypted file. In this case attempting to view encrypted files with File Explored will result in the encrypted files being unreadable. 20 Setup the Auto Off policy. Select the Auto Off icon from the Settings pane. Set the time periods to automatically turn off the power / lock the screen. 20a Setup the Auto Off policy. Select the disable menu option from the Auto Off settings screen. A list of installed programs is displayed. Check any program that will disable the Auto Off operation if it is running. Solution Center Demonstration Template 13

14 20b Setup the Auto Off policy. Select the New menu option from the Programs List screen (from the Auto Off settings). Enter the name of an executable file that will be added to the list of installed programs. This executable file does not need to currently exist on the device. 20c Setup the Auto Off policy. Return to the Programs List screen to view the executable file that was just entered. This executable file needs to be checked in order for it to be added to the list of programs that will disable the Auto Off operation. 21 View License information. Select the License icon from the Settings pane. The current license can be viewed. By default, a trial license is installed to last for 30 days. Solution Center Demonstration Template 14

15 21a Update License information. Select the License->Renew menu option from the License Key Information screen. A new 20-character license key must be entered to update the expiration date. If a bad license key is entered, there is no change to the expiration date. 22 Security Settings Enforcement Press OK from the Settings pane to get back to the User Settings pane. 22a Security Settings Enforcement Select the Settings icon from the User Settings pane. The Manager Password is now required in order to access the security settings. This ensures that users cannot change the security policy unless they know the Manager Password. Solution Center Demonstration Template 15

16 23 Demo the settings available to the user. Select OK from the Settings pane to return to the user settings pane. Select the Set User Details icon from the User Settings pane. 24 Set the User Password. The User password and enrolled fingerprints (if applicable) can be edited via this User Setting. Select the Set User Password icon to change the User Password. Change the user password to another value. 24a Set the User Password To demonstrate password strength enforcement, try entering a New password that does not conform to the Password Rules entered in the Password settings screen. Solution Center Demonstration Template 16

17 25 View the Last Login details. Select the Last Login icon from the User Settings pane. View the previous login details. Select the Login Skins icon from the User Settings pane. 26 Set a new Login Skin. The drop down list should be disabled if the Login Settings does not allow the user to change the Login Skin. Try changing the Login Skin to show how to change the Login Screen. 27 View the Storage Encryption Status. Select the Storage Status icon from the User Settings pane. Select the appropriate Storage folder to view its encryption status and file space details. Solution Center Demonstration Template 17

18 Insert an encrypted Storage Card into a card reader and copy some files to it. This will create a card with encrypted and unencrypted (plain) files. Re-insert the Storage Card into the mobile device and try to access one of the plain files. 28 Demo the enforcement of encrypted cards. If a plain file is copied to a location on the SD Card while the SD card is inserted in the Secure Mobile protected mobile device, then the file is automatically copied (created) as an encrypted file. You will not be prompted to encrypt the file. This is assuming the encryption status of the SD Card is encrypted. If an encrypted folder is viewed that contains any plain files, then those plain files will be requested to be encrypted. It is not necessary to encrypt the files at this stage. If the encryption setting is to allow the user to choose, then a plain file will still be usable. However the plain files are still requested to be encrypted. 28a Demo the enforcement of encrypted cards. Wait for the encryption to complete. Turn off the device. 29 Fail a user login. Make sure enough time has elapsed for a Login Screen to be shown (i.e. more time than the Grace Period). Enter the wrong user password. Then enter the correct user password. Solution Center Demonstration Template 18

19 Make sure a value has been set to lockout the user after x number of failed login attempts (via the Wipe Device settings screen). 30 Lockout the user. Power off the device to make sure the user is requested to authenticate to regain access to the device. Enter the wrong password x number of times. After x-1 times, the user is requested to enter unlock to continue. (this is to stop the event of multiple accidental incorrect password entry) 30a Lockout the user. Enter unlock as the password. After entering unlock as the password, the user then has one more attempt left before the device will be locked. 30b Lockout the user. Enter a wrong password to lockout the user. Now try entering the correct password, the device remains locked! Solution Center Demonstration Template 19

20 Enter help as the password. The Challenge Response screen is displayed to determine if access should be granted to set a new password. 31 Recover the user password. A Response Code can be generated from the Password Recovery Management Suite tool (run on a PC). If the Local User Recovery checkbox has been checked in the Recovery settings screen, then the PEK can be entered as the Response Code. In the case of the demo installation, the PEK code is DEMO-DEMO- DEMO-DEMO (without the - characters). 32 Recover the user password. Select No to gain access to the device without changing the old password. Select Yes to set a new password. Access the device will be granted directly after setting the new password. Solution Center Demonstration Template 20

Wireless Security Setup Guide

Wireless Security Setup Guide Wireless Security Setup Guide NF10WV FAQs Wireless Security Overview To guard your home network against attack and prevent unauthorised access, it is very important that you follow this guide to secure

More information

Wireless Security Setup Guide

Wireless Security Setup Guide Wireless Security Setup Guide NF17ACV FAQs Wireless Security Overview To guard your home network against attack and prevent unauthorised access, it is very important that you follow this guide to secure

More information

EasiShare ios User Guide

EasiShare ios User Guide Copyright 06 Inspire-Tech Pte Ltd. All Rights Reserved. Page of 44 Copyright 06 by Inspire-Tech Pte Ltd. All rights reserved. All trademarks or registered trademarks mentioned in this document are properties

More information

If your Mac keeps asking for the login keychain password

If your Mac keeps asking for the login keychain password If your Mac keeps asking for the login keychain password The password of your macos user account might not match the password of your login keychain. Either create a new login keychain or update it with

More information

Copyright

Copyright This video will look at configuring the default password policy in Active Directory. These setting determines setting like how long a user password will be, if the password needs to complex, and how many

More information

IT Department. Basic WIFI Troubleshooting on ACC SSID. October 2017

IT Department. Basic WIFI Troubleshooting on ACC SSID. October 2017 October 2017 IT Department Basic WIFI Troubleshooting on ACC SSID Many times WIFI issues can be solved with a few simple fixes. Some of the most common example are below: Symptom 1 Desired Wireless network

More information

Celadon Password Self-Service

Celadon Password Self-Service Celadon Password Self-Service Quest Password Manager is a facility that allows you to reset your Celadon Windows password as well as unlock the account without calling the Helpdesk to provide self-service

More information

Catalogue. Assembling... 1 Unpack Charge the Battery Install the Memory Card Product Basics Buttons and Connections...

Catalogue. Assembling... 1 Unpack Charge the Battery Install the Memory Card Product Basics Buttons and Connections... Catalogue Assembling... 1 Unpack... 1 Charge the Battery... 1 Install the Memory Card... 1 1 Product Basics... 2 1.1 Buttons and Connections... 2 1.2 Start Up and Shut Down... 2 2 Introduction of Google

More information

Configuration. Guides on how to configure BarWeb hosted accounts. Exchange Accounts. Outlook Windows. Outlook Windows

Configuration. Guides on how to configure BarWeb hosted  accounts. Exchange Accounts. Outlook Windows. Outlook Windows Email Configuration Guides on how to configure BarWeb hosted email accounts Exchange Accounts Outlook 2016 - Windows Outlook 2013 - Windows Outlook 2010 - Windows Windows Mail Android iphone/ipad MacMail

More information

IRONKEY D300S SECURE USB 3.0 FLASH DRIVE

IRONKEY D300S SECURE USB 3.0 FLASH DRIVE IRONKEY D300S SECURE USB 3.0 FLASH DRIVE User Guide Document No. 48000130-001.A01 D300S Page 1 of 27 Table of Contents About This Manual... 3 System Requirements...3 Recommendations...3 Setup (Windows

More information

Application User Configuration

Application User Configuration CHAPTER 87 The following topics contain information on managing application user information: Settings, page 87-1 Adding an Administrator User to Cisco Unity or Cisco Unity Connection, page 87-6 Changing

More information

GigaCentral ios User Guide V2.0. For User and Storage Admin

GigaCentral ios User Guide V2.0. For User and Storage Admin V2.0 For User and Storage Admin Copyright 2018 by Inspire-Tech Pte Ltd. All rights reserved. All trademarks or registered trademarks mentioned in this document are properties of their respective owners.

More information

FAQ. General Information: Online Support:

FAQ. General Information: Online Support: FAQ General Information: info@cionsystems.com Online Support: support@cionsystems.com CionSystems Inc. Mailing Address: 16625 Redmond Way, Ste M106 Redmond, WA. 98052 http://www.cionsystems.com Phone:

More information

VMware AirWatch: Directory and Certificate Authority

VMware AirWatch: Directory and Certificate Authority Table of Contents Lab Overview - HOL-1857-06-UEM - VMware AirWatch: Directory and Certificate Authority Integration... 2 Lab Guidance... 3 Module 1 - Advanced AirWatch Configuration, AD Integration/Certificates

More information

USER GUIDE GigaCentral Android User Guide

USER GUIDE GigaCentral Android User Guide USER GUIDE GigaCentral Android User Guide Copyright 2016 by Inspire-Tech Pte Ltd. All rights reserved. All trademarks or registered trademarks mentioned in this document are properties of their respective

More information

NotifyMDM Device Application User Guide Installation and Configuration for Android

NotifyMDM Device Application User Guide Installation and Configuration for Android NotifyMDM Device Application User Guide Installation and Configuration for Android NotifyMDM for Android, Version 3.x NotifyMDM for Android 1 Table of Contents NotifyMDM for Android 3 Installation Instructions

More information

1 Connect a computer and the NF10WV using an Ethernet cable. (A yellow Ethernet cable was provided with your NF10WV).

1 Connect a computer and the NF10WV using an Ethernet cable. (A yellow Ethernet cable was provided with your NF10WV). Wireless Setup Guide NF10WV FAQs Wireless Setup guide Login to Web User Interface 1 Connect a computer and the NF10WV using an Ethernet cable. (A yellow Ethernet cable was provided with your NF10WV). 2

More information

Administrator IT Guide. Samsung Knox Configure Shared Device

Administrator IT Guide. Samsung Knox Configure Shared Device Administrator IT Guide Samsung Knox Configure Shared Device July 2017 Samsung Knox TM shared device A Samsung Knox shared device enables multiple users, or employees, to access the same device without

More information

TCC College WiFi and Printer Setup 07/11/2018 College WiFi and Printer Setup Guide

TCC College WiFi and Printer Setup 07/11/2018 College WiFi and Printer Setup Guide College WiFi and Printer Setup Guide **Please note that the below instructions need to be followed by you only when you are at the college** 1 College WiFi and Printer Setup **Please note that the below

More information

Bechtel Partner Access User Guide

Bechtel Partner Access User Guide Bechtel Partner Access User Guide IMPORTANT: For help with this process, please contact the IS&T Service Center or your local IS&T support group: IS&T Service Center Phone: +1-571-392-6767 US Only +1 (800)

More information

Mobility Manager 9.5. Users Guide

Mobility Manager 9.5. Users Guide Mobility Manager 9.5 Users Guide LANDESK MOBILITY MANAGER Copyright 2002-2013, LANDesk Software, Inc. and its affiliates. All rights reserved. LANDesk and its logos are registered trademarks or trademarks

More information

Wireless Troubleshooting Guide

Wireless Troubleshooting Guide Wireless Troubleshooting Guide NF10WV FAQs Wireless Troubleshooting guide First, check whether your modem/router s Wi-Fi is turned ON or not. Check LED light status for WiFi. If WiFi light is OFF, it means

More information

Procedures and Steps for Receiving a New CAC at the Detroit Arsenal

Procedures and Steps for Receiving a New CAC at the Detroit Arsenal Procedures and Steps for Receiving a New CAC at the Detroit Arsenal (And what to do after you ve received your CAC) Table of Contents Before Making your CAC Appointment:... 2 Schedule CAC Renewal... 2

More information

BSE-SINGLE SIGN ON. For Brokers/ Banks/ Mutual Funds

BSE-SINGLE SIGN ON. For Brokers/ Banks/ Mutual Funds BSE-SINGLE SIGN ON For Brokers/ Banks/ Mutual Funds Contents Introduction:... 2 Features:... 2 Advantages:... 2 On-boarding process.... 3 SSO application Login Process... 7 Authentication via OTP... 7

More information

ALTIRIS SECURITY SOLUTION 6.1 FOR HANDHELDS ADMINISTRATOR GUIDE

ALTIRIS SECURITY SOLUTION 6.1 FOR HANDHELDS ADMINISTRATOR GUIDE ALTIRIS SECURITY SOLUTION 6.1 FOR HANDHELDS ADMINISTRATOR GUIDE Notice Copyright 2004 Altiris Inc. All rights reserved. Product Version: 6.1 Document Date: October 14, 2004 Bootworks U.S. Patent No. 5,764,593.

More information

Workspace ONE UEM Certificate Authority Integration with Microsoft ADCS Using DCOM. VMware Workspace ONE UEM 1811

Workspace ONE UEM Certificate Authority Integration with Microsoft ADCS Using DCOM. VMware Workspace ONE UEM 1811 Workspace ONE UEM Certificate Authority Integration with Microsoft ADCS Using DCOM VMware Workspace ONE UEM 1811 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/

More information

PeoplePassword Documentation v6.0

PeoplePassword Documentation v6.0 PeoplePassword Documentation v6.0 Instructions to Configure and Use PeoplePassword v6.0, LLC Contents Overview... 3 Getting Started... 3 Components of PeoplePassword... 3 Core Components... 3 Optional

More information

USER GUIDELINES. Q 2. Is it necessary to configure password retrieval question and answer? How can I do that? Q 3. How can I change password?

USER GUIDELINES. Q 2. Is it necessary to configure password retrieval question and answer? How can I do that? Q 3. How can I change password? USER GUIDELINES Revision 1.8 20 August, 2015 Q 1. How can I log into my webmail? Q 2. Is it necessary to configure password retrieval question and answer? How can I do that? Q 3. How can I change password?

More information

AT&T Business Messaging Account Management

AT&T Business Messaging Account Management Account Management Administrator User Guide July 2016 1 Copyright 2016 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks contained herein are trademarks of AT&T

More information

Guide to your CGIAR Network account Self Service tool

Guide to your CGIAR Network account Self Service tool Guide to your CGIAR Network account Self Service tool The self-service tool allows you to: Change Password: Change your current password from anywhere using your web browser. Reset Password: Reset your

More information

Texas Division How to Login and Register for My IT Support and ServiceNow

Texas Division How to Login and Register for My IT Support and ServiceNow Texas Division How to Login and Register for My IT Support and ServiceNow Go to texas.mychiitsuppport.org. You'll see the screen below. My IT Support/ServiceNow is a national system and utilizes national

More information

Application User Setup

Application User Setup This chapter provides information on managing application user information. About, page 1 Add Application User, page 2 Application User Deletion, page 3 Application User Settings, page 3 Add Administrator

More information

VMware AirWatch Integration with Microsoft ADCS via DCOM

VMware AirWatch Integration with Microsoft ADCS via DCOM VMware AirWatch Integration with Microsoft ADCS via DCOM For VMware AirWatch Have documentation feedback? Submit a Documentation Feedback support ticket using the Support Wizard on support.air-watch.com.

More information

linkzone User ManUal

linkzone User ManUal LINKZONE User Manual Getting to Know Your Mobile Hotspot Power key WPS key LED indicator USB jack LED Description Part Power key WPS key LED indicators Charging / USB Port Reset Reboot Description Hold

More information

Connect to eduroam WiFi

Connect to eduroam WiFi Connect to eduroam WiFi List Procedure for Windows 10... 2 Procedure for Windows 8... 4 Procedure for Windows 7... 6 Procedure for Mac... 11 Procedure for iphone, ipod Touch and ipad... 15 Procedure for

More information

2. INTENDED USERS The intended users of this SOP are the DeWorm3 site data managers and/or trial coordinators.

2. INTENDED USERS The intended users of this SOP are the DeWorm3 site data managers and/or trial coordinators. SETTING UP MOBILE DATA COLLECTION DEVICES 1. PURPOSE This document describes the process by which DeWorm3 staff should initialize data collection devices and provides specific settings for the mobile devices

More information

Android User Guide. for version 5.3

Android User Guide. for version 5.3 Android User Guide for version 5.3 Contents 1. Installation... 3 1.1. How to install Babelnet... 3 1.2. Enter Babelnet in the search field.... 3 1.3. Safety precautions when using Babelnet on your Android...

More information

CONFIGURING BASIC MACOS MANAGEMENT: VMWARE WORKSPACE ONE OPERATIONAL TUTORIAL VMware Workspace ONE

CONFIGURING BASIC MACOS MANAGEMENT: VMWARE WORKSPACE ONE OPERATIONAL TUTORIAL VMware Workspace ONE GUIDE FEBRUARY 2019 PRINTED 26 FEBRUARY 2019 CONFIGURING BASIC MACOS MANAGEMENT: VMWARE WORKSPACE ONE OPERATIONAL TUTORIAL VMware Workspace ONE Table of Contents Overview Introduction Purpose Audience

More information

BizMobile Go! Instruction Manual. (ios) Checkin, Profile & Template

BizMobile Go! Instruction Manual. (ios) Checkin, Profile & Template (ios) Checkin, Profile & Template Preparing Device Create device information for device management. Create Device information Step 1. Go to CONFIG -> Device -> Create 2. Enter necessary information Input

More information

MSAD Login V2 A Windows login process for Mac OS X

MSAD Login V2 A Windows login process for Mac OS X MSAD Login V2 A Windows login process for Mac OS X User manual Copyright 2009 Pa-software. This manual is copyright 2003-2009 Pa-software. All rights reserved. Software and documentation is available from

More information

Recipient USER GUIDE

Recipient USER GUIDE Recipient USER GUIDE General Information What is smartmail? smartmail is smartview s proprietary email encryption system used to protect your personal and transaction related information. What is smartportal?

More information

Frequently Asked Questions: Cisco Jabber Voice 9.1(4) for Android

Frequently Asked Questions: Cisco Jabber Voice 9.1(4) for Android Frequently Asked Questions Frequently Asked Questions: Cisco Jabber Voice 9.1(4) for Android FAQs 2 Setup 2 Basics 4 Connectivity 8 Calls 9 Contacts and Directory Search 16 Voicemail 17 Recents 22 Feedback

More information

Configuring an Enhanced Standard Security Policy

Configuring an Enhanced Standard Security Policy Configuring an Enhanced Standard Security Policy What is an enhanced standard security policy? Implementing an enhanced standard security policy Configuring an Enhanced Standard Security Policy What is

More information

How to Update Your CHI Network Password and Avoid Lockouts

How to Update Your CHI Network Password and Avoid Lockouts How to Update Your CHI Network Password and Avoid Lockouts Remember to Remove and Reconnect to CHI Wi-Fi Networks on Mobile Devices The account you use to log on to your CHI computer (also the account

More information

First Access Express OPERATOR GUIDE

First Access Express OPERATOR GUIDE First Access Express OPERATOR GUIDE October 2016 Cutting edge simplicity Table of Contents Introduction... 4 PC Requirements... 5 Step 1. Software Installation... 5 Complete Installation Server and Client...

More information

VDSL Router 4 Port Wi-Fi Dual Band (NT3BB-4PVWN-147) Quick Installation Guide

VDSL Router 4 Port Wi-Fi Dual Band (NT3BB-4PVWN-147) Quick Installation Guide VDSL Router 4 Port Wi-Fi Dual Band (NT3BB-4PVWN-147) Quick Installation Guide 1. Packing List The following table lists the items in the product package. Item Quantity VDSL Router 1 Power Adapter 1 RJ

More information

ncrypted Cloud works on desktops and laptop computers, mobile devices, and the web.

ncrypted Cloud works on desktops and laptop computers, mobile devices, and the web. OS X User Manual Welcome to ncrypted Cloud! ncrypted Cloud is a Security Collaboration application that uses Industry Standard Encryption Technology (AES-256 bit encryption) to secure files stored in the

More information

Integration with Apple Configurator 2. VMware Workspace ONE UEM 1902

Integration with Apple Configurator 2. VMware Workspace ONE UEM 1902 Integration with Apple Configurator 2 VMware Workspace ONE UEM 1902 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ If you have comments about

More information

Dell EMC OpenManage Mobile. Version User s Guide (Android)

Dell EMC OpenManage Mobile. Version User s Guide (Android) Dell EMC OpenManage Mobile Version 2.0.20 User s Guide (Android) Notes, cautions, and warnings NOTE: A NOTE indicates important information that helps you make better use of your product. CAUTION: A CAUTION

More information

Comodo Mobile Security for Android Software Version 2.5

Comodo Mobile Security for Android Software Version 2.5 Comodo Mobile Security for Android Software Version 2.5 User Guide Guide Version 2.5.010215 Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013 Table of Contents 1.Introduction to Comodo Mobile

More information

Getting Started. Version: 5.0. Date Released: September 27, Document Number: AY006AIO2-5

Getting Started. Version: 5.0. Date Released: September 27, Document Number: AY006AIO2-5 Getting Started Version: 5.0 Date Released: September 27, 2017 Document Number: AY006AIO2-5 2017 Ayla Networks, Inc. All rights reserved. Do not make printed or electronic copies of this document, or parts

More information

Secure Single Sign On with FingerTec OFIS

Secure Single Sign On with FingerTec OFIS Secure Single Sign On with FingerTec OFIS User Guide CONTENTS 3 1 INTRODUCTION Welcome to OFIS Gateway 4-11 2 INSTALLATION & SETUP Registering Your OFIS Gateway Installing & Setting Up Your OFIS Gateway

More information

ESS Security Enhancements

ESS Security Enhancements ESS Security Enhancements payentry.com Employee Self Service Enhancements 1 Table of Contents INTRODUCTION 3 EXISTING EMPLOYEES 3 Existing Employee -Email Address 4 Existing Employee - Username 4 Existing

More information

Administration Guide

Administration Guide Administration Guide Version 2.0 November, 2015 Biscom, Inc. 321 Billerica Rd. Chelmsford, MA 01824 tel 978-250-1800 fax 978-250-4449 CONTENTS 1. Initial Configuration and Settings...1 1.1 Application...

More information

VMware AirWatch Certificate Authentication for EAS with NDES-MSCEP. For VMware AirWatch

VMware AirWatch Certificate Authentication for EAS with NDES-MSCEP. For VMware AirWatch VMware AirWatch Certificate Authentication for EAS with NDES-MSCEP For VMware AirWatch H a v e d o c u m e n t a t io n f e e d b a c k? S u b m it a D o c u m e n t a t io n F e e d b a c k s u p p o

More information

Let s get started. Need more help getting started?

Let s get started. Need more help getting started? Need more help getting started? www.zencam.com/support Let s get started. We hope you love your new Zencam Camera. If you have any questions, we're here for you. M1. M2. E1. E2 Series support@zencam.com

More information

Desktop Application Reference Guide For Windows and Mac

Desktop Application Reference Guide For Windows and Mac Desktop Application Reference Guide For Windows and Mac UNTETHERED LABS, INC. support@gkaccess.com Contents 1. GateKeeper Feature Description... 2 1.1 What is the GateKeeper Desktop Application?... 2 1.2

More information

AirWatch Mobile Device Management

AirWatch Mobile Device Management RSA Ready Implementation Guide for 3rd Party PKI Applications Last Modified: November 26 th, 2014 Partner Information Product Information Partner Name Web Site Product Name Version & Platform Product Description

More information

Controlsoft Identity and Access Management Software Controlsoft Identity Access Management Software

Controlsoft Identity and Access Management Software Controlsoft Identity Access Management Software Controlsoft Identity Access Management Software IA Server Software Installation Guide v8.0.229 2018 Controlsoft Ltd 9010-0050 Issue 6 Page 1 of 39 29/10/2018 Contents 1. Introduction... 3 1.1. PC Specifications...

More information

SafeStick/SafeXs. User Guide. Created by BSO ITS Security Team Version 1.4

SafeStick/SafeXs. User Guide. Created by BSO ITS Security Team Version 1.4 SafeStick/SafeXs User Guide Created by BSO ITS Security Team Version 1.4 Version Control V0.1 Initial draft 23/09/2009 V1.0 Version 1 Approved 28/09/2009 V1.1 Updated for HSCNI Safeconsole 03/11/2011 V1.2

More information

ISS INDIA Active Directory Self Password Management Solution ISS Facility Services India PVT.LTD.

ISS INDIA Active Directory Self Password Management Solution ISS Facility Services India PVT.LTD. ISS INDIA Active Directory Self Password Management Solution ISS Facility Services India PVT.LTD. Page 1 of 14 Contents 1. OVERVIEW... 3 2. USER REGISTRATION PROCESS... 3 STEP 1: USER LOGIN... 3 STEP 2:

More information

AT&T Global Network Client for Android

AT&T Global Network Client for Android Version 4.1.0 AT&T Global Network Client for Android 2016 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks contained herein are trademarks of AT&T Intellectual

More information

NextMD Patient Portal Guide

NextMD Patient Portal Guide Internet Security Below are some suggestions to help keep your health information secure: Use a password that is easy to remember but difficult for others to guess. Some web browsers will ask you to save

More information

Grapevine web hosting user manual. 12 August 2005

Grapevine web hosting user manual. 12 August 2005 Grapevine web hosting user manual 12 August 2005 Grapevine web hosting user manual 2 Contents Contents... 2 Introduction... 4 System features... 4 How it looks... 5 Main navigation... 5 Reports... 6 Web

More information

User Guide. BlackBerry Workspaces for Windows. Version 5.5

User Guide. BlackBerry Workspaces for Windows. Version 5.5 User Guide BlackBerry Workspaces for Windows Version 5.5 Published: 2017-03-30 SWD-20170330110027321 Contents Introducing BlackBerry Workspaces for Windows... 6 Getting Started... 7 Setting up and installing

More information

Equitrac Embedded for Kyocera Mita. Setup Guide Equitrac Corporation Equitrac Corporation

Equitrac Embedded for Kyocera Mita. Setup Guide Equitrac Corporation Equitrac Corporation Equitrac Embedded for Kyocera Mita 1.3 Setup Guide 2012 Equitrac Corporation 2012 Equitrac Corporation Equitrac Embedded for Kyocera Mita Setup Guide Document Revision History Revision Date Revision List

More information

Mobile Client. User Manual. Version: 2.0.0

Mobile Client. User Manual. Version: 2.0.0 Mobile Client User Manual Version: 2.0.0 Index Sr. No. Topic Page 1 Requirement 3 2 How to use Mobile Client 4 3 Compose Message 5 4 Select Contacts 6 5 Manage Contacts 17 6 Manage Distribution List 23

More information

VMware AirWatch Product Provisioning and Staging for Windows Rugged Guide Using Product Provisioning for managing Windows Rugged devices.

VMware AirWatch Product Provisioning and Staging for Windows Rugged Guide Using Product Provisioning for managing Windows Rugged devices. VMware AirWatch Product Provisioning and Staging for Windows Rugged Guide Using Product Provisioning for managing Windows Rugged devices. AirWatch v9.2 Have documentation feedback? Submit a Documentation

More information

LastPass Enterprise Recommended Policies Guide

LastPass Enterprise Recommended Policies Guide LastPass Enterprise Recommended Policies Guide This document will help guide you through common scenarios and selecting policies to enable on your LastPass Enterprise account. We will not cover all policies

More information

Workspace Secure Container for Mobile Devices

Workspace Secure Container for Mobile Devices Workspace Secure Container for Mobile Devices Version 1.1 Last Updated: April 24, 2014 2014 Verizon. All Rights Reserved. The Verizon name and logo and all other names, logos, and slogans identifying Verizon

More information

Go Ahead Bring Your Own Device to Work... 1 Requirements... 1

Go Ahead Bring Your Own Device to Work... 1 Requirements... 1 Table of Contents Go Ahead Bring Your Own Device to Work... 1 Requirements... 1 1: Activate AT&T Toggle... 1 1.1: Welcome Email with ORANGE Banner... 1 1.2: Welcome Email with BLUE Banner... 2 1.3: Orange

More information

PMS 138 C Moto Black spine width spine width 100% 100%

PMS 138 C Moto Black spine width spine width 100% 100% Series MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other product or service names are the property of their respective owners. 2009 Motorola, Inc. Table of

More information

VMware AirWatch Symbian Platform Guide Deploying and managing Symbian devices

VMware AirWatch Symbian Platform Guide Deploying and managing Symbian devices VMware AirWatch Symbian Platform Guide Deploying and managing Symbian devices AirWatch v8.1 and higher Have documentation feedback? Submit a Documentation Feedback support ticket using the Support Wizard

More information

Using the Vita Group Citrix Portal

Using the Vita Group Citrix Portal Using the Vita Group Citrix Portal Using the Portal Summary This document is will step you through using the Vita Group Citrix portal. This portal allows you to reset your password if it is expired, unlock

More information

ForeScout Extended Module for VMware AirWatch MDM

ForeScout Extended Module for VMware AirWatch MDM ForeScout Extended Module for VMware AirWatch MDM Version 1.7.2 Table of Contents About the AirWatch MDM Integration... 4 Additional AirWatch Documentation... 4 About this Module... 4 How it Works... 5

More information

Getting Started New User. To begin, open the Multi-Factor Authentication Service in your inbox.

Getting Started New User. To begin, open the Multi-Factor Authentication Service  in your inbox. Getting Started New User To begin, open the Multi-Factor Authentication Service email in your inbox. 1 1 Getting Started New User Click the link https://mfa.baptisthealth.net/portal. This link takes you

More information

Cloud Compute. Backup Portal User Guide

Cloud Compute. Backup Portal User Guide Cloud Compute Backup Portal User Guide Contents Service Overview... 4 Gaining Access... 5 Operational Guide... 6 Landing Page... 6 Profile View... 6 Detailed View... 8 Overview... 8 Cloud Backup... 8

More information

INF204x Module 2 Lab 2: Using Encrypting File System (EFS) on Windows 10 Clients

INF204x Module 2 Lab 2: Using Encrypting File System (EFS) on Windows 10 Clients INF204x Module 2 Lab 2: Using Encrypting File System (EFS) on Windows 10 Clients Estimated Time: 30 minutes You have a standalone Windows 10 client computer that you share with your colleagues. You plan

More information

DataTraveler 4000 User Manual

DataTraveler 4000 User Manual DataTraveler 4000 User Manual DataTraveler 4000 Find the language and latest documentation for DataTraveler 4000 here.... For instructions in English.................. Para instrucciones en Español...

More information

Setting up Special Credentials:

Setting up Special Credentials: Setting up Special Credentials: Adding a Toggle Credential A toggle badge will allow a specific credential to toggle a door from an unlock state and then back to a locked state. For example: if a door

More information

Dell EMC OpenManage Mobile. Version 3.0 User s Guide (Android)

Dell EMC OpenManage Mobile. Version 3.0 User s Guide (Android) Dell EMC OpenManage Mobile Version 3.0 User s Guide (Android) Notes, cautions, and warnings NOTE: A NOTE indicates important information that helps you make better use of your product. CAUTION: A CAUTION

More information

Dell EMC OpenManage Mobile. Version User s Guide (ios)

Dell EMC OpenManage Mobile. Version User s Guide (ios) Dell EMC OpenManage Mobile Version 2.0.20 User s Guide (ios) Notes, cautions, and warnings NOTE: A NOTE indicates important information that helps you make better use of your product. CAUTION: A CAUTION

More information

22 August 2018 NETOP REMOTE CONTROL PORTAL USER S GUIDE

22 August 2018 NETOP REMOTE CONTROL PORTAL USER S GUIDE 22 August 2018 NETOP REMOTE CONTROL PORTAL USER S GUIDE CONTENTS 1 Overview... 3 1.1 Netop Remote Control Portal... 3 1.2 Technical Requirements... 3 2 General... 4 2.1 Authentication... 4 2.1.1 Forgot

More information

IMC inode Intelligent Client v7.0 (E0106) Copyright (c) Hewlett-Packard Development Company, L.P. and its licensors.

IMC inode Intelligent Client v7.0 (E0106) Copyright (c) Hewlett-Packard Development Company, L.P. and its licensors. IMC inode Intelligent Client v7.0 (E0106) Copyright (c) 2011-2014 Hewlett-Packard Development Company, L.P. and its licensors. Table of Contents 1. What's New in this Release 2. Problems Fixed in this

More information

owncloud Android App Manual

owncloud Android App Manual owncloud Android App Manual Release 2.7.0 The owncloud developers October 30, 2018 CONTENTS 1 Release Notes 1 1.1 Changes in 2.7.0............................................. 1 1.2 Changes in 2.6.0.............................................

More information

CLIQ Web Manager. User Manual. The global leader in door opening solutions V 6.1

CLIQ Web Manager. User Manual. The global leader in door opening solutions V 6.1 CLIQ Web Manager User Manual V 6.1 The global leader in door opening solutions Program version: 6.1 Document number: ST-003478 Date published: 2016-03-31 Language: en-gb Table of contents 1 Overview...9

More information

Install Application Start Download the Application

Install Application Start Download the Application Install Application Start Download the Application Apple Android Enter A cardholder will download the app from either the itunes app store or the Android Google Play Store. 6 Install Application Completion

More information

A5500 Configuration Guide

A5500 Configuration Guide A5500 Configuration Guide Sri Ram Kishore February 2012 Table of contents Gateway Configuration... 3 Accessing your gateway configuration tool... 3 Configuring your broadband Internet access... 3 Configuring

More information

AD Sync Client Install Guide. Contents

AD Sync Client Install Guide. Contents AD Sync Client Install Guide Contents AD Sync Client Install Guide... 1 Introduction... 2 Deployment Prerequisites... 2 Configure SQL Prerequisites... 3 Switch SQL to Mixed Mode authentication... 3 Create

More information

AT&T Global Network Client for Mac User s Guide Version 1.7.3

AT&T Global Network Client for Mac User s Guide Version 1.7.3 Version 1.7.0 AT&T Global Network Client for Mac User s Guide Version 1.7.3 experience may vary. This document is not an offer, commitment, representation or warranty by AT&T and is subject to change..

More information

Comodo Antispam Gateway Software Version 2.11

Comodo Antispam Gateway Software Version 2.11 Comodo Antispam Gateway Software Version 2.11 User Guide Guide Version 2.11.041917 Comodo Security Solutions 1255 Broad Street Clifton, NJ, 07013 Table of Contents 1 Introduction to Comodo Antispam Gateway...3

More information

PAS. Installation Guide. BG0608 Rev. A1. Copyright SATEC Ltd.

PAS. Installation Guide. BG0608 Rev. A1. Copyright SATEC Ltd. PAS Installation Guide BG0608 Rev. A1 Copyright 2011-2017 SATEC Ltd. Table of Contents Chapter 1 Installation... 3 1. Scope... 3 2. Minimal installation requirements... 3 3. Pre-installation steps... 3

More information

TouchDown for Android Installation and Configuration Guide

TouchDown for Android Installation and Configuration Guide TouchDown for Android Installation and Configuration Guide 2013 NitroDesk Inc. All Rights Reserved. Unauthorized reproduction prohibited. TouchDown Version 8.1 - April 2013 Table of Contents Download

More information

USER MANUAL SafeStick

USER MANUAL SafeStick USER MANUAL SafeStick ------------------------ Sep 2017 ------------------------ Contents About this User Guide 3 System Requirements 4 Recommendations Setup 5 Setup- Windows 6 Setup- Mac 7 Device Initialization

More information

VMware AirWatch Certificate Authentication for EAS with NDES-MSCEP

VMware AirWatch Certificate Authentication for EAS with NDES-MSCEP VMware AirWatch Certificate Authentication for EAS with NDES-MSCEP For VMware AirWatch Have documentation feedback? Submit a Documentation Feedback support ticket using the Support Wizard on support.air-watch.com.

More information

Admin Table is oftr Caoto ntr e s U ntsser Guide Table of Contents Introduction Accessing the Portal

Admin Table is oftr Caoto ntr e s U ntsser Guide Table of Contents Introduction Accessing the Portal Administrator s Table of Contents User Guide Table of Contents Introduction 3 Accessing the Portal 3 Create User Accounts 4 Enable / Disable User Accounts 5 Manage Users from an LDAP Server 5 User Roles

More information

STAAR Alternate 2 and TELPAS Assessment Management System User s Guide

STAAR Alternate 2 and TELPAS Assessment Management System User s Guide 2017 2018 STAAR Alternate 2 and TELPAS Assessment Management System User s Guide TABLE OF CONTENTS Introduction...1 Signing in...1 Training Site...3 Infrastructure Trial...4 Create and Manage User Accounts...9

More information

Overview. Top. Welcome to SysTools MailXaminer

Overview. Top. Welcome to SysTools MailXaminer Table of Contents Overview... 2 System Requirements... 3 Installation of SysTools MailXaminer... 4 Uninstall Software... 6 Software Menu Option... 8 Software Navigation Option... 10 Complete Steps to Recover,

More information

S2 NetBox v4.8 Basic End-User Admin Training

S2 NetBox v4.8 Basic End-User Admin Training S2 NetBox v4.8 Basic End-User Admin Training 4/8/16 S2 Security 1 Table of Contents Introduction... 3 Log into your NetBox System... 3 Person Records... 5 Accessing Person Records... 5 Content of a Person

More information

Compliance Manager ZENworks Mobile Management 2.7.x August 2013

Compliance Manager ZENworks Mobile Management 2.7.x August 2013 www.novell.com/documentation Compliance Manager ZENworks Mobile Management 2.7.x August 2013 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of this

More information