Ekran System v Program Overview
|
|
- Miles Osborne Henderson
- 5 years ago
- Views:
Transcription
1 Ekran System v. 5.1 Program Overview
2 Contents About the Program Ekran Server & Management Tool Database Management Licensing Client Installation Monitoring Parameters Client Protection Advanced User Authentication Two-Factor Authentication Administrator s Approval on Login Notifying Users about Being Monitored User Blocking Viewing Sessions Alerts USB Monitoring Dashboards Interactive Monitoring Reports Page 2 of 102
3 About the Program Page 3 of 102
4 About the Program Smart user activity video recording system. Privileged Identity Management Employee Work Control Cost Saver on the Market Ekran System allows creating indexed video records of all concurrent Windows, Citrix, and Linux terminal sessions on your servers and record remote and local sessions on workstations. Are you interested in your company's security? Do you want to know what your employees do during their working hours? Do you want to control sensitive information use? Ekran System provides all popular segment features while offering much more beneficial pricing than ObserveIT or Citrix Smart Auditor. Page 4 of 102
5 About the Program Ekran System is an affordable user monitoring solution for enhanced cyber security. You can record all terminal, remote, and local user sessions and alert security personnel to suspicious events. Ekran System Components Ekran Management Tool Ekran Server Ekran Clients Windows/Linux/Citrix GUI part used for system management & session viewing Main component used for storing data obtained from Client computers Components installed on the target computer to monitor user activity and send it to the Server Page 5 of 102
6 Ekran System Structure Page 6 of 102
7 High Availability Mode (Enterprise Edition) The High Availability mode provides a high level of operational performance and balances the load of sent data, minimizing downtime and service interruptions. Page 7 of 102
8 Ekran Server & Management Tool User management, permissions, Active Directory Integration, Management Tool settings Page 8 of 102
9 Management Tool You can manage the whole system via the Management Tool in your browser. Page 9 of 102
10 User Management & Permissions Create two types of users: Internal or Active Directory (Windows domain users/groups). Use groups for easier user management. Define permissions for users. Page 10 of 102
11 Active Directory Integration Integration with Active Directory allows you to establish the domain trusts with multiple domains. Page 11 of 102
12 Active Directory Integration Integration with Active Directory allows you to do the following: Add users & user groups from trusted domains to allow them to access the Management Tool and Client machines with enabled Forced User Authentication. Create alerts for domain groups to quickly respond to suspicious user activity on the Client computers belonging to trusted domains. Page 12 of 102
13 Management Tool Log Audit all user activities performed in the Management Tool via the Management Tool Log with the detailed information on all changes. Page 13 of 102
14 Database Management Page 14 of 102
15 Database Configuration Page 15 of 102
16 Database Cleanup One-Time Cleanup Scheduled Cleanup Page 16 of 102
17 Database Archiving (Enterprise Edition) Archive and delete the old monitored data from the Database to not run out of space on the Server computer and to save the monitored data in a secure storage. Page 17 of 102
18 Database Archiving (Enterprise Edition) You can view the archived sessions from your archived database in the Session Viewer and perform searches in them in a usual way at any time. Page 18 of 102
19 SIEM Integration Ekran System integrates with your SIEM system using log files of the monitored events. Page 19 of 102
20 Advanced SIEM Integration Create a CEF log file to get access to the Ekran System alert events and monitored data via the integral ArcSight or Splunk interface. Page 20 of 102
21 Licensing Types of Licenses & Serial Key Management Page 21 of 102
22 Licensing Ekran System is licensed by the number of Ekran Clients, end-points to be monitored. All management components, including Server and Management Tool, are provided for free with any deployment. Types of Ekran Client licenses: Windows workstation license Windows server license Linux machine license Page 22 of 102
23 Serial Key & License Management Request a trial serial key for 30 days to deploy the system and review its basic features with a restriction of 5 workstation licenses, 1 server license, and 3 Linux licenses. To work with Ekran System for a longer period, license it by activating the serial keys on the computer with the installed Ekran Server. You can use either permanent keys, or subscription keys. Page 23 of 102
24 Enterprise Key Activate Enterprise serial key to get exclusive access to a set of additional, valuable features of Enterprise Edition of Ekran System. Page 24 of 102
25 Client Installation Page 25 of 102
26 Installing Ekran Clients Convenient Ekran Client installation: Local: o Linux Clients (via tar.gz file) o Windows Clients using installation file with default parameters using generated package with customized parameters Remote (for Windows Clients) Remote Installation Select computers to install Clients on Customize installation parameters The Clients are successfully installed! Page 26 of 102
27 Target Computers for Remote Installation Scan your local computer network Define a range of IP addresses to search the target computers Simply enter target computer names Page 27 of 102
28 Monitoring Parameters Page 28 of 102
29 Client Monitoring The data the Client sends is stored in the form of deltas (differences between a newer screen capture and an older one) to minimize storage space. Recorded information is saved in an easy-to-review and easy-tosearch form: The name of the launched application The title of the active window Entered URL Text entered via user s keyboard (keystrokes) Clipboard text data (copied and pasted text) Commands executed in Linux (both from user input & by running the scripts) The information on plugged-in USB devices Page 29 of 102
30 Screen Capturing Ekran Client screen capture creation is event-triggered by default. You can configure the Client to capture active window only. Page 30 of 102
31 URL Monitoring Ekran Client monitors URLs entered in web browsers. You can configure the Client to monitor full URLs or domains of top and second level only. Page 31 of 102
32 Keystroke Logging Ekran Client captures all text entered through the user s keyboard and adjusts it for better comprehension. Use a special Viewing text data permission to limit user access to this sensitive data. Page 32 of 102
33 Keyword-Triggered Monitoring You can configure Ekran Client to start monitoring and creating screen captures only after detecting the defined keywords entered by the user. Page 33 of 102
34 Clipboard Monitoring Ekran Client captures all text data, which has been copied or cut and then pasted into documents, files, applications, browser address line, etc. on the Windows Client machines. Page 34 of 102
35 Application Filtering Ekran System allows you to define the filtering rules for websites/applications to adjust the amount of monitored data and exclude the areas where private information can be observed to comply with corporate policy rules and country regulations related to user privacy. Page 35 of 102
36 Privileged User Monitoring Monitor the activity of users logging in under privileged user accounts. Page 36 of 102
37 Client Group Settings You can define the settings for a Client Group and then apply them to the Client to save your time. Page 37 of 102
38 Client Protection Page 38 of 102
39 Protected Mode Ekran System allows you to protect the Client and its data by enabling the Protected Mode. The usage of Protected Mode has the following advantages: Prevention of Client uninstallation. Prevention of stopping Client processes. Prevention of editing Client system files and logs. Prevention of editing Client settings in the registry of the Client computer. Prevention of modification, removal, and renaming of Client files. Page 39 of 102
40 Client Uninstallation Users, including privileged ones, are unable to stop the Client working on their machines, as well as remove the Client locally without the Administrator assistance. Only Ekran System Administrator knows the uninstallation key defined prior to Client installation and necessary for local removal. Page 40 of 102
41 Advanced User Authentication Page 41 of 102
42 Advanced User Authentication Advanced user authentication allows you to achieve two goals: Monitor users activity on the computer when multiple users use the same credentials to log in. Improve your security by limiting the access to the specific users who know secondary authentication credentials. Page 42 of 102
43 Advanced User Authentication (Windows Clients) The Ekran System Client requests entering credentials before allowing a user to work with Windows Server. Page 43 of 102
44 One-Time Password (Windows Clients) Enterprise Edition Ekran System provides the administrator with a unique ability to generate a one-time password for a user to login to the Client computer with Windows Server OS. Page 44 of 102
45 One-Time Password (Windows Clients) The user can request a one-time password directly from the secondary authentication window displayed on login to Windows Server. Page 45 of 102
46 Advanced User Authentication (Linux Clients) The Ekran System Client requests entering credentials before allowing a user to work with the terminal on Linux Client machines. Page 46 of 102
47 Two-Factor Authentication Page 47 of 102
48 Two-Factor Authentication Two-factor authentication allows you to enable an extra layer of security to better protect the critical endpoints in your network. Page 48 of 102
49 Two-Factor Authentication Add users who will be allowed to log into the Windows Server Client machines using time-based one-time passwords (TOTP) generated in the TOTP mobile applications. Page 49 of 102
50 Two-Factor Authentication The Ekran System Client prompts the user to enter a TOTP to start working with the system. Page 50 of 102
51 Administrator s Approval on Login Page 51 of 102
52 Administrator s Approval on Login Administrator s approval on login allows you to better protect the Client machines in your network from undesired access. Page 52 of 102
53 Administrator s Approval on Login Add users whose access to the Client machines needs to be restricted. Page 53 of 102
54 Administrator s Approval on Login When the restricted user logs into the Client machine, the Client blocks the desktop and sends the user s access request to the administrator. Page 54 of 102
55 Administrator s Approval on Login After the administrator confirms the user s access request, the user is allowed to start working with the system. Page 55 of 102
56 Notifying Users about Being Monitored Page 56 of 102
57 Notifying Users about Being Monitored To follow the security policy of your company or your country regulations, you can: Enable displaying an additional message on user logging in to notify the user that his or her work is being monitored. Display a Client tray icon with the notification about monitoring to the user. Page 57 of 102
58 Notifying Users about Being Monitored Require the users to enter the comments to the additional message displayed on their login to the Client computers. Page 58 of 102
59 Notifying Users about Being Monitored Required the user to enter a valid ticket number created in the integrated ticketing system to start working with the Client machine. Page 59 of 102
60 User Blocking Page 60 of 102
61 User Blocking Overview Ekran System allows you to block users performing potentially harmful and forbidden actions on computers with Windows Server operating system with Ekran Clients installed on them. Users can be blocked from both Live and Finished sessions. Page 61 of 102
62 User Blocking Overview The user desktop is blocked, and after the defined time interval the user is forcedly logged out. If the blocked user tries to log in to the Client computer, the system does not allow him/her to do so. Page 62 of 102
63 Viewing Blocked User List The Blocked User List contains information on who, where, and when was blocked. To allow the users access to the Client Computer, remove them from the list. Page 63 of 102
64 Viewing Sessions Page 64 of 102
65 Searching Data in Session List Ekran Management Tool allows searching in the recorded sessions. Search is performed by different parameters: For Windows Clients: active window title, application name, user name, Client name, visited URL, entered keystrokes, clipboard text data, user s comment to the additional message, ticket number, USB device information. For Linux Clients: commands and command parameters. Page 65 of 102
66 Viewing Live Session Ekran System allows you to perform monitoring of user activity in real time. You can connect to a Live session and observe the activities a user is performing at the given moment. Page 66 of 102
67 Magnifying Glass You can enlarge certain parts of the video in the Session Player by using the Magnifying Glass. Page 67 of 102
68 Forensic Export With Ekran System Forensic Export, you can: Export a monitored session or its part to a securely encrypted file. Investigate the recorded user activity in the in-built offline session viewer. Present evidence in forensic format to the third parties. Page 68 of 102
69 Alerts Page 69 of 102
70 Setting Up Alerts Ekran System allows you to enable quick incident response using alert notifications: Set up alerts about suspicious user activity on the Client computers. Specify individuals to receive instant alert notifications via or in the Tray Notifications application. Page 70 of 102
71 Default Alerts Ekran System contains a set of default alerts prepared by the vendor security experts. They will alarm you about data leakage, potentially fraudulent, illicit, or work-unrelated activities. Page 71 of 102
72 Alerts in Session Player Monitored data associated with alert events is highlighted in different colors in the Session Player according to the alert risk level. Page 72 of 102
73 Alerts in Alert Viewer You can view detailed information on all alert events as well as screen captures associated with them in a special viewer. Page 73 of 102
74 Receiving Alerts Receive alert notifications in real time, review them in the Ekran System Tray Notifications journal, and open the session with the alert-related data in the Session Player. Page 74 of 102
75 USB Monitoring Page 75 of 102
76 USB Monitoring Overview Ekran System provides two types of monitoring USB devices plugged into the Client computer: USB-based storage monitoring, to view information on the devices detected by Windows as mass storage and receive alert notifications. Kernel-level USB monitoring, for an in-depth analysis of pluggedin devices and their blocking. Page 76 of 102
77 Setting Up Kernel-level USB Rules Ekran System can detect USB devices connected to a computer, alert you on device plugging in, and block their usage (either all devices of a certain class or all except the allowed devices) on a Client computer. Page 77 of 102
78 USB-Based Storage Monitoring USB-based storages are automatically detected on being plugged in. Page 78 of 102
79 Kernel-Level USB Monitoring Screen captures created on USB devices being plugged in or blocked are highlighted in the Session Viewer. Page 79 of 102
80 Dashboards Page 80 of 102
81 Dashboards Overview The dashboards offer a convenient real-time view of the most useful data grouped in one place. Customize the dashboards on the Management Tool Home page by adjusting their look and settings. Page 81 of 102
82 Dashboard Types There are three main types of Ekran System dashboards: System State Dashboards o Licenses o Clients o Database Storage Usage Monitoring Dashboards o Recent Alerts o Latest Live Sessions Threat Detection Dashboards o Sessions out of Work Hours o Rarely Used Computers o Rarely Used Logins Page 82 of 102
83 System State Dashboards Clients Database Storage Usage Licenses Page 83 of 102
84 Monitoring Dashboards Recent Alerts Latest Live Sessions Page 84 of 102
85 Threat Detection Dashboards Rarely Used Computers Rarely Used Logins Sessions out of Work Hours Page 85 of 102
86 Interactive Monitoring Page 86 of 102
87 Interactive Monitoring Overview You can filter out data by three parameters: Who: filter by a specific user logged into the Client computer. Where: filter by a specific Client. When: filter by the time period. Additionally, you can set the order of bars being displayed, using the Applications and URLs filters. Data is displayed in the form of two column charts (Application Monitoring chart and URL Monitoring chart). To see the list of application/website entries, click on the column with the application/website name. Page 87 of 102
88 Application Monitoring Chart This chart provides information on the application usage frequency. You can also use this chart to analyze information on the most rarely used applications and detect any threats and suspicious activity on investigated computers. Page 88 of 102
89 URL Monitoring Chart This chart provides information on the website visiting frequency. You can also use this chart to analyze information on the most and least visited websites and detect potentially harmful activity on investigated computers. Page 89 of 102
90 Reports Page 90 of 102
91 Reports & Statistics Ekran System Reports provide the full overview of the time spent in applications and on websites visited on the user s machine. Generate a highly customizable report ad-hoc or schedule sending reports to your on a daily, weekly, or monthly basis. The reported activity can include alerts, launched applications, visited websites, plugged-in/blocked USB devices, and executed Linux commands. Scheduled Reports Page 91 of 102
92 Reports & Statistics The reports can be generated manually at any time for any time period. Manual Report Generation Page 92 of 102
93 Report Types Activity summary report Activity pie chart report Activity chart report Page 93 of 102
94 Report Types User statistics report Page 94 of 102
95 Report Types Session grid report Page 95 of 102
96 Report Types Detailed Activity report Page 96 of 102
97 Report Types Keystroke grid report Clipboard grid report Page 97 of 102
98 Report Types Alert grid report Page 98 of 102
99 Report Types URL summary report URL pie chart report URL chart report Page 99 of 102
100 Report Types USB storage grid report Kernel-level USB storage grid report Page 100 of 102
101 Report Types In the Linux grid report, you can view all exec* and sudo commands executed on Linux Client computers. Linux grid report Page 101 of 102
102 Visit us online: Page 102 of 102
Ekran System v Program Overview
Ekran System v. 6.2 Program Overview Contents About the Program Login Ekran Server & Management Tool Notifying Users about Being Database Management Monitored Licensing User Blocking Client Installation
More informationEkran System v.5.1 Help File
Ekran System v.5.1 Help File Table of Contents About... 13 What s New... 14 System Requirements... 16 Program Structure... 18 Getting Started... 19 Deployment Process... 19 Working with Application...
More informationObserveIT Release Notes
ObserveIT 7.5.2 Release Notes This document lists new and deprecated supported platforms, issues that were discovered and fixed since the release of the previous release of ObserveIT, and known issues
More informationSecret Server Demo Outline
Secret Server is a feature rich product that can be introduced to your prospects in many different ways. Below is a generic outline of several of the most important features that should be covered during
More informationEkran System v.6.3 Help File
Ekran System v.6.3 Help File Table of Contents About... 17 System Requirements... 18 Program Structure... 21 Getting Started... 23 Deployment Process... 23 Working with Application... 24 Server and Database...
More informationObserveIT 7.1 Release Notes
ObserveIT 7.1 Release Notes In This Document About This Release... 2 New Features and Enhancements... 2 Backward Compatibility... 3 New Supported Platforms... 3 Resolved Issues... 4 Known Issues... 4 Limitations...
More informationSecurity from the Inside
Security from the Inside Detect, Record, and Eliminate Malicious User Behavior 24/7 live screen recording & playback Automatically allow or block any activity Real-time user activity tracking Rule-based
More informationEkran System v.5.2 Deployment Guide
Ekran System v.5.2 Deployment Guide Table of Contents About... 6 System Requirements... 7 Program Structure... 9 Deployment Process... 10 Server and Database... 11 About... 11 Database Types Comparison...
More informationWHAT S NEW IN OBSERVEIT 5.8 ObserveIT 5.8 delivers a range of enhancements aimed at more efficiently supporting the monitoring of business users.
WHAT S NEW IN OBSERVEIT 5.8 ObserveIT 5.8 delivers a range of enhancements aimed at more efficiently supporting the monitoring of business users. Risky user behavior is behind the majority of breaches
More informationWHAT S NEW WITH OBSERVEIT: INSIDER THREAT MANAGEMENT VERSION 6.5
WHAT S NEW WITH OBSERVEIT: INSIDER THREAT MANAGEMENT VERSION 6.5 ObserveIT s award-winning insider threat management software combines user monitoring, behavioral analytics, and now policy enforcement
More informationUser Guide. Version R94. English
AuthAnvil User Guide Version R94 English March 8, 2017 Copyright Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept EULATOS as updated
More informationUser Guide. Version R92. English
AuthAnvil User Guide Version R92 English October 9, 2015 Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept EULATOS as updated from
More informationPCI DSS Compliance. White Paper Parallels Remote Application Server
PCI DSS Compliance White Paper Parallels Remote Application Server Table of Contents Introduction... 3 What Is PCI DSS?... 3 Why Businesses Need to Be PCI DSS Compliant... 3 What Is Parallels RAS?... 3
More informationHPE Intelligent Management Center
HPE Intelligent Management Center EAD Security Policy Administrator Guide Abstract This guide contains comprehensive information for network administrators, engineers, and operators working with the TAM
More informationEkran System v.6.0 Privileged User Accounts and Sessions (PASM)
Ekran System v.6.0 Privileged User Accounts and Sessions (PASM) Table of Contents About... 3 Using Privileged User Accounts... 4 Password Vault Configuration... 5 Defining Domain Administrator Credentials...
More informationUSER GUIDE Summer 2015
USER GUIDE Summer 2015 Copyright and Disclaimer This document, as well as the software described in it, is furnished under license of the Instant Technologies Software Evaluation Agreement and may be used
More informationEkran System v.5.5 Deployment Guide
Ekran System v.5.5 Deployment Guide Table of Contents About... 6 System Requirements... 7 Program Structure... 10 Deployment Process... 12 Server and Database... 13 About... 13 Database Types Comparison...
More informationQuick Start Guide. Kaseya 2009
Agent Configuration and Deployment Quick Start Guide Kaseya 2009 February 13, 2010 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private Sector
More informationNETWRIX GROUP POLICY CHANGE REPORTER
NETWRIX GROUP POLICY CHANGE REPORTER ADMINISTRATOR S GUIDE Product Version: 7.2 November 2012. Legal Notice The information in this publication is furnished for information use only, and does not constitute
More informationUser Guide. Version R94. English
Cloud Backup User Guide Version R94 English March 30, 2017 Copyright Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept EULATOS
More informationUser Guide. Version R95. English
Cloud Backup User Guide Version R95 English September 11, 2017 Copyright Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept EULATOS
More informationEkran System v.6.1 Troubleshooting
Ekran System v.6.1 Troubleshooting Quick Access to Log Files Table of Contents Quick Access to Log Files... 3 Database/Server... 4 Database/Server Related Issues... 4 Database/Server Related Error Messages...
More informationNetwrix Auditor for SQL Server
Netwrix Auditor for SQL Server Quick-Start Guide Version: 9.5 10/25/2017 Legal Notice The information in this publication is furnished for information use only, and does not constitute a commitment from
More informationHIPAA Regulatory Compliance
Secure Access Solutions & HIPAA Regulatory Compliance Privacy in the Healthcare Industry Privacy has always been a high priority in the health profession. However, since the implementation of the Health
More informationZemana Endpoint Security Administration Guide. Version
Zemana Endpoint Security Administration Guide Version 1.9.290 Introduction 4 What is Zemana Endpoint Security? 4 What is Zemana Control Center? 4 How do Endpoint Agents and Control Center communicate with
More informationISO COMPLIANCE GUIDE. How Rapid7 Can Help You Achieve Compliance with ISO 27002
ISO 27002 COMPLIANCE GUIDE How Rapid7 Can Help You Achieve Compliance with ISO 27002 A CONTENTS Introduction 2 Detailed Controls Mapping 3 About Rapid7 8 rapid7.com ISO 27002 Compliance Guide 1 INTRODUCTION
More informationWINDOWS HOST GUIDE. Remote Support & Management PC Mac Tablet Smartphone Embedded device. WiseMo Host module on your PC or Server
WINDOWS HOST GUIDE Remote Support & Management PC Mac Tablet Smartphone Embedded device WiseMo Guest module for example on your Windows PC WiseMo Host module on your PC or Server WiseMo develops software
More informationXProtect Go 2016 R2. Specification Sheet
XProtect Go 2016 R2 Specification Sheet Contents Feature Overview... 3 XProtect Go server modules... 3 XProtect Go client modules... 3 Detailed Product Features... 4 XProtect Go server modules... 4 XProtect
More informationGDPR Controls and Netwrix Auditor Mapping
GDPR Controls and Netwrix Auditor Mapping www.netwrix.com Toll-free: 888-638-9749 About GDPR The General Data Protection Regulation (GDPR) is a legal act of the European Parliament and the Council (Regulation
More informationUnderstand & Prepare for EU GDPR Requirements
Understand & Prepare for EU GDPR Requirements The information landscape has changed significantly since the European Union (EU) introduced its Data Protection Directive in 1995 1 aimed at protecting the
More informationCyber security tips and self-assessment for business
Cyber security tips and self-assessment for business Last year one in five New Zealand SMEs experienced a cyber-attack, so it s essential to be prepared. Our friends at Deloitte have put together this
More informationUpgrading an ObserveIT One-Click Installation
Upgrading an ObserveIT One-Click Installation This document was written for ObserveIT Enterprise version 7.6.1. This document uses screenshots and procedures written for Windows Server 2012 R2 and SQL
More informationNETWRIX PASSWORD EXPIRATION NOTIFIER
NETWRIX PASSWORD EXPIRATION NOTIFIER ADMINISTRATOR S GUIDE Product Version: 3.3 January 2013 Legal Notice The information in this publication is furnished for information use only, and does not constitute
More informationNETWRIX ACTIVE DIRECTORY CHANGE REPORTER
NETWRIX ACTIVE DIRECTORY CHANGE REPORTER ADMINISTRATOR S GUIDE Product Version: 7.2 January 2013. Legal Notice The information in this publication is furnished for information use only, and does not constitute
More informationNetwrix Auditor for Active Directory
Netwrix Auditor for Active Directory Quick-Start Guide Version: 8.0 4/22/2016 Legal Notice The information in this publication is furnished for information use only, and does not constitute a commitment
More informationOBSERVEIT TECHNICAL SOLUTION OVERVIEW
OBSERVEIT TECHNICAL SOLUTION OVERVIEW This document outlines the key features, system architecture, deployment scenarios, system requirements, product installation, security infrastructure, data management,
More informationSync User Guide. Powered by Axient Anchor
Sync Powered by Axient Anchor TABLE OF CONTENTS End... Error! Bookmark not defined. Last Revised: Wednesday, October 10, 2018... Error! Bookmark not defined. Table of Contents... 2 Getting Started... 7
More informationSOLUTION OVERVIEW. Enterprise-grade security management solution providing visibility, management and reporting across all OSes.
SOLUTION OVERVIEW Enterprise-grade security management solution providing visibility, management and reporting across all OSes. What is an endpoint security management console? ESET Security Management
More informationKaseya 2. Quick Start Guide. for VSA 6.1
Kaseya 2 Agent Configuration and Deployment Quick Start Guide for VSA 6.1 May 16, 2011 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private
More informationXProtect Essential 2017 R1 Specification Sheet. Specification Sheet
Contents Feature Overview... 3 XProtect Essential server modules... 3 XProtect Essential client modules... 3 Detailed Product Features... 4 XProtect Essential server modules... 4 XProtect Essential Server
More informationGRS Enterprise Synchronization Tool
GRS Enterprise Synchronization Tool Last Revised: Thursday, April 05, 2018 Page i TABLE OF CONTENTS Anchor End User Guide... Error! Bookmark not defined. Last Revised: Monday, March 12, 2018... 1 Table
More information22 August 2018 NETOP REMOTE CONTROL PORTAL USER S GUIDE
22 August 2018 NETOP REMOTE CONTROL PORTAL USER S GUIDE CONTENTS 1 Overview... 3 1.1 Netop Remote Control Portal... 3 1.2 Technical Requirements... 3 2 General... 4 2.1 Authentication... 4 2.1.1 Forgot
More informationYOUR IT REMOTE MANAGEMENT & SUPPORT SOLUTION. Goverlan REACH vs TeamViewer
YOUR IT REMOTE MANAGEMENT & SUPPORT SOLUTION Goverlan REACH vs TeamViewer UPDATED: 03/09/2018 GOVERLAN vs TEAMVIEWER Schedule a demo Request a Free-Trial Looking for a TeamViewer alternative? Read our
More informationOnline documentation: Novell Documentation Web site. (http://www.novell.com/ documentation/securelogin70/index.html)
Novell SecureLogin 7.0 Readme September 18, 2009 Novell 1 Documentation The following sources provide information about Novell SecureLogin 7.0: Online documentation: Novell Documentation Web site. (http://www.novell.com/
More informationUser Guide. Version R95. English
Software Management User Guide Version R95 English September 22, 2017 Copyright Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept
More informationWorkstation Configuration Guide
Workstation Configuration Guide August 13, 2018 Version 9.6.134.78 For the most recent version of this document, visit our documentation website. Table of Contents 1 Workstation configuration 4 1.1 Considerations
More informationDSS User Guide. End User Guide. - i -
DSS User Guide End User Guide - i - DSS User Guide Table of Contents End User Guide... 1 Table of Contents... 2 Part 1: Getting Started... 1 How to Log in to the Web Portal... 1 How to Manage Account Settings...
More informationDetector Service Delivery System (SDS) Version 3.0
Detector Service Delivery System (SDS) Version 3.0 Detecting and Responding to IT Security Policy Violations Quick Start Guide 2018 RapidFire Tools, Inc. All rights reserved. V20180112 Contents Overview
More informationVerity Central Quick Reference Manual. Document ID A04
Verity Central Quick Reference Manual Document ID 6620-003-A04 Welcome to Verity Central. This Quick Reference Manual is intended to be used in tandem with the Verity Central Technical Reference Manual,
More informationSOLUTION OVERVIEW. Manage your network security for up to 250 seats from a single cloud-based console
SOLUTION OVERVIEW Manage your network security for up to 250 seats from a single cloud-based console 2 With ESET Cloud Administrator, you can manage your company network security without the need to buy,
More informationPerforming an ObserveIT Upgrade Using the Interactive Installer
Performing an ObserveIT Upgrade Using the Interactive Installer ABOUT THIS DOCUMENT This document contains detailed procedures and instructions on how to upgrade ObserveIT by using the interactive "One
More informationObserveIT Technology Overview
PRODUCT FACT SHEET ObserveIT Technology Overview At a Glance This document outlines the deployment scenarios, component architecture, technical feature descriptions and integration capabilities of ObserveIT
More informationPrivileged Remote Access 18.3 Access Console User Guide
Privileged Remote Access 18.3 Access Console User Guide 2003-2019 BeyondTrust Corporation. All Rights Reserved. BEYONDTRUST, its logo, and JUMP are trademarks of BeyondTrust Corporation. Other trademarks
More informationWorkstation Configuration
Workstation Configuration December 15, 2017 - Version 9.3 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
More information10.2 Running process checklist Contacting TEMASOFT Support... 30
2018 User manual Contents Table of Figures... 3 1. Introduction... 4 1.1. About TEMASOFT Ranstop... 4 1.2. How TEMASOFT Ranstop works... 5 1.3. TEMASOFT Ranstop components... 5 2. Installing TEMASOFT Ranstop...
More informationForeScout Extended Module for Tenable Vulnerability Management
ForeScout Extended Module for Tenable Vulnerability Management Version 2.7.1 Table of Contents About Tenable Vulnerability Management Module... 4 Compatible Tenable Vulnerability Products... 4 About Support
More informationWebEx Fundamentals User Guide
WebEx Fundamentals User Guide June 2017 2017 Kent State University This information is provided by the Division of Information Services, Kent State University and is proprietary and confidential. These
More informationAgent and Agent Browser. Updated Friday, January 26, Autotask Corporation
Agent and Agent Browser Updated Friday, January 26, 2018 2018 Autotask Corporation Table of Contents Table of Contents 2 The AEM Agent and Agent Browser 3 AEM Agent 5 Privacy Mode 9 Agent Browser 11 Agent
More informationWorkstation Configuration
Workstation Configuration December 12, 2017 - Version 9.4 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
More informationComodo Next Generation Security Information and Event Management Software Version 1.4
rat Comodo Next Generation Security Information and Event Management Software Version 1.4 Administrator Guide Guide Version 1.4.101915 Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013 Table
More informationKaseya 2. User Guide. Version 2.1
Kaseya 2 Endpoint Security User Guide Version 2.1 July 19, 2011 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private Sector IT organizations.
More informationWorkstation Configuration
Workstation Configuration September 22, 2015 - Version 9 & 9.1 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
More informationAcronis Data Cloud plugin for ConnectWise Automate
Acronis Data Cloud plugin for ConnectWise Automate USER'S GUIDE Revision: 24.08.2018 Table of contents 1 Introduction...3 2 What's new in Update 4...3 3 What's new in Update 3...3 4 What's new in Update
More informationSECURITY & PRIVACY DOCUMENTATION
Okta s Commitment to Security & Privacy SECURITY & PRIVACY DOCUMENTATION (last updated September 15, 2017) Okta is committed to achieving and preserving the trust of our customers, by providing a comprehensive
More informationAnchor User Guide. Presented by: Last Revised: August 07, 2017
Anchor User Guide Presented by: Last Revised: August 07, 2017 TABLE OF CONTENTS GETTING STARTED... 1 How to Log In to the Web Portal... 1 How to Manage Account Settings... 2 How to Configure Two-Step Authentication...
More informationEntrust. Discovery 2.4. Administration Guide. Document issue: 3.0. Date of issue: June 2014
Entrust Discovery 2.4 Administration Guide Document issue: 3.0 Date of issue: June 2014 Copyright 2010-2014 Entrust. All rights reserved. Entrust is a trademark or a registered trademark of Entrust, Inc.
More informationManageEngine EventLog Analyzer Quick Start Guide
ManageEngine EventLog Analyzer Quick Start Guide Contents Installing and starting EventLog Analyzer Connecting to the EventLog Analyzer server Adding devices for monitoring Adding Windows devices Adding
More informationDeposit Wizard TellerScan Installation Guide
Guide Table of Contents System Requirements... 2 WebScan Overview... 2 Hardware Requirements... 2 Supported Browsers... 2 Driver Installation... 2 Step 1 - Determining Windows Edition & Bit Count... 3
More informationSecure Access & SWIFT Customer Security Controls Framework
Secure Access & SWIFT Customer Security Controls Framework SWIFT Financial Messaging Services SWIFT is the world s leading provider of secure financial messaging services. Their services are used and trusted
More informationSOC-2 Requirement Solution Brief. EventTracker 8815 Centre Park Drive, Columbia MD SOC-2
Requirement Solution Brief 8815 Centre Park Drive, Columbia MD 21045 About delivers business critical software and services that transform high-volume cryptic log data into actionable, prioritized intelligence
More informationUSER MANUAL. MageMob Admin TABLE OF CONTENTS. Version: 1.0.0
USER MANUAL TABLE OF CONTENTS Introduction... 1 Benefits of MageMob Admin... 1 Installation & Activation... 2 Pre-requisite... 2 Installation Steps... 2 Installation via Composer... 4 Extension Activation...
More informationUser Guide. Version R95. English
Anti-Malware (Classic) User Guide Version R95 English July 20, 2017 Copyright Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept
More informationMOVE BEYOND GPO FOR NEXT-LEVEL PRIVILEGE MANAGEMENT
MOVE BEYOND GPO FOR NEXT-LEVEL PRIVILEGE MANAGEMENT DON T USE A HAMMER MOVE BEYOND GPO FOR NEXT-LEVEL TO TURN A SCREW PRIVILEGE MANAGEMENT The first stage of privilege management Most organizations with
More informationAUTHORIZED DOCUMENTATION
Administration Guide AUTHORIZED DOCUMENTATION Novell SecureLogin 6.1 SP1 June, 2009 www.novell.com Novell SecureLogin 6.1 SP1 Administration Guide Legal Notices Novell, Inc. makes no representations or
More informationKenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data
Kenna Platform Security A technical overview of the comprehensive security measures Kenna uses to protect your data V3.0, MAY 2017 Multiple Layers of Protection Overview Password Salted-Hash Thank you
More informationMilestone XProtect Basis+
XPB+ 6.0 FACTSHEET Milestone XProtect Basis+ Top performance IP video surveillance with an expanded feature set. XProtect Basis+ is the right product for small installations that need robust single-server
More informationRemote Support 19.1 Web Rep Console
Remote Support 19.1 Web Rep Console 2003-2019 BeyondTrust Corporation. All Rights Reserved. BEYONDTRUST, its logo, and JUMP are trademarks of BeyondTrust Corporation. Other trademarks are the property
More informationCloud Security Whitepaper
Cloud Security Whitepaper Sep, 2018 1. Product Overview 3 2. Personally identifiable information (PII) 3 Using Lookback without saving any PII 3 3. Security and privacy policy 4 4. Personnel security 4
More informationNuance Management Center
Nuance Management Center Version 5.6 Release Notes Copyright Copyright 2002-2016 Nuance Communications, Inc. All rights reserved. Nuance, ScanSoft, the Nuance logo, the Dragon logo, Dragon, DragonBar,
More informationMigration from Citrix. White Paper Parallels Remote Application Server
Migration from Citrix White Paper Parallels Remote Application Server Table of Contents Introduction... 3 Why Should You Migrate from Citrix to Parallels RAS?... 3 Migrating from Citrix to Parallels RAS...
More informationVMware vcloud Air SOC 1 Control Matrix
VMware vcloud Air SOC 1 Control Objectives/Activities Matrix VMware vcloud Air goes to great lengths to ensure the security and availability of vcloud Air services. In this effort, we have undergone a
More informationWelcome to PDQ Deploy
Getting Started Contents Welcome to PDQ Deploy.......... 1 PDQ Deploy Overview......... 2 Licensing.................... 3 PDQ Deploy Product Feature Comparison.................. 4 Product Requirements.........
More informationBusiness Insights Dashboard
Business Insights Dashboard Sage 500 ERP 2000-2013 Sage Software, Inc. All rights reserved. Sage, the Sage logos, and the Sage product and service names mentioned herein are registered trademarks or trademarks
More informationNetwrix Auditor. Administration Guide. Version: /31/2017
Netwrix Auditor Administration Guide Version: 9.5 10/31/2017 Legal Notice The information in this publication is furnished for information use only, and does not constitute a commitment from Netwrix Corporation
More informationGoliath Application Availability Monitor. Technology Overview
Goliath Application Availability Monitor Technology Overview Page 1 8/14/2018 Contents Introduction... 3 Step-by-Step Screenshot Analysis... 4 Scheduling and Automation... 5 Alert Notifications... 6 Deployment...
More informationVeritas System Recovery 16 Management Solution Administrator's Guide
Veritas System Recovery 16 Management Solution Administrator's Guide Documentation version: 2017 Legal Notice Copyright 2017 Veritas Technologies LLC. All rights reserved. Veritas and the Veritas Logo
More informationOBSERVEIT TECHNICAL SOLUTION OVERVIEW
OBSERVEIT TECHNICAL SOLUTION OVERVIEW This document outlines the key features, system architecture, deployment scenarios, system requirements, product installation, security and privacy infrastructure,
More informationTrend Micro Incorporated reserves the right to make changes to this document and to the product described herein without notice. Before installing and using the product, please review the readme files,
More informationHIPAA Compliance Module. Using the HIPAA Module without Inspector Instructions. User Guide RapidFire Tools, Inc. All rights reserved.
HIPAA Compliance Module Using the HIPAA Module without Inspector Instructions User Guide 2017 RapidFire Tools, Inc. All rights reserved. V20180216 Contents Purpose of this Guide... 4 About Network Detective
More informationWhatsConfigured v3.1 User Guide
WhatsConfigured v3.1 User Guide Contents Table of Contents Welcome to WhatsConfigured v3.1 Finding more information and updates... 1 Sending feedback... 2 Deploying WhatsConfigured STEP 1: Prepare the
More informationOracle Adaptive Risk Manager Online Dashboard and Reporting Guide
Oracle Adaptive Risk Manager Online Dashboard and Reporting Guide 10g Release (10.1.4.2.0) September 2007 Oracle Adaptive Risk Manager Online Dashboard and Reporting Guide, 10g Release (10.1.4.2.0) Copyright
More informationPrivileged Access Access Console User Guide 18.1
Privileged Access Access Console User Guide 18.1 2017 Bomgar Corporation. All rights reserved worldwide. BOMGAR and the BOMGAR logo are trademarks of Bomgar Corporation; other trademarks shown are the
More informationTechNet Home > Products & Technologies > Desktop Products & Technologies > Microsoft Office > SharePoint Portal Server 2003 > Deploy
TechNet Home > Products & Technologies > Desktop Products & Technologies > Microsoft Office > SharePoint Portal Server 2003 > Deploy Reference: http://www.microsoft.com/technet/prodtechnol/office/sps2003/deploy/spst2003.mspx?pf=true
More informationCentral Administration Console Installation and User's Guide
IBM Tivoli Storage Manager FastBack for Workstations Version 7.1 Central Administration Console Installation and User's Guide SC27-2808-03 IBM Tivoli Storage Manager FastBack for Workstations Version
More informationWelcome to PDQ Deploy
Getting Started Contents Welcome to PDQ Deploy.......... 1 PDQ Deploy Overview......... 2 Licensing.................... 3 PDQ Deploy Product Feature Comparison.................. 4 Product Requirements.........
More informationNetwrix Auditor Competitive Checklist
Netwrix Auditor Competitive Checklist DATA COLLECTION AND STORAGE Non-intrusive architecture Operates without agents so it never degrades system performance or causes downtime. Certified collection of
More informationGuide for network administrators Systems Management. Guide for network Administrators. Version: Author: Panda Security
Guide for network Administrators Version: 5.1.0 1 229 Author: Panda Security Date: 6/02/2018 Contents 1. PREFACE... 11 1.1. Introduction... 12 1.2. Target audience... 12 1.3. Icons... 12 2. INTRODUCTION...
More informationRisk Intelligence. Quick Start Guide - Data Breach Risk
Risk Intelligence Quick Start Guide - Data Breach Risk Last Updated: 19 September 2018 --------------------------- 2018 CONTENTS Introduction 1 Data Breach Prevention Lifecycle 2 Choosing a Scan Deployment
More informationPrivileged Remote Access Access Console User Guide 18.3
Privileged Remote Access Access Console User Guide 18.3 2003-2018 BeyondTrust, Inc. All Rights Reserved. BEYONDTRUST, its logo, and JUMP are trademarks of BeyondTrust, Inc. Other trademarks are the property
More informationNuance Management Center
Nuance Management Center Version 5.7 Release Notes Copyright Copyright 2002-2016 Nuance Communications, Inc. All rights reserved. Nuance, ScanSoft, the Nuance logo, the Dragon logo, Dragon, DragonBar,
More information