BMC Remedyforce Discovery and Client Management. Frequently asked questions
|
|
- Erin Hawkins
- 6 years ago
- Views:
Transcription
1 BMC Remedyforce Discovery and Client Management Frequently asked questions
2 1 Table of Contents BMC Remedyforce Discovery and Client Management 4 Overview 4 Remedyforce Agentless Discovery 4 Remedyforce Client Management 4 Frequently asked questions 4 Functionality and Technology Remedyforce Agentless Discovery 4 1. What is Remedyforce Agentless Discovery? 4 2. What are the benefits? 4 3. How does it work? 5 4. Do I need to install anything on my network? 5 5. What is a scanner? 5 6. What is the discovery server? 6 7. How does the scanner work? 6 8. How many scanners do I need to install? 6 9. What credentials are required to scan and inventory a device? What is the performance? Is there a limit to the number of devices I can scan? What is the impact to the network? How is it set up in the datacenter? Where is the data stored? What type of connection is required to trigger an agentless scan? What is the security connection between the datacenter and Remedyforce org? Where can I find out more detail about the BMC datacenter? 7 Functionality and Technology Remedyforce Client Management What is Remedyforce Client Management? What are primary the benefits? How does it work? Is a corporate network connection (ex. VPN) required for remote devices? Is it available on premise? What is the difference between Premium and Premium Plus? What is in Remedyforce Client Management Premium and Premium Plus? Is Remedyforce Client Management built on the force.com platform? 8 Functionality and Technology General What is the difference between agent and agentless discovery? What datacenter is Remedyforce Agentless Discovery and Client Management located? _ Do I need Pentaho on premise? What is the difference between Remedyforce Client Management and BCM OnDemand? How do I avoid duplicate records? How does this compare to BMC Discovery (ADDM)? Is the data encrypted? Does it support proxy gateways? Does it support two-factor authentication? What are the differences between agentless and agent discovery? What ports are used and can I change them? How does this work with firewalls? Is it scalable? 13
3 2
4 3 Document Information Version: 3.7 Last Modified on: August 23, 2017 Modified by: John Fulton
5 4 BMC Remedyforce Discovery and Client Management Overview The identification and management of devices is essential to establish and maintain a successful Service Management program. If an organization is not aware of their environment and devices, they cannot proactively manage those devices. As a result, the organization will struggle and the risks will increase including the IT Department s relevance. For example, the risk of shadow IT will grow resulting in lower customer satisfaction, service levels and first call resolutions. Discovery and client management capabilities provide organizations with critical information and powerful actions (ex. remote control, software delivery, ticket automation, etc ) at their fingertips. Empowering the team to more effectively and efficiently support their organization ultimately increasing first call resolution, improving service levels, reducing support calls and freeing up resources to focus on higher value support activities. Remedyforce Agentless Discovery BMC Remedyforce includes agentless discovery. This new capability is included in the BMC Remedyforce base license at no additional cost. Remedyforce customers now have the ability to natively and intuitively configure and populate the Remedyforce CMDB in just a few easy steps. Remedyforce Client Management Supporting the maturity model approach, Remedyforce customers can expand and mature their discovery and client management capabilities by upgrading to BMC Remedyforce Client Management Premium or Premium Plus. This FAQ answers the most common questions around the Remedyforce discovery and client management capabilities introduced in the Remedyforce Summer 16 release. Frequently asked questions Functionality and Technology Remedyforce Agentless Discovery 1. What is Remedyforce Agentless Discovery? Remedyforce Agentless Discovery is a new capability introduced in the Summer 16 release. This new Remedyforce capability is included in the BMC Remedyforce base license at no additional cost to customers. Remedyforce customers now have the ability to natively and intuitively configure and populate the Remedyforce CMDB in just a few easy steps. Please refer to the additional FAQs below for more detail on this Remedyforce capability. 2. What are the benefits? Visibility with convenience and power. You cannot manage what you do not know. BMC Remedyforce Agentless Discovery empowers organizations to scan, identify and manage devices on the network. With a simple and intuitive interface, setup is quick and easy. Once enabled and configured, your Remedyforce CMDB will be populated with a wealth of device information including hardware configurations and software
6 5 installations. The benefits of direct access to this information include (1) proactive management by automating discovery to know what is in your environment, (2) empowering the support team, (3) increasing first call resolution rates and (4) reducing support call times. 3. How does it work? There are two primary components and a few steps required to get agentless discovery up and running as documented in the diagram below. The first component, the scanner, is the only on premise component. The scanner performs the agentless scan of your network. The second component is the Remedyforce Discovery Server. The Remedyforce Discovery Server is a hosted component, which collects data from the scanner(s). Through the intuitive enablement and configuration process, the administrator enables their Remedyforce Discovery Server with at least one configured scanner (step 1). Depending on the defined scanner frequency and scope, it will collect the devices, passing the details to the Remedyforce Discovery Server (steps 2 and 3). The final step (step 4) is the passing of discovery data from the Remedyforce Discovery Server to the Remedyforce CMDB. The frequency is based the configuration. 4. Do I need to install anything on my network? Yes, to perform the agentless scanning, at least one scanner must be installed. For more details on scanners, please refer to the next several FAQs. 5. What is a scanner? A scanner is a Windows or Linux device (32 or 64-bit operating system) in your network on which an agent is running. A scanner executes scans on individual devices or groups of devices, via a network target list. The scanner accesses the devices via different network protocols to retrieve various device information. A scanner is the only on premise component required for agentless discovery.
7 6 6. What is the discovery server? The Remedyforce Discovery Server enables communication among scanners, BMC Remedyforce and discovered devices. The Remedyforce Discovery server stores configurations to discover devices. After discovery, the hardware configuration and software inventory details of discovered devices are stored on this server and passed to the Remedyforce CMDB based upon the frequency defined. 7. How does the scanner work? The scanner uses a variety of protocols (SMB, WMI, SSH, SNMP) to first identify the devices. Once identified, the operating system and hardware configuration details are captured and passed to the Remedyforce Discovery Server. 8. How many scanners do I need to install? Typically, it is one Scanner per physical location, with each scanner located behind your corporate firewall. The scanner will scan 10 devices concurrently, with each initial scan of 10 devices taking approximately 20 seconds. 9. What credentials are required to scan and inventory a device? There are two primary scanning phases. The first phase is an initial scan to identify a device (ex. device name, IP address, device type). No credentials are required to perform this initial scan. The second phase is what we call the inventory scan. This is a deeper scan, pulling more details from the device including hardware configuration and software installed. Customers typically use their domain admin credentials to perform this deeper scan. At a minimum, read-only credentials are required to perform the inventory scan. 10. What is the performance? The amount of concurrent threads is configurable for each scanner. The default is 10 at a time. If you are doing a lightweight discovery, it is very fast (approx. 5 sec/device). If you are performing a full discovery including both Hardware and Software Inventory information, it could take anywhere from 30s to 2m per device. 11. Is there a limit to the number of devices I can scan? Agentless discovery within the base Remedyforce license is limited to 50,000 devices. For customers who require agentless discovery for more than 50,000 devices, please refer to Remedyforce Client Management Premium or Premium Plus below. 12. What is the impact to the network? There is very little impact because the inventory packets are small (approx. 300k). 13. How is it set up in the datacenter? Our BMC cloud-based datacenters will have a uniquely provisioned Remedyforce Discovery server and database instance, both of which are unique to your Remedyforce ORG. The discovery and inventory data from each of your on premise scanners is transmitted via an SSL encrypted network connection directly to your hosted application server where the data is integrated into the discovery and inventory database. This data, once aggregated, will pass into your existing Remedyforce CMDB. 14. Where is the data stored? The discovery and inventory data is stored in either BMC s Chicago or Amsterdam data centers depending on where your Remedyforce org is located. All Remedyforce orgs in
8 7 the Americas will connect to the Chicago data center, while all other regions (Europe and Asia) will connect to the Amsterdam data center. Once the data is aggregated, a subset (depending on your configuration), will be passed into your existing Remedyforce CMDB. Note: Prior to May 16, 2017, all inventory data was stored in the Amsterdam data center. The Chicago data center was added on this date for the Americas. 15. What type of connection is required to trigger an agentless scan? Just an internet connection is required. No VPN is required. 16. What is the security connection between the datacenter and Remedyforce org? Industry standard PKI encryption technology is implemented to transmit data both from your on premise scanner to your BMC Remedyforce Discovery Server, and again from your hosted discovery server into your Remedyforce CMDB. This encryption technology is based on SSL/TLS encryption standards as detailed in the following IETF documents: RFC 5280 implementation handles the certificate and trust process RFC 5246 implementation handles the encryption and cypher negotiation 17. Where can I find out more detail about the BMC datacenter? To find out more details about the BMC datacenters, select the following link posted on BMC Support Central. Functionality and Technology Remedyforce Client Management 18. What is Remedyforce Client Management? Remedyforce Client Management is an extension of the agentless discovery capabilities provided in the base Remedyforce solution starting with the Summer 16 release. Remedyforce Client Management provides a range of advanced capabilities empowering customers to more efficiently and proactively manage and support their devices. The capabilities include agent discovery, remote management, hardware and software compliance, software normalization, patch management and deployment management. In addition to these capabilities, the solution delivers advanced actions while empowering customers to define rules and actions to ultimately become more proactive and reduce the number of support calls. For example, you can define an advanced action to monitor drive space and either automatically create a ticket when a device hits a certain threshold and/or perform an action (ex. disk cleanup) to free up additional drive space, deferring or eliminating a support call. 19. What are primary the benefits? The benefits include (1) proactive management by automating discovery to know what is in your environment, (2) empowering your support team with a range of tools to be more efficient, (3) increasing first call resolution rates and (4) reducing support call time with quick access to a wealth of information and actions. Please refer to the value statements in the Sales section below for more details. 20. How does it work? The BMC Remedyforce Client Management application server, also known as the Master server, is hosted as a unique instance in a server pool and has a single
9 8 associated database instance used to store the various data constructs. The Java based BCM administration console and devices under BCM management connect to the application server via its public DNS name. This configuration allows for the administration of any child device that has an active internet connection. In addition, an on premise site relay can be optionally implemented as a local parent for up to 2,000 site clients to reduce the amount of internet traffic generated between the site and the hosted application server. 21. Is a corporate network connection (ex. VPN) required for remote devices? No, just an internet connection is required for remote devices with agents to perform and collect the scan. 22. Is it available on premise? Remedyforce Client Management is a hosted solution and not available on premise. For those who require an on premise discovery and client management solution, BMC Client Management (BCM) OnPremise is the solution to consider. This solution is supported with Remedyforce; however, it does not use the new and improved integration, which leverages web services and requires the installation and configuration of Pentaho. 23. What is the difference between Premium and Premium Plus? Premium contains a subset of Premium Plus features including agent discovery, remote management and compliance management. Please refer to the table below for a more detailed comparison. 24. What is in Remedyforce Client Management Premium and Premium Plus? A summary of the functionality is provided in the table below: Capabilities Remedyforce Base License Remedyforce Client Management Premium Remedyforce Client Management Premium Plus Inventory Management (Agentless Discovery) Inventory Management (Agent Discovery) Remote Management Compliance Management Patch Management Deployment Management 25. Is Remedyforce Client Management built on the force.com platform? No, Remedyforce Agentless Discovery and Client Management is built on the existing and proven technology of BMC Client Management (BCM).
10 9 Functionality and Technology General 26. What is the difference between agent and agentless discovery? More software inventory is collected with and agent: Hardware discovery is the same with or without an agent installed. Software discovery is limited to WMI installed applications without an agent installed. With an agent you also have security inventory (antivirus, firewall), custom inventory, connectivity inventory (link between routers, switches, and devices), power management inventory (green IT, when your screen is locked), patch inventory (installed/missing patches, service packs) 27. What datacenter is Remedyforce Agentless Discovery and Client Management located? We support both the Amsterdam and Chicago datacenters. All Remedyforce orgs in the Americas will connect to the Chicago datacenter, while all other regions will connect to the Amsterdam datacenter. To find out more details about the datacenters, select the following link. 28. Do I need Pentaho on premise? No, the Remedyforce Agentless Discovery and Client Management capabilities leverage web services displacing the need for customers to install and configure Pentaho on premise. Note: If a customer needs to modify the mappings, then the older integration should be considered; however, few, if any, customers have required modification of the mappings. We are considering a future enhancement with the new integration to provide an option for configurable mappings. 29. What is the difference between Remedyforce Client Management and BCM OnDemand? The underlying technology is BMC Client Management and the end user interaction and capabilities are the same, but the integration is different (ex. Remedyforce Client Management uses APIs vs. the older integration to BCM uses Pentaho). In addition, Remedyforce Client Management automates the provisioning of a hosted servers vs. BCM OnDemand, which requires a more manual provisioning process. Below is a summary of the primary differences: Capabilities Simplified Setup with Automated Server Provisioning Requires Pentaho Configurable Mapping Capabilities Embedded Administration Remedyforce Client Management Premium and Premium Plus BMC Client Management
11 10 Offering SaaS SaaS and On Premise Positioning Remedyforce Capabilities Remedyforce Integration 30. How do I avoid duplicate records? We recommend you enable and configure CMDB Reconciliation, which is a configurable, rule-based engine to define your own rules for uniqueness by class. If you don t enable and configure CMDB Reconciliation, the Assembly ID field determines uniqueness. This is a system-generated value from the discovery source. As a result, there is a risk of duplicate values when are also importing records from other sources (such as other discovery tools, manual entry, procurement feeds, advanced ship notices) because these sources do not share the same unique value. If you choose not to enable and configure CMDB Reconciliation, to avoid the risk of duplicate records with Remedyforce discovery, ensure the following with your discovered records: The records do not already exist in your Remedyforce CMDB. They will not be discovered and imported from other discovery sources. These same records will not be manually created. If any of these conditions exist and have occurred, you will need to analyze and clean up your data to remove duplicate records. 31. How does this compare to BMC Discovery (ADDM)? Both solutions provide agentless discovery; however, BMC Remedyforce Client Management provides a number of capabilities around software identification, metering and compliance, while BMC Discovery s focus is on the datacenter, providing more indepth discovery for specific datacenter environments. Below is a table highlighting the differences:
12 11 Function Remedyforce Client Management BMC Discovery (ADDM) Agentless Discovery Device Scan for installed software Discovery of Hardware Details, such as memory, processor, BIOS info Discovery of Operating System and Details Discovery of Network Interface MAC Addresses Scheduled Discovery Scans Discovery of Load Balancer Devices Agent-based Discovery Software Catalog (Desktop Software) Software License Management Software Metering Software Prohibiting Ability to create and manage dynamic device groups Ability to dynamically discover AD computers Cluster Discovery Deep Discovery of Application Details such as Websites and Internal Databases Discovery of Fiber Channel HBA Cards Discovery of Host Containers, Blade Enclosure Discovery of Listening Ports Discovery of Load Balancer Services, Pools, Members, and Instances Discovery of Observed Communication between Devices Extended Discovery to Perform additional commands and read configuration files Network Device Port and Speed Mismatch Port Speed and Duplex information for all Network Interfaces Software Catalog (Enterprise Server Software) Data Provenance for Ready Data Validation Business Application Modeling File System to Storage Volume Relationships Host to Load Balancer Relationships Server to Cluster Relationships Server to Server Dependency Relationships Server to Storage Dependency Relationships Software to Software Communication Relationships Automatic Network Device Computer Relationships Virtual Host to Guest Relationships 32. Is the data encrypted? 33. Passwords are encrypted along with the data as it uses HTTPS when transferred.
13 Does it support proxy gateways? We do not support proxy gateways. For Discovery, firewalls can be configured for the scanner access to be restricted to the OnDemand server/port. For compliance and patch management (Premium and Premium Plus offerings), more access is needed to download updates from BMC and vendors. These do support proxy gateways. 35. Does it support two-factor authentication? Two-factor authentication is not applicable in this architecture as the passing of data is automated. Two-factor authentication implies human intervention is involved. If security is concern, please refer to the other FAQs which detail the secure approach. 36. What are the differences between agentless and agent discovery? As the name implies, agentless discovery does not require an agent on each device. Both discover device details. Agent discovery provides a number of additional capabilities beyond discovery, which are documented in the table below: Actions Agentless Discovery Agent Discovery Device Discovery Audit Now Remote Management Compliance Management Software Normalization Patch Management Deployment Management File Transfer Reboot Shut Down Wake Up Access to Device Details Agentless Discovery Agent Discovery File System Registry Windows Events Processes Services From a data perspective, they are very similar. Hardware discovery is the same with or without an agent installed. When it comes to discovery of software, there are some differences. The primary benefit of an agent is that it will leverage a software catalog to normalize, standardize and classify the software.
14 What ports are used and can I change them? The hosted application server will use a range of 10 TCP allocated during the server provisioning process. The hosted application server port ranges are static and cannot be altered. 38. How does this work with firewalls? An on premise device behind an unmanaged firewall that can connect to a public internet IP address and port will create a managed network tunnel used by only the client executable. The client maintained network tunnel allows for bi-directional traffic between the on premise client and the public facing hosted application server. 39. Is it scalable? Yes, very scalable. BMC Remedyforce Client Management can manage in excess of several hundred thousand client workstations. The hosted application server (aka Master Server) can manage up to 5,000 simultaneous client connections. Each client can be either a standalone workstation or a dedicated on premise site relay. Each site relay can manage up to 2,000 client workstations using a parent child hierarchy such as the image depicted below: If you have any questions regarding the solution or content, please contact John Fulton (john_fulton@bmc.com) or Serena Lambiase (serena_lambiase@bmc.com).
15 Business runs on IT. IT runs on BMC Software. Business runs better when IT runs at its best. Tens of thousands of IT organizations around the world from small and mid-market businesses to the Global 100 rely on BMC Software (NASDAQ: BMC) to manage their business services and applications across distributed, mainframe, virtual and cloud environments. BMC helps customers cut costs, reduce risk and achieve business objectives with the broadest choice of IT management solutions, including industry-leading Business Service Management and Cloud Management offerings. Visit for more information. 14
TECHNICAL DESCRIPTION
TECHNICAL DESCRIPTION Product Snow Inventory Version 5 Release date 2016-09-27 Document date 2017-11-24 CONTENTS 1 Introduction... 3 1.1 What s new?... 3 2 Platform overview... 4 2.1 Architecture... 4
More informationPowerful Insights with Every Click. FixStream. Agentless Infrastructure Auto-Discovery for Modern IT Operations
Powerful Insights with Every Click FixStream Agentless Infrastructure Auto-Discovery for Modern IT Operations The Challenge AIOps is a big shift from traditional ITOA platforms. ITOA was focused on data
More informationSecurity in Bomgar Remote Support
Security in Bomgar Remote Support 2018 Bomgar Corporation. All rights reserved worldwide. BOMGAR and the BOMGAR logo are trademarks of Bomgar Corporation; other trademarks shown are the property of their
More informationPCI DSS Compliance. White Paper Parallels Remote Application Server
PCI DSS Compliance White Paper Parallels Remote Application Server Table of Contents Introduction... 3 What Is PCI DSS?... 3 Why Businesses Need to Be PCI DSS Compliant... 3 What Is Parallels RAS?... 3
More informationPhil Schwan Technical
Phil Schwan Technical Architect pschwan@projectleadership.net @philschwan Today s challenges Users Devices Apps Data Users expect to be able to work in any location and have access to all their work resources.
More informationDeploying VMware Identity Manager in the DMZ. JULY 2018 VMware Identity Manager 3.2
Deploying VMware Identity Manager in the DMZ JULY 2018 VMware Identity Manager 3.2 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ If you have
More informationQualys Cloud Platform
18 QUALYS SECURITY CONFERENCE 2018 Qualys Cloud Platform Looking Under the Hood: What Makes Our Cloud Platform so Scalable and Powerful Dilip Bachwani Vice President, Engineering, Qualys, Inc. Cloud Platform
More informationSecurity in the Privileged Remote Access Appliance
Security in the Privileged Remote Access Appliance 2003-2018 BeyondTrust, Inc. All Rights Reserved. BEYONDTRUST, its logo, and JUMP are trademarks of BeyondTrust, Inc. Other trademarks are the property
More informationNGFW Security Management Center
NGFW Security Management Center Release Notes 6.4.0 Revision B Contents About this release on page 2 System requirements on page 2 Build version on page 3 Compatibility on page 4 New features on page 5
More informationDiscover SUSE Manager
White Paper SUSE Manager Discover SUSE Manager Table of Contents page Reduce Complexity and Administer All Your IT Assets in a Simple, Consistent Way...2 How SUSE Manager Works...5 User Interface...5 Conclusion...9
More informationDeploying VMware Identity Manager in the DMZ. SEPT 2018 VMware Identity Manager 3.3
Deploying VMware Identity Manager in the DMZ SEPT 2018 VMware Identity Manager 3.3 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ If you have
More informationService Mesh and Microservices Networking
Service Mesh and Microservices Networking WHITEPAPER Service mesh and microservice networking As organizations adopt cloud infrastructure, there is a concurrent change in application architectures towards
More informationRemote power and console management in large datacenters
Remote power and console management in large datacenters A Horváth IT department, CERN, CH-1211 Genève 23, Switzerland E-mail: Andras.Horvath@cern.ch Abstract. Today s datacenters are often built of a
More informationVenafi Platform. Architecture 1 Architecture Basic. Professional Services Venafi. All Rights Reserved.
Venafi Platform Architecture 1 Architecture Basic Professional Services 2018 Venafi. All Rights Reserved. Goals 1 2 3 4 5 Architecture Basics: An overview of Venafi Platform. Required Infrastructure: Services
More informationM2M / IoT Security. Eurotech`s Everyware IoT Security Elements Overview. Robert Andres
M2M / IoT Security Eurotech`s Everyware IoT Security Elements Overview Robert Andres 23. September 2015 The Eurotech IoT Approach : E2E Overview Application Layer Analytics Mining Enterprise Applications
More informationSysAid Technical Presentation. Phone (Toll-Free US): Phone: +972 (3)
SysAid Technical Presentation www.sysaid.com sales@sysaid.com Phone (Toll-Free US): 1-800-686-7047 Phone: +972 (3) 533-3675 SysAid Overview A Global ITSM Solution Provider Technology Built for You Customer-Driven
More informationNGFW Security Management Center
NGFW Security Management Center Release Notes 6.4.3 Revision A Contents About this release on page 2 System requirements on page 2 Build version on page 3 Compatibility on page 4 New features on page 5
More informationPortnox CORE. On-Premise. Technology Introduction AT A GLANCE. Solution Overview
Portnox CORE On-Premise Technology Introduction Portnox CORE provides a complete solution for Network Access Control (NAC) across wired, wireless, and virtual networks for enterprise managed, mobile and
More informationvrealize Operations Management Pack for NSX for vsphere Release Notes
vrealize Operations Management Pack for NSX for vsphere 3.1.1 Release Notes Build: 4247401 Last document update: 24 August 2016 Contents: Upgrading from the Management Pack for NSX for vsphere 2.0 What's
More informationTechnical Overview. Access control lists define the users, groups, and roles that can access content as well as the operations that can be performed.
Technical Overview Technical Overview Standards based Architecture Scalable Secure Entirely Web Based Browser Independent Document Format independent LDAP integration Distributed Architecture Multiple
More informationVMware Enterprise Desktop Solutions. Tommy Walker Enterprise Desktop Specialist Engineer Desktop Platform Solutions
VMware Enterprise Desktop Solutions Tommy Walker Enterprise Desktop Specialist Engineer Desktop Platform Solutions Agenda The Enterprise Desktop Market Assured Computing Environment (ACE) Virtual Desktop
More informationNGFW Security Management Center
NGFW Security Management Center Release Notes 6.4.4 Revision A Contents About this release on page 2 System requirements on page 2 Build version on page 3 Compatibility on page 5 New features on page 5
More informationVMware AirWatch Product Provisioning and Staging for Windows Rugged Guide Using Product Provisioning for managing Windows Rugged devices.
VMware AirWatch Product Provisioning and Staging for Windows Rugged Guide Using Product Provisioning for managing Windows Rugged devices. AirWatch v9.2 Have documentation feedback? Submit a Documentation
More informationFrequently Asked Questions
Frequently Asked Questions FAQ December Revision Table of Contents General... 3 Agent Deployment... 5 Cloud Administration... 8 Security... 10 Purchase... 10 Support... 11 Page 2 of 11 justsamit Frequently
More informationSecurity Challenges: Integrating Apple Computers into Windows Environments
Integrating Apple Computers into Windows Environments White Paper Parallels Mac Management for Microsoft SCCM 2018 Presented By: Table of Contents Environments... 3 Requirements for Managing Mac Natively
More informationHP Instant Support Enterprise Edition (ISEE) Security overview
HP Instant Support Enterprise Edition (ISEE) Security overview Advanced Configuration A.03.50 Mike Brandon Interex 03 / 30, 2004 2003 Hewlett-Packard Development Company, L.P. The information contained
More informationWhatsConfigured v3.1 User Guide
WhatsConfigured v3.1 User Guide Contents Table of Contents Welcome to WhatsConfigured v3.1 Finding more information and updates... 1 Sending feedback... 2 Deploying WhatsConfigured STEP 1: Prepare the
More informationCisco Network Admission Control (NAC) Solution
Data Sheet Cisco Network Admission Control (NAC) Solution New: Updated to include the Cisco Secure Network Server (SNS) Cisco Network Admission Control (NAC) solutions allow you to authenticate wired,
More informationNGFW Security Management Center
NGFW Security Management Center Release Notes 6.4.7 Revision A Contents About this release on page 2 System requirements on page 2 Build version on page 3 Compatibility on page 5 New features on page 5
More informationExam : Implementing Microsoft Azure Infrastructure Solutions
Exam 70-533: Implementing Microsoft Azure Infrastructure Solutions Objective Domain Note: This document shows tracked changes that are effective as of January 18, 2018. Design and Implement Azure App Service
More informationCloud Operations for Oracle Cloud Machine ORACLE WHITE PAPER MARCH 2017
Cloud Operations for Oracle Cloud Machine ORACLE WHITE PAPER MARCH 2017 Disclaimer The following is intended to outline our general product direction. It is intended for information purposes only, and
More informationNGFW Security Management Center
NGFW Security Management Center Release Notes 6.5.3 Revision A Contents About this release on page 2 System requirements on page 2 Build number and checksums on page 4 Compatibility on page 5 New features
More informationDolby Conference Phone 3.1 configuration guide for West
Dolby Conference Phone 3.1 configuration guide for West 17 January 2017 Copyright 2017 Dolby Laboratories. All rights reserved. For information, contact: Dolby Laboratories, Inc. 1275 Market Street San
More information905M 67% of the people who use a smartphone for work and 70% of people who use a tablet for work are choosing the devices themselves
67% of the people who use a smartphone for work and 70% of people who use a tablet for work are choosing the devices themselves 905M tablets in use for work and home globally by 2017 Before Now 32% of
More informationData Sheet: Endpoint Security Symantec Network Access Control Starter Edition Simplified endpoint enforcement
Simplified endpoint enforcement Overview makes it easy to begin implementing a network access control solution. It offers a subset of Symantec Network Access Control functionality that can be completely
More informationMcAfee epo Deep Command
Quick Start Guide McAfee epo Deep Command version 2.4.1 This Quick Start Guide provides high level instructions for setting up McAfee epo Deep Command 2.4.1. For detailed instructions, refer to the McAfee
More informationTrueSight 10 Architecture & Scalability Q&A Best Practice Webinar 8/18/2015
Q: Where can I find the TrueSight Operations Management Best Practice material? A: TrueSight OM Best Practice material is published on the BMC Communities web site at the following link. https://communities.bmc.com/docs/doc-37443
More informationKlaudia Bakšová System Engineer Cisco Systems. Cisco Clean Access
Klaudia Bakšová System Engineer Cisco Systems Cisco Clean Access Agenda 1. Securing Complexity 2. NAC Appliance Product Overview and In-Depth 3. NAC Appliance Technical Benefits The Challenge of Securing
More informationCLOUDLENS PUBLIC, PRIVATE, AND HYBRID CLOUD VISIBILITY
CLOUDLENS PUBLIC, PRIVATE, AND HYBRID CLOUD VISIBILITY ORGANIZATIONS NEED VISIBILITY TO SECURE AND MONITOR THEIR CLOUD ENVIRONMENTS Organizations are migrating workloads to the cloud because it offers
More informationArchitectural Flexibility
Architectural Flexibility Key to Successful Monitoring By Shamas Demoret 1st Edition Architectural Flexibility // 1 Introduction Part 1: Checking Individual Systems Active Checks Passive Checks Agent-based
More informationELIMINATE SECURITY BLIND SPOTS WITH THE VENAFI AGENT
ELIMINATE SECURITY BLIND SPOTS WITH THE VENAFI AGENT less discovery can t find all keys and certificates Key and certificate management is no longer just an IT function. So it cannot be treated the same
More informationForeScout Extended Module for ServiceNow
ForeScout Extended Module for ServiceNow Version 1.2 Table of Contents About ServiceNow Integration... 4 Use Cases... 4 Asset Identification... 4 Asset Inventory True-up... 5 Additional ServiceNow Documentation...
More informationInstalling and Configuring vcloud Connector
Installing and Configuring vcloud Connector vcloud Connector 2.6.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new
More informationEdge for All Business
1 Edge for All Business Datasheet Zynstra is designed and built for the edge the business-critical compute activity that takes place outside a large central datacenter, in branches, remote offices, or
More informationCNS-207-2I Implementing Citrix NetScaler 10.5 for App and Desktop Solutions
1800 ULEARN (853 276) www.ddls.com.au CNS-207-2I Implementing Citrix NetScaler 10.5 for App and Desktop Solutions Length 5 days Price $5500.00 (inc GST) Overview The objective of Implementing Citrix NetScaler
More informationVendor: Citrix. Exam Code: 1Y Exam Name: Designing, Deploying and Managing Citrix XenMobile Solutions. Version: Demo
Vendor: Citrix Exam Code: 1Y0-370 Exam Name: Designing, Deploying and Managing Citrix XenMobile Solutions Version: Demo QUESTION NO: 1 Which connection type is used when WorxWeb for ios is configured to
More informationFIREWALL BEST PRACTICES TO BLOCK
Brought to you by Enterprie Control Systems FIREWALL BEST PRACTICES TO BLOCK Recent ransomware attacks like Wanna and Petya have spread largely unchecked through corporate networks in recent months, extorting
More informationNGFW Security Management Center
NGFW Security Management Center Release Notes 6.4.1 Revision A Contents About this release on page 2 System requirements on page 2 Build version on page 3 Compatibility on page 4 New features on page 5
More informationVMware Workspace ONE UEM VMware AirWatch Cloud Connector
VMware AirWatch Cloud Connector VMware Workspace ONE UEM 1811 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ If you have comments about this
More informationSoftLayer Security and Compliance:
SoftLayer Security and Compliance: How security and compliance are implemented and managed Introduction Cloud computing generally gets a bad rap when security is discussed. However, most major cloud providers
More informationHySecure Quick Start Guide. HySecure 5.0
HySecure Quick Start Guide HySecure 5.0 Last Updated: 25 May 2017 2012-2017 Propalms Technologies Private Limited. All rights reserved. The information contained in this document represents the current
More informationSymantec Exam Administration of Altiris Client Management Suite 7.1 Version: 6.1 [ Total Questions: 133 ]
s@lm@n Symantec Exam 250-402 Administration of Altiris Client Management Suite 7.1 Version: 6.1 [ Total Questions: 133 ] Question No : 1 What are two prerequisites for installing and configuring IT Analytics?
More informationEdge Device Manager Quick Start Guide. Version R15
Edge Device Manager Quick Start Guide Version R15 Notes, cautions, and warnings NOTE: A NOTE indicates important information that helps you make better use of your product. CAUTION: A CAUTION indicates
More informationImplementing DVN. directpacket Product Guide
Implementing DVN directpacket Product Guide directpacket Research www.directpacket.com 2 1 DVN and the IPC Community The Secure Dedicated Versatile Network (DVN) Server is a hardened internet facing device
More informationForeScout Extended Module for VMware AirWatch MDM
ForeScout Extended Module for VMware AirWatch MDM Version 1.7.2 Table of Contents About the AirWatch MDM Integration... 4 Additional AirWatch Documentation... 4 About this Module... 4 How it Works... 5
More informationWhatsConnected v3.5 User Guide
WhatsConnected v3.5 User Guide Contents Table of Contents Welcome to WhatsConnected Finding more information and updates... 5 Installing and Configuring WhatsConnected System requirements... 6 Installation
More informationCategories Administrative Security Categories 57 Alerts Hidden Categories 2 Asset Intelligence Total 59 Client Push Client Status Total Reports 541
Categories Administrative Security Categories 57 Alerts Hidden Categories 2 Asset Intelligence Total 59 Client Push Client Status Total Reports 541 Compliance and Settings Management Device Management
More informationOracle Enterprise Manager 11g Ops Center 2.5 Hands-on Lab
Oracle Enterprise Manager 11g Ops Center 2.5 Hands-on Lab Introduction to Enterprise Manager 11g Oracle Enterprise Manager 11g is the centerpiece of Oracle's integrated IT management strategy, which rejects
More informationShavlik Protect: Simplifying Patch, Threat, and Power Management Date: October 2013 Author: Mike Leone, ESG Lab Analyst
ESG Lab Review Shavlik Protect: Simplifying Patch, Threat, and Power Management Date: October 2013 Author: Mike Leone, ESG Lab Analyst Abstract: This ESG Lab Review documents hands-on testing of Shavlik
More informationVMware AirWatch Cloud Connector Guide ACC Installation and Integration
VMware AirWatch Cloud Connector Guide ACC Installation and Integration Workspace ONE UEM v1810 Have documentation feedback? Submit a Documentation Feedback support ticket using the Support Wizard on support.air-watch.com.
More informationHow-to Guide: Tenable Nessus for Microsoft Azure. Last Updated: April 03, 2018
How-to Guide: Tenable Nessus for Microsoft Azure Last Updated: April 03, 2018 Table of Contents How-to Guide: Tenable Nessus for Microsoft Azure 1 Introduction 3 Auditing the Microsoft Azure Cloud Environment
More informationForeScout Extended Module for ServiceNow
ForeScout Extended Module for ServiceNow Version 1.1.0 Table of Contents About this Integration... 4 Use Cases... 4 Asset Identification... 4 Asset Inventory True-up... 5 Additional ServiceNow Documentation...
More informationHacker Academy Ltd COURSES CATALOGUE. Hacker Academy Ltd. LONDON UK
Hacker Academy Ltd COURSES CATALOGUE Hacker Academy Ltd. LONDON UK TABLE OF CONTENTS Basic Level Courses... 3 1. Information Security Awareness for End Users... 3 2. Information Security Awareness for
More informationSession 7: Configuration Manager
Session 7: Configuration Manager Mark Aslett Consultant Adam Shepherd Consultant MCS Talks Infrastructure Architecture Agenda Introduction Gathering requirements Core Concepts Hierarchy Design Scaling
More informationSymantec Network Access Control Starter Edition
Symantec Network Access Control Starter Edition Simplified endpoint compliance Overview makes it easy to begin implementing a network access control solution. It offers a subset of Symantec Network Access
More informationCenterity Monitor 4.0. Administration Guide
Centerity Monitor 4.0 Administration Guide May 2017 About This Guide 2 Contents About This Guide... 8 End-User License Agreement (EULA)... 8 Before You Begin... 8 Audience... 8 Centerity Monitor User Guide...
More informationApp Gateway Deployment Guide
C E N T R I F Y D E P L O Y M E N T G U I D E App Gateway Deployment Guide Abstract Centrify provides mobile device management and single sign-on services that you can trust and count on as a critical
More informationEdge Device Manager R15 Release Notes
2017-03 Software releases are created to add new features, make enhancements or correct defects. These releases are tested on all current, actively shipping platforms and operating systems as applicable.
More informationSaaS Providers. ThousandEyes for. Summary
USE CASE ThousandEyes for SaaS Providers Summary With Software-as-a-Service (SaaS) applications rapidly replacing onpremise solutions, the onus of ensuring a great user experience for these applications
More informationSymantec Network Access Control Starter Edition
Simplified endpoint compliance Overview makes it easy to begin implementing a network access control solution. It offers a subset of Symantec Network Access Control functionality that can be completely
More informationNGFW Security Management Center
NGFW Security Management Center Release Notes 6.3.3 Revision A Contents About this release on page 2 System requirements on page 2 Build version on page 3 Compatibility on page 5 New features on page 5
More informationDirectory Integration with Okta. An Architectural Overview. Okta Inc. 301 Brannan Street San Francisco, CA
Directory Integration with Okta An Architectural Overview Okta Inc. 301 Brannan Street San Francisco, CA 94107 info@okta.com 1-888-722-7871 Contents 1 User Directories and the Cloud: An Overview 3 Okta
More informationWHITE PAPER: BEST PRACTICES. Sizing and Scalability Recommendations for Symantec Endpoint Protection. Symantec Enterprise Security Solutions Group
WHITE PAPER: BEST PRACTICES Sizing and Scalability Recommendations for Symantec Rev 2.2 Symantec Enterprise Security Solutions Group White Paper: Symantec Best Practices Contents Introduction... 4 The
More informationSymantec Network Access Control Starter Edition
Simplified endpoint compliance Overview makes it easy to begin implementing a network access control solution. It offers a subset of Symantec Network Access Control functionality that can be completely
More informationOracle Integration Cloud Service Project. Author: Gopinath Soundarrajan Oracle Infrastructure Cloud Architect Date: 03/Dec/2016
Oracle Integration Cloud Service Project Author: Gopinath Soundarrajan Oracle Infrastructure Cloud Architect Date: 03/Dec/2016 Oracle Java Cloud Service Project Oracle Java Cloud Service Project Integration
More informationCisco Configuration Engine 2.0
Cisco Configuration Engine 2.0 The Cisco Configuration Engine provides a unified, secure solution for automating the deployment of Cisco customer premises equipment (CPE). This scalable product distributes
More information2011 Cisco and/or its affiliates. All rights reserved. Cisco Public 1
2011 Cisco and/or its affiliates. All rights reserved. Cisco Public 1 Cisco AnyConnect as a Service György Ács Regional Security Consultant Mobile User Challenges Mobile and Security Services Web Security
More informationMigration and Building of Data Centers in IBM SoftLayer
Migration and Building of Data Centers in IBM SoftLayer Advantages of IBM SoftLayer and RackWare Together IBM SoftLayer offers customers the advantage of migrating and building complex environments into
More informationAerohive and IntelliGO End-to-End Security for devices on your network
Aerohive and IntelliGO End-to-End Security for devices on your network Introduction Networks have long used a password to authenticate users and devices. Today, many cyber attacks can be used to capture
More informationCitrix Connector Citrix Systems, Inc. All rights reserved. p.1. About this release. System requirements. Technical overview.
Citrix Connector 3.1 May 02, 2016 About this release System requirements Technical overview Plan Install Citrix Connector Upgrade Create applications Deploy applications to machine catalogs Publish applications
More informationDefense-in-Depth Against Malicious Software. Speaker name Title Group Microsoft Corporation
Defense-in-Depth Against Malicious Software Speaker name Title Group Microsoft Corporation Agenda Understanding the Characteristics of Malicious Software Malware Defense-in-Depth Malware Defense for Client
More informationCloud, SDN and BIGIQ. Philippe Bogaerts Senior Field Systems Engineer
Cloud, SDN and BIGIQ Philippe Bogaerts Senior Field Systems Engineer Virtual Editions TMOS/LTM 12.0 Highlights 1 NIC support Azure Marketplace Kernel Independent driver Enhanced Hypervisor support F5 Networks,
More informationForescout. eyeextend for ServiceNow. Configuration Guide. Version 2.0
Forescout Version 2.0 Contact Information Forescout Technologies, Inc. 190 West Tasman Drive San Jose, CA 95134 USA https://www.forescout.com/support/ Toll-Free (US): 1.866.377.8771 Tel (Intl): 1.408.213.3191
More informationHow-to Guide: Tenable.io for Microsoft Azure. Last Updated: November 16, 2018
How-to Guide: Tenable.io for Microsoft Azure Last Updated: November 16, 2018 Table of Contents How-to Guide: Tenable.io for Microsoft Azure 1 Introduction 3 Auditing the Microsoft Azure Cloud Environment
More informationCMB-207-1I Citrix Desktop Virtualization Fast Track
Page1 CMB-207-1I Citrix Desktop Virtualization Fast Track This fast-paced course covers select content from training courses CXA-206: Citrix XenApp 6.5 Administration and CXD-202: Citrix XenDesktop 5 Administration
More informationMicrosoft Microsoft TS: MS Internet Security & Acceleration Server 2006, Configuring. Practice Test. Version:
Microsoft 70-351 Microsoft 70-351 TS: MS Internet Security & Acceleration Server 2006, Configuring Practice Test Version: 2.2 QUESTION NO: 1 Your network consists of a single Active Directory domain named
More informationCisco Prime Home 5.1 Technical
Data Sheet Cisco Prime Home 5.1 Technical The proliferation of Internet-connected devices and the explosion of video and data traffic are driving complexity in the home network. Increasing numbers of new
More informationNGFW Security Management Center
NGFW Security Management Center Release Notes 6.4.8 Revision A Contents About this release on page 2 System requirements on page 2 Build version on page 3 Compatibility on page 5 New features on page 5
More informationVMware AirWatch Content Gateway Guide for Linux For Linux
VMware AirWatch Content Gateway Guide for Linux For Linux Workspace ONE UEM v9.7 Have documentation feedback? Submit a Documentation Feedback support ticket using the Support Wizard on support.air-watch.com.
More informationInstalling and Configuring VMware Identity Manager Connector (Windows) OCT 2018 VMware Identity Manager VMware Identity Manager 3.
Installing and Configuring VMware Identity Manager Connector 2018.8.1.0 (Windows) OCT 2018 VMware Identity Manager VMware Identity Manager 3.3 You can find the most up-to-date technical documentation on
More informationBrocade Virtual Traffic Manager and Parallels Remote Application Server
White Paper Parallels Brocade Virtual Traffic Manager and Parallels Deployment Guide 01 Contents Preface...4 About This Guide...4 Audience...4 Contacting Brocade...4 Internet...4 Technical Support...4
More informationVendor: Citrix. Exam Code: 1Y Exam Name: Designing Citrix XenDesktop 7.6 Solutions. Version: Demo
Vendor: Citrix Exam Code: 1Y0-401 Exam Name: Designing Citrix XenDesktop 7.6 Solutions Version: Demo DEMO QUESTION 1 Which option requires the fewest components to implement a fault-tolerant, load-balanced
More informationTechnical Overview of DirectAccess in Windows 7 and Windows Server 2008 R2. Microsoft Windows Family of Operating Systems
Technical Overview of in Windows 7 and Windows Server 2008 R2 Microsoft Windows Family of Operating Systems Published: January 2009 This document supports a preliminary release of a software product that
More informationRead the following information carefully, before you begin an upgrade.
Read the following information carefully, before you begin an upgrade. Review Supported Upgrade Paths, page 1 Review Time Taken for Upgrade, page 1 Review Available Cisco APIC-EM Ports, page 2 Securing
More informationReinvent Your 2013 Security Management Strategy
Reinvent Your 2013 Security Management Strategy Laurent Boutet 18 septembre 2013 Phone:+33 6 25 34 12 01 Email:laurent.boutet@skyboxsecurity.com www.skyboxsecurity.com What are Your Key Objectives for
More informationAdaptive Authentication Adapter for Citrix XenApp. Adaptive Authentication in Citrix XenApp Environments. Solution Brief
Adaptive Authentication Adapter for Citrix XenApp Adaptive Authentication in Citrix XenApp Environments Solution Brief RSA Adaptive Authentication is a comprehensive authentication platform providing costeffective
More informationDreamFactory Security Guide
DreamFactory Security Guide This white paper is designed to provide security information about DreamFactory. The sections below discuss the inherently secure characteristics of the platform and the explicit
More informationVeritas InfoScale Operations Manager 7.2 Installation and Configuration Guide
Veritas InfoScale Operations Manager 7.2 Installation and Configuration Guide June 2017 Veritas InfoScale Operations Manager 7.2 Installation and Configuration Guide Last updated: 2017-06-06 Document version:
More informationControl-M and Payment Card Industry Data Security Standard (PCI DSS)
Control-M and Payment Card Industry Data Security Standard (PCI DSS) White paper PAGE 1 OF 16 Copyright BMC Software, Inc. 2016 Contents Introduction...3 The Need...3 PCI DSS Related to Control-M...4 Control-M
More informationTableau Server on Microsoft Azure:
Tableau Server on Microsoft Azure: Deployment Guidelines and Best Practices April 2017 Table of Contents Abstract...3 Introduction to Tableau With Microsoft Azure...3 Option 1 Self Deployment via Azure
More information