Hideez Enterprise Server
|
|
- Brent Gardner
- 5 years ago
- Views:
Transcription
1 Hideez Enterprise Server Version 2.0 ADMINISTRATOR MANUAL Version 2.0. Hideez Group Inc, 2018
2 Table of Contents 1. General Information Purpose and scope System requirements 3 2. Setting Hideez Enterprise Server HES system installation description The first launch of the site HES Administrator Account 4 3. Using of Hideez Enterprise Server Basic concepts Storage of identification information Hideez device management Catalog of Enterprise IT-resources User s cabinet Administrator s workplace System Setup User roles Mail settings Mailchimp settings User management Groups of users Creating the user Editing user Enterprise Resource Management Catalog of Enterprise IT-resources Adding credentials to the user s device Using User Credentials on Client Devices 12 Determination of the target application 13 Defining the target web page 13 Examples of pointing applications and web pages Additional Features Adding Hideez Device User Device History 14 1
3 2
4 1. General Information 1.1. Purpose and scope Software Hideez Enterprise Server (HES) is designed for managing Hideez devices and stored on them information about the corporate ID. The applying of HES allows the enterprise to: exclude the exchange of control information between tokens and external resources - control is carried out inside the enterprise. solve the problem of secure password transfer to user. The password is transmitted over the encrypted channel between server and token and it is can t be intercepted. remotely manage (add, edit or delete) the passwords in user devices. monitor complexity of the passwords and their validity, forcibly change them. move to the strict authorization: replace the passwords on keys, that are unknown to the user System requirements To work with HES v1 you need the following: Microsoft Windows Server 2012 or higher Microsoft IIS v 10 or higher Microsoft SQL Server 2012 or higher RAM 4Gb, free space on hard drive 20Gb HES access through HTTP/HTTPS protocol on the port specified during the installation of the system. Users and administrators of HES use the Internet browser for work. Server will work with browsers Google Chrome v 58 or higher, Microsoft Internet Explorer v or higher, Microsoft Edge, Safari (MacOS). 2. Setting Hideez Enterprise Server 2.1. HES system installation description Description of the installation of Hideez Enterprise Server is given for a personal computer with installed Windows 10 operating system. The installation of the Hideez Enterprise Server system includes the following components and automatic settings: 1. Enable and configure Internet Information Services (IIS) components. 2. Install SQL Server. 3. Install.NET Core Windows Server Hosting. 4. Installing Hideez Enterprise Server. 5. Creating a database and establishing a site connection with IIS components. 6. Creating a user in the IIS Manager snap-in for accessing the Hideez Enterprise Server website to the SQL database. 3
5 After installation, the site has a local address of the form Port 8092 is set by default and can be changed by the administrator in the IIS Manager snap-in: select the HideezEnterprise site, click Bindings in the Actions console, and set the desired port: 2.2. The first launch of the site Creation of the database and the implementation of the preparatory actions are performed at the moment of the first visit to the site. Go to the browser at http: // localhost: 8092 (or to another address assigned to the site) For remote access to the site, in the address bar of the browser, instead of localhost, enter the ip-address of the computer on which Hideez Enterprise Server is installed HES Administrator Account When installing, a single user with administrator rights is created Login: HideezAdmin Password: HideezAdmin It is recommended that when you first start to go into the office and change the password of the system administrator. 4
6 3. Using of Hideez Enterprise Server 3.1. Basic concepts Storage of identification information Since Hideez Key ST101 Hideez devices storage user s identifiers such as logins, passwords, two-factor secret keys inside the device. Such information is stored in the Password Manager in the Hideez device in an encrypted form and not transmitted outside. Password Manager entries can be created by owners of Hideez devices (personal records) and by HES administrators (corporate records). Personal records are available for use only to the authorized device owner. Corporate records are available for use to owner of device that is linked to the appropriating account in the HES. Editing and deletion of corporate records is available to the administrator and operator of HES, and, if it allowed by the administrator, to the device owner Hideez device management Corporate use of Hideez devices involves "linking" devices to the enterprise and users to provide their safe authorized use. Administrator can add new devices for management, delete them and block them in case of loss Catalog of Enterprise IT-resources The directory contains a configurable list of enterprise IT-resources, such as PC operating systems, domain services, mail services, databases, etc., access to which can be automated for users that are using Hideez devices. The directory serves as a template for quickly generating a list of resources for each specific user (user group) User s cabinet In the personal cabinet of the HES service, users of Hideez devices can delete, and also block their devices in the event of loss or theft Administrator s workplace. The administrator workplace is the main tool for working with HES, in which: Configures catalog of enterprise it-resources Configures roles of HES users Manage users Manage Hideez devices that belong to the enterprise Perfom other administration tasks Other administration tasks are performed 3.2. System Setup To go to the system settings, click "Settings". Section contains: User roles, Mail settings, Mailchimp settings User roles HES provides two default user roles: Administrator (admin) and user (user). Roles are distinguished by rights to perform operations. 5
7 Mail settings HES uses a third-party SMTP service for sending messages to users (for example, a confirmation ). In this section you need to specify the data of this service: hostname/ip address port Login of account (for example HES@myorg.com) Mail account password Click "Save" to save the changes. Please note that the mail account HES@myorg.com must be created and activated before the first use. 6
8 Mailchimp settings This settings are used to configure integration with Mailchimp User management Groups of users User groups are used to formalize the structure of an enterprise. To create the group click the "My Groups" tab: And click Add : Specify a group name and, if necessary, a description. 7
9 After saving, the group will appear in the general list of groups and will be available for management ( Manage ) Creating the user After the group has been created, the administrator will have access to the general group settings (menu on the left) and user management in the table header. To add a new user, click Add. Enter a list of users that you want to add to the group, separated by commas (without spaces). 8
10 After clicking the Add users button, s will be sent to the specified with a link to confirm account creation. All new users will appear in the Users table Editing user To change information about a user, assign a role to him, as well as manage information in his Hideez devices, follow these steps: 1. In the main menu, click on Users. 2. In the opened list, find the needed entry. You can use filtering for the search - to do this, enter part of the name/ in the search bar at the top of the list. 3. Click on the Edit icon in the Actions column to switch on the changing user information. By default, each user has role User. To add a role to him with higher rights, turn on the switch in the appropriate field on the Roles tab. On the Devices tab, you can view a list of devices registered to the user. An administrator can remove a device from a user account by clicking the Remove button. This will erase the user information in the device and reset it to the factory settings. The Edit button allows you to edit the enterprise information on the user's device. For more on this, see Enterprise Resource Management Enterprise Resource Management Catalog of Enterprise IT-resources Accounts catalog is intended for adding, changing or deleting records on enterprise resources to which access is later provided. To add a new entry to the "Accounts Catalog", follow the next steps: 1. In the main menu, go to the Remote control, then in the opened sub-item Manage account catalog 9
11 2. Click the Add new button and fill in the fields. 3. Specify the account name (for example, Gmail business account) 4. Specify the list of URLs of websites and / or applications for which the account will be used. 5. Click the button Create Note. Credentials of the created accounts are filled for each user individually. Note. The principles for applying user credentials to applications and web sites are described in Principles for Applying User Credentials in Client Devices Adding credentials to the user s device The administrator can add credentials to the user's device. The user will see them in the section "Password Manager" of the client application Hideez Safe along with those that he added by himself. To add an account to the user device, complete the steps: 1. In the main menu click the "Users". 2. In the opened lust find the necessary entry. You can use filtering for the search - to do this, enter part of the name/ in the search bar at the top of the list. 3. Click the Devices icon in the column Actions on the user card to go to the list of registered user devices. 10
12 4. Select the necessary device from the list of devices and click Edit. 5. In the Password Manager click the Add button to create a new entry. 6. If it s applicable, select an item from the list of company accounts in the "Select account" field to automatically fill in other fields according to the selected template. 11
13 7. Fill in the URL List and Apps fields according to the "Using User Credentials on Client Devices". 8. Specify a login with which the user will enter the application/web page in the Login field 9. Specify a password with which the user will enter the application/web page in the Password field. 10. Save the entry with the "Add" button Using User Credentials on Client Devices The use of Hideez Safe device user credentials on client devices is performed by using the Hideez Safe application. The resident part of the application is permanently in memory and always look after the running applications. On a certain event (pressing a button on the device or a hotkey on the keyboard), the credentials are substituted into the active applications. Defining the credentials for the substitution, Hideez Safe for Windows uses the methods described below. 12
14 Determination of the target application The credentials (login, password, one-time password) are inserted into the application which has an active focus on the input from the keyboard. The name of the corresponding process in the operating system is used as the application identifier. You can see the name of the process in the Windows Task Manager in the Details tab. For example: Application Skype - the corresponding process has Name Skype.exe The Hideez Safe application includes two parts, the processes are named HideezHostServ.exe HideezUI.exe Defining the target web page If the active window is a browser (supported by Internet Explorer, Firefox, Google Chrome, Opera) Hideez Safe analyzes the current address line (URL). The key parameter is the domain and subdomain in the string. For example, for a page: the key parameter is the domain accounts.google.com. Examples of pointing applications and web pages. Field Content The account will be applied to: URL address photos.google.com drive.google.com accounts.google.com To these three addresses and their subdomains. URL address google.com To any subdomain of google.com, including drive.google.com, mail.google.com, and others. application EXCEL.EXE Only for Microsoft Excel application EXCEL.EXE Skype.exe Microsoft Excel or Skype Note. The applied method of identifying applications by the name of the process is not safe, and it is currently used for research purposes. The company Hideez is constantly working to eliminate possible vulnerabilities Additional Features Adding Hideez Device The device protection architecture Hideez includes the Device Key digital keys, stitched into the devices in the factory. Hideez uses these keys to authorize devices and ensure secure communication with them. Your copy of Hideez Enterprise Server can manage employee devices only after importing device keys. The procedure for requesting a key from a vendor is not covered in this document. The transfer of device keys is done using an HDZ file. To import a file with device keys, follow these steps: 1. In the Actions section of the main menu, click "Import devices" 13
15 2. Specify the key file received from the vendor, for example: Devices_ST _ST hdz and download it User Device History HES logs all actions that occurring with devices, such as device registration, binding and unbinding from the user's account, entering the Hideez Safe application on the client s side. To view the key usage history, go to the Users tab, click on the device of the desired user. The Device history table will open with the necessary information. 14
16 When you start the Hideez Safe application for the first time (before authorization), you need to perform Network settings in the Menu by entering the address of the host you are using: 15
NIELSEN API PORTAL USER REGISTRATION GUIDE
NIELSEN API PORTAL USER REGISTRATION GUIDE 1 INTRODUCTION In order to access the Nielsen API Portal services, there are three steps that need to be followed sequentially by the user: 1. User Registration
More informationSafeConsole On-Prem Install Guide
SafeConsole On-Prem Install Guide This guide applies to SafeConsole 5.0.5 Introduction This guide describes how to install a new SafeConsole server on Windows using the SafeConsole installer. As an option,
More informationFAQ. General Information: Online Support:
FAQ General Information: info@cionsystems.com Online Support: support@cionsystems.com CionSystems Inc. Mailing Address: 16625 Redmond Way, Ste M106 Redmond, WA. 98052 http://www.cionsystems.com Phone:
More informationT E KLYNX CENTRAL I N S T A L L A T I O N G U I D E
TEKLYNX CENTRAL I N S T A L L A T I O N G U I D E Note TEKLYNX CENTRAL Installation Guide The information in this manual is not binding and may be modified without prior notice. Supply of the software
More informationWebAnalyzer Plus Getting Started Guide
WebAnalyzer Plus Getting Started Guide www.manageengine.com/web-analytics Contents 1 Introduction 4 2 3 4 5 WebAnalyzer Plus Overview Getting Started System Requirements Installation Starting and Accessing
More informationThis guide details the deployment and initial configuration necessary to maximize the value of JetAdvantage Insights.
HP JetAdvantage Insights Deployment Guide This guide details the deployment and initial configuration necessary to maximize the value of JetAdvantage Insights. 1. Overview HP JetAdvantage Insights provides
More informationSafeConsole On-Prem Install Guide. version DataLocker Inc. July, SafeConsole. Reference for SafeConsole OnPrem
version 5.2.2 DataLocker Inc. July, 2017 SafeConsole Reference for SafeConsole OnPrem 1 Contents Introduction................................................ 2 How do the devices become managed by SafeConsole?....................
More informationPowerPanel Enterprise
INSTALLATION GUIDE PowerPanel Enterprise Rev. 1 SAVE THESE INSTRUCTIONS Please read this manual and follow the instructions for installation and use. Copyright 2018 Cyber Power Systems, Inc. All rights
More informationSPAR. Installation Guide. Workflow for SharePoint. ITLAQ Technologies
SPAR Workflow for SharePoint 0 ITLAQ Technologies www.itlaq.com Table of Contents I. System Requirements...2 II. Install SPARK Workflow on your environment...2 III. Obtain SPARK Workflow License...7 IV.
More informationOracle Eloqua Legacy Authenticated Microsites and Contact Users. Configuration Guide
Oracle Eloqua Legacy Authenticated Microsites and Contact Users Configuration Guide 2019 Oracle Corporation. All rights reserved 04-Jan-2019 Contents 1 Authenticated microsites 3 2 Creating authenticated
More informationConnecting to the Virtual Desktop Infrastructure (VDI)
System Office IT Connecting to the Virtual Desktop Infrastructure (VDI) There are four ways to connect to the system office Virtual Desktop Infrastructure (VDI): Web client Windows client - personal computer
More informationdotdefender Central Management v4.25 User Guide
dotdefender Central Management v4.25 User Guide Applicure Web Application Firewall Table of Contents Chapter 1 1. Introduction...3 1.1 Prerequisites... 3 1.2 System Requirements...3 Chapter 2 2. Installation
More informationSamsung Knox Mobile Enrollment. VMware Workspace ONE UEM 1902
Samsung Knox Mobile Enrollment VMware Workspace ONE UEM 1902 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ If you have comments about this
More informationAccess Google Drive There are multiple ways to access Google drive.
Introduction In the course we will discuss what a Google Drive is, what kind of applications they contain, and how we can work smarter. We will discuss how to start Google Drives, How to access the drives.
More informationPortal Recipient Guide. The Signature Approval Process
Portal Recipient Guide The Signature Approval Process Contents 1 Introduction... 3 2 Account Activation... 3 3 Document Signing... Error! Bookmark not defined. 4 Authenticating your Device & Browser...
More informationVMware AirWatch Android Platform Guide
VMware AirWatch Android Platform Guide Workspace ONE UEM v9.4 Have documentation feedback? Submit a Documentation Feedback support ticket using the Support Wizard on support.air-watch.com. This product
More informationApp Configuration. Version 6.0 August All rights reserved
App Configuration Version 6.0 August 2016 2015 systems@work. All rights reserved Contents CONTENTS... 1 INTRODUCTION... 2 LIMITATIONS... 3 FORM TYPES... 4 SYSTEM PARAMETERS... 8 ICONS... 10 IMAGE FOLDERS...
More informationMinimum requirements for Portal (on-premise version):
Minimum requirements for Portal (on-premise version): Windows Server 2012 R2 Windows 10 (licensed) with the latest updates (64 bit only). All Windows applications must be licensed and activated. SQL Server
More informationIntroducing the VNE Customization Builder (VCB)
17 CHAPTER This chapter introduces the Virtual Network Element Customization Builder (VCB) in Cisco Prime Network. Topics include: About the VCB, page 17-1 A Quick Tour of the VCB, page 17-2, page 17-4
More informationEMPLOYEE DIRECTORY (SHAREPOINT ADD-IN)
EMPLOYEE DIRECTORY (SHAREPOINT ADD-IN) Global, Global Plus version Updated: March 2018 Version 1.0.0.7 Copyright Beyond Intranet 2017. All Rights Reserved i Notice. This is a controlled document. Unauthorized
More informationYammer with Recognize
Recognize Yammer with Recognize 2016 Recognize Services Inc Version 1.0.1 Introduction... 3 Recognize integration with Yammer... 3 Download the browser extensions now... 3 Check out the resources... 3
More informationKeyNexus Hyper-V Deployment Guide
v1.0 09/2018 . Copyright Notice Copyright 2018 KeyNexus Inc. All rights reserved. Information in this document is subject to change without notice. The software described in this document is furnished
More informationPortal Recipient Guide For Virtual Cabinet
Portal Recipient Guide For Virtual Cabinet Contents 1 Introduction... 3 2 Account Activation... 3 3 Forgotten Password... 6 4 Authenticating your Device & Browser... 9 5 Troubleshooting... 13 Page 2 of
More informationAcronis Data Cloud Version 7.8
Acronis Data Cloud Version 7.8 PARTNER'S GUIDE Revision: 10/5/2018 Table of contents 1 About this document...3 2 About Acronis Data Cloud...3 2.1 Services and offerings... 3 2.2 User accounts and tenants...
More informationEMS DESKTOP CLIENT Installation Guide
EMS DESKTOP CLIENT Installation Guide Version 44.1 Last Updated: March 5, 2018 EMS Software emssoftware.com/help 800.440.3994 2018 EMS Software, LLC. All Rights Reserved. Table of Contents CHAPTER 1: Introduction
More informationThe benefits of synchronizing G Suite and Active Directory passwords
The benefits of synchronizing G Suite and Active Directory passwords www.adselfserviceplus.com Enterprises are adopting more and more applications to enhance productivity and improve employees' user experience.
More informationRed Hat Fuse 7.1 Fuse Online Sample Integration Tutorials
Red Hat Fuse 7.1 Fuse Online Sample Integration Tutorials How business users can share data among different applications Last Updated: 2018-09-25 Red Hat Fuse 7.1 Fuse Online Sample Integration Tutorials
More informationPowerExchange for Facebook: How to Configure Open Authentication using the OAuth Utility
PowerExchange for Facebook: How to Configure Open Authentication using the OAuth Utility 2013 Informatica Corporation. No part of this document may be reproduced or transmitted in any form, by any means
More informationContents. Limitations. Prerequisites. Configuration
Welcome to your Netmail Secure trial The trial version of Netmail Secure allows you to evaluate Netmail Secure from within your own corporate domain. Included is a sample mail feed that is automatically
More informationScout Enterprise Dashboard
Scout Enterprise Dashboard Administrator s Guide Date 2017-07-25 0. Legal Information 2 1. Introduction 3 2. Installation 4 2.1. System requirements 4 2.2. Installing Scout Enterprise Dashboard 6 2.3.
More informationBROWSER-BASED SUPPORT CONSOLE USER S GUIDE. 31 January 2017
BROWSER-BASED SUPPORT CONSOLE USER S GUIDE 31 January 2017 Contents 1 Introduction... 2 2 Netop Host Configuration... 2 2.1 Connecting through HTTPS using Certificates... 3 2.1.1 Self-signed certificate...
More informationSAML-Based SSO Solution
About SAML SSO Solution, page 1 SAML-Based SSO Features, page 2 Basic Elements of a SAML SSO Solution, page 2 SAML SSO Web Browsers, page 3 Cisco Unified Communications Applications that Support SAML SSO,
More informationpinremote Manual Version 4.0
pinremote Manual Version 4.0 Page 1 Table of content 1 Introduction... 4 2 Setup... 5 2.1 Requirements server... 5 2.2 Requirements client... 5 2.3 Setup process... 6 2.3.1 Single Server... 8 2.3.2 Cluster...
More informationKaspersky Security Center 10 Web Console. User Guide
Kaspersky Security Center 10 Web Console User Guide Dear User, Thank you for your trust! We hope that this document will help you in your work and will provide answers regarding this software product.
More informationRed Hat Fuse 7.2 Fuse Online Sample Integration Tutorials
Red Hat Fuse 7.2 Fuse Online Sample Integration Tutorials How business users can share data among different applications Last Updated: 2018-12-13 Red Hat Fuse 7.2 Fuse Online Sample Integration Tutorials
More informationNovaBACKUP CMon v19.0
June 2017 NovaBACKUP CMon v19.0 User Manual Features and specifications are subject to change without notice. The information provided herein is provided for informational and planning purposes only. 2017
More informationAutomation Anywhere Enterprise 10 LTS
Automation Anywhere Enterprise 10 LTS Document Version: 1.3 Installation Guide Date of Publication: 15 th November, 2016 Update(s) to this document edition: Table of Contents 1. Client Prerequisites Processor
More informationSelfService Portal. Step By Step Documentation. This document will show you how to enroll your user account to the SelfService Portal
SelfService Portal Step By Step Documentation This document will show you how to enroll your user account to the SelfService Portal There are three types of Authentication 1. Security Questions 2. Verification
More information22 August 2018 NETOP REMOTE CONTROL PORTAL USER S GUIDE
22 August 2018 NETOP REMOTE CONTROL PORTAL USER S GUIDE CONTENTS 1 Overview... 3 1.1 Netop Remote Control Portal... 3 1.2 Technical Requirements... 3 2 General... 4 2.1 Authentication... 4 2.1.1 Forgot
More informationVMware Identity Manager Administration
VMware Identity Manager Administration VMware AirWatch 9.1 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition.
More informationCMS and e-commerce Solutions. version 1.0. Please, visit us at: or contact directly by
Frequently Asked Questions for Magento User Guide version 1.0 created by IToris IToris Table of contents 1. Introduction... 3 1.1. Purpose... 3 2. Installation and License... 3 2.1. System Requirements...
More informationServiceNow Deployment Guide
ServiceNow Deployment Guide (For Eureka release and forward) Okta Inc. 301 Brannan Street, 3 rd Floor San Francisco, CA, 94107 info@okta.com 1-888-722-7871 Contents Overview... 3 Active Directory Integration...
More informationInstallation Guide for Pulse on Windows Server 2012
USER GUIDE MADCAP PULSE 4 Installation Guide for Pulse on Windows Server 2012 Copyright 2018 MadCap Software. All rights reserved. Information in this document is subject to change without notice. The
More informationVMware Identity Manager Administration
VMware Identity Manager Administration VMware Identity Manager 2.4 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new
More informationCMS and e-commerce Solutions. version 1.0. Please, visit us at: or contact directly by
Countdown Anywhere for Magento User Guide version 1.0 created by IToris IToris Table of contents 1. Introduction... 3 1.1. Purpose... 3 2. Installation and License... 3 2.1. System Requirements... 3 2.2.
More informationThe University of Toledo Intune End-User Enrollment Guide:
The University of Toledo Intune End-User Enrollment Guide: Contents Enroll your Android device in Intune... 2 Enroll your ios device in Intune... 15 Enroll your Mac OS X device in Intune... 25 Enroll your
More informationImporting Existing Data into LastPass
Importing Existing Data into LastPass Once you have installed LastPass, you may need to impocort your existing password entries and secure data from another LastPass account or from another password manager
More informationUsing VMware Identity Manager Apps Portal
Using VMware Identity Manager Apps Portal VMware Identity Manager This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new
More informationSophos Mobile. startup guide. Product Version: 8.1
Sophos Mobile startup guide Product Version: 8.1 Contents About this guide... 1 Sophos Mobile licenses... 2 Trial licenses...2 Upgrade trial licenses to full licenses... 2 Update licenses... 2 What are
More informationWeb Push Notification
Web Push Notification webkul.com/blog/web-push-notification-for-magento2/ On - January 13, 2017 This impressive module allows you to send push notification messages directly to the web browser. The biggest
More information13241 Woodland Park Road, Suite 400 Herndon, VA USA A U T H O R : E X O S T A R D ATE: M A R C H V E R S I O N : 3.
SECURE ACCESS MAN AG E R FIRST TIME LOGIN GUIDE A U T H O R : E X O S T A R D ATE: M A R C H 2 0 1 5 V E R S I O N : 3.0 1 S E C U R E A CCESS M A N A G E R SECURE ACCESS MANAGER OVERVIEW... 3 SUMMARY...
More informationSYNERGY. Supervision and energy management software INSTRUCTION MANUAL
SYNERGY Supervision and energy management software INSTRUCTION MANUAL INDEX 1 INTRODUCTION... 4 2 HARDWARE AND SOFTWARE REQUIREMENTS... 4 3 SETUP... 4 4 SYNERGY LOGIN AND USERS... 5 4.1 Users... 5 4.2
More informationdocalpha Installation Guide
ARTSYL DOCALPHA INSTALLATION GUIDE 1. docalpha Architecture Overview... 2 1.1. docalpha Server Components... 4 1.2. docalpha Production Environment Stations Overview... 4 1.3. docalpha Setup & Administration
More informationLogin Troubleshooting
Login Troubleshooting Scenario #1: I cannot log into my account and I am pretty sure I am using the correct credentials. Problem Solving Steps: 1. All MinuteClinic employees will use the username MC followed
More informationVMware Identity Manager Connector Installation and Configuration (Legacy Mode)
VMware Identity Manager Connector Installation and Configuration (Legacy Mode) VMware Identity Manager This document supports the version of each product listed and supports all subsequent versions until
More informationNuance Management Center
Nuance Management Center Version 5.7 Release Notes Copyright Copyright 2002-2016 Nuance Communications, Inc. All rights reserved. Nuance, ScanSoft, the Nuance logo, the Dragon logo, Dragon, DragonBar,
More information2015 Beta 2 Tutorials
2015 Beta 2 Tutorials 2015 Beta 2 FOR WINDOWS & UNIX & LINUX Contents 1 Tutorial 2: Config, Deploy & Run the Application... 1 1.1 Task 1: Configure the database type... 1 1.2 Task 2: Configure the database
More informationWildix Web API. Quick Guide
Wildix Web API Quick Guide Version: 01.09.2013 Wildix Web API integrates with CRM, ERP software, Fias/Fidelio solutions and Web applications. Javascript Telephony API allows you to control the devices
More informationSophos Mobile. super administrator guide. Product Version: 8
Sophos Mobile super administrator guide Product Version: 8 Contents About this guide... 1 Document conventions... 1 Super administrator... 2 Super administrator tasks...2 Super administrator customer...
More informationTrend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the product, please review the readme files,
More informationINSTALLATION GUIDE Spring 2017
INSTALLATION GUIDE Spring 2017 Copyright and Disclaimer This document, as well as the software described in it, is furnished under license of the Instant Technologies Software Evaluation Agreement and
More informationHow-to Uninstall DivX Browser Bar and Conduit Search
How-to Uninstall DivX Browser Bar and Conduit Search Contents How-to Uninstall DivX Browser Bar and Conduit Search... 1 Chrome... 1 On Startup Page (Home page)... 2 Appearance... 3 Omnibox (Address Bar)...
More informationCMS and e-commerce Solutions. version 1.0. Please, visit us at: or contact directly by
Homepage Content Slider for Magento User Guide version 1.0 created by IToris IToris Table of contents 1. Introduction... 3 1.1. Purpose... 3 2. Installation and License... 3 2.1. System Requirements...
More informationTrend Micro Incorporated reserves the right to make changes to this document and to the product described herein without notice. Before installing and using the product, review the readme files, release
More informationVMware Workspace ONE UEM Integration with Apple School Manager
VMware Workspace ONE UEM Integration with Apple School Manager VMware Workspace ONE UEM Integration with Apple School Manager VMware Workspace ONE UEM 1811 You can find the most up-to-date technical documentation
More informationVMware AirWatch Integration with Apple School Manager Integrate with Apple's School Manager to automatically enroll devices and manage classes
VMware AirWatch Integration with Apple School Manager Integrate with Apple's School Manager to automatically enroll devices and manage classes Workspace ONE UEM v9.6 Have documentation feedback? Submit
More informationEkran System v.6.0 Privileged User Accounts and Sessions (PASM)
Ekran System v.6.0 Privileged User Accounts and Sessions (PASM) Table of Contents About... 3 Using Privileged User Accounts... 4 Password Vault Configuration... 5 Defining Domain Administrator Credentials...
More informationVMware Identity Manager Administration. MAY 2018 VMware Identity Manager 3.2
VMware Identity Manager Administration MAY 2018 VMware Identity Manager 3.2 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ If you have comments
More informationRelativity's mobile app Guide
Relativity's mobile app Guide March 2, 2016 - Version 1.1 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
More informationetrac ATOM Android App Setup Guide
etrac ATOM Android App Setup Guide Version: 1.0.0 Published: 10/22/2014 Global DMS, 1555 Bustard Road, Suite 300, Lansdale, PA 19446 2014, All Rights Reserved. Table of Contents Initial Setup... 3 Settings...
More informationGETTING STARTED GUIDE
GETTING STARTED GUIDE Table of Contents Start Here... 3 Welcome to TrackTik Getting Started Walkthrough... 4 Basic Guide... 9 Basic Getting Started: Adding Employees To Your Dashboard... 10 Basic Getting
More informationMatch My . Set-Up Guide. Single Match Version Single Match Set-Up Guide RAE Internet Inc
Match My Email Set-Up Guide Single Match Version 2.0.4 Single Match Set-Up Guide RAE Internet Inc. 2012 1 Copyright 2011-2012, RAE Internet Inc. (dba Match My Email). This document is the copyrighted intellectual
More informationMYOB Advanced Business
MYOB Advanced Business On-Premise Installation Last Updated: 24 November 2014 Contents Introduction 1 Pre-Requisites 1 Web Browsers... 1 Server Hardware and Software... 1 Database Hardware and Software...
More informationHow to Configure Authentication and Access Control (AAA)
How to Configure Authentication and Access Control (AAA) Overview The Barracuda Web Application Firewall provides features to implement user authentication and access control. You can create a virtual
More informationSophos Mobile Control startup guide. Product version: 7
Sophos Mobile Control startup guide Product version: 7 Contents 1 About this guide...4 2 About Sophos Mobile Control...5 3 Sophos Mobile Control licenses...7 3.1 Trial licenses...7 3.2 Upgrade trial licenses
More information4. Web-based Switch Configuration
4. Web-based Switch Configuration Management Options Connecting using the Web User Interface Logging onto the Web Manager Smart Wizard Web User Interface (Web UI) Management Options The Switch provides
More informationSophos Mobile. startup guide. Product Version: 8.5
Sophos Mobile startup guide Product Version: 8.5 Contents About this guide... 1 Sophos Mobile licenses... 2 Trial licenses...2 Upgrade trial licenses to full licenses... 2 Update licenses... 2 What are
More informationINTEGRATION TO MICROSOFT EXCHANGE Installation Guide
INTEGRATION TO MICROSOFT EXCHANGE Installation Guide V44.1 Last Updated: March 5, 2018 EMS Software emssoftware.com/help 800.440.3994 2018 EMS Software, LLC. All Rights Reserved. Table of Contents CHAPTER
More informationConfiguring an Android Device for inet Guardian
Configuring an Android Device for inet Guardian Edge IT Ltd Piecing Together the IT Puzzle 2016 Edge IT Ltd 1 Configuring a Device for inetguardian inetguardian has been tested on the following devices
More informationWorkspace Administrator Help File
Workspace Administrator Help File Table of Contents HotDocs Workspace Help File... 1 Getting Started with Workspace... 3 What is HotDocs Workspace?... 3 Getting Started with Workspace... 3 To access Workspace...
More informationVMware vrealize Log Insight Getting Started Guide
VMware vrealize Log Insight Getting Started Guide vrealize Log Insight 2.5 This document supports the version of each product listed and supports all subsequent versions until the document is replaced
More informationHow to Configure SSL Interception in the Firewall
Most applications encrypt outgoing connections with SSL or TLS. SSL Interception decrypts SSL-encrypted traffic to allow Application Control features (such as the Virus Scanner, ATD, URL Filter, Safe Search,
More informationVMware Workspace Portal End User Guide
VMware Workspace Portal End User Guide Workspace Portal 2.1 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition.
More informationEnterprise Vault.cloud CloudLink Google Account Synchronization Guide. CloudLink to 4.0.3
Enterprise Vault.cloud CloudLink Google Account Synchronization Guide CloudLink 4.0.1 to 4.0.3 Enterprise Vault.cloud: CloudLink Google Account Synchronization Guide Last updated: 2018-06-08. Legal Notice
More informationSophos Mobile Control Installation guide
Sophos Mobile Control Installation guide Product version: 1.0 Document date: May 2011 Contents 1 Introduction... 3 2 The Sophos Mobile Control server... 4 3 Set up Sophos Mobile Control... 13 4 Apple Push
More informationGuide to Deploying VMware Workspace ONE with VMware Identity Manager. SEP 2018 VMware Workspace ONE
Guide to Deploying VMware Workspace ONE with VMware Identity Manager SEP 2018 VMware Workspace ONE You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/
More informationAspera Connect Windows XP, 2003, Vista, 2008, 7. Document Version: 1
Aspera Connect 2.6.3 Windows XP, 2003, Vista, 2008, 7 Document Version: 1 2 Contents Contents Introduction... 3 Setting Up... 4 Upgrading from a Previous Version...4 Installation... 4 Set Up Network Environment...
More informationContents. Signing In... 3 Answering Your Personal Security Question... 4 Forgetting Your Password... 4 Exploring the Learning Center Interface...
User Guide Contents Logging On... Signing In... Answering Your Personal Security Question... 4 Forgetting Your Password... 4 Exploring the Learning Center Interface... 5 Understanding Icons... 5 Understanding
More informationVMware AirWatch Integration with Apple School Manager Integrate with Apple's School Manager to automatically enroll devices and manage classes
VMware AirWatch Integration with Apple School Manager Integrate with Apple's School Manager to automatically enroll devices and manage classes AirWatch v9.3 Have documentation feedback? Submit a Documentation
More informationComodo SecureBox Management Console Software Version 1.9
6. Comodo SecureBox Management Console Software Version 1.9 Quick Start Guide Guide Version 1.9.041918 Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013 Comodo SecureBox Management Console
More informationG Suite Basic or G Suite Business - Setup Instructions
G Suite Basic or G Suite Business - Setup Instructions Follow the step by step instructions below to set up your G Suite Basic or G Suite Business service. How to sign in to My Online Productivity account
More informationMicrosoft Windows Servers 2012 & 2016 Families
Version 8 Installation Guide Microsoft Windows Servers 2012 & 2016 Families 2301 Armstrong St, Suite 2111, Livermore CA, 94551 Tel: 925.371.3000 Fax: 925.371.3001 http://www.imanami.com Installation Guide
More informationRed Hat JBoss Fuse 7.0-TP
Red Hat JBoss Fuse 7.0-TP Ignite Sample Integration Tutorials Instructions for Creating Sample Integrations Last Updated: 2018-04-03 Red Hat JBoss Fuse 7.0-TP Ignite Sample Integration Tutorials Instructions
More informationBHSF Physician User Guide
PHYSICIAN GUIDE BHSF Physician User Guide The only requirement to use Ambra is a computer with Internet access. When using the web uploader, a JAVA plug- in (already installed on most computers) is required
More informationNTP Software File Auditor for Windows Edition
NTP Software File Auditor for Windows Edition An NTP Software Installation Guide Abstract This guide provides a short introduction to installation and initial configuration of NTP Software File Auditor
More informationBUSINESS DEVELOPMENT SUITE MOBILE INSTALLATION GUIDE. Version 14R2
BUSINESS DEVELOPMENT SUITE MOBILE INSTALLATION GUIDE Version 14R2 COPYRIGHT INFORMATION 2015 Thomson Reuters Elite. All rights reserved. Proprietary and confidential information of Thomson Reuters Elite.
More informationLogin Troubleshooting
Login Troubleshooting Scenario #1: I cannot log into my account and I am pretty sure I am using the correct credentials. Problem Solving Steps: 1. Check with your scheduler to ensure you are using the
More informationThe essential toolkit for effective AD management: The Integrations Handbook
The essential toolkit for effective AD management: The Integrations Handbook Introduction IT management becomes unwieldy when technicians work with too many applications, even if they're just executing
More informationNuance Management Center
Nuance Management Center Version 5.6 Release Notes Copyright Copyright 2002-2016 Nuance Communications, Inc. All rights reserved. Nuance, ScanSoft, the Nuance logo, the Dragon logo, Dragon, DragonBar,
More informationRicoh Managed File Transfer (MFT) User Guide
Ricoh Managed File Transfer (MFT) User Guide -- TABLE OF CONTENTS 1 ACCESSING THE SITE... 3 1.1. WHAT IS RICOH MFT... 3 1.2. SUPPORTED BROWSERS... 3 1.3. LOG IN... 3 1.4. NAVIGATION... 4 1.5. FORGOTTEN
More information