Adopting the following security best practices should be considered when using this application.

Size: px
Start display at page:

Download "Adopting the following security best practices should be considered when using this application."

Transcription

1 Overview This Field Agent* configuration Tool is used to build an installable configuration bundle for a Field Agent* that is factory fresh and enrolled with your Edge Manager. NOTE: This utility does not merge existing machine adapter configurations already in your Field Agent* with the configuration you create with this utility. The prior configuration will be over written. Manually editing the set of files needed to configure the machine adapters to publish data from a logic controller through the Field Agent* to the Predix Cloud is a complex and error prone process. This utility is designed to allow the user to focus on the relevant data needed to configure the I/O and takes care of building a valid syntax set of configuration files in a bundle that can then easily be installed on the Field Agent*. Wherever possible, default values for configuring parameter values will be filled in automatically. It is still the user's responsibility to confirm the values are correct for their configuration. Security Recommendations Adopting the following security best practices should be considered when using this application. Care must be taken when connecting computers, on which this application runs, to a wide area network including but not limited to a corporate network or the Internet at large. The network segmentation and firewall rules at each network interface must be carefully considered to reduce the allowed traffic to the bare minimum needed for operation. Access rules customized to the site s specific needs must be used to access other devices from outside the local control networks. Care must be taken to control, limit, and monitor all access, using, for example, virtual private networks (VPN) or Demilitarized Zone (DMZ) architectures. If a computer is being used in a manner that does not require wide area network access, it is strongly recommended that the computer not be connected to any wide area network to reduce attack surface. Harden system configurations by enabling/using the available security features, and by disabling unnecessary ports, services, functionality, and network file shares. Apply the latest GE product security updates, SIMs, and other recommendations. Apply the latest operating system security patches to all computers. Use anti-virus software on all computers and keep the associated anti-virus signatures up-todate. Use whitelisting software on all computers and keep the whitelist up-to-date. Usage Notes Generally, using this utility entails either opening an existing project, or starting a new project and then following a workflow by passing through the dialog tabs from left to right, filling in the relevant properties. Setup Tab Start by defining the project on the Setup tab and filling in all relevant fields.

2 DEVICE INFORMATION This information section defines configurations for the targeted Field Agent* machine. DEVICE ID This is an optional field. You may wish to use the same value here as defined for the Field Agent* in the Edge Manager. CONFIGURATION VERSION This is an optional field. It is a user-defined value to track the configuration tool s project version. DEVICE MODEL Selection of the Field Agent* model will change capabilities defined in later tabs. PREDIX VERSION You can find the Predix Machine Version of your Field Agent* by browsing its web console and then selecting the OSGi Bundles menu. Scan down the list of installed bundles looking for the one prefixed with "Predix Machine" and look at its version. This is the version of the Predix Machine installed in the Field Agent*. Note that earlier versions of the Field Agents* do not have this Bundles plugin enabled by default, so the Bundles menu option will not be available. It is recommended that you download the latest Application Bundle available for your Field Agent* from the GE Support web site to enable the latest features. PROTOCOL Once the Device Model and the Predix Version have been selected, the available machine adapter protocols are enabled for the above selections. By selecting a protocol, the protocol tab and package tab will be added next to the Setup tab. If there are protocols already selected when changing the Device Model and Predix Version, the unsupported protocol will be removed from the Tab list and the unsupported protocol will be disabled from the protocol list. 2

3 DATA RIVER SETTING The current configuration tool supports only the Web Socket River for the Hoover Spillway Destination. TIME SERIES ZONE ID Time series zone id is the instance id of the time series service that the Field Agent* signs up for in Edge Manager. 3

4 WEB SOCKET URL For Field Agents* used inside the GE Intranet, an alternate Web Socket River URL may be needed: wss://gateway-predix-data-services.run.asv-pr.ice.predix.io/v1/stream/messages Default Web Socket River URL for Field Agents* enrolled on the US West Edge Manager will need to use: wss://gateway-predix-data-services.run.aws-usw02-pr.ice.predix.io/v1/stream/messages If you are still using your Field Agent* on the US East Edge Manager, then the URL is: wss://gateway-predix-data-services.run.asv-pr-pub.ice.predix.io/v1/stream/messages To reset the URL to the default value, delete the contents of this property, save your project, and then open it again. The values of these fields are specified by the Predix application that will be used with the Field Agent*. Use the values as provided with the application. OPC UA Tab User can either follow the three steps (OPC UA Servers, Subscriptions, Tags) by clicking or use the navigation button to configure OPC UA protocol. or 4

5 OPC UA Servers AREA NAME This is a user-defined identity of this OPC UA Data Source CONNECTION SETTINGS Each OPC UA Server requires a name and a connection setting including the server name or ip address, port number and the server resource path. These fields are used to form a valid OPC UA end point URL in the format like opc.tcp:// :4840/myopcuaserver. SECURITY SETTINGS The OPC UA server s username and password can be configured also when the security mode of the OPC UA server is NONE. More servers can be added by clicking the delete icon. button. Existing servers can be removed by clicking OPC UA Subscriptions GENERAL Each OPC UA Subscription requires a name and one OPC UA Server associated with it. A description is optional. PREFIX User can define prefix to be added to tags belonging to this subscription to make their tag name distinguishable in the time series database in the cloud. PUBLISH INTERVAL The OPC UA Machine Adapter subscription has two types of communication patterns with the OPC UA server. Both patterns are described as following: Subscribe: The OPC UA adapter registers monitored nodes to the OPC UA server. Based on the Data Change Filter and interval configured in the subscription or in the node, the OPC UA server will push the data change to the adapter. Pull: The OPC UA adapter pulls data from the OPC UA server regularly based on the interval of the subscription, regardless whether the data is changed on the server. The Data Change Filter is not applicable in this pattern. The default pattern is Subscribe. The publish interval of the subscription is in milliseconds. TIMESTAMP To specify which of the time stamps should be included in the data packet sent to the spillway subscribing to this node, choose one of the following values in the TIMESTAMP selection. Adapter: Use the time stamp at the machine adapter (The computer running Predix Machine) 5

6 Server: Use the time stamp at the OPC UA server. (The computer running the OPC UA server serving the data.) NOTE: If the Server time stamp is requested but is not found in the data received, the Source time stamp is used. Source: Use the time stamp at the data source. (The device where the data originates) NOTE: If the Source time stamp is requested but is not found in the data received, the Server time stamp is used. DATA FILTER TRIGGER The trigger value is used to filter data that triggers a data change notification. There are three types of changes that triggers a notification message. Valid values are: Status: The status of the value StatusValue: The value or status of the value. StatusValueTimestamp: The source time stamp, value, or status of the value. DEADBANDTYPE Deadband is a permitted range for value changes that will not trigger a data change notification. Deadband can be applied as a filter when subscribing to Variables and is used to keep noisy signals from updating the Client unnecessarily. Valid values for deadband types are: None: No deadband is specified. Absolute: Contains the absolute change in a numeric data value that triggers a notification to be generated. Triggers a value change if abs (last value - new value) > DeadbandValue. Percent: The percentage of the Range. Only applied to variables having a range property. Triggers a value if the value changed more than the percentage of the configured value range. DEADBAND VALUE Specifies the values for the deadband types. More subscriptions can be added by clicking the by clicking delete icon. button. Existing subscriptions can be removed OPC UA Tags Tags and their properties are shown in a data table. Users can search or select Table filters and define their own filters to show only interested tags. The Actions options allows users to selected which columns to display. Export CSV will export all tags into a csv formatted file. This csv formatted file can be used as the template to add more tags and use Import CSV to import the changed file back into the configuration tool. Also, by selecting tags, there is an action, Delete Selected, to delete multiple tags at once. 6

7 The newly added tag can be edited by clicking on the edit icon on the right side of each row of the table. Users can edit most columns except subscription, server, and prefix. Once a subscription is selected, its corresponding server and prefix (if Ignored Prefix is not selected and a value exists in the subscription) will automatically be populated. The tag NodeId supports four OPC UA node identifier types: String, Numeric, GUID (without the curly braces) or Opaque (base 64 encoded opaque data). The data filter columns (TRIGGER, DEADBAND TYPE, DEADBAND VALUE) has the same meaning as the subscription data filter. The default value for TRIGGER and DEADBANDTYPE is Inherit and that means the tag is going to use whatever data filtering define in its subscription. NOTE: The user can override the subscription value per tag by selecting the desired value within the tag column. More tags can be added by clicking the button Add Tag or Delete Tag after clicking the row action icon EtherNet/IP TM Tab EtherNet/IP protocol is available within Predix machine 17 and above.. Tags can also be added or deleted by choosing at the very right of each tag row. User can either follow the three steps (EtherNet/IP Servers, Subscriptions, Tags) by clicking or use the navigation button to configure EtherNet/IP protocol. or EtherNet/IP Servers DATA SOURCE/SERVER NAME This is a user-defined identity of this EtherNet/IP Data Source. CONNECTION SETTINGS Each EtherNet/IP server requires a name and a connection setting including the server name or ip address, port number. The available EtherNet/IP protocols are CIP and PCCC. More servers can be added by clicking the delete icon. button. Existing servers can be removed by clicking EtherNet/IP Subscriptions GENERAL Each EtherNet/IP subscription requires a name and one EtherNet/IP server associated with it. A description is optional. 7

8 PREFIX User can define prefix to be added to tags belonging to this subscription to make their tag name distinguishable in the time series database in the cloud. PUBLISH OPTIONS User can define the publish interval of the subscription in milliseconds, seconds, minutes or hours. User can define the minutes/hours to delay before data starts transferring by select User defined for Start Point Type and specifies the number or minutes/hours. More subscriptions can be added by clicking the by clicking delete icon. button. Existing subscriptions can be removed EtherNet/IP Tags Tags and their properties are shown in a data table. Users can search or select Table filters and define their own filters to show only interested tags. The Actions options allows users to selected which columns to display. Export CSV will export all tags into a csv formatted file. This csv formatted file can be used as the template to add more tags and use Import CSV to import the changed file back into the configuration tool. Also, by selecting tags, there is an action, Delete Selected, to delete multiple tags at once. The newly added tag can be edited by clicking on the edit icon on the right side of each row of the table. Users can edit most columns except subscription, server, and prefix. Once a subscription is selected, its corresponding server and prefix (if Ignored Prefix is not selected and a value exists in the subscription) will automatically be populated. The data filter columns have the same meaning as the subscription data filter. More tags can be added by clicking the button Add Tag or Delete Tag after clicking the row action icon. Tags can also be added or deleted by choosing at the very right of each tag row. Package Tab Package tab contains summaries of all previous tabs for user to review. Package button is used to create configuration bundles. If there are invalid data fields, user get a warning notification at the top of the package tab. Once all fields are filled in with valid data, the Package button will generate the data files and zip them into a bundle needed to configure the Field Agent*. The generated bundle is stored in the same folder as your project is saved, and uses the same base name for the file with the file extension ZIP. 8

9 Open your web browser to your Edge Manager, upload the bundle you just generated to the Edge Manager Repository, and then schedule and deploy the configuration to the related device. General Validate Once all information is entered in each tab, a status of either Valid or Invalid shows to indicating valid data or missing/invalid data. Fields with invalid value are usually highlighted with comments indicating the error. Most fields have a tooltip when the user hover their mouse over the field or click on the information icon next to the field to get more detailed information about these fields and their expected valid values. NOTE: Filling a field in with valid syntax data, but an incorrect value, can still generate a configuration that is a non-functional yet valid format. It is the responsibility of the user to fill in the data with the correct values. Menus File New, Open, Save, Save As Use these menus to start a new configuration project, open an existing project, save a project, or save the current project with a new name. The default folder for saved projects is your Documents folder. If you change to a different folder when you save your project, then that folder becomes the new default folder. If a newly opened project is marked as changed ('*' after the name in the title bar), then this indicates that the project was modified since opened. Preferences Preferences item allows a user to set settings. Current available setting are language and load from recent project file. 9

10 Edit Undo, Redo, Cut, Copy, Paste, Delete, Select All Use these menus to edit the editable fields. Select All will select all text fields within the current active page. View Actual Size, Zoom In, Zoom Out, Toggle Full Screen Use these menus items to change the display size of the configuration tool. Window Minimize, Close Use these menus to minimize or close (exit) the configuration tool. Help Release Notes, Documentation, About Release Notes item displays a window with the release notes for all available version. Documentation item displays a window containing a user guide for the application and the About item displays the application versions. * Trademark of the General Electric Company or its subsidiaries. All other brands or names are property of their respective holders. Copyright 2018 GE Power. All rights reserved. 10

Legal Notes. Regarding Trademarks KYOCERA MITA Corporation

Legal Notes. Regarding Trademarks KYOCERA MITA Corporation Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held liable for any problems arising from

More information

WEB ANALYTICS HOW-TO GUIDE

WEB ANALYTICS HOW-TO GUIDE WEB ANALYTICS HOW-TO GUIDE MOTOROLA, MOTO, MOTOROLA SOLUTIONS and the Stylized M logo are trademarks or registered trademarks of Motorola Trademark Holdings, LLC and are used under license. All other trademarks

More information

KYOCERA Net Admin User Guide

KYOCERA Net Admin User Guide KYOCERA Net Admin User Guide Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held liable

More information

Integration with Apple Configurator 2. VMware Workspace ONE UEM 1902

Integration with Apple Configurator 2. VMware Workspace ONE UEM 1902 Integration with Apple Configurator 2 VMware Workspace ONE UEM 1902 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ If you have comments about

More information

OPC-UA Tutorial. A Guide to Configuring the TOP Server for OPC-UA

OPC-UA Tutorial. A Guide to Configuring the TOP Server for OPC-UA OPC-UA Tutorial A Guide to Configuring the TOP Server for OPC-UA Page 2 of 40 Table of Contents INTRODUCTION 4 Introduction to OPC UA 4 Introduction to TOP Server 5 Intended Audience 5 Prerequisites 6

More information

OPC UA Configuration Manager PTC Inc. All Rights Reserved.

OPC UA Configuration Manager PTC Inc. All Rights Reserved. 2017 PTC Inc. All Rights Reserved. 2 Table of Contents 1 Table of Contents 2 4 Overview 4 5 Project Properties - OPC UA 5 Server Endpoints 7 Trusted Clients 9 Discovery Servers 10 Trusted Servers 11 Instance

More information

Sophos Mobile as a Service

Sophos Mobile as a Service startup guide Product Version: 8 Contents About this guide... 1 What are the key steps?... 2 Change your password... 3 Change your login name... 4 Activate Mobile Advanced licenses...5 Check your licenses...6

More information

DOCUMENTUM D2. User Guide

DOCUMENTUM D2. User Guide DOCUMENTUM D2 User Guide Contents 1. Groups... 6 2. Introduction to D2... 7 Access D2... 7 Recommended browsers... 7 Login... 7 First-time login... 7 Installing the Content Transfer Extension... 8 Logout...

More information

Field Agents* Secure Deployment Guide

Field Agents* Secure Deployment Guide GFK-3009 Field Agents* Secure Deployment Guide Jan 2017 These instructions do not purport to cover all details or variations in equipment, nor to provide for every possible contingency to be met during

More information

User manuals, product updates, and other information are available on the GE Customer Care support website,

User manuals, product updates, and other information are available on the GE Customer Care support website, Important Product Information May 2018 Mini Field Agent (MFA) ICMFA000000 ICMFA001US0, ICMFA001US1, ICMFA002US0 ICMFA001EU0, ICMFA001EU1, ICMFA002EU0 ICMFA001AE0, ICMFA001AE1, ICMFA001AU0, ICMFA001AU1,

More information

Sophos Mobile in Central

Sophos Mobile in Central startup guide Product Version: 8.1 Contents About this guide... 1 What are the key steps?... 2 Activate Mobile Advanced licenses... 3 Configure settings... 4 Configure personal settings...4 Configure technical

More information

MX-AOPC UA Server User s Manual

MX-AOPC UA Server User s Manual User s Manual Edition 3.1, November 2016 www.moxa.com/product 2016 Moxa Inc. All rights reserved. User s Manual The software described in this manual is furnished under a license agreement and may be used

More information

Sophos Mobile SaaS startup guide. Product version: 7.1

Sophos Mobile SaaS startup guide. Product version: 7.1 Sophos Mobile SaaS startup guide Product version: 7.1 Contents 1 About this guide...4 2 What are the key steps?...5 3 Change your password...6 4 Change your login name...7 5 Activate SMC Advanced licenses...8

More information

Comodo Dome Shield - Admin Guide

Comodo Dome Shield - Admin Guide rat Comodo Dome Shield Software Version 1.12 Administrator Guide Guide Version 1.12.111717 Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013 Table of Contents 1 Introduction to Comodo Dome

More information

Workspace ios Content Locker. UBC Workspace 2.0: VMware Content Locker v4.12 for ios. User Guide

Workspace ios Content Locker. UBC Workspace 2.0: VMware Content Locker v4.12 for ios. User Guide UBC Workspace 2.0: VMware Content Locker v4.12 for ios User Guide Navigating Content Locker Content Locker centralizes all your enterprise data in a single container and integrates existing content repositories

More information

Comodo cwatch Network Software Version 2.23

Comodo cwatch Network Software Version 2.23 rat Comodo cwatch Network Software Version 2.23 Administrator Guide Guide Version 2.23.060618 Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013 Table of Contents 1 Introduction to Comodo cwatch

More information

Managing Load Plans in OTBI Enterprise for HCM Cloud Service

Managing Load Plans in OTBI Enterprise for HCM Cloud Service Managing Load Plans in OTBI Enterprise for HCM Cloud Service Copyright 2014, Oracle and/or its affiliates. All rights reserved. 1 Objective After completing this lesson, you should be able to use Configuration

More information

2 Document Manager Lite v5.2 User Guide

2 Document Manager Lite v5.2 User Guide This document was produced by Voloper Creations Inc. 2000 2009 Voloper Creations Inc. All Rights Reserved Brands or product names are trademarks or registered trademarks of their respective holders. The

More information

VMware AirWatch Google Sync Integration Guide Securing Your Infrastructure

VMware AirWatch Google Sync Integration Guide Securing Your  Infrastructure VMware AirWatch Google Sync Integration Guide Securing Your Email Infrastructure AirWatch v9.2 Have documentation feedback? Submit a Documentation Feedback support ticket using the Support Wizard on support.air-watch.com.

More information

vcloud Director Tenant Portal Guide vcloud Director 8.20

vcloud Director Tenant Portal Guide vcloud Director 8.20 vcloud Director Tenant Portal Guide vcloud Director 8.20 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ If you have comments about this documentation,

More information

VMware AirWatch Integration with Apple Configurator 2 Guide Using Apple Configurator 2 and AirWatch to simplify mass deployments

VMware AirWatch Integration with Apple Configurator 2 Guide Using Apple Configurator 2 and AirWatch to simplify mass deployments VMware AirWatch Integration with Apple Configurator 2 Guide Using Apple Configurator 2 and AirWatch to simplify mass deployments AirWatch v9.2 Have documentation feedback? Submit a Documentation Feedback

More information

Tenable.io User Guide. Last Revised: November 03, 2017

Tenable.io User Guide. Last Revised: November 03, 2017 Tenable.io User Guide Last Revised: November 03, 2017 Table of Contents Tenable.io User Guide 1 Getting Started with Tenable.io 10 Tenable.io Workflow 12 System Requirements 15 Scanners and Agents 16 Link

More information

Google Sync Integration Guide. VMware Workspace ONE UEM 1902

Google Sync Integration Guide. VMware Workspace ONE UEM 1902 Google Sync Integration Guide VMware Workspace ONE UEM 1902 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ If you have comments about this documentation,

More information

CLIQ Web Manager. User Manual. The global leader in door opening solutions V 6.1

CLIQ Web Manager. User Manual. The global leader in door opening solutions V 6.1 CLIQ Web Manager User Manual V 6.1 The global leader in door opening solutions Program version: 6.1 Document number: ST-003478 Date published: 2016-03-31 Language: en-gb Table of contents 1 Overview...9

More information

IBM Proventia Management SiteProtector Policies and Responses Configuration Guide

IBM Proventia Management SiteProtector Policies and Responses Configuration Guide IBM Internet Security Systems IBM Proventia Management SiteProtector Policies and Responses Configuration Guide Version2.0,ServicePack8.1 Note Before using this information and the product it supports,

More information

OPC UA Configuration Manager Help 2010 Kepware Technologies

OPC UA Configuration Manager Help 2010 Kepware Technologies OPC UA Configuration Manager Help 2010 Kepware Technologies 1 OPC UA Configuration Manager Help Table of Contents 1 Getting Started... 2 Help Contents... 2 Overview... 2 Server Settings... 2 2 OPC UA Configuration...

More information

User Guide. Kronodoc Kronodoc Oy. Intelligent methods for process improvement and project execution

User Guide. Kronodoc Kronodoc Oy. Intelligent methods for process improvement and project execution User Guide Kronodoc 3.0 Intelligent methods for process improvement and project execution 2003 Kronodoc Oy 2 Table of Contents 1 User Guide 5 2 Information Structure in Kronodoc 6 3 Entering and Exiting

More information

Product overview. McAfee Web Protection Hybrid Integration Guide. Overview

Product overview. McAfee Web Protection Hybrid Integration Guide. Overview McAfee Web Protection Hybrid Integration Guide Product overview Overview The McAfee Web Protection hybrid solution is the integration of McAfee Web Gateway and McAfee Web Gateway Cloud Service (McAfee

More information

Roxen Content Provider

Roxen Content Provider Roxen Content Provider Generation 3 Templates Purpose This workbook is designed to provide a training and reference tool for placing University of Alaska information on the World Wide Web (WWW) using the

More information

TOSHIBA OPC UA Data Access Client Instruction Manual 6F8C1593

TOSHIBA OPC UA Data Access Client Instruction Manual 6F8C1593 TOSHIBA OPC UA Data Access Client Instruction Manual 6F8C1593 First Edition 13 th January. 2016 The material in this manual may be revised without notice. Copy right 2016 by Toshiba Corporation. All rights

More information

T-SYSTEMS MULTIMEDIA SOLUTIONS ADMINISTRATION MANUAL

T-SYSTEMS MULTIMEDIA SOLUTIONS ADMINISTRATION MANUAL T-SYSTEMS MULTIMEDIA SOLUTIONS ADMINISTRATION MANUAL DOCULIFE DESKTOP 5.6 DATE: 16.03.2015 Document Future AG 03/2015 Document Future AG holds the copyright to this documentation. No part of this documentation

More information

12d Synergy V4 Release Notes. 12d Synergy V4 Release Notes. Prerequisites. Upgrade Path. Check Outs. Scripts. Workspaces

12d Synergy V4 Release Notes. 12d Synergy V4 Release Notes. Prerequisites. Upgrade Path. Check Outs. Scripts. Workspaces 12d Synergy V4 Release Notes V4 contains a large number of features. Many of these features are listed in this document, but this list may not be exhaustive. This document also contains pre-requisites

More information

MX-AOPC UA Server User s Manual

MX-AOPC UA Server User s Manual User s Manual Edition 3.3, February 2018 www.moxa.com/product 2018 Moxa Inc. All rights reserved. User s Manual The software described in this manual is furnished under a license agreement and may be used

More information

Product Guide. McAfee Web Gateway Cloud Service

Product Guide. McAfee Web Gateway Cloud Service Product Guide McAfee Web Gateway Cloud Service COPYRIGHT Copyright 2017 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee epo, McAfee

More information

VMware AirWatch Google Sync Integration Guide Securing Your Infrastructure

VMware AirWatch Google Sync Integration Guide Securing Your  Infrastructure VMware AirWatch Google Sync Integration Guide Securing Your Email Infrastructure Workspace ONE UEM v9.5 Have documentation feedback? Submit a Documentation Feedback support ticket using the Support Wizard

More information

Integrate Data from External Providers

Integrate Data from External Providers Enterprise Architect User Guide Series Integrate Data from External Providers Author: Sparx Systems Date: 10/05/2018 Version: 1.0 CREATED WITH Table of Contents Integrate Data from External Providers 3

More information

rat Comodo EDR Software Version 1.7 Administrator Guide Guide Version Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013

rat Comodo EDR Software Version 1.7 Administrator Guide Guide Version Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013 rat Comodo EDR Software Version 1.7 Administrator Guide Guide Version 1.1.120318 Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013 Table of Contents 1 Introduction to Comodo EDR...3 1.1 Purchase

More information

ACTIVE Net Insights user guide. (v5.4)

ACTIVE Net Insights user guide. (v5.4) ACTIVE Net Insights user guide (v5.4) Version Date 5.4 January 23, 2018 5.3 November 28, 2017 5.2 October 24, 2017 5.1 September 26, 2017 ACTIVE Network, LLC 2017 Active Network, LLC, and/or its affiliates

More information

SNMP Agent Plug-In PTC Inc. All Rights Reserved.

SNMP Agent Plug-In PTC Inc. All Rights Reserved. 2018 PTC Inc. All Rights Reserved. 2 Table of Contents SNMP Agent Plug-In 1 Table of Contents 2 SNMP Agent Plug-In 4 Overview 4 Agent Setup 5 General 5 Network Interfaces 7 Communication 8 Agent Actions

More information

ForeScout Extended Module for ServiceNow

ForeScout Extended Module for ServiceNow ForeScout Extended Module for ServiceNow Version 1.1.0 Table of Contents About this Integration... 4 Use Cases... 4 Asset Identification... 4 Asset Inventory True-up... 5 Additional ServiceNow Documentation...

More information

ForeScout Extended Module for Qualys VM

ForeScout Extended Module for Qualys VM ForeScout Extended Module for Qualys VM Version 1.2.1 Table of Contents About the Qualys VM Integration... 3 Additional Qualys VM Documentation... 3 About This Module... 3 Components... 4 Considerations...

More information

Sophos Mobile in Central

Sophos Mobile in Central startup guide product version: 8.6 Contents About this guide... 1 What are the key steps?... 2 Activate Mobile Advanced licenses... 3 Configure settings... 4 Configure personal settings...4 Configure IT

More information

Anonymous Group Manager GUI Tool

Anonymous Group Manager GUI Tool This chapter provides details on the Anonymous Group Manager GUI tool and how to manager Anonymous Groups using the Cisco SCA BB. This chapter describes how to use the Anonymous Group Manager graphical

More information

Griffin Training Manual

Griffin Training Manual Griffin Training Manual Grif-WebI Orientation Class For View Only Users Alumni Relations and Development The University of Chicago Table of Contents Chapter 1: Defining & Accessing Web Intelligence...

More information

Sedao Ltd. QuickChange PROject. User Manual for QuickChange PROject version 2.1.5

Sedao Ltd. QuickChange PROject. User Manual for QuickChange PROject version 2.1.5 Sedao Ltd QuickChange PROject User Manual for QuickChange PROject version 2.1.5 Contents What is QuickChange PROject?... 2 Simple Artwork Creation... 5 Creating a project... 7 QuickChange PROject Template

More information

Kaseya 2. User Guide. for VSA 6.0

Kaseya 2. User Guide. for VSA 6.0 Kaseya 2 Patch Management User Guide for VSA 6.0 July 19, 2010 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private Sector IT organizations.

More information

Alarms & Events Plug-In PTC Inc. All Rights Reserved.

Alarms & Events Plug-In PTC Inc. All Rights Reserved. 2017 PTC Inc. All Rights Reserved. 2 Table of Contents 1 Table of Contents 2 4 Overview 4 OPC AE Plug-In Terminology 4 OPC AE Plug-In Conditions 5 The OPC AE Plug-In from the OPC AE Clients' Perspective

More information

HarePoint Analytics. For SharePoint. User Manual

HarePoint Analytics. For SharePoint. User Manual HarePoint Analytics For SharePoint User Manual HarePoint Analytics for SharePoint 2013 product version: 15.5 HarePoint Analytics for SharePoint 2016 product version: 16.0 04/27/2017 2 Introduction HarePoint.Com

More information

Version 2.38 April 18, 2019

Version 2.38 April 18, 2019 Version 2.38 April 18, 2019 in Qualys Cloud Suite 2.38! AssetView Azure Instance State search token and Dynamic Tag Support Security Assessment Questionnaire New Search Option for Template Selection Web

More information

BeetleEye Application User Documentation

BeetleEye Application User Documentation BeetleEye Application User Documentation BeetleEye User Documentation 1 Table of Contents Welcome to the BeetleEye Application... 6 Overview... 6 Navigation... 6 Access BeetleEye... 6 Update account information...

More information

Managing Modular Infrastructure by using OpenManage Essentials (OME)

Managing Modular Infrastructure by using OpenManage Essentials (OME) Managing Modular Infrastructure by using OpenManage Essentials (OME) This technical white paper describes how to manage the modular infrastructure by using Dell EMC OME. Dell Engineering June 2017 A Dell

More information

GE Ethernet Global Data Driver Help Kepware Technologies

GE Ethernet Global Data Driver Help Kepware Technologies GE Ethernet Global Data Driver Help 2012 Kepware Technologies 2 Table of Contents Table of Contents 2 4 Overview 4 Device Setup 5 Name Resolution 6 Exchange Configuration 7 Data Types Description 11 Address

More information

Client Proxy interface reference

Client Proxy interface reference McAfee Client Proxy 2.3.5 Interface Reference Guide Client Proxy interface reference These tables provide information about the policy settings found in the Client Proxy UI. Policy Catalog On the McAfee

More information

Lava New Media s CMS. Documentation Page 1

Lava New Media s CMS. Documentation Page 1 Lava New Media s CMS Documentation 5.12.2010 Page 1 Table of Contents Logging On to the Content Management System 3 Introduction to the CMS 3 What is the page tree? 4 Editing Web Pages 5 How to use the

More information

Barracuda Spam Firewall User s Guide

Barracuda Spam Firewall User s Guide Barracuda Spam Firewall User s Guide 1 Copyright Copyright 2005, Barracuda Networks www.barracudanetworks.com v3.2.22 All rights reserved. Use of this product and this manual is subject to license. Information

More information

Perceptive Media Connector

Perceptive Media Connector Perceptive Media Connector Installation and Setup Guide Version: 1.0.x Compatible with ImageNow, version 6.7.x Written by: Product Documentation, R&D Date: August 2016 2015 Perceptive Software. All rights

More information

Intrusion Detection and Prevention IDP 4.1r4 Release Notes

Intrusion Detection and Prevention IDP 4.1r4 Release Notes Intrusion Detection and Prevention IDP 4.1r4 Release Notes Build 4.1.134028 September 22, 2009 Revision 02 Contents Overview...2 Supported Hardware...2 Changed Features...2 IDP OS Directory Structure...2

More information

Industrial Data Forwarder for Splunk Kepware, Inc.

Industrial Data Forwarder for Splunk Kepware, Inc. Industrial Data Forwarder for Splunk 2016 Kepware, Inc. Industrial Data Forwarder for Splunk 2 Table of Contents Table of Contents 2 Industrial Data Forwarder for Splunk 3 Overview 3 User Interface 4 Quick

More information

McAfee MVISION Mobile epo Extension Product Guide

McAfee MVISION Mobile epo Extension Product Guide McAfee MVISION Mobile epo Extension 1809 Product Guide September 11, 2018 COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator,

More information

MOBILE SUPERVISOR. Revision Date: v.4.0.1

MOBILE SUPERVISOR. Revision Date: v.4.0.1 MOBILE SUPERVISOR Revision Date: 29.09.2018 v.4.0.1 1 CHAPTER 1: GENERAL INFORMATION ABOUT MOBIVISOR BASIC MANAGEMENT STEPS In this chapter, the following issues are analysed; Described Subjects About

More information

Version 2 Midas Production Site Field Instructions

Version 2 Midas Production Site Field Instructions Version 2 Midas Production Site Field Instructions September 2018 FOREST INVENTORY AND ANALYSIS NORTHERN RESEARCH STATION USDA FOREST SERVICE 1 Table of Contents Introduction... 3 Section 1: Initial Logon

More information

Cisco Threat Intelligence Director (TID)

Cisco Threat Intelligence Director (TID) The topics in this chapter describe how to configure and use TID in the Firepower System. Overview, page 1 Using TID Sources to Ingest Feed Data, page 6 Using Access Control to Publish TID Data and Generate

More information

vcenter Support Assistant User's Guide

vcenter Support Assistant User's Guide vcenter Support Assistant 6.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions

More information

Using Sitecore 5.3.1

Using Sitecore 5.3.1 Using Sitecore 5.3.1 An End-User s Guide to Using and Administrating Sitecore Author: Sitecore Corporation Date: December 12, 2007 Release: Rev. 1.0 Language: English Sitecore is a registered trademark.

More information

HP Database and Middleware Automation

HP Database and Middleware Automation HP Database and Middleware Automation For Windows Software Version: 10.10 SQL Server Database Refresh User Guide Document Release Date: June 2013 Software Release Date: June 2013 Legal Notices Warranty

More information

ForeScout Extended Module for ServiceNow

ForeScout Extended Module for ServiceNow ForeScout Extended Module for ServiceNow Version 1.2 Table of Contents About ServiceNow Integration... 4 Use Cases... 4 Asset Identification... 4 Asset Inventory True-up... 5 Additional ServiceNow Documentation...

More information

Developer Cockpit. Introduction 1. Prerequisites 2. Application Lifecycle in MindSphere 3. User interfaces "Developer Cockpit" 4

Developer Cockpit. Introduction 1. Prerequisites 2. Application Lifecycle in MindSphere 3. User interfaces Developer Cockpit 4 Introduction 1 Prerequisites 2 Application Lifecycle in MindSphere 3 System Manual User interfaces "Developer Cockpit" 4 User rights in "Developer Cockpit" 5 Workflow of Developer Cockpit 6 Develop applications

More information

NETWRIX GROUP POLICY CHANGE REPORTER

NETWRIX GROUP POLICY CHANGE REPORTER NETWRIX GROUP POLICY CHANGE REPORTER ADMINISTRATOR S GUIDE Product Version: 7.2 November 2012. Legal Notice The information in this publication is furnished for information use only, and does not constitute

More information

Ignition HMI interface to Fanuc Industrial Robots

Ignition HMI interface to Fanuc Industrial Robots Ignition HMI interface to Fanuc Industrial Robots (Fanuc R30iA controller) Communication from Ignition HMI directly to the Fanuc robot R30iA controller requires that the robot have the HMI Device (SNPX)

More information

Cisco Threat Intelligence Director (TID)

Cisco Threat Intelligence Director (TID) The topics in this chapter describe how to configure and use TID in the Firepower System. Overview, page 1 Requirements for Threat Intelligence Director, page 4 How To Set Up, page 6 Analyze TID Incident

More information

ESET Mobile Security for Windows Mobile. Installation Manual and User Guide - Public Beta

ESET Mobile Security for Windows Mobile. Installation Manual and User Guide - Public Beta ESET Mobile Security for Windows Mobile Installation Manual and User Guide - Public Beta Contents...3 1. Installation of ESET Mobile Security 1.1 Minimum...3 system requirements 1.2 Installation...3 1.2.1

More information

VMware AirWatch - Workspace ONE, Single Sign-on and VMware Identity Manager

VMware AirWatch - Workspace ONE, Single Sign-on and VMware Identity Manager VMware AirWatch - Workspace ONE, Single Sign-on and VMware Identity Table of Contents Lab Overview - HOL-1857-03-UEM - Workspace ONE UEM with App & Access Management... 2 Lab Guidance... 3 Module 1 - Workspace

More information

HARTING OPC-UA Gateway for MICA User Manual

HARTING OPC-UA Gateway for MICA User Manual HARTING OPC-UA Gateway for MICA User Manual 1. Edition 2018 c HARTING IT Software Development, Espelkamp All rights reserved, including those of the translation. No part of this manual may be reproduced

More information

FIREFOX MENU REFERENCE This menu reference is available in a prettier format at

FIREFOX MENU REFERENCE This menu reference is available in a prettier format at FIREFOX MENU REFERENCE This menu reference is available in a prettier format at http://support.mozilla.com/en-us/kb/menu+reference FILE New Window New Tab Open Location Open File Close (Window) Close Tab

More information

Integrating Juniper Sky Advanced Threat Prevention (ATP) and ForeScout CounterACT for Infected Host Remediation

Integrating Juniper Sky Advanced Threat Prevention (ATP) and ForeScout CounterACT for Infected Host Remediation Integrating Juniper Sky Advanced Threat Prevention (ATP) and ForeScout CounterACT for Infected Host Remediation Configuration Example March 2018 2018 Juniper Networks, Inc. Juniper Networks, Inc. 1133

More information

Viewing System Status, page 404. Backing Up and Restoring a Configuration, page 416. Managing Certificates for Authentication, page 418

Viewing System Status, page 404. Backing Up and Restoring a Configuration, page 416. Managing Certificates for Authentication, page 418 This chapter describes how to maintain the configuration and firmware, reboot or reset the security appliance, manage the security license and digital certificates, and configure other features to help

More information

WorkPlace. User Guide Version 10.5

WorkPlace. User Guide Version 10.5 WorkPlace User Guide Version 10.5 2009 SonicWALL, Inc. All rights reserved. SonicWALL is a registered trademark of SonicWALL, Inc. Other product names mentioned herein may be trademarks and/or registered

More information

Perceptive Process Mining

Perceptive Process Mining Perceptive Process Mining Getting Started Guide Version: 2.7.x Written by: Product Knowledge, R&D Date: September 2016 2016 Lexmark. All rights reserved. Lexmark is a trademark of Lexmark International

More information

User Manual. Dockit Archiver

User Manual. Dockit Archiver User Manual Dockit Archiver Last Updated: March 2018 Copyright 2018 Vyapin Software Systems Private Ltd. All rights reserved. This document is being furnished by Vyapin Software Systems Private Ltd for

More information

Enforced Client Policy & Reporting Server (EPRS) 2.3. Administration Guide

Enforced Client Policy & Reporting Server (EPRS) 2.3. Administration Guide Enforced Client Policy & Reporting Server (EPRS) 2.3 Copyright 2016 Dell Inc. All rights reserved. This product is protected by U.S. and international copyright and intellectual property laws. Dell, the

More information

Avalanche Remote Control User Guide. Version 4.1

Avalanche Remote Control User Guide. Version 4.1 Avalanche Remote Control User Guide Version 4.1 ii Copyright 2012 by Wavelink Corporation. All rights reserved. Wavelink Corporation 10808 South River Front Parkway, Suite 200 South Jordan, Utah 84095

More information

SAFETY NOTICE: TO AVOID DANGER, KEEP PRODUCT AND PACKAGE AWAY FROM BABIES AND CHILDREN. THE PRODUCT IS NOT INTENDED FOR BABIES AND CHILDREN.

SAFETY NOTICE: TO AVOID DANGER, KEEP PRODUCT AND PACKAGE AWAY FROM BABIES AND CHILDREN. THE PRODUCT IS NOT INTENDED FOR BABIES AND CHILDREN. www.yoggie.com Legal Notice Legal Notice SAFETY NOTICE: TO AVOID DANGER, KEEP PRODUCT AND PACKAGE AWAY FROM BABIES AND CHILDREN. THE PRODUCT IS NOT INTENDED FOR BABIES AND CHILDREN. Copyright 2006-2008.

More information

Server Installation. Parent page: System Installation, Licensing & Management

Server Installation. Parent page: System Installation, Licensing & Management Published on Online Documentation for Altium Products (https://www.altium.com/documentation) ホーム > Altium Infrastructure Server 製品マニュアル Modified by Rob Evans on Feb 20, 2018 Parent page: System Installation,

More information

Integrated Cloud Environment Office 365 User s Guide

Integrated Cloud Environment Office 365 User s Guide Integrated Cloud Environment Office 365 User s Guide 2012-2018 Ricoh Americas Corporation R i c o h A m e r i c a s C o r p o r a t i o n It is the reader's responsibility when discussing the information

More information

Desktop & Laptop Edition

Desktop & Laptop Edition Desktop & Laptop Edition USER MANUAL For Mac OS X Copyright Notice & Proprietary Information Redstor Limited, 2016. All rights reserved. Trademarks - Mac, Leopard, Snow Leopard, Lion and Mountain Lion

More information

DOCUMENT IMAGING REFERENCE GUIDE

DOCUMENT IMAGING REFERENCE GUIDE January 25, 2017 DOCUMENT IMAGING REFERENCE GUIDE AppXtender Web Access version 7 Kent State University Division of Information Services AppXtender Web Access Help: For questions regarding AppXtender Web

More information

Detector Service Delivery System (SDS) Version 3.0

Detector Service Delivery System (SDS) Version 3.0 Detector Service Delivery System (SDS) Version 3.0 Detecting and Responding to IT Security Policy Violations Quick Start Guide 2018 RapidFire Tools, Inc. All rights reserved. V20180112 Contents Overview

More information

McAfee Data Exchange Layer Product Guide. (McAfee epolicy Orchestrator)

McAfee Data Exchange Layer Product Guide. (McAfee epolicy Orchestrator) McAfee Data Exchange Layer 4.1.0 Product Guide (McAfee epolicy Orchestrator) COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator,

More information

Configuring the SMA 500v Virtual Appliance

Configuring the SMA 500v Virtual Appliance Using the SMA 500v Virtual Appliance Configuring the SMA 500v Virtual Appliance Registering Your Appliance Using the 30-day Trial Version Upgrading Your Appliance Configuring the SMA 500v Virtual Appliance

More information

Copyright and Trademarks

Copyright and Trademarks Copyright and Trademarks Specops Password Reset is a trademark owned by Specops Software. All other trademarks used and mentioned in this document belong to their respective owners. 2 Contents Key Components

More information

Apptimized User Guide How to use Apptimized

Apptimized User Guide How to use Apptimized Apptimized User Guide How to use Apptimized V1.0 Contents Self-Service Packaging... 3 Registration... 3 Traditional... 3 Wizard... 3 Basics... 4 Login... 4 Create A Project... 5 Access A Project... 5 Upload...

More information

Navigating Viewpoint V6 Exploring the Viewpoint Main Menu

Navigating Viewpoint V6 Exploring the Viewpoint Main Menu Navigating Viewpoint V6 Exploring the Viewpoint Main Menu Table of Contents About this Course 3 Viewpoint Folder Structure 4 File Menu 5 View Menu 6 Options Menu 7 User Options 7 Help Menu 9 Support 9

More information

Performance Management Reporting User Guide for EPMR

Performance Management Reporting User Guide for EPMR Performance Management Reporting User Guide for EPMR January, 2015 2015 by Cox Communications. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means,

More information

Blazer Express FAQ. Blazer Express V1.4 Frequently Asked Questions (FAQ)

Blazer Express FAQ. Blazer Express V1.4 Frequently Asked Questions (FAQ) Blazer Express V1.4 Frequently Asked s (FAQ) Frequently Asked s COPYRIGHT 2017 Hangzhou Hikvision Digital Technology Co., Ltd. ALL RIGHTS RESERVED. Any and all information, including, among others, wordings,

More information

Microsoft Windows SharePoint Services

Microsoft Windows SharePoint Services Microsoft Windows SharePoint Services SITE ADMIN USER TRAINING 1 Introduction What is Microsoft Windows SharePoint Services? Windows SharePoint Services (referred to generically as SharePoint) is a tool

More information

ZENworks 2017 Update 2 Endpoint Security Utilities Reference. February 2018

ZENworks 2017 Update 2 Endpoint Security Utilities Reference. February 2018 ZENworks 2017 Update 2 Endpoint Security Utilities Reference February 2018 Legal Notice For information about legal notices, trademarks, disclaimers, warranties, export and other use restrictions, U.S.

More information

ZENworks Reporting System Reference. January 2017

ZENworks Reporting System Reference. January 2017 ZENworks Reporting System Reference January 2017 Legal Notices For information about legal notices, trademarks, disclaimers, warranties, export and other use restrictions, U.S. Government rights, patent

More information

VMware AirWatch: Directory and Certificate Authority

VMware AirWatch: Directory and Certificate Authority Table of Contents Lab Overview - HOL-1857-06-UEM - VMware AirWatch: Directory and Certificate Authority Integration... 2 Lab Guidance... 3 Module 1 - Advanced AirWatch Configuration, AD Integration/Certificates

More information

BEAWebLogic RFID. Edge Server. Using the Administration Console

BEAWebLogic RFID. Edge Server. Using the Administration Console BEAWebLogic RFID Edge Server Using the Administration Console Version 2.1 Revised: June 29, 2006 Contents 1. Introduction and Roadmap Document Scope and Audience.............................................

More information

ForeScout Extended Module for Tenable Vulnerability Management

ForeScout Extended Module for Tenable Vulnerability Management ForeScout Extended Module for Tenable Vulnerability Management Version 2.7.1 Table of Contents About Tenable Vulnerability Management Module... 4 Compatible Tenable Vulnerability Products... 4 About Support

More information