EM L04 Using Workflow to Manage Your Patch Process and Follow CISSP Best Practices
|
|
- John Phillips
- 5 years ago
- Views:
Transcription
1 EM L04 Using Workflow to Manage Your Patch Process and Follow CISSP Best Practices Hands-On Lab Description Most corporations today have some form of patch process in place. In this session, you will learn how to meet industry standards when working with currently released workflows within Patch Management Solution and when applying best practices. You will also learn how to include CISSP best practices with patching. At the end of this lab, you should be able to Use compliance reports to identify which lab machines are out of compliance Learn how bulletins and updates are downloaded to the server. Use the Software Update Policy Wizard to deploy a Patch Understand Patch Policies and were they are located in the system How to configure and install the Zero Day Patch workflow Know what processes should be in place to meet CISSP standards Notes A brief presentation will introduce this lab session and discuss key concepts. The lab will be directed and provide you with step-by-step walkthroughs of key features. Feel free to follow the lab using the instructions on the following pages. You can optionally perform this lab at your own pace. Be sure to ask your instructor any questions you may have. Thank you for coming to our lab session.
2 CISSP Process Infrastructure: This is not just your physical infrastructure but everything to do with allowing the patch process to move forward. This includes who is on the team responsible for patch, what systems they are accountable for, applications they are responsible for, and what process should be followed. Research: Sometimes the wrong patch gets installed to the wrong system and the network gets taken down. Ensuring that the proper patch is installed to the correct systems and that the patch is authentic is critical. Assess and Test: Before installing a patch, testing must be done and a test plan followed. Vendors who release the patches and the patch vendors all claim to do their internal testing and they do. But there is no way possible for them to test the billions of different configuration possibilities so some form of internal testing is required. A perfect example, would be McAfee releasing their update earlier this year which blue screened thousands of systems. Mitigation ( Rollback ): Once the patch has been tested and applied, problems still may occur. The only way to truly roll back any changes is to reset the system state. Uninstalls will still leave files, folders, and/or registry keys behind and most administrators do not want to risk it on servers. Restoring from the previous backup is the best way to return to known good operational state. Deployment ( Rollout ): A phased approach should be taken in deploying patches. This way if something goes wrong, not all systems are affected at once. This is especially true for critical systems. Typically this happens in a pre-determined window such as outside business hours. Validation, Reporting, and Logging: There must be some sort of audit performed to track what has been done. Logs kept, documentation filed, processes followed. Once deployed, a company should be able to verify what patch went out, which machines did get patched, when they were patched, who patched them, and whether they remained patched. Reports are generated for historical and compliance reasons. 2 of 18
3 Working with Patch Managetment This lab works with following processing Patch with Zero Day management Patching Process. The intention is to walk through a simple patch process to ensure we understand what exactly what will happen within the workflow. Once we have seen how to apply a patch manually we should be able to have our workflow identify a critical patch and deploy that to the workstation in an automative way. EXERCISE 1: How to Identify Vulnerable Systems Once the patch and update information has been imported to the Notification Server database, an administrator can use compliance reports to determine which patches and updates are needed in their environment. This information can then be reviewed, and the desired patches can be downloaded and deployed to the managed environment. Use compliance reports to identify which lab machines are out of compliance based upon the data imported earlier. 1. Switch to the NS71 VM 2. Open the Symantec Management Console 3. Navigate to Home Patch Management on the main menu 4. Click on the Compliance by Bulletin link. The Windows Compliance by Bulletin report is displayed in the right-hand pane, and after a short delay, is populated with data. Note that there is a drop-down for Vendor near the top of the report. This can be used to view bulletin information from each available vendor. 5. Click the Compliance column header to sort the column by compliance percentage so that the bulletins with less than 100% compliance appear at the top. 6. To review compliance from a computer perspective, click on the Compliance by Computer link in the left-hand pane. The Windows Compliance by Computer report is displayed in the right-hand pane, and after a short delay, is populated with data. 7. Review the compliance results for each machine. You can use this information to determine how many updates apply to each machine, how many are installed, how many are missing, and whether or not each machine is waiting for a reboot to occur. 8. For this lab, we are going to concentrate on the Win7 Computer. It is at 97.10% compliance. 3 of 18
4 EXERCISE 2: How to Stage and Deliver Relevant Updates Once the patch and update information has been imported to the Notification Server database, and an administrator has reviewed the compliance reports to determine which updates are required by their environment, the administrator needs to stage (or download) the relevant updates. The following covers how bulletins and updates are downloaded to the server. 1. From the Patch Management portal page (Home > Patch Management), click on the 2. Compliance by Computer link 3. Highlight the Win7 virtual machine by clicking on the WIN7 line item 4. With Win7 highlighted, right click on it The right click menu appears 9. Select the View Not Installed Updates link from the resulting menu. Note: You have just created a report that shows a detailed vulnerability analisys for a specifc resource. You also have the ability to view all applicable updates regardless of installation status. 10. Select the Vendor drop down menu and choose Sun Microsystems from the list. 11. Press the Refresh button located on the menu bar. Note: It is by design that the report data does not dynamically refresh with the narrowing of scope. Click the Refresh button above. 4 of 18
5 12. Right click on the JAVA6-37 bulletin and review the menu Note: To download the relevant updates, you would normally select Download Packages from the resulting menu. Download Packages does not appear on the current menu because the updates were downloaded prior to the lab to save time. If you ever want to verify that the files were downloaded properly, or retry a previously failed attempt, click Recreate Packages. Once the patch and update information has been imported to the Notification Server database, the compliance reports are reviewed to determine which patches and updates are required by their environment, and the relevant patches have been downloaded, the administrator can create a Software Update Policy to deploy patches and updates to their environment. The Software Update Policy Wizard will be used to create a policy to distribute the applicable bulletins to the systems within the environment to which they apply. 13. Highlight and right-click JAVA6-37 bulletin and right click and select Distribute Packages. The Software Update Policy Wizard interface is displayed. 5 of 18
6 14. Verify that the bulletin previously selected is listed in the Name and Software Bulletins fields. 15. Expand the Package Options section of the page and verify that the Use multicast when the Symantec Management Agent s multicast option is enabled checkbox is selected. 16. Check the Run (other than agent default) check box, and verify that the As soon as possible radio button is selected. 17. Verify that Windows Computers with Software Update Plug-in Installed Target is listed in the Apply to computers Name column. 18. Click Next. 6 of 18
7 19. Verify that all of the packages are selected, click the Off button in the upper-right corner of the window, and select On (the header should change from red to green). 20. Click Distribute software updates to initiate the Software Update Policy. The Software Update Policy Wizard interface will close, and a new window will appear showing the progress of Creating Software Update Policy will appear. When the policy is finished creating, click Close to close the window. 21. Press Close when this completes 22. Open the Windows Task Scheduler by going to the icon on the task tray or Start > Administrative Tools > Task Scheduler in Windows. 23. Click on the Task Scheduler Library folder in the left-hand pane. 24. In the right-hand pane, find the NS.Windows Patch Remediation Settings task, rightclick on it, and choose Run. Continue to refresh the window until it finishes running. Note: This step is not necessary in a production environment as the task automatically runs every 30 minutes. We are simply executing it manually to speed things up for convenience of the lab. 25. The JAVA update will eventually execute on the Win7 VM during this lab. You can check for the complete update at the end of this lab. 26. Close the Symantec Management Console windows 7 of 18
8 EXERCISE 3: Installation of the Zero-Day Workflow Designed to run on a schedule (e.g. once a day), this process will query the Symantec Patch Management system for new critical bulletins and updates. When applicable updates are found, the process will automatically stage the updates and create an enabled patch policy so that the next time applicable systems check in, the critical updates will be automatically installed on the appropriate resource target(s). The process is designed to be highly extensible and easily configurable using Project Properties. 1. Switch to the NS71 VM 2. Locate the Workflow Manager on the Desktop of the NS71 Server 3. Click File Open and drill down on your machine under C:\Lab Resources\Zero Day Patch\ and select the Zero_Day_Patch_7_1.package and press Open 4. The UnPackage Project box will show up 5. Press OK Once the package has unpacked into the Workflow directory minimize the Workflow Manager. Open Internet Explorer and Browse to: Save it as as a Bookmark or shortcut for use in future steps, as the Process Manager Icon on your desktop does not work. 6. At the login screen login as: UserName: admin@symantec.com Password: password 8 of 18
9 7. Click on Admin Users Accounts List Groups 8. Add a Group and call it Patch Administrators 9. Press Save 10. Now add a user to Patch Administrators group (Press the Orange Arrow on the right) 11. Add the user admin@symantec.com 12. Press Add, then Close 13. Now modify the permissions of the Patch Administrators group 9 of 18
10 14. Locate and find the following objects and select them: a. Account.CompanyAdministration b. AccountManagement.User.FetchInfo c. ProcessData.Access d. ProcessData.Reports e. Reports.Access f. Reports.OLAP.Create g. Reports.ShowInMenu h. WorkflowTasksManagement.Access i. WorkflowTasksManagement.Add j. WorkflowTasksManagement.CanSetupDefaultProfile k. WorkflowTasksManagement.ShowInMenu l. WorkflowTasksManagement.ViewUnassignedTasks 15. Click Save to continue 16. Select Admin Data Lists and Profiles 17. Click on the Import icon top right 18. Select the Browse button and go to C:\Program Files\Symantec\Workflow\WorkflowProjects\Zero_Day_Patch_7_1\resource 19. Select Zero_Day_Patch.pfl 20. Click Import (this may take a little while) 21. Now click on the Reports tab 22. Click on the Imports icon 23. Select Import Reports 24. Select the Browse button and go to C:\Program Files\Symantec\Workflow\WorkflowProjects\Zero_Day_Patch_7_1\resource 25. Select the Zero+Day+Patch.report 26. Select Import 10 of 18
11 27. Once complete click Close You see that the Zero Day Patch report has been imported. Note: the report does not currently contain any detail until after the process successfully runs. 28. Edit the permissions on the report just created. 29. Click the Add New Permission button 30. Select Permission Type: Group and then press the Pick button 31. Type Patch, Press Search, Then select Patch Administrators 11 of 18
12 32. Choose the following permissions (if they are not already set): a. Can View this report b. Can edit this report c. can delete this report d. can modify permissions of this report 33. Click Add 34. Click Close 35. Go back to the Opened Worklow in Workflow Manager 12 of 18
13 36. Select the Properties of the project by selecting the Zero_Day_Patch_7_1 item at the top of the left pane tree and selecting Properties on the tab in the Right hand pane. 37. Locate the Customizations Following are the description for each customization: Symc_CMDB_ConnectionString - Connection string to Symantec_CMDB database. Severity_Levels_To_Analyze - NO SPACES IN BETWEEN ITEMS, JUST A COMMA. Commaseparated list of severity and custom severity level patches to analyze and import into this process (all others will be ignored). Resource_Targets_To_Apply_To_Policy - Comma-separated list of resource targets (NOT filters) that the zero-day patch policy will be applied to (in addition to the default resource target as specified in the SMP). Age_Filter - Number of time units (defined by Age_Time_Unit) of bulletins to import into the process (based on bulletin released date). e.g. set this to 1 and Age_Time_Unit to dd if your process runs once a day. Age_Time_Unit - This defines the unit of time for Age_Filter. Use hh for hours, dd for days, mm for months, and yy for years. Platform_Filter - You can restrict what bulletins are imported into the process by a single platform (e.g. "Windows" or "Linux"), or "Any" will not filter by platform. 13 of 18
14 Vendor_Filter - You can restrict what bulletins are imported into the process by a single vendor GUID (e.g. Microsoft's GUID or Adobe's GUID), or " " will not filter by vendor. Ignore_Staged_Bulletins - "True" will ignore any bulletins that have already been staged prior to the process running. If set to "False", bulletins that are already staged will still be processed. Ignore_Bulletins_With_Policies - "True" will ignore any bulletins that already have an associated policy prior to the process running. If set to "False", bulletins that already have a policy will still be processed. PatchWorkflowSvcURL - URL to Patch Management webservice API (typically on SMP server). Enable_New_Policy_After_Creation - Set to "True" to immediately enable the new policy. Set to "False" to manually enable the new policy at a later time. _From_Address - The "from" address. _To_Address - The "to" address. _Server - The name or IP address of the relay SMTP server. Report_URL - The URL to this process' report in Process Manager. 38. Modify the following Variables to the appropriate settings: a. Resource_Targets_To_Apply_To_Policy: a7-86f3-4edc c8d0 NOTE that this is the GUID of the WIN7 machine in your environment, this could also have been the GUID of a Filter) b. _To_Address: catchall@symplified.org c. Severity_Levels_to_Analyze: Critical,Important (enter this without Spaces) 39. Now select File and then Check In Project 14 of 18
15 40. Click Yes 41. Drill down on the NS71.symplified.org folder 42. Select Projects and click Create 43. Once complete you ll see the following success screen, click OK 15 of 18
16 44. Now click File Publish Project Publish Project 45. Select Only SD7 and click Next 46. Ensure the changes you made to the variables are in place, if not retype them, then click Next 47. Before the publishing begins review your changes for correctness and then click Next 16 of 18
17 48. You see the publishing screen, once that is complete you ll see the following screen. 49. Once publishing is successful, click finish and save and close your project. Exercise 5: Checking for Policies and Applied Patches 1. Switch to the Win7 virtual machine. 2. Right-click the Symantec Management Agent in the system tray, and select Symantec Management Agent Settings. The Symantec Management Agent Settings interface is displayed. 3. Click Update and verify that both the Requested and Changed timestamps update. This indicates that the agent received the new Software Update Policy. Note: The Configuration Update would have occurred automatically at the next scheduled time, and thus this step is not required. Manually updating the configuration, however, allows us to move quickly through the lab. 4. Close the Symantec Management Agent Settings interface. 5. Right-click the Symantec Management Agent in the system tray, and select Software Updates. The Symantec Management Agent interface is displayed, 6. Select the Software Updates tab. You should see a list of pending updates. The status of each update will eventually change to Update Scheduled as soon as the relevant files finish downloading to the machine. Since this is a Lab without Internet Access, the files will never download. 7. After a few minutes, a message will appear saying New software updates ready to apply. Click Install now to begin the update cycle. Note: This message only appears for 60 seconds before automatically proceeding. 8. The updates will eventually change from Update Scheduled to Installed with green checkmark to indicate that they were successfully installed. 17 of 18
18 Note: If any updates require a reboot, a reboot interface will be displayed as soon as the last update installs. The user will be able to delay the notification for 5 minutes, and a reboot will be forced after 20 minutes. 9. After the updates are installed you can double-click the Symantec Management Agent icon in the task bar. Once the agent window appears, select the Software Delivery tab, click the Windows System Assessment Scan policy, and then click the Windows System Assessment task in the left-hand pane of the window. This manually runs the assessment scan which will update the compliance information for the machine. As the scan is running, there will be a white bubble with a blue I in it under the Status column indicating that it s running. Note: This scan is scheduled to run every 4 hours by default and would have run on its own. We are simply speeding things up for convenience of the lab. 10. Once the process is complete, you would return to the Compliance by Computer report and see that the Win7 virtual machine is now 100% in compliance. EXERCISE 6: Checking Your Workflow (Informational) 1. Switch to the NS71 virtual machine. 2. First start the Symantec Management Console 3. Click on Manage Policies 4. Drill down to Software Patch Management Software Update Policies 5. Note that a MS policy should be created. 6. If this policy is not created then we should check our workflow Click on Start All Programs Symantec Workflow Designer Tools and then start Log Viewer 7. Click on Current Running Processes and locate the Patch Workflow, it should be running 8. When you see it, click on it once and then select Configure Logging on the right 9. Click OK to log All 10. Select the Log Viewer and select Refresh at the bottom of the page and watch the results. 11. Further problem solving can be done by opening the project again and selecting to run the project in debug mode This concludes this lab today, we hope that you have discovered some new features and methods for accomplishing your patch process within your organization. 18 of 18
EM L23 - Implementing Client and Server Management with Site Services Hands-On Lab
EM L23 - Implementing Client and Server Management with Site Services Hands-On Lab Description If you are new to the Symantec Management Technologies or are just looking to reinforce your existing knowledge
More informationIC L19 - Consolidate Information from across your Infrastructure to create a custom report for PCI DSS Hands-On Lab
IC L19 - Consolidate Information from across your Infrastructure to create a custom report for PCI DSS Hands-On Lab Description How to implement external data connectors for data relevant to PCI and map
More informationIS L02-MIGRATING TO SEP 12.1
IS L02-MIGRATING TO SEP 12.1 Description Migrating to Symantec Endpoint Protection (SEP)? Want to upgrade to the latest SEP technology? In this Lab, see how to upgrade a multi-site Symantec Endpoint Protection
More informationUP L12: Still on SEP 11? Let us show you how to simplify migration to SEP.
UP L12: Still on SEP 11? Let us show you how to simplify migration to SEP. Description Migrating to Symantec Endpoint Protection (SEP)? Want to upgrade to the latest SEP technology? In this Lab, see how
More informationNetBackup 7.6 Replication Director A Hands On Experience
NetBackup 7.6 Replication Director A Hands On Experience Description Through this hands on lab you can test drive Replication Director and experience for yourself this easy to use, powerful feature. Once
More informationXton Access Manager GETTING STARTED GUIDE
Xton Access Manager GETTING STARTED GUIDE XTON TECHNOLOGIES, LLC PHILADELPHIA Copyright 2017. Xton Technologies LLC. Contents Introduction... 2 Technical Support... 2 What is Xton Access Manager?... 3
More informationEML10 Best Practces for Implementing Deployment Solution Hands-On Lab
EML10 Best Practces for Implementing Deployment Solution Hands-On Lab Description This hands-on lab demonstrates the steps necessary to configure and use the latest version of Deployment Solution. You
More informationInstallation Guide. 3CX CRM Plugin for ConnectWise. Single Tenant Version
Installation Guide 3CX CRM Plugin for ConnectWise Single Tenant Version "Copyright VoIPTools, LLC 2011-2016" Information in this document is subject to change without notice. No part of this document may
More informationUP L11 Using IT Analytics as an Alternative Reporting Platform Hands-On Lab
UP L11 Using IT Analytics as an Alternative Reporting Platform Hands-On Lab Description IT Analytics has a diverse and powerful way of displaying data to your users. In this lab, you will learn how to
More informationIntroduction to Cognos
Introduction to Cognos User Handbook 7800 E Orchard Road, Suite 280 Greenwood Village, CO 80111 Table of Contents... 3 Logging In To the Portal... 3 Understanding IBM Cognos Connection... 4 The IBM Cognos
More informationUser Guide. Version R92. English
AuthAnvil User Guide Version R92 English October 9, 2015 Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept EULATOS as updated from
More informationForeScout Extended Module for Qualys VM
ForeScout Extended Module for Qualys VM Version 1.2.1 Table of Contents About the Qualys VM Integration... 3 Additional Qualys VM Documentation... 3 About This Module... 3 Components... 4 Considerations...
More informationIA L16 - Hands-On Lab Hands on with Instant Backup and Recovery Features of NetBackup 7.6 for VMware
IA L16 - Hands-On Lab Hands on with Instant Backup and Recovery Features of NetBackup 7.6 for VMware Description NetBackup 7.6 offers terrific new technologies that provide faster VMware backups and restores
More informationIT Essentials v6.0 Windows 10 Software Labs
IT Essentials v6.0 Windows 10 Software Labs 5.2.1.7 Install Windows 10... 1 5.2.1.10 Check for Updates in Windows 10... 10 5.2.4.7 Create a Partition in Windows 10... 16 6.1.1.5 Task Manager in Windows
More informationDocAve Content Shield v2.2 for SharePoint
DocAve Content Shield v2.2 for SharePoint User Guide For SharePoint 2007 Revision A Issued August 2012 1 Table of Contents Table of Contents... 2 About DocAve Content Shield for SharePoint... 4 Complementary
More informationUPL02 Implementing Cloud Enabled Management Hands-On Lab
UPL02 Implementing Cloud Enabled Management Hands-On Lab Description At the end of this lab, you should be able to Cloud-enabled Management lets you manage endpoints over the Internet even if the client
More informationSymantec Patch Management Solution for Windows 8.5 powered by Altiris technology User Guide
Symantec Patch Management Solution for Windows 8.5 powered by Altiris technology User Guide Symantec Patch Management Solution for Windows 8.5 powered by Altiris technology User Guide Documentation version:
More informationIC121-End-to-End Virtual Security Hands-On Lab
IC121-End-to-End Virtual Security Hands-On Lab Description Many of us fear zero day exploits especially if they could impact our dynamic virtual systems. Learn how you can leverage CCS VSM to quickly lock
More informationSecure Web Appliance. Basic Usage Guide
Secure Web Appliance Basic Usage Guide Table of Contents 1. Introduction... 1 1.1. About CYAN Secure Web Appliance... 1 1.2. About this Manual... 1 1.2.1. Document Conventions... 1 2. Description of the
More informationAnchor User Guide. Presented by: Last Revised: August 07, 2017
Anchor User Guide Presented by: Last Revised: August 07, 2017 TABLE OF CONTENTS GETTING STARTED... 1 How to Log In to the Web Portal... 1 How to Manage Account Settings... 2 How to Configure Two-Step Authentication...
More informationAgent and Agent Browser. Updated Friday, January 26, Autotask Corporation
Agent and Agent Browser Updated Friday, January 26, 2018 2018 Autotask Corporation Table of Contents Table of Contents 2 The AEM Agent and Agent Browser 3 AEM Agent 5 Privacy Mode 9 Agent Browser 11 Agent
More informationExamPrepAway. Latest Exam Guide & Learning Materials
ExamPrepAway http://www.examprepaway.com/ Latest Exam Guide & Learning Materials Exam : ST0-236 Title : Altiris Client Management Suite 7.1 / 7.x Technical Assessment Vendor : Symantec Version : DEMO Get
More informationAdministrator Quick Guide
1 Administrator Quick Guide Login Screen The first page employees will see when visiting their training site is the login screen. This is where employees must enter their username and password to access
More informationSM L04 Veritas Operations Manager Advanced 4.0 RU1: Optimize Your Heterogeneous Storage Environment Hands-On Lab Description
SM L04 Veritas Operations Manager Advanced 4.0 RU1: Optimize Your Heterogeneous Storage Environment Hands-On Lab Description Veritas Operations Manager Advanced (VOM Advanced) is a comprehensive discovery
More informationUser Guide. Version R94. English
AuthAnvil User Guide Version R94 English March 8, 2017 Copyright Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept EULATOS as updated
More informationModular Object Scanning Technology (MOST)
Modular Object Scanning Technology (MOST) 12/28/2009 The Perfect Scanning Solution MOST 1 Table of Contents Introduction... 4 What is MOST?... 4 System Requirements... 4 Hardware Requirements... 4 About
More informationZENworks 2017 Audit Management Reference. December 2016
ZENworks 2017 Audit Management Reference December 2016 Legal Notice For information about legal notices, trademarks, disclaimers, warranties, export and other use restrictions, U.S. Government rights,
More informationDSS User Guide. End User Guide. - i -
DSS User Guide End User Guide - i - DSS User Guide Table of Contents End User Guide... 1 Table of Contents... 2 Part 1: Getting Started... 1 How to Log in to the Web Portal... 1 How to Manage Account Settings...
More informationA guide to configure agents for log collection in Log360
A guide to configure agents for log collection in Log360 Contents Introduction... 2 Agent-based log collection... 2 When can you go for agent-based log collection?... 2 Architecture of agent-based log
More informationDocAve Content Shield v2.2 for SharePoint
DocAve Content Shield v2.2 for SharePoint User Guide For SharePoint 2010 Revision A Issued August 2012 1 Table of Contents Table of Contents... 2 About DocAve Content Shield for SharePoint... 4 Complementary
More informationDetector Service Delivery System (SDS) Version 3.0
Detector Service Delivery System (SDS) Version 3.0 Detecting and Responding to IT Security Policy Violations Quick Start Guide 2018 RapidFire Tools, Inc. All rights reserved. V20180112 Contents Overview
More informationOverview. Borland VisiBroker 7.0
Overview Borland VisiBroker 7.0 Borland Software Corporation 20450 Stevens Creek Blvd., Suite 800 Cupertino, CA 95014 USA www.borland.com Refer to the file deploy.html for a complete list of files that
More informationWindows Intune Trial Guide Getting the most from your Windows Intune trial. Simplify PC management. Amplify productivity.
Windows Intune Trial Guide Getting the most from your Windows Intune trial. Simplify PC management. Amplify productivity. CONTENTS 2 Overview 2 Trial Setup 3 Getting Started with the Administration Console
More informationFaxFinder Fax Servers
FaxFinder Fax Servers Models: FF130 FF230 FF430 FF830 Client User Guide FaxFinder Client User Guide Fax Client Software for FaxFinder Series PN S000460B, Version B Copyright This publication may not be
More informationRead the following information carefully, before you begin an upgrade.
Read the following information carefully, before you begin an upgrade. Review Supported Upgrade Paths, page 1 Review Time Taken for Upgrade, page 1 Review Available Cisco APIC-EM Ports, page 2 Securing
More informationNETWRIX GROUP POLICY CHANGE REPORTER
NETWRIX GROUP POLICY CHANGE REPORTER ADMINISTRATOR S GUIDE Product Version: 7.2 November 2012. Legal Notice The information in this publication is furnished for information use only, and does not constitute
More informationSR L09 - Messaging Gateway, Encryption and Data Loss Prevention: Three Great Things Even Better Together Hands-On Lab
SR L09 - Messaging Gateway, Encryption and Data Loss Prevention: Three Great Things Even Better Together Hands-On Lab Description The messaging gateway has emerged as a key point of control for managing
More informationPartner Integration Portal (PIP) Installation Guide
Partner Integration Portal (PIP) Installation Guide Last Update: 12/3/13 Digital Gateway, Inc. All rights reserved Page 1 TABLE OF CONTENTS INSTALLING PARTNER INTEGRATION PORTAL (PIP)... 3 DOWNLOADING
More informationLab - Share Resources in Windows
Introduction In this lab, you will create and share a folder, set permissions for the shares, create a Homegroup and a Workgroup to share resources, and map a network drive. Due to Windows Vista lack of
More informationGetting Started A GUIDE FOR TEAM MEMBERS
Getting Started A GUIDE FOR TEAM MEMBERS What is CxAlloy Total Quality? 1 User Expectations 1 Your Account 1 Accessing the Site 2 Navigating CxAlloy TQ 2 Updating Issues 4 Uploading Files 5 Completing
More informationInstalling and Configuring Worldox/Web Mobile
Installing and Configuring Worldox/Web Mobile SETUP GUIDE v 1.1 Revised 6/16/2009 REVISION HISTORY Version Date Author Description 1.0 10/20/2008 Michael Devito Revised and expanded original draft document.
More informationForeScout Extended Module for Tenable Vulnerability Management
ForeScout Extended Module for Tenable Vulnerability Management Version 2.7.1 Table of Contents About Tenable Vulnerability Management Module... 4 Compatible Tenable Vulnerability Products... 4 About Support
More informationConfiguring Client Posture Policies
CHAPTER 19 This chapter describes the posture service in the Cisco Identity Services Engine (Cisco ISE) appliance that allows you to check the state (posture) for all the endpoints that are connecting
More informationIC L17 Strategic Understanding using Symantec Protection Center Hands-On Lab
IC L17 Strategic Understanding using Symantec Protection Center Hands-On Lab Description In this session, the attendee will have the opportunity to install SPC Enterprise, configure external data connections,
More informationNetwrix Auditor for Active Directory
Netwrix Auditor for Active Directory Quick-Start Guide Version: 8.0 4/22/2016 Legal Notice The information in this publication is furnished for information use only, and does not constitute a commitment
More informationIBM WebSphere Lombardi Edition 7.2 Business Process Management Workshop
IBM IBM WebSphere Lombardi Edition 7.2 Business Process Management Workshop Lab Exercises Contents LAB 1 BUILD-FROM-SCRATCH LAB - PART 1... 4 1.1 START LOMBARDI AUTHORING ENVIRONMENT... 4 1.1.1 START THE
More informationPerforming Administrative Tasks
CHAPTER 6 This section provides information about administrative tasks. It includes these topics: Stopping and Restarting the Cisco License Manager Server, page 6-1 How to Manage Users, page 6-2 Working
More informationKaseya 2. User Guide. for VSA 6.0
Kaseya 2 Patch Management User Guide for VSA 6.0 July 19, 2010 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private Sector IT organizations.
More informationIBM Security SiteProtector System User Guide for Security Analysts
IBM Security IBM Security SiteProtector System User Guide for Security Analysts Version 2.9 Note Before using this information and the product it supports, read the information in Notices on page 83. This
More informationQuick Start Guide. Kaseya 2
LiveConnect Quick Start Guide Kaseya 2 February 13, 2010 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private Sector IT organizations. Kaseya's
More informationROCK-POND REPORTING 2.1
ROCK-POND REPORTING 2.1 Installation and Setup Guide Revised on 09/25/2014 TABLE OF CONTENTS ROCK-POND REPORTING 2.1... 1 SUPPORT FROM ROCK-POND SOLUTIONS... 2 ROCK-POND REPORTING OVERVIEW... 2 INFRASTRUCTURE
More informationServer Installation. Parent page: System Installation, Licensing & Management
Published on Online Documentation for Altium Products (https://www.altium.com/documentation) ホーム > Altium Infrastructure Server 製品マニュアル Modified by Rob Evans on Feb 20, 2018 Parent page: System Installation,
More informationWe start by providing you with an overview of the key feature of the IBM BPM Process Portal.
Lab 1 Process Portal 1.1 Overview This lab exercise will make you familiar with the key capabilities of the ready-to-use Process Portal included with IBM Business Process Manager (BPM). You will experience
More informationUP L13: Leveraging the full protection of SEP 12.1.x
UP L13: Leveraging the full protection of SEP 12.1.x Hands on lab Description In this hands on lab you will learn about the different protection technologies bundled in SEP 12.1.x and see how they complement
More informationSync User Guide. Powered by Axient Anchor
Sync Powered by Axient Anchor TABLE OF CONTENTS End... Error! Bookmark not defined. Last Revised: Wednesday, October 10, 2018... Error! Bookmark not defined. Table of Contents... 2 Getting Started... 7
More informationInformation Security Office. Information Security Server Vulnerability Management Standards
Information Security Office Information Security Server Vulnerability Management Standards Revision History Revision Date Revised By Summary of Revisions Section(s) / Page(s) Revised 6/1/2013 S. Gucwa
More informationCalendar & Buttons Dashboard Menu Features My Profile My Favorites Watch List Adding a New Request...
remitview User Guide 1 TABLE OF CONTENTS INTRODUCTION... 3 Calendar & Buttons... 3 GETTING STARTED.... 5 Dashboard.... 7 Menu Features... 8 PROFILE.... 10 My Profile... 10 My Favorites... 12 Watch List...
More informationPatch Management using Dell Management Console v1.0
Patch Management using Dell Management Console v1.0 Dell Technical White Paper By Abhijit Pathak Dell Product Group - Enterprise Revision History Version Date Description Author(s) 1.0 13 April 2009 First
More informationAzure for On-Premises Administrators Practice Exercises
Azure for On-Premises Administrators Practice Exercises Overview This course includes optional practical exercises where you can try out the techniques demonstrated in the course for yourself. This guide
More informationBuild the application using Rational Build Forge
Build the application using Rational Build Forge In this lab, as the Build Engineer, you will run a formal build of Release 2.0 of the RatlBankWeb application. After the build completes, you will be able
More informationTenable for McAfee epolicy Orchestrator
How-To Guide Tenable for McAfee epolicy Orchestrator Introduction This document describes how to deploy Tenable SecurityCenter for integration with McAfee epolicy Orchestrator (epo). Please email any comments
More informationIntro to Workflow Part One (Configuration Lab)
Intro to Workflow Part One (Configuration Lab) Hyland Software, Inc. 28500 Clemens Road Westlake, Ohio 44145 Training.OnBase.com 1 Table of Contents OnBase Studio & Workflow... 2 Log into OnBase Studio...
More informationGETTING STARTED GUIDE
SETUP GETTING STARTED GUIDE About Benchmark Email Helping you turn your email list into relationships and sales. Your email list is your most valuable marketing asset. Benchmark Email helps marketers short
More informationTable Of Contents INTRODUCTION... 6 USER GUIDE Software Installation Installing MSI-based Applications for Users...9
Table Of Contents INTRODUCTION... 6 USER GUIDE... 8 Software Installation... 8 Installing MSI-based Applications for Users...9 Installing EXE-based Applications for Users...10 Installing MSI-based Applications
More informationNew Finance Officer & Staff Training
New Finance Officer & Staff Training Overview MUNIS includes many programs and tools to allow for the management of the District financials. As newer finance officers and staff, you are charged with understanding,
More informationZENworks 2017 Update 3 System Updates Reference. August 2018
ZENworks 2017 Update 3 System Updates Reference August 2018 Legal Notices For information about legal notices, trademarks, disclaimers, warranties, export and other use restrictions, U.S. Government rights,
More informationBLUEPRINT TEAM REPOSITORY. For Requirements Center & Requirements Center Test Definition
BLUEPRINT TEAM REPOSITORY Installation Guide for Windows For Requirements Center & Requirements Center Test Definition Table Of Contents Contents Table of Contents Getting Started... 3 About the Blueprint
More informationPCI Compliance Assessment Module
User Guide PCI Compliance Assessment Module Instructions to Perform a PCI Compliance Assessment V20180316 Network Detective PCI Compliance Module without Inspector User Guide Contents About the Network
More informationIvanti Patch for Windows Servers. Quick Start Guide
Ivanti Patch for Windows Servers Quick Start Guide Copyright and Trademarks Copyright and Trademarks This document contains the confidential information and/or proprietary property of Ivanti, Inc. and
More informationALTIRIS. Inventory Solution for Network Devices 6.0 SP2 Help
ALTIRIS Inventory Solution for Network Devices 6.0 SP2 Help Notice Inventory Solution 6.0 for Network Devices Product Guide 2001-2005 Altiris, Inc. All rights reserved. Document Date: January 17, 2007
More informationMcAfee VirusScan and McAfee epolicy Orchestrator Administration Course
McAfee VirusScan and McAfee epolicy Orchestrator Administration Course Education Services administration course training The McAfee VirusScan Enterprise and McAfee epolicy Orchestrator (McAfee epo ) Administration
More informationGRS Enterprise Synchronization Tool
GRS Enterprise Synchronization Tool Last Revised: Thursday, April 05, 2018 Page i TABLE OF CONTENTS Anchor End User Guide... Error! Bookmark not defined. Last Revised: Monday, March 12, 2018... 1 Table
More informationWavelink Avalanche Site Edition Java Console User Guide. Version 5.3
Wavelink Avalanche Site Edition Java Console User Guide Version 5.3 Revised 04/05/2012 ii Copyright 2012 by Wavelink Corporation. All rights reserved. Wavelink Corporation 10808 South River Front Parkway,
More informationManaging System Administration Settings
This chapter contains the following sections: Setting up the Outgoing Mail Server, page 2 Working with Email Templates, page 2 Configuring System Parameters (Optional), page 5 Updating the License, page
More informationDemo KACE K1000 System Management Appliance
Demo KACE K1000 System Management Appliance Quick Start Guide Product Domain: Cloud Client Computing Author: Dan Coleman Version: 1.01 Table of Contents 1 Product Overview... 3 1.1 Lab Preparation Considerations
More informationLocate your Advanced Tools and Applications
. phpmyadmin is a web-based application used to manage a MySQL database. It is free and open-source software. We have modified phpmyadmin so that it functions without errors on a shared hosting platform.
More informationF5 Azure Cloud Try User Guide. F5 Networks, Inc. Rev. September 2016
F5 Azure Cloud Try User Guide F5 Networks, Inc. Rev. September 2016 Azureinfo@f5.com Table of Contents Introduction... 3 F5 Web Application Firewall Solution, (WAF) Review... 3 Configuring SSO/Pre-authentication
More informationLab 12-1 Lab Kofax Capture Import Connector -- XML
In the following lab instructions, you are going to configure using Kofax Capture Import Connector -- XML (KCIC XML) to import documents into Kofax Capture. An XML file will provide the information for
More information202 Lab Introduction Connecting to the Lab Environment
202 Lab Introduction Connecting to the Lab Environment Objectives During this v7.1 Deployment lab, each student (from the Blue group or Green group) must verify access (and permissions) to their assigned
More informationMaaS360.com. MaaS360 On-Premises. Database Virtual Appliance Setup Guide
MaaS360 On-Premises Database Virtual Appliance Setup Guide Copyright 2014 Fiberlink Communications Corporation. All rights reserved. Information in this document is subject to change without notice. The
More informationActiv! Coaching User Guide
Activ! Coaching User Guide August 31, 2007 Voice Print International, Inc 160 Camino Ruiz, Camarillo, CA 93012-6700 (Voice) 800-200-5430 805-389-5200 (Fax) 805-389-5202 www.vpi-corp.com All information
More informationADMINISTRATOR S GUIDE
ADMINISTRATOR S GUIDE 1 CONTENTS GMETRIX V5.0 SYSTEM REQUIREMENTS... 4 ADMINISTRATOR S GUIDE... 4 UNDERSTANDING THE ADMINISTRATOR S PANEL... 4 VIEWING AND EDITING ACCESS CODES... 7 CREATING GROUPS... 8
More informationAPAR PO06620 Installation Instructions
IBM Corporation APAR PO06620 Installation Instructions IBM Counter Fraud Management 1.5.0.5 IBM Counter Fraud Development 3-31-2017 Table of Contents 1 Fix readme... 1 2 Abstract... 1 3 Contents... 1 4
More informationAkana API Platform: Upgrade Guide
Akana API Platform: Upgrade Guide Version 8.0 to 8.2 Akana API Platform Upgrade Guide Version 8.0 to 8.2 November, 2016 (update v2) Copyright Copyright 2016 Akana, Inc. All rights reserved. Trademarks
More informationWeb Client User Guide
ImageTag, Inc. 2016 Contents Introduction... 2 Logging Into Your KwikTag Client... 3 KwikTag Tabs and Your Landing Page... 4 Drawers Tab Features and Functions... 7 My Lists... 7 The KwikTag Library...
More informationUsing NetShow Commands
CHAPTER 10 Network show (NetShow) commands represent a set of read-only commands. These are primarily, show commands that you can run on devices that are managed in LMS. You can specify the commands that
More informationImageNow Interact for Microsoft SharePoint Installation, Setup, and User Guide
ImageNow Interact for Microsoft SharePoint Installation, Setup, and User Guide Version: 6.6.x Written by: Product Documentation, R&D Date: ImageNow and CaptureNow are registered trademarks of Perceptive
More informationTransport Gateway Installation / Registration / Configuration
CHAPTER 2 Transport Gateway Installation / Registration / Configuration This chapter covers the following areas: Transport Gateway requirements. Security Considerations When Using a Transport Gateway.
More informationMANAGEMENT AND CONFIGURATION MANUAL
MANAGEMENT AND CONFIGURATION MANUAL Table of Contents Overview... 3 SYSTEM REQUIREMENTS... 3 The Administration Console... 3 CHAT DASHBOARD... 4 COMPANY CONFIGS... 4 MANAGE LEARNING... 7 MANAGE TABS...
More informationEndpoint Security. powered by HEAT Software. Patch and Remediation Best Practice Guide. Version 8.5 Update 2
Endpoint Security powered by HEAT Software Patch and Remediation Best Practice Guide Version 8.5 Update 2 Contents Introduction 3 Prepare Patch Infrastructure 5 Discover Assets 7 Install Agents 10 Create
More informationTable of Contents. VMware AirWatch: Technology Partner Integration
Table of Contents Lab Overview - HOL-1857-08-UEM - Workspace ONE UEM - Technology Partner Integration... 2 Lab Guidance... 3 Module 1 - F5 Integration with Workspace ONE UEM (30 min)... 9 Introduction...
More informationAccessing McKesson Radiology 12.3 PACS Remotely Over VPN
Accessing McKesson Radiology 12.3 PACS Remotely Over VPN Web: www.interiorhealth.ca 2 Getting Started Please ensure that your PACS administrator has setup your McKesson account for access to the McKesson
More informationPrint Audit 6. Print Audit 6 Documentation Apr :07. Version: Date:
Print Audit 6 Version: Date: 37 21-Apr-2015 23:07 Table of Contents Browse Documents:..................................................... 3 Database Documentation.................................................
More informationInvestigator Site OC RDC PDF User Guide
Investigator Site OC RDC PDF User Guide Version 1.0 Page 1 of 40 TABLE OF CONTENTS Accessing OC RDC Steps for Access 3 Logging On 4 Change Password 4 Laptop and System Security 5 Change Study 5 Navigating
More informationDeploying a System Center 2012 R2 Configuration Manager Hierarchy
Deploying a System Center 2012 R2 Configuration Manager Hierarchy This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED, OR STATUTORY, AS TO THE INFORMATION
More informationPMP Installation and Networking Instructions
ONTARIO CHIROPRACTIC ASSOCIATION PATIENT MANAGEMENT PROGRAM PUTTING EXPERIENCE INTO PRACTICE PMP Installation and Networking Instructions This document provides: installation instructions for New Users
More informationFollow all of the steps indicated below for each process. Some steps may require IT assistance.
The instructions provided below are for upgrading EnergyCAP Enterprise from Release 6.0 to Release 6.1SP1. The version number of EnergyCAP 6.1 is 6.1.60.xx. (xx will correspond to the current build, and
More informationEnd User Manual. December 2014 V1.0
End User Manual December 2014 V1.0 Contents Getting Started... 4 How to Log into the Web Portal... 5 How to Manage Account Settings... 6 The Web Portal... 8 How to Upload Files in the Web Portal... 9 How
More informationUpgrading an ObserveIT One-Click Installation
Upgrading an ObserveIT One-Click Installation This document was written for ObserveIT Enterprise version 7.6.1. This document uses screenshots and procedures written for Windows Server 2012 R2 and SQL
More informationNetWrix VMware Change Reporter Version 3.0 Enterprise Edition Administrator s Guide
NetWrix VMware Change Reporter Version 3.0 Enterprise Edition Administrator s Guide Table of Contents NetWrix VMware Change Reporter Concepts... 1 Product Editions... 1 How It Works... 2 Deploying Product...
More information