Administration Guide

Similar documents
User Management in Resource Manager

User Guide Version 2.0 December 2015

SafeConsole On-Prem Install Guide. version DataLocker Inc. July, SafeConsole. Reference for SafeConsole OnPrem

Sophos Mobile. super administrator guide. Product Version: 8

Sophos Mobile super administrator guide. Product version: 7.1

Migrating from IBM Lotus Domino to Zimbra Collaboration Suite

Sophos Mobile. super administrator guide. product version: 8.6

OpenDrive Wordpress Plugin Guide

FAQ. General Information: Online Support:

Sophos UTM Web Application Firewall For: Microsoft Exchange Services

Nextiva Drive The Setup Process Mobility & Storage Option

Ekran System v.6.0 Privileged User Accounts and Sessions (PASM)

DV3110 Group Setup. Setting up new user groups and assigning users and assets to the newly created group.

User Guide. BlackBerry Workspaces for Windows. Version 5.5

User s Guide Version 4.0 August 2010

Vyapin Office 365 Management Suite

VMware Skyline Collector Installation and Configuration Guide. VMware Skyline 1.4

SafeConsole On-Prem Install Guide

User Manual. ARK for SharePoint-2007

Barracuda NextGen Report Creator

Comodo SecureBox Management Console Software Version 1.9

VMware Workspace ONE UEM VMware AirWatch Cloud Connector

VMware AirWatch Cloud Connector Guide ACC Installation and Integration

Certificate Management

owncloud Android App Manual

Setting Up Resources in VMware Identity Manager. VMware Identity Manager 2.8

Setting Up Resources in VMware Identity Manager (On Premises) Modified on 30 AUG 2017 VMware AirWatch 9.1.1

This documentation is for clean installations with no prior Panopto software installed. For upgrade instructions, please see Upgrade to Panopto 4.6.

Syncplicity Panorama with Isilon Storage. Technote

CLI users are not listed on the Cisco Prime Collaboration User Management page.

CONFIGURING BASIC MACOS MANAGEMENT: VMWARE WORKSPACE ONE OPERATIONAL TUTORIAL VMware Workspace ONE

CDP Data Center Console User Guide CDP Data Center Console User Guide Version

Ciphermail Webmail Messenger Administration Guide

User Manual. Dockit SharePoint Manager

FileCruiser. Administrator Portal Guide

Getting Started with Soonr

Setting Up Resources in VMware Identity Manager

VMware Identity Manager Administration

Azure MFA Integration with NetScaler

Transport Gateway Installation / Registration / Configuration

NTP Software VFM. Administration Web Site for EMC Atmos User Manual. Version 6.1

Perceptive Process Mining

Colligo Engage Console. User Guide

SafeConsole On-Prem Install Guide

User s Guide Version 4.2 March 2012

This option lets you reset the password that you use to log in if you do not remember it. To change the password,

NTP Software VFM Administration Web Site

Workspace ONE UEM Certificate Authentication for Cisco IPSec VPN. VMware Workspace ONE UEM 1810

VMware AirWatch System Settings Reference Manual for On-Premises Customers A comprehensive listing of AirWatch system settings. AirWatch v9.

AUGUST CommPortal GUIDE

VMWARE HORIZON CLOUD WITH VMWARE IDENTITY MANAGER QUICK START GUIDE WHITE PAPER MARCH 2018

Authorized Send Installation and Configuration Guide Version 3.5

SIMSme Management Cockpit Documentation

GOBENCH IQ Release v

Installing and Configuring VMware Identity Manager Connector (Windows) OCT 2018 VMware Identity Manager VMware Identity Manager 3.

Sophos Mobile. super administrator guide. product version: 9

Configure Settings and Customize Notifications on FindIT Network Probe

MAILGUARD AND MICROSOFT EXCHANGE 2013

Sophos Mobile. startup guide. Product Version: 8.1

BrainCert Enterprise LMS. Learning Management System (LMS) documentation Administrator Guide Version 3.0

METADATA FRAMEWORK 6.3. and High Availability

PeoplePassword Documentation v6.0

High Availability Enabling SSL Database Migration Auto Backup and Auto Update Mail Server and Proxy Settings Support...

Dynamics CRM Integration for Gmail. User Manual. Akvelon, Inc. 2017, All rights reserved

G.S.I Controller Web Application. Administrator Guide

271 Waverley Oaks Rd. Telephone: Suite 206 Waltham, MA USA

BEST PRACTICES ARCHIVE in contentaccess

VMware Skyline Collector Installation and Configuration Guide. VMware Skyline Collector 2.0

MailEnable Connector for Microsoft Outlook

Getting Started Guide moduscloud

User Guide. Version R92. English

User Manual. SharePoint Farm Reporter

akkadian Global Directory 3.0 System Administration Guide

Storgrid web client manual

USER MANUAL. SalesPort Salesforce Customer Portal for WordPress (Lightning Mode) TABLE OF CONTENTS. Version: 3.1.0

VMware Identity Manager Connector Installation and Configuration (Legacy Mode)

Realms and Identity Policies

User Documentation. Administrator Manual.

VMware AirWatch Content Gateway for Windows. VMware Workspace ONE UEM 1811 Unified Access Gateway

VMware AirWatch Certificate Authentication for EAS with ADCS

Sugar Corporate 6.4 Administration Guide

Appliance Installation Guide

Demonstration Instructions


VMware AirWatch Certificate Authentication for Cisco IPSec VPN

Coca-Cola NIBs. Self-Service Solution

Remote Support Security Provider Integration: RADIUS Server

EasiShare ios User Guide

Directory Integration with VMware Identity Manager

Digital Analytics Installation and Configuration Guide

Add OKTA as an Identity Provider in EAA

BlackBerry Workspaces Server Administration Guide

QuickStart Guide for Mobile Device Management. Version 8.7

User Management Tool

Configuration. Guides on how to configure BarWeb hosted accounts. Exchange Accounts. Outlook Windows. Outlook Windows

CLOUD MAIL Administrator User Guide. (Version 1.0)

WebAdmin IceWarp WebAdmin Manual

User Guide. Version R94. English

MITEL. Live Content Suite. Mitel Live Content Suite Installation and Administrator Guide Release 1.1

VMware Skyline Collector User Guide. VMware Skyline 1.4

Transcription:

Administration Guide Version 2.0 November, 2015 Biscom, Inc. 321 Billerica Rd. Chelmsford, MA 01824 tel 978-250-1800 fax 978-250-4449

CONTENTS 1. Initial Configuration and Settings...1 1.1 Application... 1 1.2 Email... 1 1.3 Mobile... 2 1.4 Encryption... 2 1.5 recapthcha Image Verification Settings... 2 1.6 File version Retention (Advanced OR EnTERPRISE edition ONLY)... 2 1.7 Proxy Server... 2 1.8 AD Authentication... 2 1.8.1 Role Mapping... 3 1.8.2 Attributes... 3 1.9 Password... 3 1.10 Auto Unlocking User Account... 3 1.11 Web Interface appearance... 4 1.12 Set custom Logo... 4 1.13 Space Usage... 4 1.13.1 Define storage capacity... 4 1.13.2 Add Storage Location... 4 2. Managing Users...4 2.1 Creating Users... 5 2.2 Password reset... 5 3. Live Analytics...6 3.1 Dashboard... 6 3.1.1 System status... 6 3.1.2 Storage utilization... 6 3.1.3 files transferred... 7 3.1.4 data transferred... 8 3.1.5 Recent web logins... 8 3.1.6 recent active clients... 9 3.1.7 transfers in progress... 9 4. Monitoring usage... 10

4.1 User Activity... 10 4.2 Space Used Per User... 10 4.3 Sent Links... 10 5. System Monitoring and Maintenance... 11 5.1 Overall System Space usage... 11 5.2 System activity and configuration changes... 11 5.3 Email notifications... 11 5.4 Run Clean up... 11 6. Server Information and Licensing... 12 6.1 Server and License Information... 12 6.2 License usage... 12

1. INITIAL CONFIGURATION AND SETTINGS To view or configure general settings, sign into Verosync, click System Settings > General Settings in the left-hand sidebar. The following sections describe what settings can be changed and where those can be configured. 1.1 APPLICATION To set administration email, quota enforcement and Terms Of Service URL, click System Settings > General Settings > Application. Administrator email: Enter the email address where notifications such as server status and user lock-outs are sent. Enforce quota: Choose whether to enforce space quota for all users, click the checkbox, and enter a value in Default space quota (MB) field. Always require login for sent links: Choose whether recipients must login to access links sent by your users. Terms of service URL: Enter URL that directs to the Terms of Service. 1.2 EMAIL To configure settings related to emails sent from the system, click System Settings > General Settings > Email. Outbound SMTP server: Enter the outbound SMTP server that will be used for notification and mail delivery. Enter the appropriate Username and Password credentials, if necessary. Set Port (Default: 25), Encrypted Connection (Default: None) and Notification link protocol (HTTPS). You may test the above settings by clicking Test Email Setting. A dialogue box will appear indicating the email address to which the test email will be sent. 1

1.3 MOBILE To require MobileIron integration, click System Settings > General Settings > Mobile. When checked, Verosync s mobile app is required to read MobileIron preferences. 1.4 ENCRYPTION To encrypt the backend file system for Verosync, click System Settings > General Settings > Encryption and select Enable encryption. (By default, encryption is enabled.) 1.5 RECAPTHCHA IMAGE VERIFICATION SETTINGS To enable recaptcha, click System Settings > General Settings > recaptcha Image Verification Settings, check the Enable recaptcha box, and enter relevant public and private keys. 1.6 FILE VERSION RETENTION (ADVANCED OR ENTERPRISE EDITION ONLY) To configure settings related to file version retention, Click System Settings > General Settings > File Version Retention. Enter the desired level of retention. If multiple retention rules are enabled, the most restrictive rule will be applied. 1.7 PROXY SERVER To configure setting related to a proxy server, click System Settings > General Settings > Proxy Server, click Use proxy server to enable the proxy server, and then enter relevant information for proxy server. 1.8 AD AUTHENTICATION To configure settings related to AD authentication, Click System Settings > General Settings > AD Authentication. If enabling AD authentication, enter the following information: Field Name Host Protocol Port Input Value Required Enter a descriptive name. Specify the hostname or the IP address of the LDAP server, e.g. dc.company.com. Select LDAP or LDAPs. Specify the port number for the LDAP connection. The default non- SSL port number is 389 and the default SSL port number is 636. 2

Account Password Base DN If LDAP does not allow anonymous lookup, specify domain user account that can query LDAP in the form domain\username, e.g. domain\jsmith. If specified account name above, enter password. Specify the root container to search for users, e.g. DC=example,DC=com for Active Directory. User name pattern The default setting is *. 1.8.1 ROLE MAPPING When AD authentication is enabled, the admin can set roles through AD group names. Entries must be group names and delimited by using separate lines. 1.8.2 ATTRIBUTES Configure Login, Name, and Email attributes. Common AD attributes are: Attribute Login* samaccountname sn userprincipalname cn mail Example of Input Value Required John Smith John Smith John Smith Smith, John jsmith@biscom.com 1.9 PASSWORD To define user password requirements, click System Settings > Authentication Settings > Password. Optionally configure the Minimum Length and any Required Characters for end-user passwords. 1.10 AUTO UNLOCKING USER ACCOUNT To configure settings for auto unlocking accounts after failed login attempts, click System Settings > Authentication settings > Auto Unlocking User Account and enter appropriate numbers. 3

1.11 WEB INTERFACE APPEARANCE To configure settings for the Web interface, click System Settings > Customization Settings > Web Interface, and enter the custom page URL s 1.12 SET CUSTOM LOGO To change the logo, click System Settings > Customization Settings > Logo and click Change logo button. 1.13 SPACE USAGE Space usage settings can be found and accessed by clicking Administration > Space Usage on the lefthand sidebar. 1.13.1 DEFINE STORAGE CAPACITY To change storage capacity, click the storage capacity value (A), and change to the desired value. Click the check mark to save your changes. 1.13.2 ADD STORAGE LOCATION To set additional storage and set storage location, on the top right of the Space Usage page click Action > Add storage location (B). Enter location Path and Capacity (GB). 2. MANAGING USERS 4

2.1 CREATING USERS User accounts are automatically created for AD-integrated configurations. Otherwise, end-user accounts can be via Admin Console. From your homepage, in the side-bar, click Administration > Manage users. Click Action > Create new user. In the New User dialogue box, enter details e.g. User Name, email, permissions etc. 2.2 PASSWORD RESET On the Manage Users page, select the user for whom you would like to reset the password. In the popup menu, select Reset Password. Note that this feature only applies to non-ad integrated configurations. 5

3. LIVE ANALYTICS Admins have a live view of the current state of the server through the Verosync dashboard. The Verosync dashboard contains charts, graphs, and lists that track user activities, resource usage, and file transfer transactions. 3.1 DASHBOARD To view the dashboard, click DASHBOARD. 3.1.1 SYSTEM STATUS The System Status section displays status for the following components, with flags displayed in green, yellow, or red depending on the specific status: Disk space the amount of remaining free space on the disk, where Percent is the percentage of total free space that has been used. # License how many licenses have been used, where Percent is the percentage of total licenses used. Email error the number of email errors, where an email error is an unsuccessfully delivered email 3.1.2 STORAGE UTILIZATION The Storage Utilization section displays a pie chart of storage usage, according to the following categories of usage: Personal Files all unshared folders and files Shared Files all shared folders and files Deleted Personal Files all Personal files in the trash can Deleted Shared Files all Shared files in the trash can 6

To toggle-off a segment of the Storage Utilization pie chart, click its name below the chart. To see the percentage of storage utilization for a specific section, hover over the section. 3.1.3 FILES TRANSFERRED The Files Transferred section is a line graph that displays the files being uploaded/downloaded. This is updated second by second, and tracks activity of all users across your system 7

3.1.4 DATA TRANSFERRED The Data Transferred section is a line graph that displays in MB the amount of data being uploaded/downloaded. Like the graph above it shows transfer activities of all users across your system. 3.1.5 RECENT WEB LOGINS The Recent Web Logins section displays a list of recently logged in Web client users. Clicking on Action then Show all will show an extended list of recently logged in Web client users 8

3.1.6 RECENT ACTIVE CLIENTS The Recent Active Clients section displays a list of recently active client users, with a time stamp of their last activity. Hover over a client entry to display the user's IP address and client version. 3.1.7 TRANSFERS IN PROGRESS The Transfers in Progress section displays a list of files currently being uploaded/downloaded. 9

4. MONITORING USAGE 4.1 USER ACTIVITY To view user activity, navigate to the Manage Users page, and click the user whose activity you would like to view. In the popup menu, select Activity. A log of user activities will be displayed. Input filter field, and click Filter, to change filter settings. 4.2 SPACE USED PER USER To view how much space is used by an individual user, click Administration > Space Usage (in the left-hand sidebar). Each user is listed along with the spaced used. 4.3 SENT LINKS To view file and folder sharing activity, click Reports > Sent Links (in the left-hand sidebar). Select either File or Folder report by using the dropdown menu at the top right. 10

5. SYSTEM MONITORING AND MAINTENANCE 5.1 OVERALL SYSTEM SPACE USAGE To view the overall space usage, click Administration > Space Usage. 5.2 SYSTEM ACTIVITY AND CONFIGURATION CHANGES To view a log of overall system activity, click Reports > System Activity. To filter by user, click the down arrow at the top-right. 5.3 EMAIL NOTIFICATIONS To view a log of notifications sent from the server, including file share and account creation status, click Administration > Email Notifications. 5.4 RUN CLEAN UP When users delete files, the files go into the recycle bin directory. The system cleanup process automatically runs every 24 hours and permanently deletes the recycle bin files from the system. To manually run the system cleanup process, click Administration > Cleanup Process > Run cleanup. 11

6. SERVER INFORMATION AND LICENSING 6.1 SERVER AND LICENSE INFORMATION To view server information, click Administration > Server Information. Maximum users displays the number of licenses available. Note that any end user with sync privilege counts against your organization s license. 6.2 LICENSE USAGE To view the number of licenses currently in use and to whom they re allocated, click Reports > License Usage (from left-hand sidebar). Scroll down to the bottom of the page to view a total count. 12