Home
Super User Manual - Information Security Management
Contents
1. Management but you can create and add Pa as many new groups as you require by selecting the Create af Create new target group Import Target Groups new target group function Once you have given your new T a group a name it can be edited in the same way as the existing groups You can add users to a group Target Group Target group name 4 Management by selecting the desired Active target group 4 ves n Target group users si _ Khan group clicking Add and Limit access to these roles None searching for the user you Anonymous Users Compliance check administrator Comoliance check manager wish to add You may instead choose to add a block group of users who share the same role By granting access to a specific role any user who shares that role will be able to view the rules and procedures applicable to the target group SecureAware In the following section it important to remember that if access to rules and procedures is not limited to one or more target group these rules and procedures will be viewable by everyone Access to rules and procedures SR E E 7 To limit user access to the Policy manual s ny A Tr Ii O s wi 08 DO C S A CeL B E gt g amp rules click on the amp Policy Management module icon at the top right of the screen and then open the Show advanced management menu on the left Click on amp Security objects and then sele
2. in the Awareness program policy tests SecureAware To limit access to procedures open the Policy Management module amp and click on the required policy name on the top left of the menu In the same way as for the rules you can now choose which user groups and or roles have access to view that particular procedure AB Q 6 Add an existing procedure Create a new procedure x Allowed software for standard PC X Allowed software for standard PC X Business continuity Network is unavailable phase 1 X Business continuity Network is unavailable phase 1 K Business continuity Office space unavailable phase 2 is M a o a a ua SecureAware Document Manager Using SecureAware s Document Manager module you can upload and index the documents relevant for maintaining you company s IT security standards and you can specify which roles you want to have access to read edit or delete files Open the Document Manager by clicking on the icon at the top right of your screen ows eo Folders Files By fa file doc amp LJ Folder 1 LJ Folder 2 LJ Folder 2a gt Folder 2b Create a new folder by clicking on the icon Give the Parent folder Folder Nama folder a name and if necessary select a Parent folder in which to place your new folder You can edit a folder by clicking on A or delete using 4 You can configure a folder s security settings using the c3 ico
3. links to the Topic Rules Procedures See movie Learn more Malware g amp ss o Passwords e r rules and procedures of your policy Email Usage g S J Internet Usage g S ig o Software rm 2 amp ig set divided Into topics of your Backup amp se G TAE T s choice If you use the default Cryptography g e i Incident Handling g amp IG SecureAware topics your users will have access to education content and films covering these topics What should my users see when they log on If you would rather have your users see another page when they access SecureAware this is easily changed Click on the Configuration icon in the top right corner of the screen and then click on Properties just below Start Page Anna Jones a oy fo o sve tasks BeAware Policy gt Learn security Risk Assessment Compliance Incidents Business Com Plan Compliance Workflow lt Topic Management Topics are used by policy rules procedures awareness programmes and security learning Es Topics Manager Security Learning Sections Target Group Management Manage target groups Target Group Manager Import SecureAware v 2 0 2 Import content from SecureAware v DO foda snaa ui Report Management Configure standard settings for reports General report configuration Start Page Define which page your users shall see first after login Properties My SecureAwa
4. partners Our The Start tab The first tab Start shows shortcuts to education content As soon as you start creating a policy set risk assessment awareness quiz or compliance evaluations the results status of these will be shown here as in the screen below SecureAware La O y N C oe Tasks and Shortcuts iai J Teach me 4 Welcome Lone Forland If Messages Poy Welcome to our IT Security Handbook 06 03 2009 Security Handbook mk Dear Comsague 40 of the users have read Policy 40 of the users have read Rules 20 of the users have read Procedures 20 of the users have read Strategy Our continued business success relies upon our IT systems and our ability to protect the important information stored within them Therefore it s vital that our systems are reliable and that the Risk assessment 2009 information contained is accessible to us Business impact assessment is 14 Risk assessments and only us whenever we need it complete Vulnerability assessment is 0 complete Imagine what could happen if our competitors gained Risk system manager access to our confidential information or strategy plans 12 systems have no Business impact assessment user Or what if we inadvertently published sensitive 12 systems have no vulnerability assessment user information about our customers or partners Our Compliance evaluations customers expect that we take the same amount of a Co
5. 11 Access control SecureAware Mapping standard chapters to rules You can map the standard chapters to rules in the rule library in two ways If you know which rule you want to map to click Add type a part of the name of the rule and click the green arrow You can also use the Smart match search which uses the content of the chapter title to search for rules which could match the chapter Chapter No 11 6 2 Chapter 4 Sensitive system isolation Chapter text Select chapter 11 6 Application and information access control Place after chapter 4 11 6 1 Information access restriction Linked policy items Policy rule Isolating particularly critical user systems X 4 add Add with Smart match Delete You map a rule by clicking on it Mapping to a rule indicates that no matter which of the rule s options are selected in the it security handbook the requirement is complied with If you want to indicate that a certain option must be chosen in order to comply with this requirement fold out the rule and select the necessary options by clicking on them Chapter No 11 6 2 Chapter 4 Sensitive system isolation Chapter text 4 Select chapter 4 11 6 Application and information access control Place after chapter 4 11 6 1 Information access restriction Linked policy items Policy rule Isolating particularly critical user systems X Policy rules found by matching with standard words Compliance with law
6. In addition to SecureAware s predefined roles and those created by a Super User there are three standard roles for the end user menu which can not be changed These are Anonymous users any user not logged on to SecureAware The standard program setting allows these users to view the Learn Security section only but this can be extended amp validated users all users who are logged on to SecureAware either directly or through the AD amp Allusers as the name suggests all users whether logged on or not Management Roles Access to the system management menu can be limited in the same was as for the end user menu The SecureAware management section is the section accessible using the module icons in the top right hand corner of the screen SecureAware My User Preferences and language selection only The role of Super User can not be removed from the list of Risk Assessment Riek assessmant administrator ali roles with access to the management section as this iii would cause a lock out situation in which no one would have access to the SecureAware management functions It is important to remember that even if a user has access to this section of SecureAware in order to carry out tasks for example to run a compliance check he or she must be granted specific access to the individual management function User setup and management Creating a new user To manually create a
7. SecureAware Super User Manual Applies to SecureAware version 3 Document date June 2009 About this document This manual guides a Super User through the key functions required for setting up configuring and managing the SecureAware system Functions covered include Access restriction Document management amp Report configuration O neupart SecureAware Table of content My SECUlEAW are the Start DAE dd WING StAPE a Dairine aaa aioe sdinanieatienadarsdusadosedaetdeandansdguadseadseadeendaandaeededas ThE SINE CONES T DE E decutuuncersmersteeaeusateseteuedaueteus The tab Tasks and Responsibilities a ccc EEEE EEEE OTa NME T Dirar A E E E Whatshould my users See when they OC OM staind saida a r a f User COI SU GELO niacina User ROIS asassiaaiammiatos ving stea step sted alada Tod sing adaga jato EEEE EEEE EEEE EEEE EEEE EEEE EEEE EREEREER EEEE ACCESS FOLES EEEE EEEE eee User setup and Management icce nn eee EEEE EEEE EEEE EEEE EEEE EEEE EEEE EEEE EEEE EEEE Restricting access to the Policy module accra eee eee Group based access restrictiON rn nn OE OEE eee E ACCESS to rules and PFOGC AUN eS aa a gd ida 1 Doceria Report Configura O aa gotas dig ii oo o a a dadadada hig ditties lita tlan dit Adit dette hha 1 Resirement Mana ein E sim 2 Create edit standard oi nn rrr rrr Dlr nr EEEE l Mappine standard APES OEE a E E Comtaci amor RAIO asas iearynaeonnianninnnd pus anuna
8. al report Configuration Paper size S A4 Red left margin 4 Yes Include table of contents Yes Report background template 4 None Now you can edit the print size of your report and test Neupart Development License margin color optional using the editing pencil icon 4 7 Asset Identification Classification and Control identify classify and control the ownership of all information assets You can also choose to include a table of content or 7 i inn in E E E T 7 1 1 List of information assets upload a report background Remember to click on metem rir ento pac ig st ac ED once you have made your changes she e a Camer for mtcemation seretz The chiet of security is responsible for maintaining a list of ali Information systems Tris list must contain ail cata and system owners with security Osmar of Ducinecs critica cycteme AS orlica unctions requiring special tnowiedge shiis or experience must be identified and rave to be assigred a rezponsinie owner Recponcitaty for the ceourity of IT Tre IT department is respensiie for security cr the spotes plattoms patos Certreis are to be mpiememes in agreemert with system caners Sesurty of mobile devices On moble units wih primary owners those owners are responsioie for Te dxe contained herein FecporcRility for sooece rights The system date caner is responsible for estadiishing access rights anc resssessing access rights on an ongoing basis In accorcance wtih
9. amp compliance check administrator Reopen and delate complisnce checks By compliance check manager Create start stop and view compliance checks Compliance user Perform a compliance check wh C h n t U rn h ol d S a n u m b e r of a S SO C l ate d Bj Document Ementas Manager Can manage esa and files in the document database Document database user Can manage files in the document database By Risk assessment administrator Reopen and delata nsk assessments access rights Click on Ed Manage roles to ee create a new security role view edit and create new roles Manage user roles 4 role in SecureAware is linked to sacunty nghts which providas access to certain functions within gach module You can define as many roles as you need to separate access to the functions and you can link multiple roles to each user in the system You will now see the standard roles that already exist as well as the functions to which each different role has access By clicking on a specific role you can edit the role s name and description and add or remove access rights Click on the 4 icon to edit or the icon to delete If you want to give new access rights to a role click E Add and select from the drop down menu Remember to click on LB once you have made your changes If you want to create a new role click on create a new security role enter a name and description if required then click Create The new security rol
10. create from policy set Types ba Templates Task repetition intervals The tab Tasks and Responsibilities The Tasks and Responsibilities tab gives you an overview of the tasks you have to carry out in SecureAware left hand side Click on the task to go directly to carrying it out On the right hand side all your responsibilities are listed i e systems assets or procedures You can click on any of these given you have the access rights necessary to access it directly Shortcuts My tasks wy id 1 Update BCP chapter A Read and acknowledge Policy Rules A Take quiz Quiz for new employees End User 8 Evaluate Compliance Check 2009 Organisation of information security My completed tasks The tab Shortcuts gives you as the name implies a range of shortcuts to different functions in SecureAware A My systems a Tasks and j Responsibilities O lt ni Human Resources System Internet My assets Mailserver 3 My processes Customer Support My BCP sections 3 1 1 BCP upkeep and accountability 3 2 1 BCP organisational diagram B 7 9 Storage and safekeeping of BCP and associated documentation SecureAware The Teach Me tab Under the Teach Me Tab you and your users have easy access to k Shortcuts Ea Tasks and Responsibilities 3 D A Teach me education content of various forms You have direct
11. ct the required security object from the left hand menu You can now decide who you want to have acces to that specific object and its associated rules The Access rights tab Use the Access rights tab if you want to restrict certain roles from viewing the selected security object Remember to click on EJ after each selection Tool Security Object Content Category DEE eT objecti Standards Target Group Acceptable use of information assets Security settings Limit access to these roles S 4 to 20 of 400 EJ Acceptable use of information assets Access cards for contractors and other Access control cards Compliance check administrator Camnlisanea charb mananar The Target Group tab Alternatively you can link a target group to the selected security object by using the Target Group tab Remember to click on kd after each selection Tool Security Object Access rights Content Category Target Group EST g Acceptable use of information assets ac Target Group Security X Management 1 to 20 of 400 Target Group End User w IT Administrator Acceptable use of information assets Access cards for contractors and other Access control cards Access control for source code If you choose to limit access to certain rules you should be aware that your access restrictions will be effective in all of the SecureAware modules in which those rules appear including
12. e willnow be featured on the list of roles in the Manage Roles menu and can be edited in the same was as for the others as described above Access roles Once you have revised and tailored the listed roles you can start restricting or granting certain roles access to the various SecureAware end user menus and program management functions To do this SecureAware select and edit the roles which you wish to have access to or be barred from any desired function If a user isa member of one or more of these role groups he or she will automatically be given or denied access Menu Access Roles The end user menu is shown as a selection of tabs at the top of the screen Superuzer su o Go O You have 9 tasks Da N Be Aware Policy Learn Security Risk Assessment Compliance Incidents Compliance Workflow E Along You can determine which roles are able to Be Aware X Validated Users add view the different end user menu tabs by polo e vated user Add P Leam Security All users clicking on E Menu Access roles Select a role 6 aca Risk Assessment s a user F E Ei E add by clicking on Add next to the appropriate reliance DESTRUIR XK Super Users B ada module name and select from the drop down incide validated Users Compliance Workflow Validated Users E add menu Click EL to add You can add as many roles as you like and delete them at any time by clicking on
13. ess programmes and ns security learning General report configuration Topics Manager Security Learning Sections E a Start Page 4 Define which page your users shall see first after login Target Group Management Properties Manage target groups Target Group Manager My SecureAware Manage My SecureAware Tabs Import SecureAware v 2 0 2 Properties Import content from SecureAware v 2 0 2 Import content Standards and Requirements Manage standards and information security requirements Requirement Set Manager Create edit standard Standards Click New requirement set and type the name of g DS484 2005 the standard requirement set and click Create The S 15027002 PCI DSS standard will now appear in the list of standards fi PCI DSS v 1 2 Click on the name gt Chapter Manager to start ka New requirement set e Import requirement set creating chapters Type a name title and a description and select where the chapter should be placed This is done by selecting the parent chapter in Select Chapter and the chapter which it should ISO IEC 27002 2005 succeed in Place after chapter Example Chapter 5 Security Policy 6 Organization of information security j j ee ac tine 3 4 2 s parent chapter is 3 4 and it should be placed 8 Human resources security 5 9 Physical and environmental security after cha pter 3 4 1 3 10 Communications and operations management
14. h the list of groups Click on the desired group to import To search for a specific group used the Advanced group search function You can use this advanced search to carry out a search with specific search criteria For example amp amp objectCategory person objectClass group amp memberOf CN Group Name OU Name DC server DC server SecureAware When you have imported a group it will be removed from the list here By now clicking on the Group manager button at the bottom right of the window you will now be able to configure various elements of the selected groups such as adding to target groups and allocating specific roles Configuring your groups To change the configuration and set up of a group simply click on the group name To delete a group from SecureAware click on If the group has yet to be imported from an AD select Import group from AD Although it is in effect possible to create a new group directly within SecureAware this practice is not advisable Instead it is recommended that any new groups be created in an AD then subsequently imported from the AD into SecureAware Once imported groups can be listed under specific target groups and allocated roles by selecting In the same way as for users by listing a group under a specific target group you can configure the way in which its users are presented with security policy rules Users themselves are able to change the user group in whic
15. h they are included so listing under a target group is in itself not a form of access limitation Note a user may belong to more than one group at a time By allocating roles to a group the group users will be granted access to all those functions which are linked to that specific role The allocation of functions to the various different roles is managed from the main SecureAware User Manager menu as described in the next chapter Altering a group name or key is NOT recommended This should only be done when absolutely necessary SecureAware Restricting access to the Policy module A user s access to the contents of the Policy module s rules and procedures can be restricted as required This can be done by either linking roles directly to individual rules or more specifically objects and procedures or by linking rules to already existing SecureAware groups Group based access restriction Most of the rules objects and procedures in SecureAware are already linked to specific user groups Target groups and group based Target Group Management access restriction is easily established To set up a group based access amp Manage target groups target Groun Manager restriction click on the q Configuration Management icon at the top right of the screen then select Ed Target Group Manager SecureAware has three standard user groups End User IT amp Target Group Management End User Administrator and
16. iguration Once you have logged on as a Super User SU you can configure a wide range of settings relating to your SecureAware users If you have yet to change your password use the default password snRt 32w When successfully logged on you will be able to see the Super User menu bar at the top right of your screen shown below The number of icons shown can vary according to the number of modules your company is licensed to use To access the User Management module click on the 8 icon sment Compliance Tasks and fo Responsibilities Teach me o i RE E You now have access to the main User Users and groups Management menu Create or manage groups and user accounts 8 TEN 88 New user es Import groups and users from AD By Manage group accounts Roles New or manage existing user roles amp Manage roles gt Access to user menus i gt Access to manager menus SecureAware User Roles Different users require access to different SecureAware y Role e E O E amp e E N AE functions Assigning individual access rights and tasks on amp Manage roles a user by user basis can be time consuming but with gt Access to user menus gt Access to manager menus SecureAware s role system you can do this quickly and easily Role management SecureAware comes with a selection of Manage Roles S t qd n d a rd p re d efi n e d u se r rol e S e d C h of amp
17. mpliance check 2009 care with information relating to them as we take care in 0 of the pactions have been evaluated maintaining our image as a professional and reliable partner Asenrannao nranrnamma n na The bulletin board on the right hand side is where you can display messages to your users To create a amp Welcome to our IT Security Handbook 08 04 2009 a new message or delete the default one click write message on Messages Now select either the message you would like to edit or Write message to create a new message on the bulletin board Messages When creating a new message remember to Write message o select which target groups it should be shown Boe Bis mama Sic 4 B a Dr ca to After clicking Create you will see an e mail icon in the bottom of the screen Click on it to write a notification about this to your users s Select all Deselect all Display to End User IIT Administrator Y Management SecureAware The Shortcuts tab o ba Shortcuts B e q Policy amp Read Security Handbook g Policy bg Rules amp Procedures Strategy Policy Management Security Handbook Education J o Learn Security Tasks and T i Responsibilities o each me E J L Awareness e Quiz for new employees D New awareness programme pe Knowledge question pool Compliance Workflow 8 New task Batch
18. n In the example shown Super Users have access rights to read pol create o edit A and delete E3 folders Super Users are also able to create Fi and delete Fi files within this folder SecureAware s standard settings are fixed to ensure unlimited editing access to any Super User In the example validated users only have access to read the contents of the folder Status can be changed by clicking amp To add new folder roles select them from the drop down menu and to delete existing roles click on Folder Security Settings Folder Name Folder 2c Folder Role Access a oe 0 3 2 DU g Super Users O 6 oo X Validated Users Folder Roles add SecureAware To upload files click on Fi then locate the required das IE Files file from the library Clicking on Create will upload the fa file doc amp file to the open folder Once uploaded the file can be edited Mor deleted Fi As for access to folders access to files can be limited To restrict file access select the file and click on the File Security icon 4 SecureAware Report Configuration The layout and look of SecureAware s reports can easily be Repat Management tailored to fit your specific company and needs Click on Configure standard settings for reports the Configuration Management icon Wat the top right of ea General report configuration E femea reper onoiat your screen then select kd Gener
19. nea nines pnieanninenehaosannhienannnsrnsa series ul SecureAware My SecureAware the start page When you log on to SecureAware for the first time you will most likely see the screen below This is the start page referred to as My SecureAware which unless you change the settings see the chapter What should my users see when they log on will be the start page for all your users My SecureAware consists of four different parts tabs o ssa dev una Policy Leam security Risk Assessment Compliance Business Continuity Plan Compliance Workflow Logout Be Aware Start n s Shortcuts Tasks and gt Teach me e Responsibilities Welcome Anna Jones aj Z Messages Topic Learn more Welcome to our IT Security Handbook 08 04 2009 Malware Dear Colleague Passwords Our continued business success relies upon P Email Usage our IT systems and our ability to protect Internet Usage the important information stored within Software Installation them Therefore it s vital that our systems BR Backup are reliable and that the information contained is accessible to us and only us a aca Meriti SUCHE whenever we need it Mobile Devices E gu aR Imagine what could happen if our competitors gained dia da access to our confidential information or strategy plans Incident Handling Or what if we inadvertently published sensitive information about our customers or
20. new SecureAware user click on Create new user account You can now enter a user ID of your choice to be used as a log in and the user s name Now click Create Now you can enter the users email address optional You can also state which language should be used as standard for this new user though this can be altered by the user at a later date The language settings and password can be changed by the user and it is highly advisable that you encourage the user to create his or her own personal password after logging on for the first time Assign a user to a specific target group and allocate the user roles by clicking on the blue crosses and selecting from the list By adding a user to specific target group you can for example configure the way in which the user is presented with security policy rules Users themselves are able to change the user group in which they are included so listing users in target group is in itself not a form of access limitation Note a user may belong to more than one group at a time By allocating roles to a user the user will be granted access to all those functions which are linked to that specific role The allocation of functions to the various different roles is managed from the main SecureAware User Manager menu as described in the next chapter SecureAware Managing your user accounts A B C D EE RAwD KEIM NO gs GREET UV We Oo Y E Al User Name User ID Email Internal External Supe
21. re Manage My SecureAware Tabs Properties Now click on the pencil and use the Home page Select home page My SecureAware de 0 drop down box to select the start BCP omni Analysis Compliance workflow Learn sec My Sec Lido MESA Polic Procedures Risk Rules Strateg page of SecureAware Remember to click OK before you click return SecureAware If you want to change the name of the tabs on My SecureAware click on Properties under Manage My SecureAware Tabs Now click on the pencil in front of the tab you want to change the name of write the new name and click OK You can edit your user settings and preferences if this system uses internal security you can also change your password User Information UserID S aj User Name 4 Anna Jones Email 4 Preferred Target Group End User Preferred Language 4 British English My Start Tab Home Shortcuts Tasks and responsibilities Change User Password Password changes Tab names Task count Tab 14 Start Tab 2 4 Shortcuts Tab 3 4 Tasks and Responsibilities Tab 4 Teach me Show count Yes Your users will be able to select themselves which tab to see as the first on My SecureAware To do this the user must click on the User Preferences icon in the top right corner click on the pencil for My Start Tab select the tab and click the arrow button to save the SecureAware User Conf
22. ruser su Internal Joe Jackson jj company BbC com Interna Karen Walker kw kw companyABC com Internal Said Khan sk sk companyABC com Internal o sz Add a new internal user s Import external users In the main User Manager menu click on NNN Manage user accounts You will now be shown a complete index of all existing SecureAware users If you have many users you can use the letters at the top of the menu to view them listed alphabetically You can also search for a specific user using by entering all or part of a name in the blank search box and clicking A user s details may be edited at any time by clicking on the next to his or her name The menu here also allows you to add new users or import external users see below Importing external users If the import of users via LDAP has been authorized by your system administrator this can be done by clicking on j Import external users followed by entering your administrator username and administrator password for LDAP Importing groups from an AD If you wish to import groups select the E ses Import groups and users from AD option in l vanced group searc 88 Administrators Builtin the main User Manager menu Once logged amp Users Builtin e amp Guests Builtin in you can view a list of all the groups in the R Print Operators Builtin amp Backup Operators Builtin company AD Use the green arrows to move 1 5 36 backwards and forwards throug
23. s and standards 15 Keeping of audit logs 9 Use of system tools 8 amp Follow up log 8 Event logging 8 Systems for controlling access codes 7 IT procurement 6 Emergency power supply 6 Restricted access to information 5 User registration 5 1 10 51 por SY SecureAware Contact Information Further information is available by contacting Neupart Europe North America Neupart A S United States Hollandsvej 12 Neupart Inc 2800 Lyngby 2553 Crescent St Denmark Ferndale WA 98248 Tel 45 7025 8030 Tel 360 820 2545 Fax 45 7025 8031 Fax 360 392 6078 Neupart GmbH Kaiserwerther Strasse 115 40880 Ratingen Dusseldorf Germany Tel 49 0 2102 4209 26 Fax 49 0 2102 42062 Copyright 2006 Neupart A S All rights reserved The author of this documentation is Neupart A S All information herein including text and graphics belongs to Neupart A S unless stated otherwise and is protected by copyright laws in Denmark and international agreements Permission to quote this documentation in its entire form or partly is given under the premises that no changes are made and that information about this copyright is clearly stated on all copies No material may be copied or distributed without explicit approval of Neupart A S Neupart A S preserves the right to at any time and without warning make changes and or improvements in the products mentioned Names of other companies and their produc
24. the company s generat access paky Acgrinictration of Somar names The resocesibihy for registaticn of coman names lies with tre IT Manager 7 1 3 Acceptable use policies wireless networks Acceptable use policies Intemet use Emgicyos ute of the ietermet for ron it ls accectatie to use the company internet access for private purposes busmecs vce within fhe terms and conditions of the security policy orovides that work rerated use is rot moedeg P any way Browcer cocurtty ccetqurston You may vist Intenet web sitet omy when your browser ras Te security ievel seing Medun for Me irtenet Zore Perseere must ony use acpreves web Growsers Personne must not Memo to ater the securty setings such as Charging securRy zones Brower Dated spo cat ont Ris accecmatie to use Orowter bases aochcatons F they are cigitaly tered tmemtra o th Page 7 of 37 SecureAware Requirement Management SecureAware comes with a number of standards The chapters in the standards are mapped to the rules in the rule library You can choose to add mapped rules to the standard or to create your own standards To do this go to Configuration gt Requirement Set Manager e DOJAVA VORA Be Aware Policy Learn security Risk Assessment Compliance Incidents Business Continuity Plan Compliance Workflow General _ Topic Management Report Management Topics are used by policy rules As Configure standard settings for reports procedures awaren
25. ts are or can be registered trademarks or trademarks that belong to their owners Neupart and SecureAware logo and the name SecureAware are trademarks belonging to Neupart A S The documentation is provided as is without warranty of any kind express or implied including but not limited to the warranties of merchantability fitness for a particular purpose and non infringement In no event shall the authors or copyright holders be liable for any claim damages or other liability whether in an action of contract tort or otherwise arising from out of or in connection with the documentation or the use or other dealings in the documentation The documentation including graphics could contain inaccuracies or typographic errors Furthermore there are no guarantees regarding results achieved by using this information All rights not explicitly mentioned herein are preserved
Download Pdf Manuals
Related Search
Related Contents
Mode d`emploi simplifié de Regressi Basculer entre les différents Development of a Portable Process Data Acquisition SERVICE MANUAL Instructions d`installation, d`utilisation et d`entretien Fisher-Price InteracTV B9376-G4 User's Manual Intuition® Operating Instructions Desa GVC65PA User's Manual 取扱説明書 - 日立の家電品 Copyright © All rights reserved.
Failed to retrieve file