V 0.1Slide 1 Security – System Configuration How to configure WebSAMS? Access Control Other Information Configuration  system customization  system configuration.

Slides:



Advertisements
Similar presentations
MFA for Business Banking – Security Questions with 2nd Request Multifactor Authentication: Quick Tip Sheets Note to Financial Institutions: We are providing.
Advertisements

MFA for Business Banking – Security Code Multifactor Authentication: Quick Tip Sheets Note to Financial Institutions: We are providing these QT sheets.
MFA for Business Banking – Security Questions with Reset Multifactor Authentication: Quick Tip Sheets Note to Financial Institutions: We are providing.
Setting up an E-XL A Step by Step Tutorial Engineering Consultants Group, Inc.
Welcome to the CardSaver VoIP Billing & Call Management Demonstration © 2004, Parwan Electronics Corporation.
iRequestManager for MediMizer X3
Week 6: Chapter 6 Agenda Automation of SQL Server tasks using: SQL Server Agent Scheduling Scripting Technologies.
CNT 4603: Managing/Maintaining Server 2008 – Part 3 Page 1 Dr. Mark Llewellyn © CNT 4603: System Administration Spring 2014 Managing And Maintaining Windows.
Using Different Forms of Basic Knowledge of the 3 Different Platform: Outlook, AOL and HTML Prepared by Mitch.
Introduction to Online Data Collection (OLDC) Community Based Abstinence Education September, 2009.
1 Configuring Internet- related services (April 22, 2015) © Abdou Illia, Spring 2015.
ENVELOC GENERAL CONFIGURATION DEMO Contact Information Billing Information Backup Time Days to Backup Backup Selections Files to Exclude Wireback (Archive)
SmartCall™ Messenger Account Setup
1 Configuring Web services (Week 15, Monday 4/17/2006) © Abdou Illia, Spring 2006.
11 SUPPORTING LOCAL USERS AND GROUPS Chapter 3. Chapter 3: Supporting Local Users and Groups2 SUPPORTING LOCAL USERS AND GROUPS  Explain the difference.
Administering Active Directory
Hands-On Microsoft Windows Server 2003 Administration Chapter 3 Administering Active Directory.
Chapter 8 Chapter 8: Managing the Server Through Accounts and Groups.
A quick course on the new. GCA Webmail can be accessed by clicking on the Webmail link in the GCA page, or by going to either or .gcasda.org.
Introduction to the Secure SMTP Server service. Secure SMTP server is a secure, reliable SMTP mail relay server for your outgoing mail. Secure SMTP service.
GroupWise Tutorial What is GroupWise? GroupWise is an and calendar service (much like Microsoft outlook) for Collin College faculty and staff.
How to Get The Most Out of Outlook 2003 Michele Schwartzman Division of Customer Support Summer 2006.
Setting up in Outlook Express. Select “Tools” from the toolbar menu.
This is the first page of the log in, this is were you enter your unique details.
1 Chapter Overview Creating User and Computer Objects Maintaining User Accounts Creating User Profiles.
Corso referenti S.I.R.A. – Modulo 2 Local Security 20/11 – 27/11 – 05/12 11/12 – 13/12 (gruppo 1) 12/12 – 15/12 (gruppo 2) Cristiano Gentili, Massimiliano.
ManageEngine ADAudit Plus A detailed walkthrough.
Login Screen This is the Sign In page for the Dashboard Enter Id and Password to sign In New User Registration.
Hosted Exchange The purpose of this Startup Guide is to familiarize you with ExchangeDefender's Exchange and SharePoint Hosting. ExchangeDefender.
Technology ICT Option: . Electronic mail is the transmission of mainly text based messages across networks This can be within a particular.
Microsoft Outlook Web Application (OWA)
V 0.1Slide 1 Security – Audit Trail How to maintain audit trail? Access Control Other Information Configuration Customization  audit trail  purge.
Outlook 2000 Summertime Technology 2002 Vicki Blackwell Tangipahoa Parish Schools.
SMART Agency Tipsheet Staff List This document focuses on setting up and maintaining program staff. Total Pages: 14 Staff Profile Staff Address Staff Assignment.
Login Screen This is the Sign In page for the Dashboard New User Registration Enter Id and Password to sign In.
Back to content Final Presentation Mr. Phay Sok Thea, class “2B”, group 3, Networking Topic: Mail Client “Outlook Express” *At the end of the presentation.
Click Tools, then Account Settings. Click New… Click Microsoft Exchange, POP3,IMAP, or HTTP, then Next.
Student Financial Assistance. Edconnet SFA to the Internet: EDconnect Software Session 16.
Copyright ®xSpring Pte Ltd, All rights reserved Versions DateVersionDescriptionAuthor May First version. Modified from Enterprise edition.NBL.
Trouble-shooting Tips Georgia Bulldogs I can receive, but not send messages  If you can successfully receive messages, but can’t send.
TEAM Basic TotalElectrostatic ManagementAwareness&
DIT314 ~ Client Operating System & Administration CHAPTER 5 MANAGING USER ACCOUNTS AND GROUPS Prepared By : Suraya Alias.
Chapter 13 Users, Groups Profiles and Policies. Learning Objectives Understand Windows XP Professional user accounts Understand the different types of.
IS 221: DATABASE ADMINISTRATION Lecture 6:Create Users & Manage Users. Information Systems Department 1.
Microsoft Exchange 2000 Service Pack 2 Features Mark Barringer Support Professional Enterprise Messaging Support Microsoft Corporation.
Diagnostic Pathfinder for Instructors. Diagnostic Pathfinder Local File vs. Database Normal operations Expert operations Admin operations.
Setting up/Managing Bank Personnel Intuit Financial Services University Business Financial Solutions Certification.
© 2006 Cisco Systems, Inc. All rights reserved.1 Connection 7.0 Serviceability Reports Todd Blaisdell.
Module 7 Planning and Deploying Messaging Compliance.
The Internet 8th Edition Tutorial 3 Using Web-Based Services for Communication and Collaboration.
Setting Up TGO User Accounts. Creating User Accounts for Other Users If your company has other users who need to use the Active Orders system, your company’s.
Security fundamentals Topic 5 Using a Public Key Infrastructure.
Copyright © 2006, Infinite Campus, Inc. All rights reserved. User Security Administration.
For the benefit of business and people Lotus Notes R6 Training 4 February 2016 IT Division.
Trouble-shooting Tips Georgia Bulldogs I can receive, but not send messages  If you can successfully receive messages, but can’t send messages,
V 0.1Slide 1  send – Send How to send in WebSAMS? Access Control Other Information Configuration Customization  manage.
Adding and Modifying Accounts in Microsoft ® Outlook Express ™, and modifying connection settings in Microsoft ® Internet Explorer ™.
LINUXCHIX WEBMAIL. Software run by an ISP or online service that provides access to send, receive, and review using only your Web browser. Users.
Step 1 Lead Notifications Dear Partner, New leads have been assigned to your organization based on customer preference and are available for you.
6/19/2016 أساسيات الأتصال و الشبكات Communication & Networks Fundamentals lab 4.
V 0.1Slide 1 Security - User Account How to maintain user account ? Access Control Other Information Configuration  maintain user group and access rights.
Welcome to the CardSaver VoIP Billing & Call Management Demonstration
How to Setup and Utilize Functionality
Active Directory Administration
Fix Thunderbird Error 5.7.1 Call Toll-free
7 Steps to Set Up AT&T on MS Outlook | Customer Support Number
Briefing Session Guide
TaxSlayer Multi-Factor Authentication (MFA)
Administrator’s Manual
FCL – Administration Tool
Presentation transcript:

V 0.1Slide 1 Security – System Configuration How to configure WebSAMS? Access Control Other Information Configuration  system customization  system configuration Customization  ip configuration Authorized user

V 0.1Slide 2 Security – System Configuration System Configuration :  Allow user to maintain the following settings:  General Settings  System Accessibility Settings  settings  File size control of system log & audit trail  All the system configuration will take effect only after the user re-logins the system

V 0.1Slide 3 Security – System Configuration

V 0.1Slide 4 Security – System Configuration Maximum number of fault login attempts allowed / Auto-unlock period of locked accounts :  The number of times that a user can try to login with a wrong password before the account is locked  Locked account will be unlocked after the elapse of the auto-unlock period, counting from the time the account is locked.  For no auto-unlock, the locked account can only be unlocked manually in the “Unlock Account” function.

V 0.1Slide 5 Security – System Configuration

V 0.1Slide 6 Security – System Configuration Automatic logout period (inside / outside SAMS LAN segment) :  The system will automatically logout an account after it is left idle for a period longer than the automatic logout period defined.  Automatic logout period inside and outside the SAMS LAN segment can be defined separately.

V 0.1Slide 7 Security – System Configuration

V 0.1Slide 8 Security – System Configuration Password expiry period:  For security reason, users should modify their passwords periodically.  User will be reminded to change his/her account password if it is due to be expired within 14 days. The remaining number of days before password expiry will be displayed to the user after each successful login.  When the user changes the password, the new password expiry date will be the system date plus the password expiry period.

V 0.1Slide 9 Security – System Configuration Password expiry period (cont’d):  If the user does not change the password and the password expires, the user will not be able to login the system again.  The password expiry period also affects the password expiry date when a new user account is created.  For the 2 built-in accounts, ‘sysadmin’ and ‘asysadmin’, the password is set to ‘Never Expire’.

V 0.1Slide 10 Security – System Configuration

V 0.1Slide 11 Security – System Configuration Number of passwords stored in password History:  The system will store a certain number of previously used passwords. The number of passwords stored is defined here, from 1 to 5.  When changing new password, the system will ensure that the new password entered does not duplicate with the stored passwords.

V 0.1Slide 12 Security – System Configuration

V 0.1Slide 13 Security – System Configuration Enable Multiple Login:  A user can login the system in several browsers from the same/different workstations at the same time if the box is checked. It is recommended to disable Multiple Login for security reason.  User can login the system from internet if the box is checked. Enable Internet Access: Enable ITED Access:  User can login the system from school ITED LAN Segment if the box is checked.

V 0.1Slide 14 Security – System Configuration

V 0.1Slide 15 Security – System Configuration Data Backup log file path:  The server directory where the database backup log files will be stored. The administrator has to set this value before he/she can view the database backup log files with the ‘View Backup Log’ function.  The server directory where the backup tool stores the file server backup log files. It is used by the ‘View Backup Log’ function Server Backup log file path: Archive file path:  The server directory where the audit trail archive files will be stored.

V 0.1Slide 16 Security – System Configuration

V 0.1Slide 17 Security – System Configuration System access time inside/outside SAMS LAN Segment  User can login the system in the period defined here.  Access time in Monday-Saturday and Sunday can be set separately.  Access period of 24 hours a day can be set by selecting the “24 Hours” option.  The access time inside or outside SAMS LAN Segment can be set separately  Note 1: The access time setting is not applicable to the ‘sysadmin’ account  Note 2: Take note of any conflict with the system batch jobs such as database/server backup when granting access period of 24 hours a day

V 0.1Slide 18 Security – System Configuration

V 0.1Slide 19 Security – System Configuration Release of Access Time Control to 24 hours  Account of staff/student/parent user type can be selected to enjoy access time of 24 hours a day within a particular period of time for operational purpose.  Within the period defined, the selected users can access the system at any time.

V 0.1Slide 20 Security – System Configuration

V 0.1Slide 21 Security – System Configuration Enable Function:  The option has to be enabled before s can be sent out from WebSAMS.

V 0.1Slide 22 Security – System Configuration

V 0.1Slide 23 Security – System Configuration School's Address for Return of by Recipients:  If E-Cert for digital signature is not used, this address will be displayed as the sender’s address for all mails sent out from WebSAMS.  If E-Cert is used for digital signature, the address in the E-Cert will be used instead.

V 0.1Slide 24 Security – System Configuration

V 0.1Slide 25 Security – System Configuration SMTP Server of ISP subscribed by School:  The SMTP server of the ISP is used to send outgoing s via internet. Account provided by ISP subscribed:  This is the account provided to the school by the ISP for using its SMTP server. Password of the Account provided by ISP:  The password of the account should be entered correctly.

V 0.1Slide 26 Security – System Configuration

V 0.1Slide 27 Security – System Configuration Recipient Limit for each mail:  If the number of recipients of an is larger than this limit, the will be sent out by batch. The number of recipients in each batch will be less than or equal to this limit. Size Limit for each (MB):  The maximum size of each outgoing in megabytes.

V 0.1Slide 28 Security – System Configuration

V 0.1Slide 29 Security – System Configuration Size Limit for Storing Each User's Sent Mails (MB) :  The size limit of each user’s mail history in megabytes. Maximum number of Retry for Sending Mail:  The maximum number of attempts for sending each .  If mail sending is still not successful after this number of attempts, mail sending will be aborted and the mail will be marked as ‘Sending Failed’.

V 0.1Slide 30 Security – System Configuration

V 0.1Slide 31 Security – System Configuration Location Path and Password of (Organizational) e-Cert for Digital Signature:  The school may use e-Cert to digitally sign all outgoing s for authentication purpose. Then the two settings of location path and password of the e-Cert information should be entered.  If the school does not use e-Cert for signing s, two fields can be left blank.

V 0.1Slide 32 Security – System Configuration

V 0.1Slide 33 Security – System Configuration Size Limit of Audit Trail storing in DB(MB):  The maximum database space used for storing Audit Trail in Megabytes.  Zero for no limit.  When the assigned database space is full, user may archive the audit trail records as Archived Audit Trail. After the archive, the audit trail records which have been archived will be deleted from the database.

V 0.1Slide 34 Security – System Configuration

V 0.1Slide 35 Security – System Configuration Size Limit of Archived Audit Trail storing in server (MB):  The maximum hard disk space used for storing Archived Audit Trail files in Megabytes.  Zero for no limit.  When the assigned hard disk space has been reached, user may delete the files or move the files to other folders manually.

V 0.1Slide 36 Security – System Configuration

V 0.1Slide 37 Security – System Configuration Size Limit of DB backup /recovery log storing in server (MB):  The maximum hard disk space used for database backup/recovery log files in Megabytes.  Zero for no limit.

V 0.1Slide 38 Security – System Configuration Click ESC To Return Size Limit for Server backup/ recovery log storing in server (MB):  The maximum hard disk space used for server backup/recovery log files in Megabytes.  Zero for no limit.