© 2012 Invensys. All Rights Reserved. The names, logos, and taglines identifying the products and services of Invensys are proprietary marks of Invensys.

Slides:



Advertisements
Similar presentations
Functional Workshop / Training Part 2 Pick Lists
Advertisements

MIDAS is a complete web based scheduling solution for managing your facility’s bookings and resources. MIDAS is a complete web based scheduling solution.
TCSEC: The Orange Book. TCSEC Trusted Computer System Evaluation Criteria.
Slide 1. © 2012 Invensys. All Rights Reserved. The names, logos, and taglines identifying the products and services of Invensys are proprietary marks.
Module 4: System Maintenance Intuit Financial Services University Internet Banking Certification Training.
SmartCall™ SMS SmartCall SMS by HME Wireless is a great tool to manage your patient workflow through your facility. Using the SmartCall SMS system, staff.
SmartCall™ Messenger Account Setup
11 MANAGING USERS AND GROUPS Chapter 13. Chapter 13: MANAGING USERS AND GROUPS2 OVERVIEW  Configure and manage user accounts  Manage user account properties.
Module 8: Implementing Administrative Templates and Audit Policy.
ShelterPoint™ Data-Entry Workflows. ShelterPoint v5.2.3.
ShelterPoint™ Data-Entry Workflows.
© Copyright 2013 TONE SOFTWARE CORPORATION. Confidential and Proprietary. All rights reserved. ® Basic Administrator Training – Release Adding Users.
11 WORKING WITH USER ACCOUNTS Chapter 6. Chapter 6: WORKING WITH USER ACCOUNTS2 CHAPTER OVERVIEW Understand the differences between local user and domain.
© 2010 Invensys. All Rights Reserved. The names, logos, and taglines identifying the products and services of Invensys are proprietary marks of Invensys.
CN1260 Client Operating System Kemtis Kunanuraksapong MSIS with Distinction MCT, MCITP, MCTS, MCDST, MCP, A+
Quiz Time. Online Quiz Tool Quiz Time Online Quiz Tool Geoffrey Anderson.
© Experian Information Solutions, Inc All rights reserved. Experian and the marks used herein are service marks or registered trademarks of Experian.
Slide 1. © 2012 Invensys. All Rights Reserved. The names, logos, and taglines identifying the products and services of Invensys are proprietary marks.
Slide 1. © 2012 Invensys. All Rights Reserved. The names, logos, and taglines identifying the products and services of Invensys are proprietary marks.
People © 2013 The Sleeter Group All rights reserved. Intuit, the Intuit logo and QuickBooks, among others, are registered trademarks of Intuit Inc. Other.
Windows Server 2003 Overview 1 Windows 2003 Server Overview Ayaz
Supervisory Control and Data Acquisition (SCADA) Software.
Securing AD DS Module A 3: Securing AD DS
Slide 1. © 2012 Invensys. All Rights Reserved. The names, logos, and taglines identifying the products and services of Invensys are proprietary marks.
RMsis – v Simplify Requirement Management for JIRA.
© 2007 Benefitfocus.com, Inc. | Proprietary and Confidential Your BlueEnrollment Blue Cross Blue Shield of Delaware.
Chapter 13 Users, Groups Profiles and Policies. Learning Objectives Understand Windows XP Professional user accounts Understand the different types of.
TxEIS Security A role-based solution October 2010.
Module 3: Administrator Set-Up Intuit Financial Services University Internet Banking Certification Training.
Introduction to Microsoft Management Console (MMC) MMC is a common console framework for management applications. MMC provides a common environment for.
Slide 1. © 2012 Invensys. All Rights Reserved. The names, logos, and taglines identifying the products and services of Invensys are proprietary marks.
DC440: Security (Part 2 of 2): Logons, permissions and views - how these systems work and how to manage them Pradeep GanapathyRaj Program Manager Project.
Slide 1. © 2012 Invensys. All Rights Reserved. The names, logos, and taglines identifying the products and services of Invensys are proprietary marks.
1 Monitoring Student Performance New Horizons Conference Virginia Community College System April 2006 Roanoke, VA.
GPO - WINDOWS SERVER AGENDA: Introduction Group Policy Overview Types of Group Policies/Objects Associated Technologies How to implement.
Setting up/Managing Bank Personnel Intuit Financial Services University Business Financial Solutions Certification.
Windows Role-Based Access Control Longhorn Update
Managing Local Users & Groups. OVERVIEW Configure and manage user accounts Manage user account properties Manage user and group rights Configure user.
PBMS Administration of the System ASCA. System Administration 3 Level of Users: PBMS Administrator Access to entire system Set up PBMS and Organization.
Slide 1. © 2012 Invensys. All Rights Reserved. The names, logos, and taglines identifying the products and services of Invensys are proprietary marks.
The world leader in serving science Overview of Thermo 21 CFR Part 11 tools Overview of software used by multiple business units within the Spectroscopy.
Module 10: Implementing Administrative Templates and Audit Policy.
Chapter 4- Part3. 2 Implementing User Profiles A local user profile is automatically created at the local computer when you log on with an account for.
© 2010 Invensys. All Rights Reserved. The names, logos, and taglines identifying the products and services of Invensys are proprietary marks of Invensys.
Slide 1. © 2012 Invensys. All Rights Reserved. The names, logos, and taglines identifying the products and services of Invensys are proprietary marks.
Slide 1 Session Description The Introduction to ArchestrA Workflow 2012 session provides a basic understanding of the software as an extension to Business.
Page 1 of 42 To the ETS – Create Client Account & Maintenance Online Training Course Individual accounts (called a Client Account) are subsets of the Site.
Administrator Data Entry Training for Maintenance (Mx) LOSA and Ramp LOSA Database Software 11/26/2016.
1 Pick and Scan Voyager 9. 2 Copyright Statement All of the information and material inclusive of text, images, logos, product names is either the property.
Operating Systems Concepts 1/e Ruth Watson Chapter 9 Chapter 9 Accounts and Groups Ruth Watson.
Chapter 7 Server Management Policies –User accounts –Groups Rights and permissions Examples.
RMsis – v now with JIRA 5.0 support Simplify Requirement Management for JIRA.
Collaborate. Coordinate. Evaluate. Connecting Communities > Demonstrating Outcomes ™ / I&R Housing Youth & Family Services Older Adult Services ShelterPoint™
CN1276 Server Kemtis Kunanuraksapong MSIS with Distinction MCTS, MCDST, MCP, A+
Introducing Novell ® Identity Manager 4 Insert Presenter's Name (16pt) Insert Presenter's Title (14pt) Insert Company/ (14pt)
RELIUS GOVERNMENT FORMS ©2008 SunGard. Trademark Information: SunGard, the SunGard logo, and Relius are trademarks.
Slide 1. © 2012 Invensys. All Rights Reserved. The names, logos, and taglines identifying the products and services of Invensys are proprietary marks.
Slide 1. © 2012 Invensys. All Rights Reserved. The names, logos, and taglines identifying the products and services of Invensys are proprietary marks.
Slide 1. © 2012 Invensys. All Rights Reserved. The names, logos, and taglines identifying the products and services of Invensys are proprietary marks.
Standard Operating Procedure
Identity and Access Management
Centralized Management for Barracuda Networks products
Welcome! To the ETS – Create Client Account & Maintenance
Registering on the SITE is a MULTI-STEP process:
What a non-IT auditor needs to know about IT & IT controls
This is a typical Windows user desktop
Room Booking System User Manual.
5 Way to Improve User Access
Causelink Enterprise RCA Software Introduction
System – to – System Access to Freddie Mac’s Loan Product Advisor
Presentation transcript:

© 2012 Invensys. All Rights Reserved. The names, logos, and taglines identifying the products and services of Invensys are proprietary marks of Invensys or its subsidiaries. All third party trademarks and service marks are the proprietary marks of their respective owners. IN-04 IntelaTrac Security Presented by Mark Wolfe © Invens ys 00/00/ 00 Invensys proprietary & confidential Sl id e 2

Slide 3 Agenda Introduction to IntelaTrac 4.2 Security Features Audit Logs Active Directory users for IntelaTrac Desktop Password security System Administration: IntelaTrac 4.2 vs. IntelaTrac 3.2 Major changes to user experience –Easier to configure group permissions –Easier to track permissions associated to users/groups –More relevant data associated to the same screen –Many more features to be discussed in the Super User course

Slide 4 Audit Capability All changes to all items in the permissions and setup of the IntelaTrac system A group’s permissions are changed to include editing procedures A user and role are now associated System settings are changed to allow multiple approvals in Auditor Plus Data changed as an overridden value in Auditor Plus A temp reading is changed from 990 to 99 then to 100 Failed login attempts for a user Audit data includes: Date/Time of change, person who made the change, description of the change, and the machine used to make the change

Slide 5 Active Directory and Password Security AD is for the IntelaTrac desktop client only AD integration will allow direct access to the IMC No input of IntelaTrac password IntelaTrac password will be used for Mobile IntelaTrac only If AD user is removed, the matching IntelaTrac user will be locked with no access IntelaTrac now enforces several new password strength rules Must include Uppercase and/or Lowercase Must include Numeric Must include Special Character Must be X length

Slide 6 Agenda Introduction to IntelaTrac 4.2 Security Features Audit Capability Active Directory users for IntelaTrac Desktop Password security System Administration: IntelaTrac 4.2 vs. IntelaTrac 3.2 Major changes to user experience –Easier to configure group permissions –Easier to track permissions associated to users/groups –More relevant data associated to the same screen –Many more features to be discussed in the Super User course

Slide 7 User Assignments with IntelaTrac 4.2 Base Role Group or User Permission SecurityProcedures

Slide 8 Purpose Based Administration Security Application Permission By Group/Base By User/Base System Permissions By Group/Base By User/Base Creating Bases Procedures Create Roles Assign Roles By Group/Base By User/Base

Slide 9 Security Administration

Slide 10 Permissions

Slide 11 Role Administration

Slide 12 Procedure Access

Slide 13