FOR OFFICIAL USE ONLY NISP CLASSIFIED CONFIGURATION (NCC)

FOR OFFICIAL USE ONLY NISP CLASSIFIED CONFIGURATION (NCC)

FOR OFFICIAL USE ONLY NISP CLASSIFIED CONFIGURATION (NCC) in eMASS NAO eMASS Team 8/01/2019 FOR OFFICIAL USE ONLY PROCEDURES TO ACCESS NISP-NCC-SCAP

08/01/2019 FOR OFFICIAL USE ONLY 2 STEP 1 - Hover over the System Management Tab Click on the Associations (Inheritance) tab *Note: To locate the Management tab in eMASS, you must first register a system. See the NISP eMASS Job Aid for more information. https://www.dcsa.mil/mc/ctp/tools/ 08/01/2019

FOR OFFICIAL USE ONLY DEFENSE COUNTERINTELLIGENCE AND SECURITY AGENCY 3 STEP 2 - Click on Manage Common Control Providers 08/01/2019 FOR OFFICIAL USE ONLY

DEFENSE COUNTERINTELLIGENCE AND SECURITY AGENCY 4 STEP 3 - Type NISP in the Search Box and Search 08/01/2019 FOR OFFICIAL USE ONLY DEFENSE

COUNTERINTELLIGENCE AND SECURITY AGENCY 5 STEP 4 - The NISP-NCC-SCAP System Will Display Under Search Results. 08/01/2019 FOR OFFICIAL USE ONLY DEFENSE COUNTERINTELLIGENCE AND SECURITY AGENCY

6 STEP 5 - Click Save. Once the System has moved under selected CCPs click Save 08/01/2019 FOR OFFICIAL USE ONLY DEFENSE COUNTERINTELLIGENCE AND SECURITY AGENCY 7

STEP 6 - Once Request is Approved: Go back to the Management/Inheritance tab and select the link titled NISP-NCC-SCAP (Common Control Provider). 08/01/2019 FOR OFFICIAL USE ONLY DEFENSE COUNTERINTELLIGENCE AND SECURITY AGENCY

8 STEP 7- Save Scroll to the bottom and select Save. You now have access to the file. 08/01/2019 FOR OFFICIAL USE ONLY DEFENSE COUNTERINTELLIGENCE AND SECURITY AGENCY

9 STEP 7a - To Locate the File Select the Controls tab, click on CM-2 Control. 08/01/2019 FOR OFFICIAL USE ONLY DEFENSE COUNTERINTELLIGENCE AND SECURITY AGENCY 10

STEP 8 - Locate the Artifact File and Download Within the CM-2 control, you will see 1 artifact displayed. Click on View/Manage and download the file. 08/01/2019 FOR OFFICIAL USE ONLY DEFENSE COUNTERINTELLIGENCE AND SECURITY AGENCY

11 FOR OFFICIAL USE ONLY Questions??? DCSA NAO eMASS Mailbox [email protected] 7/3/2019 ADD CLASSIFICATION HERE DEFENSE

COUNTERINTELLIGENCE AND SECURITY AGENCY 12

Recently Viewed Presentations

  • Blueprint for Japan 2020 Joichi Ito (Neoteny) Oki

    Blueprint for Japan 2020 Joichi Ito (Neoteny) Oki

    Blueprint for Japan 2020 Joichi Ito (Neoteny) Oki Matsumoto (Monex) Blueprint for Japan 2020 Condition of Diversity (1) Condition of Diversity (2) Condition of Democracy (1) "Me too" contents of Japanese newspapers Journalists are shut out by violation 70% of...
  • Time Management for Graduate Students - Boston University

    Time Management for Graduate Students - Boston University

    Time and energy management can make you more productive and reduce your stress level. The Three Steps. Set goals. Make a schedule. Revisit and revise your plan. Be tough with your time. Actively avoid procrastination and time wasters. Learn to...
  • The PEC Method - Dublin Unified School District

    The PEC Method - Dublin Unified School District

    The PEC Method A simple approach to creating Strong Writing Ways We are Asked to Write: Short responses (often one paragraph—very focused and concise, often several at a time).
  • CPC - University of Kentucky

    CPC - University of Kentucky

    Pattern Recognition. Representativeness Heuristic. Recognition of the prototypical pattern of disease "If it looks like a duck, walks like a duck, quacks like a duck, then it is a duck." Med Educ. 2004;39:98-106.
  • System Flowchart Inventory Management System

    System Flowchart Inventory Management System

    System Flowchart Inventory Management System Lucky Bhardwaj Tony Medina Jason Jung Ben Chang Asther Letada The Flowchart Table of contents Slides 4-7 describe the top 4 columns from left to right.
  • The Florida State University Building Trust: The Critical

    The Florida State University Building Trust: The Critical

    Overview of FSU's OBIEE Implementation. Define Trust and discuss why it matters in a BI Initiative. ... BI/DW Architecture. Dashboard Development. Data Integration. Data Modeling. Data Quality. Packaged Applications. Process Element.
  • PowerPoint プレゼンテーション

    PowerPoint プレゼンテーション

    Japan Internet Exchange provides IX service at the focal point of Japan's Internet traffic, KDD Otemachi Building. was founded in July 1997 with 16 shareholders including KDD, NEC, Fujitsu, JENS, SONY, TokyoInternet and Cisco Systems. uses two duplex FDDI GigaSwitches...
  • Lvaic Academc Department Chair Workshop August 19

    Lvaic Academc Department Chair Workshop August 19

    Awareness of the potential for "negligent misrepresentation," "negligent hiring," and "negligent retention" Rescind job offers when application or search discrepancies are unresolved, and maintain a record of that process. Ensure common and consistent interpretation of reference letters