Creating and Managing Shared Folders

Size: px
Start display at page:

Download "Creating and Managing Shared Folders"

Transcription

1 Creating and Managing Shared Folders Microsoft threw all sorts of new services, features, and functions into Windows 2000 Server, but at the heart of it all was still the requirement to be a good file server. Windows 2000 took the solid file sharing capabilities of Windows NT, extended them with the Distributed File System (Dfs), and made permissions and shares easier to manage not to mention that this was all on top of a more stable and powerful operating system. The release of Server 2003 brought a few enhancements, the most important being that the new default permission sets are far more secure than they were in Windows In this chapter, I will talk about what file sharing really is, how those permissions work, and how to set it all up. Next, we ll dig into the Dfs. You ll find out what it is, how it works, and how to make it work for you. Finally, you ll take the basic file sharing capabilities and push them right out to your users Web browsers. I ll also show you how to make your users files available for offline use. Basics of File Sharing The core component of any server is its ability to share files. In fact, the Server service in all of the Windows NT family, including Server 2003, handles the server s ability to share file and print resources. But what exactly does that mean, and why is it so important? By default, just because you have a server running doesn t mean it has anything available for your users. Before they can actually get to resources on the server, you must share out your resources. Let s say you have a folder on your local I: drive named APPS with three applications in subfolders, as shown in Figure When you share this folder out to the network under the name of APPS, you allow your clients to map a new drive letter on their machines to your I:\APPS folder. By mapping a drive, you are placing a virtual pointer directly to where you connected. If you map your client s M: drive to the APPS share of the server, their M: drive will look identical to the server s I:\APPS, as shown in Figure below Subfolders in I:\APPS

2 M:\ mapped to I:\APPS That s really all there is to it. Sharing resources means that you allow your users to access those resources from the network. No real processing goes into it as far as the server is concerned; it just hands out files and folders as they are. Creating Shared Folders Before you can create a shared folder, you must have appropriate rights to do so. This requires that you are either an Administrator or a Power User. You can create shares in a few ways: You can use the Explorer interface when sitting at the server or use the Computer Management Console to create shares either at the server or remotely. Creating Shares from Explorer If you re sitting at the server, the Explorer interface provides a simple and direct means for creating and managing all properties of a share. In windows explorer or my computer, go to the C: drive and create a new folder called APPS. In Explorer, right-click the APPS folder and select the Sharing and Security menu option. This will bring up the properties page for the folder APPS, already set to the Sharing tab. To share the folder, click the Share This Folder radio button, as shown in Figure below.

3 Properties for the APPS share Note If you want to stop sharing this folder later through the Explorer interface, go back into the properties as you just did and select the Do Not Share This Folder button. The Share Name option on this page is the most critical entry. This is how your users will reference this share. For our purposes, share this folder as APPS. The Description field is used to provide more descriptive information about this share. Technically, the description has no real bearing on the server or client; it just makes browsing a little less cryptic. Click OK, and your share is enabled and ready for immediate use by your users. To check it go to start run and type \\servername and you should see your new share name APPS. Or use windows explorer as shown below and in the address field type \\servername

4 Setting User Limits You can also configure how many users can connect to a share simultaneously in the User Limit area of the Sharing properties page. If the applications under your share are each licensed for 100 concurrent users you can configure your server share to maintain a that limit, even though you may have 200 users on your network. Just check the Allow This Number of Users radio button and fill in the appropriate number (it defaults to 10). As users connect to the share, they build up to the user limit. As users log off, or disconnect from the share, the number drops. This type of licensing enforcement can be handy in reducing your licensing costs. Managing Permissions Now that you ve shared out your resources to the world, it s time to protect them From the world. Of course, there are numerous ways to secure your server and its resources from the outside using routers and firewalls, for instance but by setting permissions on your files and shares, you are more likely to stop an intruder who Does manage to make it all the way past your other barriers. And, of course, this also ensures that even the folks on the inside are only allowed access to what they need. The two kinds of permissions that I ll talk about here are share permissions and file and directory (NTFS) permissions. These permissions let you control who accesses your data and what they can do with it.

5 Note NTFS (NT File System) is the most common and the most secure file system used for Windows Server. Share permissions are applied any time a user accesses a file or folder across the network, but they are not taken into consideration when a user accesses those resources locally, as they would by sitting directly at the computer or by using resources on a terminal server. NTFS permissions, in contrast, are applied no matter how a user accesses those same resources, whether they are connecting remotely or logging in at the console. So, when accessing files locally, only NTFS permissions are applied. When accessing those same files remotely, the sum of both share and NTFS permissions are applied by calculating the most restrictive permissions of the two types. Share Permissions Share permissions are possibly the easiest forms of access control you will deal with in Windows Server. Remember that share permissions only take effect whenever you try to access a computer over the network. Consider share permissions to be a kind of access pass to a secure building. When you walk up to the front door and show your identification, the guard looks up your name and gives you a pass that shows your access level for everything else on the inside. If your pass says Level One access, then your pass will get you into every door on Level One and nowhere else. Once inside, try to get into a room with Level Two access requirements, and it won t work. By defining share permissions, you can safely control the access level for each person at the front door. Keep in mind, though, that this front door or share-level permission isn t the entire picture. The share-level permission only represents the maximum level of access you will get on the inside. If you get read permissions at the share, the best you can do once you ve connected remotely to the share is read. Likewise, change permissions will grant change at best. If you want full control to anything inside the share, you need full control at the share. But understand that when I say the share permission is the maximum level of access you will get inside the share, it is entirely possible to restrict access more once you re inside, using file-level (or NTFS) permissions. You can have full control at the share, but an object inside can still have NTFS permissions that say you can only read it. Note There are cases every once in a while where you will choose one of the FAT file systems for your logical drives. FAT has no file and directory permission capabilities, which leaves your data very insecure. However, you can alleviate some of these pains through share permissions. Even on FAT partitions, you can share out folders and assign whatever level of share permissions you like. In this scenario, the share permissions are it they won t be overridden by file or directory permissions because there aren t any. If you get to change the share, you get to change everything within the share. Unfortunately, this still doesn t prevent an intruder from accessing data directly at the console. Physical security of the server is your only surefire protection. Defining Share Permissions To define share permissions, we will work through the Computer Management Console. Select the share you want to secure by right-clicking the share name and selecting Properties, then selecting the Share Permissions tab. You can get to the same place from Explorer by right-clicking the locally shared folder, selecting Sharing and Security, and then clicking the Permissions button; both methods will bring you to essentially the same dialog box which is shown in Figure below.

6 Note Note that the Everyone group, by default, has Read access permissions, which is a great step forward in the Windows world in terms of security. Until, Server 2003, the Everyone group was given Full Control access by default. Another new feature in Server 2003 is that the Everyone group no longer contains the Anonymous User account, which will help keep your resources more secure. In this dialog, you are shown a Group or User Names box that lists users and groups assigned to the share; when a user or group is selected, the permissions for that user or group to access the share are revealed. You can assign different levels of permission for different users and groups. At the share level, you have the following types of permission: Permission Level of Access Full Control The assigned group can perform any and all functions on all files and folders through the share. Change The assigned group can read and execute, as well as change and delete, files and folders through the share. Read The assigned group can read and execute files and folders, but has no ability to modify or delete anything through the share. The example in Figure above shows read access for Everyone. Although you won t see the

7 administrator s account listed with any specific rights, note that local administrators always have full control of the shares on the computer. If you want to change share permissions to give all your network administrators full control, you will need to add the group and assign them rights. Select the Add button to see the dialog box shown in Figure below. You can either type in the name of the account or group that you want to add, or click the Advanced button, which will bring you to the second Select Users, Computers, or Groups dialog box, shown in Figure This dialog box enables you to search the directory. You can either use the Active Directory search functions on the Common Queries tab to narrow down your choices or select the Find Now button, which will enumerate all of the users in the directory. From here you locate the group that you want to add the Domain Administrators group in the example and click OK and then OK again. This brings you back to the Share Permissions tab with the Domain Administrators group added to the display and highlighted. Select the Full Control check box, and as you can see in Figure 11.15, everything else is checked automatically.

8 Figure 11-14

9 Figure Again, keep in mind that share-level permissions are just your first filter for users accessing files over the network. Whatever level of permissions you get at the share level will be the highest level of permissions you can get for files and directories (the most restrictive apply, remember?). If you get read-only rights to the share, but full-control rights to the file, the share will not let you do anything other than read. File and Directory Permissions The old days of Microsoft networking (before the arrival of the NTFS file system) utilized sharelevel permissions only. Once connected to a share with a given set of permissions, you had those permissions for everything under the share. If you had 1000 users who all wanted private access to their data, you would have to create 1000 shares with specific permissions on each share. Then, with the introduction of Windows NT to the Microsoft networking platform, you could create one share for all users, and customize access via file and directory permissions permissions that could be assigned directly to the files and folders. With this new feature came an unending ability to customize the security of your data. You may hear a lot about how NTFS, in conjunction with file and directory permissions, can help you protect the server itself from an intruder. Theoretically, this is true. Assuming that you do not know an administrator username and password, if you sit down at the server, you cannot gain access to the server s data. The idea is that NTFS will not let you boot to anything less than the NT operating system and view files. This feature lets you relax a bit about the physical security of the server. You know that no one can log in to the server, and that your partitions are using the NTFS file system. Pop a DOS boot disk in, reboot the server, and you can t see a thing on the hard drive. Well, it was only a matter of time. Someone did come up with a utility that allows you to gain

10 access to NTFS partitions via a simple boot disk. Microsoft s Recovery Console, released with Windows 2000, lets you boot from the Windows 2000 Server or Professional CD. But actually, there was a similar package that existed long before Microsoft gave it to us. Mark Russinovich and Bryce Cogswell wrote a utility called NTFSDOS way back in 1996 that let you mount an NTFS volume from a boot disk. Mark is the same smart guy who discovered that the only difference between NT Workstation and NT Server code was just one Registry entry. You can still find this tool and many others through Mark and Bryce s freeware company, Sysinternals, or its sister company Winternals. (You can find out more at What all this means is that, to be secure, go back to square one: Lock your server up so no one can sit at its keyboard. Permission Types Before you assign permissions to your files and folders, you need to have a good understanding of what those permissions mean and how they work. There are two different levels of permissions. To see the higher level, go to any NTFS folder, right-click it and choose Properties, and then the Security tab. You ll see a permissions dialog box like the one in Figure Figure Compare Figure to Figure 11.15, a standard share-level permissions dialog box. Notice that share-level permissions only offered three permission types Full Control, Change, and Read. Very simple, and note that there was no Advanced button in the dialog box, unlike Figure

11 Permissions Explained Read Read permissions are your most basic rights. They allow you to view the contents, permissions, and attributes associated with an object. If that object is a file, you can view the file, which happens to include the ability to launch the file, should it be an executable program file. If the object in question is a folder, Read permissions let you view the contents of the folder. Now, here is a tricky part of folder read. Let s say that you have a folder to which you have been assigned Read permissions. That folder contains a subfolder, to which you have been denied all access, including read access. Logic would say that you could not even see that subfolder at all. Well, the subfolder, before you even get into its own attributes, is part of the original folder. Because you can read the contents of the first folder, you can see that the subfolder exists. If you try to change to that subfolder, then and only then will you get an Access Denied. Write Write permissions, as simple as they sound, have a catch. For starters, Write permissions on a folder let you create a new file or subfolder within that folder. What about Write permissions on a file? Does this mean you can change a file? Think about what happens when you change a file. To change a file, you must usually be able to open the file, or read the file. To change a file, Read permissions must accompany your Write permissions. There is a loophole though: If you can simply append data to a file, without needing to open the file, Write permissions will work. Read and Execute Read and Execute permissions are identical to Read, but give you the added atomic privilege of traversing a folder. Modify Simply put, Modify permissions are the combination of Read and Execute and Write, but give you the added luxury of Delete. Even when you could change a file, you never really could delete the file. You ll notice that, when you select permissions for files and folders, if you select Modify only, then Read, Read and Execute, and Write are automatically checked for you. Full Control Full Control is a combination of all previously mentioned permissions, with the abilities to change permissions and take ownership of objects thrown in. Full Control also allows you to delete subfolders and files, even when the subfolders and files don t specifically allow you to delete them. List Folder Contents List Folder Contents permissions apply similar permissions as Read and Execute, but they only apply to folders. List Folder Contents allows you to view the contents of folders. More important, List Folder Contents is only inherited by folders, and is only shown when looking into the security properties of a folder. The permission allows you to see that files exist in a folder similar to Read but will not apply Read permissions to those files. In comparison, if you applied Read and Execute permissions to a folder, you would be given the same capabilities to view folders and their contents, but would also propagate Read and Execute rights to files within those folders. Special Permissions Special Permissions is simply a customized grouping of atomic rights you

12 can create when one of the standard molecular permissions just covered isn t suited to your specific situation. Although it might appear that the Special Permissions feature is new to Server 2003, it did, in fact, exist in Windows It just wasn t visible as a molecular permission. In fact, in Win2K, there wasn t any way to tell whether or not a folder had customized atomic permissions unless you looked in the Advanced tab of the Securities properties sheet. In Server 2003, you can tell just by looking at the Allow/Deny check boxes used for Special Permissions whether the ACEs have been modified. If the check boxes appear shaded, then, by clicking the Advanced tab, you can view and edit those modifications. Inherited Permissions A tool that was released with Windows 2000 is the inherited permissions feature. It basically allows permissions to be passed to subfolders and files, see fig below. Quota Management On the Quota Management node of the File Server Resource Manager Microsoft Management Console (MMC) snap-in, you can perform the following tasks: Create quotas to limit the space allowed for a volume or folder and generate notifications when the quota limits are approached or exceeded.

13 Generate auto quotas that apply to all existing folders in a volume or folder, as well as to any new subfolders created in the future. Define quota templates that can be easily applied to new volumes or folders and that can be used across an organization. For Example: You can place a 200 megabytes (MB) limit on the personal folder of each user on a server, with a notification to you and the user when 180 MB of storage has been exceeded. A flexible 500 MB quota on a group's shared folder can be set. When this storage limit is reached, all users in the group are notified by that the storage quota has been temporarily extended to 520 MB, so that they can delete unnecessary files and comply with the preset 500 MB quota policy. You can receive a notification when a temporary folder reaches 2 gigabytes (GB) of usage yet not limit that folder's quota because it is necessary for a service running on your server.

14 PATH s Both Windows and Unix/Linux systems use PATH s. The use of a PATH allows files to be executed that do not reside in the current directory. For example we are in directory C:\tmp\jbloggs and we type the command cmd the cmd window will open even though it is not in the directory C;\tmp\jbolggs. The reason this happens is C:\windows\system32 where the cmd application is stored is in our PATH. Use the set command to view the full details of your path. Adding or Editing PATH

15 You should be able to 1 set up a shared folder 2 give users the correct rights on share 3 give users correct security on folders and files within the share 4 create a hidden share 5 set a quota on a drive 6 view and edit your path settings.

Chapter. Managing Group Policy MICROSOFT EXAM OBJECTIVES COVERED IN THIS CHAPTER:

Chapter. Managing Group Policy MICROSOFT EXAM OBJECTIVES COVERED IN THIS CHAPTER: Chapter 10 Managing Group Policy MICROSOFT EXAM OBJECTIVES COVERED IN THIS CHAPTER: Implement and troubleshoot Group Policy. Create a Group Policy object (GPO). Link an existing GPO. Delegate administrative

More information

Networking Lab - Vista Public Network Sharing

Networking Lab - Vista Public Network Sharing Networking Lab - Vista Public Network Sharing After completing the lab activity, you will be able to: Explain the differences between Windows XP and Windows Vista network sharing. Explain the purpose of

More information

HOUR 3. Installing Windows Server 2003

HOUR 3. Installing Windows Server 2003 HOUR 3 Installing Windows Server 2003 In this hour, we discuss the different types of Windows Server 2003 installations, such as upgrading an existing server or making a clean install on a server that

More information

CIFS Permissions Best Practices Nasuni Corporation Natick, MA

CIFS Permissions Best Practices Nasuni Corporation Natick, MA Nasuni Corporation Natick, MA Overview You use permissions to control user access to data. There are two basic considerations when using permissions to control user access to data: Which users have access

More information

File systems security: Shared folders & NTFS permissions, EFS Disk Quotas

File systems security: Shared folders & NTFS permissions, EFS Disk Quotas File systems security: Shared folders & NTFS permissions, EFS Disk Quotas (November 2, 2015) Abdou Illia, Fall 2015 1 Learning Objective Understand Shared Folders Assign Shared Folder permissions NTFS

More information

9 Administering Shared Folders

9 Administering Shared Folders 9 Administering Shared Folders Exam Objectives in this Chapter: Manage and troubleshoot access to shared folders. Create and remove shared folders. Why This Chapter Matters Control access to shared folders

More information

Installing Windows Server Update Services (WSUS) on Windows Server 2012 R2 Essentials

Installing Windows Server Update Services (WSUS) on Windows Server 2012 R2 Essentials Installing Windows Server Update Services (WSUS) on Windows Server 2012 R2 Essentials With Windows Server 2012 R2 Essentials in your business, it is important to centrally manage your workstations to ensure

More information

Cyclope Print Management Software

Cyclope Print Management Software Cyclope Print Management Software - Installation Guide - Version 4.0 for Windows 2000/XP/Vista and Windows Server 2003/2008 Cyclope-Series, 2010 Table of Contents 1. Introduction...3 2. Requirements and

More information

CTERA Agent for Windows

CTERA Agent for Windows User Guide CTERA Agent for Windows May 2012 Version 3.1 Copyright 2009-2012 CTERA Networks Ltd. All rights reserved. No part of this document may be reproduced in any form or by any means without written

More information

NETWRIX FILE SERVER CHANGE REPORTER

NETWRIX FILE SERVER CHANGE REPORTER NETWRIX FILE SERVER CHANGE REPORTER ADMINISTRATOR S GUIDE Product Version: 3.3 April/2012. Legal Notice The information in this publication is furnished for information use only, and does not constitute

More information

DeviceLock Management via Group Policy

DeviceLock Management via Group Policy User Manual DeviceLock Management via Group Policy SmartLine Inc 1 Contents Using this Manual...3 1. General Information...4 1.1 Overview...4 1.2 Applying Group Policy...5 1.3 Standard GPO Inheritance

More information

Team Foundation Server 2013 Installation Guide

Team Foundation Server 2013 Installation Guide Team Foundation Server 2013 Installation Guide Page 1 of 164 Team Foundation Server 2013 Installation Guide Benjamin Day benday@benday.com v1.1.0 May 28, 2014 Team Foundation Server 2013 Installation Guide

More information

Test Note Phone Manager Deployment Windows Group Policy Sever 2003 and XP SPII Clients

Test Note Phone Manager Deployment Windows Group Policy Sever 2003 and XP SPII Clients Test Note Phone Manager Deployment Windows Group Policy Sever 2003 and XP SPII Clients Note: I have only tested these procedures on Server 2003 SP1 (DC) and XP SPII client, in a controlled lab environment,

More information

User Guide. CTERA Agent. August 2011 Version 3.0

User Guide. CTERA Agent. August 2011 Version 3.0 User Guide CTERA Agent August 2011 Version 3.0 Copyright 2009-2011 CTERA Networks Ltd. All rights reserved. No part of this document may be reproduced in any form or by any means without written permission

More information

Installation Guide. . All right reserved. For more information about Specops Deploy and other Specops products, visit www.specopssoft.

Installation Guide. . All right reserved. For more information about Specops Deploy and other Specops products, visit www.specopssoft. . All right reserved. For more information about Specops Deploy and other Specops products, visit www.specopssoft.com Copyright and Trademarks Specops Deploy is a trademark owned by Specops Software. All

More information

Windows Server Password Recovery Techniques Courtesy of Daniel Petri http://www.petri.co.il

Windows Server Password Recovery Techniques Courtesy of Daniel Petri http://www.petri.co.il The LOGON.SCR Trick To successfully reset the local administrator's password on Windows NT and some versions of Windows 2000 follow these steps: 1. Install an alternate copy of Windows NT or Windows 2000.

More information

SHARING FILE SYSTEM RESOURCES

SHARING FILE SYSTEM RESOURCES 1 Chapter 9 SHARING FILE SYSTEM RESOURCES Chapter 9: SHARING FILE SYSTEM RESOURCES 2 CHAPTER OVERVIEW Create and manage file system shares and work with share permissions Use NTFS file system permissions

More information

Server & Workstation Installation of Client Profiles for Windows

Server & Workstation Installation of Client Profiles for Windows C ase Manag e m e n t by C l i e n t P rofiles Server & Workstation Installation of Client Profiles for Windows T E C H N O L O G Y F O R T H E B U S I N E S S O F L A W General Notes to Prepare for Installing

More information

CTERA Agent for Windows

CTERA Agent for Windows User Guide CTERA Agent for Windows September 2013 Version 4.0 Copyright 2009-2013 CTERA Networks Ltd. All rights reserved. No part of this document may be reproduced in any form or by any means without

More information

Team Foundation Server 2012 Installation Guide

Team Foundation Server 2012 Installation Guide Team Foundation Server 2012 Installation Guide Page 1 of 143 Team Foundation Server 2012 Installation Guide Benjamin Day benday@benday.com v1.0.0 November 15, 2012 Team Foundation Server 2012 Installation

More information

Lab 5 Managing Access to Shared Folders

Lab 5 Managing Access to Shared Folders Islamic University of Gaza Computer Network Lab Faculty of engineering ECOM 4121 Computer Department. Prepared by : Eng. Eman R. Al-Kurdi Managing Access to Shared Folders Objective: Manage access to shared

More information

Creating Home Directories for Windows and Macintosh Computers

Creating Home Directories for Windows and Macintosh Computers ExtremeZ-IP Active Directory Integrated Home Directories Configuration! 1 Active Directory Integrated Home Directories Overview This document explains how to configure home directories in Active Directory

More information

Introducing SQL Server Express

Introducing SQL Server Express 4402book.fm Page 1 Monday, May 8, 2006 10:52 AM Part 1 Introducing SQL Server Express Chapter 1: Introduction to SQL Server Express Chapter 2: Overview of Database Concepts Chapter 3: Overview of SQL Server

More information

Direct Storage Access Using NetApp SnapDrive. Installation & Administration Guide

Direct Storage Access Using NetApp SnapDrive. Installation & Administration Guide Direct Storage Access Using NetApp SnapDrive Installation & Administration Guide SnapDrive overview... 3 What SnapDrive does... 3 What SnapDrive does not do... 3 Recommendations for using SnapDrive...

More information

Microsoft Office 365 online archive features and FAQs

Microsoft Office 365 online archive features and FAQs Microsoft Office 365 online archive features and FAQs 1 Contents Contents... 2 Purpose... 3 Document Support Boundaries... 3 Examples used in this document... 3 Office 365 Archive... 4 Office 365 Archive

More information

WhatsUp Gold v16.3 Installation and Configuration Guide

WhatsUp Gold v16.3 Installation and Configuration Guide WhatsUp Gold v16.3 Installation and Configuration Guide Contents Installing and Configuring WhatsUp Gold using WhatsUp Setup Installation Overview... 1 Overview... 1 Security considerations... 2 Standard

More information

Xythos on Demand Quick Start Guide For Xythos Drive

Xythos on Demand Quick Start Guide For Xythos Drive Xythos on Demand Quick Start Guide For Xythos Drive What is Xythos on Demand? Xythos on Demand is not your ordinary online storage or file sharing web site. Instead, it is an enterprise-class document

More information

Security Guidelines for MapInfo Discovery 1.1

Security Guidelines for MapInfo Discovery 1.1 Security Guidelines for MapInfo Discovery 1.1 This paper provides guidelines and detailed instructions for improving the security of your Mapinfo Discovery deployment. In this document: Overview.........................................

More information

Believe it or not, you ve already been working with Active Directory! If

Believe it or not, you ve already been working with Active Directory! If Chapter 12 Active Directory, Part II In This Chapter Actively managing the Active Directory Understanding the difference between Active Directory planning and practical uses of Active Directory Optimizing

More information

Module 12. Configuring and Managing Storage Technologies. Contents:

Module 12. Configuring and Managing Storage Technologies. Contents: Configuring and Managing Storage Technologies 12-1 Module 12 Configuring and Managing Storage Technologies Contents: Lesson 1: Overview of Windows Server 2008 Storage Management 12-3 Lesson 2: Managing

More information

Team Foundation Server 2010, Visual Studio Ultimate 2010, Team Build 2010, & Lab Management Beta 2 Installation Guide

Team Foundation Server 2010, Visual Studio Ultimate 2010, Team Build 2010, & Lab Management Beta 2 Installation Guide Page 1 of 243 Team Foundation Server 2010, Visual Studio Ultimate 2010, Team Build 2010, & Lab Management Beta 2 Installation Guide (This is an alpha version of Benjamin Day Consulting, Inc. s installation

More information

Getting to Know the SQL Server Management Studio

Getting to Know the SQL Server Management Studio HOUR 3 Getting to Know the SQL Server Management Studio The Microsoft SQL Server Management Studio Express is the new interface that Microsoft has provided for management of your SQL Server database. It

More information

DeviceLock Management via Group Policy

DeviceLock Management via Group Policy User Manual DeviceLock Management via Group Policy SmartLine Inc 1 Contents Using this Manual...3 1. General Information...4 1.1 Overview...4 1.2 Applying Group Policy...5 2. DeviceLock Service Deployment...6

More information

Installation Instruction STATISTICA Enterprise Server

Installation Instruction STATISTICA Enterprise Server Installation Instruction STATISTICA Enterprise Server Notes: ❶ The installation of STATISTICA Enterprise Server entails two parts: a) a server installation, and b) workstation installations on each of

More information

DriveLock Quick Start Guide

DriveLock Quick Start Guide Be secure in less than 4 hours CenterTools Software GmbH 2012 Copyright Information in this document, including URL and other Internet Web site references, is subject to change without notice. Unless otherwise

More information

Integrating LANGuardian with Active Directory

Integrating LANGuardian with Active Directory Integrating LANGuardian with Active Directory 01 February 2012 This document describes how to integrate LANGuardian with Microsoft Windows Server and Active Directory. Overview With the optional Identity

More information

STATISTICA VERSION 9 STATISTICA ENTERPRISE INSTALLATION INSTRUCTIONS FOR USE WITH TERMINAL SERVER

STATISTICA VERSION 9 STATISTICA ENTERPRISE INSTALLATION INSTRUCTIONS FOR USE WITH TERMINAL SERVER Notes: STATISTICA VERSION 9 STATISTICA ENTERPRISE INSTALLATION INSTRUCTIONS FOR USE WITH TERMINAL SERVER 1. These instructions focus on installation on Windows Terminal Server (WTS), but are applicable

More information

Aventail Connect Client with Smart Tunneling

Aventail Connect Client with Smart Tunneling Aventail Connect Client with Smart Tunneling User s Guide Windows v8.7.0 1996-2006 Aventail Corporation. All rights reserved. Aventail, Aventail Cache Control, Aventail Connect, Aventail Connect Mobile,

More information

Acronis Backup & Recovery 10 Advanced Server Virtual Edition. Quick Start Guide

Acronis Backup & Recovery 10 Advanced Server Virtual Edition. Quick Start Guide Acronis Backup & Recovery 10 Advanced Server Virtual Edition Quick Start Guide Table of contents 1 Main components...3 2 License server...3 3 Supported operating systems...3 3.1 Agents... 3 3.2 License

More information

SmartDraw Installation Guide

SmartDraw Installation Guide SmartDraw Installation Guide System Requirements Your computer must meet these requirements in order to run SmartDraw: Windows Vista, XP or 2000 256MB RAM 3GB free hard disk space Installation Options

More information

Understanding Task Scheduler FIGURE 33.14. Task Scheduler. The error reporting screen.

Understanding Task Scheduler FIGURE 33.14. Task Scheduler. The error reporting screen. 1383 FIGURE.14 The error reporting screen. curring tasks into a central location, administrators gain insight into system functionality and control over their Windows Server 2008 R2 infrastructure through

More information

Windows XP Service Pack 2 Windows Firewall Group Policy Setup for Executive Software Products

Windows XP Service Pack 2 Windows Firewall Group Policy Setup for Executive Software Products Windows XP Service Pack 2 Windows Firewall Group Policy Setup for Executive Software Products 1.0 Overview By default, Windows XP Service Pack 2 (SP2) enables Windows Firewall, previously known as Internet

More information

How To Use Gfi Mailarchiver On A Pc Or Macbook With Gfi Email From A Windows 7.5 (Windows 7) On A Microsoft Mail Server On A Gfi Server On An Ipod Or Gfi.Org (

How To Use Gfi Mailarchiver On A Pc Or Macbook With Gfi Email From A Windows 7.5 (Windows 7) On A Microsoft Mail Server On A Gfi Server On An Ipod Or Gfi.Org ( GFI MailArchiver for Exchange 4 Manual By GFI Software http://www.gfi.com Email: info@gfi.com Information in this document is subject to change without notice. Companies, names, and data used in examples

More information

Lenovo Online Data Backup User Guide Version 1.8.14

Lenovo Online Data Backup User Guide Version 1.8.14 Lenovo Online Data Backup User Guide Version 1.8.14 Contents Chapter 1: Installing Lenovo Online Data Backup...5 Downloading the Lenovo Online Data Backup Client...5 Installing the Lenovo Online Data

More information

Creating client-server setup with multiple clients

Creating client-server setup with multiple clients Creating client-server setup with multiple clients Coffalyser.Net uses a SQL client server database model to store all project/experiment- related data. The client-server model has one main application

More information

Objectives. At the end of this chapter students should be able to:

Objectives. At the end of this chapter students should be able to: NTFS PERMISSIONS AND SECURITY SETTING.1 Introduction to NTFS Permissions.1.1 File Permissions and Folder Permission.2 Assigning NTFS Permissions and Special Permission.2.1 Planning NTFS Permissions.2.2

More information

TrueEdit Remote Connection Brief

TrueEdit Remote Connection Brief MicroPress Server Configuration Guide for Remote Applications Date Issued: February 3, 2009 Document Number: 45082597 TrueEdit Remote Connection Brief Background TrueEdit Remote (TER) is actually the same

More information

BACKUP & RESTORE (FILE SYSTEM)

BACKUP & RESTORE (FILE SYSTEM) Table of Contents Table of Contents... 1 Perform a Backup (File System)... 1 What Gets Backed Up... 2 What Does Not Get Backed Up... 3 Perform a Restore... 4 Perform a Backup (File System) The following

More information

Active Directory Change Notifier Quick Start Guide

Active Directory Change Notifier Quick Start Guide Active Directory Change Notifier Quick Start Guide Software version 3.0 Mar 2014 Copyright 2014 CionSystems Inc., All Rights Reserved Page 1 2014 CionSystems Inc. ALL RIGHTS RESERVED. This guide may not

More information

Citrix Systems, Inc.

Citrix Systems, Inc. Citrix Password Manager Quick Deployment Guide Install and Use Password Manager on Presentation Server in Under Two Hours Citrix Systems, Inc. Notice The information in this publication is subject to change

More information

User Guide. Version 3.2. Copyright 2002-2009 Snow Software AB. All rights reserved.

User Guide. Version 3.2. Copyright 2002-2009 Snow Software AB. All rights reserved. Version 3.2 User Guide Copyright 2002-2009 Snow Software AB. All rights reserved. This manual and computer program is protected by copyright law and international treaties. Unauthorized reproduction or

More information

Installation Instruction STATISTICA Enterprise Small Business

Installation Instruction STATISTICA Enterprise Small Business Installation Instruction STATISTICA Enterprise Small Business Notes: ❶ The installation of STATISTICA Enterprise Small Business entails two parts: a) a server installation, and b) workstation installations

More information

Documentum Desktop Client on Windows 2000 Terminal Services

Documentum Desktop Client on Windows 2000 Terminal Services Documentum Desktop Client on Windows 2000 Terminal Services Docbase Version 1.0 May 10, 2001 Documentum Desktop Client on Windows Terminal Services Page 2 Revision History Docbase Version Revised Date

More information

Installing GFI MailSecurity

Installing GFI MailSecurity Installing GFI MailSecurity Introduction This chapter explains how to install and configure GFI MailSecurity. You can install GFI MailSecurity directly on your mail server or you can choose to install

More information

Basic ESXi Networking

Basic ESXi Networking Basic ESXi Networking About vmnics, vswitches, management and virtual machine networks In the vsphere client you can see the network diagram for your ESXi host by clicking Networking on the Configuration

More information

SETTING UP REMOTE ACCESS ON EYEMAX PC BASED DVR.

SETTING UP REMOTE ACCESS ON EYEMAX PC BASED DVR. SETTING UP REMOTE ACCESS ON EYEMAX PC BASED DVR. 1. Setting up your network to allow incoming connections on ports used by Eyemax system. Default ports used by Eyemax system are: range of ports 9091~9115

More information

523 Non-ThinManager Components

523 Non-ThinManager Components 28 Non-ThinManager Components Microsoft Terminal Servers play an important role in the ThinManager system. It is recommended that you become familiar with the documentation provided by Microsoft about

More information

How To Use 1Bay 1Bay From Awn.Net On A Pc Or Mac Or Ipad (For Pc Or Ipa) With A Network Box (For Mac) With An Ipad Or Ipod (For Ipad) With The

How To Use 1Bay 1Bay From Awn.Net On A Pc Or Mac Or Ipad (For Pc Or Ipa) With A Network Box (For Mac) With An Ipad Or Ipod (For Ipad) With The 1-bay NAS User Guide INDEX Index... 1 Log in... 2 Basic - Quick Setup... 3 Wizard... 3 Add User... 6 Add Group... 7 Add Share... 9 Control Panel... 11 Control Panel - User and groups... 12 Group Management...

More information

A Roadmap for Securing IIS 5.0

A Roadmap for Securing IIS 5.0 This document was grafted together from various Web and other sources by Thomas Jerry Scott for use in his Web and other Security courses. Jerry hopes you find this information helpful in your quest to

More information

Moving the TRITON Reporting Databases

Moving the TRITON Reporting Databases Moving the TRITON Reporting Databases Topic 50530 Web, Data, and Email Security Versions 7.7.x, 7.8.x Updated 06-Nov-2013 If you need to move your Microsoft SQL Server database to a new location (directory,

More information

1. Set Daylight Savings Time... 3. 2. Create Migrator Account... 3. 3. Assign Migrator Account to Administrator group... 4

1. Set Daylight Savings Time... 3. 2. Create Migrator Account... 3. 3. Assign Migrator Account to Administrator group... 4 1. Set Daylight Savings Time... 3 a. Have client log into Novell/Local Machine with Administrator Account...3 b. Access Adjust Date/Time...3 c. Make sure the time zone is set to Central Time...3 2. Create

More information

Deploying Remote Desktop Connection Broker with High Availability Step-by-Step Guide

Deploying Remote Desktop Connection Broker with High Availability Step-by-Step Guide Deploying Remote Desktop Connection Broker with High Availability Step-by-Step Guide Microsoft Corporation Published: May 2010 Abstract This guide describes the steps for configuring Remote Desktop Connection

More information

HP StorageWorks Automated Storage Manager User Guide

HP StorageWorks Automated Storage Manager User Guide HP StorageWorks Automated Storage Manager User Guide Part Number: 5697 0422 First edition: June 2010 Legal and notice information Copyright 2010, 2010 Hewlett-Packard Development Company, L.P. Confidential

More information

Outpost Network Security

Outpost Network Security Administrator Guide Reference Outpost Network Security Office Firewall Software from Agnitum Abstract This document provides information on deploying Outpost Network Security in a corporate network. It

More information

Windows Operating Systems. Basic Security

Windows Operating Systems. Basic Security Windows Operating Systems Basic Security Objectives Explain Windows Operating System (OS) common configurations Recognize OS related threats Apply major steps in securing the OS Windows Operating System

More information

ILTA HANDS ON Securing Windows 7

ILTA HANDS ON Securing Windows 7 Securing Windows 7 8/23/2011 Table of Contents About this lab... 3 About the Laboratory Environment... 4 Lab 1: Restricting Users... 5 Exercise 1. Verify the default rights of users... 5 Exercise 2. Adding

More information

SonicWALL CDP 5.0 Microsoft Exchange InfoStore Backup and Restore

SonicWALL CDP 5.0 Microsoft Exchange InfoStore Backup and Restore SonicWALL CDP 5.0 Microsoft Exchange InfoStore Backup and Restore Document Scope This solutions document describes how to configure and use the Microsoft Exchange InfoStore Backup and Restore feature in

More information

Network Setup Instructions

Network Setup Instructions Network Setup Instructions This document provides technical details for setting up the Elite Salon & Spa Management program in a network environment. If you have any questions, please contact our Technical

More information

Xcalibur. Foundation. Administrator Guide. Software Version 3.0

Xcalibur. Foundation. Administrator Guide. Software Version 3.0 Xcalibur Foundation Administrator Guide Software Version 3.0 XCALI-97520 Revision A May 2013 2013 Thermo Fisher Scientific Inc. All rights reserved. LCquan, Watson LIMS, and Web Access are trademarks,

More information

How To Set Up A Two Node Hyperv Cluster With Failover Clustering And Cluster Shared Volume (Csv) Enabled

How To Set Up A Two Node Hyperv Cluster With Failover Clustering And Cluster Shared Volume (Csv) Enabled Getting Started with Hyper-V and the Scale Computing Cluster Scale Computing 5225 Exploration Drive Indianapolis, IN, 46241 Contents Contents CHAPTER 1 Introduction to Hyper-V: BEFORE YOU START. vii Revision

More information

Lepide Exchange Recovery Manager

Lepide Exchange Recovery Manager Configuration Guide Lepide Exchange Recovery Manager Lepide Software Private Limited, All Rights Reserved This User Guide and documentation is copyright of Lepide Software Private Limited, with all rights

More information

Online Backup Client User Manual Linux

Online Backup Client User Manual Linux Online Backup Client User Manual Linux 1. Product Information Product: Online Backup Client for Linux Version: 4.1.7 1.1 System Requirements Operating System Linux (RedHat, SuSE, Debian and Debian based

More information

NetWrix Server Configuration Monitor

NetWrix Server Configuration Monitor NetWrix Server Configuration Monitor Version 2.2 Quick Start Guide Contents NetWrix Server Configuration Monitor Quick Start Guide 1. INTRODUCTION... 3 1.1 KEY FEATURES... 3 1.2 LICENSING... 4 1.3 HOW

More information

Basic Setup Guide. Remote Administrator 4 NOD32 Antivirus 4 Business Edition Smart Security 4 Business Edition

Basic Setup Guide. Remote Administrator 4 NOD32 Antivirus 4 Business Edition Smart Security 4 Business Edition Basic Setup Guide Remote Administrator 4 NOD32 Antivirus 4 Business Edition Smart Security 4 Business Edition Contents Getting started...1 Software components...1 Section 1: Purchasing and downloading

More information

Veritas Cluster Server Database Agent for Microsoft SQL Configuration Guide

Veritas Cluster Server Database Agent for Microsoft SQL Configuration Guide Veritas Cluster Server Database Agent for Microsoft SQL Configuration Guide Windows 2000, Windows Server 2003 5.0 11293743 Veritas Cluster Server Database Agent for Microsoft SQL Configuration Guide Copyright

More information

Hyperoo 2 User Guide. Hyperoo 2 User Guide

Hyperoo 2 User Guide. Hyperoo 2 User Guide 1 Hyperoo 2 User Guide 1 2 Contents How Hyperoo Works... 3 Installing Hyperoo... 3 Hyperoo 2 Management Console... 4 The Hyperoo 2 Server... 5 Creating a Backup Array... 5 Array Security... 7 Previous

More information

Universal Management Service 2015

Universal Management Service 2015 Universal Management Service 2015 UMS 2015 Help All rights reserved. No parts of this work may be reproduced in any form or by any means - graphic, electronic, or mechanical, including photocopying, recording,

More information

Group Policy for Beginners

Group Policy for Beginners Group Policy for Beginners Microsoft Corporation Published: April 2011 Abstract Group Policy is the essential way that most organizations enforce settings on their computers. This white paper introduces

More information

Virtual CD v10. Network Management Server Manual. H+H Software GmbH

Virtual CD v10. Network Management Server Manual. H+H Software GmbH Virtual CD v10 Network Management Server Manual H+H Software GmbH Table of Contents Table of Contents Introduction 1 Legal Notices... 2 What Virtual CD NMS can do for you... 3 New Features in Virtual

More information

Step-by-Step Guide to Securing Windows XP Professional with Service Pack 2 in Small and Medium Businesses

Step-by-Step Guide to Securing Windows XP Professional with Service Pack 2 in Small and Medium Businesses Step-by-Step Guide to Securing Windows XP Professional with Service Pack 2 in Small and Medium Businesses 2004 Microsoft Corporation. All rights reserved. This document is for informational purposes only.

More information

CEFNS Web Hosting a Guide for CS212

CEFNS Web Hosting a Guide for CS212 CEFNS Web Hosting a Guide for CS212 INTRODUCTION: TOOLS: In CS212, you will be learning the basics of web development. Therefore, you want to keep your tools to a minimum so that you understand how things

More information

Installing Active Directory

Installing Active Directory Installing Active Directory 119 Installing Active Directory Installing Active Directory is an easy and straightforward process as long as you planned adequately and made the necessary decisions beforehand.

More information

CommuniGate Mail Archiving and Cleanup with Outlook 2007

CommuniGate Mail Archiving and Cleanup with Outlook 2007 CommuniGate Mail Archiving and Cleanup with Outlook 2007 Some users are hitting quota limits in CommuniGate e-mail accounts. In other words, there are too many e-mails in their account folders on the server.

More information

Activity 1: Scanning with Windows Defender

Activity 1: Scanning with Windows Defender Activity 1: Scanning with Windows Defender 1. Click on Start > All Programs > Windows Defender 2. Click on the arrow next to Scan 3. Choose Custom Scan Page 1 4. Choose Scan selected drives and folders

More information

Web Service for SKF @ptitude Observer. Installation Manual. Part No. 32179700 Revision A

Web Service for SKF @ptitude Observer. Installation Manual. Part No. 32179700 Revision A Web Service for SKF @ptitude Observer Part No. 32179700 Revision A Copyright 2009 by SKF Reliability Systems All rights reserved. Aurorum 30, 977 75 Luleå Sweden Telephone: +46 (0) 920 758 00, Fax: +46

More information

The safer, easier way to help you pass any IT exams. Exam : 9L0-518. OS X Server Essentials 10.8 Exam. Title : Version : Demo 1 / 6

The safer, easier way to help you pass any IT exams. Exam : 9L0-518. OS X Server Essentials 10.8 Exam. Title : Version : Demo 1 / 6 Exam : 9L0-518 Title : OS X Server Essentials 10.8 Exam Version : Demo 1 / 6 1.In Server app, which procedure will configure OS X Server to let members of a specific group use the Messages service? A.

More information

Check Point FDE integration with Digipass Key devices

Check Point FDE integration with Digipass Key devices INTEGRATION GUIDE Check Point FDE integration with Digipass Key devices 1 VASCO Data Security Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document

More information

Acronis Backup & Recovery 10 Advanced Server SBS Edition. Installation Guide

Acronis Backup & Recovery 10 Advanced Server SBS Edition. Installation Guide Acronis Backup & Recovery 10 Advanced Server SBS Edition Installation Guide Table of Contents 1. Installation of Acronis Backup & Recovery 10... 3 1.1. Acronis Backup & Recovery 10 components... 3 1.1.1.

More information

How to install and use the File Sharing Outlook Plugin

How to install and use the File Sharing Outlook Plugin How to install and use the File Sharing Outlook Plugin Thank you for purchasing Green House Data File Sharing. This guide will show you how to install and configure the Outlook Plugin on your desktop.

More information

CONFIGURING TARGET ACTIVE DIRECTORY DOMAIN FOR AUDIT BY NETWRIX AUDITOR

CONFIGURING TARGET ACTIVE DIRECTORY DOMAIN FOR AUDIT BY NETWRIX AUDITOR CONFIGURING TARGET ACTIVE DIRECTORY DOMAIN FOR AUDIT BY NETWRIX AUDITOR TECHNICAL ARTICLE Product Version: 5.0 July 2013. Legal Notice The information in this publication is furnished for information use

More information

Table of Contents. OpenDrive Drive 2. Installation 4 Standard Installation Unattended Installation

Table of Contents. OpenDrive Drive 2. Installation 4 Standard Installation Unattended Installation User Guide for OpenDrive Application v1.6.0.4 for MS Windows Platform 20150430 April 2015 Table of Contents Installation 4 Standard Installation Unattended Installation Installation (cont.) 5 Unattended

More information

Moving the Web Security Log Database

Moving the Web Security Log Database Moving the Web Security Log Database Topic 50530 Web Security Solutions Version 7.7.x, 7.8.x Updated 22-Oct-2013 Version 7.8 introduces support for the Web Security Log Database on Microsoft SQL Server

More information

Welcome to the QuickStart Guide

Welcome to the QuickStart Guide QuickStart Guide Welcome to the QuickStart Guide This QuickStart Guide provides the information you need to install and start using Express Software Manager. For more comprehensive help on using Express

More information

Setting up VPN and Remote Desktop for Home Use

Setting up VPN and Remote Desktop for Home Use Setting up VPN and Remote Desktop for Home Use Contents I. Prepare Your Work Computer... 1 II. Prepare Your Home Computer... 2 III. Run the VPN Client... 3-4 IV. Remote Connect to Your Work Computer...

More information

IIS, FTP Server and Windows

IIS, FTP Server and Windows IIS, FTP Server and Windows The Objective: To setup, configure and test FTP server. Requirement: Any version of the Windows 2000 Server. FTP Windows s component. Internet Information Services, IIS. Steps:

More information

EMAIL QUICK START GUIDE

EMAIL QUICK START GUIDE IT Services Microsoft Outlook 2010 EMAIL QUICK START GUIDE Contents What is Outlook?...2 Quick Guide to Email...2 Create a new e-mail message...2 Forward or reply to an e-mail message...2 Creating new

More information

Windows XP Virtual Private Network Connection Setup Instructions

Windows XP Virtual Private Network Connection Setup Instructions Windows XP Virtual Private Network Connection Setup Instructions Find your My Network Places icon on your desktop or in your control panel under Network and Internet Connections By default, this is NOT

More information

FTP Service Reference

FTP Service Reference IceWarp Unified Communications Reference Version 11.3 Published on 1/6/2015 Contents... 3 About... 4 Reference... 5 General Tab... 5 Dialog... 6 FTP Site... 6 Users... 7 Groups... 11 Options... 14 Access...

More information

Using the IPMI interface

Using the IPMI interface Using the IPMI interface The T800, T1600 and T3200 server models are equipped with an IPMI interface with KVM / IP functionality. This enables you to access the server console if it becomes inaccessible

More information

How to Setup and Connect to an FTP Server Using FileZilla. Part I: Setting up the server

How to Setup and Connect to an FTP Server Using FileZilla. Part I: Setting up the server How to Setup and Connect to an FTP Server Using FileZilla The ability to store data on a server and being able to access the data from anywhere in the world has allowed us to get rid of external flash

More information