CC4 TEN: Pre-installation instructions for Windows Server networks
|
|
- Cornelia Powell
- 8 years ago
- Views:
Transcription
1 CC4 TEN: Pre-installation instructions for Windows Server networks Contents Introduction to CC4 TEN... 1 How the transition works... 3 Your pre-installation tasks... 5 Back up your servers... 5 Ensure you have no Enforced GPOs at the root of the domain... 5 Check group locations in the Active Directory... 7 Create the RMInstall user... 7 Resolve any pre-installation Health Check issues... 8 Record locations for third-party applications... 8 Further information... 9 Appendix A: Checklist of pre-installation tasks Introduction to CC4 TEN This guide is written for administrators of Microsoft Windows Server networks, in preparation for an installation of CC4 Tools for Existing Networks (TEN). You must read it carefully to understand what s involved and the preparation tasks you ll need to complete. CC4 TEN delivers a CC4 Matrix solution, which allows you to manage your network using the Community Connect 4 system designed for educational establishments. This document first gives a brief overview of CC4 Matrix and the transition process, and then presents the preinstallation instructions. The CC4 TEN transition process for Windows Server networks is a joint project between the customer and RM: 1. First, you must complete all the pre-installation tasks (see page 5). 2. Next, an RM-trained installation engineer makes a site visit to install a CC4 First server, and optionally one or more CC4 User Storage servers. 3. You then complete the transition at a schedule that suits your establishment, following the instructions in the CC4 TEN: Transition Guide for Windows Server networks. Keep both documents and read them together, along with the Reference Manual for CC4.3 networks. Important We have designed TEN to minimise the down-time for your network. However, as with any network installation, you will need to allow time in your planning to address any issues that may arise during the transition. RM Education YJ-486 v1.0 1
2 CC4 Tools for Existing Networks Comparing CC4 Matrix with a standard CC4 network CC4 Tools for Existing Networks (TEN) provides a full set of CC4 network management tools for use on an existing Windows Server network. TEN delivers the CC4 Matrix network architecture, which differs from that of a standard CC4 network: In a standard CC4 network, the CC4 First server (i.e. the server hosting the CC4 database) is the Forest Root domain controller. In a CC4 Matrix environment, the CC4 First server is a member server, thus keeping Active Directory and CC4 functions separate. CC4 Matrix is more flexible and can be installed at any time of the year. It is quicker and cheaper to install, with minimal down-time for the network and more customer control over the transition process. The CC4 Matrix network architecture conforms to Microsoft s best practice recommendations. Compatibility of CC4 features with CC4 Matrix Most CC4 features are compatible with CC4 Matrix; a few are not. CC4 feature CC4 CC4 Matrix RM Auditor RM App Wizard RM Connector RM Easylink RM Explorer RM Hardware Configuration Manager RM Internet Access Manager (XP) RM Learning Resources RM Local Tools Support RM Mobile Tools RM Tutor RM Type Manager Virtual CD 2 Vanilla and CC4 networks For convenience and clarity, we will refer throughout this guide to vanilla networks, servers, workstations and users, as an informal way of describing Windows Server networks where Community Connect management tools are not used.
3 Pre-installation instructions for Windows Server networks How the transition works Note It is essential that you complete all the preparation tasks before the CC4 First server installation. After that, the flexibility of CC4 TEN will allow you to plan your own convenient schedule for moving users, workstations and user servers to CC4. To prepare for the installation: i. You complete the network pre-installation tasks and checks (see Preparing for the installation on page 5). ii. iii. RM performs a remote health check of your existing vanilla network, to verify that it is ready for the CC4 First server installation. If necessary, you resolve any issues identified by the remote health check. The transition stages are as follows: I. An RM-trained engineer installs a CC4 First server to the existing network. This is a member server running Windows Server 2008 R2. II. You can then build CC4 workstations and laptops, and use the RM Management Console (RMMC) to manage them. Once a CC4 workstation is built, packages can be deployed to it, CC4 users can log on to it and locations can be managed. 3
4 CC4 Tools for Existing Networks III. At this point you can create either CC4 or vanilla users. If you set up hybrid policies in CC4, your vanilla users can work at either vanilla or CC4 computers. A hybrid network may look something like this: IV. The final stage is for you to migrate the vanilla user accounts into CC4, so that all users are managed by CC4. Existing account data for vanilla users will also need to be moved to CC4 server(s) for full functionality. (Alternatively, you could maintain a hybrid network indefinitely.) If existing vanilla user servers need to be recommissioned as CC4 User Storage servers, this is done by an RM-trained engineer. The final network may look something like this: 4
5 Pre-installation instructions for Windows Server networks Planning your transition This is our general recommendation: Maintain your vanilla user accounts during the transition. When you need to add new accounts, create vanilla users for people who will need access to vanilla (as well as CC4) workstations. Create CC4 users for people who will only need access to CC4 (and not vanilla) workstations. Once you have moved all your workstations to CC4, move all your vanilla users to CC4 and create only new CC4 users. This is discussed in more detail in the CC4 TEN: Transition Guide for Windows Server networks. Know your network! As with any network installation, planning and organisation will pay dividends. The better you prepare, the easier you will find it to make changes and diagnose any issues that could arise. Your pre-installation tasks Please ensure that all the following tasks are completed before the installation engineer s visit to install the CC4 First server. We suggest that you use the checklist in Appendix A to keep track of progress. Back up your servers Ensure that you have recent, valid backups of your domain controllers System State and data, and test that the servers can be restored from the backups (see Appendix A: Checklist of pre-installation tasks ). Ensure you have no Enforced GPOs at the root of the domain We strongly recommend that you do not have 'Enforced' GPOs at the root of the domain. This is because settings in those GPOs will apply to objects in CC4 s isolated area of the Active Directory, the Establishments OU, once that is created. If you have Enforced GPOs in locations other than the root of the domain, this will not cause any issues. To check for Enforced GPOs at the root of the domain 1. From the Start menu, choose Administrative Tools, Group Policy Management. 2. In the left-hand pane, expand Forest: <forestname>, Domains, and select the node for the domain. 3. In the right-hand pane, check for any GPOs with a padlock symbol. GPOs with a padlock symbol are Enforced. If any GPOs in the root of the domain are Enforced, you have two options to resolve this: 5
6 CC4 Tools for Existing Networks Leave the GPO at the root of the domain, but convert it to be non-enforced. Move the GPO to a lower level (for example, into an OU called MySchool) where its Enforced setting will not affect the rest of the domain. To convert an Enforced GPO to be non-enforced 1. From the Start menu, choose Administrative Tools, Group Policy Management. 2. In the left-hand pane, expand Forest: <forestname>, Domains, and select the node for the domain. In the right-hand pane, click the Group Policy Inheritance tab and note the precedence of the enforced GPO in the list. 3. Now select each sub-ou in turn, noting the precedence of the enforced GPO in each list. 4. In the left-hand pane, select the domain node again and click the Linked Group Policy Objects tab. 5. In the right-hand pane, right-click the GPO and un-tick the Enforced option. 6. At the domain node, and any sub-ous in turn: If the previously enforced GPO is not present: i. In the left-hand pane, right-click the domain node or OU and choose Link an Existing GPO... ii. From the list, choose the previously Enforced GPO and click OK. If the previously enforced GPO is present, check that its ordering is still appropriate on the Group Policy Inheritance tab. If its ordering needs changing: i. Click the Linked Group Policy Objects tab. ii. Select the previously enforced GPO and reorder it, using the up and down arrows. iii. Check the results on the Group Policy Inheritance tab. To move an enforced GPO to a lower level 1. From the Start menu, choose Administrative Tools, Group Policy Management. 2. In the left-hand pane of the Group Policy Management window, expand the domain node and select the target OU where you want to move the enforced GPO. Right-click and choose Link an Existing GPO In the Select GPO window, choose the enforced GPO from the list and click OK. 6
7 Pre-installation instructions for Windows Server networks 4. In the left-hand pane, select the domain node, and in the right-hand pane click the Linked Group Policy Objects tab. In the list of GPOs, right-click the enforced GPO and choose Delete. Click OK to confirm. This deletes the GPO link rather than the GPO itself. Check group locations in the Active Directory CC4 requires that the built-in Domain Admins and Domain Users groups are both in the Users OU, which is their default location. To check the location of the groups 1. From the Start menu, choose Administrative Tools, Active Directory Users and Computers. 2. In the left-hand pane select Users. 3. In the right-hand pane, verify that the groups Domain Admins and Domain Users are both listed. If either group is not in the Users OU, you will need to find and move it, as follows: To find and move the groups 1. Right-click the Domain name and choose Find. 2. Enter the Name of the group and click Find Now. 3. If you find the group, right-click it and choose Move; then select the Users OU and click OK. If you cannot find the group, it must have been renamed. You will need to find the group, rename it to its original name, and move it to the Users OU. Create the RMInstall user You need to create a special user to commission the CC4 First server. The user s name must be RMInstall, and it must be a member of the Domain Admins, Schema Admins, Enterprise Admins groups. It should be created in a new OU, itself named RMInstall, which has GPO inheritance blocked. To create the RMInstall OU 1. From the Start menu, choose Administrative Tools, Active Directory Users and Computers. 2. In the left-hand pane, right-click the Domain name and choose New, Organizational Unit. 3. Enter the name RMInstall and click OK. 4. From the Start menu, choose Administrative Tools, Group Policy Management. 5. In the left-hand pane, expand Forest <forestname>, Domains, <domainname>. 7
8 CC4 Tools for Existing Networks 6. Right-click RMInstall and tick Block Inheritance. To create the RMInstall user 1. In Active Directory Users and Computers, right-click RMInstall and choose New, User. 2. Enter RMInstall as the First name and also as the User logon name. Click Next. 3. Complete the password details as follows: Enter a Password for the user. This password must be provided to RM via your installation coordinator and made available to the installation engineer on the day of the installation; we suggest you use Change_Me. Untick User must change password at next logon. Tick Password never expires. 4. Click Next. Check the details and click Finish. 5. Click the RMInstall OU. The RMInstall user is displayed in the right-hand pane. 6. Double-click the RMInstall user to display the Properties window. 7. On the Member Of tab, verify that RMInstall is already a member of the Domain Users group. 8. Click Add. 9. Enter Domain Admins;Schema Admins; Enterprise Admins and click Check Names. Verify that all three names are resolved to accounts. 10. Click OK, OK. Note Once your CC4 installation has been completed successfully, you may disable the RMInstall user account, or remove it from your network entirely. Resolve any pre-installation Health Check issues We will dial in to your site at an agreed time, to check that these preinstallation tasks have been completed. The check will also check for reserved names, identifying any users, groups or Group Policy Objects that have the same name as items we will create during the installation of CC4. Support calls will be raised for any items of concern, giving you the opportunity to resolve issues before the day of the installation. Record locations for third-party applications Ensure that you know the locations where third-party applications look for information, so that these can be reset promptly following migration to new servers. 8
9 Pre-installation instructions for Windows Server networks Further information Licensing requirements As with any Community Connect network, a CC4 licence is needed for each CC4 server and a CC4 computer licence for each CC4 computer built. You will also need to ensure you have enough Windows Server 2008 R2 server licences for the CC4 servers. You also require Customer Access Licences (CALs) for the workstations. Other required purchases? During the transition to a CC4 network, you may need extra servers. You may be able to minimise the extra kit required by using external storage to store shared data from an existing server so that it can be rebuilt as a CC4 User Server. If you have a virtual environment you will find this process more straightforward, as you may be able to create extra Windows servers and avoid having to invest in more physical servers. Any CC4 servers will need to be installed by RM. Please make sure you have considered what your transition path looks like, and that you are comfortable about the steps you will need to take and the possible hardware requirements that go with them. Your RM Account Manager will be happy to discuss this with you and advise on the best options for your establishment. Legacy Windows 2000 servers Windows 2000 Server (W2000S) is no longer supported on Community Connect networks. If any legacy W2000S servers are still on your network, this will be identified as an issue by RM s remote TEN readiness check. You will need to purchase a decommissioning service, to take place during the CC4 First server. You must transfer any data that you need from these servers before the, or it will be lost. Coordinating your installation We will assign a project coordinator to your establishment to help organise the installation date and check your progress with the pre-installation tasks. Training Customers who purchase TEN will receive expert training. The level of training will depend on the experience of the people managing the network. Support Make sure that your CC4 TEN support contract extends for at least the full duration of your transition to CC4 Matrix. Note that RM can also provide support for your vanilla Windows Server network. Integrating your support could simplify your arrangements and allow us to support you more effectively. 9
10 CC4 Tools for Existing Networks Further documentation For guidance and instructions for the CC4 TEN transition tasks, see CC4 TEN: Transition guide for Windows Server networks. This and other reference articles are available in the Knowledge Library at the RM Education Support website. 10
11 Pre-installation instructions for Windows Server networks Appendix A: Checklist of pre-installation tasks Use the checklist below to record your completed actions and estimate the time needed: Test server backup and restore When to do Approx. time to allow Done 1 System State backed up to local hard drive on all servers. 30 min/ server 2 Full server backup taken of all servers. 1 day 3 Test restore from all backups successfully carried out. 1 day Other tasks When to do Approx. time to allow Done 4 Ensure you have no Enforced GPOs at the root of the domain (see page 5). 30 min 5 Verify the location of Domain Admins and Domain Users groups (see page 7). 5 min 6 Create the RMInstall user (see page 7). 15 min 7 Resolve all issues raised by the RM remote pre-installation Health Check. Before Varies 8 Record locations for third-party applications (see page 8) Before 15 min Checklist key: When to do Approx. time to allow Done Our recommendation for when you should carry out the task. Ideally, starting one month before your initial installation date should give you plenty of time to address any issues that may arise. How long it may take you to carry out this task if no issues arise and the network is not changed. The actual time required will depend on factors such as the amount of data to be backed up. Tick this box when you ve completed the task, to keep a progress record. Note Bear in mind that RM Support s remote TEN readiness check may uncover further issues with your network that you will need to resolve before the date of your CC4 First server. 11
Create, Link, or Edit a GPO with Active Directory Users and Computers
How to Edit Local Computer Policy Settings To edit the local computer policy settings, you must be a local computer administrator or a member of the Domain Admins or Enterprise Admins groups. 1. Add the
More informationUsing Group Policies to Install AutoCAD. CMMU 5405 Nate Bartley 9/22/2005
Using Group Policies to Install AutoCAD CMMU 5405 Nate Bartley 9/22/2005 Before we get started This manual provides a step-by-step process for creating a Group Policy that will install AutoCAD to a Windows
More information+27O.557+! RM Auditor Additions - Web Monitor. Contents
RM Auditor Additions - Web Monitor Contents RM Auditor Additions - Web Monitor... 1 Introduction... 2 Installing Web Monitor... 2 Overview... 2 Pre-requisites for installation... 2 Server installation...
More informationLab A: Deploying and Managing Software by Using Group Policy Answer Key
Lab A: Deploying and Managing Software by Using Group Policy Answer Key Exercise 1 Assigning Software This Answer Key provides the detailed steps for completing Lab A: Deploying and Managing Software by
More informationGroup Policy for Beginners
Group Policy for Beginners Microsoft Corporation Published: April 2011 Abstract Group Policy is the essential way that most organizations enforce settings on their computers. This white paper introduces
More informationChapter. Managing Group Policy MICROSOFT EXAM OBJECTIVES COVERED IN THIS CHAPTER:
Chapter 10 Managing Group Policy MICROSOFT EXAM OBJECTIVES COVERED IN THIS CHAPTER: Implement and troubleshoot Group Policy. Create a Group Policy object (GPO). Link an existing GPO. Delegate administrative
More informationAdministering Group Policy with Group Policy Management Console
Administering Group Policy with Group Policy Management Console By Jim Lundy Microsoft Corporation Published: April 2003 Abstract In conjunction with Windows Server 2003, Microsoft has released a new Group
More informationStep-by-Step Guide for Microsoft Advanced Group Policy Management 4.0
Step-by-Step Guide for Microsoft Advanced Group Policy Management 4.0 Microsoft Corporation Published: September 2009 Abstract This step-by-step guide describes a sample scenario for installing Microsoft
More informationWindows Firewall Configuration with Group Policy for SyAM System Client Installation
with Group Policy for SyAM System Client Installation SyAM System Client can be deployed to systems on your network using SyAM Management Utilities. If Windows Firewall is enabled on target systems, it
More informationActive Directory Change Notifier Quick Start Guide
Active Directory Change Notifier Quick Start Guide Software version 3.0 Mar 2014 Copyright 2014 CionSystems Inc., All Rights Reserved Page 1 2014 CionSystems Inc. ALL RIGHTS RESERVED. This guide may not
More informationsafend a w a v e s y s t e m s c o m p a n y
safend a w a v e s y s t e m s c o m p a n y SAFEND Data Protection Suite Installation Guide Version 3.4.5 Important Notice This guide is delivered subject to the following conditions and restrictions:
More informationDigitalPersona Pro Server for Active Directory v4.x Quick Start Installation Guide
DigitalPersona Pro Server for Active Directory v4.x Quick Start Installation Guide 1 of 7 DigitalPersona Pro Server for Active Directory v4.x Quick Start Installation Guide Process Overview Step Description
More informationTool Tip. SyAM Management Utilities and Non-Admin Domain Users
SyAM Management Utilities and Non-Admin Domain Users Some features of SyAM Management Utilities, including Client Deployment and Third Party Software Deployment, require authentication credentials with
More informationAdministration Guide. . All right reserved. For more information about Specops Deploy and other Specops products, visit www.specopssoft.
. All right reserved. For more information about Specops Deploy and other Specops products, visit www.specopssoft.com Copyright and Trademarks Specops Deploy is a trademark owned by Specops Software. All
More informationSARANGSoft WinBackup Business v2.5 Client Installation Guide
SARANGSoft WinBackup Business v2.5 Client Installation Guide (November, 2015) WinBackup Business Client is a part of WinBackup Business application. It runs in the background on every client computer that
More informationInstalling Windows Server Update Services (WSUS) on Windows Server 2012 R2 Essentials
Installing Windows Server Update Services (WSUS) on Windows Server 2012 R2 Essentials With Windows Server 2012 R2 Essentials in your business, it is important to centrally manage your workstations to ensure
More informationWindows Domain Network Configuration Guide
Windows Domain Network Configuration Guide Windows Domain Network Configuration Guide for CCC Pathways Copyright 2008 by CCC Information Services Inc. All rights reserved. No part of this publication may
More informationInstalling Active Directory
Installing Active Directory 119 Installing Active Directory Installing Active Directory is an easy and straightforward process as long as you planned adequately and made the necessary decisions beforehand.
More informationDESLock+ Basic Setup Guide Version 1.20, rev: June 9th 2014
DESLock+ Basic Setup Guide Version 1.20, rev: June 9th 2014 Contents Overview... 2 System requirements:... 2 Before installing... 3 Download and installation... 3 Configure DESLock+ Enterprise Server...
More informationActive Directory Integration Guide
Chancery SMS Version 5.4 or Higher Active Directory Integration Guide Revised September 2005 CSL - 12458 The Chancery SMS Documentation Team: Joanna Denford, Linda MacShane, Sarah Hewson, Karin Jensen,
More informationEventTracker: Support to Non English Systems
EventTracker: Support to Non English Systems Publication Date: April 25, 2012 EventTracker 8815 Centre Park Drive Columbia MD 21045 www.eventtracker.com Introduction This document has been prepared to
More informationApplication Note 116: Gauntlet System High Availability Using Replication
Customer Service: 425-487-1515 Technical Support: 425-951-3390 Fax: 425-487-2288 Email: info@teltone.com support@teltone.com Website: www.teltone.com Application Note 116: Gauntlet System High Availability
More informationAppendix B Lab Setup Guide
JWCL031_appB_467-475.indd Page 467 5/12/08 11:02:46 PM user-s158 Appendix B Lab Setup Guide The Windows Server 2008 Applications Infrastructure Configuration title of the Microsoft Official Academic Course
More information2. Using Notepad, create a file called c:\demote.txt containing the following information:
Unit 4 Additional Projects Configuring the Local Computer Policy You need to prepare your test lab for your upcoming experiments. First, remove a child domain that you have configured. Then, configure
More informationWelcome to the QuickStart Guide
QuickStart Guide Welcome to the QuickStart Guide This QuickStart Guide provides the information you need to install and start using Express Software Manager. For more comprehensive help on using Express
More informationSCCM Client Checklist for Windows 7
SCCM Client Checklist for Windows 7 1. The client workstation must have a supported operating system. Supported operating systems include Windows 7. To view information about the operating system version:
More informationInstallation Guide: Delta Module Manager Launcher
Installation Guide: Delta Module Manager Launcher Overview... 2 Delta Module Manager Launcher... 2 Pre-Installation Considerations... 3 Hardware Requirements... 3 Software Requirements... 3 Virtualisation...
More informationRestructuring Active Directory Domains Within a Forest
C H A P T E R 1 2 Restructuring Active Directory Domains Within a Forest Restructuring Active Directory directory service domains within a forest with the goal of reducing the number of domains allows
More informationRelease Note RM Unify CSV Extraction Tool
RM Unify CSV Extraction Tool Contents Release Note RM Unify CSV Extraction Tool... 1 Contents... 1 About this Release Note... 1 About the RM Unify CSV Extraction Tool... 2 What it does... 2 Requirements...
More informationms-help://ms.technet.2005mar.1033/security/tnoffline/security/smbiz/winxp/fwgrppol...
Page 1 of 16 Security How to Configure Windows Firewall in a Small Business Environment using Group Policy Introduction This document explains how to configure the features of Windows Firewall on computers
More informationAutograph 3.3 Network Installation
Eastmond Publishing Ltd (Autograph) PO Box 46, Oundle, Peterborough, PE8 4JX, UK Tel: +44 (0)1832 273444 Fax: +44 (0)1832 273529 Email: support@autograph-maths.com Web: www.autograph-maths.com Technical
More informationVERITAS Backup Exec TM 10.0 for Windows Servers
VERITAS Backup Exec TM 10.0 for Windows Servers Quick Installation Guide N134418 July 2004 Disclaimer The information contained in this publication is subject to change without notice. VERITAS Software
More informationPassword Policy Enforcer
Password Policy Enforcer Evaluator s Guide V7.6 Copyright 1998-2013 ANIXIS. All rights reserved. ANIXIS, ANIXIS Password Reset, Password Policy Enforcer, PPE/Web, Password Policy Client, Password Policy
More informationInstallation Guide. Novell Storage Manager 3.1.1 for Active Directory. Novell Storage Manager 3.1.1 for Active Directory Installation Guide
Novell Storage Manager 3.1.1 for Active Directory Installation Guide www.novell.com/documentation Installation Guide Novell Storage Manager 3.1.1 for Active Directory October 17, 2013 Legal Notices Condrey
More informationTest Note Phone Manager Deployment Windows Group Policy Sever 2003 and XP SPII Clients
Test Note Phone Manager Deployment Windows Group Policy Sever 2003 and XP SPII Clients Note: I have only tested these procedures on Server 2003 SP1 (DC) and XP SPII client, in a controlled lab environment,
More informationAgency Pre Migration Tasks
Agency Pre Migration Tasks This document is to be provided to the agency and will be reviewed during the Migration Technical Kickoff meeting between the ICS Technical Team and the agency. Network: Required
More informationThese guidelines can dramatically improve logon and startup performance.
Managing Users with Local Security and Group Policies 573. Disable user or computer settings in GPOs Each GPO consists of a user and a computer section. If there are no settings in either of those sections,
More informationUltimus and Microsoft Active Directory
Ultimus and Microsoft Active Directory May 2004 Ultimus, Incorporated 15200 Weston Parkway, Suite 106 Cary, North Carolina 27513 Phone: (919) 678-0900 Fax: (919) 678-0901 E-mail: documents@ultimus.com
More informationLesson Plans LabSim for Microsoft s Implementing a Server 2003 Active Directory Infrastructure
Lesson Plans LabSim for Microsoft s Implementing a Server 2003 Active Directory Infrastructure (Exam 70-294) Table of Contents Course Overview... 2 Section 1.1: Introduction to Active Directory... 3 Section
More informationStellar Active Directory Manager
Stellar Active Directory Manager What is the need of Active Directory Manager? Every organization uses Active Directory Services (ADMS) to manage the users working in the organization. This task is mostly
More informationChanging Passwords in Cisco Unity 8.x
CHAPTER 9 Changing Passwords in Cisco Unity 8.x This chapter contains the following sections: Changing Passwords for the Cisco Unity 8.x Service Accounts (Without Failover), page 9-1 Changing Passwords
More informationMobility Services Platform 3.1.1 Software Installation Guide
Mobility Services Platform 3.1.1 Software Installation Guide Mobility Services Platform 3.1.1 Software Installation Guide 72E-100159-04 Revision D January 2008 2007 by Motorola, Inc. All rights reserved.
More informationMS-50255: Managing, Maintaining, and Securing Your Networks Through Group Policy. Course Objectives. Required Exam(s) Price.
MS-50255: Managing, Maintaining, and Securing Your Networks Through Group Policy Discover how to consolidate the administration of an enterprise IT infrastructure with Group Policy. In this four-day instructor
More informationThe Windows Server 2003 Environment. Introduction. Computer Roles. Introduction to Administering Accounts and Resources. Lab 2
Islamic University of Gaza College of Engineering Computer Department Computer Networks Lab Introduction to Administering Accounts and Resources Prepared By: Eng.Ola M. Abd El-Latif Mar. /2010 0 :D Objectives
More informationHow to monitor AD security with MOM
How to monitor AD security with MOM A article about monitor Active Directory security with Microsoft Operations Manager 2005 Anders Bengtsson, MCSE http://www.momresources.org November 2006 (1) Table of
More informationRelease Note Windows 7 SP1 64-bit for Community Connect 4
Release Note Windows 7 SP1 64-bit for Community Connect 4 Contents Introduction Introduction... 1 Overview of Windows 7 SP1 64-bit... 2 Pre-installation environments and the need for 32- and 64-bit drivers...
More informationLAB 1: Installing Active Directory Federation Services
LAB 1: Installing Active Directory Federation Services Contents Lab: Installing and Configuring Active Directory Federation Services... 2 Exercise 1: installing and configuring Active Directory Federation
More informationModular Messaging. Release 3.0 / 3.1. Diminished Permissions for Exchange.
Modular Messaging Release 3.0 / 3.1 Diminished Permissions for Exchange. Issue 1 March 2007 2006-2007 Avaya Inc. All Rights Reserved. Notice While reasonable efforts were made to ensure that the information
More informationModule 8: Implementing Group Policy
Module 8: Implementing Group Policy Contents Overview 1 Lesson: Implementing Group Policy Objects 2 Lesson: Implementing GPOs in a Domain 12 Lesson: Managing the Deployment of Group Policy 21 Lab: Implementing
More information12 NETWORK MANAGEMENT
12 NETWORK MANAGEMENT PROJECTS Project 12.1 Project 12.2 Project 12.3 Project 12.4 Understanding Key Concepts Backing Up and Restoring Data Monitoring Computer Activity Configuring SNMP Support 276 Networking
More informationVERITAS Backup Exec 9.1 for Windows Servers Quick Installation Guide
VERITAS Backup Exec 9.1 for Windows Servers Quick Installation Guide N109548 Disclaimer The information contained in this publication is subject to change without notice. VERITAS Software Corporation makes
More informationGroup Policy 21/05/2013
Group Policy Group Policy is not a new technology for Active Directory, but it has grown and improved with every iteration of the operating system and service pack since it was first introduced in Windows
More informationUsing Logon Agent for Transparent User Identification
Using Logon Agent for Transparent User Identification Websense Logon Agent (also called Authentication Server) identifies users in real time, as they log on to domains. Logon Agent works with the Websense
More informationMicrosoft Corporation. Project Server 2010 Installation Guide
Microsoft Corporation Project Server 2010 Installation Guide Office Asia Team 11/4/2010 Table of Contents 1. Prepare the Server... 2 1.1 Install KB979917 on Windows Server... 2 1.2 Creating users and groups
More informationServer Installation: ServerTools
Server Installation: ServerTools ServerTools Page 1 Table of Contents To Install ServerTools...3 Backup and Restore...6 Purpose...6 Background...6 Requirements...6 Creating a Backup Schedule using the
More informationExchange Mailbox Protection Whitepaper
Exchange Mailbox Protection Contents 1. Introduction... 2 Documentation... 2 Licensing... 2 Exchange add-on comparison... 2 Advantages and disadvantages of the different PST formats... 3 2. How Exchange
More informationInstallation Guide. . All right reserved. For more information about Specops Deploy and other Specops products, visit www.specopssoft.
. All right reserved. For more information about Specops Deploy and other Specops products, visit www.specopssoft.com Copyright and Trademarks Specops Deploy is a trademark owned by Specops Software. All
More informationHow To Install And Configure Windows Server 2003 On A Student Computer
Course: WIN310 Student Lab Setup Guide Microsoft Windows Server 2003 Network Infrastructure (70-291) ISBN: 0-470-06887-6 STUDENT COMPUTER SETUP Hardware Requirements All hardware must be on the Microsoft
More informationUser Document. Adobe Acrobat 7.0 for Microsoft Windows Group Policy Objects and Active Directory
Adobe Acrobat 7.0 for Microsoft Windows Group Policy Objects and Active Directory Copyright 2005 Adobe Systems Incorporated. All rights reserved. NOTICE: All information contained herein is the property
More informationLesson Plans Microsoft s Managing and Maintaining a Microsoft Windows Server 2003 Environment
Lesson Plans Microsoft s Managing and Maintaining a Microsoft Windows Server 2003 Environment (Exam 70-290) Table of Contents Table of Contents... 1 Course Overview... 2 Section 0-1: Introduction... 4
More informationInstallation of MicroSoft Active Directory
Installation of MicroSoft Active Directory Before you start following this article you must be aware this is simply a lab setup and you need to assign relevant ip address, hostnames & domain names which
More informationWindows Clients and GoPrint Print Queues
Windows Clients and GoPrint Print Queues Overview The following tasks demonstrate how to configure shared network printers on Windows client machines in a Windows Active Directory Domain and Workgroup
More informationSTATISTICA VERSION 9 STATISTICA ENTERPRISE INSTALLATION INSTRUCTIONS FOR USE WITH TERMINAL SERVER
Notes: STATISTICA VERSION 9 STATISTICA ENTERPRISE INSTALLATION INSTRUCTIONS FOR USE WITH TERMINAL SERVER 1. These instructions focus on installation on Windows Terminal Server (WTS), but are applicable
More informationSWCS 4.2 Client Configuration Users Guide Revision 49. 11/26/2012 Solatech, Inc.
SWCS 4.2 Client Configuration Users Guide Revision 49 11/26/2012 Solatech, Inc. Contents Introduction... 4 Installation... 4 Running the Utility... 4 Company Database Tasks... 4 Verifying a Company...
More informationChapter 1 Scenario 1: Acme Corporation
Chapter 1 Scenario 1: Acme Corporation In This Chapter Description of the Customer Environment page 18 Introduction to Deploying Pointsec PC page 20 Prepare for Deployment page 21 Install Pointsec PC page
More informationMoving the Web Security Log Database
Moving the Web Security Log Database Topic 50530 Web Security Solutions Version 7.7.x, 7.8.x Updated 22-Oct-2013 Version 7.8 introduces support for the Web Security Log Database on Microsoft SQL Server
More informationAdministering Active Directory. Administering Active Directory. Reading. Review: Organizational Units. Review: Domains. Review: Domain Trees
Reading Read over the Active Directory material in your Network+ Guide I will be providing important materials Administering Active Directory If you don t understand certain concepts, please ask for help!
More informationManage Filespace with the ARS Console
Academic Services Exeter IT Desktop Support Manage Filespace with the ARS Console Document reference: Document type: Document status: Review period: DS021 Desktop Support Procedure Live Six months Next
More informationObjectives. At the end of this chapter students should be able to:
NTFS PERMISSIONS AND SECURITY SETTING.1 Introduction to NTFS Permissions.1.1 File Permissions and Folder Permission.2 Assigning NTFS Permissions and Special Permission.2.1 Planning NTFS Permissions.2.2
More informationNetwrix Auditor. Administrator's Guide. Version: 7.1 10/30/2015
Netwrix Auditor Administrator's Guide Version: 7.1 10/30/2015 Legal Notice The information in this publication is furnished for information use only, and does not constitute a commitment from Netwrix Corporation
More informationTable of Contents SQL Server Option
Table of Contents SQL Server Option STEP 1 Install BPMS 1 STEP 2a New Customers with SQL Server Database 2 STEP 2b Restore SQL DB Upsized by BPMS Support 6 STEP 2c - Run the "Check Dates" Utility 7 STEP
More informationDeploying BitDefender Client Security and BitDefender Windows Server Solutions
Deploying BitDefender Client Security and BitDefender Windows Server Solutions Quick Install Guide Copyright 2011 BitDefender 1. Installation Overview Thank you for selecting BitDefender Business Solutions
More informationWeb Deployment on Windows 2012 Server. Updated: August 28, 2013
Web Deployment on Windows 2012 Server Updated: August 28, 2013 Table of Contents Install IIS on Windows 2012... 3 Install Sage 300 ERP...16 Create Web Deployment User...17 Sage 300 ERP Services...22 Web
More informationNETWRIX WINDOWS SERVER CHANGE REPORTER
NETWRIX WINDOWS SERVER CHANGE REPORTER INSTALLATION AND CONFIGURATION GUIDE Product Version: 4.0 March 2013. Legal Notice The information in this publication is furnished for information use only, and
More informationDriveLock Quick Start Guide
Be secure in less than 4 hours CenterTools Software GmbH 2012 Copyright Information in this document, including URL and other Internet Web site references, is subject to change without notice. Unless otherwise
More informationErado Archiving & Setup Instruction Microsoft Exchange 2010 Push Journaling
Erado Archiving & Setup Instruction Microsoft Exchange 2010 Push Journaling Contents: Step 1: Create Mail Contact Step 2: Create a Local Journal Mailbox Step 3: Create an SMTP send connector Step 4: Create
More informationDeploying System Center 2012 R2 Configuration Manager
Deploying System Center 2012 R2 Configuration Manager This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED, OR STATUTORY, AS TO THE INFORMATION IN THIS DOCUMENT.
More informationSTIDistrict Server Replacement
STIDistrict Server Replacement Major Steps Defined This document addresses how to migrate data and applications from an existing STIDistrict (SQL) Server to a new machine. There will be 8 major steps:
More informationDeviceLock Management via Group Policy
User Manual DeviceLock Management via Group Policy SmartLine Inc 1 Contents Using this Manual...3 1. General Information...4 1.1 Overview...4 1.2 Applying Group Policy...5 2. DeviceLock Service Deployment...6
More informationManaging Windows Environments with Group Policy
3 Riverchase Office Plaza Hoover, Alabama 35244 Phone: 205.989.4944 Fax: 855.317.2187 E-Mail: rwhitney@discoveritt.com Web: www.discoveritt.com Managing Windows Environments with Group Policy Course: MS50255C
More informationDeploying BitDefender Client Security and BitDefender Windows Server Solutions
Deploying BitDefender Client Security and BitDefender Windows Server Solutions Quick Install Guide Copyright 2010 BitDefender; 1. Installation Overview Thank you for selecting BitDefender Business Solutions
More information4cast Client Specification and Installation
4cast Client Specification and Installation Version 2015.00 10 November 2014 Innovative Solutions for Education Management www.drakelane.co.uk System requirements The client requires Administrative rights
More informationThere are only a couple of things that need to happen once you've ordered the product from our Service Manager.
Introduction ExchangeDefender Compliance Archive provides secure, long term storage, recovery and ediscovery system that assures compliance with regulatory requirements established by IRS, HIPAA, SOX and
More informationDistributing EmailSMS v2.0
Distributing EmailSMS v2.0 1) Requirements Windows 2000/XP and Outlook 2000, 2002 or 2003, Microsoft.NET Framework v 2).NET Framework V 1 Rollout Microsoft.NET Framework v1 needed to run EmailSMS v2.0.
More informationACTIVE DIRECTORY DEPLOYMENT
ACTIVE DIRECTORY DEPLOYMENT CASAS Technical Support 800.255.1036 2009 Comprehensive Adult Student Assessment Systems. All rights reserved. Version 031809 CONTENTS 1. INTRODUCTION... 1 1.1 LAN PREREQUISITES...
More informationMoving the TRITON Reporting Databases
Moving the TRITON Reporting Databases Topic 50530 Web, Data, and Email Security Versions 7.7.x, 7.8.x Updated 06-Nov-2013 If you need to move your Microsoft SQL Server database to a new location (directory,
More informationInstalling Exchange and Extending the Active Directory Schema for Cisco Unity 8.x
CHAPTER 6 Installing Exchange and Extending the Active Directory Schema for Cisco Unity 8.x In this chapter, you do the following tasks in the order listed: 1. Install Exchange on the Cisco Unity server,
More informationTECHNICAL DOCUMENTATION SPECOPS DEPLOY / APP 4.7 DOCUMENTATION
TECHNICAL DOCUMENTATION SPECOPS DEPLOY / APP 4.7 DOCUMENTATION Contents 1. Getting Started... 4 1.1 Specops Deploy Supported Configurations... 4 2. Specops Deploy and Active Directory...5 3. Specops Deploy
More informationJuris Installation / Upgrade Guide
Juris Installation / Upgrade Guide Version 2.7 2015 LexisNexis. All rights reserved. Copyright and Trademark LexisNexis, Lexis, and the Knowledge Burst logo are registered trademarks of Reed Elsevier Properties
More informationSecrets of Event Viewer for Active Directory Security Auditing Lepide Software
Secrets of Event Viewer for Active Directory Security Auditing Windows Event Viewer doesn t need any introduction to the IT Administrators. However, some of its hidden secrets, especially those related
More informationDeviceLock Management via Group Policy
User Manual DeviceLock Management via Group Policy SmartLine Inc 1 Contents Using this Manual...3 1. General Information...4 1.1 Overview...4 1.2 Applying Group Policy...5 1.3 Standard GPO Inheritance
More informationActive Directory Software Deployment
APPLICATION N0TE ST-0128 March 24, 2006 Product: Active Directory / PCM Deployment System version: ShoreTel 6 Active Directory Software Deployment Courtesy of: Dylan Moser with LANtelligence Inc. This
More informationInstalling Client GPO Software
NetVanta Unified Communications Technical Note Installing Client GPO Software Client Software Installation Using Group Policy Objects This section describes how to deploy the client software using Group
More informationQuick Start guide to. Microsoft Business Solutions CRM 1.2. on a Microsoft Windows Small Business Server 2003 Premium Edition.
Quick Start guide to Microsoft Business Solutions CRM 1.2 on a Microsoft Windows Small Business Server 2003 Premium Edition M Partner Program Welcome! There are many resources available to help you install
More informationOperating System Installation Guide
Operating System Installation Guide This guide provides instructions on the following: Installing the Windows Server 2008 operating systems on page 1 Installing the Windows Small Business Server 2011 operating
More informationSophos Anti-Virus for NetApp Storage Systems startup guide
Sophos Anti-Virus for NetApp Storage Systems startup guide Runs on Windows 2000 and later Product version: 1 Document date: April 2012 Contents 1 About this guide...3 2 About Sophos Anti-Virus for NetApp
More informationAlpha High Level Description
Alpha High Level Description Alpha is a Windows Domain Controller (DC) and Domain Name System (DNS) Server. Because Alpha was the first DC in the aia.class domain, it is also (by default) the Windows global
More information70-640 R4: Configuring Windows Server 2008 Active Directory
70-640 R4: Configuring Windows Server 2008 Active Directory Course Introduction Course Introduction Chapter 01 - Installing the Active Directory Role Lesson: What is IDA? What is Active Directory Identity
More informationDeploying Windows Streaming Media Servers NLB Cluster and metasan
Deploying Windows Streaming Media Servers NLB Cluster and metasan Introduction...................................................... 2 Objectives.......................................................
More informationAdobe Acrobat 9 Deployment on Microsoft Windows Group Policy and the Active Directory service
Adobe Acrobat 9 Deployment on Microsoft Windows Group Policy and the Active Directory service white paper TABLE OF CONTENTS 1. Document overview......... 1 2. References............. 1 3. Product overview..........
More information