Using BitLocker to encrypt a Windows 8 device

Size: px
Start display at page:

Download "Using BitLocker to encrypt a Windows 8 device"

Transcription

1 Using BitLocker to encrypt a Windows 8 device 1. Before BitLocker can be used to encrypt the portable device, the Trusted Platform Module must be turned on via the BIOS. Boot the device and press F2, F10, or the Del button (depending upon the BIOS manufacturer) before Windows launches. This will launch the BIOS. 2. Once the BIOS opens, expand the Security tab in the left-hand pane. 3. Select TPM Security from the Security submenu. The right-hand pane will now display the option to change the TPM Security setting to Off or On. Change it to On and hit the Enter key. 4. Select TPM Activation from the Security submenu. The right-hand pane will now display the option to change the TPM Activation setting to Deactivate or Activate. Change it to Activate and hit the Enter key. 5. Hit the ESC key to advance to the Exit screen. Change the Exit setting to Save/Exit and hit the Enter key. Windows 8 will begin to boot. Steps 2-4: In the BIOS, expand the Security tab and locate the TPM Security and the TPM Activation options. Steps 2-4: First, select On under the TPM Security settings. Then go to the TPM Activation settings and select Activate. 6. Log in to Windows 8 using the device s local administrator account. Once the Start screen is displayed, move the cursor into the top or bottom right-hand corner to bring up the Search icon. Click on the Search icon.

2 Step 6: Place the cursor in a right-hand corner of the screen to open the toolbar, and then select Search. 7. The Search window pane will open. Type BitLocker in the Search Field. The search should return two hits on the Settings tab just below the Search field. Clicking on the Settings tab will display two options for BitLocker in the left-hand pane. Click on the BitLocker Drive Encryption option. Step 7: Type BitLocker in the Search field, then click on the Settings tab below the Search field. The BitLocker Drive Encryption option will appear in the left-hand pane. Click on it. 8. The BitLocker Drive Encryption console will open. Click the Turn On BitLocker icon. BitLocker will check to see if the device meets its system requirements.

3 Step 8: Once the BitLocker Drive Encryption console opens, click the Turn on BitLocker button. 9. Once the verification is complete, the BitLocker Drive Encryption setup screen will open. Click Next. 10. Since BitLocker requires two partitions on the device s hard drive, a notification will appear informing you that a second partition will be created during this process. Click Next. Step 10: Since BitLocker requires two partitions on a hard drive, it will create one during the setup process. Click Next to begin the process of creating this second partition.

4 11. BitLocker will begin creating a second partition and preparing it for the encryption process. Once this process is complete, the device must be restarted. Click the Restart Now button. 12. Once the device reboots, log in to Windows 8 using the Administrator account. Click on the Desktop icon on the Start screen. You should now see the BitLocker console on the Desktop. Click the Next button to advance to the Recovery Key screen. Step 12: Once the device has restarted, click the Desktop icon on the Start screen. You will find that BitLocker has automatically resumed the setup process. Click Next. 13. A prompt will ask where a backup of the recovery key should be saved. Select the option that you prefer. It is recommended that the recovery key should be backed up on a USB thumb drive (You SHOULD NOT print the recovery key). Insert a thumb drive into the device, choose Save to a file, and click Next.

5 Step 13: Select the method that you prefer for backing up the recovery key. It is recommended that the backup recovery key is saved as a file on a USB thumb drive. 14. A Save As window will open and display the available drives on the device. Double-click on the thumb drive to open it. Clicking Save will save a text file containing the recovery key on the thumb drive. Step 14: When the Save As window opens, double-click on the USB thumb drive and save the backup recovery key there.

6 15. Important: Before you proceed, open the USB drive and confirm that a text file was created with the recovery key. If the recovery key backup is not successfully created there (or the USB drive is lost), you might be unable to access your encrypted device in the future. Step 15: Before the encryption process begins, verify that the backup recovery key was successfully created on the USB thumb drive. 16. Once you have confirmed that a successful backup key was created on the USB drive, return to the BitLocker console and click Next. 17. Whole-disk encryption is recommended, so click the Encrypt entire drive radio button and click Next. Step 17: Click the Encrypt entire drive radio button and click Next.

7 18. Read the brief explanation of the encryption process. Be sure to place a check in the box next to Run BitLocker system check. Click Continue to begin the encryption process. Step 18: Place a check in the "Run BitLocker system check" box and then click Continue to begin the encryption process. 19. A message will appear that says a restart is required to begin the encryption process. Restart the device and log into Windows 8 using the Administrator account. Step 19: A restart will be required before the encryption process will begin. Restart the device and log in using the Admin account.

8 20. Once the Start screen appears, click on the Desktop icon to go to the Desktop. A message will appear at the bottom of the desktop, stating that the encryption process has started. This process could take several hours, depending on the size of the hard drive being encrypted. Step 20: After the device has been restarted, return to the Desktop. You will receive a notification that the encryption process has begun. 21. To check the progress of the encryption process, repeat Step 7 to open the BitLocker Drive Encryption console. If the device is still in the process of being encrypted, you will see a BitLocker Encrypting message in the middle of the console. Once the encryption process is over, this message will change to BitLocker On. Step 21: You can return to the BitLocker Drive Encryption console to determine the status of the encryption process. If the process is continuing, you will see a "BitLocker Encrypting" message. Once the process is over, that message will become BitLocker On.

Encrypting with BitLocker for disk volumes under Windows 7

Encrypting with BitLocker for disk volumes under Windows 7 Encrypting with BitLocker for disk volumes under Windows 7 Summary of the contents 1 Introduction 2 Hardware requirements for BitLocker Driver Encryption 3 Encrypting drive 3.1 Operating System Drive 3.1.1

More information

In order to enable BitLocker, your hard drive must be partitioned in a particular manner.

In order to enable BitLocker, your hard drive must be partitioned in a particular manner. ENABLE BITLOCKER ON WINDOWS VISTA - WITHOUT A TPM Requirements: You must be running Vista Enterprise or Vista Ultimate to enable BitLocker. Any other version of Vista is not compatible. It is recommended

More information

Motion Computing Tablet PC

Motion Computing Tablet PC Motion Computing Tablet PC TRUSTED PLATFORM MODULE (TPM) ACTIVATION User Guide Trusted Platform Module Activation With the Infineon Security Platform Tools and the built-in Trusted Computing Group compliant

More information

Smart TPM. User's Manual. Rev. 1001 12MD-STPM-1001R

Smart TPM. User's Manual. Rev. 1001 12MD-STPM-1001R Smart TPM User's Manual Rev. 1001 12MD-STPM-1001R We recommend that you download the latest version of the Smart TPM utility from GIGABYTE's website. If you have installed Ultra TPM earlier, you can install

More information

BitLocker/Active Directory Encryption Procedure Department: Information Security Office Version: 1.0 Last Revised: 09/26/2011

BitLocker/Active Directory Encryption Procedure Department: Information Security Office Version: 1.0 Last Revised: 09/26/2011 BitLocker/Active Directory Encryption Procedure Department: Information Security Office Version: 1.0 Last Revised: 09/26/2011 Purpose To provide a step-by-step procedure for encrypting installed laptop

More information

How to enable Disk Encryption on a laptop

How to enable Disk Encryption on a laptop How to enable Disk Encryption on a laptop Skills and pre-requisites Intermediate IT skills required. You need to: have access to, and know how to change settings in the BIOS be confident that your data

More information

NEWTECH INFOSYSTEMS, INC. NTI Backup Now EZ. NTI Backup Now EZ User's Guide

NEWTECH INFOSYSTEMS, INC. NTI Backup Now EZ. NTI Backup Now EZ User's Guide NEWTECH INFOSYSTEMS, INC. NTI Backup Now EZ NTI Backup Now EZ User's Guide Backup Now EZ User's Guide 2009 NewTech Infosystems, Inc. i Table of Contents INTRODUCTION... 3 WELCOME TO NTI BACKUP NOW EZ...

More information

Cautions When Using BitLocker Drive Encryption on PRIMERGY

Cautions When Using BitLocker Drive Encryption on PRIMERGY Cautions When Using BitLocker Drive Encryption on PRIMERGY July 2008 Fujitsu Limited Table of Contents Preface...3 1 Recovery mode...4 2 Changes in hardware configurations...5 3 Prior to hardware maintenance

More information

1. Set Daylight Savings Time... 3. 2. Create Migrator Account... 3. 3. Assign Migrator Account to Administrator group... 4

1. Set Daylight Savings Time... 3. 2. Create Migrator Account... 3. 3. Assign Migrator Account to Administrator group... 4 1. Set Daylight Savings Time... 3 a. Have client log into Novell/Local Machine with Administrator Account...3 b. Access Adjust Date/Time...3 c. Make sure the time zone is set to Central Time...3 2. Create

More information

Image Backup and Recovery Procedures

Image Backup and Recovery Procedures Image Backup and Recovery Procedures Thank you for purchasing a Fujitsu computer. Fujitsu is committed to bringing you the best computing experience with your new system. It is very important that you

More information

MICROSOFT BITLOCKER ADMINISTRATION AND MONITORING (MBAM)

MICROSOFT BITLOCKER ADMINISTRATION AND MONITORING (MBAM) MICROSOFT BITLOCKER ADMINISTRATION AND MONITORING (MBAM) MICROSOFT BITLOCKER ADMINISTRATION AND MONITORING (MBAM) Microsoft BitLocker Administration and Monitoring (MBAM) provides a simplified administrative

More information

Windows BitLocker Drive Encryption Step-by-Step Guide

Windows BitLocker Drive Encryption Step-by-Step Guide Windows BitLocker Drive Encryption Step-by-Step Guide Microsoft Corporation Published: September 2006 Abstract Microsoft Windows BitLocker Drive Encryption is a new hardware-enhanced feature in the Microsoft

More information

Using Group Policies to Install AutoCAD. CMMU 5405 Nate Bartley 9/22/2005

Using Group Policies to Install AutoCAD. CMMU 5405 Nate Bartley 9/22/2005 Using Group Policies to Install AutoCAD CMMU 5405 Nate Bartley 9/22/2005 Before we get started This manual provides a step-by-step process for creating a Group Policy that will install AutoCAD to a Windows

More information

Table of Contents. TPM Configuration Procedure... 2. 1. Configuring the System BIOS... 2

Table of Contents. TPM Configuration Procedure... 2. 1. Configuring the System BIOS... 2 Table of Contents TPM Configuration Procedure... 2 1. Configuring the System BIOS... 2 2. Installing the Infineon TPM Driver and the GIGABYTE Ultra TPM Utility... 3 3. Initializing the TPM Chip... 4 3.1.

More information

Image Backup and Recovery Procedures

Image Backup and Recovery Procedures Image Backup and Recovery Procedures Thank you for purchasing a Fujitsu computer. Fujitsu is committed to bringing you the best computing experience with your new system. It is very important that you

More information

How to Encrypt your Windows 7 SDS Machine with Bitlocker

How to Encrypt your Windows 7 SDS Machine with Bitlocker How to Encrypt your Windows 7 SDS Machine with Bitlocker ************************************ IMPORTANT ******************************************* Before encrypting your SDS Windows 7 Machine it is highly

More information

Detecting and Removing Spyware From Your Home Computer

Detecting and Removing Spyware From Your Home Computer Detecting and Removing Spyware From Your Home Computer Preamble: Spyware are programs that silently monitor and report on computing activities via the Internet. Companies use Spyware to target users with

More information

LP 2844 Thermal Printer

LP 2844 Thermal Printer Quick Installation Guide FedEx Ship Manager Software FedEx Ship Manager at fedex.com LP 2844 Thermal Printer Step 1: Confirm Printer Kit Contents Your printer kit contains: 1. Thermal Printer 4. Serial

More information

AMT Implementation on a UTC RETAIL 3170 POS

AMT Implementation on a UTC RETAIL 3170 POS AMT Implementation on a UTC RETAIL 3170 POS Controlling POS systems using Intel AMT Features UTC RETAIL 1 November 19, 2012 Scope The document was written for use by UTC RETAIL 3170 POS customers to enable

More information

Time Stamp. Instruction Booklet

Time Stamp. Instruction Booklet Time Stamp Instruction Booklet Time Stamp Introductions Time stamp is a useful solution for backing up and restoring system, it backs up the entire computer system to the Backup Zone. Time Stamp is used

More information

PGP Desktop Encrypting Removable Media. May 1 2012 Version 1.3

PGP Desktop Encrypting Removable Media. May 1 2012 Version 1.3 PGP Desktop Encrypting Removable Media May 1 2012 Version 1.3 Table of Contents Introduction... 3 Installation Notes... 3 Encrypting Removable Media... 5 Adding and Deleting Users... 10 Changing a Passphrase...

More information

1. Open the preferences screen by opening the Mail menu and selecting Preferences...

1. Open the preferences screen by opening the Mail menu and selecting Preferences... Using TLS encryption with OS X Mail This guide assumes that you have already created an account in Mail. If you have not, you can use the new account wizard. The new account wizard is in the Accounts window

More information

HP RDX Continuous Data Protection Software Quickstart Guide

HP RDX Continuous Data Protection Software Quickstart Guide HP RDX Continuous Data Protection Software Quickstart Guide *5697-3351* HP Part Number: 5697-3351 Published: May 2014 Edition: Fourth Copyright 2008 2014 Hewlett-Packard Development Company, L.P. Microsoft,

More information

NTI Backup Now EZ v2 User s Guide

NTI Backup Now EZ v2 User s Guide NTI Backup Now EZ v2 User s Guide GMAA00423010 11/12 2 Copyright statement This guide is copyrighted by Toshiba Corporation with all rights reserved. Under the copyright laws, this guide cannot be reproduced

More information

Administering FileVault 2 on OS X Lion with the Casper Suite. Technical Paper July 2012

Administering FileVault 2 on OS X Lion with the Casper Suite. Technical Paper July 2012 Administering FileVault 2 on OS X Lion with the Casper Suite Technical Paper July 2012 JAMF Software, LLC 2012 JAMF Software, LLC. All rights reserved. JAMF Software has made all efforts to ensure that

More information

Updates Click to check for a newer version of the CD Press next and confirm the disc burner selection before pressing finish.

Updates Click to check for a newer version of the CD Press next and confirm the disc burner selection before pressing finish. Backup. If your computer refuses to boot or load Windows or if you are trying to restore an image to a partition the Reflect cannot lock (See here), and then you will have to start your PC using a rescue

More information

Time Machine Setup for Routers

Time Machine Setup for Routers User Manual August 2015 202-11590-02 350 East Plumeria Drive San Jose, CA 95134 USA Support Thank you for selecting NETGEAR products. After installing your device, locate the serial number on the label

More information

BitLocker Encryption for non-tpm laptops

BitLocker Encryption for non-tpm laptops BitLocker Encryption for non-tpm laptops Contents 1.0 Introduction... 2 2.0 What is a TPM?... 2 3.0 Users of non-tpm University laptops... 2 3.1 Existing Windows 7 laptop users... 2 3.2 Existing Windows

More information

TSM for Windows Installation Instructions: Download the latest TSM Client Using the following link:

TSM for Windows Installation Instructions: Download the latest TSM Client Using the following link: TSM for Windows Installation Instructions: Download the latest TSM Client Using the following link: ftp://ftp.software.ibm.com/storage/tivoli-storagemanagement/maintenance/client/v6r2/windows/x32/v623/

More information

Contents. VPN Instructions. VPN Instructions... 1

Contents. VPN Instructions. VPN Instructions... 1 VPN Instructions Contents VPN Instructions... 1 Download & Install Check Point VPN Software... 2 Connect to FPUA by VPN... 6 Connect to Your Computer... 8 Determine Your Machine Type... 10 Identify 32-bit

More information

Important Notes for WinConnect Server VS Software Installation:

Important Notes for WinConnect Server VS Software Installation: Important Notes for WinConnect Server VS Software Installation: 1. Only Windows Vista Business, Windows Vista Ultimate, Windows 7 Professional, Windows 7 Ultimate, Windows Server 2008 (32-bit & 64-bit),

More information

4 Backing Up and Restoring System Software

4 Backing Up and Restoring System Software 4 Backing Up and Restoring System Software In this Chapter... Planning a Backup Strategy, 4-3 Preparing for Disaster Recovery, 4-4 Creating Boot Recovery Diskettes, 4-5 Making a Full Backup Tape, 4-8 Restoring

More information

Overview... 2 How to Add New Documents... 3 Adding a Note / SMS or Phone Message... 3 Adding a New Letter... 4. How to Create Letter Templates...

Overview... 2 How to Add New Documents... 3 Adding a Note / SMS or Phone Message... 3 Adding a New Letter... 4. How to Create Letter Templates... THE DOCUMENT MANAGER Chapter 14 THE DOCUMENT MANAGER CONTENTS Overview... 2 How to Add New Documents... 3 Adding a Note / SMS or Phone Message... 3 Adding a New Letter... 4 How to Create Letter Templates...

More information

You may have been given a download link on your trial software email. Use this link to download the software.

You may have been given a download link on your trial software email. Use this link to download the software. BackupVault / Attix5 Server Quickstart Guide This document takes about 5 minutes to read and will show you how to: Download the software Install the Attix5 Professional Backup software Backup your files

More information

INSTALLING MÜSE UPDATES FOR ISTAN

INSTALLING MÜSE UPDATES FOR ISTAN INSTALLING MÜSE UPDATES FOR ISTAN System updates are available periodically and can be downloaded using any computer with an Internet connection. CAE Healthcare Instructor Workstations should NOT be connected

More information

Select Correct USB Driver

Select Correct USB Driver Select Correct USB Driver Windows often installs updated drivers automatically, and defaults to this latest version. Not all of these drivers are compatible with our software. If you are experiencing communications

More information

YubiKey OSX Login. yubico. Via Yubico-PAM Challenge-Response. Version 1.6. October 24, 2015

YubiKey OSX Login. yubico. Via Yubico-PAM Challenge-Response. Version 1.6. October 24, 2015 YubiKey OSX Login Via Yubico-PAM Challenge-Response Version 1.6 October 24, 2015 YubiKey OSX Login 2015 Yubico. All rights reserved. Page 1 of 18 About Yubico Disclaimer As the inventors of the YubiKey,

More information

Database Program Instructions

Database Program Instructions Database Program Instructions 1) Start your Comparative Rating software by double-clicking the icon on your desktop. 2) Click on the button on the Comparative Rating Software Main Menu. 3) A message Loading

More information

University of Rochester Sophos SafeGuard Encryption for Windows Support Guide

University of Rochester Sophos SafeGuard Encryption for Windows Support Guide Sophos SafeGuard Encryption for Windows Support Guide University Information Technology Security & Policy September 15, 2015 Version Date Modification 1.0 September 15, 2015 Initial guide 1.1 1.2 1.3 1.4

More information

XConsole GUI setup communication manual September 2010.

XConsole GUI setup communication manual September 2010. XConsole GUI setup communication manual September 2010. XConsole is compatible with Microsoft XP, Vista and Windows 7. The software will also work if using Boot camp on a Mac. IMPORTANT NOTES: - Do NOT

More information

Installing the Operating System or Hypervisor

Installing the Operating System or Hypervisor Installing the Operating System or Hypervisor If you purchased E-Series Server Option 1 (E-Series Server without preinstalled operating system or hypervisor), you must install an operating system or hypervisor.

More information

Cox Business Premium Online Backup USER'S GUIDE. Cox Business VERSION 1.0

Cox Business Premium Online Backup USER'S GUIDE. Cox Business VERSION 1.0 Cox Business Premium Online Backup USER'S GUIDE Cox Business VERSION 1.0 Table of Contents ABOUT THIS GUIDE... 4 DOWNLOADING COX BUSINESS PREMIUM ONLINE BACKUP... 5 INSTALLING COX BUSINESS PREMIUM ONLINE

More information

Arkay Remote Data Backup Client Quick Start Guide

Arkay Remote Data Backup Client Quick Start Guide Arkay Remote Data Backup Client Quick Start Guide Version 6.1.56.27 September 2005 Quick Start Guide It's easy to get started with Arkay Remote Data Backup and Recovery Service. To start using Arkay Remote

More information

FILING REPRESENTATIVES TRAINING ONLINE COURSE SCHEDULING USER GUIDE

FILING REPRESENTATIVES TRAINING ONLINE COURSE SCHEDULING USER GUIDE FILING REPRESENTATIVES TRAINING ONLINE COURSE SCHEDULING USER GUIDE October 18, 2013 Online Course Scheduling User Guide Page 1 of 28 TABLE OF CONTENT 1 ABOUT THIS DOCUMENT... 3 2 REGISTRATION... 4 2.1

More information

Onboarding for Administrators

Onboarding for Administrators Welcome! This resource will walk you through the quick and easy steps for configuring your Paylocity Onboarding module and managing events. Login Launch Events Complete Tasks Create Records Configure Events

More information

ANDROID RECOVERY STICK QUICK START GUIDE

ANDROID RECOVERY STICK QUICK START GUIDE Before you get started do the following: Open, and read through http://sticks.paraben.com/phone-recovery-faq.htmlhttp:// sticks.paraben.com/phone-recovery-faq.html this will help you with any questions

More information

PigCHAMP Knowledge Software. Enterprise Edition Installation Guide

PigCHAMP Knowledge Software. Enterprise Edition Installation Guide PigCHAMP Knowledge Software Enterprise Edition Installation Guide Enterprise Edition Installation Guide MARCH 2012 EDITION PigCHAMP Knowledge Software 1531 Airport Rd Suite 101 Ames, IA 50010 Phone (515)

More information

MiraCosta College now offers two ways to access your student virtual desktop.

MiraCosta College now offers two ways to access your student virtual desktop. MiraCosta College now offers two ways to access your student virtual desktop. We now feature the new VMware Horizon View HTML access option available from https://view.miracosta.edu. MiraCosta recommends

More information

Quick Start Using DASYLab with your Measurement Computing USB device

Quick Start Using DASYLab with your Measurement Computing USB device Quick Start Using DASYLab with your Measurement Computing USB device Thank you for purchasing a USB data acquisition device from Measurement Computing Corporation (MCC). This Quick Start document contains

More information

Using Bitlocker to Encrypt your Flash Drive Information Technology Services July 27, 2012

Using Bitlocker to Encrypt your Flash Drive Information Technology Services July 27, 2012 Using Bitlocker to Encrypt your Flash Drive Information Technology Services July 27, 2012 Contact the ITS Helpdesk at 402-559-7700 or helpdesk@unmc.edu with questions. How it works Basically, BitLocker

More information

SIRIS. Bare Metal Restore Guide

SIRIS. Bare Metal Restore Guide SIRIS Bare Metal Restore Guide Table of Contents Prerequisites 5 PXE Boot Configuration 6 Accessing Recovery Points 7 Setting BMR Preferences 9 gpxe USB Drive Configuration 10 Starting the BMR 11 Configuring

More information

Chapter 4. Backup / Restore

Chapter 4. Backup / Restore Recovery Guide 9 Restoring with the OS CD (Only for models that ship with the operating system CD) 98 Samsung Recovery Solution (Optional) 00 Recovery Guide 9 This section describes how to restore your

More information

Upgrading LytecMD from 9.3.1 to 9.4 on Windows Server 2008. Best Practices. Revision Date: 7/29/2010 PLEASE READ:

Upgrading LytecMD from 9.3.1 to 9.4 on Windows Server 2008. Best Practices. Revision Date: 7/29/2010 PLEASE READ: Upgrading LytecMD from 9.3.1 to 9.4 on Windows Server 2008 Best Practices Revision Date: 7/29/2010 PLEASE READ: This installation guide will guide you through the upgrade of LytecMD 9.3.1 to 9.4. If you

More information

USB Driver Installation for Windows XP

USB Driver Installation for Windows XP USB Driver Installation for Windows XP USB Serial Converter Driver Installation for Windows XP CAUTION: You must use the drivers on the CD-ROM supplied with your USB Device. DO NOT download drivers from

More information

Baylor Secure Messaging. For Non-Baylor Users

Baylor Secure Messaging. For Non-Baylor Users Baylor Secure Messaging For Non-Baylor Users TABLE OF CONTENTS SECTION ONE: GETTING STARTED...4 Receiving a Secure Message for the First Time...4 Password Configuration...5 Logging into Baylor Secure Messaging...7

More information

QUANTIFY INSTALLATION GUIDE

QUANTIFY INSTALLATION GUIDE QUANTIFY INSTALLATION GUIDE Thank you for putting your trust in Avontus! This guide reviews the process of installing Quantify software. For Quantify system requirement information, please refer to the

More information

NAS 249 Virtual Machine Configuration with VirtualBox

NAS 249 Virtual Machine Configuration with VirtualBox NAS 249 Virtual Machine Configuration with VirtualBox Configure and run Virtual Machines on ASUSTOR Portal with VirtualBox A S U S T O R C O L L E G E COURSE OBJECTIVES Upon completion of this course you

More information

Before You Begin: NOTE: Please read each step of these instructions carefully as not all steps include accompanying pictures.

Before You Begin: NOTE: Please read each step of these instructions carefully as not all steps include accompanying pictures. This document will walk you through the process of migrating your existing mail, contacts, and calendar from WOU s Webmail system to the WOU Gmail system. If you are not interested in migrating your mail,

More information

Allworx OfficeSafe Operations Guide Release 6.0

Allworx OfficeSafe Operations Guide Release 6.0 Allworx OfficeSafe Operations Guide Release 6.0 No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, photocopy,

More information

How to Install Microsoft Windows Server 2008 R2 in VMware ESXi

How to Install Microsoft Windows Server 2008 R2 in VMware ESXi How to Install Microsoft Windows Server 2008 R2 in VMware ESXi I am not responsible for your actions or their outcomes, in any way, while reading and/or implementing this tutorial. I will not provide support

More information

SoftPhone User Guide

SoftPhone User Guide SoftPhone User Guide Macintosh June 2014 Contents Adding the SoftPhone Icon to the Dock... 2 Connecting Your Headset... 3 Logging in to SoftPhone... 4 Making and Receiving Calls with SoftPhone... 4 Calling

More information

TELPAS Rater s User Guide for Online Holistic Rating Training

TELPAS Rater s User Guide for Online Holistic Rating Training TELPAS Rater s User Guide for Online Holistic Rating Training New User Registration TrainingCenter Site Code If you do not already have a TrainingCenter account used during previous training, including

More information

How to Use JCWHosting Reseller Cloud Storage Solution

How to Use JCWHosting Reseller Cloud Storage Solution How to Use JCWHosting Reseller Cloud Storage Solution Go to https://www.internetspace.co.za and log in with your Cloud Reseller account username and password. How to Use create a cloud account for your

More information

HELP DOCUMENTATION E-SSOM BACKUP AND RESTORE GUIDE

HELP DOCUMENTATION E-SSOM BACKUP AND RESTORE GUIDE HELP DOCUMENTATION E-SSOM BACKUP AND RESTORE GUIDE Copyright 1998-2013 Tools4ever B.V. All rights reserved. No part of the contents of this user guide may be reproduced or transmitted in any form or by

More information

TBS Help Index / On Board Software User Manual

TBS Help Index / On Board Software User Manual TBS Help Index / On Board Software User Manual The TBS 2000 Functional Testing Systems Software has a convenient, quick and easy access on board software help manual. While a hard copy of on board TBS

More information

Disaster Recovery Guide

Disaster Recovery Guide Disaster Recovery Guide BounceBack Disaster Recovery User Guide Table of Contents Introduction Starting the Instant PC Recovery Drive Troubleshooting the Instant PC Recovery Drive Using the Rescue Disk

More information

KU Information Technology provides wireless access for both the KU campus community and for guest users at many points across campus.

KU Information Technology provides wireless access for both the KU campus community and for guest users at many points across campus. Wireless at KU KU Information Technology provides wireless access for both the KU campus community and for guest users at many points across campus. The Campus IT map provides building locations where

More information

How To Upgrade Your Microsoft SQL Server for Accounting CS Version 2012.1

How To Upgrade Your Microsoft SQL Server for Accounting CS Version 2012.1 How To Upgrade Your Microsoft SQL Server for Version 2012.1 The first step is to gather important information about your existing configuration. Identify The Database Server and SQL Server Version The

More information

Instrument Software Update Instructions. Keysight X-Series Signal Analyzers (PXA/MXA/EXA/CXA) Upgrading an older version to A.12.

Instrument Software Update Instructions. Keysight X-Series Signal Analyzers (PXA/MXA/EXA/CXA) Upgrading an older version to A.12. Instrument Software Update Instructions Keysight X-Series Signal Analyzers (PXA/MXA/EXA/CXA) Purpose Upgrading an older version to A.12.09 and above The purpose of this document is to outline the instrument

More information

EASE Scan Tool Customers. SECTION I - Installation

EASE Scan Tool Customers. SECTION I - Installation Please Install Your EASE Scan Tool DVD Before Installing Any Other Software That Came With Your Package. SECTION I - Installation ATTENTION: Do NOT connect an EASE Vehicle Interface Device to your Computer

More information

TELPAS Rater s User Guide for Online Holistic Rating Training

TELPAS Rater s User Guide for Online Holistic Rating Training TELPAS Rater s User Guide for Online Holistic Rating Training New User Registration TrainingCenter Site Code You will need a TrainingCenter site code from your district or campus testing coordinator in

More information

WINDOWS 7 MANAGE FILES AND FOLDER WITH WINDOWS EXPLORER

WINDOWS 7 MANAGE FILES AND FOLDER WITH WINDOWS EXPLORER WINDOWS 7 MANAGE FILES AND FOLDER WITH WINDOWS EXPLORER Last Edited: 2012-07-10 1 Introduce Windows Explorer... 3 Navigate folders and their contents... 5 Organize files and folders... 8 Move or copy files

More information

Dual-boot Windows 10 alongside Windows 8

Dual-boot Windows 10 alongside Windows 8 Most of the people are very much interested to install the newly launched Operating System Windows 10 on their devices. But, it is not recommended to directly use Windows 10 as the primary OS because it

More information

SonicWALL CDP Local Archiving

SonicWALL CDP Local Archiving This document describes how to configure, implement, and manage a local archive for your SonicWALL CDP appliance. It contains the following sections: Feature Overview section on page 1 Using Local Archiving

More information

Sharp Remote Device Manager (SRDM) Server Software Setup Guide

Sharp Remote Device Manager (SRDM) Server Software Setup Guide Sharp Remote Device Manager (SRDM) Server Software Setup Guide This Guide explains how to install the software which is required in order to use Sharp Remote Device Manager (SRDM). SRDM is a web-based

More information

Acer erecovery Management

Acer erecovery Management Acer erecovery Management The Acer erecovery Management provides fast, reliable and safe method of restoring your computer to its factory default settings or user-defined system configuration from an image

More information

IT Quick Reference Guides Installing Office 365 from Kivuto Solutions

IT Quick Reference Guides Installing Office 365 from Kivuto Solutions IT Quick Reference Guides Installing Office 365 from Kivuto Solutions Software Guides This guide covers the installation process for Office 365 purchased from Kivuto Solutions (MEEC). Please note that

More information

Joining an XP workstation to a domain Version 1.00

Joining an XP workstation to a domain Version 1.00 Joining an XP workstation to a domain Version 1.00 All Windows XP Professional workstations need to be joined to a domain to function as part of the domain security environment. Need to Know TM 1. To join

More information

Profit Developers, Inc. (PDI) 2015 SAXTAX Software Installation Guide

Profit Developers, Inc. (PDI) 2015 SAXTAX Software Installation Guide 2015 SAXTAX Software Installation Guide 1. Installation: Installing from a Link: Please click on the link provided in the setup email received. Some email accounts will not allow access to executable links

More information

HP ProtectTools for Small Business Security Software, Version 5.10. User Guide

HP ProtectTools for Small Business Security Software, Version 5.10. User Guide HP ProtectTools for Small Business Security Software, Version 5.10 User Guide Copyright 2010 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.

More information

5.6.3 Lab: Registry Backup and Recovery in Windows XP

5.6.3 Lab: Registry Backup and Recovery in Windows XP 5.6.3 Lab: Registry Backup and Recovery in Windows XP Introduction Print and complete this lab. In this lab, you will back up a computer registry. You will also perform a recovery of a computer registry.

More information

Electronic Signature Capture

Electronic Signature Capture Electronic Signature Capture Contents Configuration Store... 1 Configuration Work Station... 2 Configuration Customized Workflow... 8 Customizing the Fill Regular Rx Workflow... 9 Capturing Electronic

More information

Acer erecovery Management

Acer erecovery Management 1 Acer erecovery Management Developed by Acer's software team, Acer erecovery Management is a tool that provides you with an easy, reliable and safe means of restoring your computer to its factory default

More information

HP P4000 G2 Series System Recovery Procedures

HP P4000 G2 Series System Recovery Procedures nl HP P4000 G2 Series System Recovery Procedures P4500 G2 P4300 G2 Part Number: AX696-96065 First edition: November 2010 Legal and notice information Copyright 2009-2010 Hewlett-Packard Development Company,

More information

HP ProtectTools. Getting Started

HP ProtectTools. Getting Started HP ProtectTools Getting Started Copyright 2012 Hewlett-Packard Development Company, L.P. Bluetooth is a trademark owned by its proprietor and used by Hewlett-Packard Company under license. Intel is a trademark

More information

NovaBACKUP. User Manual. NovaStor / November 2011

NovaBACKUP. User Manual. NovaStor / November 2011 NovaBACKUP User Manual NovaStor / November 2011 2011 NovaStor, all rights reserved. All trademarks are the property of their respective owners. Features and specifications are subject to change without

More information

11.4.5 Optional Lab: Install, Configure, and Partition a Second Hard Drive in Windows Vista

11.4.5 Optional Lab: Install, Configure, and Partition a Second Hard Drive in Windows Vista 11.4.5 Optional Lab: Install, Configure, and Partition a Second Hard Drive in Windows Vista Introduction Print and complete this lab. In this lab, you will change the boot order, install a second hard

More information

ZENworks 11 Support Pack 4 Full Disk Encryption Agent Reference. May 2016

ZENworks 11 Support Pack 4 Full Disk Encryption Agent Reference. May 2016 ZENworks 11 Support Pack 4 Full Disk Encryption Agent Reference May 2016 Legal Notice For information about legal notices, trademarks, disclaimers, warranties, export and other use restrictions, U.S. Government

More information

Acceptable Encryption Usage for UTHSC

Acceptable Encryption Usage for UTHSC This document explains the acceptable use of encryption for the UTHSC system. It includes: acceptable encryption software, techniques, algorithms and instructions. Encryption methods and software are arranged

More information

Ocster Backup - Rescue System

Ocster Backup - Rescue System Overview Ocster Backup - Rescue System The software allows you to create a rescue CD, DVD or USB-Stick. This rescue system is intended for two kinds of situations: 1. To restore a backup to your main hard

More information

Email Export. Exporting Client Email Addresses

Email Export. Exporting Client Email Addresses Email Export Exporting Client Email Addresses STX has the ability to export email addresses from the Client file. Once those addresses are exported, STX has nothing else to do with getting the addresses

More information

PLEASE PRINT THESE INSTRUCTIONS OUT.

PLEASE PRINT THESE INSTRUCTIONS OUT. PLEASE PRINT THESE INSTRUCTIONS OUT. Directions on How to Install and Configure Lotus Notes 8.5.3 on PCs Download & Install Lotus Notes Download and save lotus_notes853_win_en.exe as directed in the email

More information

SATA RAID Function (Only for chipset Sil3132 used) User s Manual

SATA RAID Function (Only for chipset Sil3132 used) User s Manual SATA RAID Function (Only for chipset Sil3132 used) User s Manual 12ME-SI3132-001 Table of Contents 1 WELCOME...4 1.1 SATARAID5 FEATURES...4 2 AN INTRODUCTION TO RAID...5 2.1 DISK STRIPING (RAID 0)...5

More information

Host Installation on a Terminal Server

Host Installation on a Terminal Server TECHNICAL PAPER Host Installation on a Terminal Server Netop develops and sells software solutions that enable swift, secure and seamless transfer of video, screens, sounds and data between two or more

More information

TouchPad and Keyboard

TouchPad and Keyboard TouchPad and Keyboard Document Part Number: 393522-001 October 2005 This guide explains the TouchPad and keyboard. Contents 1 TouchPad Identifying the Touchpad........................... 1 Using the TouchPad...............................

More information

HP Factory-Installed Operating System Software for Windows Server 2008 R2 Standard and Windows Server 2012 Standard User Guide

HP Factory-Installed Operating System Software for Windows Server 2008 R2 Standard and Windows Server 2012 Standard User Guide HP Factory-Installed Operating System Software for Windows Server 2008 R2 Standard and Windows Server 2012 Standard User Guide HP Part Number: 481182-006 Published: September 2012 Edition: Fifth Contents

More information

BorderGuard Client. Version 4.4. November 2013

BorderGuard Client. Version 4.4. November 2013 BorderGuard Client Version 4.4 November 2013 Blue Ridge Networks 14120 Parke Long Court, Suite 103 Chantilly, Virginia 20151 703-631-0700 WWW.BLUERIDGENETWORKS.COM All Products are provided with RESTRICTED

More information

16.4.3 Lab: Data Backup and Recovery in Windows XP

16.4.3 Lab: Data Backup and Recovery in Windows XP 16.4.3 Lab: Data Backup and Recovery in Windows XP Introduction Print and complete this lab. In this lab, you will back up data. You will also perform a recovery of the data. Recommended Equipment The

More information

Print Server Application Guide. This guide applies to the following models.

Print Server Application Guide. This guide applies to the following models. Print Server Application Guide This guide applies to the following models. TL-WR842ND TL-WR1042ND TL-WR1043ND TL-WR2543ND TL-WDR4300 CONTENTS Chapter 1. Overview... 1 Chapter 2. Before Installation...

More information

Downloading the Setup Program

Downloading the Setup Program The Web DPAS scanner software (DpasAit) is used for automated inventories as well as various other tasks which can be performed separately from the Web DPAS interface. The installation is performed in

More information