WINDOWS PROCESSES AND SERVICES
|
|
- Joan Nelson
- 8 years ago
- Views:
Transcription
1 OBJECTIVES: Services o task manager o services.msc Process o task manager o process monitor Task Scheduler Event viewer Regedit
2 Services: A Windows service is a computer program that operates in the background. A Windows service must conform to the interface rules and protocols of the Service Control Manager, the component responsible for managing Windows services. Windows services can be configured to start when the operating system is started and run in the background as long as Windows is running. Alternatively, they can be started manually or by an event. Windows operating systems include numerous services which run in context of three user accounts: System, Network Service and Local Service. These Windows components are often associated with Host Process for Windows Services. Because Windows services operate in the context of their own dedicated user accounts, they can operate when a user is not logged on. Prior to Windows Vista, services installed as an "interactive service" could interact with Windows desktop and show a graphical user interface. In Windows Vista, however, interactive services are deprecated and may not operate properly, as a result of Windows Service hardening. The windows service is effectively an application with a few extra methods exposed for the service manager to control it, namely Stop(), Start(), Pause(), Continue(). When Start is called the application domain is created, the service class initialized and the Start()method called. On stop the Stop() method is called before the application domain is unloaded from memory. You can see this with task manager. The application doesn't exist in memory until the start is called and it disappears after the Stop is completed. Managing Services in Task Manager The Services tab of the Task Manager dialog box, shown in Figure lists all the services that can run on the computer. For each service, you will see the Name (the name of the service), the PID (the associated process identifier), Description (a description of the service, Status (whether a process is Running or Stopped), and Group (the service group). To start a stopped service, click the service and select Start Service. To stop a running service, click the service and select Stop Service.
3 Managing Services in services.msc You can also open the Services tool by clicking the Services button. The Services tool allows you to specify whether a process starts automatically, automatically with a delayed start, manually, or is disabled. The Component Services (initialized from the Start Menu, Run, "services.msc" - without quotes) is a management tool in the operating system that enables the management, configuration, initialization, removal or pause the services that operating systems Platform Windows provide to the user. Many services are already preconfigured in the default installation of MS-Windows and is automatically activated. Others are only available but not started. When there is a need to use the service by the operating system or the user, as a matter of use with some application software, it can start the service (this is set to "Manual") or the system itself can activate it ( if it is set to "Auto"). Some services may be deactivated. The activation of the service in this case it is necessary, depending on which requires rebooting the computer.
4 The services.msc component can found in: o Right-click on Computer icon on desktop and select Manage, it'll open a new window. Now go to Services & Applications -> Services. You can also open the same from Administrative Tools-> Computer Management. o Or you can directly open "Services" list by providing services.msc command in RUN or Start Menu search box.
5 Processes: Like most modern operating systems, Windows can run many programs at the same time. Still, unless your computer has several processors, it can only perform one task at a time. To solve this problem Windows switches rapidly between all running programs, creating the illusion of all programs running in parallel. If you have ever experienced a crash, however, you probably know that as soon as the switching stops working, all programs simply stop working. This is because the processor gets locked up in one process and stays there. What is a Process? While the word "program" refers to the executable code (the exe file, for example), a process is a program that is being executed. When you start a program in Windows, the executable will be loaded into RAM. Windows will then add the new process to its internal process list and make sure the process receives some CPU time as well as memory and other resources. A process can then request any amount of resources from Windows as long as there are resources left. Windows keeps track of which processes are using which resources. As soon as a process is closed or terminated, all resources used by that process will be returned to Windows and will then be handed out to other processes. Unlike memory and similar resources, CPU time cannot simply be requested but is instead shared equally between processes. A process can also return the CPU to Windows before the assigned time slice ends. This is actually what happens most of the time and is the reason why your CPU usage is not always at 100 % Managing Process Tasks in Task Manager The Processes tab of the Task Manager dialog box, shown in Figure 15.21, lists all the processes that are currently running on the computer. This is a convenient way to get a quick look at how your system is performing. For each process, you will see the Image Name (the name of the process), the User Name (the user account that is running the process), CPU (the amount of CPU utilization for the process), Memory (Private Working Set) (the amount of memory that is being used by the process), and Description (a description of the process). From the Processes tab, you can organize the listing and control processes as follows: To organize the processes, click the column headings. For example, if you click the CPU column, the listing will start with the processes that use the most CPU resources. If you click the CPU column a second time, the listing will be reversed so that the processes that use the least CPU resources are listed first. To manage a process, right-click it and choose an option from the context menu. You can choose to end the process, end the process tree, debug the process, specify virtualization, create a dump file, or set the priority of the process (to Realtime, High, Above Normal, Normal, Below Normal, or Low). If your computer has multiple processors installed, you can also set processor affinity (the process of associating a specific process with a specific processor) for a process.
6 To customize the counters that are listed, select View _ Select Columns. This brings up the Select Columns dialog box where you can select various information you want to see listed on the Processes tab. On the Processes tab in Task Manager, you can also stop a process and manage process priority: Stopping Processes You might need to stop a process that isn t executing properly. To stop a specific process, select the process you want to stop in the Task Manager s Processes tab and click the End Process button. Task Manager displays a Warning dialog box. Click the End Process button to terminate the process. If you right-click a process, you can end the specific process or you can use the option End Process Tree. The End Process Tree option ends all processes that have been created either directly or indirectly by the process. Managing Process Priority To change the priority of a process that is already running, use the Processes tab of Task Manager. Right-click the process you want to manage and select Set Priority from the context menu. You can select from Realtime, High, Above Normal, Normal,
7 Below Normal, and Low. As you might expect, applications launch at Normal priority by default. Perform the following steps to set a process priority and end a process from within Task Manager: 1. Right-click an empty space on your Taskbar and select Task Manager from the context menu. 2. On the Applications tab, click the New Task button. Process Monitor Process Monitor is an advanced monitoring tool for Windows that shows real-time file system, Registry and process/thread activity. It combines the features of two legacy Sysinternals utilities, Filemon and Regmon, and adds an extensive list of enhancements including rich and non destructive filtering, comprehensive event properties such session IDs and user names, reliable process information, full thread stacks with integrated symbol support for each operation, simultaneous logging to a file, and much more. Its uniquely powerful features will make Process Monitor a core utility in your system troubleshooting and malware hunting toolkit. Overview of Process Monitor Capabilities Process Monitor includes powerful monitoring and filtering capabilities, including: More data captured for operation input and output parameters Non-destructive filters allow you to set filters without losing data Capture of thread stacks for each operation make it possible in many cases to identify the root cause of an operation Reliable capture of process details, including image path, command line, user and session ID Configurable and moveable columns for any event property Filters can be set for any data field, including fields not configured as columns Advanced logging architecture scales to tens of millions of captured events and gigabytes of log data Process tree tool shows relationship of all processes referenced in a trace Native log format preserves all data for loading in a different Process Monitor instance Process tooltip for easy viewing of process image information Detail tooltip allows convenient access to formatted data that doesn't fit in the column Cancellable search Boot time logging of all operations The best way to become familiar with Process Monitor's features is to read through the help file and then visit each of its menu items and options on a live system.
8
9 Setting Up Task Scheduler Use the Task Scheduler utility in Windows 7 to schedule actions to occur at specified intervals. Windows 7 Task Scheduler can be accessed by typing task scheduler in the Start menu s search box. Creating a Scheduled Task You can create a basic task by selecting the Create Basic Task item in the Actions pane in the right side of Task Scheduler. By creating a basic task, a Task Manager wizard lets you set any of your Windows programs to run automatically at a specific time and at a set interval, such as daily, weekly, or monthly. For example, you might schedule an application to run daily at 2:00 a.m. Actions can be performed at the following events (called triggers) available in the Task Manager wizard: Daily, or once every number of days (such as once every three days) Weekly, or on certain days of the week, or every number of weeks (such as every four weeks on Monday) Monthly, or on selected days of the month, or only on selected months One time only When the computer starts When you log on When a specific event is logged If you ve chosen a time trigger, you configure the time/date when the action will occur. When a trigger is activated, Task Scheduler can perform the following actions: Start a program. Send an . Display a message. Managing Scheduled Task Properties You can manage a scheduled task through its properties dialog box. To access this dialog box, rightclick the task you want to manage and choose Properties from the context menu, as shown in Figure The scheduled task s properties dialog box has six tabs for configuration, as follows: General : General Tab On the General tab, you can configure the following options: o The description of the task o The username or group to be used to run the specified task o Whether the task is run when the user is logged off o Whether the task is hidden Triggers : Triggers Tab The Triggers tab shows the schedule configured for the task. You can click Edit to edit the trigger, which brings up the Edit Trigger dialog box. You can also click New to create a new trigger or click Delete to delete an existing trigger.
10 Actions : Actions Tab The Actions tab shows the action that is configured for the task. You can click Edit to edit the action, which brings up the Edit Action dialog box. You can also click New to create a new action or click Delete to delete an existing action. Conditions : Conditions Tab The Conditions tab shows the conditions associated with the task. The options in the Idle section are useful if the computer must be idle when the task is run. You can specify how long the computer must be idle before the task begins and whether the task should be stopped if the computer ceases to be idle. The options in the Power section are applicable when the computer on which the task runs is battery powered. You can specify that the task should not start if the computer is running from batteries and choose to stop the task if battery mode begins. You can also select whether to wake the computer in order to run the task. The option in the Network section defines whether the task starts when a particular network connection is available. Settings : Settings Tab The Settings tab shows the settings that affect the task s behavior with the following settings: o Whether the task can be run on demand o Whether the task should be restarted if it is missed o How often the task should be restarted if it fails o When to stop the task if it runs a long time o Whether you can force the task to stop o When the task should be deleted o What actions should occur if the task is already running History: History Tab The History tab shows historical information regarding the task, including the task s start time, stop time, and whether the task completed successfully. Once set up, the scheduled task should commence at the appropriate time; if not, you might need to troubleshoot it.
11
12 Using Event Viewer Event Viewer, shown in Figure below, enables you to view event logs that are created by the operating system. This utility is useful when troubleshooting problems that occur on your computer. Whenever an error occurs, an event is usually placed in one or more event logs. To open Event Viewer, click Start _ Control Panel _ System And Security _ Administrative Tools _ View Event Logs, or you can type event viewer in the Start menu s search box. Whereas old versions of Event Viewer contained only the Application, Security, and System logs, the Windows 7 version of Event Viewer contains the following logs: Application : The Application log is used to log events relating to applications, such as whether an application, driver, or service fails Security: The Security log is used to log security events, such as successful or failed logon events. Setup: The Setup log is used only by domain controllers, so it doesn t have much practical use in Windows 7.
13 System: The System log is used to log events concerning the operating system and related services. Forwarded Events: The Forwarded Events log is used to collect events that have been forwarded from other computers. To configure log settings, right-click the log that you want to configure and select Properties. The Log Properties dialog box appears. The application log properties are shown in Figure.
14 The Log Properties dialog box shows the following information: The full name of the log Where the log is stored The size of the log When the log was created, modified, and accessed Whether logging is enabled for the ldog The maximum log size in KB The action that occurs when the log reaches the max size The left pane of Event Viewer is where you find the Windows logs noted previously, but it also contains other logs and views that can be helpful when troubleshooting a specific application. The Custom Views section can be used to create a view that contains only the information you want to see, such as only events in a particular log or only Critical events. One custom view, Administrative Events, is created for you by default, as shown in Figure The Administrative Events view contains Critical, Error, and Warning events from all logs, enabling you to easily view only the most important events. Another section in the left pane contains logs that relate to Applications and Services, as shown in Figure The Microsoft folder within the Application and Services Log contains many other logs related to specific Microsoft components and applications. The Subscription folder enables you to receive event logs from other computers. Having other machines send its event to one machine is useful to us as it gives us one central to view events from multiple locations. To use subscriptions, you must start the Windows Event Collector Service. The center pane of Event Viewer displays the events and information that relates to those events. You can also view a summary of your administrative events, which contains a count of Critical, Error, Warning, Information, Audit Success, and Audit Failure events. A count of these events is displayed for the last hour, day, and week, and the total number of events is also provided. Each event is assigned an event level of Critical, Error, Warning, Information, or Verbose. The right pane of Event Viewer enables you to perform actions related to items you have selected in the left and center panes. You can save logs, open saved logs, create or import views, clear logs, filter logs, and find logs with certain keywords. You can also attach a task to an event. Clicking Attach Task To This Event opens the Create Basic Task
15 REGEDIT Most of the time, you'll use the Services console in the Administrative Tools folder to enable and disable services. In some cases, however, you might need to enable or disable services manually. This could be the case if you've modified the system's configuration and services to the point that the Services console no longer lets you enable services. Or you might need to enable a service remotely. To enable services on the computer through the registry, open the Start the Registry Editor by pressing the Start-button and Run... this command: Regedit Browse through the left tree to where Services are found: [HKEY_LOCAL_MACHINE \System \CurrentControlSet \Services] Within the Services-key find go to the short-name of the wanted service (HereRpcSS aka. Remote Procedure Call (RPC)): [HKEY_LOCAL_MACHINE \System \CurrentControlSet \Services \RpcSS]
16 Double-Click the Start-value in the list to the right. Change Value data: to the wanted state: o 0 = Boot o 1 = System o 2 = Automatic o 3 = Manual o 4 = Disabled Press Ok and exit the Registry Editor. If setting a service to Disabled or Manual, then execute this command to stop the service: Net Stop RpcSS If setting the service to Automatic, then execute this command to start the service: Net Start RpcSS
Server Manager Performance Monitor. Server Manager Diagnostics Page. . Information. . Audit Success. . Audit Failure
Server Manager Diagnostics Page 653. Information. Audit Success. Audit Failure The view shows the total number of events in the last hour, 24 hours, 7 days, and the total. Each of these nodes can be expanded
More informationUsing Process Monitor
Using Process Monitor Process Monitor Tutorial This information was adapted from the help file for the program. Process Monitor is an advanced monitoring tool for Windows that shows real time file system,
More informationAlso on the Performance tab, you will find a button labeled Resource Monitor. You can invoke Resource Monitor for additional analysis of the system.
1348 CHAPTER 33 Logging and Debugging Monitoring Performance The Performance tab enables you to view the CPU and physical memory usage in graphical form. This information is especially useful when you
More information13 Managing Devices. Your computer is an assembly of many components from different manufacturers. LESSON OBJECTIVES
LESSON 13 Managing Devices OBJECTIVES After completing this lesson, you will be able to: 1. Open System Properties. 2. Use Device Manager. 3. Understand hardware profiles. 4. Set performance options. Estimated
More informationHands-On Microsoft Windows Server 2008
Hands-On Microsoft Windows Server 2008 Chapter 10 Managing System Reliability and Availability Using and Configuring Event Viewer Event Viewer Houses the event logs that record information about all types
More informationUser Guide Win7Zilla
User Guide Win7Zilla Table of contents Section 1: Installation... 3 1.1 System Requirements... 3 1.2 Software Installation... 3 1.3 Uninstalling Win7Zilla software... 3 Section 2: Navigation... 4 2.1 Main
More informationUnderstanding Task Scheduler FIGURE 33.14. Task Scheduler. The error reporting screen.
1383 FIGURE.14 The error reporting screen. curring tasks into a central location, administrators gain insight into system functionality and control over their Windows Server 2008 R2 infrastructure through
More informationFIGURE 33.5. Selecting properties for the event log.
1358 CHAPTER 33 Logging and Debugging Customizing the Event Log The properties of an event log can be configured. In Event Viewer, the properties of a log are defined by general characteristics: log path,
More informationInstalling Windows Server Update Services (WSUS) on Windows Server 2012 R2 Essentials
Installing Windows Server Update Services (WSUS) on Windows Server 2012 R2 Essentials With Windows Server 2012 R2 Essentials in your business, it is important to centrally manage your workstations to ensure
More informationVirtual CD v10. Network Management Server Manual. H+H Software GmbH
Virtual CD v10 Network Management Server Manual H+H Software GmbH Table of Contents Table of Contents Introduction 1 Legal Notices... 2 What Virtual CD NMS can do for you... 3 New Features in Virtual
More informationMicrosoft Access Database
1 of 6 08-Jun-2010 12:38 Microsoft Access Database Introduction A Microsoft Access database is primarily a Windows file. It must have a location, also called a path, which indicates how the file can be
More informationLenovo Online Data Backup User Guide Version 1.8.14
Lenovo Online Data Backup User Guide Version 1.8.14 Contents Chapter 1: Installing Lenovo Online Data Backup...5 Downloading the Lenovo Online Data Backup Client...5 Installing the Lenovo Online Data
More informationNETWRIX ACCOUNT LOCKOUT EXAMINER
NETWRIX ACCOUNT LOCKOUT EXAMINER ADMINISTRATOR S GUIDE Product Version: 4.1 July 2014. Legal Notice The information in this publication is furnished for information use only, and does not constitute a
More informationChanging Your Cameleon Server IP
1.1 Overview Technical Note Cameleon requires that you have a static IP address defined for the server PC the Cameleon server application runs on. Even if the server PC has a static IP address, you may
More informationACTIVE DIRECTORY DEPLOYMENT
ACTIVE DIRECTORY DEPLOYMENT CASAS Technical Support 800.255.1036 2009 Comprehensive Adult Student Assessment Systems. All rights reserved. Version 031809 CONTENTS 1. INTRODUCTION... 1 1.1 LAN PREREQUISITES...
More informationQUANTIFY INSTALLATION GUIDE
QUANTIFY INSTALLATION GUIDE Thank you for putting your trust in Avontus! This guide reviews the process of installing Quantify software. For Quantify system requirement information, please refer to the
More informationContents 1. Introduction 2. Security Considerations 3. Installation 4. Configuration 5. Uninstallation 6. Automated Bulk Enrollment 7.
Contents 1. Introduction 2. Security Considerations 3. Installation 4. Configuration 5. Uninstallation 6. Automated Bulk Enrollment 7. Troubleshooting Introduction Adaxes Self-Service Client provides secure
More informationHow To Install Database Oasis On A Computer Or Computer (For Free)
INSTALLATION INSTRUCTIONS Table of Contents Installation Instructions 1 Table of Contents 1 System Requirements 2 Installation 3 Selecting where to Install the Professional Server 3 Installing Prerequisites
More informationUsing Logon Agent for Transparent User Identification
Using Logon Agent for Transparent User Identification Websense Logon Agent (also called Authentication Server) identifies users in real time, as they log on to domains. Logon Agent works with the Websense
More informationNETWRIX WINDOWS SERVER CHANGE REPORTER
NETWRIX WINDOWS SERVER CHANGE REPORTER INSTALLATION AND CONFIGURATION GUIDE Product Version: 4.0 March 2013. Legal Notice The information in this publication is furnished for information use only, and
More informationProduct Review ControlUp
Product Review ControlUp Februari 2012 Wilco van Bragt Control-UP Page 2 of 15 Introduction While Citrix Resource Manager was not perfect in earlier version of Citrix Presentation Server, many Citrix administrators
More informationTable of Contents. OpenDrive Drive 2. Installation 4 Standard Installation Unattended Installation
User Guide for OpenDrive Application v1.6.0.4 for MS Windows Platform 20150430 April 2015 Table of Contents Installation 4 Standard Installation Unattended Installation Installation (cont.) 5 Unattended
More informationVMware/Hyper-V Backup Plug-in User Guide
VMware/Hyper-V Backup Plug-in User Guide COPYRIGHT No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, photocopying,
More informationPassword Manager Windows Desktop Client
Password Manager Windows Desktop Client EmpowerID provides an extension that allows organizations to plug into Password Manager to customize the Windows logon experience beyond that supplied by the standard
More informationNETWRIX FILE SERVER CHANGE REPORTER
NETWRIX FILE SERVER CHANGE REPORTER ADMINISTRATOR S GUIDE Product Version: 3.3 April/2012. Legal Notice The information in this publication is furnished for information use only, and does not constitute
More informationViewing and Troubleshooting Perfmon Logs
CHAPTER 7 To view perfmon logs, you can download the logs or view them locally. This chapter contains information on the following topics: Viewing Perfmon Log Files, page 7-1 Working with Troubleshooting
More informationILTA HANDS ON Securing Windows 7
Securing Windows 7 8/23/2011 Table of Contents About this lab... 3 About the Laboratory Environment... 4 Lab 1: Restricting Users... 5 Exercise 1. Verify the default rights of users... 5 Exercise 2. Adding
More informationEVENT VIEWER IN WINDOWS 7
EVENT VIEWER IN WINDOWS 7 Event Viewer We can open Event Viewer in different ways, such as trough Computer Management and Administrative Tools. However, the easiest way is to type "eventvwr" in search
More informationMAPILab Search for Exchange. Administrator s Guide. Version 1.3
MAPILab Search for Exchange Administrator s Guide Version 1.3 MAPILab, July 2014 Contents Introduction... 3 1. Product Overview... 4 2. Product Architecture and Basic Terms... 5 3. System Requirements...
More informationWorking with Administrative Tools
This final chapter considers a variety of administrative 12 tools and how to use them. Working with Administrative Tools Using Administrative Tools Once you go though Control Panel (assuming you haven
More informationDesktop Surveillance Help
Desktop Surveillance Help Table of Contents About... 9 What s New... 10 System Requirements... 11 Updating from Desktop Surveillance 2.6 to Desktop Surveillance 3.2... 13 Program Structure... 14 Getting
More informationWhatsUp Gold v16.3 Installation and Configuration Guide
WhatsUp Gold v16.3 Installation and Configuration Guide Contents Installing and Configuring WhatsUp Gold using WhatsUp Setup Installation Overview... 1 Overview... 1 Security considerations... 2 Standard
More informationLogMeIn Backup. User Guide
LogMeIn Backup User Guide Contents About LogMeIn Backup...4 Getting Started with LogMeIn Backup...5 How does LogMeIn Backup Work, at-a-glance?...5 About Security in LogMeIn Backup...5 LogMeIn Backup System
More information5.6.3 Lab: Registry Backup and Recovery in Windows XP
5.6.3 Lab: Registry Backup and Recovery in Windows XP Introduction Print and complete this lab. In this lab, you will back up a computer registry. You will also perform a recovery of a computer registry.
More informationSage ERP Accpac 6.0A. SageCRM 7.0 I Integration Guide
Sage ERP Accpac 6.0A SageCRM 7.0 I Integration Guide 2010 Sage Software, Inc. All rights reserved. Sage, the Sage logos, and all Sage ERP Accpac product and service names mentioned herein are registered
More informationVirtualXP Users Guide
VirtualXP Users Guide Contents Chapter 1: Introduction... 2 Chapter 2: Install and Uninstall VirtualXP... 3 2.1 System Requirement... 3 2.2 Installing VirtualXP... 3 2.3 Uninstalling VirtualXP... 3 Chapter
More informationSTATISTICA VERSION 9 STATISTICA ENTERPRISE INSTALLATION INSTRUCTIONS FOR USE WITH TERMINAL SERVER
Notes: STATISTICA VERSION 9 STATISTICA ENTERPRISE INSTALLATION INSTRUCTIONS FOR USE WITH TERMINAL SERVER 1. These instructions focus on installation on Windows Terminal Server (WTS), but are applicable
More information2. Using Notepad, create a file called c:\demote.txt containing the following information:
Unit 4 Additional Projects Configuring the Local Computer Policy You need to prepare your test lab for your upcoming experiments. First, remove a child domain that you have configured. Then, configure
More informationAdministrator s Guide
Attachment Save for Exchange Administrator s Guide document version 1.8 MAPILab, December 2015 Table of contents Intro... 3 1. Product Overview... 4 2. Product Architecture and Basic Concepts... 4 3. System
More informationTeamViewer 9 Manual ITbrain
TeamViewer 9 Manual ITbrain Rev 9.2-201407 TeamViewer GmbH Jahnstraße 30 D-73037 Göppingen www.teamviewer.com Table of Contents 1 General 3 1.1 About ITbrain 3 1.2 About the manual 3 2 Requirements 4 2.1
More informationNon-ThinManager Components
Non-ThinManager Components Microsoft Terminal Servers play an important role in the ThinManager system. It is recommended that you become familiar with the documentation provided by Microsoft about their
More informationGlobal Image Management System For epad-vision. User Manual Version 1.10
Global Image Management System For epad-vision User Manual Version 1.10 May 27, 2015 Global Image Management System www.epadlink.com 1 Contents 1. Introduction 3 2. Initial Setup Requirements 3 3. GIMS-Server
More informationKepware Technologies Remote OPC DA Quick Start Guide (DCOM)
Kepware Technologies Remote OPC DA Quick Start Guide (DCOM) March, 2013 Ref. 03.10 Kepware Technologies Table of Contents 1. Overview... 1 1.1 What is DCOM?... 1 1.2 What is OPCEnum?... 1 2. Users and
More informationIf you re the unofficial administrator of your home or small
C H A P T E R Monitoring Your Network If you re the unofficial administrator of your home or small office network, I imagine you re already saddled with a fairly long to-do list of network chores: adding
More informationUsing Group Policies to Install AutoCAD. CMMU 5405 Nate Bartley 9/22/2005
Using Group Policies to Install AutoCAD CMMU 5405 Nate Bartley 9/22/2005 Before we get started This manual provides a step-by-step process for creating a Group Policy that will install AutoCAD to a Windows
More informationHands-On Microsoft Windows Server 2008
Hands-On Microsoft Windows Server 2008 Chapter 9 Server and Network Monitoring Objectives Understand the importance of server monitoring Monitor server services and solve problems with services Use Task
More informationGetting Started with Vision 6
Getting Started with Vision 6 Version 6.9 Notice Copyright 1981-2009 Netop Business Solutions A/S. All Rights Reserved. Portions used under license from third parties. Please send any comments to: Netop
More informationEkran System Help File
Ekran System Help File Table of Contents About... 9 What s New... 10 System Requirements... 11 Updating Ekran to version 4.1... 13 Program Structure... 14 Getting Started... 15 Deployment Process... 15
More informationTeam Foundation Server 2010, Visual Studio Ultimate 2010, Team Build 2010, & Lab Management Beta 2 Installation Guide
Page 1 of 243 Team Foundation Server 2010, Visual Studio Ultimate 2010, Team Build 2010, & Lab Management Beta 2 Installation Guide (This is an alpha version of Benjamin Day Consulting, Inc. s installation
More information2X ApplicationServer & LoadBalancer Manual
2X ApplicationServer & LoadBalancer Manual 2X ApplicationServer & LoadBalancer Contents 1 URL: www.2x.com E-mail: info@2x.com Information in this document is subject to change without notice. Companies,
More information3 Setting up Databases on a Microsoft SQL 7.0 Server
3 Setting up Databases on a Microsoft SQL 7.0 Server Overview of the Installation Process To set up GoldMine properly, you must follow a sequence of steps to install GoldMine s program files, and the other
More informationAdvanced Event Viewer Manual
Advanced Event Viewer Manual Document version: 2.2944.01 Download Advanced Event Viewer at: http://www.advancedeventviewer.com Page 1 Introduction Advanced Event Viewer is an award winning application
More informationSHARP Digital Signage Software Pro PN-SS05 OPERATION MANUAL
SHARP Digital Signage Software Pro PN-SS05 Version 4.1 OPERATION MANUAL Contents Introduction... 2 Precautions on Use...2 Trademarks...2 How to Read this Manual...3 Definitions...3 Installing/Launching...
More informationGigabyte Management Console User s Guide (For ASPEED AST 2400 Chipset)
Gigabyte Management Console User s Guide (For ASPEED AST 2400 Chipset) Version: 1.4 Table of Contents Using Your Gigabyte Management Console... 3 Gigabyte Management Console Key Features and Functions...
More information523 Non-ThinManager Components
28 Non-ThinManager Components Microsoft Terminal Servers play an important role in the ThinManager system. It is recommended that you become familiar with the documentation provided by Microsoft about
More informationOutpost Network Security
Administrator Guide Reference Outpost Network Security Office Firewall Software from Agnitum Abstract This document provides information on deploying Outpost Network Security in a corporate network. It
More informationHow To Install An Aneka Cloud On A Windows 7 Computer (For Free)
MANJRASOFT PTY LTD Aneka 3.0 Manjrasoft 5/13/2013 This document describes in detail the steps involved in installing and configuring an Aneka Cloud. It covers the prerequisites for the installation, the
More informationAdministration Guide. . All right reserved. For more information about Specops Deploy and other Specops products, visit www.specopssoft.
. All right reserved. For more information about Specops Deploy and other Specops products, visit www.specopssoft.com Copyright and Trademarks Specops Deploy is a trademark owned by Specops Software. All
More informationWhatsUp Event Alarm v10.x Listener Console User Guide
WhatsUp Event Alarm v10.x Listener Console User Guide Contents WhatsUp Event Alarm Listener Console Overview Firewall Considerations... 6 Using the WhatsUp Event Alarm Listener Console... 7 Event Alarm
More informationNTI Backup Now EZ v2 User s Guide
NTI Backup Now EZ v2 User s Guide GMAA00423010 11/12 2 Copyright statement This guide is copyrighted by Toshiba Corporation with all rights reserved. Under the copyright laws, this guide cannot be reproduced
More informationInstallation Instruction STATISTICA Enterprise Server
Installation Instruction STATISTICA Enterprise Server Notes: ❶ The installation of STATISTICA Enterprise Server entails two parts: a) a server installation, and b) workstation installations on each of
More informationTANDBERG MANAGEMENT SUITE 10.0
TANDBERG MANAGEMENT SUITE 10.0 Installation Manual Getting Started D12786 Rev.16 This document is not to be reproduced in whole or in part without permission in writing from: Contents INTRODUCTION 3 REQUIREMENTS
More informationUser Guide. CTERA Agent. August 2011 Version 3.0
User Guide CTERA Agent August 2011 Version 3.0 Copyright 2009-2011 CTERA Networks Ltd. All rights reserved. No part of this document may be reproduced in any form or by any means without written permission
More information4cast Client Specification and Installation
4cast Client Specification and Installation Version 2015.00 10 November 2014 Innovative Solutions for Education Management www.drakelane.co.uk System requirements The client requires Administrative rights
More informationCore Protection for Virtual Machines 1
Core Protection for Virtual Machines 1 Comprehensive Threat Protection for Virtual Environments. Installation Guide e Endpoint Security Trend Micro Incorporated reserves the right to make changes to this
More informationBitDefender Security for Exchange
Quick Start Guide Copyright 2011 BitDefender 1. About This Guide This guide will help you install and get started with BitDefender Security for Exchange. For detailed instructions, please refer to the
More informationvtcommander Installing and Starting vtcommander
vtcommander vtcommander provides a local graphical user interface (GUI) to manage Hyper-V R2 server. It supports Hyper-V technology on full and core installations of Windows Server 2008 R2 as well as on
More informationTelecom DaySave. User Guide. Client Version 2.2.0.3
Telecom DaySave User Guide Client Version 2.2.0.3 Table of Contents Chapter 1: DaySave Overview... 4 Chapter 2: Installing DaySave... 5 Downloading the DaySave Client... 5 Installing the DaySave Client...
More informationAdministrator s Guide
MAPILab Disclaimers for Exchange Administrator s Guide document version 1.8 MAPILab, December 2015 Table of contents Intro... 3 1. Product Overview... 4 2. Product Architecture and Basic Concepts... 4
More informationEnterprise Manager. Version 6.2. Installation Guide
Enterprise Manager Version 6.2 Installation Guide Enterprise Manager 6.2 Installation Guide Document Number 680-028-014 Revision Date Description A August 2012 Initial release to support version 6.2.1
More informationThinPoint Quick Start Guide
ThinPoint Quick Start Guide 2 ThinPoint Quick Start Guide Table of Contents Part 1 Introduction 3 Part 2 ThinPoint Windows Host Installation 3 1 Compatibility... list 3 2 Pre-requisites... 3 3 Installation...
More informationLogMeIn Backup User Guide
LogMeIn Backup User Guide Contents About LogMeIn Backup...4 Getting Started with LogMeIn Backup...5 How does LogMeIn Backup Work, at-a-glance?...5 About Security in LogMeIn Backup...5 LogMeIn Backup System
More informationSecrets of Event Viewer for Active Directory Security Auditing Lepide Software
Secrets of Event Viewer for Active Directory Security Auditing Windows Event Viewer doesn t need any introduction to the IT Administrators. However, some of its hidden secrets, especially those related
More informationIntegrating LANGuardian with Active Directory
Integrating LANGuardian with Active Directory 01 February 2012 This document describes how to integrate LANGuardian with Microsoft Windows Server and Active Directory. Overview With the optional Identity
More informationNetworking Lab - Vista Public Network Sharing
Networking Lab - Vista Public Network Sharing After completing the lab activity, you will be able to: Explain the differences between Windows XP and Windows Vista network sharing. Explain the purpose of
More informationLepide Software. LepideAuditor for File Server [CONFIGURATION GUIDE] This guide informs How to configure settings for first time usage of the software
Lepide Software LepideAuditor for File Server [CONFIGURATION GUIDE] This guide informs How to configure settings for first time usage of the software Lepide Software Private Limited, All Rights Reserved
More informationSELF SERVICE RESET PASSWORD MANAGEMENT GPO DISTRIBUTION GUIDE
SELF SERVICE RESET PASSWORD MANAGEMENT GPO DISTRIBUTION GUIDE Copyright 1998-2015 Tools4ever B.V. All rights reserved. No part of the contents of this user guide may be reproduced or transmitted in any
More informationRoomWizard Synchronization Software Manual Installation Instructions
2 RoomWizard Synchronization Software Manual Installation Instructions Table of Contents Exchange Server Configuration... 4 RoomWizard Synchronization Software Installation and Configuration... 5 System
More informationENABLE LOGON/LOGOFF AUDITING
Lepide Software LepideAuditor Suite ENABLE LOGON/LOGOFF AUDITING This document explains the steps required to enable the auditing of logon and logoff events for a domain. Table of Contents 1. Introduction...
More informationWebEx Remote Access User s Guide
About This Guide This guide introduces you to WebEx Remote Access and its features. This guide assumes that you have a user account for your Remote Access service. Note To obtain a user account, contact
More informationAll Tech Notes and KBCD documents and software are provided "as is" without warranty of any kind. See the Terms of Use for more information.
Tech Note 115 Overview of the InTouch 7.0 Windows NT Services All Tech Notes and KBCD documents and software are provided "as is" without warranty of any kind. See the Terms of Use for more information.
More informationLab 14A: Using Task Manager and Event Viewer
Lab 14A: Using Task Manager and Event Viewer Objectives After completing this lab, you will be able to:!" Monitor application performance by using Task Manager.!" Shut down applications by using Task Manager.!"
More informationAstaro Security Gateway V8. Remote Access via L2TP over IPSec Configuring ASG and Client
Astaro Security Gateway V8 Remote Access via L2TP over IPSec Configuring ASG and Client 1. Introduction This guide contains complementary information on the Administration Guide and the Online Help. If
More informationCTERA Agent for Windows
User Guide CTERA Agent for Windows May 2012 Version 3.1 Copyright 2009-2012 CTERA Networks Ltd. All rights reserved. No part of this document may be reproduced in any form or by any means without written
More informationFile Management Utility User Guide
File Management Utility User Guide Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held
More informationAllworx OfficeSafe Operations Guide Release 6.0
Allworx OfficeSafe Operations Guide Release 6.0 No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, photocopy,
More information2X ApplicationServer & LoadBalancer Manual
2X ApplicationServer & LoadBalancer Manual 2X ApplicationServer & LoadBalancer Contents 1 URL: www.2x.com E-mail: info@2x.com Information in this document is subject to change without notice. Companies,
More informationA+ Guide to Software: Managing, Maintaining, and Troubleshooting, 5e. Chapter 5 Optimizing Windows
: Managing, Maintaining, and Troubleshooting, 5e Chapter 5 Optimizing Windows Objectives Learn about Windows utilities and tools you can use to solve problems with Windows Learn how to optimize Windows
More informationNETWRIX EVENT LOG MANAGER
NETWRIX EVENT LOG MANAGER QUICK-START GUIDE FOR THE ENTERPRISE EDITION Product Version: 4.0 July/2012. Legal Notice The information in this publication is furnished for information use only, and does not
More informationPortions of this product were created using LEADTOOLS 1991-2009 LEAD Technologies, Inc. ALL RIGHTS RESERVED.
Installation Guide Lenel OnGuard 2009 Installation Guide, product version 6.3. This guide is item number DOC-110, revision 1.038, May 2009 Copyright 1992-2009 Lenel Systems International, Inc. Information
More informationIntegrated Virtual Debugger for Visual Studio Developer s Guide VMware Workstation 8.0
Integrated Virtual Debugger for Visual Studio Developer s Guide VMware Workstation 8.0 This document supports the version of each product listed and supports all subsequent versions until the document
More informationDivision of Administration (DOA) Desktop Support
Division of Administration (DOA) Desktop Support Computer Power Conservation Settings for XP & Vista Operating Systems XP Power Options Overview Using Power Options in Control Panel, you can reduce the
More informationGETTING STARTED GUIDE 4.5. FileAudit VERSION. www.isdecisions.com
GETTING STARTED GUIDE FileAudit 4.5 VERSION www.isdecisions.com Introduction FileAudit monitors access or access attempts to sensitive files and folders on Microsoft Windows servers. FileAudit allows you
More informationFileMaker Server 7. Administrator s Guide. For Windows and Mac OS
FileMaker Server 7 Administrator s Guide For Windows and Mac OS 1994-2004, FileMaker, Inc. All Rights Reserved. FileMaker, Inc. 5201 Patrick Henry Drive Santa Clara, California 95054 FileMaker is a trademark
More informationAppLoader7. Windows Server 2008 Injector Optimization. Protocol Independent Load Testing
AppLoader7 Windows Server 2008 Injector Optimization Protocol Independent Load Testing CONTENTS PREREQUISITES... 3 INTRODUCTION... 3 INJECTOR OPTIMIZATIONS... 3 GROUP POLICY CONFIGURATIONS... 3 Internet
More informationUsing Protection Engine for Cloud Services for URL Filtering, Malware Protection and Proxy Integration Hands-On Lab
Using Protection Engine for Cloud Services for URL Filtering, Malware Protection and Proxy Integration Hands-On Lab Description In this hands-on session, you will learn how to turn your proxy into a security
More informationMONITORING PERFORMANCE IN WINDOWS 7
MONITORING PERFORMANCE IN WINDOWS 7 Performance Monitor In this demo we will take a look at how we can use the Performance Monitor to capture information about our machine performance. We can access Performance
More informationTeam Foundation Server 2013 Installation Guide
Team Foundation Server 2013 Installation Guide Page 1 of 164 Team Foundation Server 2013 Installation Guide Benjamin Day benday@benday.com v1.1.0 May 28, 2014 Team Foundation Server 2013 Installation Guide
More information1) This is one recommended way of setting the TaskBar to keep it out of the way of the main application window and yet still easily accessible.
Windows XP Tweaks (Suggestions From RML Labs For Better SAC, SAWStudio and overall Windows Performance) (Follow any or all of these at your own discretion) 1) This is one recommended way of setting the
More informationTroubleshooting Failover in Cisco Unity 8.x
CHAPTER 16 Troubleshooting Failover in Cisco Unity 8.x This chapter describes methods for troubleshooting Cisco Unity failover. See the following sections: Failover Configuration Wizard Does Not Finish
More information