Manage Filespace with the ARS Console

Size: px
Start display at page:

Download "Manage Filespace with the ARS Console"

Transcription

1 Academic Services Exeter IT Desktop Support Manage Filespace with the ARS Console Document reference: Document type: Document status: Review period: DS021 Desktop Support Procedure Live Six months Next review date: 13 July 2015 DS021 - Manage Filespace with the ARS Console - v1.6 - Master.docx Page 1 of 13

2 1 TABLE OF CONTENTS 1 Table of Contents Document History Document location Revision history Approvals Review Overview Installing the ARS Console Creating Groups Setting File Permissions Appendix A - Managing Files and Folders Appendix B - NTFS File Permissions DS021 - Manage Filespace with the ARS Console - v1.6 - Master.docx Page 2 of 13

3 2 DOCUMENT HISTORY 2.1 DOCUMENT LOCATION This document can be accessed from the following location: \\isad.isadroot.ex.ac.uk\uoe\ps\as\shared\exeteritpolicies&procedures\procedures\desktopsupportprocedures 2.2 REVISION HISTORY The latest revision can be found at the top of the list: Revision Date Author Version Summary of Changes 8 Jan 2015 B Lambert 1.6 Removed ref to ver. 6.0 installer and XP 12 Jun 2014 B Lambert 1.5 No Change 01 Aug 2013 B Lambert 1.5 Added how to sever inheritance on windows 7 30 Oct 2012 C Dominey 1.4 Inserted file permission authorisation details 4 Dec 2011 B Lambert 1.3 Added map network drive procedure 10 Dec 2010 B Lambert 1.2 Related to College structure 20-Oct-2009 M Moore 1.1 Installation Server name change 4-Mar-2009 M.Moore 1.0 First Live Release 2.3 APPROVALS This document requires the following approvals: Name Title Version Date of approval Bill Lambert Senior Desktop Support Consultant Jan-2015 Bill Lambert Senior Desktop Support Consultant Jun-2014 Matt Coppell Desktop Support Team Leader Aug-2013 Paul Grogan Incident Response Manager Oct-2012 Paul Grogan Incident Response Manager Jan-2012 Paul Grogan Incident Response Team Leader Dec 2010 Paul Grogan Desktop Support Team Leader Dec-2009 Paul Grogan Desktop Support Team Leader Mar REVIEW This document was reviewed on the following dates and needed no changes: DS021 - Manage Filespace with the ARS Console - v1.6 - Master.docx Page 3 of 13

4 Name Title Version Date of approval DS021 - Manage Filespace with the ARS Console - v1.6 - Master.docx Page 4 of 13

5 3 OVERVIEW All Services and Colleges have access to a shared storage area accessed from a PC as drive N. It is expected that a Service/College will want to sub-divide this shared space into separate folders, some of which may have restricted access and some of which can be used for general access. To manage your shared file space; first create the groups of users in your Service/College that you wish to access folders in your file space, then create the folders in the file space to match the groups and finally grant the access rights (file/folder permissions) to each of these groups. Groups are created and managed using the Active Roles Server (ARS) Console. This document describes how to install and run the ARS Console and how to set file permissions for your folders and files. You need an ISAD admin account to run the ARS console and manage your shared file space. Only designated members of staff in each Service/College will be given the access to do this. Your ISAD admin account should already have been organised for you prior to receiving your ARS training. 4 INSTALLING THE ARS CONSOLE The ARS Console must be installed on a PC running Windows XP. 1. From the Start button choose Run. 2. In the Run dialog box type \\vmars02\install, then click OK. 3. In the window that opens, double-click AutoRun to start the installation. 4. Click on Quest ActiveRoles Server and choose Console (MMC Interface), (select either x86 MMC or x64 MMC), to install the ARS console. Take care when doing this as it is essential that this is the ONLY link in this window that you click. This will install ActiveRoles Server version 6.7. DS021 - Manage Filespace with the ARS Console - v1.6 - Master.docx Page 5 of 13

6 5. Click on next, accept the Licence agreement, and then provide your User information when prompted. 6. Click next and when prompted for which feature you wish to install, choose the MMC interface. 7. Click next to complete the installation; this should only take a couple of minutes. 8. Click Finish to close the installation. DS021 - Manage Filespace with the ARS Console - v1.6 - Master.docx Page 6 of 13

7 5 CREATING GROUPS 1. Click on Start/All Programs/Quest Software/ActiveRoles Server/ActiveRoles Server Console to connect to the ActiveRoles Server. The following window will open: 2. If you have logged into ISAD with your ISAD admin account you will be connected to the ActiveRoles Server. If you have logged in with your usual account, right-click on Active Roles Server and choose Connect. Click on Options, then in the new window that opens, check Connect as The following user and enter your ISAD admin account details. 3. Once connected, expand Active Directory and navigate to your Service/College and then Groups. DS021 - Manage Filespace with the ARS Console - v1.6 - Master.docx Page 7 of 13

8 4. Right-click Groups, then New and choose Group. 5. In the dialog box that opens, type in the name of your group, retaining the prefix, and enter a description. Care should be taken when naming groups and writing descriptions, particularly if you are managing a large number of groups. The prefix identifies your Service/College and should not be removed. 6. Click next twice and then click Add from the dialog box that opens. 7. In the next dialog box choose Browse, and then expand Managed Units. Navigate to the list of users you want to select from and then click OK. 8. Click on the members you wish to add to the group, then click Add. The members you have selected will appear in the lower part of the window. Click OK, then next and Finish. DS021 - Manage Filespace with the ARS Console - v1.6 - Master.docx Page 8 of 13

9 Once a group has been created, new members can be added and removed by doubleclicking on the group to open the group dialog box again and clicking on the Members tab. To see which groups each user is a member of, right click on the user s name in the Members list, choose Properties then click on the Member of tab. You can also rename the group and description; click on the General tab to do this. To delete a group, right click on Group and choose Properties from the drop-down menu. Care should be taken when doing this as once a group has been deleted it can t be recovered. When a new member of staff joins your Service/College they should be added to the following groups: General_Access Login_Script_Shared The General Access group gives staff in your Service/College permission to browse their filespace. The Login_Script_Shared group maps their Drive N when they login to their computers. When a member of staff leaves your Service/College, you will need to remove them from these groups and any other group they belong to. 6 SETTING FILE PERMISSIONS Authorisation - Any changes to file permissions must be authorised by either an ARS Admin for the area, or by a senior member of staff in the service or College. Where there is any doubt about the identity of someone authorising a change then an from them confirming what changes / additions should be made is normally sufficient. Any authorisation s, etc, should be retained for at least 12 months in case evidence is needed of who authorised a particular change. You need to be logged onto ISAD with your ISAD admin account to set File Permissions. When logged with your domain admin account you map the shared drive as follows: Double-click My computer, Click on the Tools menu and choose Map Network Drive. Choose drive letter N: and folder \\isad.isadroot.ex.ac.uk\uoe\{shared area}. Tick the reconnect at logon box and click Finish. To add groups and users to the file permissions for a folder or file: 1. Navigate via My Computer to the folder or file you wish to set the permissions for. 2. Right-click on the folder or file, and from the Properties box that opens, choose the Security tab. The dialog box that opens displays the groups and users who have access to the folder and the permissions that have been granted to each of these. See Appendix B for details about the default groups in the top level of your file space. 3. Click Add to add users and groups. DS021 - Manage Filespace with the ARS Console - v1.6 - Master.docx Page 9 of 13

10 4. In the Select Users, Groups or Computers dialog box, enter the name in the Name text box of the group or user you wish to set permissions for. To easily see all the Groups and users in your Service/College, enter your Service/College pre-fix, followed by a hyphen, then click Check Names. 5. Continue to add groups or names until you have selected all those that you require. The lower list will contain those groups and users you have selected or entered. 6. Click OK to add these to the list on the Security property sheet. To set file permissions: 1. Click on the group or user that you wish to set permissions for. 2. To allow a permission, select the respective Allow check box. It is generally not advisable to give Full control to groups or users as this would enable them to change file permissions for other users. Use Deny with caution as it over-rides Allow permissions. If you give all your users MODIFY access at the top level of the shared area, the area will quickly become unmanageable. In addition you will give all your users the capability to delete the contents of your shared area, along with potentially compromising the security of private folders. Please take extra care with this access. Further detail about File Permissions is given in Appendix B. How inheritance affects file and folder permissions: DS021 - Manage Filespace with the ARS Console - v1.6 - Master.docx Page 10 of 13

11 After you set permissions on a parent folder, new files and sub-folders that are created in the folder inherit these permissions. If you do not want the files and sub-folders to inherit these permissions, click This folder only in the Apply onto box when you set up special permissions for the parent folder. If you want to prevent only certain files or subfolders from inheriting permissions, follow these steps: 1. Right-click the file or sub-folder 2. Click Properties 3. Click the Security tab 4. Click Advanced 5. Click Change Permissions 6. Untick Include inheritable permissions from this object s parent 7. Click the Add button on the popup window (to leave the groups but break inheritance). 8. OK, OK 9. Back on the <folder name> Properties window click Edit button. 10. Select XXX-General_Access and click Remove. Note: until the group members log off then back on again they will not be able to access the folder as their access up to this point is based on the General_Access group and not the new group of which they are a member. 7 APPENDIX A - MANAGING FILES AND FOLDERS Each Service/College will have an allocation of 200GB of shared file space. This is a considerable amount of file space and needs to be well managed. Good housekeeping is essential when managing both groups and networked file space and if managing groups for more than one Service/College, to keep these properly discrete. File management is the system by which you organise your data, it might help to think of it as a filing cabinet or card index where you can categorise your work so that it is stored logically and is easy to find. How you structure your storage system and categorise your data is up to you but you will need to give it careful consideration. Organising your data with a consistent approach will make it easier to locate a file or folder. You can create a hierarchy of folders within your file space to suit your own needs. It is a good idea to locate work with common aspects in one folder and then a series of sub-folders if required. For example, an IT Department might create a folder at the top level of their file space called Purchasing. This in turn could contain sub-folders for Software Purchasing and Hardware Purchasing. Each of these folders and sub-folders can contain any number of documents (files). It is a good idea to limit the number of folders that you create in the root directory (top level) as this creates a better structure. Remember to give files and folders meaningful names as it will make your file space much easier to search and navigate, to find what you are looking for. DS021 - Manage Filespace with the ARS Console - v1.6 - Master.docx Page 11 of 13

12 Since each folder is created below an existing folder, the location of a file in a folder creates what is referred to as a path. The path is simply the sequence of folders required to reach the file. The path is written using a slash (\) to separate folders. The path to your file space will always start with \\isad.isadroot.ex.ac.uk\uoe\ followed by either PS or Colleges, then your Service\College pre-fix. A clear view of your Drive N file structure can be seen using Windows Explorer. To open Windows Explorer, hold down the Windows key and then the letter E; alternatively use My Computer. DS021 - Manage Filespace with the ARS Console - v1.6 - Master.docx Page 12 of 13

13 8 APPENDIX B - NTFS FILE PERMISSIONS The NTFS File Permissions define how a folder or file can be accessed or used. The following Table lists the standard NTFS permissions and the access that each provides: NTFS Folder Permission Full Control Modify Read and Execute List Folder Contents Read Write Allows the user to Change permissions, take ownership of the folder, delete subfolders and files and perform actions permitted by all other NTFS folder permissions Delete the folder plus perform actions permitted by the Write permission and the Read & Execute permission Navigate folders to view other files and folders, even if the user does not have permission for those folders, and perform actions permitted by the Read permission and the List Folder Contents permission See the names of files and subfolders in the folder See the contents of files and subfolders in the folder and view folder ownership, permissions, and attributes (such as Read-only, Hidden, Archive, and System) Create/edit files and subfolders within the folder, change folder attributes, and view folder ownership and permissions The top of your shared area should have permissions along the lines of: Domain Admins as FULL CONTROL permission College/Service ARS Admins as FULL CONTROL permission IT FPS Controllers as FULL CONTROL permission College/Service-General_Access as LIST permission DS021 - Manage Filespace with the ARS Console - v1.6 - Master.docx Page 13 of 13

Create, Link, or Edit a GPO with Active Directory Users and Computers

Create, Link, or Edit a GPO with Active Directory Users and Computers How to Edit Local Computer Policy Settings To edit the local computer policy settings, you must be a local computer administrator or a member of the Domain Admins or Enterprise Admins groups. 1. Add the

More information

Remote Storage Area (RSA) Basics

Remote Storage Area (RSA) Basics Remote Storage Area (RSA) Basics Table of Contents Remote Storage Area Overview... 3 What is Remote Storage Area?... 3 Who has access to RSA?... 3 How much space is available?... 3 Basic RSA Use... 4 How

More information

PRODUCT WHITE PAPER LABEL ARCHIVE. Adding and Configuring Active Directory Users in LABEL ARCHIVE

PRODUCT WHITE PAPER LABEL ARCHIVE. Adding and Configuring Active Directory Users in LABEL ARCHIVE PRODUCT WHITE PAPER LABEL ARCHIVE Adding and Configuring Active Directory Users in LABEL ARCHIVE TEKLYNX International March 19, 2010 Introduction Now more than ever, businesses large and small alike are

More information

Auto-Archiving your Emails in Outlook

Auto-Archiving your Emails in Outlook Changing the AutoArchive Settings for all your Mailbox Folders Changing the AutoArchive Settings for all your Mailbox Folders (cont.) One way to minimize the amount of server space you are using for your

More information

Home and Shared Folders on Windows Accessing Home and Shared Folders on Active Directory File Servers Using Windows

Home and Shared Folders on Windows Accessing Home and Shared Folders on Active Directory File Servers Using Windows Overview Home and Shared Folders on Windows Accessing Home and Shared Folders on Active Directory File Servers Using Windows Ithaca College provides network file sharing for all faculty members, all staff

More information

Using Your Department Shared Folder

Using Your Department Shared Folder Using Your Department Shared Folder What Is A Domain? A domain is an internal network of computers where the users can share space on a server for storing files and sharing access to printers. Sunysb.edu

More information

BSDI Advanced Fitness & Wellness Software

BSDI Advanced Fitness & Wellness Software BSDI Advanced Fitness & Wellness Software 6 Kellie Ct. Califon, NJ 07830 http://www.bsdi.cc INSTRUCTION SHEET FOR MOVING YOUR DATABASE FROM ONE COMPUTER TO ANOTHER This document will outline the steps

More information

Tool Tip. SyAM Management Utilities and Non-Admin Domain Users

Tool Tip. SyAM Management Utilities and Non-Admin Domain Users SyAM Management Utilities and Non-Admin Domain Users Some features of SyAM Management Utilities, including Client Deployment and Third Party Software Deployment, require authentication credentials with

More information

Autograph 3.3 Network Installation

Autograph 3.3 Network Installation Eastmond Publishing Ltd (Autograph) PO Box 46, Oundle, Peterborough, PE8 4JX, UK Tel: +44 (0)1832 273444 Fax: +44 (0)1832 273529 Email: support@autograph-maths.com Web: www.autograph-maths.com Technical

More information

File systems security: Shared folders & NTFS permissions, EFS Disk Quotas

File systems security: Shared folders & NTFS permissions, EFS Disk Quotas File systems security: Shared folders & NTFS permissions, EFS Disk Quotas (November 2, 2015) Abdou Illia, Fall 2015 1 Learning Objective Understand Shared Folders Assign Shared Folder permissions NTFS

More information

BSDI Advanced Fitness & Wellness Software

BSDI Advanced Fitness & Wellness Software BSDI Advanced Fitness & Wellness Software 6 Kellie Ct. Califon, NJ 07830 http://www.bsdi.cc SOFTWARE BACKUP/RESTORE INSTRUCTION SHEET This document will outline the steps necessary to take configure the

More information

Wazza s QuickStart 13. Leopard Server - Windows Domain

Wazza s QuickStart 13. Leopard Server - Windows Domain Wazza s QuickStart 13. Leopard Server - Windows Domain About the Document This document is the 13th in a series of documents describing the process of installing and configuring a Mac OS X 10.5 Server

More information

STATISTICA VERSION 9 STATISTICA ENTERPRISE INSTALLATION INSTRUCTIONS FOR USE WITH TERMINAL SERVER

STATISTICA VERSION 9 STATISTICA ENTERPRISE INSTALLATION INSTRUCTIONS FOR USE WITH TERMINAL SERVER Notes: STATISTICA VERSION 9 STATISTICA ENTERPRISE INSTALLATION INSTRUCTIONS FOR USE WITH TERMINAL SERVER 1. These instructions focus on installation on Windows Terminal Server (WTS), but are applicable

More information

ICE.TCP Pro Update Installation Notes

ICE.TCP Pro Update Installation Notes ICE.TCP Pro Update Installation Notes Important Note: Based on customer comments, we are providing these revised installation instructions. They supercede the instructions in the manual. For previous users

More information

Installation Instruction STATISTICA Enterprise Server

Installation Instruction STATISTICA Enterprise Server Installation Instruction STATISTICA Enterprise Server Notes: ❶ The installation of STATISTICA Enterprise Server entails two parts: a) a server installation, and b) workstation installations on each of

More information

ECA IIS Instructions. January 2005

ECA IIS Instructions. January 2005 ECA IIS Instructions January 2005 THIS PAGE INTENTIONALLY BLANK ECA IIS Instructions ii July 22, 2005 Table of Contents 1. Install Certificate in IIS 5.0... 1 2. Obtain and Install the ECA Root Certificate

More information

Chapter. Managing Group Policy MICROSOFT EXAM OBJECTIVES COVERED IN THIS CHAPTER:

Chapter. Managing Group Policy MICROSOFT EXAM OBJECTIVES COVERED IN THIS CHAPTER: Chapter 10 Managing Group Policy MICROSOFT EXAM OBJECTIVES COVERED IN THIS CHAPTER: Implement and troubleshoot Group Policy. Create a Group Policy object (GPO). Link an existing GPO. Delegate administrative

More information

Networking Lab - Vista Public Network Sharing

Networking Lab - Vista Public Network Sharing Networking Lab - Vista Public Network Sharing After completing the lab activity, you will be able to: Explain the differences between Windows XP and Windows Vista network sharing. Explain the purpose of

More information

Changing Your Cameleon Server IP

Changing Your Cameleon Server IP 1.1 Overview Technical Note Cameleon requires that you have a static IP address defined for the server PC the Cameleon server application runs on. Even if the server PC has a static IP address, you may

More information

Sage Peachtree Installation Instructions

Sage Peachtree Installation Instructions Sage Peachtree Installation Instructions Quick Tips for Network Install Use the following tips to help you install Sage Peachtree on a network: Always install Sage Peachtree FIRST on the computer that

More information

1. Click on the Start Menu and select Computer from the right hand panel (Fig 1, 1). Figure 1

1. Click on the Start Menu and select Computer from the right hand panel (Fig 1, 1). Figure 1 Managing Your Network Drives An overview Introduction Network drives are extra storage containers located on another computer called a server where you can store data. Network drives are easily accessible

More information

DeviceLock Management via Group Policy

DeviceLock Management via Group Policy User Manual DeviceLock Management via Group Policy SmartLine Inc 1 Contents Using this Manual...3 1. General Information...4 1.1 Overview...4 1.2 Applying Group Policy...5 1.3 Standard GPO Inheritance

More information

In the same spirit, our QuickBooks 2008 Software Installation Guide has been completely revised as well.

In the same spirit, our QuickBooks 2008 Software Installation Guide has been completely revised as well. QuickBooks 2008 Software Installation Guide Welcome 3/25/09; Ver. IMD-2.1 This guide is designed to support users installing QuickBooks: Pro or Premier 2008 financial accounting software, especially in

More information

Using Group Policies to Install AutoCAD. CMMU 5405 Nate Bartley 9/22/2005

Using Group Policies to Install AutoCAD. CMMU 5405 Nate Bartley 9/22/2005 Using Group Policies to Install AutoCAD CMMU 5405 Nate Bartley 9/22/2005 Before we get started This manual provides a step-by-step process for creating a Group Policy that will install AutoCAD to a Windows

More information

DeviceLock Management via Group Policy

DeviceLock Management via Group Policy User Manual DeviceLock Management via Group Policy SmartLine Inc 1 Contents Using this Manual...3 1. General Information...4 1.1 Overview...4 1.2 Applying Group Policy...5 2. DeviceLock Service Deployment...6

More information

Most of your tasks in Windows XP will involve working with information

Most of your tasks in Windows XP will involve working with information OFFICE 1 File Management Files and Folders Most of your tasks in Windows XP will involve working with information stored on your computer. This material briefly explains how information is stored in Windows

More information

Outlook 2007: Managing your mailbox

Outlook 2007: Managing your mailbox Outlook 2007: Managing your mailbox Find its size and trim it down Use Mailbox Cleanup On the Tools menu, click Mailbox Cleanup. You can do any of the following from this one location: View the size of

More information

CC4 TEN: Pre-installation instructions for Windows Server networks

CC4 TEN: Pre-installation instructions for Windows Server networks CC4 TEN: Pre-installation instructions for Windows Server networks Contents Introduction to CC4 TEN... 1 How the transition works... 3 Your pre-installation tasks... 5 Back up your servers... 5 Ensure

More information

MY HELPDESK - END-USER CONSOLE...

MY HELPDESK - END-USER CONSOLE... Helpdesk User Guide Page 1 Helpdesk User Guide Table of Contents 1 INTRODUCTION... 3 1.1. OBJECTIVES... 3 1.2. END-USER CONSOLE... 3 1.3. SUMMARY OF RESPONSIBILITY... 3 1.4. HELPDESK INCIDENT LIFE CYCLE...

More information

Wilkes University Mail Storage & Housekeeping for Students using Outlook 2003

Wilkes University Mail Storage & Housekeeping for Students using Outlook 2003 The following instructions apply to those users who have setup Outlook 2003 on their PCs. Email systems are not designed for long term storage. The more mail (especially with attachments) each of us keeps

More information

STATISTICA VERSION 10 STATISTICA ENTERPRISE SERVER INSTALLATION INSTRUCTIONS

STATISTICA VERSION 10 STATISTICA ENTERPRISE SERVER INSTALLATION INSTRUCTIONS Notes: STATISTICA VERSION 10 STATISTICA ENTERPRISE SERVER INSTALLATION INSTRUCTIONS 1. The installation of the STATISTICA Enterprise Server entails two parts: a) a server installation, and b) workstation

More information

CANON FAX L360 SOFTWARE MANUAL

CANON FAX L360 SOFTWARE MANUAL CANON FAX L360 SOFTWARE MANUAL Before You Begin the Installation: a Checklist 2 To ensure a smooth and successful installation, take some time before you begin to plan and prepare for the installation

More information

Creating Home Directories for Windows and Macintosh Computers

Creating Home Directories for Windows and Macintosh Computers ExtremeZ-IP Active Directory Integrated Home Directories Configuration! 1 Active Directory Integrated Home Directories Overview This document explains how to configure home directories in Active Directory

More information

User s Guide For Department of Facility Services

User s Guide For Department of Facility Services Doc s File Server User s Guide For Department of Facility Services For Ver : 7.2.88.1020 Rev : 1_05-27-2011 Created by : Elliott Jeyaseelan 2 Table of Contents SERVER LOGIN & AUTHENTICATION REQUIREMENTS

More information

Installation Instruction STATISTICA Enterprise Small Business

Installation Instruction STATISTICA Enterprise Small Business Installation Instruction STATISTICA Enterprise Small Business Notes: ❶ The installation of STATISTICA Enterprise Small Business entails two parts: a) a server installation, and b) workstation installations

More information

1. Set Daylight Savings Time... 3. 2. Create Migrator Account... 3. 3. Assign Migrator Account to Administrator group... 4

1. Set Daylight Savings Time... 3. 2. Create Migrator Account... 3. 3. Assign Migrator Account to Administrator group... 4 1. Set Daylight Savings Time... 3 a. Have client log into Novell/Local Machine with Administrator Account...3 b. Access Adjust Date/Time...3 c. Make sure the time zone is set to Central Time...3 2. Create

More information

Exchange Mailbox Protection Whitepaper

Exchange Mailbox Protection Whitepaper Exchange Mailbox Protection Contents 1. Introduction... 2 Documentation... 2 Licensing... 2 Exchange add-on comparison... 2 Advantages and disadvantages of the different PST formats... 3 2. How Exchange

More information

WhatsUp Gold v16.1 Installation and Configuration Guide

WhatsUp Gold v16.1 Installation and Configuration Guide WhatsUp Gold v16.1 Installation and Configuration Guide Contents Installing and Configuring Ipswitch WhatsUp Gold v16.1 using WhatsUp Setup Installing WhatsUp Gold using WhatsUp Setup... 1 Security guidelines

More information

WS_FTP Professional 12

WS_FTP Professional 12 WS_FTP Professional 12 Tools Guide Contents CHAPTER 1 Introduction Ways to Automate Regular File Transfers...5 Check Transfer Status and Logs...6 Building a List of Files for Transfer...6 Transfer Files

More information

9 Administering Shared Folders

9 Administering Shared Folders 9 Administering Shared Folders Exam Objectives in this Chapter: Manage and troubleshoot access to shared folders. Create and remove shared folders. Why This Chapter Matters Control access to shared folders

More information

Chapter 2 Editor s Note:

Chapter 2 Editor s Note: [Editor s Note: The following content was excerpted from the free ebook The Tips and Tricks Guide to Securing Windows Server 2003 (Realtimepublishers.com) written by Roberta Bragg and available at http://www.netiq.com/offers/ebooks.]

More information

Point of Sale 2015 Enterprise. Installation Guide

Point of Sale 2015 Enterprise. Installation Guide Point of Sale 2015 Enterprise Installation Guide Contents About this guide 3 System Requirements - Microsoft SQL Server 2008 R2 Express 3 System Requirements - POS Enterprise 2015 (Administrator) 3 System

More information

ilaw Installation Procedure

ilaw Installation Procedure ilaw Installation Procedure This guide will provide a reference for a full installation of ilaw Case Management Software. Contents ilaw Overview How ilaw works Installing ilaw Server on a PC Installing

More information

STATISTICA VERSION 12 STATISTICA ENTERPRISE SMALL BUSINESS INSTALLATION INSTRUCTIONS

STATISTICA VERSION 12 STATISTICA ENTERPRISE SMALL BUSINESS INSTALLATION INSTRUCTIONS STATISTICA VERSION 12 STATISTICA ENTERPRISE SMALL BUSINESS INSTALLATION INSTRUCTIONS Notes 1. The installation of STATISTICA Enterprise Small Business entails two parts: a) a server installation, and b)

More information

WSDOT ProjectWise V8i Training 101

WSDOT ProjectWise V8i Training 101 WSDOT PROJECTWISE V8I TRAINING 101 ABOUT THIS TRAINING This training is intended to give a user the ability to open ProjectWise and access working files. Once you become comfortable working within the

More information

ECAT SWE Exchange Customer Administration Tool Web Interface User Guide Version 6.7

ECAT SWE Exchange Customer Administration Tool Web Interface User Guide Version 6.7 ECAT SWE Exchange Customer Administration Tool SWE - Exchange Customer Administration Tool (ECAT) Table of Contents About this Guide... 3 Audience and Purpose... 3 What is in this Guide?... 3 CA.mail Website...

More information

SmartDraw Installation Guide

SmartDraw Installation Guide SmartDraw Installation Guide System Requirements Your computer must meet these requirements in order to run SmartDraw: Windows Vista, XP or 2000 256MB RAM 3GB free hard disk space Installation Options

More information

Creating client-server setup with multiple clients

Creating client-server setup with multiple clients Creating client-server setup with multiple clients Coffalyser.Net uses a SQL client server database model to store all project/experiment- related data. The client-server model has one main application

More information

Active Directory Change Notifier Quick Start Guide

Active Directory Change Notifier Quick Start Guide Active Directory Change Notifier Quick Start Guide Software version 3.0 Mar 2014 Copyright 2014 CionSystems Inc., All Rights Reserved Page 1 2014 CionSystems Inc. ALL RIGHTS RESERVED. This guide may not

More information

Global Image Management System For epad-vision. User Manual Version 1.10

Global Image Management System For epad-vision. User Manual Version 1.10 Global Image Management System For epad-vision User Manual Version 1.10 May 27, 2015 Global Image Management System www.epadlink.com 1 Contents 1. Introduction 3 2. Initial Setup Requirements 3 3. GIMS-Server

More information

AXIS 70U - Using Scan-to-File

AXIS 70U - Using Scan-to-File AXIS 70U - Using Scan-to-File Introduction This document describes the Scan-to-File feature in the AXIS 70U. The step-by-step instructions describe the process of configuring the AXIS 70U and an FTP server.

More information

STATISTICA VERSION 11 CONCURRENT NETWORK LICENSE WITH BORROWING INSTALLATION INSTRUCTIONS

STATISTICA VERSION 11 CONCURRENT NETWORK LICENSE WITH BORROWING INSTALLATION INSTRUCTIONS data analysis data mining quality improvement web-based analytics Notes STATISTICA VERSION 11 CONCURRENT NETWORK LICENSE WITH BORROWING INSTALLATION INSTRUCTIONS 1. The installation of the Concurrent network

More information

SonicWALL CDP Local Archiving

SonicWALL CDP Local Archiving This document describes how to configure, implement, and manage a local archive for your SonicWALL CDP appliance. It contains the following sections: Feature Overview section on page 1 Using Local Archiving

More information

Coveo Platform 7.0. Microsoft Dynamics CRM Connector Guide

Coveo Platform 7.0. Microsoft Dynamics CRM Connector Guide Coveo Platform 7.0 Microsoft Dynamics CRM Connector Guide Notice The content in this document represents the current view of Coveo as of the date of publication. Because Coveo continually responds to changing

More information

WEST LIVENOTE ADMINISTRATION WEST CASE NOTEBOOK/WEST LIVENOTE

WEST LIVENOTE ADMINISTRATION WEST CASE NOTEBOOK/WEST LIVENOTE WEST LIVENOTE ADMINISTRATION WEST CASE NOTEBOOK/WEST LIVENOTE JULY 2009 WEST LIVENOTE ADMINISTRATION USER GUIDE WEST CASE NOTEBOOK/WEST LIVENOTE JULY 2009 West Customer Service West LiveNote Administration

More information

GUARD1 PLUS Mini-Attendant File Manager User's Guide Version 2.71

GUARD1 PLUS Mini-Attendant File Manager User's Guide Version 2.71 GUARD1 PLUS Mini-Attendant File Manager User's Guide Version 2.71 Copyright 2002 TimeKeeping Systems, Inc. GUARD1 PLUS and THE PIPE are registered trademarks of TimeKeeping Systems, Inc. Introduction This

More information

CIFS Permissions Best Practices Nasuni Corporation Natick, MA

CIFS Permissions Best Practices Nasuni Corporation Natick, MA Nasuni Corporation Natick, MA Overview You use permissions to control user access to data. There are two basic considerations when using permissions to control user access to data: Which users have access

More information

Windows XP Managing Your Files

Windows XP Managing Your Files Windows XP Managing Your Files Objective 1: Understand your computer s filing system Your computer's filing system has three basic divisions: files, folders, and drives. 1. File- everything saved on your

More information

SonicWALL CDP 5.0 Microsoft Exchange InfoStore Backup and Restore

SonicWALL CDP 5.0 Microsoft Exchange InfoStore Backup and Restore SonicWALL CDP 5.0 Microsoft Exchange InfoStore Backup and Restore Document Scope This solutions document describes how to configure and use the Microsoft Exchange InfoStore Backup and Restore feature in

More information

Secrets of Event Viewer for Active Directory Security Auditing Lepide Software

Secrets of Event Viewer for Active Directory Security Auditing Lepide Software Secrets of Event Viewer for Active Directory Security Auditing Windows Event Viewer doesn t need any introduction to the IT Administrators. However, some of its hidden secrets, especially those related

More information

Appendix B Lab Setup Guide

Appendix B Lab Setup Guide JWCL031_appB_467-475.indd Page 467 5/12/08 11:02:46 PM user-s158 Appendix B Lab Setup Guide The Windows Server 2008 Applications Infrastructure Configuration title of the Microsoft Official Academic Course

More information

LAB 1: Installing Active Directory Federation Services

LAB 1: Installing Active Directory Federation Services LAB 1: Installing Active Directory Federation Services Contents Lab: Installing and Configuring Active Directory Federation Services... 2 Exercise 1: installing and configuring Active Directory Federation

More information

Security Guidelines for MapInfo Discovery 1.1

Security Guidelines for MapInfo Discovery 1.1 Security Guidelines for MapInfo Discovery 1.1 This paper provides guidelines and detailed instructions for improving the security of your Mapinfo Discovery deployment. In this document: Overview.........................................

More information

Printer Connection Manager

Printer Connection Manager IT DIRECT Printer Connection Manager Information Technology Direct Limited PO Box 33-1406 Auckland NZ Table of Contents OVERVIEW...2 SETUP INSTRUCTIONS:...3 INSTALLATION...5 Install with New Settings.xml

More information

Test Note Phone Manager Deployment Windows Group Policy Sever 2003 and XP SPII Clients

Test Note Phone Manager Deployment Windows Group Policy Sever 2003 and XP SPII Clients Test Note Phone Manager Deployment Windows Group Policy Sever 2003 and XP SPII Clients Note: I have only tested these procedures on Server 2003 SP1 (DC) and XP SPII client, in a controlled lab environment,

More information

Step-by-step installation guide for monitoring untrusted servers using Operations Manager ( Part 3 of 3)

Step-by-step installation guide for monitoring untrusted servers using Operations Manager ( Part 3 of 3) Step-by-step installation guide for monitoring untrusted servers using Operations Manager ( Part 3 of 3) Manual installation of agents and importing the SCOM certificate to the servers to be monitored:

More information

SARANGSoft WinBackup Business v2.5 Client Installation Guide

SARANGSoft WinBackup Business v2.5 Client Installation Guide SARANGSoft WinBackup Business v2.5 Client Installation Guide (November, 2015) WinBackup Business Client is a part of WinBackup Business application. It runs in the background on every client computer that

More information

Advanced Audit Policy Configurations for LT Auditor+ Reference Guide

Advanced Audit Policy Configurations for LT Auditor+ Reference Guide Advanced Audit Policy Configurations for LT Auditor+ Reference Guide Contents WINDOWS AUDIT POLICIES REQUIRED FOR LT AUDITOR+....3 ACTIVE DIRECTORY...3 Audit Policy for the Domain...3 Advanced Auditing

More information

Setting Up Your FTP Server

Setting Up Your FTP Server Requirements:! A computer dedicated to FTP server only! Linksys router! TCP/IP internet connection Steps: Getting Started Configure Static IP on the FTP Server Computer: Setting Up Your FTP Server 1. This

More information

HELP DOCUMENTATION E-SSOM DEPLOYMENT GUIDE

HELP DOCUMENTATION E-SSOM DEPLOYMENT GUIDE HELP DOCUMENTATION E-SSOM DEPLOYMENT GUIDE Copyright 1998-2013 Tools4ever B.V. All rights reserved. No part of the contents of this user guide may be reproduced or transmitted in any form or by any means

More information

The Windows Server 2003 Environment. Introduction. Computer Roles. Introduction to Administering Accounts and Resources. Lab 2

The Windows Server 2003 Environment. Introduction. Computer Roles. Introduction to Administering Accounts and Resources. Lab 2 Islamic University of Gaza College of Engineering Computer Department Computer Networks Lab Introduction to Administering Accounts and Resources Prepared By: Eng.Ola M. Abd El-Latif Mar. /2010 0 :D Objectives

More information

LDAP Implementation AP561x KVM Switches. All content in this presentation is protected 2008 American Power Conversion Corporation

LDAP Implementation AP561x KVM Switches. All content in this presentation is protected 2008 American Power Conversion Corporation LDAP Implementation AP561x KVM Switches All content in this presentation is protected 2008 American Power Conversion Corporation LDAP Implementation Does not require LDAP Schema to be touched! Uses existing

More information

Non-ThinManager Components

Non-ThinManager Components Non-ThinManager Components Microsoft Terminal Servers play an important role in the ThinManager system. It is recommended that you become familiar with the documentation provided by Microsoft about their

More information

BankLink Books Clients

BankLink Books Clients BankLink Books Clients This document is for those practices installing BankLink Books. The BankLink Service Agreement permits licensed BankLink practices to install the software in as many locations as

More information

Cox Business Premium Online Backup USER'S GUIDE. Cox Business VERSION 1.0

Cox Business Premium Online Backup USER'S GUIDE. Cox Business VERSION 1.0 Cox Business Premium Online Backup USER'S GUIDE Cox Business VERSION 1.0 Table of Contents ABOUT THIS GUIDE... 4 DOWNLOADING COX BUSINESS PREMIUM ONLINE BACKUP... 5 INSTALLING COX BUSINESS PREMIUM ONLINE

More information

Virtual Office Remote Installation Guide

Virtual Office Remote Installation Guide Virtual Office Remote Installation Guide Table of Contents VIRTUAL OFFICE REMOTE INSTALLATION GUIDE... 3 UNIVERSAL PRINTER CONFIGURATION INSTRUCTIONS... 12 CHANGING DEFAULT PRINTERS ON LOCAL SYSTEM...

More information

Print Server Application Guide. This guide applies to the following models.

Print Server Application Guide. This guide applies to the following models. Print Server Application Guide This guide applies to the following models. TL-WR842ND TL-WR1042ND TL-WR1043ND TL-WR2543ND TL-WDR4300 CONTENTS Chapter 1. Overview... 1 Chapter 2. Before Installation...

More information

WhatsUp Gold v16.3 Installation and Configuration Guide

WhatsUp Gold v16.3 Installation and Configuration Guide WhatsUp Gold v16.3 Installation and Configuration Guide Contents Installing and Configuring WhatsUp Gold using WhatsUp Setup Installation Overview... 1 Overview... 1 Security considerations... 2 Standard

More information

How to install FlexiCAD 3

How to install FlexiCAD 3 How to install FlexiCAD 3 This document explains how to install FlexiCAD 3 in four situations, using the master CD: 1. On a stand-alone computer 2. On a network using Group Policy 3. On a ghost station

More information

Does the GC have an online document management solution?

Does the GC have an online document management solution? This FAQ contains: Web File Services definition Access web file services Create a WFS folder Upload a document Email a link to a document folder Create WFS subscription Cancel existing subscription Create

More information

Introduction to MS WINDOWS XP

Introduction to MS WINDOWS XP Introduction to MS WINDOWS XP Mouse Desktop Windows Applications File handling Introduction to MS Windows XP 2 Table of Contents What is Windows XP?... 3 Windows within Windows... 3 The Desktop... 3 The

More information

Magaya Software Installation Guide

Magaya Software Installation Guide Magaya Software Installation Guide MAGAYA SOFTWARE INSTALLATION GUIDE INTRODUCTION Introduction This installation guide explains the system requirements for installing any Magaya software, the steps to

More information

Database Servers Tutorial

Database Servers Tutorial Copyright 1995-2010 Esri All rights reserved. Table of Contents A quick tour of the database servers tutorial........................ 3 Exercise 1: Add a database server to the Catalog tree and create

More information

NETWRIX WINDOWS SERVER CHANGE REPORTER

NETWRIX WINDOWS SERVER CHANGE REPORTER NETWRIX WINDOWS SERVER CHANGE REPORTER INSTALLATION AND CONFIGURATION GUIDE Product Version: 4.0 March 2013. Legal Notice The information in this publication is furnished for information use only, and

More information

Active Directory integration with CloudByte ElastiStor

Active Directory integration with CloudByte ElastiStor Active Directory integration with CloudByte ElastiStor Prerequisite Change the time and the time zone of the Active Directory Server to the VSM time and time zone. Enabling Active Directory at VSM level

More information

Interact for Microsoft Office

Interact for Microsoft Office Interact for Microsoft Office Installation and Setup Guide Perceptive Content Version: 7.0.x Written by: Product Knowledge, R&D Date: October 2014 2014 Perceptive Software. All rights reserved Perceptive

More information

PC Agent Quick Start. Open the Agent. Autonomy Connected Backup. Version 8.8. Revision 0

PC Agent Quick Start. Open the Agent. Autonomy Connected Backup. Version 8.8. Revision 0 T E C H N I C A L N O T E Autonomy Connected Backup Version 8.8 PC Agent Quick Start Revision 0 Use this document as a quick reference for common Connected Backup PC Agent tasks. If the Agent is not on

More information

Exchange Granular Restore. User Guide

Exchange Granular Restore. User Guide User Guide Contents 1. overview... 2 2. Backup considerations... 3 Backup user identity... 3 Exchange VM Detection... 3 Restore vs. Recovery... 3 3. Creating an Exchange backup... 4 4.... 7 Step 1 - Locate

More information

Olathe District Schools 1 of 11 GroupWise 7

Olathe District Schools 1 of 11 GroupWise 7 Olathe District Schools 1 of 11 GroupWise 7 Creating an email group To create and save a personal group: 1. Click on the toolbar. 2. Click the personal address book you want to add this group to. 3. Click

More information

BitLocker to Go: Encryption for personal USB flash drives (Windows 7 and 8)

BitLocker to Go: Encryption for personal USB flash drives (Windows 7 and 8) BitLocker to Go: Encryption for personal USB flash drives (Windows 7 and 8) Encryption is an effective method of protecting data stored on portable devices such as USB flash drives and external hard drives.

More information

Using Internet or Windows Explorer to Upload Your Site

Using Internet or Windows Explorer to Upload Your Site Using Internet or Windows Explorer to Upload Your Site This article briefly describes what an FTP client is and how to use Internet Explorer or Windows Explorer to upload your Web site to your hosting

More information

IXP120 Alarm Monitor Utility

IXP120 Alarm Monitor Utility IXP120 Alarm Monitor Utility SOFTWARE MANUAL Scope of Document This document provides a brief overview of the Alarm Monitor Utility and its interaction with the IXP120 Software. Document Conventions We

More information

CONFIGURING TARGET ACTIVE DIRECTORY DOMAIN FOR AUDIT BY NETWRIX AUDITOR

CONFIGURING TARGET ACTIVE DIRECTORY DOMAIN FOR AUDIT BY NETWRIX AUDITOR CONFIGURING TARGET ACTIVE DIRECTORY DOMAIN FOR AUDIT BY NETWRIX AUDITOR TECHNICAL ARTICLE Product Version: 5.0 July 2013. Legal Notice The information in this publication is furnished for information use

More information

Archiving Your Mail in Outlook 2007

Archiving Your Mail in Outlook 2007 About Archiving Archiving Your Mail in Outlook 2007 All messages, contact information, calendars and other data you create in Microsoft Outlook 2007 are kept in your mailbox on the Exchange (FIUmail) server.

More information

NETWRIX FILE SERVER CHANGE REPORTER

NETWRIX FILE SERVER CHANGE REPORTER NETWRIX FILE SERVER CHANGE REPORTER ADMINISTRATOR S GUIDE Product Version: 3.3 April/2012. Legal Notice The information in this publication is furnished for information use only, and does not constitute

More information

ProjectWise Explorer V8i User Manual for Subconsultants & Team Members

ProjectWise Explorer V8i User Manual for Subconsultants & Team Members ProjectWise Explorer V8i User Manual for Subconsultants & Team Members submitted to Michael Baker International Subconsultants & Team Members submitted by Michael Baker International ProjectWise Support

More information

InfoEd erm Project Instructions for obtaining Research Information Spreadsheets from InfoEd

InfoEd erm Project Instructions for obtaining Research Information Spreadsheets from InfoEd InfoEd erm Project Instructions for obtaining Research Information Spreadsheets from InfoEd Introduction A selection of user generated reports have been created using Crystal Reports, a standard business

More information

Information Services. Accessing the University Network using a Virtual Private Network Connection (VPN), with Windows XP Professional

Information Services. Accessing the University Network using a Virtual Private Network Connection (VPN), with Windows XP Professional Information Services Accessing the University Network using a Virtual Private Network Connection (VPN), with Windows XP Professional Amendment & Authorisation History Ver Date Changes Name Author A 29/3/05

More information

Email Archiving. Follow these steps to archive your email:

Email Archiving. Follow these steps to archive your email: Email Archiving Archiving is a process by which your email messages and attached files are moved from the database on our email server to a location on your computer. This document contains step-by-step

More information

NYSeMail Office 365 Administration Guide for Agencies

NYSeMail Office 365 Administration Guide for Agencies NYSeMail Office 365 Administration Guide for Agencies Office 365 Overview... 34 What is included... 34 Software Requirements... 34 Message Limits... 34 Provisioning... 34 Archive and Retention Policy...

More information