Lock Down Apps & Reduce Help Desk Calls with Registry Policies
|
|
- Shon Johns
- 8 years ago
- Views:
Transcription
1 Lock Down Apps & Reduce Help Desk Calls with Registry Policies Greg Shields w w w. s c r i p t l o g i c. c o m / s m b I T
2 2011 ScriptLogic Corporation ALL RIGHTS RESERVED. ScriptLogic, the ScriptLogic logo and Point,Click,Done! are trademarks and registered trademarks of ScriptLogic Corporation in the United States of America and other countries. All other trademarks and registered trademarks are property of their respective owners. 2 Lock Down Apps & Reduce Help Desk Calls with Registry Policies
3 It all comes down to fear. Fear of the Windows registry. Fear of editing its values. Fear of catastrophically destroying a user s Windows computer, along with all the pain and extra work in piecing it back together. Fear is the reason you ve not invested the time to lock down your application configurations. Even considering the benefits, that fear is understandable. Microsoft itself tries to instill a healthy fear into the registry-editing administrator. You ve seen the caution built into almost every TechNet knowledgebase article, Incorrectly editing the registry can cause serious problems that may require you to reinstall your operating system. Problems resulting from editing the registry incorrectly may not be able to be resolved. Before editing the registry, back up any valuable data. Yet the Windows registry at its core is little more than a database. That database of configuration values is populated by the operating system and all the applications installed on top. It stands to reason, then, that if you could control those values well then you d control your users application experience. On their behalf you d check the boxes that need checking, or uncheck those you know cause problems. You might even fill out your application s dialog boxes with the correct values before the user ever launched the application. In the end, you might never have to send out another How to Start Using AppABC document again. That s great, because users always lose those documents, or misread them, and end up wasting your time with extra help desk calls. Instead, your applications are perfectly locked down for them, all by policy. By losing the fear, you gain control. De-Fearing Registry Manipulation Locking down applications starts with the Windows registry. Most applications store their configuration data in various locations throughout the registry. Best practices for coding those apps suggest that entire-machine settings should be stored in HKEY_LOCAL_MACHINE, often shortened to just HKLM. Per-user settings should end up in each user s HKEY_CURRENT_USER, or HKCU, hive. Modifying values in HKLM has never been that difficult; its hive gets loaded whenever a computer starts up. Every user operating that computer shares in the values contained within HKLM. Just powering on the computer allows you to modify its HKLM hive. While most of us browse the registry using regedit.exe, getting to policy control of its information really starts at the command line. With a computer s Remote Registry Service turned on (these days it isn t by default), you can remotely manage its HKLM hive with the command reg.exe. Using this command, for example, one could query a remote computer s software key: reg.exe query \\<computername>\hklm\software 3 Lock Down Apps & Reduce Help Desk Calls with Registry Policies
4 You can do the same with Windows PowerShell, although you ll need to enable and configure PowerShell Remoting first on the remote computer. The simplest form of PowerShell s remote registry query looks like this: Invoke-Command <computername> { dir HKLM:\software } Figure 1: Using PowerShell to query a remote registry. Figure 1 shows a sample response from PowerShell s remote query. You can see there that nine subkeys exist below HKLM\Software on the computer \\dc. Both reg.exe and PowerShell support additional command structures for creating and deleting keys, editing values, and all the necessary steps you need towards bringing machine settings under control. Knowing that you can edit HKLM s contents is useful, but it gets you nowhere when the lockdowns you need reside in HKCU. Editing data can be more difficult, because each user s HKCU isn t loaded until that user logs in. That s because each user s HKCU hive is actually a file in their profile named NTUSER.DAT. One possible way to modify a user s HKCU is through the use of a logon script. Since logon scripts run at logon, they ll have access to view and modify that user s HKCU hive. Both reg.exe and PowerShell are equipped to do this. The lines below add the AppABC subkey to the computer s HKLM\Software key, with the first using reg.exe and the second using the registry PSDrive in PowerShell. Either is intended to run locally on a computer as part of a logon script: reg.exe add HKCU\Software\AppABC mkdir HKCU:\software\AppABC Setting Policy by Preference While they ll absolutely work for setting that application configuration, logon scripts are in many ways a poor solution. They only apply as the user logs in, so different computers will be in different states at different times. Making decisions in logon scripts also requires extra coding effort, along with all the necessary testing. What you d really prefer is some way to deploy an application lockdown everywhere, without resorting to scripting. Third-party solutions exist to accomplish this task. Those solutions take the scripting out of logon scripting. They enable you to target registry modifications to any computer you ve specified. 4 Lock Down Apps & Reduce Help Desk Calls with Registry Policies
5 Microsoft also provides a rudimentary mechanism for customizing application behavior with its Group Policy Preferences. Group Policy Preferences serve a much different role than traditional Group Policies. Understanding the difference is best served by recognizing the tasks traditional Group Policies were never terribly good at. Back in the days before preferences there wasn t a simple way to create your own custom settings changes. Doing so first required creating your own custom Administrative Template. That process required a special language crafted specifically for Group Policy. Your Administrative Template would need to address all the questions the configuration required along with the range of possible answers. Once authored, the template s ADM file was then attached to a Group Policy. Only then could you answer its question in the way you needed and apply the policy to enact the change. That s a lot of effort for a simple registry change. Group Policy Preferences are designed to simplify the process a bit, although they still require knowledge about the configuration you want to control. Figure 2: Configuring a Registry preference. Figure 1 shows an example of a Registry Preference that s been created under a Group Policy Object s User Configuration node. This preference modifies a value in the Key Path HKCU\Software\AppABC. It sets the BehaveInappropriately registry value to 0. 5 Lock Down Apps & Reduce Help Desk Calls with Registry Policies
6 Not shown in Figure 1, but part of every preference, are additional parameters that might instruct the preference to fix a configuration that gets changed by a user. Targeting the preference to specific users and/or computers is also possible. Once finished, apply the policy containing the preference is linked to an Organizational Unit of users. They re now under control. but how does this Lock Down Applications? Good question, because the conversation so far should beg one important question: Now I know how to control registry keys and values, but how do I find out which ones correspond to the settings inside my applications? Figure 3: WinZip s wizard setting. The answer isn t trivial, because every application is a little bit different. Some applications very obviously label which registry settings correspond to what configurations. Figure 3 shows an example of this with the popular WinZip application. Some versions of WinZip can be operated in one of two modes, WinZip Wizard or WinZip Classic. Using the Windows Registry Editor, one can browse to HKCU\Software\Nico Mak Computing\WinZip\WinZip and see a registry value named Wizard with data of 0. Yes or no values in the registry are commonly, though not always, seen as 1 or 0. A bit of educated guessing with Figure 3 would have one assume its 0 value means the WinZip Wizard mode will not be enabled. This information is valuable for locking down your application behaviors. Let s assume that your users don t like the WinZip Wizard. Every time it gets turned on, they call the help desk with problems. With the information you ve learned by sleuthing through the registry, you now know what lines to add to a logon script to fix the problem. Or, you could create a Group Policy Preference to fix it for every user. Being a registry detective like this only has one rule: There are no rules. Sometimes applications aren t as overt with their registry settings, obscuring them beneath confusing values and keys. Other times, their values might be spread across the far reaches of the registry, or they might be coded in odd ways that aren t easy to figure out at a glance. 6 Lock Down Apps & Reduce Help Desk Calls with Registry Policies
7 In these cases, just browsing the registry probably won t get you the answers you need. There is a class of solutions that can help. Arriving in various forms, these registry change monitoring tools will watch the registry, reporting on its before and after state between which you flip a switch in the application. The process with these tools has three steps: 1. Create a before snapshot of the registry. 2. Make whatever selection you want to control in the application. 3. Create an after snapshot and compare the differences. Many of these tools are freeware solutions. Others that are more powerful may include this basic functionality as part of a larger software packaging solution. Often, spending the few dollars on the extra features of the packaging solution is the best idea. Some applications may store configurations in files or services that aren t wellrepresented in the registry. A software packaging solution can scan an entire computer files, registry, devices, services, and so on with the goal of giving you a complete understanding of what changed between Step 1 and Step 3. Investing in Application Control Losing your fear of the registry is only the start. Also necessary is the time and effort in locating the configurations you want to control. That won t happen overnight. That said, investing a bit of up-front time in controlling your applications pays dividends far into the future. Your applications will experience fewer problems, you ll experience fewer help desk calls, and your entire IT environment will grow just a little bit more predictable. 7 Lock Down Apps & Reduce Help Desk Calls with Registry Policies
Packaging Software: Making Software Install Silently
Packaging Software: Making Software Install Silently By Greg Shields 1. 8 0 0. 8 1 3. 6 4 1 5 w w w. s c r i p t l o g i c. c o m / s m b I T 2011 ScriptLogic Corporation ALL RIGHTS RESERVED. ScriptLogic,
More informationCreating and Managing Shared Folders
Creating and Managing Shared Folders Microsoft threw all sorts of new services, features, and functions into Windows 2000 Server, but at the heart of it all was still the requirement to be a good file
More informationActive Directory 2008 Operations
The Essentials Series Active Directory 2008 Operations sponsored by by Greg Shields Understanding Active Directory Recovery in Windows Server 2008...1 Backing Up AD...1 Full Server Recovery of a Domain
More informationSnagit 12. Installing Snagit on Remote Desktop. Version 12.2.2. December 2014 2014 TechSmith Corporation
12 Installing Snagit on Remote Desktop Services Version 12.2.2 December 2014 2014 TechSmith Corporation All rights reserved This manual, as well as the software described in it, is furnished under license
More informationNetWrix USB Blocker. Version 3.6 Administrator Guide
NetWrix USB Blocker Version 3.6 Administrator Guide Table of Contents 1. Introduction...3 1.1. What is NetWrix USB Blocker?...3 1.2. Product Architecture...3 2. Licensing...4 3. Operation Guide...5 3.1.
More informationWhy should I back up my certificate? How do I create a backup copy of my certificate?
Why should I back up my certificate? You should always keep a backup copy of your ACES Business Certificate on a location external to your computer. Since it s stored locally on your computer, in the Windows
More informationCitrix Password Manager Using the Account Self-Service Feature. Citrix Password Manager 4.6 with Service Pack 1 Citrix XenApp 5.0, Platinum Edition
Citrix Password Manager Using the Account Self-Service Feature Citrix Password Manager 4.6 with Service Pack 1 Citrix XenApp 5.0, Platinum Edition 2 Citrix Password Manager - Account Self-Service Copyright
More informationFederated Identity Service Certificate Download Requirements
Federated Identity Service Certificate Download Requirements Version 3.2 Exostar, LLC February 14, 2013 Table of Contents Introduction... 1 Purpose... 1 FIS System Requirements... 2 Adding Exostar as a
More informationPassword Manager Windows Desktop Client
Password Manager Windows Desktop Client EmpowerID provides an extension that allows organizations to plug into Password Manager to customize the Windows logon experience beyond that supplied by the standard
More informationNetWrix Server Configuration Monitor
NetWrix Server Configuration Monitor Version 2.2 Quick Start Guide Contents NetWrix Server Configuration Monitor Quick Start Guide 1. INTRODUCTION... 3 1.1 KEY FEATURES... 3 1.2 LICENSING... 4 1.3 HOW
More informationWindows Administration Terminal Services, AD and the Windows Registry. INLS 576 Spring 2011 Tuesday, February 24, 2011
Windows Administration Terminal Services, AD and the Windows Registry INLS 576 Spring 2011 Tuesday, February 24, 2011 Terminal Services Uses RDP (Remote Desktop Protocol), relies on TCP/IP, and falls under
More informationDeploying Software with Group Policy Whitepaper
Deploying Software with Group Policy Whitepaper Written by Darren Mar-Elia Chief Technology Officer Microsoft Group Policy MVP SDM Software, Inc. Abstract Group Policy is the feature in Microsoft Windows
More informationNetWrix USB Blocker Version 3.6 Quick Start Guide
NetWrix USB Blocker Version 3.6 Quick Start Guide Table of Contents 1. Introduction...3 1.1. What is NetWrix USB Blocker?...3 1.2. Product Architecture...3 2. Licensing...4 3. Getting Started...5 3.1.
More informationManagement Utilities Configuration for UAC Environments
Management Utilities Configuration for UAC Environments For optimal use of SyAM Management Utilities, Windows client machines should be configured with User Account Control disabled or set to the least
More informationDeploying Dedicated Virtual Desktops in Hosted Environments
Deploying Dedicated Virtual Desktops in Hosted Environments Technical Preview Release Citrix XenDesktop 5.6 for Windows Server 2008 R2 Deploying Dedicated Desktops in Hosted Environments Hosted Server
More informationDeploying Dedicated Virtual Desktops in Hosted Environments
Deploying Dedicated Virtual Desktops in Hosted Environments Citrix XenDesktop 5.6 for Windows Server 2008 R2 Deploying Dedicated Desktops in Hosted Environments Hosted Server VDI enables CSPs to provide
More informationLearn how to create web enabled (browser) forms in InfoPath 2013 and publish them in SharePoint 2013. InfoPath 2013 Web Enabled (Browser) forms
Learn how to create web enabled (browser) forms in InfoPath 2013 and publish them in SharePoint 2013. InfoPath 2013 Web Enabled (Browser) forms InfoPath 2013 Web Enabled (Browser) forms Creating Web Enabled
More informationColor icontrol (Color iqc, Color imatch) Installation of Terminal Server Version 4.x, 5.x
Color icontrol (Color iqc, Color imatch) Installation of Terminal Server Version 4.x, 5.x Color icontrol (version 4.16 or later) may be installed on a Windows 2003 Terminal Server and if properly configured
More informationMicrosoft Virtual Labs. Administering the IIS 7 File Transfer Protocol (FTP) Server
Microsoft Virtual Labs Administering the IIS 7 File Transfer Protocol (FTP) Server Table of Contents Exercise 1 Installing the Microsoft FTP Publishing Service for the IIS 7... 1 Exercise 2 Introducing
More informationWINDOWS REGISTRY AUDITING CHEAT SHEET - Win 7/Win 2008 or later
This Windows Registry Auditing Cheat Sheet is intended to help you get started with basic and necessary Registry Auditing. This cheat sheet includes some very common items that should have auditing enabled,
More informationGENERAL QUESTIONS...2 USER S PROFILE AND SETTINGS... 4 SERVICE INSTALLATION AND CONFIGURATION... 6 ASSIGNING PROFILES... 9 MIGRATING PROFILES...
Citrix Presentation Server FAQ FAQ DATASHEET Profile Management Frequently Asked Questions Table of Contents GENERAL QUESTIONS...2 USER S PROFILE AND SETTINGS... 4 SERVICE INSTALLATION AND CONFIGURATION...
More informationInstalling Windows Server Update Services (WSUS) on Windows Server 2012 R2 Essentials
Installing Windows Server Update Services (WSUS) on Windows Server 2012 R2 Essentials With Windows Server 2012 R2 Essentials in your business, it is important to centrally manage your workstations to ensure
More informationHow To Deploy Lync 2010 Client Using SCCM 2012 R2
prajwaldesai.com http://prajwaldesai.com/how-to-deploy-lync-2010-client-using-sccm-2012-r2/ How To Deploy Lync 2010 Client Using SCCM 2012 R2 Prajwal Desai In this post we will see how to deploy Lync 2010
More informationINSTALL AND CONFIGURATION GUIDE. Atlas 5.1 for Microsoft Dynamics AX
INSTALL AND CONFIGURATION GUIDE Atlas 5.1 for Microsoft Dynamics AX COPYRIGHT NOTICE Copyright 2012, Globe Software Pty Ltd, All rights reserved. Trademarks Dynamics AX, IntelliMorph, and X++ have been
More information10 things Group Policy Preferences can do better than your current script!
10 things Group Policy Preferences can do better than your current script! By Florian Frommherz September 5th, 2008 Table of Contents Overview... 3 Drive Mappings... 3 Energy options... 5 Folder Options...
More informationSMART Sync 2011. Windows operating systems. System administrator s guide
SMART Sync 2011 Windows operating systems System administrator s guide Trademark notice SMART Sync, smarttech and the SMART logo are trademarks or registered trademarks of SMART Technologies ULC in the
More informationOneStop Reporting 3.7 Installation Guide. Updated: 2013-01-31
OneStop Reporting 3.7 Installation Guide Updated: 2013-01-31 Copyright OneStop Reporting AS www.onestopreporting.com Table of Contents System Requirements... 1 Obtaining the Software... 2 Obtaining Your
More information5 Group Policy Management Capabilities You re Missing
5 Group Policy Management Capabilities You re Missing Don Jones 1. 8 0 0. 8 1 3. 6 4 1 5 w w w. s c r i p t l o g i c. c o m / s m b I T 2011 ScriptLogic Corporation ALL RIGHTS RESERVED. ScriptLogic, the
More informationModular Messaging. Release 4.0 Service Pack 4. Whitepaper: Support for Active Directory and Exchange 2007 running on Windows Server 2008 platforms.
Modular Messaging Release 4.0 Service Pack 4 Whitepaper: Support for Active Directory and Exchange 2007 running on Windows Server 2008 platforms. April 2009 2006-2009 Avaya Inc. All Rights Reserved. Notice
More informationVisual Studio.NET Database Projects
Visual Studio.NET Database Projects CHAPTER 8 IN THIS CHAPTER Creating a Database Project 294 Database References 296 Scripts 297 Queries 312 293 294 Visual Studio.NET Database Projects The database project
More informationSpecial Edition for FastTrack Software
08/14 The magazine for professional system and networkadministration Special Edition for FastTrack Software Tested: FastTrack Automation Studio www.it-administrator.com TESTS I FastTrack Automation Studio
More informationKentico CMS 7.0 Intranet Administrator's Guide
Kentico CMS 7.0 Intranet Administrator's Guide 2 Kentico CMS 7.0 Intranet Administrator's Guide Table of Contents Introduction 5... 5 About this guide Getting started 7... 7 Installation... 11 Accessing
More informationCitrix Systems, Inc.
Citrix Systems, Inc. Notice The information in this publication is subject to change without notice. THIS PUBLICATION IS PROVIDED AS IS WITHOUT WARRANTIES OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING ANY
More informationHow to Use Windows Firewall With User Account Control (UAC)
Keeping Windows 8.1 safe and secure 14 IN THIS CHAPTER, YOU WILL LEARN HOW TO Work with the User Account Control. Use Windows Firewall. Use Windows Defender. Enhance the security of your passwords. Security
More informationControlling and Managing Security with Performance Tools
Security Management Tactics for the Network Administrator The Essentials Series Controlling and Managing Security with Performance Tools sponsored by Co ntrolling and Managing Security with Performance
More informationMicrosoft Corporation. Status: Preliminary documentation
Microsoft Corporation Status: Preliminary documentation Beta content: This guide is currently in beta form. The AppLocker team greatly appreciates you reviewing the document and looks forward to receiving
More informationSPHOL207: Database Snapshots with SharePoint 2013
2013 SPHOL207: Database Snapshots with SharePoint 2013 Hands-On Lab Lab Manual This document is provided as-is. Information and views expressed in this document, including URL and other Internet Web site
More informationSystem Center 2012 R2 SP1 Configuration Manager & Microsoft Intune
2015 System Center 2012 R2 SP1 Configuration Manager & Microsoft Intune DEPLOYING MICROSOFT OFFICE 365 PROFESSIONAL PLUS RONNI PEDERSEN & HANS CHRISTIAN ANDERSEN RONNIPEDERSEN.COM Microsoft MVP: Enterprise
More informationHDA Integration Guide. Help Desk Authority 9.0
HDA Integration Guide Help Desk Authority 9.0 2011ScriptLogic Corporation ALL RIGHTS RESERVED. ScriptLogic, the ScriptLogic logo and Point,Click,Done! are trademarks and registered trademarks of ScriptLogic
More informationApp Orchestration 2.0
App Orchestration 2.0 Integrated Provisioning Deployment Guide Prepared by: Nicholas Ceballos Commissioning Editor: Linda Belliveau Version: 6.0 Last Updated: December 12, 2013 Page 1 Contents Integrated
More informationQuick Start Guide. IT Management On-Demand
1 Quick Start Guide Quick Start Guide IT Management On-Demand Introduction... 2 Getting Started... 3 Planning Your Deployment... 5 Performing a Test Deployment... 6 Enterprise Deployment Options... 8 Remote
More informationChapter. Managing Group Policy MICROSOFT EXAM OBJECTIVES COVERED IN THIS CHAPTER:
Chapter 10 Managing Group Policy MICROSOFT EXAM OBJECTIVES COVERED IN THIS CHAPTER: Implement and troubleshoot Group Policy. Create a Group Policy object (GPO). Link an existing GPO. Delegate administrative
More informationAdministration Guide. . All right reserved. For more information about Specops Deploy and other Specops products, visit www.specopssoft.
. All right reserved. For more information about Specops Deploy and other Specops products, visit www.specopssoft.com Copyright and Trademarks Specops Deploy is a trademark owned by Specops Software. All
More informationDeploying EFS: Part 2
Deploying EFS: Part 2 John Morello You can think of any Encrypting File System (EFS) deployment as having essentially two parts: the back-end design portion focusing on certificate management and recovery
More informationXenDesktop Implementation Guide
Consulting Solutions WHITE PAPER Citrix XenDesktop XenDesktop Implementation Guide Pooled Desktops (Local and Remote) www.citrix.com Contents Contents... 2 Overview... 4 Initial Architecture... 5 Installation
More informationNetWrix Account Lockout Examiner Version 4.0 Administrator Guide
NetWrix Account Lockout Examiner Version 4.0 Administrator Guide Table of Contents Concepts... 1 Product Architecture... 1 Product Settings... 2 List of Managed Domains and Domain Controllers... 2 Email
More informationTrusted Stackware series. Rev. 1.0.2. D.O.I-Net Co., Ltd. Document No.:TST-10-002E
TruMonitor Client Setup Guide Rev. 1.0.2 D.O.I-Net Co., Ltd. Document No.:TST-10-002E Disclaimers 1. D.O.I-Net Co., Ltd. shall not take responsibility for any direct and indirect damage caused by the descriptions
More informationTest Note Phone Manager Deployment Windows Group Policy Sever 2003 and XP SPII Clients
Test Note Phone Manager Deployment Windows Group Policy Sever 2003 and XP SPII Clients Note: I have only tested these procedures on Server 2003 SP1 (DC) and XP SPII client, in a controlled lab environment,
More informationNetWrix Password Manager. Quick Start Guide
NetWrix Password Manager Quick Start Guide Contents Overview... 3 Setup... 3 Deploying the Core Components... 3 System Requirements... 3 Installation... 4 Windows Server 2008 Notes... 4 Upgrade Path...
More informationWorking with RD Web Access in Windows Server 2012
Working with RD Web Access in Windows Server 2012 Introduction to RD Web Access So far in this series we have talked about how to successfully deploy and manage a Microsoft Windows Server 2012 VDI environment.
More informationThinManager and Active Directory
ThinManager and Active Directory Use the F1 button on any page of a ThinManager wizard to launch Help for that page. Visit http://www.thinmanager.com/kb/index.php/special:allpages for a list of Knowledge
More informationCONFIGURING TARGET ACTIVE DIRECTORY DOMAIN FOR AUDIT BY NETWRIX AUDITOR
CONFIGURING TARGET ACTIVE DIRECTORY DOMAIN FOR AUDIT BY NETWRIX AUDITOR TECHNICAL ARTICLE Product Version: 5.0 July 2013. Legal Notice The information in this publication is furnished for information use
More informationConfiguration Guide for SQL Server This document explains the steps to configure LepideAuditor Suite to add and audit SQL Server.
LEPIDE SOFTWARE Configuration Guide for SQL Server This document explains the steps to configure LepideAuditor Suite to add and audit SQL Server. LepideAuditor Suite Lepide Software Private Limited, All
More informationOne of the fundamental kinds of Web sites that SharePoint 2010 allows
Chapter 1 Getting to Know Your Team Site In This Chapter Requesting a new team site and opening it in the browser Participating in a team site Changing your team site s home page One of the fundamental
More informationLeast Privilege Security for Windows 7, Vista and XP
P U B L I S H I N G professional expertise distilled Least Privilege Security for Windows 7, Vista and XP Russell Smith Chapter No.3 "Solving Least Privilege Problems with the Application Compatibility
More informationWINDOWS PROCESSES AND SERVICES
OBJECTIVES: Services o task manager o services.msc Process o task manager o process monitor Task Scheduler Event viewer Regedit Services: A Windows service is a computer program that operates in the background.
More informationExclaimer Signature Manager 2.0 User Manual
Exclaimer Exclaimer UK +44 (0) 1252 531 422 USA 1-888-450-9631 info@exclaimer.com Contents GETTING STARTED... 10 Signature Manager Overview... 11 How does it Work?... 11 But That's Not All...... 12 And
More informationAbout This Guide... 4. Signature Manager Outlook Edition Overview... 5
Contents About This Guide... 4 Signature Manager Outlook Edition Overview... 5 How does it work?... 5 But That's Not All...... 6 And There's More...... 6 Licensing... 7 Licensing Information... 7 System
More informationApp-V Deploy and Publish
App-V Deploy and Publish Tools from TMurgent Technologies Updated Aug 5, 2010 Version 1.8 Introduction: The deployment of Virtual Applications in the simplest way possible, without the need for complicated
More informationModule 8: Implementing Group Policy
Module 8: Implementing Group Policy Contents Overview 1 Lesson: Implementing Group Policy Objects 2 Lesson: Implementing GPOs in a Domain 12 Lesson: Managing the Deployment of Group Policy 21 Lab: Implementing
More informationWhite Paper: Enterprise Software Distribution for Windows Applications
White Paper: Enterprise Software Distribution for Windows Applications Table of contents Introduction... 1 Keeping Users Productive in Real-world Environments... 2 To Roam or Not to Roam... 2 The Limitations
More informationNETWRIX WINDOWS SERVER CHANGE REPORTER
NETWRIX WINDOWS SERVER CHANGE REPORTER INSTALLATION AND CONFIGURATION GUIDE Product Version: 4.0 March 2013. Legal Notice The information in this publication is furnished for information use only, and
More informationIdera SQL Diagnostic Manager Management Pack Guide for System Center Operations Manager. Install Guide. Idera Inc., Published: April 2013
Idera SQL Diagnostic Manager Management Pack Guide for System Center Operations Manager Install Guide Idera Inc., Published: April 2013 Contents Introduction to the Idera SQL Diagnostic Manager Management
More informationDigitalPersona Pro Server for Active Directory v4.x Quick Start Installation Guide
DigitalPersona Pro Server for Active Directory v4.x Quick Start Installation Guide 1 of 7 DigitalPersona Pro Server for Active Directory v4.x Quick Start Installation Guide Process Overview Step Description
More informationWhat s New Guide. Help Desk Authority 9.1
What s New Guide Help Desk Authority 9.1 2011ScriptLogic Corporation ALL RIGHTS RESERVED. ScriptLogic, the ScriptLogic logo and Point,Click,Done! are trademarks and registered trademarks of ScriptLogic
More informationBackup Assistant. User Guide. NEC NEC Unified Solutions, Inc. March 2008 NDA-30282, Revision 6
Backup Assistant User Guide NEC NEC Unified Solutions, Inc. March 2008 NDA-30282, Revision 6 Liability Disclaimer NEC Unified Solutions, Inc. reserves the right to change the specifications, functions,
More informationInstallation Guide. . All right reserved. For more information about Specops Deploy and other Specops products, visit www.specopssoft.
. All right reserved. For more information about Specops Deploy and other Specops products, visit www.specopssoft.com Copyright and Trademarks Specops Deploy is a trademark owned by Specops Software. All
More informationYubiKey PIV Deployment Guide
YubiKey PIV Deployment Guide Best Practices and Basic Setup YubiKey 4, YubiKey 4 Nano, YubiKey NEO, YubiKey NEO-n YubiKey PIV Deployment Guide 2016 Yubico. All rights reserved. Page 1 of 27 Copyright 2016
More informationMigrating Active Directory to Windows Server 2012 R2
Migrating Active Directory to Windows Server 2012 R2 Windows Server 2012 R2 Hands-on lab In this lab, you will complete a migration of a Windows Server 2008 R2 domain environment to Windows Server 2012
More informationExclaimer Signature Manager 2.0 User Manual
Exclaimer Exclaimer UK +44 (0) 1252 531 422 USA 1-888-450-9631 info@exclaimer.com Contents GETTING STARTED... 10 Signature Manager Overview... 11 How Does it Work?... 11 But That's Not All...... 12 And
More informationMicrosoft Corporation. Project Server 2010 Installation Guide
Microsoft Corporation Project Server 2010 Installation Guide Office Asia Team 11/4/2010 Table of Contents 1. Prepare the Server... 2 1.1 Install KB979917 on Windows Server... 2 1.2 Creating users and groups
More informationWindows 7 Optimization Guide
Consulting Solutions WHITE PAPER Citrix XenDesktop Windows 7 Optimization Guide For Desktop Virtualization www.citrix.com Contents Contents... 2 Overview... 3 Machine Settings... 3 User Settings... 7 Final
More informationTROUBLESHOOTING GUIDE
Lepide Software LepideAuditor Suite TROUBLESHOOTING GUIDE This document explains the troubleshooting of the common issues that may appear while using LepideAuditor Suite. Copyright LepideAuditor Suite,
More informationSymantec AntiVirus Corporate Edition Patch Update
Symantec AntiVirus Corporate Edition Patch Update Symantec AntiVirus Corporate Edition Update Documentation version 10.0.1.1007 Copyright 2005 Symantec Corporation. All rights reserved. Symantec, the Symantec
More informationGuide to deploy MyUSBOnly via Windows Logon Script Revision 1.1. Menu
Menu INTRODUCTION...2 HOW DO I DEPLOY MYUSBONLY ON ALL OF MY COMPUTERS...3 ADMIN KIT...4 HOW TO SETUP A LOGON SCRIPTS...5 Why would I choose one method over another?...5 Can I use both methods to assign
More informationGroup Policy Objects: What are They and How Can They Help Your Firm?
Group Policy Objects: What are They and How Can They Help Your Firm? By Sharon Nelson and John Simek 2011 Sensei Enterprises, Inc. The obvious first question: What is a Group Policy Object? Basically,
More informationAdministrator s Guide
MAPILab Disclaimers for Exchange Administrator s Guide document version 1.8 MAPILab, December 2015 Table of contents Intro... 3 1. Product Overview... 4 2. Product Architecture and Basic Concepts... 4
More informationSCCM 2012. How to guide deploying SCCM Client, setting up SUP and SCEP. Hans Chr. Andersen
SCCM 2012 How to guide deploying SCCM Client, setting up SUP and SCEP Hans Chr. Andersen Contents What is Configuration Manager?... 2 Deploying SCCM Client... 3 Client push Installation... 3 SUP Installation...
More informationDeploying Personal Virtual Desktops by Using RemoteApp and Desktop Connection Step-by-Step Guide
c623242f-20f0-40fe-b5c1-8412a094fdc7 Deploying Personal Virtual Desktops by Using RemoteApp and Desktop Connection Step-by-Step Guide Microsoft Corporation Published: June 2009 Updated: April 2010 Abstract
More informationInstalling Kaspersky Security Center 10.0 on Microsoft Windows Server 2012 Core Mode
Installing Kaspersky Security Center 10.0 on Microsoft Windows Server 2012 Core Mode Version Date Editor Comments 1.0 17 th January 2012 Pavel Polyansky Initial version. Introduction Server Core is a minimal
More informationVERITAS Backup Exec TM 10.0 for Windows Servers
VERITAS Backup Exec TM 10.0 for Windows Servers Quick Installation Guide N134418 July 2004 Disclaimer The information contained in this publication is subject to change without notice. VERITAS Software
More informationXMap 7 Administration Guide. Last updated on 12/13/2009
XMap 7 Administration Guide Last updated on 12/13/2009 Contact DeLorme Professional Sales for support: 1-800-293-2389 Page 2 Table of Contents XMAP 7 ADMINISTRATION GUIDE... 1 INTRODUCTION... 5 DEPLOYING
More informationStandardizing Your Enterprise s Software Packaging Process
Standardizing Your Enterprise s Software Packaging Process Published September 2005 Abstract This white paper explores the problems enterprises encounter when IT fails to follow a standardized software
More informationWindows 2008 Server DIRECTIVAS DE GRUPO. Administración SSII
Windows 2008 Server DIRECTIVAS DE GRUPO Administración SSII Group Policy A centralized approach to applying one or more changes to one or more users or computers Setting: Definition of a change or configuration
More informationHow To Configure A Windows 8.1 On A Windows 7.1.1 (Windows) With A Powerpoint (Windows 8) On A Blackberry) On An Ipad Or Ipad (Windows 7) On Your Blackberry Or Black
Introduction to Cloud-Based Mobile Device Management with Intune Information in this document, including URLs and other Internet Web site references, is subject to change without notice. Unless otherwise
More informationOctober, 2015. Install/Uninstall Xerox Print Drivers & Apps Best Practices for Windows 8, 8.1, and 10 Customer Tip
October, 2015 Install/Uninstall Xerox Print Drivers & Apps Best Practices for Windows 8, 8.1, and 10 Customer Tip 2015 Xerox Corporation. All rights reserved. Xerox, Xerox and Design, ColorQube, and WorkCentre
More informationMicrosoft Windows Server 2012 R2 Remote Desktop Services - How to Set Up (Mostly) Seamless Logon for RDP Connections
Microsoft Windows Server 2012 R2 Remote Desktop Services - How to Set Up (Mostly) Seamless Logon for RDP Connections KRISTIN L. GRIFFIN MVP, REMOTE DESKTOP SERVICES Tech Editor: Toby Phipps MVP, Remote
More informationLenovo Online Data Backup User Guide Version 1.8.14
Lenovo Online Data Backup User Guide Version 1.8.14 Contents Chapter 1: Installing Lenovo Online Data Backup...5 Downloading the Lenovo Online Data Backup Client...5 Installing the Lenovo Online Data
More informationVector HelpDesk - Administrator s Guide
Vector HelpDesk - Administrator s Guide Vector HelpDesk - Administrator s Guide Configuring and Maintaining Vector HelpDesk version 5.6 Vector HelpDesk - Administrator s Guide Copyright Vector Networks
More informationStaying Organized with the Outlook Journal
CHAPTER Staying Organized with the Outlook Journal In this chapter Using Outlook s Journal 362 Working with the Journal Folder 364 Setting Up Automatic Email Journaling 367 Using Journal s Other Tracking
More informationTips & Tricks for Protecting User Data on Windows 7
Tips & Tricks for Protecting User Data on Windows 7 Jeff Hicks 1. 8 0 0. 8 1 3. 6 4 1 5 w w w. s c r i p t l o g i c. c o m / s m b I T 2012 ScriptLogic Corporation ALL RIGHTS RESERVED. ScriptLogic, the
More informationENABLE LOGON/LOGOFF AUDITING
Lepide Software LepideAuditor Suite ENABLE LOGON/LOGOFF AUDITING This document explains the steps required to enable the auditing of logon and logoff events for a domain. Table of Contents 1. Introduction...
More informationOutpost Network Security
Administrator Guide Reference Outpost Network Security Office Firewall Software from Agnitum Abstract This document provides information on deploying Outpost Network Security in a corporate network. It
More informationILTA 2013 - HAND 6B. Upgrading and Deploying. Windows Server 2012. In the Legal Environment
ILTA 2013 - HAND 6B Upgrading and Deploying Windows Server 2012 In the Legal Environment Table of Contents Purpose of This Lab... 3 Lab Environment... 3 Presenter... 3 Exercise 1 Add Roles and Features...
More informationVersion 5.0. SurfControl Web Filter for Citrix Installation Guide for Service Pack 2
Version 5.0 SurfControl Web Filter for Citrix Installation Guide for Service Pack 2 NOTICES Updates to the SurfControl documentation and software, as well as Support information are available at www.surfcontrol.com/support.
More informationBackups and Maintenance
Backups and Maintenance Backups and Maintenance Objectives Learn how to create a backup strategy to suit your needs. Learn how to back up a database. Learn how to restore from a backup. Use the Database
More informationAccess Teams with Microsoft Dynamics CRM 2013
Access Teams with Microsoft Dynamics CRM 2013 VERSION: 1.0 AUTHOR: Roger Gilchrist COMPANY: Microsoft Corporation RELEASED: November 2013 Copyright This document is provided "as-is". Information and views
More informationSetting up the Oracle Warehouse Builder Project. Topics. Overview. Purpose
Setting up the Oracle Warehouse Builder Project Purpose In this tutorial, you setup and configure the project environment for Oracle Warehouse Builder 10g Release 2. You create a Warehouse Builder repository
More informationHow to Install Multiple Monitoring Agents on a Microsoft Operating System. Version StoneGate Firewall/VPN 2.6 and SMC 3.2
How to Install Multiple Monitoring Agents on a Microsoft Operating System Version StoneGate Firewall/VPN 2.6 and SMC 3.2 INTRODUCTION This document provides detailed instructions for installing multiple
More informationSafeGuard Enterprise upgrade guide. Product version: 7
SafeGuard Enterprise upgrade guide Product version: 7 Document date: December 2014 Contents 1 About this guide...3 2 Check the system requirements...4 3 Download installers...5 4 About upgrading...6 4.1
More information