Security Guidelines for MapInfo Discovery 1.1

Save this PDF as:
 WORD  PNG  TXT  JPG

Size: px
Start display at page:

Download "Security Guidelines for MapInfo Discovery 1.1"

Transcription

1 Security Guidelines for MapInfo Discovery 1.1 This paper provides guidelines and detailed instructions for improving the security of your Mapinfo Discovery deployment. In this document: Overview More Secure File Locations and Access Control User Authentication Securing MapInfo Discovery IIS Web Site Permissions. 7 Securing Pages Using IIS FTP Site Permissions Securing Pages Using NTFS File Permissions Restricting FTP and HTTP Access

2 Overview MapInfo Corp. has researched security issues related to Mapinfo Discovery deployed on the internet. This paper summarizes those findings. Our goal is to assist you in providing a secure deployment of Mapinfo Discovery and to help protect your Discovery server from malicious users. The information provided in this paper is consistent with the security guidelines you should implement with any application deployed on the internet. These issues are of less concern for an intranet deployment, where your IT department has implemented steps to protect your environment inside the firewall. MapInfo will continue to monitor your feedback, evaluate security issues, and take steps to address your concerns. For a complete overview of IIS 5.0 security issues, see the following articles: reskit/iischp9.mspx#efaa EDAA These articles contains IIS 5.0-specific information on configuration, user authentication, certificates, troubleshooting, and include references to many additional resources MapInfo Corporation. All rights reserved. 2 disovery11_security.pdf

3 More Secure File Locations and Access Control There are some basic configuration choices that can provide better security for your internet deployment of Mapinfo Discovery. We recommend putting the Default Web Site on a non-default drive. This will prevent users from traversing through a known directory structure. When you install IIS 5.0, you cannot change the default installation location on C:\inetpub. After you install IIS 5.0, you can then change the paths of web site entities. You must do this manually, by following the procedures outlined below. 1. Select the contents of the C:\inetpub directory and copy the contents of each folder. 2. Select and expand a non-default location (such as the F: drive) select EDIT, then select PASTE. You still must instruct IIS to look in the new locations for the relocated files. To do this, follow these steps: 3. Run the IIS Manager by choosing START > CONTROL PANEL > ADMINISTRATIVE TOOLS > INTERNET SERVICES MANAGER. 4. Right-click on Default Web Site and choose PROPERTIES. 5. In the Default Web Site Properties dialog box, select the Home Directory tab. 6. Change the Local Path to point to the non-default directory to which you copied the resource. For example, change the Local Path of the Default Web Site from C:\inetpub\wwwroot to the relocated F:\inetpub\wwwroot MapInfo Corporation. All rights reserved. 3 disovery11_security.pdf

4 Similarly, you must instruct IIS to look in the new locations for all the web site entities (such as Scripts or IISHelp) that you have moved to non-default locations. For example, the IISAdmin virtual folder is originally installed on C:\WINNT\system32\inetsrv\iisadmin\. After copying the contents of this folder to F:\inetpub\inetsrv, use IIS (PROPERTIES > HOME DIRECTORY tab) to look for the relocated files in the new area: Use the same basic procedure to sequentially copy the contents of each Default Web Site subfolder to the non-default location, then use IIS to point to the new location. Note: After you have completed this procedure, stop and restart the World Wide Web Publishing Service to ensure that your changes have not caused any problems. From Control Panel, select ADMINISTRATIVE TOOLS > SERVICES, then right-click on World Wide Web Publishing from the list of services. From the context menu you can select STOP or START MapInfo Corporation. All rights reserved. 4 disovery11_security.pdf

5 In addition to locating the Default Web Site on another drive, you should install MapInfo Discovery in an alternative location. This can be the same drive but in a unique subfolder under the relocated Default Web Site. This will help to ensure that anonymous login users can view and browse maps, but not gain access to more sensitive files that only administrators should be able to access. Also, the MapInfo Discovery installation drive should be on a volume that does not have the operating system on it. MapInfo Discovery executables, dlls, and other sensitive files should be installed in directories that are secured with NTFS file permissions. These directories, files, and recommended permissions are described in Recommended NTFS Permissions Settings for MapInfo Discovery Server on page 12. User Authentication IIS 5.0 web sites can be configured to authenticate users before users are allowed access to the site, a folder in the site, or even a particular document within a folder at the site. For more information, review the following article, which describes how to configure web site authentication in IIS Tip: You can also locate this and related articles by searching all the words anonymous authentication iis 5.0 in: MapInfo Discovery uses Anonymous User authentication. This is more fully described in the next topic MapInfo Corporation. All rights reserved. 5 disovery11_security.pdf

6 Anonymous User Access When the Anonymous User option is enabled in IIS, any request for a web page from IIS will be seen as a request from Anonymous User. When a user requests a file via a web browser, the operating system checks file permissions to determine whether the Anonymous User has privileges to open the file. If Anonymous User has sufficient privileges, authentication is satisfied, and the file (web page) can be sent. Note: Anonymous User access does not in itself compromise security. There are additional layers of security that you can implement to prevent anonymous users from getting access to restricted resources. These security steps are described in this document. In IIS, anonymous users are assigned a default account of IUSR_<Your_Machine_Name>. The IUSR_ <Your_Machine_Name> account is denied write access to web content by default. Correction:In the MapInfo Discovery v1.1 Product Guide, the topic on Web and FTP Virtual Directories / Managing Disk Space incorrectly describes the access rights that should be granted to IUSR_<Your_Machine_Name>. Do not grant full control access rights to the IUSR_<Your_Machine_Name> account. For more information on using anonymous login accounts, see the Microsoft web site at: Default.asp?url=/resources/documentation/Windows/2000/server/reskit/en-us/iisbook/ c09_anonymous_web_authentication.asp Secure Sockets and Certificates You can use HTTPS (HTTP using Secure Sockets) to provide more secure the information flow between the Discovery server and web browser. For example, when an administrator logs on to a web site, the administrator s password can be encrypted. Similarly, password-protected maps can be secured. If you start a session using https (rather than simply http), the secure status is retained throughout the session. If you have configured your site to use SSL/HTTPS, you should distribute links as https so that users will use secure protocols when they access your site. For example: IIS 5.0 mapping allows the administrator to set up a rule or group of rules that determine how a client authentication certificate is mapped to a Windows user account, without requiring the use of Basic or any other form of authentication. The following article describes how to configure your web server for SSL/HTTPS. Tip: You can also find this and elated articles by searching all the words certificate mapping iis 5.0 in: The following article provides detailed information on implementing and using certificates in IIS 5.0: reskit/iischp9.mspx#efaa 2005 MapInfo Corporation. All rights reserved. 6 disovery11_security.pdf

7 Securing MapInfo Discovery IIS Web Site Permissions Web and FTP permissions apply to all users accessing your Web and FTP sites. Web and FTP permissions control access to virtual directories on your Web or FTP site. MapInfo Discovery allows IIS anonymous user access. Therefore, we recommend that you set appropriate security for every directory on the web site to prevent unintended use by anonymous users. You should not grant both Write and Execute Scripts permissions to anonymous user. And in general, anonymous users should not be given the privilege to both Read from and Write to the same directory. Following are the steps which you can follow to set the permissions for a directory in IIS. 1. Run IIS Manager by choosing START > CONTROL PANEL > ADMINISTRATIVE TOOLS > INTERNET SERVICES MANAGER. 2. Navigate to the Default Web Site, right-click on the virtual directory that you are interested in, and choose PROPERTIES. In this example we choose the MIDiscovery virtual directory. 3. The Properties dialog box for the directory will be displayed. This allows you to set the permissions for the directory. Read and Write permissions can be set by using a checkbox control. Script Execution permission can be set by using the "Execute Permissions" drop-down list. 4. For a secure site, you should never allow Script Execution and Write permission together. Good combinations to use are Read and Script Execution permission OR Write permission MapInfo Corporation. All rights reserved. 7 disovery11_security.pdf

8 5. We recommend that you uncheck the checkboxes for Directory browsing, Log visits, and Index this resource. Securing Pages Using IIS FTP Site Permissions The MapInfo Discovery FTP site allows client users to publish to the DiscoveryMaps directory on the server. The Discovery Publisher establishes an FTP connection with the server and uploads the data for a map into the DiscoveryMaps directory. The Publisher also queries the DiscoveryMaps directory when accessing the user interface. Therefore, the FTP site needs to allow Read/Write access to this directory. However, the FTP site can restrict the list of machines that are allowed to access the DiscoveryMaps directory. The following steps show how to secure FTP site permissions. 1. Run IIS Manager, by choosing STARt > CONTROL PANEL > ADMINISTRATIVE TOOLS > INTERNET SERVICES MANAGER MapInfo Corporation. All rights reserved. 8 disovery11_security.pdf

9 2. Navigate to the Default FTP Site, right-click on the DiscoveryMaps virtual directory, and choose PROPERTIES. 3. In the Properties dialog, on the Virtual Directory tab, set the following permissions for the DiscoveryMaps directory. The Discovery Publisher must be able to read and write to this directory. Therefore, you should keep the Read and Write options checked. The Log visits option should be unchecked. 4. You also can choose to restrict which machines can access the DiscoveryMaps Virtual Directory. This restriction is done by IP address. To do this, click on the Directory Security tab in the Properties dialog. 5. In the Directory Security tab of the Properties dialog, use the ADD... and REMOVE buttons to grant or deny access to certain machines. Specify the IP address that you wish to grant or remove. You can also specify groups of IP addresses. Click OK when finished. See also: Restricting FTP and HTTP Access on page 15. This strategy ensures that only authorized people or groups of people will have access to the FTP site MapInfo Corporation. All rights reserved. 9 disovery11_security.pdf

10 Securing Pages Using NTFS File Permissions NTFS permissions apply to a specific user or group of users who have a valid Windows account. NTFS controls access to physical directories on your server. This differs from Web and FTP permissions, which apply to all users who access your Web or FTP site and control access to virtual directories on your web or FTP site. For information on how to set required NTFS permissions and user rights for an IIS 5.0 Web server, see the following Microsoft support document. This document also describes the anonymous user permissions and access. Tip: You can also locate this and related articles by searching all the words ntfs iis 5.0 in Web administrators can restrict file permissions using the Windows Access Control Lists (ACLs). You can do this on a file-by-file basis, or by changing the permissions on the whole directory and all files contained within that directory. To change permissions on either an entire directory or on specific files within a directory, use Windows Explorer on an NTFS drive. 1. Using Windows Explorer, navigate to DISCOVERY > SERVER > WEBAPP and locate a file or directory you wish to secure. 2. Right-click on the file or directory that you want to secure. See the table NTFS Permissions Settings on page 14 for a directories and recommended permissions. That same table includes recommended permissions for files in the \services and \services\mapengine folders. 3. For each selected directory or group of files, select PROPERTIES to display the Properties dialog box. 4. From the Security tab, select Internet Guest Account and click the ADVANCED... button MapInfo Corporation. All rights reserved. 10 disovery11_security.pdf

11 5. In the Access Control Settings for WebApp dialog box, you will see a list of all users and groups with access privileges to the file or folder in question. Note that in the Access Control Settings for WebApp dialog box, you can specify whether the permissions for a directory should recursively dictate the permissions of all child objects. You can also specify whether the permissions for this directory are inherited from its parent directory. These options are respectively set by the checkboxes at the bottom of the dialog 2005 MapInfo Corporation. All rights reserved. 11 disovery11_security.pdf

12 box. These options are very useful when recursively setting the NTFS permissions (for example <drive_letter>:program Files\MapInfo\Discovery\Server\WebApp directory and below). 6. In the Access Control Settings for WebApp dialog box, select the Internet Guest Account and then click on the VIEW/EDIT button. This displays the Permission Entry for WebApp dialog box. 7. Change the permissions for the Internet Guest Account at the on the file or directory level, as appropriate. In most cases. the Internet Guest Account should only be given Read access, as displayed above. In some cases, such as for executables or DLL files, the Internet Guest Account should be given no privileges. Click OK when done. Recommended NTFS Permissions Settings for MapInfo Discovery Server This section describes the recommended NTFS file permissions for your MapInfo Discovery Server. These settings will help improve the security of the server. The tables illustrate the permissions key and the recommended permissions. The Key to File Permissions table specifies the permissions key, which define the permissions format used in subsequent tables. The Internet Information Services (IIS) Permission Settings table specifies the virtual directory permissions that can be set using IIS. The NTFS Permissions Settings table specifies the NTFS file and directory permissions that can be set for the MapInfo Discovery Server-related files MapInfo Corporation. All rights reserved. 12 disovery11_security.pdf

13 Key to File Permissions Symbol Meaning Actions Needed +R Grant Read Permissions In IIS, check the "Read" checkbox. In NTFS, check the following checkboxes: 1.Read Permissions 2.Read Attributes 3.Read Extended Attributes 4.List Folder / Read Data +W Grant Write Permissions In IIS, check the "Write" checkbox. In NTFS, check the following checkboxes: 1.Create Files / Write Data 2.Write Attributes 3.Write Extended Attributes 4.Create Folders / Append Data +S Grant Script Execution Permissions In IIS, choose "Scripts only" in the "Execute Permissions" drop-down list. +D Grant Delete Permissions In NTFS, check the following checkboxes: 1.Delete Subfolders and Files 2.Delete +E Grant Execute Permissions In NTFS, check the following checkboxes: 1.Traverse Folder / Execute File -R Deny Read Permissions In IIS, uncheck the "Read" checkbox. In NTFS, uncheck the following checkboxes: 1.Read Permissions 2.Read Attributes 3.Read Extended Attributes 4.List Folder / Read Data -W Deny Write Permissions In IIS, uncheck the "Write" checkbox. In NTFS, uncheck the following checkboxes: 1.Create Files / Write Data 2.Write Attributes 3.Write Extended Attributes 4.Create Folders / Append Data -S Deny Script Execution Permissions In IIS, choose "None" in the "Execute Permissions" drop-down list. -D Deny Delete Permissions In NTFS, uncheck the following checkboxes: 1.Delete Subfolders and Files 2.Delete -E Deny Execute Permissions In NTFS, uncheck the following checkboxes: 1.Traverse Folder / Execute File 2005 MapInfo Corporation. All rights reserved. 13 disovery11_security.pdf

14 Internet Information Services (IIS) Permission Settings Directory Permissions <drive_letter>...\midiscovery +R +S -W <drive_letter>...\midiscovery\errlog -R -W -S <drive_letter>...\midiscovery\docs -R -W -S <drive_letter>...\midiscovery\asplib +R -W -S <drive_letter>...\midiscovery\css +R -W -S <drive_letter>...\midiscovery\discoverymapimages +R -W -S <drive_letter>...\midiscovery\discoverymaps +R -W -S <drive_letter>...\midiscovery\images +R -W -S <drive_letter>...\midiscovery\js +R -W -S <drive_letter>...\midiscovery\services +R +S -W <drive_letter>...\discoverymaps +R -W -S <drive_letter>...\discoverymapimages +R -W -S NTFS Permissions Settings Directory <drive_letter>...\midiscovery\webapp Permissions +R (recursively) <drive_letter>...\midiscovery\errlog +R +W <drive_letter>...\midiscovery\docs +R <drive_letter>...\midiscovery\asplib +R <drive_letter>...\midiscovery\discoverymapimages +R +W <drive_letter>...\midiscovery\discoverymaps +R +W +D <drive_letter>...\midiscovery\images +R <drive_letter>...\midiscovery\js +R <drive_letter>...\midiscovery\services\*.dll +R +E <drive_letter>...\midiscovery\services\*.tlb +R +E <drive_letter>...\midiscovery\services\*.exe +R +E <drive_letter>...\midiscovery\services\mapengine\* +R +E 2005 MapInfo Corporation. All rights reserved. 14 disovery11_security.pdf

15 Restricting FTP and HTTP Access We recommend that you use Internet Information Services (IIS) to restrict access to the FTP and HTTP ports and permit access only from authorized IP addresses (or groups of addresses). This strategy will ensure that only authorized people or groups of people will have access to the FTP or HTTP site. The following article provides an overview of configuring IIS web site authentication in Windows Tip: You can also locate this and related articles by searching all the words anonymous authentication iis 5.0 in See the following Microsoft support document for a description of How to Limit FTP Access in Windows This discussion includes sections on configuring Anonymous users and limiting access to specific computers. Tip: You can also locate this and related articles by searching all the words iis ftp access in / To effectively restrict FTP and HTTP access to your MapInfo Discovery server, you must know the IP address of all users who will access the site. If Discovery is deployed as an intranet application, you may have good control over this. However, if Discovery is deployed on the internet, it may be more difficult to identify every IP address that you wish to grant access. Restricting Access to FTP Sites You can use IIS to deny FTP access from selected IP addresses sites (and thereby permit access from other IP addresses). Follow these steps to permit access from those sites and restrict access from unknown sites. The following strategy outlines the procedure for denying access to a known group of IP addresses. 1. Open IIS and right-click on the name of your Discovery FTP server. 2. Select the Directory Security tab. 3. The GRANTED ACCESS radio button will be selected by default. Change this to the DENIED ACCESS. Selecting the Denied Access Radio button means that by default all 2005 MapInfo Corporation. All rights reserved. 15 disovery11_security.pdf

16 computers will be denied access to your Discovery FTP site. Only the sites you specify (in the following steps) will be granted access. 4. Click the ADD... button. The GRANT ACCESS ON dialog box will appear. 5. In the Grant Access On dialog box, select the GROUP OF COMPUTERS radio button. The Default Web Site Properties dialog box appears MapInfo Corporation. All rights reserved. 16 disovery11_security.pdf

17 6. From the Directory Security tab, select EDIT... from the middle panel (IP addresses and domain name restrictions). 7. From the IP ADDRESSES AND DOMAIN NAME RESTRICTIONS dialog box, the Granted Access radio button should be selected. This means that by default all computers will be granted access to the Discovery FTP site except those that you will specify in the next step. 8. Click ADD... and enter the IP addresses or domain names that you wish to deny access to your Discovery FTP site MapInfo Corporation. All rights reserved. 17 disovery11_security.pdf

18 Restricting Access to HTTP Sites Similarly, you can restrict HTTP access to your Discovery site. The procedure for doing this mirrors the procedure for restricting FTP access. Open IIS and right-click on your Discovery web site. Select the Directory Security tab, and follow the procedures similar to those outlined in the topic for Restricting Access to FTP Sites on page MapInfo Corporation. All rights reserved. 18 disovery11_security.pdf

Integrating LANGuardian with Active Directory

Integrating LANGuardian with Active Directory Integrating LANGuardian with Active Directory 01 February 2012 This document describes how to integrate LANGuardian with Microsoft Windows Server and Active Directory. Overview With the optional Identity

More information

Tool Tip. SyAM Management Utilities and Non-Admin Domain Users

Tool Tip. SyAM Management Utilities and Non-Admin Domain Users SyAM Management Utilities and Non-Admin Domain Users Some features of SyAM Management Utilities, including Client Deployment and Third Party Software Deployment, require authentication credentials with

More information

Chapter 2 Editor s Note:

Chapter 2 Editor s Note: [Editor s Note: The following content was excerpted from the free ebook The Tips and Tricks Guide to Securing Windows Server 2003 (Realtimepublishers.com) written by Roberta Bragg and available at http://www.netiq.com/offers/ebooks.]

More information

SINGLE SIGN-ON FOR MTWEB

SINGLE SIGN-ON FOR MTWEB SINGLE SIGN-ON FOR MTWEB FOR MASSTRANSIT ENTERPRISE WINDOWS SERVERS WITH DIRECTORY SERVICES INTEGRATION Group Logic, Inc. November 26, 2008 Version 1.1 CONTENTS Revision History...3 Feature Highlights...4

More information

AXIS 70U - Using Scan-to-File

AXIS 70U - Using Scan-to-File AXIS 70U - Using Scan-to-File Introduction This document describes the Scan-to-File feature in the AXIS 70U. The step-by-step instructions describe the process of configuring the AXIS 70U and an FTP server.

More information

IIS, FTP Server and Windows

IIS, FTP Server and Windows IIS, FTP Server and Windows The Objective: To setup, configure and test FTP server. Requirement: Any version of the Windows 2000 Server. FTP Windows s component. Internet Information Services, IIS. Steps:

More information

Microsoft Virtual Labs. Administering the IIS 7 File Transfer Protocol (FTP) Server

Microsoft Virtual Labs. Administering the IIS 7 File Transfer Protocol (FTP) Server Microsoft Virtual Labs Administering the IIS 7 File Transfer Protocol (FTP) Server Table of Contents Exercise 1 Installing the Microsoft FTP Publishing Service for the IIS 7... 1 Exercise 2 Introducing

More information

BusinessObjects Enterprise XI Release 2

BusinessObjects Enterprise XI Release 2 BusinessObjects Enterprise XI Release 2 How to configure an Internet Information Services server as a front end to a WebLogic application server Overview Contents This document describes the process of

More information

SecureAware on IIS8 on Windows Server 2008/- 12 R2-64bit

SecureAware on IIS8 on Windows Server 2008/- 12 R2-64bit SecureAware on IIS8 on Windows Server 2008/- 12 R2-64bit Note: SecureAware version 3.7 and above contains all files and setup configuration needed to use Microsoft IIS as a front end web server. Installing

More information

Step-by-Step Setup Guide Wireless File Transmitter FTP Mode

Step-by-Step Setup Guide Wireless File Transmitter FTP Mode EOS Step-by-Step Setup Guide Wireless File Transmitter FTP Mode Infrastructure Setup Windows XP 2012 Canon U.S.A., Inc. All Rights Reserved. Reproduction in whole or in part without permission is prohibited.

More information

CIFS Permissions Best Practices Nasuni Corporation Natick, MA

CIFS Permissions Best Practices Nasuni Corporation Natick, MA Nasuni Corporation Natick, MA Overview You use permissions to control user access to data. There are two basic considerations when using permissions to control user access to data: Which users have access

More information

Setting up Sharp MX-Color Imagers for Inbound Fax Routing to Email or Network Folder

Setting up Sharp MX-Color Imagers for Inbound Fax Routing to Email or Network Folder Setting up Sharp MX-Color Imagers for Inbound Fax Routing to Email or Network Folder MX-2300, MX-2600, MX-2700, MX-3100, MX-3501, MX-4501, MX-5500, MX-6200, MX-6201, MX-7000, MX-7001, *MX-M850, *MX-M950,

More information

Security IIS Service Lesson 6

Security IIS Service Lesson 6 Security IIS Service Lesson 6 Skills Matrix Technology Skill Objective Domain Objective # Configuring Certificates Configure SSL security 3.6 Assigning Standard and Special NTFS Permissions Enabling and

More information

HELP DOCUMENTATION SSRPM WEB INTERFACE GUIDE

HELP DOCUMENTATION SSRPM WEB INTERFACE GUIDE HELP DOCUMENTATION SSRPM WEB INTERFACE GUIDE Copyright 1998-2013 Tools4ever B.V. All rights reserved. No part of the contents of this user guide may be reproduced or transmitted in any form or by any means

More information

MadCap Software. Upgrading Guide. Pulse

MadCap Software. Upgrading Guide. Pulse MadCap Software Upgrading Guide Pulse Copyright 2014 MadCap Software. All rights reserved. Information in this document is subject to change without notice. The software described in this document is furnished

More information

WEBCONNECT INSTALLATION GUIDE. Version 1.96

WEBCONNECT INSTALLATION GUIDE. Version 1.96 WEBCONNECT INSTALLATION GUIDE Version 1.96 Copyright 1981-2015 Netop Business Solutions A/S. All Rights Reserved. Portions used under license from third parties. Please send any comments to: Netop Business

More information

1. CONFIGURING REMOTE ACCESS TO SQL SERVER EXPRESS

1. CONFIGURING REMOTE ACCESS TO SQL SERVER EXPRESS 1. CONFIGURING REMOTE ACCESS TO SQL SERVER EXPRESS From the Start menu, point to All Programs, point to Microsoft SQL Server 2005, point to Configuration Tools, and then click SQL Server Configuration

More information

Step-by-Step Setup Guide Wireless File Transmitter FTP Mode

Step-by-Step Setup Guide Wireless File Transmitter FTP Mode EOS Step-by-Step Setup Guide Wireless File Transmitter FTP Mode Ad Hoc Setup Windows XP 2012 Canon U.S.A., Inc. All Rights Reserved. Reproduction in whole or in part without permission is prohibited. 1

More information

Customer Tips. Xerox Network Scanning HTTP/HTTPS Configuration using Microsoft IIS. for the user. Purpose. Background

Customer Tips. Xerox Network Scanning HTTP/HTTPS Configuration using Microsoft IIS. for the user. Purpose. Background Xerox Multifunction Devices Customer Tips June 5, 2007 This document applies to these Xerox products: X WC Pro 232/238/245/ 255/265/275 for the user Xerox Network Scanning HTTP/HTTPS Configuration using

More information

SellerDeck. IIS6 Setup Guide. Detailing the setup Windows 2003 (IIS6) Server

SellerDeck. IIS6 Setup Guide. Detailing the setup Windows 2003 (IIS6) Server SellerDeck IIS6 Setup Guide Detailing the setup Windows 2003 (IIS6) Server Revision History Version 3.0.0 06/06/2003 FTP user section enhanced with diagram. 01/06/2003 Physical folder creation, folder

More information

Nexio Connectus with Nexio G-Scribe

Nexio Connectus with Nexio G-Scribe Nexio Connectus with Nexio G-Scribe 2.1.2 3/20/2014 Edition: A 2.1.2 Publication Information 2014 Imagine Communications. Proprietary and Confidential. Imagine Communications considers this document and

More information

Fairfield University Using Xythos for File Sharing

Fairfield University Using Xythos for File Sharing Fairfield University Using Xythos for File Sharing Version 7.0 Table of Contents I: Manage your Department Folder...2 Your Department Folder... 2 II: Sharing Folders and Files Inside of Fairfield U...3

More information

Configuring SonicWALL TSA on Citrix and Terminal Services Servers

Configuring SonicWALL TSA on Citrix and Terminal Services Servers Configuring on Citrix and Terminal Services Servers Document Scope This solutions document describes how to install, configure, and use the SonicWALL Terminal Services Agent (TSA) on a multi-user server,

More information

Creating client-server setup with multiple clients

Creating client-server setup with multiple clients Creating client-server setup with multiple clients Coffalyser.Net uses a SQL client server database model to store all project/experiment- related data. The client-server model has one main application

More information

MCTS Guide to Microsoft Windows Server 2008 Applications Infrastructure Configuration (Exam # 70-643)

MCTS Guide to Microsoft Windows Server 2008 Applications Infrastructure Configuration (Exam # 70-643) MCTS Guide to Microsoft Windows Server 2008 Applications Infrastructure Configuration (Exam # 70-643) Chapter Six Configuring Windows Server 2008 Web Services, Part 1 Objectives Create and configure Web

More information

Tharo Systems, Inc. 2866 Nationwide Parkway P.O. Box 798 Brunswick, OH 44212 USA Tel: 330.273.4408 Fax: 330.225.0099

Tharo Systems, Inc. 2866 Nationwide Parkway P.O. Box 798 Brunswick, OH 44212 USA Tel: 330.273.4408 Fax: 330.225.0099 Introduction EASYLABEL 6 has several new features for saving the history of label formats. This history can include information about when label formats were edited and printed. In order to save this history,

More information

Computer Networks. Lab 4

Computer Networks. Lab 4 1 159.334 Computer Networks Lab 4 Objectives: 1) Manage user accounts in windows 2) Familiarise yourself with FTP, Network Drive, Network Printer and Terminal Services 3) Configure IP filtering Note: Unless

More information

Reference and Troubleshooting: FTP, IIS, and Firewall Information

Reference and Troubleshooting: FTP, IIS, and Firewall Information APPENDIXC Reference and Troubleshooting: FTP, IIS, and Firewall Information Although Cisco VXC Manager automatically installs and configures everything you need for use with respect to FTP, IIS, and the

More information

Outlook Profile Setup Guide Exchange 2010 Quick Start and Detailed Instructions

Outlook Profile Setup Guide Exchange 2010 Quick Start and Detailed Instructions HOSTING Administrator Control Panel / Quick Reference Guide Page 1 of 9 Outlook Profile Setup Guide Exchange 2010 Quick Start and Detailed Instructions Exchange 2010 Outlook Profile Setup Page 2 of 9 Exchange

More information

OrgPublisher EChart Server Setup Guide

OrgPublisher EChart Server Setup Guide Table of Contents Table of Contents Introduction... 3 Role Requirements for Installation... 3 Prerequisites for Installation... 3 About OrgPublisher ECharts... 3 About EChart Rich Client Publishing...

More information

ISSUE TRACK FOR WINDOWS INSTALLATION GUIDE VERSION 4.0.0.XX

ISSUE TRACK FOR WINDOWS INSTALLATION GUIDE VERSION 4.0.0.XX ISSUE TRACK FOR WINDOWS INSTALLATION GUIDE VERSION 4.0.0.XX Contents CONTENTS Chapter 1 Introduction 1-1 Welcome to Issue Track for Windows 1-1 About this Guide 1-1 Product Name 1-1 Documentation Roadmap

More information

Census. di Monitoring Installation User s Guide

Census. di Monitoring Installation User s Guide Census di Monitoring Installation User s Guide 1 r1 Contents Introduction... 3 Content overview... 3 Installing Windows 2003 Server Components... 4 System requirements... 4 di Monitoring Web Set-up...

More information

WhatsUp Gold v16.3 Installation and Configuration Guide

WhatsUp Gold v16.3 Installation and Configuration Guide WhatsUp Gold v16.3 Installation and Configuration Guide Contents Installing and Configuring WhatsUp Gold using WhatsUp Setup Installation Overview... 1 Overview... 1 Security considerations... 2 Standard

More information

NSi Mobile Installation Guide. Version 6.2

NSi Mobile Installation Guide. Version 6.2 NSi Mobile Installation Guide Version 6.2 Revision History Version Date 1.0 October 2, 2012 2.0 September 18, 2013 2 CONTENTS TABLE OF CONTENTS PREFACE... 5 Purpose of this Document... 5 Version Compatibility...

More information

QUANTIFY INSTALLATION GUIDE

QUANTIFY INSTALLATION GUIDE QUANTIFY INSTALLATION GUIDE Thank you for putting your trust in Avontus! This guide reviews the process of installing Quantify software. For Quantify system requirement information, please refer to the

More information

PaperPort PSP Server 3 SERVER ADMINISTRATOR S GUIDE

PaperPort PSP Server 3 SERVER ADMINISTRATOR S GUIDE PaperPort PSP Server 3 SERVER ADMINISTRATOR S GUIDE 1. Third party licenses and notices 5 2. Welcome 6 3. Installation requirements 7 3.1. System requirements 7 3.2. Installing prerequisites 7 3.3. Pre-installation

More information

VP-ASP Shopping Cart Quick Start (Free Version) Guide Version 6.50 March 21 2007

VP-ASP Shopping Cart Quick Start (Free Version) Guide Version 6.50 March 21 2007 VP-ASP Shopping Cart Quick Start (Free Version) Guide Version 6.50 March 21 2007 Rocksalt International Pty Ltd support@vpasp.com www.vpasp.com Table of Contents 1 INTRODUCTION... 3 2 FEATURES... 4 3 WHAT

More information

Sage HRMS 2014 Sage Employee Self Service Tech Installation Guide for Windows 2003, 2008, and 2012. October 2013

Sage HRMS 2014 Sage Employee Self Service Tech Installation Guide for Windows 2003, 2008, and 2012. October 2013 Sage HRMS 2014 Sage Employee Self Service Tech Installation Guide for Windows 2003, 2008, and 2012 October 2013 This is a publication of Sage Software, Inc. Document version: October 17, 2013 Copyright

More information

Setting Up Your FTP Server

Setting Up Your FTP Server Requirements:! A computer dedicated to FTP server only! Linksys router! TCP/IP internet connection Steps: Getting Started Configure Static IP on the FTP Server Computer: Setting Up Your FTP Server 1. This

More information

Configuring Network Load Balancing with Cerberus FTP Server

Configuring Network Load Balancing with Cerberus FTP Server Configuring Network Load Balancing with Cerberus FTP Server May 2016 Version 1.0 1 Introduction Purpose This guide will discuss how to install and configure Network Load Balancing on Windows Server 2012

More information

Contents Notice to Users

Contents  Notice to Users Web Remote Access Contents Web Remote Access Overview... 1 Setting Up Web Remote Access... 2 Editing Web Remote Access Settings... 5 Web Remote Access Log... 7 Accessing Your Home Network Using Web Remote

More information

Web Remote Access. User Guide

Web Remote Access. User Guide Web Remote Access User Guide Notice to Users 2005 2Wire, Inc. All rights reserved. This manual in whole or in part, may not be reproduced, translated, or reduced to any machine-readable form without prior

More information

for Networks Installation Guide for the application on the server July 2014 (GUIDE 2) Lucid Rapid Version 6.05-N and later

for Networks Installation Guide for the application on the server July 2014 (GUIDE 2) Lucid Rapid Version 6.05-N and later for Networks Installation Guide for the application on the server July 2014 (GUIDE 2) Lucid Rapid Version 6.05-N and later Copyright 2014, Lucid Innovations Limited. All Rights Reserved Lucid Research

More information

SELF SERVICE RESET PASSWORD MANAGEMENT WEB INTERFACE GUIDE

SELF SERVICE RESET PASSWORD MANAGEMENT WEB INTERFACE GUIDE SELF SERVICE RESET PASSWORD MANAGEMENT WEB INTERFACE GUIDE Copyright 1998-2015 Tools4ever B.V. All rights reserved. No part of the contents of this user guide may be reproduced or transmitted in any form

More information

Setting and Checking LISTSERV www Interface Permissions Windows Server 2012 with IIS 8.x Last Updated: 20 Mar 2014

Setting and Checking LISTSERV www Interface Permissions Windows Server 2012 with IIS 8.x Last Updated: 20 Mar 2014 Setting and Checking LISTSERV www Interface Permissions Windows Server 2012 with IIS 8.x Last Updated: 20 Mar 2014 These instructions apply only to Windows Server 2012 with Internet Information Server

More information

Quick Start Guide. Cerberus FTP is distributed in Canada through C&C Software. Visit us today at www.ccsoftware.ca!

Quick Start Guide. Cerberus FTP is distributed in Canada through C&C Software. Visit us today at www.ccsoftware.ca! Quick Start Guide Cerberus FTP is distributed in Canada through C&C Software. Visit us today at www.ccsoftware.ca! How to Setup a File Server with Cerberus FTP Server FTP and SSH SFTP are application protocols

More information

Spector 360 Deployment Guide. Version 7.3 January 3, 2012

Spector 360 Deployment Guide. Version 7.3 January 3, 2012 Spector 360 Deployment Guide Version 7.3 January 3, 2012 Table of Contents Deploy to All Computers... 48 Step 1: Deploy the Servers... 5 Recorder Requirements... 52 Requirements... 5 Control Center Server

More information

Windows Firewall Configuration with Group Policy for SyAM System Client Installation

Windows Firewall Configuration with Group Policy for SyAM System Client Installation with Group Policy for SyAM System Client Installation SyAM System Client can be deployed to systems on your network using SyAM Management Utilities. If Windows Firewall is enabled on target systems, it

More information

Password Reset Server Installation Guide Windows 8 / 8.1 Windows Server 2012 / R2

Password Reset Server Installation Guide Windows 8 / 8.1 Windows Server 2012 / R2 Password Reset Server Installation Guide Windows 8 / 8.1 Windows Server 2012 / R2 Last revised: November 12, 2014 Table of Contents Table of Contents... 2 I. Introduction... 4 A. ASP.NET Website... 4 B.

More information

User Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream

User Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream User Manual Onsight Management Suite Version 5.1 Another Innovation by Librestream Doc #: 400075-06 May 2012 Information in this document is subject to change without notice. Reproduction in any manner

More information

USING STUFFIT DELUXE THE STUFFIT START PAGE CREATING ARCHIVES (COMPRESSED FILES)

USING STUFFIT DELUXE THE STUFFIT START PAGE CREATING ARCHIVES (COMPRESSED FILES) USING STUFFIT DELUXE StuffIt Deluxe provides many ways for you to create zipped file or archives. The benefit of using the New Archive Wizard is that it provides a way to access some of the more powerful

More information

Table of Contents. Welcome... 2. Login... 3. Password Assistance... 4. Self Registration... 5. Secure Mail... 7. Compose... 8. Drafts...

Table of Contents. Welcome... 2. Login... 3. Password Assistance... 4. Self Registration... 5. Secure Mail... 7. Compose... 8. Drafts... Table of Contents Welcome... 2 Login... 3 Password Assistance... 4 Self Registration... 5 Secure Mail... 7 Compose... 8 Drafts... 10 Outbox... 11 Sent Items... 12 View Package Details... 12 File Manager...

More information

Technical Bulletin. SQL Express Backup Utility

Technical Bulletin. SQL Express Backup Utility Technical Bulletin SQL Express Backup Utility May 2012 Introduction This document describes the installation, configuration and use of the SATEON SQL Express Backup utility, which is used to provide scheduled

More information

Migrating MSDE to Microsoft SQL 2008 R2 Express

Migrating MSDE to Microsoft SQL 2008 R2 Express How To Updated: 11/11/2011 2011 Shelby Systems, Inc. All Rights Reserved Other brand and product names are trademarks or registered trademarks of the respective holders. If you are still on MSDE 2000,

More information

Tenrox. Single Sign-On (SSO) Setup Guide. January, 2012. 2012 Tenrox. All rights reserved.

Tenrox. Single Sign-On (SSO) Setup Guide. January, 2012. 2012 Tenrox. All rights reserved. Tenrox Single Sign-On (SSO) Setup Guide January, 2012 2012 Tenrox. All rights reserved. About this Guide This guide provides a high-level technical overview of the Tenrox Single Sign-On (SSO) architecture,

More information

FileMaker Server 14. FileMaker Server Help

FileMaker Server 14. FileMaker Server Help FileMaker Server 14 FileMaker Server Help 2007 2015 FileMaker, Inc. All Rights Reserved. FileMaker, Inc. 5201 Patrick Henry Drive Santa Clara, California 95054 FileMaker and FileMaker Go are trademarks

More information

To install the SMTP service:

To install the SMTP service: To install the SMTP service: From the Start menu, click Control Panel. 2. Double-click Add or Remove Programs. 3. From the left pane, click Add/Remove Windows Components. 4. From the Components list, click

More information

Using Internet or Windows Explorer to Upload Your Site

Using Internet or Windows Explorer to Upload Your Site Using Internet or Windows Explorer to Upload Your Site This article briefly describes what an FTP client is and how to use Internet Explorer or Windows Explorer to upload your Web site to your hosting

More information

Managing Multi-Hypervisor Environments with vcenter Server

Managing Multi-Hypervisor Environments with vcenter Server Managing Multi-Hypervisor Environments with vcenter Server vcenter Server 5.1 vcenter Multi-Hypervisor Manager 1.0 This document supports the version of each product listed and supports all subsequent

More information

RoomWizard Synchronization Software Manual Installation Instructions

RoomWizard Synchronization Software Manual Installation Instructions 2 RoomWizard Synchronization Software Manual Installation Instructions Table of Contents Exchange Server Configuration... 4 RoomWizard Synchronization Software Installation and Configuration... 5 System

More information

Lepide Active Directory Self Service. Installation Guide. Lepide Active Directory Self Service Tool. Lepide Software Private Limited Page 1

Lepide Active Directory Self Service. Installation Guide. Lepide Active Directory Self Service Tool. Lepide Software Private Limited Page 1 Installation Guide Lepide Active Directory Self Service Tool Lepide Software Private Limited Page 1 Lepide Software Private Limited, All Rights Reserved This User Guide and documentation is copyright of

More information

Management Utilities Configuration for UAC Environments

Management Utilities Configuration for UAC Environments Management Utilities Configuration for UAC Environments For optimal use of SyAM Management Utilities, Windows client machines should be configured with User Account Control disabled or set to the least

More information

Quadro Configuration Console User's Guide. Table of Contents. Table of Contents

Quadro Configuration Console User's Guide. Table of Contents. Table of Contents Epygi Technologies Table of Contents Table of Contents About This User s Guide... 3 Introducing the Quadro Configuration Console... 4 Technical Specification... 6 Requirements... 6 System Requirements...

More information

WebSpy Vantage Ultimate 2.2 Web Module Administrators Guide

WebSpy Vantage Ultimate 2.2 Web Module Administrators Guide WebSpy Vantage Ultimate 2.2 Web Module Administrators Guide This document is intended to help you get started using WebSpy Vantage Ultimate and the Web Module. For more detailed information, please see

More information

Enabling Backups for Windows and MAC OS X

Enabling Backups for Windows and MAC OS X Enabling Backups for Windows and MAC OS X TM Trademarks and Copyrights Copyright Storix, Inc. 1999-2005 Storix is a registered trademark of Storix, Inc. SBAdmin is a trademark of Storix, Inc in the USA

More information

FTP, IIS, and Firewall Reference and Troubleshooting

FTP, IIS, and Firewall Reference and Troubleshooting FTP, IIS, and Firewall Reference and Troubleshooting Although Cisco VXC Manager automatically installs and configures everything you need for use with respect to FTP, IIS, and the Windows Firewall, the

More information

Creating Home Directories for Windows and Macintosh Computers

Creating Home Directories for Windows and Macintosh Computers ExtremeZ-IP Active Directory Integrated Home Directories Configuration! 1 Active Directory Integrated Home Directories Overview This document explains how to configure home directories in Active Directory

More information

Avatier Identity Management Suite

Avatier Identity Management Suite Avatier Identity Management Suite Migrating AIMS Configuration and Audit Log Data To Microsoft SQL Server Version 9 2603 Camino Ramon Suite 110 San Ramon, CA 94583 Phone: 800-609-8610 925-217-5170 FAX:

More information

1. Set Daylight Savings Time... 3. 2. Create Migrator Account... 3. 3. Assign Migrator Account to Administrator group... 4

1. Set Daylight Savings Time... 3. 2. Create Migrator Account... 3. 3. Assign Migrator Account to Administrator group... 4 1. Set Daylight Savings Time... 3 a. Have client log into Novell/Local Machine with Administrator Account...3 b. Access Adjust Date/Time...3 c. Make sure the time zone is set to Central Time...3 2. Create

More information

Lepide Software. LepideAuditor for File Server [CONFIGURATION GUIDE] This guide informs How to configure settings for first time usage of the software

Lepide Software. LepideAuditor for File Server [CONFIGURATION GUIDE] This guide informs How to configure settings for first time usage of the software Lepide Software LepideAuditor for File Server [CONFIGURATION GUIDE] This guide informs How to configure settings for first time usage of the software Lepide Software Private Limited, All Rights Reserved

More information

Secret Server Installation Windows 8 / 8.1 and Windows Server 2012 / R2

Secret Server Installation Windows 8 / 8.1 and Windows Server 2012 / R2 Secret Server Installation Windows 8 / 8.1 and Windows Server 2012 / R2 Table of Contents Table of Contents... 1 I. Introduction... 3 A. ASP.NET Website... 3 B. SQL Server Database... 3 C. Administrative

More information

Scan to SMB(PC) Set up Guide

Scan to SMB(PC) Set up Guide Scan to SMB(PC) Set up Guide Regarding Trade Names Windows is a registered trademark of Microsoft Corporation in the U.S.A. and/or other countries. Windows XP and Windows Vista are trademarks of Microsoft

More information

TECHNICAL SUPPORT GUIDE

TECHNICAL SUPPORT GUIDE TECHNICAL SUPPORT GUIDE LYNX SYSTEM DEVELOPERS, INC. Win7 Networking FinishLynx with Meet Management Sections 1 and 2 should be completed on both FinishLynx and Meet Management computer. 1. Set Static

More information

Video Administration Backup and Restore Procedures

Video Administration Backup and Restore Procedures CHAPTER 12 Video Administration Backup and Restore Procedures This chapter provides procedures for backing up and restoring the Video Administration database and configuration files. See the following

More information

FileMaker Server 13. FileMaker Server Help

FileMaker Server 13. FileMaker Server Help FileMaker Server 13 FileMaker Server Help 2010-2013 FileMaker, Inc. All Rights Reserved. FileMaker, Inc. 5201 Patrick Henry Drive Santa Clara, California 95054 FileMaker and Bento are trademarks of FileMaker,

More information

Internet Synchronization with Microsoft Jet 3.5

Internet Synchronization with Microsoft Jet 3.5 Internet Synchronization with Microsoft Jet 3.5 Michael Wachal, Microsoft Corporation, Redmond WA Published 1998 For the latest information, see http://support.microsoft.com Internet Synchronization with

More information

RE:Anywhere for Remote Access Installation Guide

RE:Anywhere for Remote Access Installation Guide RE:Anywhere for Remote Access Installation Guide 020112 2008 Blackbaud, Inc. This publication, or any part thereof, may not be reproduced or transmitted in any form or by any means, electronic, or mechanical,

More information

XStream Remote Control: Configuring DCOM Connectivity

XStream Remote Control: Configuring DCOM Connectivity XStream Remote Control: Configuring DCOM Connectivity APPLICATION BRIEF March 2009 Summary The application running the graphical user interface of LeCroy Windows-based oscilloscopes is a COM Automation

More information

isupplier PORTAL ACCESS SYSTEM REQUIREMENTS

isupplier PORTAL ACCESS SYSTEM REQUIREMENTS TABLE OF CONTENTS Recommended Browsers for isupplier Portal Recommended Microsoft Internet Explorer Browser Settings (MSIE) Recommended Firefox Browser Settings Recommended Safari Browser Settings SYSTEM

More information

ECA IIS Instructions. January 2005

ECA IIS Instructions. January 2005 ECA IIS Instructions January 2005 THIS PAGE INTENTIONALLY BLANK ECA IIS Instructions ii July 22, 2005 Table of Contents 1. Install Certificate in IIS 5.0... 1 2. Obtain and Install the ECA Root Certificate

More information

Capture Pro Software FTP Server System Output

Capture Pro Software FTP Server System Output Capture Pro Software FTP Server System Output Overview The Capture Pro Software FTP server will transfer batches and index data (that have been scanned and output to the local PC) to an FTP location accessible

More information

Configuring Security Features of Session Recording

Configuring Security Features of Session Recording Configuring Security Features of Session Recording Summary This article provides information about the security features of Citrix Session Recording and outlines the process of configuring Session Recording

More information

for Networks Installation Guide for the application on the server August 2014 (GUIDE 2) Lucid Exact Version 1.7-N and later

for Networks Installation Guide for the application on the server August 2014 (GUIDE 2) Lucid Exact Version 1.7-N and later for Networks Installation Guide for the application on the server August 2014 (GUIDE 2) Lucid Exact Version 1.7-N and later Copyright 2014, Lucid Innovations Limited. All Rights Reserved Lucid Research

More information

Configuring Color Access on the WorkCentre 7120 Using Microsoft Active Directory Customer Tip

Configuring Color Access on the WorkCentre 7120 Using Microsoft Active Directory Customer Tip Configuring Color Access on the WorkCentre 7120 Using Microsoft Active Directory Customer Tip October 21, 2010 Overview This document describes how to limit access to color copying and printing on the

More information

User Guide. Version 3.2. Copyright 2002-2009 Snow Software AB. All rights reserved.

User Guide. Version 3.2. Copyright 2002-2009 Snow Software AB. All rights reserved. Version 3.2 User Guide Copyright 2002-2009 Snow Software AB. All rights reserved. This manual and computer program is protected by copyright law and international treaties. Unauthorized reproduction or

More information

Active Directory integration with CloudByte ElastiStor

Active Directory integration with CloudByte ElastiStor Active Directory integration with CloudByte ElastiStor Prerequisite Change the time and the time zone of the Active Directory Server to the VSM time and time zone. Enabling Active Directory at VSM level

More information

WhatsUp Gold v16.1 Installation and Configuration Guide

WhatsUp Gold v16.1 Installation and Configuration Guide WhatsUp Gold v16.1 Installation and Configuration Guide Contents Installing and Configuring Ipswitch WhatsUp Gold v16.1 using WhatsUp Setup Installing WhatsUp Gold using WhatsUp Setup... 1 Security guidelines

More information

OrgPublisher 11 Client and Web Administration for Server 2003 Installation Guide

OrgPublisher 11 Client and Web Administration for Server 2003 Installation Guide OrgPublisher 11 Client and Web Administration for Server 2003 Installation Guide Web Administration 2003 InstallationGuide Table of Contents Table of Contents OrgPublisher Installation... 4 OrgPublisher

More information

Configuring Security for FTP Traffic

Configuring Security for FTP Traffic 2 Configuring Security for FTP Traffic Securing FTP traffic Creating a security profile for FTP traffic Configuring a local traffic FTP profile Assigning an FTP security profile to a local traffic FTP

More information

Manual Password Depot Server 8

Manual Password Depot Server 8 Manual Password Depot Server 8 Table of Contents Introduction 4 Installation and running 6 Installation as Windows service or as Windows application... 6 Control Panel... 6 Control Panel 8 Control Panel...

More information

Configuration Task 3: (Optional) As part of configuration, you can deploy rules. For more information, see "Deploy Inbox Rules" below.

Configuration Task 3: (Optional) As part of configuration, you can deploy rules. For more information, see Deploy Inbox Rules below. Configure the E-mail Router After the E-mail Router has been installed, you can configure several aspects of it. Some of these configuration tasks are mandatory. Others are optional in that you use them

More information

DSI File Server Client Documentation

DSI File Server Client Documentation Updated 11/23/2009 Page 1 of 10 Table Of Contents 1.0 OVERVIEW... 3 1.0.1 CONNECTING USING AN FTP CLIENT... 3 1.0.2 CONNECTING USING THE WEB INTERFACE... 3 1.0.3 GETTING AN ACCOUNT... 3 2.0 TRANSFERRING

More information

Installation Instruction STATISTICA Enterprise Server

Installation Instruction STATISTICA Enterprise Server Installation Instruction STATISTICA Enterprise Server Notes: ❶ The installation of STATISTICA Enterprise Server entails two parts: a) a server installation, and b) workstation installations on each of

More information

Aspera Connect User Guide

Aspera Connect User Guide Aspera Connect User Guide Windows XP/2003/Vista/2008/7 Browser: Firefox 2+, IE 6+ Version 2.3.1 Chapter 1 Chapter 2 Introduction Setting Up 2.1 Installation 2.2 Configure the Network Environment 2.3 Connect

More information

SERVER ADMINISTRATOR S GUIDE

SERVER ADMINISTRATOR S GUIDE SERVER ADMINISTRATOR S GUIDE Nuance Communications, Inc. All rights reserved. Subject to change without prior notice. 1 System Requirements... 4 Installing Prerequisites... 5 Pre-Installation Device Configuration...

More information

How-to: HTTP-Proxy and Radius Authentication and Windows IAS Server settings. Securepoint Security System Version 2007nx

How-to: HTTP-Proxy and Radius Authentication and Windows IAS Server settings. Securepoint Security System Version 2007nx Securepoint Security System Version 2007nx HTTP proxy authentication with radius to a Windows 2003 server The Remote Authentication Dial-In User Service (RADIUS) is a client-server-protocol which is used

More information

Installation of IR under Windows Server 2008

Installation of IR under Windows Server 2008 Installation of IR under Windows Server 2008 Installation of IR under windows 2008 involves the following steps: Installation of IIS Check firewall settings to allow HTTP traffic through firewall Installation

More information

LifeSize Control Installation Guide

LifeSize Control Installation Guide LifeSize Control Installation Guide April 2005 Part Number 132-00001-001, Version 1.0 Copyright Notice Copyright 2005 LifeSize Communications. All rights reserved. LifeSize Communications has made every

More information

NovaBACKUP xsp Version 15.0 Upgrade Guide

NovaBACKUP xsp Version 15.0 Upgrade Guide NovaBACKUP xsp Version 15.0 Upgrade Guide NovaStor / November 2013 2013 NovaStor, all rights reserved. All trademarks are the property of their respective owners. Features and specifications are subject

More information

1 Using DATABOKS Online Backup Manager

1 Using DATABOKS Online Backup Manager 1 Using DATABOKS Online Backup Manager This chapter will describe all features available in DATABOKS Online Backup Manager and outline how you can use the features of DATABOKS Online Backup Manager to

More information