Chapter 1 Scenario 1: Acme Corporation

Save this PDF as:
 WORD  PNG  TXT  JPG

Size: px
Start display at page:

Download "Chapter 1 Scenario 1: Acme Corporation"

Transcription

1 Chapter 1 Scenario 1: Acme Corporation In This Chapter Description of the Customer Environment page 18 Introduction to Deploying Pointsec PC page 20 Prepare for Deployment page 21 Install Pointsec PC page 24 Deploy Pointsec PC page 30 This chapter describes how the Acme Corporation configured and deployed Pointsec PC within its organization. If your environment resembles Acme Corporation s, it is recommended that you configure Pointsec PC the same way. The information provided in this chapter contains, among other things: a description of the customer environment, an overview of the workflow when deploying Pointsec PC, a description of the different roles, preparations that need to be done before installation, a description of the installation profile needed, and how to deploy. 17

2 Description of the Customer Environment Description of the Customer Environment The Acme Corporation is a middle-sized company developing software for call center optimization. It has 500 employees at three different sites; London (UK), Boston (US), and Perth (Australia). Most of the employees are working at the company headquarters in London. The computer environment consists of 500 laptops and workstations all running Windows XP. All users are within one Windows domain regardless of which country they work in. Acme Corporation and Pointsec PC The Acme Corporation purchased Pointsec PC to protect both its own internal information but also its customers confidential information. The objective was to install Pointsec PC on all laptops and workstations in three different sites within the organization to protect all information against illegitimate access. The company s system administrators are placed in London but each site also has its own local IT administrators. These local administrators have the right to deploy Pointsec PC, read logs, and create recovery. All users authenticate themselves with fixed passwords in Pointsec PC and no smart cards are used. The deployment tool Acme Corporation uses is the Systems Management Server (SMS) from Microsoft. The company has a helpdesk to help users who have forgotten their passwords or experience any other problems with Pointsec PC. The helpdesk users use webrh to provide Remote Help over the telephone to end users. In short, the Acme Corporation environment has the following characteristics: 500 seats three different sites, all using the same language version of Pointsec PC both laptops and workstations running Windows XP all users are within one Windows domain end users have no admin rights GPOs are used no smart cards are used deployment tool: SMS 18

3 Description of the Customer Environment Pointsec PC System Administrator Workstation Installation and update profiles Boston London Perth File shares at sites Profile Storage, Update Profile, Install, Log, Recovery, Upgrade directories Laptops and workstations Role Separation at Acme Corporation The following roles and their tasks were identified at Acme: System Administrator The System Administrator is responsible for the deployment and maintenance of Pointsec PC throughout the entire organization. It is the system administrator who decides on security and password policies, configurations, updates, upgrades, etc. The system administrator is also responsible for delegating rights and tasks to the local administrators and helpdesk users. During the first deployment of Pointsec PC, the system administrator creates file shares and service account, installs Pointsec PC on a master administrator computer, decides on configuration, creates sets and installation profiles, and finally verifies the configuration by running a pilot. The system administrator also makes sure that local administrators and helpdesk users are trained and certified on the Pointsec PC product before they commence any work. Local Administrator The Local Administrators at Acme are responsible for creating and publishing update profiles based on configurations received from the system administrator. The local administrators are also responsible for adding and removing users, monitor the environment (making sure all clients are encrypted, checking log files), and performing backups and maintenance. Chapter 1 Scenario 1: Acme Corporation 19

4 Introduction to Deploying Pointsec PC During the first deployment of Pointsec PC, the local administrators at each site decides on when to push out the installation profile. They are also responsible for verifying the deployment after the installation profile has been pushed out. Helpdesk Users The helpdesk users are responsible for proving remote help to end users who have forgotten their passwords, need to recover encrypted information, etc. These users are set up with special helpdesk user accounts in webrh. End Users All laptops and workstations at Acme Corporation have Pointsec PC installed and their drives are encrypted and boot protected. The end users must authenticate themselves with fixed passwords to access their data. The company uses password synchronization which means that the end user s Pointsec PC password is set to the Windows password, the end user will only have to remember one password. The end user does not have full permissions to the Pointsec registry items on the PC (it is the service account which has these rights). The logged on user account requires List, Read, and Execute permissions to the local Pointsec program folder, generally: C:\Program Files\Pointsec. See Create Service Account on page 23 for more information on the service account. Introduction to Deploying Pointsec PC Overview of the Workflow The installation and deployment of Pointsec PC went smoothly at the Acme Corporation and caused no disturbances to the users in the organization. This smooth installation was facilitated by the Acme Corporation s thorough preparations before the actual deployment. To deploy Pointsec PC smoothly, follow the steps outlined in the overview below. Steps 1 to 9 are the responsibility of the system administrator and steps 10 and 11 are the local administrator s responsibility. The steps are described more in detail further on in this chapter. 1. Identify the roles needed in the environment; Installation, webrh/helpdesk, Users. Who will do what in your organization? 2. Set up one file share per site. 3. Make sure that the file shares have the correct rights; local administrators and service account must have full access to the file shares. 20

5 Prepare for Deployment 4. Set up a Windows service account for access to the file shares. 5. Set up training for both the administrators and the helpdesk users. 6. Decide on the company configuration depending on your security policy. The Acme configuration contains/follows: fixed password users Windows password policy password synchronization Windows group policy, users should be stored in an Active Directory environment and the policy settings in Group Policy Objects (GPOs) - end users have no administrator rights clear division of roles webrh used for recovery/lost passwords all drives/volumes encrypted (AES) and boot protected the Enable status export to file feature activated 7. Install Pointsec PC on an administrator s PC, create a set and an installation profile and test the profile. 8. Set up the helpdesk. 9. Decide how the pilot should be run. Run the pilot and verify the installation. 10. Inform end users of logon and Remote Help functions. 11. Finally deploy Pointsec PC throughout the organization and verify the deployment. Prepare for Deployment Identify Roles Before deploying Pointsec PC it is important to identify the roles in the organization; who will do what and when. In this Acme case it is important to have system administrators, local administrators and helpdesk users. The system administrator(s) has the overall responsibility for the company security policy and for the deployment of Pointsec PC. The local administrators will enforce the security policy, deploy Pointsec PC and run the actual day-to-day administrative tasks. The helpdesk users are responsible for helping end users who have forgotten their passwords etc. The separation of roles at Acme Corporation are described more in detail in section Role Separation at Acme Corporation on page 19. Chapter 1 Scenario 1: Acme Corporation 21

6 Create File Shares Create File Shares When the roles and their tasks have been decided, it is also important to make sure that all roles have received the access rights and the training needed to perform their tasks. It is best practice to set up one file share for each site (London, Boston, and Perth for Acme Corp.), where the site s clients save their log and recovery files, look for update profiles and software upgrades. This is because all log and recovery files from the clients are stored in the same directory. If they are separated by site, it is easier for the local administrators to handle the files. Note - Specify the paths in UNC format: \\<server>\<share>\... On the file share it is recommended to have the following six directories; Profile Storage, Update Profile, Install, Log, Recovery, and Upgrade. These directories can be automatically created at the same time you create an installation profile, see Create an Installation Profile on page 26. Profile Storage This is the directory that will hold profiles while you edit them. The profiles will remain in this directory until you publish them, see Update Profile below. As long as they are in the storage directory, they cannot be pulled by remote clients. This path is configured in the set. Update Profile This is the directory from which clients will pull updated profiles. Note that the path to this directory must be set in the profiles that are put in this directory. In the profile it is set by editing this path System Settings Install Set Update Profile Path. Install This is the directory where you set up installation packages (installation profiles, MSI package, precheck.txt, etc.) and where installation profiles are published. This path is configured in the set. Log In the Log directory all log files from the Pointsec PC protected computers are stored. It is set under System Settings Install Set Central Log Path in the profile. 22

7 Create Service Account Recovery This is the directory in which Pointsec PC stores information about the Pointsec PC protected computers. This information is needed to provide Remote Help. It is also used to recover encrypted information in the event of an operating system crash. It is set under System Settings Install Set Recovery Path in the profile. Upgrade The Upgrade directory is where clients look for software upgrades. It is set under System Settings Install Set Upgrade Path in the profile. Example: Acme Corporation set up their file shares like this: London office: \\Acme_Corp\London_Pointsec\ with the following directories: \\Acme_Corp\London_Pointsec\Profile Storage \\Acme_Corp\London_Pointsec\Update Profile \\Acme_Corp\London_Pointsec\Install \\Acme_Corp\London_Pointsec\Log \\Acme_Corp\London_Pointsec\Recovery \\Acme_Corp\London_Pointsec\Upgrade Boston office: \\Acme_Corp\Boston_Pointsec\ with the same subdirectories as on the London file share Perth office: \\Acme_Corp\Perth_Pointsec\ Create Service Account with the same subdirectories as on the London and Boston file shares Create a Windows service account (for example with the name SA_user) which limits user access to the file share and to the respective Recovery, Update Profile, Log, and Upgrade directories while still allowing the clients necessary access to create recovery files, download update profiles placed in the update path and download system upgrade packages (patch files). The SA_user account does not have to be able to log on to Windows. Use the same password policy for the service account as you use for the rest of the company. The SA_user shall belong to the local admin group. Chapter 1 Scenario 1: Acme Corporation 23

8 Install Pointsec PC Rights Required on the File Share The user account logging on to the local client PC requires no permissions on the file share once service is configured. The account configured as Pointsec Service Start requires full control to the file share. 1. Create a domain wide account (the Service Account), with the name SA_user, which all client PCs within the organization can use (e.g., added to the Power Users on each machine via GPO). 2. Assign full permissions on the created files shares, including subfolders and content to the Service Account, other permissions can be set as wanted. 3. Set the Pointsec Service Start service to log on with the SA_user account. 4. When finished the Service Account should have the following rights: If configured correctly, the creation of recovery file, download of update profiles and download of software upgrades are now made via the Service Account. You can find more detailed information regarding the Pointsec Start Service and how to set it up in the Pointsec PC Administrator s Guide. Install Pointsec PC Install Pointsec PC on Administration PC Install Pointsec PC on your administration workstation to evaluate and configure Pointsec PC before deploying it in your entire organization. As a safety precaution two system administrator accounts are mandatory and must be created during installation. These two mandatory administrator accounts shall use dynamic tokens for authentication. The installation process is described in detail in the Pointsec PC Installation Guide. Configure Pointsec PC Tip - Have a look at the demo delivered with your Pointsec PC product. The demo shows how the Acme installation profile was set up. 24

9 Configure Pointsec PC Create a Set In order to create an installation profile, you must first create a set. A set is a tool for the administrator to group, for example, related installation and update profiles together. You also specify in the set where the Pointsec PC Management Console will look for log and recovery files. The paths in the set are inherited to profiles created in the set, unless the profiles are based on local settings or another profile. When you create the set, make sure you select the Automatically create a set directory structure checkbox, see Figure on page 25. Enter the root directory of one of your file shares and click Next. Click Next and specify the paths to the Profile Storage directories in the three file shares, as in this example: Chapter 1 Scenario 1: Acme Corporation 25

10 Configure Pointsec PC In the following dialog boxes of the wizard, enter the paths to the Update Profiles, Install, Log, Recovery, and Upgrade directories on all your file shares. These directories do not exist yet but once you have finished the wizard and click Finish, they will be automatically created and the installation profile will contain paths to all directories on all file shares. Create an Installation Profile The installation profile contains the group and user account information and system settings. In this profile you specify the configuration, which rights the user account shall have, password policies, where log and recovery files are saved, where the clients will look for update profiles and software upgrades, etc. Only one installation profile is needed since it is possible to specify multiple paths to directories. This means that you in the installation profile specify the paths to all three file shares. The service account will then make sure that the log and recovery files from the London client machines are saved in the London file share since the London users only have access to the London file share. The same will happen with the Boston and Perth log and recovery files, they will be saved on the Boston and Perth file shares respectively. To deploy Pointsec PC on all your computers you need to create a silent installation profile. When a silent installation profile is deployed on a computer, Pointsec for PC is installed on the computer without any interaction with the user. To create an installation profile: 1. Before you can create a profile, you must set the Profile Validation Password in order to protect the profile (Local Edit Settings System Settings Install). For more information on the Profile Validation Password, see Pointsec PC Administrator s Guide. 2. Create a silent installation profile belonging to the set you have created (Acme_Installation in our example). Note - If you base the installation profile on your local settings, remember that users based on local settings can t bring their authentication into the profile. This means that the passwords needs to be re-set in profiles based on local settings. 3. Change the following settings from their default values and leave the rest as they are: System Settings Install Log Protection Password: set a password complying with the company policy Enable status export to file: Yes 26

11 Configure Pointsec PC Set Upgrade Path: \\Site\FileShare\Upgrade for all sites and file shares, for example: \\Acme_Corp\London_Pointsec\Upgrade, \\Acme_Corp\Boston_Pointsec\Upgrade, \\Acme_Corp\Perth_Pointsec\Upgrade Set Update Profile Path: \\Site\FileShare\Update Profiles for all sites and file shares Set Recovery Path: \\Site\FileShare\Recovery for all sites and file shares Set Central Log Path: \\Site\FileShare\Log for all sites and file shares Pointsec Service Start Account Username: DOMAIN\SA_user Pointsec Service Start Account Password: set a password complying with the company policy Group System and Group Settings Add the following users in group System: User #1 Name: SITEADMIN1, for example LONDONADMIN1 Password: set a password complying with the company policy User #2 Name: SITEADMIN2, for example LONDONADMIN2 Password: set a password complying with the company policy User #3 Name: SITEADMIN1, for example BOSTONADMIN1 Password: set a password complying with the company policy User #4 Name: SITEADMIN2, for example BOSTONADMIN2 Password: set a password complying with the company policy User #5 Name: SITEADMIN1, for example PERTHADMIN1 Password: set a password complying with the company policy User #6 Name: SITEADMIN2, for example PERTHADMIN2 Password: set a password complying with the company policy Chapter 1 Scenario 1: Acme Corporation 27

12 Configure Pointsec PC Note - If you based your profile on local settings you will already have two system administrators in the profile; you will only have to add four more system administrators. Group Users and Group Settings Add a new user group with the name Users: Set Expiration Date to one month from the current date Permissions Remote Help Receive Remote Help: Yes Receive 'Remote Password Change': Yes Groups Users Group Settings Password Synchronization Synchronize Windows Password to Preboot: Yes Synchronize Preboot Password to Windows: Yes Groups Users Group Settings Authentication Settings Fixed Passwords Windows Complexity Requirements: Yes Set Maximum Age: 42 Add a user to the new user group: User type: temporary Name: TEMPUSER Password: set a password complying with the company policy 4. Test the installation profile on a client, that is, verify that the installation turned out the way you wanted it. Set Up Helpdesk Set up the helpdesk environment and make sure that the helpdesk and administration personnel have received the appropriate training for their tasks. With Pointsec Smart Center installed on a server, webrh can be used for the task of authenticating helpdesk users and updating Pointsec PC clients with the ability to give remote help. From webrh an update profile is automatically generated which can be imported on your Pointsec PC clients. This allows your helpdesk to log on to webrh and provide remote help to the Pointsec PC users if they forget their password or have been locked out from the PC for other reasons (too many failed logons etc.). 28

13 Configure Pointsec PC Note: The alternative to webrh would be to create a user profile in Pointsec PC containing the user accounts which will be used for providing Remote Help. The profile could have a similar setup as follows: Group and Group Settings: One group with the following settings: Name: HELPDESK Group Authority Level: <= 5 Provide 'Remote Password Change': Yes Provide 'One-Time Logon': Yes Logon Authorized: No User Settings Two users with the following settings: User #1 Name: GLOBAL1 Password: H3lpd3sk1 User #2 Name: GLOBAL2 Password: H3lpd3sk2 Run Pilot Run a pilot before deploying Pointsec PC to all clients in your environment. 1. Start by informing users affected by the pilot of how they will authenticate themselves for the first time and how they can receive Remote Help once Pointsec PC has been installed. 2. Run the pilot on 25 seats in all sites (London, Boston, Perth) and on all types of clients (HP, Dell, etc.) in the environment. The clients used for the pilot should be installed with all types of images/applications used in the environment. 3. Deploy the profile, with silent install options, with the System Management Server (SMS). 4. Verify the pilot by checking the text and recovery files found in the Log and Recovery directories on the file shares. One text (.txt) file for each client machine is created in the Log directory if the System Settings Install Enable status export to file setting has been activated in the profiles. The text file tells you if Chapter 1 Scenario 1: Acme Corporation 29

14 Deploy Pointsec PC Pointsec PC has been installed, provided the client machine has been encrypted, which volumes have been encrypted and if a recovery file has been created for the specific client machine. The text files contain the client machine name in the file name, for example: london_pc_1.txt, london_pc_2.txt, london_pc_3.txt and so on. The recovery (.rec) files found in the Recovery directory should correspond to the 25 seats deployed in the pilot, that is, there should be 25 recovery files in the directory, each identified with the client machine name in the file name. For example: london_pc_1.rec, london_pc_2.rec, london_pc_3.rec and so on. Deploy Pointsec PC When you have verified that the pilot was deployed properly, deploy Pointsec PC to the remaining clients in the organization by using SMS. 1. Start by informing all users in the organization of the deployment of Pointsec PC and how they will authenticate themselves for the first time and how they can receive Remote Help once Pointsec PC has been installed. 2. Deploy Pointsec PC with SMS. 3. Verify the deployment and that encryption has completed by using the text and recovery files found on the file shares, see step 4 on page

Password Manager Windows Desktop Client

Password Manager Windows Desktop Client Password Manager Windows Desktop Client EmpowerID provides an extension that allows organizations to plug into Password Manager to customize the Windows logon experience beyond that supplied by the standard

More information

DriveLock Quick Start Guide

DriveLock Quick Start Guide Be secure in less than 4 hours CenterTools Software GmbH 2012 Copyright Information in this document, including URL and other Internet Web site references, is subject to change without notice. Unless otherwise

More information

Installation Guide. . All right reserved. For more information about Specops Inventory and other Specops products, visit www.specopssoft.

Installation Guide. . All right reserved. For more information about Specops Inventory and other Specops products, visit www.specopssoft. . All right reserved. For more information about Specops Inventory and other Specops products, visit www.specopssoft.com Copyright and Trademarks Specops Inventory is a trademark owned by Specops Software.

More information

Deployment of Keepit for Windows

Deployment of Keepit for Windows Deployment of Keepit for Windows Keepit A/S October 13, 2010 1 Introduction When deploying Keepit in larger setups with many desktops and servers, installing Keepit individually on each computer is cumbersome

More information

Test Note Phone Manager Deployment Windows Group Policy Sever 2003 and XP SPII Clients

Test Note Phone Manager Deployment Windows Group Policy Sever 2003 and XP SPII Clients Test Note Phone Manager Deployment Windows Group Policy Sever 2003 and XP SPII Clients Note: I have only tested these procedures on Server 2003 SP1 (DC) and XP SPII client, in a controlled lab environment,

More information

4cast Client Specification and Installation

4cast Client Specification and Installation 4cast Client Specification and Installation Version 2015.00 10 November 2014 Innovative Solutions for Education Management www.drakelane.co.uk System requirements The client requires Administrative rights

More information

Symantec PGP Whole Disk Encryption Hands-On Lab V 3.7

Symantec PGP Whole Disk Encryption Hands-On Lab V 3.7 Symantec PGP Whole Disk Encryption Hands-On Lab V 3.7 Description This hands-on lab session covers the hard drive encryption technologies from PGP. Students will administer a typical Whole Disk Encryption

More information

SafeGuard Enterprise Web Helpdesk. Product version: 6.1

SafeGuard Enterprise Web Helpdesk. Product version: 6.1 SafeGuard Enterprise Web Helpdesk Product version: 6.1 Document date: February 2014 Contents 1 SafeGuard web-based Challenge/Response...3 2 Scope of Web Helpdesk...4 3 Installation...5 4 Allow Web Helpdesk

More information

safend a w a v e s y s t e m s c o m p a n y

safend a w a v e s y s t e m s c o m p a n y safend a w a v e s y s t e m s c o m p a n y SAFEND Data Protection Suite Installation Guide Version 3.4.5 Important Notice This guide is delivered subject to the following conditions and restrictions:

More information

SafeGuard Enterprise Web Helpdesk. Product version: 6 Document date: February 2012

SafeGuard Enterprise Web Helpdesk. Product version: 6 Document date: February 2012 SafeGuard Enterprise Web Helpdesk Product version: 6 Document date: February 2012 Contents 1 SafeGuard web-based Challenge/Response...3 2 Installation...5 3 Authentication...8 4 Select the Web Helpdesk

More information

Distributing EmailSMS v2.0

Distributing EmailSMS v2.0 Distributing EmailSMS v2.0 1) Requirements Windows 2000/XP and Outlook 2000, 2002 or 2003, Microsoft.NET Framework v 2).NET Framework V 1 Rollout Microsoft.NET Framework v1 needed to run EmailSMS v2.0.

More information

Management Utilities Configuration for UAC Environments

Management Utilities Configuration for UAC Environments Management Utilities Configuration for UAC Environments For optimal use of SyAM Management Utilities, Windows client machines should be configured with User Account Control disabled or set to the least

More information

User Guide. Version 3.2. Copyright 2002-2009 Snow Software AB. All rights reserved.

User Guide. Version 3.2. Copyright 2002-2009 Snow Software AB. All rights reserved. Version 3.2 User Guide Copyright 2002-2009 Snow Software AB. All rights reserved. This manual and computer program is protected by copyright law and international treaties. Unauthorized reproduction or

More information

Check Point FDE integration with Digipass Key devices

Check Point FDE integration with Digipass Key devices INTEGRATION GUIDE Check Point FDE integration with Digipass Key devices 1 VASCO Data Security Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document

More information

SafeGuard Enterprise Web Helpdesk

SafeGuard Enterprise Web Helpdesk SafeGuard Enterprise Web Helpdesk Product version: 5.60 Document date: April 2011 Contents 1 SafeGuard web-based Challenge/Response...3 2 Installation...5 3 Authentication...8 4 Select the Web Help Desk

More information

Specops Command. Installation Guide

Specops Command. Installation Guide Specops Software. All right reserved. For more information about Specops Command and other Specops products, visit www.specopssoft.com Copyright and Trademarks Specops Command is a trademark owned by Specops

More information

4cast Server Specification and Installation

4cast Server Specification and Installation 4cast Server Specification and Installation Version 2015.00 10 November 2014 Innovative Solutions for Education Management www.drakelane.co.uk System requirements Item Minimum Recommended Operating system

More information

MailStore Outlook Add-in Deployment

MailStore Outlook Add-in Deployment MailStore Outlook Add-in Deployment A MailStore Server installation deploys the MailStore Outlook Add-in as a Windows Installer package (MSI) that can be installed on client machines using software distribution.

More information

DriveLock and Windows 7

DriveLock and Windows 7 Why alone is not enough CenterTools Software GmbH 2011 Copyright Information in this document, including URL and other Internet Web site references, is subject to change without notice. Unless otherwise

More information

DeviceLock Management via Group Policy

DeviceLock Management via Group Policy User Manual DeviceLock Management via Group Policy SmartLine Inc 1 Contents Using this Manual...3 1. General Information...4 1.1 Overview...4 1.2 Applying Group Policy...5 1.3 Standard GPO Inheritance

More information

DESLock+ Basic Setup Guide Version 1.20, rev: June 9th 2014

DESLock+ Basic Setup Guide Version 1.20, rev: June 9th 2014 DESLock+ Basic Setup Guide Version 1.20, rev: June 9th 2014 Contents Overview... 2 System requirements:... 2 Before installing... 3 Download and installation... 3 Configure DESLock+ Enterprise Server...

More information

Introduction. Before you begin. Installing efax from our CD-ROM. Installing efax after downloading from the internet

Introduction. Before you begin. Installing efax from our CD-ROM. Installing efax after downloading from the internet Introduction Before you begin Before you begin installing efax, please check the following: You have received confirmation that your application for the efax service has been processed. The confirmation

More information

VMware User Environment Manager

VMware User Environment Manager VMware User Environment Manager Deployed in 60 Minutes or Less Author: Dale Carter Senior Solution Architect VMware Technology Consulting Services April 2015 Table of Contents 1. VMware User Environment

More information

Quick Start Guide. IT Management On-Demand

Quick Start Guide. IT Management On-Demand 1 Quick Start Guide Quick Start Guide IT Management On-Demand Introduction... 2 Getting Started... 3 Planning Your Deployment... 5 Performing a Test Deployment... 6 Enterprise Deployment Options... 8 Remote

More information

DriveLock and Windows 8

DriveLock and Windows 8 Why alone is not enough CenterTools Software GmbH 2013 Copyright Information in this document, including URL and other Internet Web site references, is subject to change without notice. Unless otherwise

More information

STATISTICA VERSION 9 STATISTICA ENTERPRISE INSTALLATION INSTRUCTIONS FOR USE WITH TERMINAL SERVER

STATISTICA VERSION 9 STATISTICA ENTERPRISE INSTALLATION INSTRUCTIONS FOR USE WITH TERMINAL SERVER Notes: STATISTICA VERSION 9 STATISTICA ENTERPRISE INSTALLATION INSTRUCTIONS FOR USE WITH TERMINAL SERVER 1. These instructions focus on installation on Windows Terminal Server (WTS), but are applicable

More information

Smartcard Logon Overview

Smartcard Logon Overview etoken for Windows Smartcard Logon Lesson 9 April 2004 etoken Certification Course Smartcard Logon Overview Windows 2000/2003 Enterprise Server built-in feature Smartcard logon requires issuing a personal

More information

PowerMapper/SortSite Desktop Deployment Guide v2.11. 1. Introduction

PowerMapper/SortSite Desktop Deployment Guide v2.11. 1. Introduction PowerMapper/SortSite Desktop Deployment Guide v2.11 1. Introduction... 1 2. Architecture... 2 3. Independent Certification... 2 4. Setup.exe Command Line... 2 5. Registry Settings... 3 6. Deployment using

More information

Lesson Plans Microsoft s Managing and Maintaining a Microsoft Windows Server 2003 Environment

Lesson Plans Microsoft s Managing and Maintaining a Microsoft Windows Server 2003 Environment Lesson Plans Microsoft s Managing and Maintaining a Microsoft Windows Server 2003 Environment (Exam 70-290) Table of Contents Table of Contents... 1 Course Overview... 2 Section 0-1: Introduction... 4

More information

Snow Inventory. Installing and Evaluating

Snow Inventory. Installing and Evaluating Snow Inventory Installing and Evaluating Snow Software AB 2002 Table of Contents Introduction...3 1. Evaluate Requirements...3 2. Download Software...3 3. Obtain License Key...4 4. Install Snow Inventory

More information

Installation Manual (MSI Version)

Installation Manual (MSI Version) Installation Manual (MSI Version) 1. SYSTEM REQUIREMENTS... 2 2. INSTALLATION INSTRUCTIONS... 2 2.1 REMOTE INSTALLATION USING GROUP POLICY... 2 2.1.1 Assigning Software...2 2.1.2 Publishing Software...2

More information

Mobility Services Platform 3.1.1 Software Installation Guide

Mobility Services Platform 3.1.1 Software Installation Guide Mobility Services Platform 3.1.1 Software Installation Guide Mobility Services Platform 3.1.1 Software Installation Guide 72E-100159-04 Revision D January 2008 2007 by Motorola, Inc. All rights reserved.

More information

RoomWizard Synchronization Software Manual Installation Instructions

RoomWizard Synchronization Software Manual Installation Instructions 2 RoomWizard Synchronization Software Manual Installation Instructions Table of Contents Exchange Server Configuration... 4 RoomWizard Synchronization Software Installation and Configuration... 5 System

More information

ScoMIS Encryption Service

ScoMIS Encryption Service Introduction This guide explains how to implement the ScoMIS Encryption Service for a secondary school. We recommend that the software should be installed onto the laptop by ICT staff; they will then spend

More information

SAFETICA INSIGHT INSTALLATION MANUAL

SAFETICA INSIGHT INSTALLATION MANUAL SAFETICA INSIGHT INSTALLATION MANUAL SAFETICA INSIGHT INSTALLATION MANUAL for Safetica Insight version 6.1.2 Author: Safetica Technologies s.r.o. Safetica Insight was developed by Safetica Technologies

More information

Autograph 3.3 Network Installation

Autograph 3.3 Network Installation Eastmond Publishing Ltd (Autograph) PO Box 46, Oundle, Peterborough, PE8 4JX, UK Tel: +44 (0)1832 273444 Fax: +44 (0)1832 273529 Email: support@autograph-maths.com Web: www.autograph-maths.com Technical

More information

E-Notebook SQL 12.0 Desktop Database Migration and Upgrade Guide. E-Notebook SQL 12.0 Desktop Database Migration and Upgrade Guide

E-Notebook SQL 12.0 Desktop Database Migration and Upgrade Guide. E-Notebook SQL 12.0 Desktop Database Migration and Upgrade Guide E-Notebook SQL 12.0 Desktop Database Migration and Upgrade Guide 1. Introduction... 3 2. Database System... 3 2.1. Software requirements... 3 2.2. Analysis of E-Notebook 10.0 and 11.0 database... 4 2.3.

More information

RSA SecurID Software Token 3.0 for Windows Workstations Administrator s Guide

RSA SecurID Software Token 3.0 for Windows Workstations Administrator s Guide RSA SecurID Software Token 3.0 for Windows Workstations Administrator s Guide Contact Information See our Web sites for regional Customer Support telephone and fax numbers. RSA Security Inc. RSA Security

More information

AD Self-Service Suite for Active Directory

AD Self-Service Suite for Active Directory The Dot Net Factory AD Self-Service Suite for Active Directory Version 3.6 The Dot Net Factory, LLC. 2005-2011. All rights reserved. This guide contains proprietary information, which is protected by copyright.

More information

HELP DOCUMENTATION E-SSOM DEPLOYMENT GUIDE

HELP DOCUMENTATION E-SSOM DEPLOYMENT GUIDE HELP DOCUMENTATION E-SSOM DEPLOYMENT GUIDE Copyright 1998-2013 Tools4ever B.V. All rights reserved. No part of the contents of this user guide may be reproduced or transmitted in any form or by any means

More information

Compatibility with Encryption Products

Compatibility with Encryption Products Technical Brief Compatibility with Encryption Products Overview The purpose of this document is to describe the integration between Persystent Suite 4.5 and disk encryption products such as McAfee Endpoint

More information

(Installation through ADSelfService Plus web portal and Manual Installation)

(Installation through ADSelfService Plus web portal and Manual Installation) ADSelfService Plus Client Software Installation Guide (Installation through ADSelfService Plus web portal and Manual Installation) 1 Table of Contents Introduction:... 3 ADSelfService Plus Client software:...

More information

MICROSOFT BITLOCKER ADMINISTRATION AND MONITORING (MBAM)

MICROSOFT BITLOCKER ADMINISTRATION AND MONITORING (MBAM) MICROSOFT BITLOCKER ADMINISTRATION AND MONITORING (MBAM) MICROSOFT BITLOCKER ADMINISTRATION AND MONITORING (MBAM) Microsoft BitLocker Administration and Monitoring (MBAM) provides a simplified administrative

More information

Symantec Enterprise Security Manager Baseline Policy Manual for CIS Benchmark

Symantec Enterprise Security Manager Baseline Policy Manual for CIS Benchmark Symantec Enterprise Security Manager Baseline Policy Manual for CIS Benchmark For Windows Server 2008 Domain Controllers Version: 3.0.0 Symantec Enterprise Security Manager Baseline Policy Manual for

More information

TECHNICAL DOCUMENTATION SPECOPS DEPLOY / APP 4.7 DOCUMENTATION

TECHNICAL DOCUMENTATION SPECOPS DEPLOY / APP 4.7 DOCUMENTATION TECHNICAL DOCUMENTATION SPECOPS DEPLOY / APP 4.7 DOCUMENTATION Contents 1. Getting Started... 4 1.1 Specops Deploy Supported Configurations... 4 2. Specops Deploy and Active Directory...5 3. Specops Deploy

More information

Erado Archiving & Setup Instruction Microsoft Exchange 2007 Push Journaling

Erado Archiving & Setup Instruction Microsoft Exchange 2007 Push Journaling Erado Archiving & Setup Instruction Microsoft Exchange 2007 Push Journaling This document covers the following Microsoft Exchange Server Editions Microsoft Exchange Enterprise Edition 2007 Microsoft Exchange

More information

CRYPTOLogon Agent. for Windows Domain Logon Authentication. Deployment Guide. Copyright 2002-2003, CRYPTOCard Corporation, All Rights Reserved.

CRYPTOLogon Agent. for Windows Domain Logon Authentication. Deployment Guide. Copyright 2002-2003, CRYPTOCard Corporation, All Rights Reserved. CRYPTOLogon Agent for Windows Domain Logon Authentication Deployment Guide Table of Contents 1. OVERVIEW... 1 1.1 SINGLE AUTHENTICATION MODE (MS-GINA REPLACEMENT)... 1 1.2 DUAL AUTHENTICATION MODE (MS-GINA

More information

This Deployment Guide is intended for administrators in charge of planning, implementing and

This Deployment Guide is intended for administrators in charge of planning, implementing and YOUR AUTOMATED EMPLOYEE Foxtrot Deployment Guide Enterprise Edition Introduction This Deployment Guide is intended for administrators in charge of planning, implementing and maintaining the deployment

More information

Technicians Guide. Version November Innovative Solutions for Education Management

Technicians Guide. Version November Innovative Solutions for Education Management Technicians Guide Version 2016.00 16 November 2015 Innovative Solutions for Education Management www.drakelane.co.uk Contents Introduction... 3 Performance factors... 3 Demand... 3 Network resources...

More information

Administration Guide. . All right reserved. For more information about Specops Deploy and other Specops products, visit www.specopssoft.

Administration Guide. . All right reserved. For more information about Specops Deploy and other Specops products, visit www.specopssoft. . All right reserved. For more information about Specops Deploy and other Specops products, visit www.specopssoft.com Copyright and Trademarks Specops Deploy is a trademark owned by Specops Software. All

More information

NetWrix Password Manager. Quick Start Guide

NetWrix Password Manager. Quick Start Guide NetWrix Password Manager Quick Start Guide Contents Overview... 3 Setup... 3 Deploying the Core Components... 3 System Requirements... 3 Installation... 4 Windows Server 2008 Notes... 4 Upgrade Path...

More information

User Guide. Version R91. English

User Guide. Version R91. English AuthAnvil User Guide Version R91 English August 25, 2015 Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept EULATOS as updated from

More information

7.92 Installation Guide

7.92 Installation Guide 7.92 Installation Guide 042412 2012 Blackbaud, Inc. This publication, or any part thereof, may not be reproduced or transmitted in any form or by any means, electronic, or mechanical, including photocopying,

More information

Tharo Systems, Inc. 2866 Nationwide Parkway P.O. Box 798 Brunswick, OH 44212 USA Tel: 330.273.4408 Fax: 330.225.0099

Tharo Systems, Inc. 2866 Nationwide Parkway P.O. Box 798 Brunswick, OH 44212 USA Tel: 330.273.4408 Fax: 330.225.0099 Introduction EASYLABEL 6 has several new features for saving the history of label formats. This history can include information about when label formats were edited and printed. In order to save this history,

More information

SPECOPS SELF SERVICE PORTAL 2.2 INSTALLATION AND CONFIGURATION GUIDE

SPECOPS SELF SERVICE PORTAL 2.2 INSTALLATION AND CONFIGURATION GUIDE Technical documentation: SPECOPS SELF SERVICE PORTAL 2.2 INSTALLATION AND CONFIGURATION GUIDE By Markus Lassfolk, Product Specialist, SPECOPS SELF SERVICE PORTAL 2.2 INSTALLATION AND CONFIGURATION GUIDE...

More information

MIGRATING TO AVALANCHE 5.0 WITH MS SQL SERVER

MIGRATING TO AVALANCHE 5.0 WITH MS SQL SERVER MIGRATING TO AVALANCHE 5.0 WITH MS SQL SERVER This document provides instructions for migrating to Avalanche 5.0 from an installation of Avalanche MC 4.6 or newer using MS SQL Server 2005. You can continue

More information

Installation Guide. . All right reserved. For more information about Specops Deploy and other Specops products, visit www.specopssoft.

Installation Guide. . All right reserved. For more information about Specops Deploy and other Specops products, visit www.specopssoft. . All right reserved. For more information about Specops Deploy and other Specops products, visit www.specopssoft.com Copyright and Trademarks Specops Deploy is a trademark owned by Specops Software. All

More information

Table Of Contents. - Microsoft Windows - WINDOWS XP - IMPLEMENTING & SUPPORTING MICROSOFT WINDOWS XP PROFESSIONAL...10

Table Of Contents. - Microsoft Windows - WINDOWS XP - IMPLEMENTING & SUPPORTING MICROSOFT WINDOWS XP PROFESSIONAL...10 Table Of Contents - - WINDOWS SERVER 2003 MAINTAINING AND MANAGING ENVIRONMENT...1 WINDOWS SERVER 2003 IMPLEMENTING, MANAGING & MAINTAINING...6 WINDOWS XP - IMPLEMENTING & SUPPORTING MICROSOFT WINDOWS

More information

ProSystem fx Document

ProSystem fx Document ProSystem fx Document Server Upgrade from Version 3.7 to Version 3.8 1 This Document will guide you through the upgrade of Document Version 3.7 to Version 3.8. Do not attempt to upgrade from any other

More information

VERITAS Backup Exec TM 10.0 for Windows Servers

VERITAS Backup Exec TM 10.0 for Windows Servers VERITAS Backup Exec TM 10.0 for Windows Servers Quick Installation Guide N134418 July 2004 Disclaimer The information contained in this publication is subject to change without notice. VERITAS Software

More information

Sophos Enterprise Console server to server migration guide. Product version: 5.1 Document date: June 2012

Sophos Enterprise Console server to server migration guide. Product version: 5.1 Document date: June 2012 Sophos Enterprise Console server to server migration guide Product : 5.1 Document date: June 2012 Contents 1 About this guide...3 2 Terminology...4 3 Assumptions...5 4 Prerequisite...6 5 What are the key

More information

Administration Guide ActivClient for Windows 6.2

Administration Guide ActivClient for Windows 6.2 Administration Guide ActivClient for Windows 6.2 ActivClient for Windows Administration Guide P 2 Table of Contents Chapter 1: Introduction....................................................................12

More information

Table of Contents. OpenDrive Drive 2. Installation 4 Standard Installation Unattended Installation

Table of Contents. OpenDrive Drive 2. Installation 4 Standard Installation Unattended Installation User Guide for OpenDrive Application v1.6.0.4 for MS Windows Platform 20150430 April 2015 Table of Contents Installation 4 Standard Installation Unattended Installation Installation (cont.) 5 Unattended

More information

Omniquad Exchange Archiving

Omniquad Exchange Archiving Omniquad Exchange Archiving Deployment and Administrator Guide Manual version 3.1.2 Revision Date: 20 May 2013 Copyright 2012 Omniquad Ltd. All rights reserved. Omniquad Ltd Crown House 72 Hammersmith

More information

SmartDraw Installation Guide

SmartDraw Installation Guide SmartDraw Installation Guide System Requirements Your computer must meet these requirements in order to run SmartDraw: Windows Vista, XP or 2000 256MB RAM 3GB free hard disk space Installation Options

More information

Deploying System Center 2012 R2 Configuration Manager

Deploying System Center 2012 R2 Configuration Manager Deploying System Center 2012 R2 Configuration Manager This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED, OR STATUTORY, AS TO THE INFORMATION IN THIS DOCUMENT.

More information

SQL Server Setup for Assistant/Pro applications Compliance Information Systems

SQL Server Setup for Assistant/Pro applications Compliance Information Systems SQL Server Setup for Assistant/Pro applications Compliance Information Systems The following document covers the process of setting up the SQL Server databases for the Assistant/PRO software products form

More information

Installation Guide - Client. Rev 1.5.0

Installation Guide - Client. Rev 1.5.0 Installation Guide - Client Rev 1.5.0 15 th September 2006 Introduction IntraNomic requires components to be installed on each PC that will use IntraNomic. These IntraNomic Client Controls provide advanced

More information

SELF SERVICE RESET PASSWORD MANAGEMENT GPO DISTRIBUTION GUIDE

SELF SERVICE RESET PASSWORD MANAGEMENT GPO DISTRIBUTION GUIDE SELF SERVICE RESET PASSWORD MANAGEMENT GPO DISTRIBUTION GUIDE Copyright 1998-2015 Tools4ever B.V. All rights reserved. No part of the contents of this user guide may be reproduced or transmitted in any

More information

etoken Single Sign-On 3.0

etoken Single Sign-On 3.0 etoken Single Sign-On 3.0 Frequently Asked Questions Table of Contents 1. Why aren t passwords good enough?...2 2. What are the benefits of single sign-on (SSO) solutions?...2 3. Why is it important to

More information

CTERA Agent for Windows

CTERA Agent for Windows User Guide CTERA Agent for Windows May 2012 Version 3.1 Copyright 2009-2012 CTERA Networks Ltd. All rights reserved. No part of this document may be reproduced in any form or by any means without written

More information

SELF SERVICE RESET PASSWORD MANAGEMENT IMPLEMENTATION GUIDE

SELF SERVICE RESET PASSWORD MANAGEMENT IMPLEMENTATION GUIDE SELF SERVICE RESET PASSWORD MANAGEMENT IMPLEMENTATION GUIDE Copyright 1998-2015 Tools4ever B.V. All rights reserved. No part of the contents of this user guide may be reproduced or transmitted in any form

More information

Promap V4 ActiveX MSI File

Promap V4 ActiveX MSI File Promap V4 ActiveX MSI File Contents What is an MSI File? Promap V4 MSI Main Advantage Installation via Group Policy (Windows Server 2000) Installation via Group Policy (Windows Server 2003) What is an

More information

SecurEnvoy Windows Login Agent

SecurEnvoy Windows Login Agent SecurEnvoy Windows Login Agent Including support for SecurPassword SecurEnvoy Ltd 1210 Parkview, Arlington Business Park, Theale, Reading. RG7 4TY Tel: 0845 2600010 Fax: 0845 260014 www.securenvoy.com

More information

McAfee Endpoint Encryption for PC 7.0

McAfee Endpoint Encryption for PC 7.0 Migration Guide McAfee Endpoint Encryption for PC 7.0 For use with epolicy Orchestrator 4.6 Software COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee,

More information

ScoMIS Encryption Service

ScoMIS Encryption Service Introduction This guide explains how to install the ScoMIS Encryption Service Software onto a laptop computer. There are three stages to the installation which should be completed in order. The installation

More information

Out n About! for Outlook Electronic In/Out Status Board. Administrators Guide. Version 3.x

Out n About! for Outlook Electronic In/Out Status Board. Administrators Guide. Version 3.x Out n About! for Outlook Electronic In/Out Status Board Administrators Guide Version 3.x Contents Introduction... 1 Welcome... 1 Administration... 1 System Design... 1 Installation... 3 System Requirements...

More information

Deploying BitDefender Client Security and BitDefender Windows Server Solutions

Deploying BitDefender Client Security and BitDefender Windows Server Solutions Deploying BitDefender Client Security and BitDefender Windows Server Solutions Quick Install Guide Copyright 2011 BitDefender 1. Installation Overview Thank you for selecting BitDefender Business Solutions

More information

SafeGuard Easy startup guide. Product version: 7

SafeGuard Easy startup guide. Product version: 7 SafeGuard Easy startup guide Product version: 7 Document date: December 2014 Contents 1 About this guide...3 2 About Sophos SafeGuard (SafeGuard Easy)...4 2.1 About Sophos SafeGuard (SafeGuard Easy) 7.0...6

More information

SmartCenter for Pointsec - MI Overview

SmartCenter for Pointsec - MI Overview Chapter SmartCenter for Pointsec - MI Overview 1 SmartCenter for Pointsec - MI is a management and administration framework solution for the Check Point Endpoint Security product line that integrates with

More information

XMap 7 Administration Guide. Last updated on 12/13/2009

XMap 7 Administration Guide. Last updated on 12/13/2009 XMap 7 Administration Guide Last updated on 12/13/2009 Contact DeLorme Professional Sales for support: 1-800-293-2389 Page 2 Table of Contents XMAP 7 ADMINISTRATION GUIDE... 1 INTRODUCTION... 5 DEPLOYING

More information

PC Power Down. MSI Deployment Guide

PC Power Down. MSI Deployment Guide PC Power Down MSI Deployment Guide 1. Introduction 1.1. Outline The client software for PC Power Down can be pushed out across a network, saving the effort of individually visiting each computer to install

More information

Backup and Restore with 3 rd Party Applications

Backup and Restore with 3 rd Party Applications Backup and Restore with 3 rd Party Applications Contents Introduction...1 Backup Software Capabilities...1 Backing up a Single Autodesk Vault Site...1 Backup Process...1 Restore Process...1 Backing up

More information

Agency Pre Migration Tasks

Agency Pre Migration Tasks Agency Pre Migration Tasks This document is to be provided to the agency and will be reviewed during the Migration Technical Kickoff meeting between the ICS Technical Team and the agency. Network: Required

More information

How to Setup SQL Server Replication

How to Setup SQL Server Replication Introduction This document describes a scenario how to setup the Transactional SQL Server Replication. Before we proceed for Replication setup you can read brief note about Understanding of Replication

More information

Symantec AntiVirus Corporate Edition Patch Update

Symantec AntiVirus Corporate Edition Patch Update Symantec AntiVirus Corporate Edition Patch Update Symantec AntiVirus Corporate Edition Update Documentation version 10.0.1.1007 Copyright 2005 Symantec Corporation. All rights reserved. Symantec, the Symantec

More information

1. System Requirements

1. System Requirements BounceBack Data Transfer 14.2 User Guide This guide presents you with information on how to use BounceBack Data Transfer 14.2. Contents 1. System Requirements 2. Attaching Your New Hard Drive To The Data

More information

Full disk encryption with Sophos Safeguard Enterprise With Two-Factor authentication of Users Using SecurAccess by SecurEnvoy

Full disk encryption with Sophos Safeguard Enterprise With Two-Factor authentication of Users Using SecurAccess by SecurEnvoy Full disk encryption with Sophos Safeguard Enterprise With Two-Factor authentication of Users Using SecurAccess by SecurEnvoy Contact information SecurEnvoy www.securenvoy.com 0845 2600010 1210 Parkview

More information

Pointsec Enterprise Encryption and Access Control for Laptops and Workstations

Pointsec Enterprise Encryption and Access Control for Laptops and Workstations Pointsec Enterprise Encryption and Access Control for Laptops and Workstations Overview of PC Security Since computer security has become increasingly important, almost all of the focus has been on securing

More information

Installation and Configuration Guide

Installation and Configuration Guide Entrust Managed Services PKI Auto-enrollment Server 7.0 Installation and Configuration Guide Document issue: 1.0 Date of Issue: July 2009 Copyright 2009 Entrust. All rights reserved. Entrust is a trademark

More information

Capture Pro Software FTP Server System Output

Capture Pro Software FTP Server System Output Capture Pro Software FTP Server System Output Overview The Capture Pro Software FTP server will transfer batches and index data (that have been scanned and output to the local PC) to an FTP location accessible

More information

Deploying BitDefender Client Security and BitDefender Windows Server Solutions

Deploying BitDefender Client Security and BitDefender Windows Server Solutions Deploying BitDefender Client Security and BitDefender Windows Server Solutions Quick Install Guide Copyright 2010 BitDefender; 1. Installation Overview Thank you for selecting BitDefender Business Solutions

More information

CWOPA Broadband Users. Windows Operating System

CWOPA Broadband Users. Windows Operating System CWOPA Broadband Users Windows Operating System October 2012 Background These instructions are to be used for VPN users who have been assigned a CWOPA username and password. If your machine has Internet

More information

Active Directory Software Deployment

Active Directory Software Deployment APPLICATION N0TE ST-0128 March 24, 2006 Product: Active Directory / PCM Deployment System version: ShoreTel 6 Active Directory Software Deployment Courtesy of: Dylan Moser with LANtelligence Inc. This

More information

Sophos Disk Encryption License migration guide. Product version: 5.61 Document date: June 2012

Sophos Disk Encryption License migration guide. Product version: 5.61 Document date: June 2012 Sophos Disk Encryption License migration guide Product version: 5.61 Document date: June 2012 Contents 1 About this guide...3 2 Add encryption to an existing Sophos security solution...5 3 SDE/SGE 4.x

More information

Password Reset Server Installation Guide Windows 8 / 8.1 Windows Server 2012 / R2

Password Reset Server Installation Guide Windows 8 / 8.1 Windows Server 2012 / R2 Password Reset Server Installation Guide Windows 8 / 8.1 Windows Server 2012 / R2 Last revised: November 12, 2014 Table of Contents Table of Contents... 2 I. Introduction... 4 A. ASP.NET Website... 4 B.

More information

NTP Software File Auditor for Windows Edition

NTP Software File Auditor for Windows Edition NTP Software File Auditor for Windows Edition An NTP Software Installation Guide Abstract This guide provides a short introduction to installation and initial configuration of NTP Software File Auditor

More information

SafeGuard PortProtector 3.30 SP6 Installation guide

SafeGuard PortProtector 3.30 SP6 Installation guide SafeGuard PortProtector 3.30 SP6 Installation guide Document date: March 2010 Important Notice This guide is delivered subject to the following conditions and restrictions: This guide contains proprietary

More information

How To - Implement Single Sign On Authentication with Active Directory

How To - Implement Single Sign On Authentication with Active Directory How To - Implement Single Sign On Authentication with Active Directory Applicable to English version of Windows This article describes how to implement single sign on authentication with Active Directory

More information

Installation Troubleshooting Guide

Installation Troubleshooting Guide Installation Troubleshooting Guide Firebird Database Connection Errors DBA Next Generation uses the Firebird Database server for connections to the database. If you have a connection error when launching

More information