ez Agent Administrator s Guide

Size: px
Start display at page:

Download "ez Agent Administrator s Guide"

Transcription

1 ez Agent Administrator s Guide

2 Copyright This document is protected by the United States copyright laws, and is proprietary to Zscaler Inc. Copying, reproducing, integrating, translating, modifying, enhancing, recording by any information storage or retrieval system or any other use of this document, in whole or in part, by anyone other than the authorized employees, customers, users or partners (licensees) of Zscaler, Inc. without the prior written permission from Zscaler, Inc. is prohibited. Copyright 2015 Zscaler Trademark Statements Zscaler and NanoLog are trademarks or registered trademarks of Zscaler, Inc. All other trademarked names used herein are the properties of their respective owners, and are used for identification purposes only. ez Agent 2.1 Administrator s Guide, Rev. B ez Agent 2.1, Rev. B Copyright 2015 Zscaler - 2 -

3 Contents ez Agent Admin Guide... 4 About ez Agent... 5 Supported Systems... 6 Configuring ez Agent... 7 Defining and Managing ez Agent Configuration Files... 8 Loading a New Configuration File Downloading ez Agent Installing ez Agent on a Computer Using the Installation Wizard Installing ez Agent Automatically Installing and Managing ez Agent on Multiple Computers Using ez Agent on a Computer Logging In to the Zscaler service Using the ez Agent Icon Troubleshooting ez Agent Uninstalling ez Agent ez Agent 2.1, Rev. B Copyright 2015 Zscaler - 3 -

4 ez Agent Admin Guide Use ez Agent to set and enforce proxy settings in your users browsers, so their web traffic is always directed to the Zscaler service, regardless of their location. This guide provides an overview of ez Agent version 2.1. It describes how to install ez Agent on your organization s computers and define its configuration settings from the Zscaler service portal. ez Agent 2.1, Rev. B Copyright 2015 Zscaler - 4 -

5 About ez Agent ez Agent is a lightweight application that automatically sets and enforces proxy settings in your users browsers, so their web traffic is forwarded to the Zscaler service even when they are outside your corporate network. ez Agent ensures that the web traffic of your mobile users is protected against malicious content and that the corporate Internet usage policies that you defined in the security service are implemented. As shown in the following figure, you can use different mechanisms to forward your organization s web traffic to the Zscaler service. In the illustration, the router forwards web traffic from the ZCustomer corporate network to the Zscaler service through a GRE tunnel, while ez Agent enforces proxy settings on the mobile devices of users that are off the corporate network to ensure that the mobile devices forward web traffic to the Zscaler service as well. You can centrally define and manage ez Agent configuration settings such as the browser proxy settings, logging level and the passwords for disabling and uninstalling ez Agent from the admin portal, and then use the Group Policy Object (GPO) feature of Active Directory (AD) to install ez Agent on all devices in your organization. ez Agent is installed as a Microsoft Windows service that runs in the System Tray. It prevents tampering by automatically checking the browser s proxy settings every few seconds, and resetting them if the user changes or disables them. The service itself is password-protected, so only the network administrator can temporarily disable or uninstall the agent. This ensures that your corporate policy is enforced, regardless of a user s location. Additionally, ez Agent recognizes when users connect to hot spots, such as airports or coffee shops, where they are required to authenticate or pay before they can access the Internet, and enforces its proxy settings only after a predefined time period. ez Agent 2.1, Rev. B Copyright 2015 Zscaler - 5 -

6 Supported Systems This section lists the systems and browsers that ez Agent supports: Supported Operating Systems (32-bit and 64-bit) Windows 8 Windows 7 Windows Vista Windows XP Supported Browsers Internet Explorer (6.0 and higher) Firefox (3.0 and higher) Chrome (1.0+) Safari (Windows only) ez Agent 2.1, Rev. B Copyright 2015 Zscaler - 6 -

7 Configuring ez Agent Do the following to configure ez Agent settings and install it on your users' computers: 1. The ez Agent configuration file defines the settings of ez Agent, such as debug level, number of days that logs are retained and how the browser is configured to forward web traffic through a PAC file or manual proxy configuration. Zscaler provides one default configuration file and you can create up to 255 custom configuration files. See Defining and Managing Configuration Files. 2. Download ez Agent from the Zscaler service portal. See Downloading ez Agent. 3. Install ez Agent on your users' computers. To install ez Agent on one computer, see Installing ez Agent on a Computer. To install ez Agent on multiple computers, see Installing and Managing ez Agent on Multiple Computers. ez Agent 2.1, Rev. B Copyright 2015 Zscaler - 7 -

8 Defining and Managing ez Agent Configuration Files You can centrally define and manage ez Agent configuration files from the Zscaler service portal. Zscaler provides one default configuration file and you can create up to 255 files. For example, you could create a configuration file for each department or user group in your organization. The ez Agent configuration file specifies a number of settings, including how the browser is configured to forward web traffic through a PAC file or manual proxy configuration. If you plan to use a PAC file, you must define it first so you can reference it when you configure ez Agent. Viewing Configuration Files You can view the default configuration file, but you cannot edit or delete it. To view the default ez Agent configuration file and any other files that you create: 1. Log in to the security service and go to Administration > Resources > ez Agent Configurations. 2. In the ez Agent Configurations page, point to the file and click the View icon. Creating a Configuration File To create a new configuration file: 1. Go to Administration > Resources > ez Agent Configurations 2. Click Add. 3. In the Add ez Agent Configuration window, type a Name and Description for the new ez Agent configuration file and change the default settings as follows: Debug Level: ez Agent generates a new log file whenever a computer is restarted. For more information on the log file, see Using the ez Agent Icon. You can set the verbosity of the log file by entering a number from 0 through 10. By default, the debug level is set to 10. The higher the level, the more detailed the log. Log File Retention (days): You can specify the number of days that logs are retained. The default is two days. Disable Protection Password: You can define the password that is required to disable ez Agent on a computer. The default password is ZSCALER. Uninstall Password: You can define the password that is required to uninstall ez Agent on a computer. The default password is ZSCALER. Force Proxy Time-Out (sec): ez Agent automatically recognizes when a user connects to a hot spot, such as an airport or hotel, for which authentication or payment is required. You can specify the time during which the proxy settings are not enforced to allow a user to authenticate or make a payment to a captive portal. For example, if this value is set to 300 seconds (5 minutes), ez Agent s proxy settings are ignored during that time. At the end of 300 seconds, the proxy settings are enforced regardless of whether ez Agent can connect to the Zscaler service. The default is 0 seconds, which mean this field is not used. Proxy Type: Specify whether you are using a PAC file for the proxy server configuration, or if you are specifying the proxy configuration. ez Agent 2.1, Rev. B Copyright 2015 Zscaler - 8 -

9 o Use PAC File: When you select this option, you must specify the location of the PAC file. You can accept the default URL, which directs traffic to the ZEN closest to the user or you can type the PAC file URL. o Manual Proxy Configuration: When you select this option, the service displays additional fields where you specify the proxy settings for each type of traffic: HTTP Proxy: This value is entered in the browser s HTTP proxy address field. You can specify a ZEN (for example, atl1.sme.zscaler.net) host name or accept the default value, which automatically directs traffic to the ZEN closest to the user. HTTP Proxy Port: This value is entered in the browser s HTTP proxy port field. The default is port 80. HTTPS Proxy: This value is entered in the browser s Secure proxy address field. You can specify a ZEN host name (for example, atl1.sme.zscaler.net) or accept the default value, which automatically directs traffic to the ZEN closest to the user. HTTPS Proxy Port: This value is entered in the browser s Secure proxy port field. You can change the default value of 80 to a port that ZENs listen to so they can decrypt SSL traffic. This allows the users HTTPS traffic to be examined for enforcement of your corporate policies. (If port 9443 is used, browsers must have Zscaler s Intermediate SSL Certificate installed, so security certificate warnings do not appear in your browsers. FTP Proxy: This value is entered in the browser s FTP proxy address field. You can specify a ZEN host name (for example, atl1.sme.zscaler.net) or accept the default value, which automatically directs traffic to the ZEN closest to the user. FTP Proxy Port: This value is entered in the browser s FTP proxy port field. The default is port 80. SOCKS Proxy and SOCKS Proxy Port: You can leave these fields blank. Zscaler is NOT a SOCKS proxy. SOCKS traffic to ZENs are bypassed and allowed Proxy Bypass: Enter the IP addresses of specific hosts or URLs for which you want to bypass the proxies. The values of this parameter are populated in the Exceptions field of Internet Explorer, Mozilla Firefox and Chrome. For example, you can use this option to bypass internal networks. These values must be comma-separated in a single line. Hide Tray Icon: By default, the ez Agent icon is displayed in the system tray of each user. Select Yes to hide the icon. Configuration Fetch Time (min): This parameter specifies the interval at which ez Agent checks the service portal for an updated configuration file and downloads it, if there is one. The default is 60 minutes. When you download an ez Agent configuration file, ez Agent stores the path to the location of the configuration file. So when you update the configuration in the admin portal, the service uses this path information to replace the existing configuration file with the updated version. If there are multiple configuration files, ez Agent only replaces the file with the same name. Process Kill-List: You can enter a comma-separated list of programs or processes that are not allowed to run on your users computers. Opera is on the kill-list by default. If a user tries to use Opera, a message appears indicating that Opera is not allowed by the organization s policy. The kill-list is resilient to attempts at evasion where users change file names or locations. ez Agent 2.1, Rev. B Copyright 2015 Zscaler - 9 -

10 Unsupported Browsers: This is a predefined list of web browsers and version numbers that are blocked by the agent. It prevents users from bypassing the Zscaler service by exploiting certain browser versions that may have proxy related bugs. The default value of this field is the following CSV list: firefox 4.0b7, firefox 4.0b8, firefox 4.0b9, firefox 4.0b10, firefox 4.0b11 (these beta releases of Firefox had a proxy setting bug). Protect HOSTS File: This is a Windows file that contains IP address to hostname mappings. Click Yes to prevent users from trying to bypass the proxy servers by adding hostname and IP address pairs to this file. Change Test Connection Settings: These are the settings that ez Agent uses when it tests connectivity to the Zscaler service. Users can also test connectivity from the ez Agent icon in the system tray. Zscaler recommends that you do not change these settings. o If you click Yes to change the settings, the service displays additional fields: Test Connection Host: The host to which ez Agent sends the HTTP request. The default value is gateway.zscaler.net. Test Connection Port: The port to which ez Agent sends the HTTP request. The default value is port 80. Test Connection Request Data: ez Agent sends an HTTP request for this data. The default is admin.zscaler.net. Test Connection Response Data: Expected location header of the HTTP response. The default is https://admin.zscaler.net. ez Agent sends an HTTP request for the value in Test Connection Request Data to the Test Connection Host on the Test Connection Port, and it must receive an HTTP response with the value in Test Connection Response Data in the location header. Gateway Health Monitor Interval (sec): ez Agent checks whether the Zscaler service gateway is reachable every 30 seconds. You can change this default value. Disable Protection if Gateway Unreachable: ez Agent disables protection and allows web traffic to bypass the Zscaler service gateway when it is unreachable. You can click No to block access to the Internet until the Zscaler gateway is reachable. 4. Click Save, and then activate the change. 5. Click Download beside the newly created configuration file to download it to your computer. If you have not yet downloaded ez Agent from the service portal, go to Downloading ez Agent. If you have downloaded ez Agent and want to load the new configuration file to your existing ez Agent, see Loading a New Configuration File. ez Agent 2.1, Rev. B Copyright 2015 Zscaler

11 Modifying and Deleting Configuration Files Do the following: To edit any admin-defined configuration file, point to the file and click the Edit icon. After you make changes to the file, the service automatically downloads the updated file after the configured time period and distributes it to all the agents. To delete an admin-defined ez Agent configuration file, point to the file and click the Edit icon. Then click Delete at the bottom on the dialog. If you inadvertently delete a configuration file that is in use, you can create a new file with the same name and use it again. ez Agent 2.1, Rev. B Copyright 2015 Zscaler

12 Loading a New Configuration File Follow this procedure if you have downloaded ez Agent and want to load a new configuration file to your existing ez Agent. If you have not yet downloaded ez Agent from the service portal, go to Downloading ez Agent. 1. From the Zscaler service portal, go to Administration > Resources > ez Agent Configurations, and click Download ez Agent to download the encrypted configuration file to a folder on your local computer. 2. On your computer, right-click the ez Agent icon and click Load new configuration file. 3. When the password prompt appears, enter the Disable password that you set in the current configuration file. 4. Navigate to the new configuration file and select it. ez Agent displays a message indicating that the new configuration file was loaded. If you created multiple configuration files, download each file to its respective user group or department folder that contains the ez Agent files. You can then install ez Agent with the new configuration file on your users computers. For more information, see Installing and Managing ez Agent on Multiple Computers. ez Agent 2.1, Rev. B Copyright 2015 Zscaler

13 Downloading ez Agent To download ez Agent: 1. From the Zscaler service portal, go to Administration > Resources > ez Agent Configurations. 2. Click Download beside the file that you want to download. The ez_agent.zip file contains the following files: ezsetup: Use this file to run the installation wizard and install ez Agent on a local computer. The wizard provides several options for installing ez Agent. You can also run the wizard to make changes to an existing ez Agent installation. See Using the Installation Wizard. Silent_Setup.bat: Use this file to install ez Agent in silent mode or on multiple computers using the Active Directory GPO feature. You can also use this file to automatically install ez Agent on a local computer without running the installation wizard. Note: You can use either the ezsetup.msi or the Silent_Setup.bat file to install ez Agent on multiple computers using GPO. Zscaler recommends that you use the Silent_Setup.bat file. Uninstall.bat: Use this file to uninstall ez Agent on a local computer. See Uninstalling ez Agent on a Computer. config.dat: This file contains the ez Agent configuration settings. When you first download the ez Agent zip file, this file contains the default configuration settings. You can define a new configuration file and download it to replace the default configuration file. See Defining and Managing ez Agent Configuration Files. ez Agent 2.1, Rev. B Copyright 2015 Zscaler

14 Installing ez Agent on a Computer You can install ez Agent on individual computers or on multiple computers using the Active Directory GPO feature. If you have an earlier version of ez Agent installed, Zscaler recommends that you uninstall it before installing a new version. For information on uninstalling ez Agent, see Uninstalling ez Agent. You can use either the ez Agent Setup Wizard or the Silent.bat file to install ez Agent on a computer. Use the wizard to customize the installation settings or to update the settings of an existing installation. The Silent.bat file automatically installs the agent on your computer without presenting any options. Using the Installation Wizard To use the ez Agent Setup Wizard: 1. On your computer, navigate to the ezsetup.msi file and double-click it. 2. Click Next when the Welcome dialog appears. 3. Select I accept the terms in the License Agreement when the End User License Agreement appears. 4. In the Custom Setup window, select where the ez Agent binaries and configuration file are saved. By default, both files are saved on your hard drive. If you are re-installing ez Agent and selected different settings, click Reset. The disk requirements for the binaries and configuration file appear when you select them. To check whether you have enough space in your disk drives, click Disk Usage to view the available and required disk space. ez Agent 2.1, Rev. B Copyright 2015 Zscaler

15 5. Click Install to begin the installation. 6. Click Finish after the installation is completed. The ez Agent icon appears in the system tray. See Using the ez Agent Icon. Installing ez Agent Automatically To use the Silent_Setup.bat file to automatically install ez Agent on an individual computer: 1. Open the Windows command prompt and navigate to the ez Agent folder. 2. Run the Silent_Setup.bat file as Administrator. This.bat file runs the ezsetup file and loads your custom config.dat file settings. The ez Agent icon appears in the system tray after it is installed. If you reinstalled ez Agent on a computer, you are prompted to restart your computer after the installation. ez Agent 2.1, Rev. B Copyright 2015 Zscaler

16 Installing and Managing ez Agent on Multiple Computers Use the Active Directory (AD) Group Policy (GPO) feature to automate installing ez Agent on multiple computers. Before you do, you must log in to the AD server as an Administrator and copy the ez Agent files to a shared folder on the server. This section describes how to use the AD GPO feature on a Windows 2003, 2000, and XP Professional server. For more information on Active Directory or its features, refer to the Windows Active Directory documentation. To install ez Agent on multiple computers: Step 1: On the AD server, go to the Properties window. 1. Log in to the Active Directory server as an Administrator. 2. Click Start > Administrative Tools to open the Active Directory Users and Computers console tree. Then, click Active Directory Users and Computers. 3. In the Active Directory Users and Computers console tree, right-click your domain, and then click Properties, to open the Properties window which displays the properties of your domain. Step 2: Create a new GPO In the Properties window, do the following: 1. Click Group Policy, and then click New. 2. Enter the name of the new GPO. 3. Click Properties to view the properties of the new GPO. 4. In the New GPO Properties window, do the following: a. Click Security. b. Select Allow Group Policy to apply the GPO to the appropriate groups. c. Click OK, and then click Close to exit the window. Step 3: Assign ez Agent to multiple computers. In the Properties window, do the following: 1. Click Group Policy. 2. Select the newly created GPO, and then click Edit. 3. Go to Computer Configuration > Software Settings to assign the ez Agent package. 4. Under Software Settings, do the following: a. Right-click Software Installation. b. Click New > Package. c. In the New GPO Properties window, do the following: o Enter the path of the ez Agent files. ez Agent 2.1, Rev. B Copyright 2015 Zscaler

17 For example: \\GPO control server\shared folder\ezagent.msi. o Click Open to open the installer package. o Click Assigned to assign ez Agent to the computers. 5. Click OK. The ez Agent installer package appears in the Group Policy section in the right pane. 6. Click Close to exit the Properties window. 7. Close the Active Directory Users and Computers window. When end users start their computers, the Silent_Setup.bat file automatically runs the ezsetup.msi file using the values in the configuration file, and then launches ez Agent. You can also do the following: Redeploy ez Agent You can easily redeploy ez Agent when you need to upgrade to the latest version. To redeploy the assigned ez Agent package, navigate to the Properties window and do the following: 1. Click Group Policy. 2. Select the GPO used for the ez Agent deployment, and then click Edit. 3. Click Software Settings. 4. Click the ez Agent software installation item that contains the ez Agent installation package. 5. When the Group Policy window appears, do the following: a. Right-click ez Agent. b. Click All Tasks > Redeploy application. A warning message appears stating that the package will be reinstalled on all devices on which it was previously installed. c. Click Yes in the warning message. d. Click Close to exit the window. 6. Click OK. 7. Close the Active Directory Users and Computers window. Remove ez Agent To remove ez Agent, navigate to the Properties window and do the following: 1. Click Group Policy. 2. Select the GPO used for the ez Agent package deployment and click Edit. 3. Click Software Settings. 4. Click the ez Agent software installation item that contains the ez Agent installation package. The Group Policy window appears. 5. In the Group Policy window, do the following: a. Right-click ez Agent. ez Agent 2.1, Rev. B Copyright 2015 Zscaler

18 b. Click All Tasks > Remove, and then select one of the following options: o Immediately uninstall the software from users and computers o Allow users to continue to use the software but prevent new installation 6. Click OK, and then click Close to exit the window. 7. Click OK. 8. Close the Active Directory Users and Computers window. ez Agent 2.1, Rev. B Copyright 2015 Zscaler

19 Using ez Agent on a Computer After ez Agent is installed on a computer, the user is required to log in to the Zscaler security service before accessing any site on the Internet. ez Agent also displays an icon on the system tray, which provides certain functions. This section describes how to log in to the Zscaler service and how to use the ez Agent icon. Logging In to the Zscaler service After ez Agent is installed on a computer, the user must log in to the Zscaler service as follows: 1. Browse to any external site (for example, The Zscaler service displays a Login window where you are prompted to authenticate. 2. Enter your user name and click Submit. 3. Enter your password and click Login. The Zscaler service allows the user to continue to the site. Then, as the browser retrieves web pages, the Zscaler service scans them for a range of malware threats and delivers clean traffic. Using the ez Agent Icon After ez Agent is installed on a computer, its icon appears in the system tray, as shown in the following figure. Users can right-click the icon to view its available options, as shown in the following figure. They can do the following: Select Test Gateway Connection to test the connection to the Zscaler security service. After ez Agent confirms the connection, it displays a message indicating that it's enabled. ez Agent 2.1, Rev. B Copyright 2015 Zscaler

20 Select Disable protection to temporarily bypass the Zscaler security service. Users must enter the password that was specified in the configuration file. The ez Agent icon changes and displays a warning message indicating that ez Agent is disabled. Users must close the browser and reopen it to remove the proxy settings configured by ez Agent. To reactivate ez Agent, right-click and select Re-enable the protection. No password is required to re-enable the agent. Select Load new configuration file to upload a new ez Agent configuration file. Users must enter the disable password that was specified in the configuration file, and download it to the desired location. ez Agent displays a message indicating that a new file was loaded. Select Export Logs to File to download logs to a file for debugging purposes. Click this option and navigate to where you want to store the log files. After the export, ez Agent displays a message confirming the export. To view the ez Agent log, double-click the ez Agent icon. A log window appears. ez Agent 2.1, Rev. B Copyright 2015 Zscaler

21 Troubleshooting ez Agent Following are some guidelines for troubleshooting ez Agent: Can I add two configuration files with the same name? An organization cannot add two configuration files with the same name. I am unable to delete the default configuration file. You can delete any configuration file except the default configuration file. I deleted a configuration file that is in use. Create a new configuration file with the same name. How many configuration files can I add? You can add a maximum of 255 configuration files. ez Agent does not recognize the disable or uninstall password Your configuration file might be corrupted. In this situation, enter to uninstall ez Agent, and then download a new configuration file. Error <Mandatory File Name> is mandatory. This error appears when you create a new configuration file without any name. You cannot leave the File Name field blank, when creating a new configuration file. Error <Mandatory Description> is mandatory. This error appears when you create a new configuration file without a description. You cannot leave the Description field blank, when creating a new configuration file. There are many ez Agent configuration files in the security service. Which configuration file will ez Agent fetch? ez Agent will fetch the configuration file you used during the installation. If you want to use another configuration file, download it from the security service and upload it manually by rightclicking the systray icon. I deleted some configuration files from the security service and created some new files, but the changes are not reflected. ez Agent tries to fetch the changes from a configuration file that has the name same as the one it is using. So, if you deleted the configuration file that ez Agent is using, it will continue to use the existing configuration. You can avoid this situation by making your changes in the existing configuration files, or creating a new configuration file with the same name. Alternatively, you can download the configuration file from the security service, and let the user upload it manually by right-clicking the systray icon. Note: Zscaler recommends that you always delete configuration files that are no longer in use. ez Agent 2.1, Rev. B Copyright 2015 Zscaler

22 Uninstalling ez Agent To uninstall ez Agent: 1. From the Start menu, click Control Panel. 2. In the Control Panel window, select the option for installing/uninstalling programs. In Windows XP, click Add/Remove Programs. In Windows 7, click Programs and Features. 3. From the list of programs, select ez Agent. 4. When you are prompted for a password, enter the uninstall password that was specified in the configuration file. If you are using the default configuration file, enter ZSCALER. Alternatively, to run the Silent_Setup.bat and Uninstall.bat files: 1. Search for cmd in the Start menu. 2. Right-click cmd and select Run as Administrator to open the command prompt. 3. Enter the location of the.bat file in the command prompt. 4. Type uninstall.bat and press Enter. ez Agent 2.1, Rev. B Copyright 2015 Zscaler

User Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream

User Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream User Manual Onsight Management Suite Version 5.1 Another Innovation by Librestream Doc #: 400075-06 May 2012 Information in this document is subject to change without notice. Reproduction in any manner

More information

Global VPN Client Getting Started Guide

Global VPN Client Getting Started Guide Global VPN Client Getting Started Guide 1 Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your system. CAUTION: A CAUTION indicates potential

More information

Citrix Access Gateway Plug-in for Windows User Guide

Citrix Access Gateway Plug-in for Windows User Guide Citrix Access Gateway Plug-in for Windows User Guide Access Gateway 9.2, Enterprise Edition Copyright and Trademark Notice Use of the product documented in this guide is subject to your prior acceptance

More information

Web Security Service

Web Security Service Webroot Web Security Service Desktop Web Proxy Configuration Guide Webroot Software, Inc. 385 Interlocken Crescent Suite 800 Broomfield, CO 80021 www.webroot.com Desktop Web Proxy Configuration Guide September

More information

Sophos for Microsoft SharePoint startup guide

Sophos for Microsoft SharePoint startup guide Sophos for Microsoft SharePoint startup guide Product version: 2.0 Document date: March 2011 Contents 1 About this guide...3 2 About Sophos for Microsoft SharePoint...3 3 System requirements...3 4 Planning

More information

Desktop Surveillance Help

Desktop Surveillance Help Desktop Surveillance Help Table of Contents About... 9 What s New... 10 System Requirements... 11 Updating from Desktop Surveillance 2.6 to Desktop Surveillance 3.2... 13 Program Structure... 14 Getting

More information

Wavecrest Certificate

Wavecrest Certificate Wavecrest InstallationGuide Wavecrest Certificate www.wavecrest.net Copyright Copyright 1996-2015, Wavecrest Computing, Inc. All rights reserved. Use of this product and this manual is subject to license.

More information

WhatsUp Gold v16.3 Installation and Configuration Guide

WhatsUp Gold v16.3 Installation and Configuration Guide WhatsUp Gold v16.3 Installation and Configuration Guide Contents Installing and Configuring WhatsUp Gold using WhatsUp Setup Installation Overview... 1 Overview... 1 Security considerations... 2 Standard

More information

Ekran System Help File

Ekran System Help File Ekran System Help File Table of Contents About... 9 What s New... 10 System Requirements... 11 Updating Ekran to version 4.1... 13 Program Structure... 14 Getting Started... 15 Deployment Process... 15

More information

WhatsUp Gold v16.2 Installation and Configuration Guide

WhatsUp Gold v16.2 Installation and Configuration Guide WhatsUp Gold v16.2 Installation and Configuration Guide Contents Installing and Configuring Ipswitch WhatsUp Gold v16.2 using WhatsUp Setup Installing WhatsUp Gold using WhatsUp Setup... 1 Security guidelines

More information

Web-Access Security Solution

Web-Access Security Solution WavecrestCyBlock Client Version 2.1.13 Web-Access Security Solution UserGuide www.wavecrest.net Copyright Copyright 1996-2014, Wavecrest Computing, Inc. All rights reserved. Use of this product and this

More information

Aspera Connect User Guide

Aspera Connect User Guide Aspera Connect User Guide Windows XP/2003/Vista/2008/7 Browser: Firefox 2+, IE 6+ Version 2.3.1 Chapter 1 Chapter 2 Introduction Setting Up 2.1 Installation 2.2 Configure the Network Environment 2.3 Connect

More information

WhatsUp Gold v16.1 Installation and Configuration Guide

WhatsUp Gold v16.1 Installation and Configuration Guide WhatsUp Gold v16.1 Installation and Configuration Guide Contents Installing and Configuring Ipswitch WhatsUp Gold v16.1 using WhatsUp Setup Installing WhatsUp Gold using WhatsUp Setup... 1 Security guidelines

More information

Symantec AntiVirus Corporate Edition Patch Update

Symantec AntiVirus Corporate Edition Patch Update Symantec AntiVirus Corporate Edition Patch Update Symantec AntiVirus Corporate Edition Update Documentation version 10.0.1.1007 Copyright 2005 Symantec Corporation. All rights reserved. Symantec, the Symantec

More information

Bitrix Site Manager ASP.NET. Installation Guide

Bitrix Site Manager ASP.NET. Installation Guide Bitrix Site Manager ASP.NET Installation Guide Contents Introduction... 4 Chapter 1. Checking for IIS Installation... 5 Chapter 2. Using An Archive File to Install Bitrix Site Manager ASP.NET... 7 Preliminary

More information

Sharp Remote Device Manager (SRDM) Server Software Setup Guide

Sharp Remote Device Manager (SRDM) Server Software Setup Guide Sharp Remote Device Manager (SRDM) Server Software Setup Guide This Guide explains how to install the software which is required in order to use Sharp Remote Device Manager (SRDM). SRDM is a web-based

More information

ECA IIS Instructions. January 2005

ECA IIS Instructions. January 2005 ECA IIS Instructions January 2005 THIS PAGE INTENTIONALLY BLANK ECA IIS Instructions ii July 22, 2005 Table of Contents 1. Install Certificate in IIS 5.0... 1 2. Obtain and Install the ECA Root Certificate

More information

Installing and Configuring vcenter Multi-Hypervisor Manager

Installing and Configuring vcenter Multi-Hypervisor Manager Installing and Configuring vcenter Multi-Hypervisor Manager vcenter Server 5.1 vcenter Multi-Hypervisor Manager 1.1 This document supports the version of each product listed and supports all subsequent

More information

Installing and Configuring vcloud Connector

Installing and Configuring vcloud Connector Installing and Configuring vcloud Connector vcloud Connector 2.7.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new

More information

Sophos Mobile Control Installation guide. Product version: 3.5

Sophos Mobile Control Installation guide. Product version: 3.5 Sophos Mobile Control Installation guide Product version: 3.5 Document date: July 2013 Contents 1 Introduction...3 2 The Sophos Mobile Control server...4 3 Set up Sophos Mobile Control...10 4 External

More information

Contents 1. Introduction 2. Security Considerations 3. Installation 4. Configuration 5. Uninstallation 6. Automated Bulk Enrollment 7.

Contents 1. Introduction 2. Security Considerations 3. Installation 4. Configuration 5. Uninstallation 6. Automated Bulk Enrollment 7. Contents 1. Introduction 2. Security Considerations 3. Installation 4. Configuration 5. Uninstallation 6. Automated Bulk Enrollment 7. Troubleshooting Introduction Adaxes Self-Service Client provides secure

More information

Reconfiguring VMware vsphere Update Manager

Reconfiguring VMware vsphere Update Manager Reconfiguring VMware vsphere Update Manager vsphere Update Manager 6.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a

More information

Astaro Security Gateway V8. Remote Access via L2TP over IPSec Configuring ASG and Client

Astaro Security Gateway V8. Remote Access via L2TP over IPSec Configuring ASG and Client Astaro Security Gateway V8 Remote Access via L2TP over IPSec Configuring ASG and Client 1. Introduction This guide contains complementary information on the Administration Guide and the Online Help. If

More information

Lepide Active Directory Self Service. Installation Guide. Lepide Active Directory Self Service Tool. Lepide Software Private Limited Page 1

Lepide Active Directory Self Service. Installation Guide. Lepide Active Directory Self Service Tool. Lepide Software Private Limited Page 1 Installation Guide Lepide Active Directory Self Service Tool Lepide Software Private Limited Page 1 Lepide Software Private Limited, All Rights Reserved This User Guide and documentation is copyright of

More information

Sophos Cloud Migration Tool Help. Product version: 1.0

Sophos Cloud Migration Tool Help. Product version: 1.0 Sophos Cloud Migration Tool Help Product version: 1.0 Document date: June 2015 Contents 1 About the Sophos Cloud Migration Tool...4 2 How does Sophos Cloud differ from on-premise management?...5 3 How

More information

ACTIVE DIRECTORY DEPLOYMENT

ACTIVE DIRECTORY DEPLOYMENT ACTIVE DIRECTORY DEPLOYMENT CASAS Technical Support 800.255.1036 2009 Comprehensive Adult Student Assessment Systems. All rights reserved. Version 031809 CONTENTS 1. INTRODUCTION... 1 1.1 LAN PREREQUISITES...

More information

safend a w a v e s y s t e m s c o m p a n y

safend a w a v e s y s t e m s c o m p a n y safend a w a v e s y s t e m s c o m p a n y SAFEND Data Protection Suite Installation Guide Version 3.4.5 Important Notice This guide is delivered subject to the following conditions and restrictions:

More information

Setting Up SSL on IIS6 for MEGA Advisor

Setting Up SSL on IIS6 for MEGA Advisor Setting Up SSL on IIS6 for MEGA Advisor Revised: July 5, 2012 Created: February 1, 2008 Author: Melinda BODROGI CONTENTS Contents... 2 Principle... 3 Requirements... 4 Install the certification authority

More information

Remote Filtering Software

Remote Filtering Software Remote Filtering Software Websense Web Security Solutions v7.7-7.8 1996 2013, Websense, Inc. All rights reserved. 10240 Sorrento Valley Rd., San Diego, CA 92121, USA Published 2013 The products and/or

More information

Installation and Deployment

Installation and Deployment Installation and Deployment Help Documentation This document was auto-created from web content and is subject to change at any time. Copyright (c) 2016 SmarterTools Inc. Installation and Deployment SmarterStats

More information

SSL Intercept Mode. Certificate Installation Guide. Revision 1.0.0. Warning and Disclaimer

SSL Intercept Mode. Certificate Installation Guide. Revision 1.0.0. Warning and Disclaimer SSL Intercept Mode Certificate Installation Guide Revision 1.0.0 Warning and Disclaimer This document is designed to provide information about the configuration of CensorNet Professional. Every effort

More information

4cast Client Specification and Installation

4cast Client Specification and Installation 4cast Client Specification and Installation Version 2015.00 10 November 2014 Innovative Solutions for Education Management www.drakelane.co.uk System requirements The client requires Administrative rights

More information

Sophos Mobile Control Installation guide

Sophos Mobile Control Installation guide Sophos Mobile Control Installation guide Product version: 2.5 Document date: July 2012 Contents 1 Introduction... 3 2 The Sophos Mobile Control server... 4 3 Set up Sophos Mobile Control... 13 4 Running

More information

Configuration Guide. BES12 Cloud

Configuration Guide. BES12 Cloud Configuration Guide BES12 Cloud Published: 2016-04-08 SWD-20160408113328879 Contents About this guide... 6 Getting started... 7 Configuring BES12 for the first time...7 Administrator permissions you need

More information

Reference and Troubleshooting: FTP, IIS, and Firewall Information

Reference and Troubleshooting: FTP, IIS, and Firewall Information APPENDIXC Reference and Troubleshooting: FTP, IIS, and Firewall Information Although Cisco VXC Manager automatically installs and configures everything you need for use with respect to FTP, IIS, and the

More information

http://docs.trendmicro.com

http://docs.trendmicro.com Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the product, please review the readme files,

More information

DESLock+ Basic Setup Guide Version 1.20, rev: June 9th 2014

DESLock+ Basic Setup Guide Version 1.20, rev: June 9th 2014 DESLock+ Basic Setup Guide Version 1.20, rev: June 9th 2014 Contents Overview... 2 System requirements:... 2 Before installing... 3 Download and installation... 3 Configure DESLock+ Enterprise Server...

More information

Contents Notice to Users

Contents  Notice to Users Web Remote Access Contents Web Remote Access Overview... 1 Setting Up Web Remote Access... 2 Editing Web Remote Access Settings... 5 Web Remote Access Log... 7 Accessing Your Home Network Using Web Remote

More information

NSi Mobile Installation Guide. Version 6.2

NSi Mobile Installation Guide. Version 6.2 NSi Mobile Installation Guide Version 6.2 Revision History Version Date 1.0 October 2, 2012 2.0 September 18, 2013 2 CONTENTS TABLE OF CONTENTS PREFACE... 5 Purpose of this Document... 5 Version Compatibility...

More information

SafeGuard Enterprise Web Helpdesk. Product version: 6 Document date: February 2012

SafeGuard Enterprise Web Helpdesk. Product version: 6 Document date: February 2012 SafeGuard Enterprise Web Helpdesk Product version: 6 Document date: February 2012 Contents 1 SafeGuard web-based Challenge/Response...3 2 Installation...5 3 Authentication...8 4 Select the Web Helpdesk

More information

Polycom CMA System Upgrade Guide

Polycom CMA System Upgrade Guide Polycom CMA System Upgrade Guide 5.0 May 2010 3725-77606-001C Trademark Information Polycom, the Polycom Triangles logo, and the names and marks associated with Polycom s products are trademarks and/or

More information

http://docs.trendmicro.com/en-us/smb/hosted-email-security.aspx

http://docs.trendmicro.com/en-us/smb/hosted-email-security.aspx Trend Micro Incorporated reserves the right to make changes to this document and to the product described herein without notice. Before installing and using the product, review the readme files, release

More information

Windows Server Update Services 3.0 SP2 Step By Step Guide

Windows Server Update Services 3.0 SP2 Step By Step Guide Windows Server Update Services 3.0 SP2 Step By Step Guide Microsoft Corporation Author: Anita Taylor Editor: Theresa Haynie Abstract This guide provides detailed instructions for installing Windows Server

More information

FTP, IIS, and Firewall Reference and Troubleshooting

FTP, IIS, and Firewall Reference and Troubleshooting FTP, IIS, and Firewall Reference and Troubleshooting Although Cisco VXC Manager automatically installs and configures everything you need for use with respect to FTP, IIS, and the Windows Firewall, the

More information

System Administration Training Guide. S100 Installation and Site Management

System Administration Training Guide. S100 Installation and Site Management System Administration Training Guide S100 Installation and Site Management Table of contents System Requirements for Acumatica ERP 4.2... 5 Learning Objects:... 5 Web Browser... 5 Server Software... 5

More information

WS_FTP Server. User s Guide. Software Version 3.1. Ipswitch, Inc.

WS_FTP Server. User s Guide. Software Version 3.1. Ipswitch, Inc. User s Guide Software Version 3.1 Ipswitch, Inc. Ipswitch, Inc. Phone: 781-676-5700 81 Hartwell Ave Web: http://www.ipswitch.com Lexington, MA 02421-3127 The information in this document is subject to

More information

Sophos Mobile Control Installation guide. Product version: 3

Sophos Mobile Control Installation guide. Product version: 3 Sophos Mobile Control Installation guide Product version: 3 Document date: January 2013 Contents 1 Introduction...3 2 The Sophos Mobile Control server...4 3 Set up Sophos Mobile Control...16 4 External

More information

If you have questions or find errors in the guide, please, contact us under the following e-mail address:

If you have questions or find errors in the guide, please, contact us under the following e-mail address: 1. Introduction... 2 2. Remote Access via PPTP... 2 2.1. Configuration of the Astaro Security Gateway... 3 2.2. Configuration of the Remote Client...10 2.2.1. Astaro User Portal: Getting Configuration

More information

Sage 200 Web Time & Expenses Guide

Sage 200 Web Time & Expenses Guide Sage 200 Web Time & Expenses Guide Sage (UK) Limited Copyright Statement Sage (UK) Limited, 2006. All rights reserved If this documentation includes advice or information relating to any matter other than

More information

Aspera Connect 2.4.7. Linux 32/64-bit. Document Version: 1

Aspera Connect 2.4.7. Linux 32/64-bit. Document Version: 1 Aspera Connect 2.4.7 Linux 32/64-bit Document Version: 1 2 Contents Contents Introduction... 3 Setting Up... 4 Upgrading from a Previous Version...4 Installation... 4 Set Up Network Environment... 5 Basic

More information

Enterprise Manager. Version 6.2. Installation Guide

Enterprise Manager. Version 6.2. Installation Guide Enterprise Manager Version 6.2 Installation Guide Enterprise Manager 6.2 Installation Guide Document Number 680-028-014 Revision Date Description A August 2012 Initial release to support version 6.2.1

More information

Secure Web Appliance. SSL Intercept

Secure Web Appliance. SSL Intercept Secure Web Appliance SSL Intercept Table of Contents 1. Introduction... 1 1.1. About CYAN Secure Web Appliance... 1 1.2. About SSL Intercept... 1 1.3. About this Manual... 1 1.3.1. Document Conventions...

More information

Investment Management System. Connectivity Guide. IMS Connectivity Guide Page 1 of 11

Investment Management System. Connectivity Guide. IMS Connectivity Guide Page 1 of 11 Investment Management System Connectivity Guide IMS Connectivity Guide Page 1 of 11 1. Introduction This document details the necessary steps and procedures required for organisations to access the Homes

More information

2X Cloud Portal v10.5

2X Cloud Portal v10.5 2X Cloud Portal v10.5 URL: www.2x.com E-mail: info@2x.com Information in this document is subject to change without notice. Companies, names, and data used in examples herein are fictitious unless otherwise

More information

Secure Web Service - Hybrid. Policy Server Setup. Release 9.2.5 Manual Version 1.01

Secure Web Service - Hybrid. Policy Server Setup. Release 9.2.5 Manual Version 1.01 Secure Web Service - Hybrid Policy Server Setup Release 9.2.5 Manual Version 1.01 M86 SECURITY WEB SERVICE HYBRID QUICK START USER GUIDE 2010 M86 Security All rights reserved. 828 W. Taft Ave., Orange,

More information

Sophos Mobile Control Installation guide. Product version: 3.6

Sophos Mobile Control Installation guide. Product version: 3.6 Sophos Mobile Control Installation guide Product version: 3.6 Document date: November 2013 Contents 1 Introduction...3 2 The Sophos Mobile Control server...5 3 Set up Sophos Mobile Control...11 4 External

More information

Sophos UTM. Remote Access via IPsec Configuring Remote Client

Sophos UTM. Remote Access via IPsec Configuring Remote Client Sophos UTM Remote Access via IPsec Configuring Remote Client Product version: 9.300 Document date: Tuesday, October 14, 2014 The specifications and information in this document are subject to change without

More information

File Management Utility User Guide

File Management Utility User Guide File Management Utility User Guide Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held

More information

PartnerConnect software. Installation guide

PartnerConnect software. Installation guide PartnerConnect software Installation guide 2012 Welch Allyn. All rights are reserved. To support the intended use of the product described in this publication, the purchaser of the product is permitted

More information

USER GUIDE WEB-BASED SYSTEM CONTROL APPLICATION. www.pesa.com August 2014 Phone: 256.726.9200. Publication: 81-9059-0703-0, Rev. C

USER GUIDE WEB-BASED SYSTEM CONTROL APPLICATION. www.pesa.com August 2014 Phone: 256.726.9200. Publication: 81-9059-0703-0, Rev. C USER GUIDE WEB-BASED SYSTEM CONTROL APPLICATION Publication: 81-9059-0703-0, Rev. C www.pesa.com Phone: 256.726.9200 Thank You for Choosing PESA!! We appreciate your confidence in our products. PESA produces

More information

Web Remote Access. User Guide

Web Remote Access. User Guide Web Remote Access User Guide Notice to Users 2005 2Wire, Inc. All rights reserved. This manual in whole or in part, may not be reproduced, translated, or reduced to any machine-readable form without prior

More information

Troubleshooting File and Printer Sharing in Microsoft Windows XP

Troubleshooting File and Printer Sharing in Microsoft Windows XP Operating System Troubleshooting File and Printer Sharing in Microsoft Windows XP Microsoft Corporation Published: November 2003 Updated: August 2004 Abstract File and printer sharing for Microsoft Windows

More information

2X ApplicationServer & LoadBalancer Manual

2X ApplicationServer & LoadBalancer Manual 2X ApplicationServer & LoadBalancer Manual 2X ApplicationServer & LoadBalancer Contents 1 URL: www.2x.com E-mail: info@2x.com Information in this document is subject to change without notice. Companies,

More information

NTI Backup Now EZ v2 User s Guide

NTI Backup Now EZ v2 User s Guide NTI Backup Now EZ v2 User s Guide GMAA00423010 11/12 2 Copyright statement This guide is copyrighted by Toshiba Corporation with all rights reserved. Under the copyright laws, this guide cannot be reproduced

More information

M86 Web Filter USER GUIDE for M86 Mobile Security Client. Software Version: 5.0.00 Document Version: 02.01.12

M86 Web Filter USER GUIDE for M86 Mobile Security Client. Software Version: 5.0.00 Document Version: 02.01.12 M86 Web Filter USER GUIDE for M86 Mobile Security Client Software Version: 5.0.00 Document Version: 02.01.12 M86 WEB FILTER USER GUIDE FOR M86 MOBILE SECURITY CLIENT 2012 M86 Security All rights reserved.

More information

DameWare Server. Administrator Guide

DameWare Server. Administrator Guide DameWare Server Administrator Guide About DameWare Contact Information Team Contact Information Sales 1.866.270.1449 General Support Technical Support Customer Service User Forums http://www.dameware.com/customers.aspx

More information

TIBCO Spotfire Automation Services 6.5. Installation and Deployment Manual

TIBCO Spotfire Automation Services 6.5. Installation and Deployment Manual TIBCO Spotfire Automation Services 6.5 Installation and Deployment Manual Revision date: 17 April 2014 Important Information SOME TIBCO SOFTWARE EMBEDS OR BUNDLES OTHER TIBCO SOFTWARE. USE OF SUCH EMBEDDED

More information

Reconfiguring VMware vsphere Update Manager

Reconfiguring VMware vsphere Update Manager Reconfiguring VMware vsphere Update Manager vsphere Update Manager 5.5 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a

More information

Installation Guide for Pulse on Windows Server 2008R2

Installation Guide for Pulse on Windows Server 2008R2 MadCap Software Installation Guide for Pulse on Windows Server 2008R2 Pulse Copyright 2014 MadCap Software. All rights reserved. Information in this document is subject to change without notice. The software

More information

Legal Notes. Regarding Trademarks. 2012 KYOCERA Document Solutions Inc.

Legal Notes. Regarding Trademarks. 2012 KYOCERA Document Solutions Inc. Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held liable for any problems arising from

More information

NetWrix Password Manager. Quick Start Guide

NetWrix Password Manager. Quick Start Guide NetWrix Password Manager Quick Start Guide Contents Overview... 3 Setup... 3 Deploying the Core Components... 3 System Requirements... 3 Installation... 4 Windows Server 2008 Notes... 4 Upgrade Path...

More information

What Is Ad-Aware Update Server?

What Is Ad-Aware Update Server? Contents What Is Ad-Aware Update Server?...2 Installation and Removal...3 System Requirements...3 Obtaining the Installation File...3 Installing Ad-Aware Update Server...3 Upgrade...4 Repairing, Modifying

More information

Last modified on 03-01-2010 for application version 4.4.4

Last modified on 03-01-2010 for application version 4.4.4 Last modified on 03-01-2010 for application version 4.4.4 RemotePC User Manual Table of Contents Introduction... 3 Features... 3 Install the Remote Access Host application... 4 Install the Remote Access

More information

HELP DOCUMENTATION E-SSOM DEPLOYMENT GUIDE

HELP DOCUMENTATION E-SSOM DEPLOYMENT GUIDE HELP DOCUMENTATION E-SSOM DEPLOYMENT GUIDE Copyright 1998-2013 Tools4ever B.V. All rights reserved. No part of the contents of this user guide may be reproduced or transmitted in any form or by any means

More information

http://downloadcenter.trendmicro.com/

http://downloadcenter.trendmicro.com/ Trend Micro Incorporated reserves the right to make changes to this document and to the product described herein without notice. Before installing and using the product, review the readme files, release

More information

Installing and Configuring WhatsUp Gold

Installing and Configuring WhatsUp Gold Installing and Configuring WhatsUp Gold This guide provides information about installing and configuring WhatsUp Gold v14.2, including instructions on how to run the WhatsUp web interface through an Internet

More information

Reconfiguring VMware vsphere Update Manager

Reconfiguring VMware vsphere Update Manager Reconfiguring VMware vsphere Update Manager vsphere Update Manager 6.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a

More information

Sophos UTM. Remote Access via PPTP Configuring Remote Client

Sophos UTM. Remote Access via PPTP Configuring Remote Client Sophos UTM Remote Access via PPTP Configuring Remote Client Product version: 9.300 Document date: Tuesday, October 14, 2014 The specifications and information in this document are subject to change without

More information

MadCap Software. Upgrading Guide. Pulse

MadCap Software. Upgrading Guide. Pulse MadCap Software Upgrading Guide Pulse Copyright 2014 MadCap Software. All rights reserved. Information in this document is subject to change without notice. The software described in this document is furnished

More information

Lepide Software. LepideAuditor for File Server [CONFIGURATION GUIDE] This guide informs How to configure settings for first time usage of the software

Lepide Software. LepideAuditor for File Server [CONFIGURATION GUIDE] This guide informs How to configure settings for first time usage of the software Lepide Software LepideAuditor for File Server [CONFIGURATION GUIDE] This guide informs How to configure settings for first time usage of the software Lepide Software Private Limited, All Rights Reserved

More information

Using VMware Identity Manager Apps Portal

Using VMware Identity Manager Apps Portal Using VMware Identity Manager Apps Portal VMware Identity Manager 2.4 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a

More information

NeuralStar Installation Guide

NeuralStar Installation Guide NeuralStar Installation Guide Version 9.8 Release 2 October 2011 1st Edition Preface Software License Agreement Software is defined as the Kratos Technology & Training Solutions, Inc. computer programs

More information

Connection and Printer Setup Guide

Connection and Printer Setup Guide Connection and Printer Setup Guide For connection issues, see the following sections of this document: "Connection Requirements" on page 1 "Log on" on page 2 "Troubleshooting Your Connection" on page 4

More information

Installation & Activation Guide. Lepide Active Directory Self Service

Installation & Activation Guide. Lepide Active Directory Self Service Installation & Activation Guide Lepide Active Directory Self Service , All Rights Reserved This User Guide and documentation is copyright of Lepide Software Private Limited, with all rights reserved under

More information

Setting Up a Unisphere Management Station for the VNX Series P/N 300-011-796 Revision A01 January 5, 2010

Setting Up a Unisphere Management Station for the VNX Series P/N 300-011-796 Revision A01 January 5, 2010 Setting Up a Unisphere Management Station for the VNX Series P/N 300-011-796 Revision A01 January 5, 2010 This document describes the different types of Unisphere management stations and tells how to install

More information

http://docs.trendmicro.com

http://docs.trendmicro.com Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the product, please review the readme files,

More information

CTERA Agent for Mac OS-X

CTERA Agent for Mac OS-X User Guide CTERA Agent for Mac OS-X June 2014 Version 4.1 Copyright 2009-2014 CTERA Networks Ltd. All rights reserved. No part of this document may be reproduced in any form or by any means without written

More information

NETWRIX WINDOWS SERVER CHANGE REPORTER

NETWRIX WINDOWS SERVER CHANGE REPORTER NETWRIX WINDOWS SERVER CHANGE REPORTER INSTALLATION AND CONFIGURATION GUIDE Product Version: 4.0 March 2013. Legal Notice The information in this publication is furnished for information use only, and

More information

DESlock+ Basic Setup Guide ENTERPRISE SERVER ESSENTIAL/STANDARD/PRO

DESlock+ Basic Setup Guide ENTERPRISE SERVER ESSENTIAL/STANDARD/PRO DESlock+ Basic Setup Guide ENTERPRISE SERVER ESSENTIAL/STANDARD/PRO Contents Overview...1 System requirements...1 Enterprise Server:...1 Client PCs:...1 Section 1: Before installing...1 Section 2: Download

More information

AVG Business SSO Partner Getting Started Guide

AVG Business SSO Partner Getting Started Guide AVG Business SSO Partner Getting Started Guide Table of Contents Overview... 2 Getting Started... 3 Web and OS requirements... 3 Supported web and device browsers... 3 Initial Login... 4 Navigation in

More information

NETWRIX EVENT LOG MANAGER

NETWRIX EVENT LOG MANAGER NETWRIX EVENT LOG MANAGER ADMINISTRATOR S GUIDE Product Version: 4.0 July/2012. Legal Notice The information in this publication is furnished for information use only, and does not constitute a commitment

More information

Installing and Configuring vcloud Connector

Installing and Configuring vcloud Connector Installing and Configuring vcloud Connector vcloud Connector 2.0.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new

More information

Digipass Plug-In for IAS. IAS Plug-In IAS. Microsoft's Internet Authentication Service. Installation Guide

Digipass Plug-In for IAS. IAS Plug-In IAS. Microsoft's Internet Authentication Service. Installation Guide Digipass Plug-In for IAS IAS Plug-In IAS Microsoft's Internet Authentication Service Installation Guide Disclaimer of Warranties and Limitations of Liabilities Disclaimer of Warranties and Limitations

More information

Using Logon Agent for Transparent User Identification

Using Logon Agent for Transparent User Identification Using Logon Agent for Transparent User Identification Websense Logon Agent (also called Authentication Server) identifies users in real time, as they log on to domains. Logon Agent works with the Websense

More information

Net Protector Admin Console

Net Protector Admin Console Net Protector Admin Console USER MANUAL www.indiaantivirus.com -1. Introduction Admin Console is a Centralized Anti-Virus Control and Management. It helps the administrators of small and large office networks

More information

For Active Directory Installation Guide

For Active Directory Installation Guide For Active Directory Installation Guide Version 2.5.2 April 2010 Copyright 2010 Legal Notices makes no representations or warranties with respect to the contents or use of this documentation, and specifically

More information

Dell SupportAssist Version 2.0 for Dell OpenManage Essentials Quick Start Guide

Dell SupportAssist Version 2.0 for Dell OpenManage Essentials Quick Start Guide Dell SupportAssist Version 2.0 for Dell OpenManage Essentials Quick Start Guide Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your computer.

More information

NETWORK PRINT MONITOR User Guide

NETWORK PRINT MONITOR User Guide NETWORK PRINT MONITOR User Guide Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held liable

More information

Exclaimer Mail Archiver

Exclaimer Mail Archiver Deployment Guide - Outlook Add-In www.exclaimer.com Contents About This Guide... 3 System Requirements... 4 Software... 4 Installation Files... 5 Deployment Preparation... 6 Installing the Add-In Manually...

More information

Oracle WebCenter Content Service for Microsoft Exchange

Oracle WebCenter Content Service for Microsoft Exchange Oracle WebCenter Content Service for Microsoft Exchange Installation and Upgrade Guide 10g Release 3 (10.3) November 2008 Oracle WebCenter Content Service for Microsoft Exchange Installation and Upgrade

More information