UP L17 Virtualization: Security Without Sacrificing Performance
|
|
- Chad McCarthy
- 8 years ago
- Views:
Transcription
1 UP L17 Virtualization: Security Without Sacrificing Performance Hands on lab Description In this hands on lab you will learn how to optimize SEP 12 for your virtual desktops to get maximum protection without sacrificing performance. This Lab requires some knowledge of the VMware vsphere technology and console At the end of this lab, you should be able to Configure Shared insight cache with vshield integration Configure Virtual image exception Know the benefit of: o o Shared Insight Cache Virtual Exception Work with counters and reports in vsphere and SEPM Understand Symantec s approach to securing virtual endpoints Notes A brief presentation will introduce this lab session and discuss key concepts. The lab will be directed and provide you with step-by-step walkthroughs of key features. Feel free to follow the lab using the instructions on the following pages. You can optionally perform this lab at your own pace. Be sure to ask your instructor any questions you may have. Thank you for coming to our lab session. Page 1 Of 18
2 In this lab we will focus on the added benefit of Symantec virtualization tools introduced in SEP This guide will show you the steps to configure and observe the effects of the configuration on a vsphere 5.1 environment. All steps are made from the VCENTER Virtual machine in vmware workstation; you can expand to full screen this machine for better visibility using the full screen icon: This lab is conducted like a benchmark; ensure to follow instructions about powering on and off VM inside ESX to get the best measure of performance. All accounts are similar for VMware, and windows: User: administrator Password: Symc4now! The account for the SEP Management console is: User: admin Password: Symc4now! Launch Clients A+B Page 2 of 18
3 Open the vsphere client and navigate to the inventory tab>host and clusters. On the left hand side click on Win7- A then click on the power button. Repeat these steps for Win7- B Open the SEPM VM Click on the SEPM VM and select the console tab. Right click on the SEPM VM as illustrated and select Guest>Send Ctrl+Alt+Del. Click then on the password field for administrator and enter the password: Symc4now! Open the SEPM Console Double click on the desktop shortcut to launch the SEPM console. Enter the following credentials: User name: admin Page 3 of 18
4 Password: Symc4now! Click Log On. Edit the antivirus and antispyware policy to enable vshield Enabled Shared insight cache Click the Policy tab then select the Virus and Spyware Protection section. Finally click the balanced security policy (1st on the list). Locate and configure the vsic settings in the policy Page 4 of 18
5 Click on Miscellaneous, Select the shared insight cache tab and enable the feature using VMware vshield. Click OK to save and close the policy. Control the vsic cache content Shared insight cache applies only to scheduled and on- demand scans, therefore the cache should be empty until we trigger a scan on one of the VM hosted on this ESX node. Click Monitor>Security virtual appliance. Highlight the symantec- sva server and click details. All counters should be set to 0. Page 5 of 18
6 Control the policy serial number on the SEPM Every modification of settings generates a new version of the policy. In order to keep track SEPM assign a unique serial number for the said policy. Click the Clients tab> click the VM group and take note of the policy serial number on the console's top right side. Page 6 of 18
7 Verify the policy on the win7- A client On the vsphere client, select the win7- A client and click the console view. If prompted for credentials use the followings: User: administrator Password: Symc4now! Double click the Symantec shield on the system tray (beside the clock) to open the SEP client interface. Click help >Troubleshooting and check if the policy serial number matches the one on the SEPM. Page 7 of 18
8 Launch a manual scan on the Win7- A client Click on Scan for Threats > Run Full Scan. Let the scan complete. While the scan is running look on the bottom right corner of the scan dialogue box for trusted file counter. This counter is an aggregate of scan trusted by our reputation technology, shared insight cache and Virtual image exception. Monitor the disk usage on the ESX host Switch to the vsphere client and click on the ESX Host. Select the performance tab and click advanced. Finally from the dropdown menu select Disk. The graph indicates disk usage over time. This gives you an indication about the intensity of I/O related to the scan, which are running, and the duration of that scan. Going Further (optional): You can also monitor the network usage on the Symantec- SVA by clicking the VM on the left then choose the performance tab and select Networking from the drop down menu. Click then on the Network usage counter. Page 8 of 18
9 Note the final results from the win7- A client Once the scan is completed on win7- A take note of the number of trusted files. Shutdown win7- A Page 9 of 18
10 Observe the Shared insight cache counters on the SEPM Open the SEPM console and click on Monitor, Select the Security Virtual Appliance tab. Select Symantec- sva and click details. Note the amount of items in the cache. Note the amount of cache request. Page 10 of 18
11 Win7- B Virus definitions check Ensure the virus definition date and revision match the one used on win7- A. Shared insight cache only optimize scan for system using the same set of definitions. Open the SEP client interface by double clicking on the SEP shield in the system tray, Scan on Win7- B Launch a scan on the win7- B client and check the progress by monitoring the trusted files counter. Page 11 of 18
12 Observe the trusted file counter Once the scan on win7- B completed note the amount of scanned files and trusted files. Since Win7- A already cached most of the files Win7- B didn't have to scan most of the files on the drive. Shutdown win7- B and power on Win7- C Page 12 of 18
13 Observe the Shared insight cache counters on the SEPM The request number should have increased drastically while the number of files in the scan cache remains roughly the same. Page 13 of 18
14 Looking at the performance counters (Disk & CPU) On the vsphere client click on the ESX host and select the performance tab. Click Advanced and select Disk from the drop down menu. Then on the bottom of the graph looks at the read and write rate. You should see 2 peeks corresponding to the 2 scans. The height indicates the intensity of I/O requests and the horizontal axis represents the duration of these requests. You can notice that the second scan is shorter and less intensive. Switch the dropdown menu to CPU and observe the intensity and duration of CPU usage for the 2 scans. Feel free to explore the performance tab on the VM individually and on the ESX node to see resource usage per VM and overall. Page 14 of 18
15 Configuring Virtual Image Exception The Win7- C client has been pre- configured with VIETOOL, in order to whitelist all of the files present in the base image: Windows+SEP+all remaining file when the tool ran. We will now enable the SEP policy to use this technology. Select the SEPM VM and click the console tab. Open the SEPM console (if you closed it previously). Login with the credentials: User: admin Password:Symc4now! Click the policy tab and open the balanced Virus and spyware protection policy. Within the policy click Miscellaneous then select the Virtual Image tab. Check the 2 boxes. Click ok to save the policy. Launch a scan on win7- C Page 15 of 18
16 As in previous tests, look for the trusted file counter. This time the amount of files scanned and the trusted should almost match. Page 16 of 18
17 Scan duration comparison Using SEPM reporting you will now compare the scan length and numbers of files effectively scanned for each of the tests we ran. Win7- A ==> baseline scan Win7- B ==> vsic optimized scan Win7- C ==> vsic+vie optimizations Switch to the console view for the VM SEPM. Click Monitor and select the log tab. From the first dropdown menu select Scans Click advanced and set a filter for completed scans Click View log to launch the query. Page 17 of 18
18 This screenshot is for illustration purpose only. Look at the numbers on your lab machine for accurate reporting. This concludes the lab. Thank you for taking the time exploring our product. Do not forget to fill the survey about this session, when instructed. Page 18 of 18
GRAVITYZONE UNIFIED SECURITY MANAGEMENT. Use Cases for Beta Testers
GRAVITYZONE UNIFIED SECURITY MANAGEMENT Use Cases for Beta Testers Introduction This document provides beta testers with guidelines for testing Bitdefender GravityZone solutions. To send your feedback,
More informationAcronis Backup & Recovery 10 Advanced Server Virtual Edition. Quick Start Guide
Acronis Backup & Recovery 10 Advanced Server Virtual Edition Quick Start Guide Table of contents 1 Main components...3 2 License server...3 3 Supported operating systems...3 3.1 Agents... 3 3.2 License
More informationSymantec PGP Whole Disk Encryption Hands-On Lab V 3.7
Symantec PGP Whole Disk Encryption Hands-On Lab V 3.7 Description This hands-on lab session covers the hard drive encryption technologies from PGP. Students will administer a typical Whole Disk Encryption
More information1. Cloud Data Center... 1. 2. Login to ICT Marketplace Portal... 1. 3. Dashboard... 2. 3. Data center management... 3. 3.1. New data center...
Contents 1. Cloud Data Center... 1 2. Login to ICT Marketplace Portal... 1 3. Dashboard... 2 3. Data center management... 3 3.1. New data center... 3 4. View Data Centers... 6 5. Remove Data Centers...
More informationIT-ADVENTURES PLAYGROUND (ISERINK) Remote Setup Guide IOWA STATE UNIVERSITY INFORMATION ASSURANCE CENTER
IT-ADVENTURES PLAYGROUND (ISERINK) Remote Setup Guide IOWA STATE UNIVERSITY INFORMATION ASSURANCE CENTER Spring 2014 Gaining access to your systems Since ISERink runs on a simulated internet provided by
More informationvcloud Suite Licensing
vcloud Suite 5.5 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of this
More informationUP L18 Enhanced MDM and Updated Email Protection Hands-On Lab
UP L18 Enhanced MDM and Updated Email Protection Hands-On Lab Description The Symantec App Center platform continues to expand it s offering with new enhanced support for native agent based device management
More informationCreating a Patch Management Dashboard with IT Analytics Hands-On Lab
Creating a Patch Management Dashboard with IT Analytics Hands-On Lab Description This lab provides a hands-on overview of the IT Analytics Solution. Students will learn how to browse cubes and configure
More informationQuarantine Network for Specialised Equipment.
Quarantine Network for Specialised Equipment. Using Remote Desktop to get data in and out of the quarantine network V1.2 It is now possible to connect through a gateway or terminal server to PCs connected
More informationEML-09 Keeping Operating Systems and Applications up to date with Patch Management 7.1
EML-09 Keeping Operating Systems and Applications up to date with Patch Management 7.1 Description Maintianing consistant and current patch status is a critical part of any security strategy. In this lab,
More informationMacs are not directly compatible with Noetix.
Those that use Macintosh computers to access Noetix cannot directly access Noetix through http://www.sandiego.edu/noetix. If one is on a Mac and goes to Noetix directly in a web browser, the page is likely
More informationIntegrating Trend Micro OfficeScan 10 EventTracker v7.x
Integrating Trend Micro OfficeScan 10 EventTracker v7.x Publication Date: August 26, 2015 EventTracker 8815 Centre Park Drive Columbia MD 21045 www.eventtracker.com Abstract This guide will help you in
More informationSonicWALL Security Dashboard
Document Scope This document describes how to use the feature on a SonicWALL security appliance running SonicOS 3.8 firmware or later. This document contains the following sections: Overview section on
More informationPOD INSTALLATION AND CONFIGURATION GUIDE. EMC CIS Series 1
POD INSTALLATION AND CONFIGURATION GUIDE EMC CIS Series 1 Document Version: 2015-01-26 Installation of EMC CIS Series 1 virtual pods as described this guide, requires that your NETLAB+ system is equipped
More informationUsing Protection Engine for Cloud Services for URL Filtering, Malware Protection and Proxy Integration Hands-On Lab
Using Protection Engine for Cloud Services for URL Filtering, Malware Protection and Proxy Integration Hands-On Lab Description In this hands-on session, you will learn how to turn your proxy into a security
More informationData Center Connector for vsphere 3.0.0
Product Guide Data Center Connector for vsphere 3.0.0 For use with epolicy Orchestrator 4.6.0, 5.0.0 Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS
More informationVirtualXP Users Guide
VirtualXP Users Guide Contents Chapter 1: Introduction... 2 Chapter 2: Install and Uninstall VirtualXP... 3 2.1 System Requirement... 3 2.2 Installing VirtualXP... 3 2.3 Uninstalling VirtualXP... 3 Chapter
More informationQuick Start Guide. for Installing vnios Software on. VMware Platforms
Quick Start Guide for Installing vnios Software on VMware Platforms Copyright Statements 2010, Infoblox Inc. All rights reserved. The contents of this document may not be copied or duplicated in any form,
More informationWeb based training for field technicians can be arranged by calling 888-577-4919 These Documents are required for a successful install:
Software V NO. 1.7 Date 9/06 ROI Configuration Guide Before you begin: Note: It is important before beginning to review all installation documentation and to complete the ROI Network checklist for the
More informationEM L12 Symantec Mobile Management and Managed PKI Hands-On Lab
EM L12 Symantec Mobile Management and Managed PKI Hands-On Lab Description Building and Managing a Certficate Authority infrastructure to support your Mobile Management infrastructure can be time consuming
More informationOUTLOOK ANYWHERE CONNECTION GUIDE FOR USERS OF OUTLOOK 2010
OUTLOOK ANYWHERE CONNECTION GUIDE FOR USERS OF OUTLOOK 2010 CONTENTS What is Outlook Anywhere? Before you begin How do I configure Outlook Anywhere with Outlook 2010? How do I use Outlook Anywhere? I already
More informationSystem Monitoring and Reporting
This chapter contains the following sections: Dashboard, page 1 Summary, page 2 Inventory Management, page 3 Resource Pools, page 4 Clusters, page 4 Images, page 4 Host Nodes, page 6 Virtual Machines (VMs),
More informationLogMeIn Network Console Version 8 Getting Started Guide
LogMeIn Network Console Version 8 Getting Started Guide April 2007 1. About the Network Console... 2 2. User Interface...2 3. Quick Start... 2 4. Network & Subnet Scans...3 5. Quick Connect...3 6. Operations...
More informationUPL09 Reporting on Software License Compliance Hands-On Lab
UPL09 Reporting on Software License Compliance Hands-On Lab Description Explore various methodologies that can be utilized to extend the outof-the-box supported software license compliance and tracking
More informationSymantec Endpoint Protection End-User Guide For MacOS X
Symantec Endpoint Protection End-User Guide For MacOS X Symantec Endpoint Protection (SEP) is the evolutionary successor to Symantec Anti-Virus (SAV). SEP provides the anti-virus protection of SAV and
More informationEM L18 Managing ios and Android Mobile Devices with Symantec Mobile Management Hands-On Lab
EM L18 Managing ios and Android Mobile Devices with Symantec Mobile Management Hands-On Lab Description The Symantec Mobile Management platform continues to expand it s offering with new support for native
More informationIntegrating Symantec Endpoint Protection
Integrating Symantec Endpoint Protection EventTracker Version 7.x Publication Date: Nov 8, 2013 EventTracker 8815 Centre Park Drive Columbia MD 21045 www.eventtracker.com About this Guide This guide provides
More informationMcAfee MOVE AntiVirus Multi-Platform 3.5.0
Product Guide McAfee MOVE AntiVirus Multi-Platform 3.5.0 For use with epolicy Orchestrator 4.6.7, 4.6.8, 5.1.0 Software COPYRIGHT Copyright 2014 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS
More informationNetwork Connect Installation and Usage Guide
Network Connect Installation and Usage Guide I. Installing the Network Connect Client..2 II. Launching Network Connect from the Desktop.. 9 III. Launching Network Connect Pre-Windows Login 11 IV. Installing
More informationActive Directory Integration
January 11, 2011 Author: Audience: SWAT Team Evaluator Product: Cymphonix Network Composer EX Series, XLi OS version 9 Active Directory Integration The following steps will guide you through the process
More informationConfiguring a Custom Load Evaluator Use the XenApp1 virtual machine, logged on as the XenApp\administrator user for this task.
Lab 8 User name: Administrator Password: Password1 Contents Exercise 8-1: Assigning a Custom Load Evaluator... 1 Scenario... 1 Configuring a Custom Load Evaluator... 1 Assigning a Load Evaluator to a Server...
More informationUsing Remote Desktop with the Cisco AnyConnect VPN Client in Windows Vista
Using Remote Desktop with the Cisco AnyConnect VPN Client in Windows Vista 1. In order to use Remote Desktop and the VPN client, users must first complete the Blackboard Remote Users training course and
More informationSevOne NMS Download Installation and Implementation Guide
SevOne NMS Download Installation and Implementation Guide 5.3.X 530 V0002 Contents 1. Get Started... 3 2. SevOne Download Installation... 6 3. Appliance Network Configuration... 9 4. Install License and
More informationHDA Integration Guide. Help Desk Authority 9.0
HDA Integration Guide Help Desk Authority 9.0 2011ScriptLogic Corporation ALL RIGHTS RESERVED. ScriptLogic, the ScriptLogic logo and Point,Click,Done! are trademarks and registered trademarks of ScriptLogic
More informationEML 03 Best Practices for Policy Management in Client Management Suite Hands-On Lab
EML 03 Best Practices for Policy Management in Client Management Suite Hands-On Lab Description If you are new to the Symantec Management Technologies or are just looking to reinforce your existing knowledge
More informationManaged Security Web Portal USER GUIDE
Managed Security Web Portal USER GUIDE CONTENTS 1.0 Introduction 4 2.0 Login 4 3.0 Portal Layout 4 3.1 Home Tab 5 3.2 Web Filtering Tab 5 3.3 SSL VPN Users Tab 6 4.0 Web Filtering Administration 7 4.1
More informationDeep Freeze and Microsoft System Center Configuration Manager 2012 Integration
1 Deep Freeze and Microsoft System Center Configuration Manager 2012 Integration Technical Paper Last modified: May 2015 Web: www.faronics.com Email: sales@faronics.com Phone: 800-943-6422 or 604-637-3333
More informationHow to use SURA in three simple steps:
How to use SURA in three simple steps: Most of SURA s functionality can be accessed through these three steps. 1) Download SURA to your computer Go to the SU Downloads page to obtain the SURA utility.
More informationEM L09 Simplify IT with Creative Ways to Leverage Dashboards, Reports and Workflows Hands-On Lab
EM L09 Simplify IT with Creative Ways to Leverage Dashboards, Reports and Workflows Hands-On Lab Description Operationally many IT departments are flooded with things to do," and with every additional
More informationecstudent-ts Terminal Server How to Use
ecstudent-ts Terminal Server How to Use Connect to Cisco Any Connect Connect to Terminal Server, Set Options to Use Home Computer Files, Printers, Clipboard Use Network Folders Copy Files from Network
More informationEM L05 Managing ios and Android Mobile Devices with Symantec Mobile Management Hands-On Lab
EM L05 Managing ios and Android Mobile Devices with Symantec Mobile Management Hands-On Lab Description The Symantec Mobile Management platform continues to expand it s offering with new support for native
More informationUP L04 Introduction to 3 rd Party Patching Using the 4A Model Hands-On Lab
UP L04 Introduction to 3 rd Party Patching Using the 4A Model Hands-On Lab Description The objective of this course is to introduce students to the various concepts of 3rd party patching. Students will
More informationGRAVITYZONE HERE. Deployment Guide VLE Environment
GRAVITYZONE HERE Deployment Guide VLE Environment LEGAL NOTICE All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means, electronic or mechanical, including
More informationTECHNICAL TRAINING LAB INSTRUCTIONS
In this lab you will learn how to login to the TotalAgility Designer and navigate around it. You will also learn how to set common Server Settings, create a simple capture workflow business process, save,
More informationVMware vsphere 5.5: Install, Configure, Manage Lab Addendum. Lab 4: Working with Virtual Machines
VMware vsphere 5.5: Install, Configure, Manage Lab Addendum Lab 4: Working with Virtual Machines Document Version: 2014-06-02 Copyright Network Development Group, Inc. www.netdevgroup.com NETLAB Academy
More informationSymantec Backup Exec Management Plug-in for VMware User's Guide
Symantec Backup Exec Management Plug-in for VMware User's Guide The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the agreement.
More informationHow to Use vsphere to Connect to and Manage an ESXi Hypervisor Installation
How to Use vsphere to Connect to and Manage an ESXi Hypervisor Installation I am not responsible for your actions or their outcomes, in any way, while reading and/or implementing this tutorial. I will
More informationUnitrends Virtual Backup Installation Guide Version 8.0
Unitrends Virtual Backup Installation Guide Version 8.0 Release June 2014 7 Technology Circle, Suite 100 Columbia, SC 29203 Phone: 803.454.0300 Contents Chapter 1 Getting Started... 1 Version 8 Architecture...
More informationYale Software Library. PGP 9.6 for Windows
PGP 9.6 for Windows How to Add keys to the All Keys key ring: 1. Run the PGP application from Start->All Programs->PGP. 2. In the PGP main application window, click on Search for keys. 3. In the Search
More informationRemote Deposit Capture Installation Guide
Remote Deposit Capture Installation Guide Please contact businessbanking@farmingtonbankct.com or call 860-284-6549 with any questions. Remote Deposit Capture Installation Instructions It is necessary to
More informationHands-On Microsoft Windows Server 2008
Hands-On Microsoft Windows Server 2008 Chapter 9 Server and Network Monitoring Objectives Understand the importance of server monitoring Monitor server services and solve problems with services Use Task
More informationGX-V. Quick Start Guide. VMware vsphere / vsphere Hypervisor. Before You Begin SUMMARY OF TASKS WORKSHEET
If you re not using VMware vsphere Client 4.0, your screens may vary. GX-V VIRTUAL GMS SERVER VMware vsphere / vsphere Hypervisor 2012 Silver Peak Systems, Inc. Before You Begin Comply with the GX-V Host
More informationMonitoring ESX/ESXi servers with Verax NMS & APM
Monitoring ESX/ESXi servers with Verax NMS & APM Table of contents Abstract... 3 Preparing VMware server for monitoring... 3 1. Adding a VMware ESX/ESXi server to device inventory... 4 2. Adding sensors
More informationEM L05 Working with Change and Problem Management Using ITIL Best Practices Hands-On Lab
EM L05 Working with Change and Problem Management Using ITIL Best Practices Hands-On Lab Description Change and problem management have new features in ServiceDesk 7.1 SP2. In this session, we will apply
More informationStarWind iscsi SAN Software: Tape Drives Using StarWind and Symantec Backup Exec
StarWind iscsi SAN Software: Tape Drives Using StarWind and Symantec Backup Exec www.starwindsoftware.com Copyright 2008-2011. All rights reserved. COPYRIGHT Copyright 2008-2011. All rights reserved. No
More informationStarWind iscsi SAN Software: Configuring High Availability Storage for VMware vsphere and ESX Server
StarWind iscsi SAN Software: Configuring High Availability Storage for VMware vsphere and ESX Server www.starwindsoftware.com Copyright 2008-2011. All rights reserved. COPYRIGHT Copyright 2008-2011. All
More informationILTA HANDS ON Securing Windows 7
Securing Windows 7 8/23/2011 Table of Contents About this lab... 3 About the Laboratory Environment... 4 Lab 1: Restricting Users... 5 Exercise 1. Verify the default rights of users... 5 Exercise 2. Adding
More informationHow To Install Safari Antivirus On A Dv8000 Dv Recorder On A Pc Or Macbook Or Ipad (For A Pc) On A Microsoft Dv8 (For Macbook) On An Ipad Or Ipa (
Using Symantec AntiVirus Corporate Edition Version 9.0 Software On a DX8000 DVR DX8000 Digital Video Recorder C1613M-A (12/04) Contents Using Symantec AntiVirus Corporate Edition 9.0 Software.....................................................................5
More informationThinspace deskcloud. Quick Start Guide
Thinspace deskcloud Quick Start Guide Version 1.2 Published: SEP-2014 Updated: 16-SEP-2014 2014 Thinspace Technology Ltd. All rights reserved. The information contained in this document represents the
More informationHow to Configure Sophos Anti-Virus for Home Systems
How to Configure Sophos Anti-Virus for Home Systems When you download and install Sophos on your home computer, on-access scanning is enabled. However, the settings for scheduled scans and scanning for
More informationStarWind iscsi SAN Configuring HA File Server for SMB NAS
Hardware-less VM Storage StarWind iscsi SAN Configuring HA File Server for SMB NAS DATE: FEBRUARY 2012 TECHNICAL PAPER Trademarks StarWind, StarWind Software and the StarWind and the StarWind Software
More informationUsing Virtual Machines
Using Virtual Machines We will use VMs in CIT 130 so that you can access both a Windows 7 and a Linux machine. You will be able to access these from on and off campus (off campus access will require that
More informationConnecting to Remote Desktop Windows Users
Connecting to Remote Desktop Windows Users How to log into the College Network from Home 1. Start the Remote Desktop Connection For Windows XP, Vista and Windows 7 this is found at:- Star t > All Programs
More informationSOS SO S O n O lin n e lin e Bac Ba kup cku ck p u USER MANUAL
SOS Online Backup USER MANUAL HOW TO INSTALL THE SOFTWARE 1. Download the software from the website: http://www.sosonlinebackup.com/download_the_software.htm 2. Click Run to install when promoted, or alternatively,
More informationWHAT IS VIRTUAL DESKTOP? WHAT YOU NEED LOG IN TO VIRTUAL DESKTOP SET UP CITRIX RECEIVER REMOTE ACCESS GUIDE
WHAT IS VIRTUAL DESKTOP? Virtual Desktop is an online environment that allows you to access NSF applications and a virtual desktop that mimics a Windows 7 environment. You can use Virtual Desktop to use
More informationStarWind iscsi SAN: Configuring HA File Server for SMB NAS February 2012
StarWind iscsi SAN: Configuring HA File Server for SMB NAS February 2012 TRADEMARKS StarWind, StarWind Software and the StarWind and the StarWind Software logos are trademarks of StarWind Software which
More informationHow can I ensure that I have the correct version of the McAfee epo client with VirusScan & AntiSpyware?
C&C s effectiveness when responding to virus activity can only be improved with the continued cooperation of our clients. Clients are therefore strongly cautioned against opening email attachments from
More informationSonicWALL SRA Virtual Appliance Getting Started Guide
COMPREHENSIVE INTERNET SECURITY SonicWALL Secure Remote Access Appliances SonicWALL SRA Virtual Appliance Getting Started Guide SonicWALL SRA Virtual Appliance5.0 Getting Started Guide This Getting Started
More informationVMware vcenter Log Insight Getting Started Guide
VMware vcenter Log Insight Getting Started Guide vcenter Log Insight 2.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by
More informationInstalling NICE Windows under Parallels for Mac
Installing NICE Windows under Parallels for Mac 1. Prerequisites a) A Mac with OS X connected to a portable socket on the CERN general public network b) Parallels Desktop software installed from: smb://cerndata44.cern.ch/d
More informationAcronis Backup & Recovery 11
Acronis Backup & Recovery 11 Quick Start Guide Applies to the following editions: Advanced Server Virtual Edition Advanced Server SBS Edition Advanced Workstation Server for Linux Server for Windows Workstation
More informationInstalling and Configuring vcenter Support Assistant
Installing and Configuring vcenter Support Assistant vcenter Support Assistant 5.5 This document supports the version of each product listed and supports all subsequent versions until the document is replaced
More informationTable of Contents HOL-PRT-1671
Table of Contents Lab Overview - - Self-service data protection using the EMC Plugin for vrealize Automation and Avamar... 2 Lab Guidance... 3 Module 1 - Tenant user backup and restore (30 minutes)...
More informationInstalling and Using the vnios Trial
Installing and Using the vnios Trial The vnios Trial is a software package designed for efficient evaluation of the Infoblox vnios appliance platform. Providing the complete suite of DNS, DHCP and IPAM
More informationJuniper Networks Management Pack Documentation
Juniper Networks Management Pack Documentation Juniper Networks Data Center Switching Management Pack for VMware vrealize Operations (vrops) Release 2.5 Modified: 2015-10-12 Juniper Networks, Inc. 1133
More informationVirtual Appliance for VMware Server. Getting Started Guide. Revision 2.0.2. Warning and Disclaimer
Virtual Appliance for VMware Server Getting Started Guide Revision 2.0.2 Warning and Disclaimer This document is designed to provide information about the configuration and installation of the CensorNet
More informationTutorial: Assigning Prelogin Criteria to Policies
CHAPTER 4 This tutorial provides an overview of the CSD configuration sequence. The configuration chapters that follow provide detailed instructions on the attributes. The sections are as follows: Overview
More informationVirtual Server Installation Manual April 8, 2014 Version 1.8
Virtual Server Installation Manual April 8, 2014 Version 1.8 Department of Health and Human Services Administration for Children and Families Office of Child Support Enforcement REVISION HISTORY Version
More informationInstalling and Configuring vcloud Connector
Installing and Configuring vcloud Connector vcloud Connector 2.7.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new
More informationWatchDox Administrator's Guide. Application Version 3.7.5
Application Version 3.7.5 Confidentiality This document contains confidential material that is proprietary WatchDox. The information and ideas herein may not be disclosed to any unauthorized individuals
More informationIf the Domain Controller is running Windows Server 2003, it is strongly advised that the Group Policy Management tool is installed.
BGfL Proxy Servers Slow Internet Following a number of calls to the Link2ICT Service desk reporting slow Internet, Investigations were carried out by the BGfL team who identified that slow internet performance
More informationPearl Echo Installation Checklist
Pearl Echo Installation Checklist Use this checklist to enter critical installation and setup information that will be required to install Pearl Echo in your network. For detailed deployment instructions
More informationEMC Data Domain Management Center
EMC Data Domain Management Center Version 1.1 Initial Configuration Guide 302-000-071 REV 04 Copyright 2012-2015 EMC Corporation. All rights reserved. Published in USA. Published June, 2015 EMC believes
More informationScan to E-mail Quick Setup Guide
Xerox WorkCentre M118i Scan to E-mail Quick Setup Guide 701P42574 This guide provides a quick reference for setting up the Scan to E-mail feature on the Xerox WorkCentre M118i. It includes procedures for:
More informationSuperOffice AS. CRM Online. Installing the Citrix Online Web plug-in
SuperOffice AS CRM Online Installing the Citrix Online Web plug-in Index Introduction... 3 Prerequisites... 3 Considerations... 3 FOR WINDOWS USERS:... 4 Download the installation package... 4 Installing
More informationUsing Remote Web Workplace Version 1.01
Using Remote Web Workplace Version 1.01 Remote web workplace allows you to access your Windows XP desktop through Small Business Server 2003 from a web browser. 1. Connect to the Internet in your remote
More informationHow to install/upgrade the LANDesk virtual Cloud service appliance (CSA)
How to install/upgrade the LANDesk virtual Cloud service appliance (CSA) The upgrade process for the virtual Cloud Services Appliance is a side- by- side install. This document will walk you through backing
More informationTransferring Scans from your Dolphin into Destiny
Transferring Scans from your Dolphin into Destiny Summary: This article is intended to provide Destiny users with an overview of the following tasks 1. Downloading the Dolphin Transfer Utility to their
More informationVX 9000E WiNG Express Manager INSTALLATION GUIDE
VX 9000E WiNG Express Manager INSTALLATION GUIDE 2 VX 9000E WiNG Express Manager Service Information If you have a problem with your equipment, contact support for your region. Support and issue resolution
More informationecfshome-ts Terminal Server How to Use
ecfshome-ts Terminal Server How to Use Connect to VPN Connect to Terminal Server, Set Options to Use Personal Computer Files, Printers, Clipboard Use Network Folders Copy Files from Network Folders to
More informationWhatsVirtual for WhatsUp Gold v16.0 User Guide
WhatsVirtual for WhatsUp Gold v16.0 User Guide Contents Welcome Welcome to WhatsVirtual... 1 Using WhatsVirtual Discovering virtual devices... 2 Viewing discovery output... 4 Manage and monitor virtual
More informationBest Practice Configurations for OfficeScan (OSCE) 10.6
Best Practice Configurations for OfficeScan (OSCE) 10.6 Applying Latest Patch(es) for OSCE 10.6 To find out the latest patches for OfficeScan, click here. Enable Smart Clients 1. Ensure that Officescan
More informationServer Configuration and Deployment (part 1) Lotus Foundations Essentials
Server Configuration and Deployment (part 1) Lab Manual Lotus Foundations Essentials Introduction: In this lab, students will configure an IBM Lotus Foundations server using a virtual image to perform
More informationVMware vcenter Log Insight Getting Started Guide
VMware vcenter Log Insight Getting Started Guide vcenter Log Insight 1.5 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by
More informationQuick Start - Virtual Server idataagent (VMware)
Page 1 of 24 Quick Start - Virtual Server idataagent (VMware) TABLE OF CONTENTS OVERVIEW Introduction Key Features Complete Virtual Machine Protection Granular Recovery of Virtual Machine Data Minimal
More informationThis document also includes steps on how to login into HUDMobile with a grid card and launch published applications.
Office of the Chief Information Officer Information Technology Division COMPUTER SELF-HELP DESK - TRAINING TIPS AND TRICKS HUDMOBILE ON HOME MACS This document is a step-by-step instruction to check or
More informationStarWind Virtual SAN Installation and Configuration of Hyper-Converged 2 Nodes with Hyper-V Cluster
#1 HyperConverged Appliance for SMB and ROBO StarWind Virtual SAN Installation and Configuration of Hyper-Converged 2 Nodes with MARCH 2015 TECHNICAL PAPER Trademarks StarWind, StarWind Software and the
More informationMcAfee MOVE / VMware Collaboration Best Practices
McAfee MOVE / VMware Collaboration Best Practices Christie J. Karrels Sales Engineer Federal DoD January 11, 2013 1 P a g e Contents Introduction... 3 Traditional Anti-Malware vs. Optimized Anti-Malware...
More informationpcanywhere Advanced Configuration Guide
Introduction The pcanywhere Solution Advanced Configuration Guide is provided to assist customers with advanced features once they have the Symantec Management Platform with pcanywhere Solution installed.
More informationMANUFACTURER RamSoft Incorporated 243 College St, Suite 100 Toronto, ON M5T 1R5 CANADA
All Information provided in this document and in the accompanying software is subject to change without notice and does not represent a commitment on the part of RamSoft. RamSoft assumes no responsibility
More information