LANDesk Management Suite 9.0. Getting started with Patch Manager

Size: px
Start display at page:

Download "LANDesk Management Suite 9.0. Getting started with Patch Manager"

Transcription

1 LANDesk Management Suite 9.0 Getting started with Patch Manager

2 DOWNLOAD PATCH CONTENT TO THE CORE SERVER

3 INTRODUCTION This document is intended to assist LANDesk Management Suite administrators with implementing Security and Patch Manager in their environment for LANDesk Management Suite 9.0. SCOPE This document covers the steps necessary to get started using Patch Manager to patch clients. It also contains a quick reference guide for experienced LANDesk administrators that just need a reminder of the steps required for patching clients. ASSUMPTIONS This document is written with the expectation that the LANDesk Core Server has been installed and activated and the workstations have the LANDesk agent installed. There are other documents that discuss these topics and are not addressed in this document.

4 QUICK REFERENCE This section contains the steps required to set up Patch Manager to patch clients. It is intended to be used by experienced LANDesk administrators as a reference and does not go into detail on the process. The details will be covered later in this document. Following are the steps required to set up Patch Manager: 1. Download patch content to the Core Server through the Download Updates window which is accessed through the Patch and compliance tool in the LANDesk Management Console. 2. Make sure that all of the vulnerabilities that the clients need to be scanned for are in the Scan folder in the Patch and compliance tool. Only vulnerabilities in the Scan folder will be scanned for on the clients when the Security Scan is executed. 3. Check the Scan and Repair settings assigned to the clients to verify the options have been set correctly for detection. This can be done in the Agent Configuration under Security and Compliance Patch and Compliance Scan or in the Patch and Compliance window by clicking the Configure settings toolbar icon and select the Scan and repair settings item from the dropdown list. 4. Run a Security Scan on all clients to detect what patches they need. 5. Create and run a repair task to install the patches on the clients. Do not rely solely on the repair task status to determine the success of patching. Continue with the remaining steps to fully determine the success of patching. Note: Only patches that have been detected by a Security Scan on a client can be patched with a repair task. Trying to install a patch on a client that has not been detected will result in the patch failing to install with the message NO_PATCHES_AVAILABLE. 6. Reboot the clients after the patches have installed if any of the patches require a reboot. If a patch requires a reboot it is not completely installed until the client is rebooted. Failure to reboot the client will result in the patch still being detected as not being installed. 7. Run a Security Scan on all of the clients. 8. Check the Security and Patch information for a specific client to see what patches are still needed or check the affected computers list for a specific vulnerability to determine which computers still need the patch.

5 DOWNLOAD PATCH CONTENT TO THE CORE SERVER The following section contains steps Configure the Download Updates window Login to the Management Suite Console. From the Console, click Tools Security and Compliance Patch and Compliance. Click the Download Updates toolbar icon. This allows you to select what content to download. Core server licensing will determine what content is available in the Download Updates window. The following figure displays all content that can be downloaded with the full LANDesk Security Suite license.

6 Select the required Definition types and Languages for the environment. Microsoft Windows Vulnerabilities are the most commonly downloaded vulnerability type. Microsoft Windows Vulnerabilities contain the patches for the Windows Operating Systems as well as the patches for common applications for the Windows Operating System such as Adobe Reader, ITUNES and Microsoft Office. Do not check the box for Put new definitions in Unassigned group so that all of the definitions are downloaded to the Scan folder.

7 Proxy Settings If the company uses a proxy server then the information should be entered on the Proxy Settings tab to allow the content to be downloaded. The vulnerabilities (detection logic) are downloaded from the LANDesk websites. The patches for the vulnerabilities are downloaded from the vendor's website. For example, Microsoft patches are downloaded from Microsoft's websites. Ensure the proxy will allow the Core Server to access the appropriate website to get the patch. Changing the Patch Location It is recommended that the download location for patches be left at the default settings. If there is limited space on the drive that the Core Server is installed on, the patch location should be moved. Click the Patch Location tab if the location needs to be moved

8 If the patch location is changed, the new location must be setup with the same web settings and folder permissions as the default location. If a UNC path is used for the client access, add the Domain Computers group to the new share with Read access. Scheduling the download When all settings have been set, click Apply. Then click the Schedule download button.

9 Click OK. Selecting this button will create a scheduled task to update the content that is currently selected. Setting a scheduled task to run nightly will make sure that the content being scanned for is the most current and up to date. If changes are made to what needs to be downloaded a new Scheduled task will need to be created. More than one task can be created but they must be scheduled to run at different times because only one download (VAMINER.EXE) can run at a time.

10 Set the appropriate schedule for the download task to run and click Save. VERIFY VULNERABILITIES ARE IN THE SCAN FOLDER After the Patch Content has downloaded, check the SCAN folder in the Patch and Compliance tool to make sure all appropriate vulnerabilities are in there. Any old or unwanted vulnerabilities can be dragged to the Do Not Scan folder.

11 SCAN AND REPAIR SETTINGS FOR DETECTION (AGENT BEHAVIOR) Before starting to scan for vulnerabilities it is necessary to ensure that the scan configuration is set correctly. Depending on what is licensed there can be as many as nine different types of vulnerabilities to scan. From the Scan and Repair Settings window, select the types that you want to be scanned. When a scan is initiated on a managed node an agent behavior needs to be selected so that the scanner knows what to scan. If there is no agent behavior selected then the scanner will scan for the default three types: Vulnerabilities, LANDesk Updates and Custom Vulnerabilities. The Scan and Repair Settings window can be accessed two ways. From the Patch and Compliance window, click the Configure settings toolbar icon and select the Scan and repair settings item from the drop-down list. When configuring an agent configuration click the Security and Compliance Patch and compliance scan tree item and click the Configure button. Double-click the Scan and Repair setting assigned to the client in the agent configuration.

12 The Scan and Repair Settings window has eight pages: General, Scan, Repair, MSI, Reboot, Network, Pilot and Spyware. Only the General, Scan and Pilot pages affect the detection. General settings page Most of the settings on the General settings page are self explanatory such as Show progress dialog and Allow user to cancel scan. The only option that may need to be changed is CPU utilization when scanning. Adjust the setting to the desired level. Moving the slider bar toward the Low side will reduce the impact on performance of the Security Scan on the client but will also increase the amount of time it takes for the scan to finish. Conversely, moving the slider bar towards the High side will increase the impact on performance of the Security Scan on the client but will also reduce the time it takes for the scan to finish. If the Security Scan is scheduled to run during non-business hours, it would be best to move the slider bar all the way to the High side so the scan can finish as fast as possible. Make any changes required on the General page and then click Scan options.

13 Scan options page Scan options page controls what vulnerabilities are scanned for on the clients. Make sure that Vulnerabilities, Antivirus updates and LANDesk updates types are selected as a minimum. The Antivirus updates option when checked will detect and return information about the antivirus software installed on the client if it is one of the more common antivirus applications (McAfee, Symantec, LANDesk AV, etc.). The Enable autofix checkbox will only make a difference if vulnerabilities have had autofix enabled in the Patch and Compliance window. Check the Autofix column to see if there is a Yes for any of the vulnerabilities in the Scan folder. Only vulnerabilities in the Scan folder that have a Yes in the Autofix column will be automatically installed. Uncheck the Enable autofix box to prevent any patches from being automatically installed on clients.

14 Pilot configuration page Make sure that the Periodically scan and repair definitions in the following group is unchecked. Click Save when all Scan and Repair settings have been adjusted. When a Security Scan is run on the clients, any changes made to the Scan and Repair settings will automatically be downloaded to the client. RUN A SECURITY SCAN (VULSCAN.EXE) ON ALL CLIENTS A patch cannot be applied to a computer unless the vulnerability associated with that patch has first been detected on that computer. There are three different ways to run a Security Scan on a computer to detect vulnerabilities. The first two ways are configured from the Agent Configuration tool in the LANDesk Console and should have been configured before deploying the LANDesk agent. The first two methods will not be covered in this document. The security scan should be run on managed nodes at least once a day. 1. When a user logins. 2. Setting a frequency to be run by the client s local scheduler service. By default, the Security Scan is set to run once a day in the agent configuration. 3. Create a Security Scan task.

15 Create a Security Scan Task In the Patch and Compliance window, click the Create a task icon in the toolbar and select Security Scan from the drop-down list. The Create security scan task window appears. Click to place a checkmark in the Create a scheduled task checkbox. Select the Scan and repair settings from the drop-list that was created or modified in the previous section of this document. Click OK to create the task which will create the task in the Scheduled Tasks window.

16 Drag computers from All Devices in the Console and drop them on the Security Scan task (Patch and Compliance Scan) in the Scheduled tasks window. Drag all computers that the Security scan needs to be run on to the task.

17 Right-click the Security Scan task (Patch and Compliance Scan) in the Scheduled tasks window and click Start now to immediately run the Security Scan task. Or, select Properties to schedule a time for the Security Scan to run. It is recommended to run the Security Scan task during non-business hours because the Security Scan will impact the performance of the computer. CREATE AND RUN A REPAIR TASK After the Security Scan completes on the clients, it is time to create a repair task to remediate the detected vulnerabilities. Open the Patch and Compliance window in the LANDesk Console.

18 Right-click My custom groups in the Patch and Compliance window under Groups Custom groups and select the New Group option. Enter a name for the new group.

19 Click on the Detected folder under All Types which will display a list of all of the vulnerabilities that have been detected as needing to be installed on at least one computer that the Security Scan was run on earlier. Click on any of the vulnerabilities in the detected folder and then hit CTRL + a which should select all of the vulnerabilities in the detected folder.

20 The lower left corner of the Patch and Compliance window will show the number of vulnerabilities in the detected folder. Drag and drop all of the vulnerabilities from the detected folder to the custom group (MyPatchGroup) created previously. If this message window comes up, click Yes.

21 Click the custom patch group (MyPatchGroup) and verify that all of the patches were added to the group. The number of vulnerabilities in the group should be equal to or greater than the number on the detected folder because of dependencies and prerequisites that were automatically added. Look through the vulnerabilities in the patch group and remove any vulnerabilities that you do not want installed on any computers in your environment. Right-click the custom group and select the Repair option.

22 If this Repair Information message box comes up, click Yes. Click the Configure button to open the Configure scan and repair settings window.

23 Click the New button to create a new scan and repair setting for the repair task. On the General settings page, enter a name for this scan and repair setting to be used with the repair task. Adjust the slider bar for CPU utilization when scanning if necessary. Moving the bar towards High will increase the amount of CPU VULSCAN.EXE is allowed to use. Change any other settings as necessary for the environment. Click Repair options to switch to the repair options page.

24 Make sure that the Reboot is already pending box is checked. Adjust other settings as required for the environment. Click MSI information to switch to the MSI information page.

25 If the original location for the Microsoft Office install files is no longer accessible by the client, enter the UNC path to the Office install files and a username and password that can access them. If you are not sure whether the client can access the original location, leave this page blank and try it. If the Office patches fail, fill in this page and try it again. Click Reboot options to switch to the reboot options page.

26 Select the appropriate options on the reboot options page to meet the requirements for the environment. Click Save. Make sure the new Scan and Repair setting is highlighted and then click Use selected.

27 Verify that the correct scan and repair setting is shown in the Scan and repair settings box. Then click the Patches tab.

28 Click on any of the patches in the list and hit CTRL+a which should highlight all of the patches in the list.

29 Right-click any of the patches and select the Download Patch option. The Downloading Patches window will appear.

30 Wait for all of the patches to download and click Close when it is done. Then click the General tab. Any patches that are already downloaded will be verified and skipped if the file matches the current vulnerability otherwise the patch will be redownloaded.

31 It is recommended to use Repair as a scheduled task (push) so that the patching time can be controlled. For laptops (mobile users), the Repair as policy (pull) is the recommended method for patching the remote device. This is the most effective method since the policy can run when the device connects to the network. Select the Don't add any computers option because the patches should be tested on a few computers first to make sure there are no major problems with the patches. Click OK which will create the repair task and switch to the Scheduled Tasks window with the repair task highlighted.

32 Drag a few devices that can be used for testing from the All Devices list and drop them on the repair task in the Scheduled Tasks window. These will be the computers used to test the patch deployment process.

33 After the test computers have been added to the repair task, right-click the repair task and click Start now to immediately patch the computers, or select the Properties option to set a start time for the task. It is best to patch computers during non-business hours because of the performance impact to the computer while patches are being installed. Wait for the patch repair task to complete and then continue with the next section. REBOOT THE CLIENTS Reboot the clients if any of the patches in the repair task requires a reboot. Until the client is rebooted, the patch is not completely installed and will still be detected on the clients. This can be done with the reboot task available in the Patch and Compliance window. Open the Patch and Compliance tool.

34 Select the Reboot option from the Create a task drop-down list. The Create reboot task window appears. Click to place a checkmark in the Create a scheduled task checkbox. Click the Configure button to create a Scan and repair setting for the reboot task.

35 Click the New button. On the General settings page, enter a name for this Scan and Repair setting. Click Reboot options to switch to the reboot options page.

36 Select the Always reboot option. Select other options as required for this environment. Click Save. Verify the correct scan and repair setting is highlighted and click Use selected.

37 Verify the required scan and repair setting shows in the Scan and repair settings box. Click OK which will create the reboot task and switch to the Scheduled Tasks window with the reboot task highlighted. Drag the computers which need to be rebooted from All devices and drop them on the reboot task.

38 Right-click the reboot task and select the Start now option to immediately start the task or select Properties to set a start time for the task. Wait for the computers to restart before continuing with the next section. RUN A SECURITY SCAN ON THE CLIENTS THAT WERE PATCHED Follow the instructions in the section titled "RUN A SECURITY SCAN (VULSCAN.EXE) ON ALL CLIENTS" to run a Security Scan on the computers that were patched. CHECK SECURITY AND PATCH INFORMATION FOR PATCHED COMPUTERS Check the Security and Patch information for the patched clients to see what patches are still needed.

39 Right-click a patched computer under All devices in the console and select the Security and Patch Information option.

40 All Detected will show all patches that the computer still needs. Repeat the steps in this document until all patches have been installed on the computers. CONCLUSION The steps outlined in this document provide the user with the basic information required to get started with Patch Manager in a LANDesk Management Suite 9.0 environment. ABOUT LANDESK SOFTWARE The foundation for LANDesk s leading IT management solutions was laid more than 20 years ago. And LANDesk has been growing and innovating the systems, security, service and process management spaces ever since. Our singular focus and our commitment to understanding customers real business needs and to delivering easy-to-use solutions for those needs are just a few of the reasons we continue to grow and expand. LANDesk pioneered the desktop management category back in That same year, IDC named LANDesk the category leader. And LANDesk has continued to lead the systems configuration space: pioneering virtual IT technology in 1999, revolutionizing large-packet distribution with LANDesk Targeted Multicast technology and LANDesk Peer Download technology in 2001, and delivering secure systems management over the Internet and hardware-independent network access control capabilities with LANDesk Management Gateway and LANDesk Trusted Access Technology in In 2006, LANDesk added process management technologies to its product line and began integrating the systems, security and process management markets. LANDesk also extended into the consolidated service desk market with LANDesk Service Desk, and was acquired by Avocent to operate as an independent division. Today, LANDesk continues to lead the convergence of the systems, security, process and service management markets. And our executives, engineers and other professionals work tirelessly to deliver leading solutions to markets around the globe.

LANDesk Patch and Compliance. Common Troubleshooting steps for Vulnerability Remediation.

LANDesk Patch and Compliance. Common Troubleshooting steps for Vulnerability Remediation. LANDesk Patch and Compliance Common Troubleshooting steps for Vulnerability Remediation. Contents Introduction... 3 Scope... 3 Assumptions... 3 Logs used in Troubleshooting... 4 Vulscan Switches... 4 The

More information

LANDesk Patch Manager. Strategic and Tactical Implementation Guide

LANDesk Patch Manager. Strategic and Tactical Implementation Guide LANDesk Patch Manager Strategic and Tactical Implementation Guide Contents Using this Guide... 4 Quick Start... 4 Technical High-Level Overview... 5 Discovering your environment... 5 Using Inventory...

More information

LANDesk Management Suite 9. Best Practices for Agent Configuration and Deployment (BKM)

LANDesk Management Suite 9. Best Practices for Agent Configuration and Deployment (BKM) LANDesk Management Suite 9 Best Practices for Agent Configuration and Deployment (BKM) Revision 1.00 Don White Dec 10, 2009 Copyright 2002-2009 Avocent Corporation. All rights reserved. Avocent, LANDesk,

More information

EML-09 Keeping Operating Systems and Applications up to date with Patch Management 7.1

EML-09 Keeping Operating Systems and Applications up to date with Patch Management 7.1 EML-09 Keeping Operating Systems and Applications up to date with Patch Management 7.1 Description Maintianing consistant and current patch status is a critical part of any security strategy. In this lab,

More information

LANDesk Management Suite 8, v8.1 Creating Custom Vulnerabilities

LANDesk Management Suite 8, v8.1 Creating Custom Vulnerabilities LANDesk Management Suite 8, v8.1 Creating Custom Vulnerabilities Revision 1.0 Rex Moffitt May 26, 2004 Information in this document is provided in connection with LANDesk Software products. No license,

More information

4cast Client Specification and Installation

4cast Client Specification and Installation 4cast Client Specification and Installation Version 2015.00 10 November 2014 Innovative Solutions for Education Management www.drakelane.co.uk System requirements The client requires Administrative rights

More information

AV Management Dashboard

AV Management Dashboard LabTech AV Management Dashboard AV MANAGEMENT DASHBOARD... 1 Overview... 1 Requirements... 1 Dashboard Overview... 2 Clients/Groups... 2 Offline AV Agents... 3 Threats... 3 AV Product... 4 Sync Agent Data

More information

Using Remote Web Workplace Version 1.01

Using Remote Web Workplace Version 1.01 Using Remote Web Workplace Version 1.01 Remote web workplace allows you to access your Windows XP desktop through Small Business Server 2003 from a web browser. 1. Connect to the Internet in your remote

More information

SSL VPN Setup for Windows

SSL VPN Setup for Windows SSL VPN Setup for Windows SSL VPN allows you to connect from off campus to access campus resources such as Outlook email client, file sharing and remote desktop. These instructions will guide you through

More information

Configuring WPA2 for Windows XP

Configuring WPA2 for Windows XP Configuring WPA2 for Windows XP Requirements for wireless using WPA2 on Windows XP with Service Pack 2 Your wireless card must support 802.1x, AES, and WPA2. Windows XP with service pack 2, it is recommended

More information

Snow Inventory. Installing and Evaluating

Snow Inventory. Installing and Evaluating Snow Inventory Installing and Evaluating Snow Software AB 2002 Table of Contents Introduction...3 1. Evaluate Requirements...3 2. Download Software...3 3. Obtain License Key...4 4. Install Snow Inventory

More information

How To Sync Between Quickbooks And Act

How To Sync Between Quickbooks And Act QSalesData User Guide Note: In addition to this User Guide, we have an extensive Online Video Library that you can access from our website: www.qsalesdata.com/onlinevideos Updated: 11/14/2014 Installing

More information

LogMeIn Network Console Version 8 Getting Started Guide

LogMeIn Network Console Version 8 Getting Started Guide LogMeIn Network Console Version 8 Getting Started Guide April 2007 1. About the Network Console... 2 2. User Interface...2 3. Quick Start... 2 4. Network & Subnet Scans...3 5. Quick Connect...3 6. Operations...

More information

Installing TestNav Mac with Apple Remote Desktop

Installing TestNav Mac with Apple Remote Desktop Installing TestNav Mac with Apple Remote Desktop 1 2 3 Getting TestNav Installation from Servicedesk 1.1 Connect to Servicedesk 4 1.2 Download Package to Desktop 7 Installing TestNav 2.1 Add Computers

More information

Instructions for Connecting to PACS outside of a Regional Facility

Instructions for Connecting to PACS outside of a Regional Facility Instructions for Connecting to PACS outside of a Regional Facility For support, please contact the ehealth Saskatchewan Helpdesk at 1-888-316-7446 Recommended options provide optimal performance 1 The

More information

Sophos Anti-Virus for NetApp Storage Systems startup guide

Sophos Anti-Virus for NetApp Storage Systems startup guide Sophos Anti-Virus for NetApp Storage Systems startup guide Runs on Windows 2000 and later Product version: 1 Document date: April 2012 Contents 1 About this guide...3 2 About Sophos Anti-Virus for NetApp

More information

BitDefender Security for Exchange

BitDefender Security for Exchange Quick Start Guide Copyright 2011 BitDefender 1. About This Guide This guide will help you install and get started with BitDefender Security for Exchange. For detailed instructions, please refer to the

More information

How to Configure Outlook 2010 E-mail Client for Exchange

How to Configure Outlook 2010 E-mail Client for Exchange LAUSD IT Help Desk How to Configure Outlook 2010 E-mail Client for Exchange (03/04/2012) LAUSD IT Help Desk 333 S. Beaudry Ave. 9 th Floor Phone 213.241.5200 Table of Contents Configure Outlook 2010 for

More information

Setting up Sharp MX-Color Imagers for Inbound Fax Routing to Email or Network Folder

Setting up Sharp MX-Color Imagers for Inbound Fax Routing to Email or Network Folder Setting up Sharp MX-Color Imagers for Inbound Fax Routing to Email or Network Folder MX-2300, MX-2600, MX-2700, MX-3100, MX-3501, MX-4501, MX-5500, MX-6200, MX-6201, MX-7000, MX-7001, *MX-M850, *MX-M950,

More information

Lenovo Online Data Backup User Guide Version 1.8.14

Lenovo Online Data Backup User Guide Version 1.8.14 Lenovo Online Data Backup User Guide Version 1.8.14 Contents Chapter 1: Installing Lenovo Online Data Backup...5 Downloading the Lenovo Online Data Backup Client...5 Installing the Lenovo Online Data

More information

CONNECT-TO-CHOP USER GUIDE

CONNECT-TO-CHOP USER GUIDE CONNECT-TO-CHOP USER GUIDE VERSION V8 Table of Contents 1 Overview... 3 2 Requirements... 3 2.1 Security... 3 2.2 Computer... 3 2.3 Application... 3 2.3.1 Web Browser... 3 2.3.2 Prerequisites... 3 3 Logon...

More information

BSDI Advanced Fitness & Wellness Software

BSDI Advanced Fitness & Wellness Software BSDI Advanced Fitness & Wellness Software 6 Kellie Ct. Califon, NJ 07830 http://www.bsdi.cc SOFTWARE BACKUP/RESTORE INSTRUCTION SHEET This document will outline the steps necessary to take configure the

More information

SQLBackupAndFTP User Instructions (Rev 0.3) 9/14/10

SQLBackupAndFTP User Instructions (Rev 0.3) 9/14/10 SQLBackupAndFTP User Instructions (Rev 0.3) 9/14/10 SQLBackupAndFTP Installation Website: www.sqlbackupandftp.com Download the installation executable from: http://downloads.minntech.com/medivators Advantage

More information

Knowledgebase Article

Knowledgebase Article Company web site: Support email: Support telephone: +44 20 3287-7651 +1 646 233-1163 2 EMCO Network Inventory allows you to manage alternative credentials to use while performing different

More information

How to connect to VUWiFi

How to connect to VUWiFi Wireless Registration Instructions Windows XP How to connect to VUWiFi 1. The first step in setting up your wireless card for VUWiFi is to open your Network Connections window. You can find this by going

More information

Server Installation: ServerTools

Server Installation: ServerTools Server Installation: ServerTools ServerTools Page 1 Table of Contents To Install ServerTools...3 Backup and Restore...6 Purpose...6 Background...6 Requirements...6 Creating a Backup Schedule using the

More information

XStream Remote Control: Configuring DCOM Connectivity

XStream Remote Control: Configuring DCOM Connectivity XStream Remote Control: Configuring DCOM Connectivity APPLICATION BRIEF March 2009 Summary The application running the graphical user interface of LeCroy Windows-based oscilloscopes is a COM Automation

More information

MyNetFone Virtual Fax. Virtual Fax Installation

MyNetFone Virtual Fax. Virtual Fax Installation Table of Contents MyNetFone Virtual Fax MyNetFone Virtual Fax Installation... 1 Changing the SIP endpoint details for the fax driver... 11 Uninstalling Virtual Fax... 13 Virtual Fax Installation Follow

More information

Installing Windows Server Update Services (WSUS) on Windows Server 2012 R2 Essentials

Installing Windows Server Update Services (WSUS) on Windows Server 2012 R2 Essentials Installing Windows Server Update Services (WSUS) on Windows Server 2012 R2 Essentials With Windows Server 2012 R2 Essentials in your business, it is important to centrally manage your workstations to ensure

More information

TAMUS Terminal Server Setup BPP SQL/Alva

TAMUS Terminal Server Setup BPP SQL/Alva We have a new method of connecting to the databases that does not involve using the Texas A&M campus VPN. The new way of gaining access is via Remote Desktop software to a terminal server running here

More information

Patch Management Hands-On Exercises. Patch Management Hands-on Exercise

Patch Management Hands-On Exercises. Patch Management Hands-on Exercise Patch Management Hands-On Exercises Patch Management Hands-on Exercise 192 Chapter 5 Patch Management Hands-On Exercises Background Story You have been hired as the lead IT Administrator at the Florida

More information

Tutorial. Patch Management

Tutorial. Patch Management Tutorial Patch Management 2011 DeskCenter Solutions AG Table of Contents 1. Introduction...3 2. Software deployer...4 2.1 Preparing the software deployer...4 2.2 Configuring software deployers...4 3. Central

More information

Linko Software Express Edition Typical Installation Guide

Linko Software Express Edition Typical Installation Guide Linko Software Express Edition Typical Installation Guide Install Database Service Components and Database...1 Install Workstation Components...4 Install DB Administration Tool...6 Office 2003 Security

More information

1. Set Daylight Savings Time... 3. 2. Create Migrator Account... 3. 3. Assign Migrator Account to Administrator group... 4

1. Set Daylight Savings Time... 3. 2. Create Migrator Account... 3. 3. Assign Migrator Account to Administrator group... 4 1. Set Daylight Savings Time... 3 a. Have client log into Novell/Local Machine with Administrator Account...3 b. Access Adjust Date/Time...3 c. Make sure the time zone is set to Central Time...3 2. Create

More information

Sophos Anti-Virus for NetApp Storage Systems startup guide. Runs on Windows 2000 and later

Sophos Anti-Virus for NetApp Storage Systems startup guide. Runs on Windows 2000 and later Sophos Anti-Virus for NetApp Storage Systems startup guide Runs on Windows 2000 and later Document date: July 2007 Contents About this guide...4 About Sophos Anti-Virus for NetApp Storage Systems...5

More information

HP Client Automation Standard Fast Track guide

HP Client Automation Standard Fast Track guide HP Client Automation Standard Fast Track guide Background Client Automation Version This document is designed to be used as a fast track guide to installing and configuring Hewlett Packard Client Automation

More information

User Guide. Version 3.2. Copyright 2002-2009 Snow Software AB. All rights reserved.

User Guide. Version 3.2. Copyright 2002-2009 Snow Software AB. All rights reserved. Version 3.2 User Guide Copyright 2002-2009 Snow Software AB. All rights reserved. This manual and computer program is protected by copyright law and international treaties. Unauthorized reproduction or

More information

Connecting to Delta College Exchange services off-campus

Connecting to Delta College Exchange services off-campus Connecting to Delta College Exchange services off-campus The following instructions are provided to document the client configuration used to connect to Microsoft Exchange services at Delta College from

More information

Distributing EmailSMS v2.0

Distributing EmailSMS v2.0 Distributing EmailSMS v2.0 1) Requirements Windows 2000/XP and Outlook 2000, 2002 or 2003, Microsoft.NET Framework v 2).NET Framework V 1 Rollout Microsoft.NET Framework v1 needed to run EmailSMS v2.0.

More information

Remote Desktop Services

Remote Desktop Services Remote Desktop Services AMERICAN INSTITUTES FOR RESEARCH AIR REMOTE DESKTOP SERVICES (RDS) GUIDE Overview Welcome to AIR Remote Desktop Services! AIR Remote Desktop Services can be accessed from a Windows

More information

Remote Access: Citrix Client Setup

Remote Access: Citrix Client Setup Introduction: The following documentation is intended to assist first time or active users with installation of the Citrix ICA connection software required to access the MSVU Remote Access system desktop

More information

AT&T Internet Security Suite - powered by McAfee. Installation Guide (for Clean Machine with No Anti-Virus Installed)

AT&T Internet Security Suite - powered by McAfee. Installation Guide (for Clean Machine with No Anti-Virus Installed) AT&T Internet Security Suite - powered by McAfee Installation Guide (for Clean Machine with No Anti-Virus Installed) Contents 2 Contents Introduction 3 Chapters 1. Start Download Manager...4 2. Select

More information

Citrix Remote Access Portal U s e r M a n u a l

Citrix Remote Access Portal U s e r M a n u a l Citrix Remote Access Portal U s e r M a n u a l 1 P a g e Table of Contents Table of Contents... 2 Introduction... 3 1. What is Citrix and how does it work?... 4 2. PC Setup/Internet Explorer - Connecting

More information

Virtual Office Remote Installation Guide

Virtual Office Remote Installation Guide Virtual Office Remote Installation Guide Table of Contents VIRTUAL OFFICE REMOTE INSTALLATION GUIDE... 3 UNIVERSAL PRINTER CONFIGURATION INSTRUCTIONS... 12 CHANGING DEFAULT PRINTERS ON LOCAL SYSTEM...

More information

How To Upgrade Your Microsoft SQL Server for Accounting CS Version 2012.1

How To Upgrade Your Microsoft SQL Server for Accounting CS Version 2012.1 How To Upgrade Your Microsoft SQL Server for Version 2012.1 The first step is to gather important information about your existing configuration. Identify The Database Server and SQL Server Version The

More information

Deployment of Keepit for Windows

Deployment of Keepit for Windows Deployment of Keepit for Windows Keepit A/S October 13, 2010 1 Introduction When deploying Keepit in larger setups with many desktops and servers, installing Keepit individually on each computer is cumbersome

More information

Sophos Anti-Virus for NetApp Storage Systems user guide. Product version: 3.0

Sophos Anti-Virus for NetApp Storage Systems user guide. Product version: 3.0 Sophos Anti-Virus for NetApp Storage Systems user guide Product version: 3.0 Document date: May 2014 Contents 1 About this guide...3 2 About Sophos Anti-Virus for NetApp Storage Systems...4 3 System requirements...5

More information

Laptop Backup - User Guide (Windows)

Laptop Backup - User Guide (Windows) Laptop Backup - User Guide (Windows) Page 1 of 14 Page 2 of 14 Laptop Backup - User Guide - (Windows) TABLE OF CONTENTS INSTALLATION MONITOR RESTORE ADVANCED OPTIONS Adding Backup Content Filtering Contents

More information

Sophos Enterprise Console Help. Product version: 5.1 Document date: June 2012

Sophos Enterprise Console Help. Product version: 5.1 Document date: June 2012 Sophos Enterprise Console Help Product version: 5.1 Document date: June 2012 Contents 1 About Enterprise Console...3 2 Guide to the Enterprise Console interface...4 3 Getting started with Sophos Enterprise

More information

How To Use Senior Systems Cloud Services

How To Use Senior Systems Cloud Services Senior Systems Cloud Services In this guide... Senior Systems Cloud Services 1 Cloud Services User Guide 2 Working In Your Cloud Environment 3 Cloud Profile Management Tool 6 How To Save Files 8 How To

More information

Contents. VPN Instructions. VPN Instructions... 1

Contents. VPN Instructions. VPN Instructions... 1 VPN Instructions Contents VPN Instructions... 1 Download & Install Check Point VPN Software... 2 Connect to FPUA by VPN... 6 Connect to Your Computer... 8 Determine Your Machine Type... 10 Identify 32-bit

More information

How to remotely access your Virtual Desktop from outside the college using VMware View Client. How to guide

How to remotely access your Virtual Desktop from outside the college using VMware View Client. How to guide How to remotely access your Virtual Desktop from outside the college using VMware View Client How to guide Author: ICT Services Version: 1.0 Date: November 2015 Contents What is the VMware View Client?...

More information

MAPPING THE WEBDRIVE REFERENCE GUIDE

MAPPING THE WEBDRIVE REFERENCE GUIDE MAPPING THE WEBDRIVE REFERENCE GUIDE INTRODUCTION The university WebDrive is a dedicated drive to host all university web content. For help with mapping the WebDrive, please read the instructions below

More information

Remote E-mail Access with Outlook 2003 Using RPC over HTTPS

Remote E-mail Access with Outlook 2003 Using RPC over HTTPS Remote E-mail Access with Outlook 2003 Using RPC over HTTPS Information Services now offers full remote access to your Exchange e-mail, calendar, contacts, etc. via the Outlook client without having to

More information

Nexio Connectus with Nexio G-Scribe

Nexio Connectus with Nexio G-Scribe Nexio Connectus with Nexio G-Scribe 2.1.2 3/20/2014 Edition: A 2.1.2 Publication Information 2014 Imagine Communications. Proprietary and Confidential. Imagine Communications considers this document and

More information

ILTA HANDS ON Securing Windows 7

ILTA HANDS ON Securing Windows 7 Securing Windows 7 8/23/2011 Table of Contents About this lab... 3 About the Laboratory Environment... 4 Lab 1: Restricting Users... 5 Exercise 1. Verify the default rights of users... 5 Exercise 2. Adding

More information

Setting up Remote Desktop

Setting up Remote Desktop Setting up Remote Desktop Terminology: Host PC the computer you want to access remotely; the destination Client PC the computer you are actually using to access another PC; the source IP Address the numerical

More information

Cyber Security: Software Security and Hard Drive Encryption

Cyber Security: Software Security and Hard Drive Encryption Links in this document have been set for a desktop computer with the resolution set to 1920 x 1080 pixels. Cyber Security: Software Security and Hard Drive Encryption 301-1497, Rev A September 2012 Copyright

More information

LepideAuditor Suite for File Server. Installation and Configuration Guide

LepideAuditor Suite for File Server. Installation and Configuration Guide LepideAuditor Suite for File Server Installation and Configuration Guide Table of Contents 1. Introduction... 4 2. Requirements and Prerequisites... 4 2.1 Basic System Requirements... 4 2.2 Supported Servers

More information

WA2192 Introduction to Big Data and NoSQL. Classroom Setup Guide. Web Age Solutions Inc. Copyright Web Age Solutions Inc. 1

WA2192 Introduction to Big Data and NoSQL. Classroom Setup Guide. Web Age Solutions Inc. Copyright Web Age Solutions Inc. 1 WA2192 Introduction to Big Data and NoSQL Classroom Setup Guide Web Age Solutions Inc. Copyright Web Age Solutions Inc. 1 Table of Contents Part 1 - Minimum Hardware Requirements...3 Part 2 - Minimum Software

More information

Deploying Windows Streaming Media Servers NLB Cluster and metasan

Deploying Windows Streaming Media Servers NLB Cluster and metasan Deploying Windows Streaming Media Servers NLB Cluster and metasan Introduction...................................................... 2 Objectives.......................................................

More information

SQL Server Setup for Assistant/Pro applications Compliance Information Systems

SQL Server Setup for Assistant/Pro applications Compliance Information Systems SQL Server Setup for Assistant/Pro applications Compliance Information Systems The following document covers the process of setting up the SQL Server databases for the Assistant/PRO software products form

More information

QUANTIFY INSTALLATION GUIDE

QUANTIFY INSTALLATION GUIDE QUANTIFY INSTALLATION GUIDE Thank you for putting your trust in Avontus! This guide reviews the process of installing Quantify software. For Quantify system requirement information, please refer to the

More information

Outlook Integration for Client Profiles for Windows

Outlook Integration for Client Profiles for Windows C ase Manag e m e n t by C l i e n t P rofiles Outlook Integration for Client Profiles for Windows T E C H N O L O G Y F O R T H E B U S I N E S S O F L A W Table of Contents 2 Table of Contents Overview...

More information

Mondopad v1.6. Quick Start 009-1489-00

Mondopad v1.6. Quick Start 009-1489-00 Mondopad v1.6 Quick Start 009-1489-00 Contents Hardware Setup... 3 Windows Setup & Registration Process... 3 Microsoft Windows Setup... 3 Register the Mondopad Software... 4 Microsoft Office Activation...

More information

...1 CITRIX REMOTE ACCESS WINDOWS 7...1 TABLE OF CONTENTS...1 ADDING CITRIX.AKERMAN.COM AS A TRUSTED SITE TO INTERNET EXPLORER 8.0...

...1 CITRIX REMOTE ACCESS WINDOWS 7...1 TABLE OF CONTENTS...1 ADDING CITRIX.AKERMAN.COM AS A TRUSTED SITE TO INTERNET EXPLORER 8.0... TABLE OF CONTENTS...1 CITRIX REMOTE ACCESS WINDOWS 7...1 TABLE OF CONTENTS...1 ADDING CITRIX.AKERMAN.COM AS A TRUSTED SITE TO INTERNET EXPLORER 8.0...2 INSTALLING THE ENDPOINT ANALYSIS...4 LOGGING OFF

More information

Web File Management with SSH Secure Shell 3.2.3

Web File Management with SSH Secure Shell 3.2.3 Web File Management with SSH Secure Shell 3.2.3 June 2003 Information Technologies Copyright 2003 University of Delaware. Permission to copy without fee all or part of this material is granted provided

More information

Undergraduate Academic Affairs \ Student Affairs IT Services. VPN and Remote Desktop Access from a Windows 7 PC

Undergraduate Academic Affairs \ Student Affairs IT Services. VPN and Remote Desktop Access from a Windows 7 PC Undergraduate Academic Affairs \ Student Affairs IT Services VPN and Remote Desktop Access from a Windows 7 PC Last edited: 4 December 2015 Contents Inform IT Staff... 1 Things to Note... 1 Setting Up

More information

Check current version of Remote Desktop Connection for Mac.. Page 2. Remove Old Version Remote Desktop Connection..Page 8

Check current version of Remote Desktop Connection for Mac.. Page 2. Remove Old Version Remote Desktop Connection..Page 8 CONTENTS SECTION 1 Check current version of Remote Desktop Connection for Mac.. Page 2 SECTION 2 Remove Old Version Remote Desktop Connection..Page 8 SECTION 3 Download and Install Remote Desktop Connection

More information

Outlook Profile Setup Guide Exchange 2010 Quick Start and Detailed Instructions

Outlook Profile Setup Guide Exchange 2010 Quick Start and Detailed Instructions HOSTING Administrator Control Panel / Quick Reference Guide Page 1 of 9 Outlook Profile Setup Guide Exchange 2010 Quick Start and Detailed Instructions Exchange 2010 Outlook Profile Setup Page 2 of 9 Exchange

More information

FTP Over SSL (FTPS) Core FTP LE. Installing Core FTP LE"

FTP Over SSL (FTPS) Core FTP LE. Installing Core FTP LE FTP Over SSL (FTPS) Gordon State College has setup FTP Over SSL (also known as FTPS ) to allow students, faculty, and staff to access resources from our Servers from off-campus using an encrypted connection.

More information

How to Setup SQL Server Replication

How to Setup SQL Server Replication Introduction This document describes a scenario how to setup the Transactional SQL Server Replication. Before we proceed for Replication setup you can read brief note about Understanding of Replication

More information

K7 Business Lite User Manual

K7 Business Lite User Manual K7 Business Lite User Manual About the Admin Console The Admin Console is a centralized web-based management console. The web console is accessible through any modern web browser from any computer on the

More information

Portions of this product were created using LEADTOOLS 1991-2009 LEAD Technologies, Inc. ALL RIGHTS RESERVED.

Portions of this product were created using LEADTOOLS 1991-2009 LEAD Technologies, Inc. ALL RIGHTS RESERVED. Installation Guide Lenel OnGuard 2009 Installation Guide, product version 6.3. This guide is item number DOC-110, revision 1.038, May 2009 Copyright 1992-2009 Lenel Systems International, Inc. Information

More information

Table of Contents. CHAPTER 1 About This Guide... 9. CHAPTER 2 Introduction... 11. CHAPTER 3 Database Backup and Restoration... 15

Table of Contents. CHAPTER 1 About This Guide... 9. CHAPTER 2 Introduction... 11. CHAPTER 3 Database Backup and Restoration... 15 Table of Contents CHAPTER 1 About This Guide......................... 9 The Installation Guides....................................... 10 CHAPTER 2 Introduction............................ 11 Required

More information

Citrix : Remediation - MAC

Citrix : Remediation - MAC Citrix : Remediation - MAC Key Points: 1. 2. 3. 4. 5. 6. 7. Understanding End Point Scan Analysis Supported anti-virus and firewall products Configuring AVAST/SOPHOS and the Mac OS X Firewall Installing

More information

LRDC Computing Services

LRDC Computing Services LRDC Computing Services Remote Access to the LRDC Fileservers Windows XP* April 5, 2005 *While these instructions have been created for and tested on a Windows XP computer, they may also work for your

More information

Quick Install Guide. Lumension Endpoint Management and Security Suite 7.1

Quick Install Guide. Lumension Endpoint Management and Security Suite 7.1 Quick Install Guide Lumension Endpoint Management and Security Suite 7.1 Lumension Endpoint Management and Security Suite - 2 - Notices Version Information Lumension Endpoint Management and Security Suite

More information

Symantec AntiVirus Corporate Edition Patch Update

Symantec AntiVirus Corporate Edition Patch Update Symantec AntiVirus Corporate Edition Patch Update Symantec AntiVirus Corporate Edition Update Documentation version 10.0.1.1007 Copyright 2005 Symantec Corporation. All rights reserved. Symantec, the Symantec

More information

Email Client Configuration Guide

Email Client Configuration Guide Email Client Configuration Guide Table of Contents Email Configuration...3 Email settings...3 IMAP...3 POP...3 SMTP...3 Process Overview...5 Account set up wizards...5 Anatomy of an email address...5 Why

More information

HOW TO INSTALL FS USB TRANSCRIPTION SOFTWARE (OFFICE ADMIN MEDICAL)

HOW TO INSTALL FS USB TRANSCRIPTION SOFTWARE (OFFICE ADMIN MEDICAL) Go to itstartshere.nbcc.ca to watch a video on how to do this. HOW TO INSTALL FS USB TRANSCRIPTION SOFTWARE (OFFICE ADMIN MEDICAL) These steps MUST be performed while at the college. Cannot be done from

More information

Archive Add-in Administrator Guide

Archive Add-in Administrator Guide Archive Add-in Administrator Guide RESTRICTION ON USE, PUBLICATION, OR DISCLOSURE OF PROPRIETARY INFORMATION Copyright 2011 McAfee, Inc. This document contains information that is proprietary and confidential

More information

Detecting and Removing Spyware From Your Home Computer

Detecting and Removing Spyware From Your Home Computer Detecting and Removing Spyware From Your Home Computer Preamble: Spyware are programs that silently monitor and report on computing activities via the Internet. Companies use Spyware to target users with

More information

Global VPN Client Getting Started Guide

Global VPN Client Getting Started Guide Global VPN Client Getting Started Guide 1 Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your system. CAUTION: A CAUTION indicates potential

More information

HWS Virtual Private Network Configuration and Setup Mac OS X 12/19/2006

HWS Virtual Private Network Configuration and Setup Mac OS X 12/19/2006 The VPN connection supports mainly access to the HWS network drives, not streaming audio/video or downloading large amounts of data. Contents Before Connecting via VPN Before setting up a Virtual Private

More information

Installation and Program Essentials

Installation and Program Essentials CS PROFESSIONAL SUITE ACCOUNTING PRODUCTS Installation and Program Essentials version 2015.x.x TL 28970 3/26/2015 Copyright Information Text copyright 1998 2015 by Thomson Reuters. All rights reserved.

More information

Technical Reference: Deploying the SofTrack MSI Installer

Technical Reference: Deploying the SofTrack MSI Installer Technical Reference: Page 1 of 20 Table of Contents Overview...3 Prerequisites...3 Component Descriptions...3 Deploying the MSI...3 Script Method...3 Defining Public Properties... 4 Public Property Tables...

More information

Charter Business Desktop Security Administrator's Guide

Charter Business Desktop Security Administrator's Guide Charter Business Desktop Security Administrator's Guide Table of Contents Chapter 1: Introduction... 4 Chapter 2: Getting Started... 5 Creating a new user... 6 Recovering and changing your password...

More information

LANDESK Service Desk. Desktop Manager

LANDESK Service Desk. Desktop Manager LANDESK Service Desk Desktop Manager LANDESK SERVICE DESK DESKTOP MANAGER GUIDE This document contains information, which is the confidential information and/or proprietary property of LANDESK Software,

More information

Reporting works by connecting reporting tools directly to the database and retrieving stored information from the database.

Reporting works by connecting reporting tools directly to the database and retrieving stored information from the database. Print Audit 6 - Step by Step Walkthrough IMPORTANT: READ THIS BEFORE PERFORMING A PRINT AUDIT 6 INSTALLATION Print Audit 6 is a desktop application that you must install on every computer where you want

More information

3 Setting up Databases on a Microsoft SQL 7.0 Server

3 Setting up Databases on a Microsoft SQL 7.0 Server 3 Setting up Databases on a Microsoft SQL 7.0 Server Overview of the Installation Process To set up GoldMine properly, you must follow a sequence of steps to install GoldMine s program files, and the other

More information

KANTECH SCHEDULED EVENTS INSTALLATION MANUAL

KANTECH SCHEDULED EVENTS INSTALLATION MANUAL KANTECH SCHEDULED EVENTS INSTALLATION MANUAL Before you begin you will need to have downloaded the software and received your license from the Multi Tech Reps webstore. You may also need your Windows installation

More information

RMM/MDM. Quick Reference Guide

RMM/MDM. Quick Reference Guide RMM/MDM Quick Reference Guide Contents Getting Started...3 Probe and Agent Management...3 Installing a Windows Probe...3 Installing an Agent...5 Windows Agents...5 Updating Monitoring Software - Manually...5

More information

Moxa Device Manager 2.0 User s Guide

Moxa Device Manager 2.0 User s Guide First Edition, March 2009 www.moxa.com/product 2009 Moxa Inc. All rights reserved. Reproduction without permission is prohibited. Moxa Device Manager 2.0 User Guide The software described in this manual

More information

Introduction. Before you begin. Installing efax from our CD-ROM. Installing efax after downloading from the internet

Introduction. Before you begin. Installing efax from our CD-ROM. Installing efax after downloading from the internet Introduction Before you begin Before you begin installing efax, please check the following: You have received confirmation that your application for the efax service has been processed. The confirmation

More information

Patch Management Table of Contents:

Patch Management Table of Contents: Table of Contents: Manage Machines Manage Updates Patch Policy Configure Patch Parameters 153 Chapter 5 - Sadjadi et al. Introduction As new operating system and software updates are released in an ever

More information

Security Practices Essentials. Viruses McAfee Virus Software Critical Windows Updates Network Settings. Spyware Adaware Spybot Windows Defender

Security Practices Essentials. Viruses McAfee Virus Software Critical Windows Updates Network Settings. Spyware Adaware Spybot Windows Defender Security Practices Essentials Viruses McAfee Virus Software Critical Windows Updates Network Settings Spyware Adaware Spybot Windows Defender Security Practices Essentials: All computer passwords should

More information

Mesa DMS. Once you access the Mesa Document Management link, you will see the following Mesa DMS - Microsoft Internet Explorer" window:

Mesa DMS. Once you access the Mesa Document Management link, you will see the following Mesa DMS - Microsoft Internet Explorer window: Mesa DMS Installing MesaDMS Once you access the Mesa Document Management link, you will see the following Mesa DMS - Microsoft Internet Explorer" window: IF you don't have the JAVA JRE installed, please

More information

Deep Freeze and Microsoft System Center Configuration Manager 2012 Integration

Deep Freeze and Microsoft System Center Configuration Manager 2012 Integration 1 Deep Freeze and Microsoft System Center Configuration Manager 2012 Integration Technical Paper Last modified: May 2015 Web: www.faronics.com Email: sales@faronics.com Phone: 800-943-6422 or 604-637-3333

More information

KB-365CP Certiport Level One (L1) Technical Support

KB-365CP Certiport Level One (L1) Technical Support KB-365CP Certiport Level One (L1) Technical Support OVERVIEW Level One (L1) Certiport Technical Support includes: Resolving Error 31 (ITS Engine - Office 2010) and Error 47 (Summit Engine - Office 2007)

More information