Application packaging can help enterprises manage growing volumes of software for desktop and server systems efficiently.

Size: px
Start display at page:

Download "Application packaging can help enterprises manage growing volumes of software for desktop and server systems efficiently."

Transcription

1 A TAKE Solutions White Paper Application packaging can help enterprises manage growing volumes of software for desktop and server systems efficiently. By streamlining software configuration and deployment, application packaging can help reduce application management costs.

2 SoftGrid Application Virtualization Microsoft SoftGrid Application Virtualization is the only virtualization solution that delivers applications that are never installed, yet helps to securely follow users anywhere, on demand. Whether deployed on desktops, terminal servers or in conjunction with Microsoft SMS, \ SoftGrid changes application management from a series of tedious, manual tasks into an automated, streamlined process that accelerates the pace and reduces the cost of business. With SoftGrid, applications are never installed on individual desktops, laptops or servers.instead, applications are located on a central SoftGrid Server, managed from a single console and deployed ondemand to either desktops or terminal servers over the network when they're needed. This automates all four stages of the application management process. Deployment: Using SoftGrid, IT administrators no longer have to go from machine to machine to deploy software. Instead, they can quickly deploy applications by placing the software on a single SoftGrid server and assigning application rights to users using Active Directory or NT Domains. This automatically deploys icons on end-users desktops with rights to the application making access immediate and no different than what they are already used to Updates: To update applications, administrators replace only the changed files on the SoftGrid Server. End users have immediate access to the latest version Support: SoftGrid eliminates many of the problems that lead to most support calls (application conflicts, etc.). Furthermore, if there are problems with an application, support can centrally fix the software instead of having to visit the individual computer. Termination: To eliminate an application, administrators simply take it off the SoftGrid Server. To terminate a particular user's rights, they simply remove access from Active Directory. Either of these automatically removes icons for the application on end-users desktops. There is no need for un-installs or visits to individual computers. Roaming and free-seating models can be powerful for a range of IT environments including thosein hospitals, financial services firms, universities, libraries and training rooms/labs. However, they have never been viable using solely Windows desktop operating systems. These changes with Microsoft SoftGrid Application Virtualization. 2

3 Customers have cut help-desk costs by up to 30% by reducing call volume for application-related problems, and reduced enduser downtime by up to 80% by ensuring business continuity of applications. Application Roaming SoftGrid supports multiple Windows client environments, including desktops, laptops and terminal servers, with a single, centrally managed infrastructure. As a result, users can seamlessly travel from one physical environment to the next throughout the day and have their applications and preferences roam with them. Application roaming and can be used in conjunction with SoftGrid's application replication capabilities to ensure that no matter the location of the user, their application requests are always fulfilled by a local SoftGrid server, ensuring optimal performance and conserving WAN bandwidth. Hoteling/Free-Seating Two key capabilities make it possible for users to share Windows desktops or laptops in a successive fashion: 1) All applications and user preferences can be configured to persist on the network, and 2) Applications cannot affect the local operating system on which they execute. For example, one user can sit down at a desktop in the morning hours, log in and receive icons that represent applications that are specific to them. As the user executes those applications, they are cached to the desktop or laptop but run in SystemGuard, a virtual runtime environment that protects applications from each other and which also protects the underlying OS from any application-specific modification. The user logs off a few hours later, freeing up the machine. Then, a second user can log on and receive a different set of application icons which may or may not include some programs that overlap with the first user. As the second user starts using their programs, the applications will either be sent from a SoftGrid server and cached locally or will be loaded from the local cache if they were used by a previous user. The SoftGrid cache, therefore, is shared and persistent, which means that applications only need to be accessed one time per system. However, because of the platform's security capabilities, only users with permissions to run an application will see the icon for that application appear on their desktop, Start menu or quick launch bar. Security Microsoft SoftGrid Application Virtualization improves application security, desktop reliability and resilience, and license compliance. When applications are not fully secured everything from desktop reliability to license compliance can be affected. Each time an application is installed, the operating system is impacted. Each time a browser is used to access applications, the likelihood of security breaches and infections increases. SoftGrid improves application security in several ways: As a result of policy-based intelligent management, users can only access applications that they have been given permission to use Applications that typically require administrative rights can be run using a standard user account in virtual administrator mode so end-users cannot inadvertently, or intentionally, affect the network IT can secure applications via a read-only operating system with a fully locked down security template or group policy object, protecting applications from being altered or used in unauthorized manners. Because applications are never installed, the OS remains pristine and less prone to infection or degradation With application virtualization, if malware does infect one application, the chances that it will compromise other applications or the OS are greatly reduced If a laptop is lost or stolen, the applications on it will only run for a limited period, eventually timing out and protecting your license agreements. Cost-reducing Help eliminate costly processes such as compatibility testing, as well as hidden costs. Customers have cut help-desk costs by up to 30% by reducing call volume for application-related problems, and reduced end-user downtime by up to 80% by ensuring business continuity of applications. 3

4 Resources can be dynamically allocated in realtime based on real-time needs. This is called the SystemGuard virtual application environment. SoftGrid's patented application virtualization, dynamic streaming delivery, and centralized management technologies make everything from deployments and upgrades to migrations and business continuity initiatives, much easier, faster, and lower-risk. Application Virtualization Application virtualization is at the heart of SoftGrid. It decouples applications from the operating system and enables them to run as network services. Application virtualization can be layered on top of other virtualization technologies network, storage, machine to create a fullyvirtual IT environment where all computing resources can be dynamically allocated in realtime based on real-time needs. This is called the SystemGuard virtual application environment. SystemGuard enables each application to bring its own set of configurations and run within a protective run-time "sandbox" on the client, so there is no dependency or effect on the configuration of the machine running them. However, since applications execute locally, they run with full performance, functionality, and access to local services including cut and paste, OLE, printing, network drives and attached devices. Standard Operating System Environment. Under standard environments, applications install their settings onto the host operating system, hardcoding the entire system to fit that application's needs. Other applications' settings can be overwritten, causing them to malfunction or break. Standard Operating System Environment Under standard environments, applications install their settings onto the host operating system, hard-coding the entire system to fit that application's needs. Other applications' settings can be overwritten, causing them to malfunction or break The Virtual Application Environment With application virtualization, each application brings down its own set of configurations on-demand, and executes in a way so that only it sees its own settings. This leaves the host operating system and existing settings unaltered. Side-by-Side Virtualization Each SoftGrid-enabled application brings down its own set of configurations and can run side-by-side without the settings conflicting with each other or the host operating system. Despite this separation, inter-application communication with other SoftGrid applications and those installed locally is preserved, allowing for cut and paste, OLE, and all other standard operations. SoftGrid's application virtualization is different than machine virtualization (such as Microsoft Virtual Server), which virtualizes the machine on which the operating system (and applications) are installed. Machine virtualization provides an abstraction layer between the hardware and the operating system that's running on top of it. It also allows managing and simultaneously operating multiple environments on a single machine. SystemGuard provides the most extensive virtualization on the market. In addition to virtualizing Windows Services, it virtualizes per user, per application instance, every critical application component including the Registry, file system, DLLs, COM/IPC,.INI files, process environment and fonts. Registry SystemGuard creates a virtual Registry for each application. Registry settings created by one application cannot be seen by other applications including Regedit. Rather than copying the entire Registry, SystemGuard's virtual registry utilizes an "overlay" method items in the real registry may be read by the application as long as a virtual copy of that item is not available. All application writes to the Registry are contained within the virtual Registry. File System SystemGuard also handles requests made by applications to files in specific directories by redirecting the requests. For example, if an application looks for a file located in a specific directory on the local C drive, SystemGuard can redirect any requests to the corresponding directory inside of its virtual file system. Dynamic Link Libraries (DLLs) specifically needed 4

5 This wizardbased tool allows you to package applications in a virtual environment that can be delivered and executed on the client. by the application are made available within SystemGuard, avoiding conflicts with different versions of the same DLL that may be installed locally. These components are shared and tracked inside of the Virtual File Systemavailable. All application writes to the Registry are contained within the virtual Registry. COM/IPC SystemGuard enables programs to redirect communication requests through services such as COM/ DCOM or IPC methods such as Named Pipes. This alleviates versioning problems and other conflicts at these interfaces..ini SystemGuard allows each application or instance to have private settings within virtual copies of standard Windows.ini files. Process Environment: SystemGuard stores private environment variables including paths, port values and addresses. Fonts Installation of fonts can consume valuable resources as they are done on a machine-wide basis. SystemGuard can make fonts available individually on a per-application basis. The Virtual Environment SystemGuard is at the core of SoftGrid Client, which runs on the local desktop. SystemGuard is responsible for providing a fully functional virtual environment for applications to run in isolation. Contained in this environment are the virtualized OS components registry, files, fonts, INI, COM, embedded services, and environment variables that are required for the application to run properly. SystemGuard creates virtualized registry keys for every application it runs. These keys are not accessible to other applications running on the local OS, nor are they visible to registry editing tools such as regedit. Registry reads and writes are redirected to the virtual keys as needed. Note, though, that virtualized applications are allowed to pass through to the local registry for information not contained in the virtualized registry keys. Similarly, SystemGuard creates a virtualized file system and redirects the majority of the application's reads and writes to this file system. This virtualized file system is isolated and provides the environment you need if you want to run multiple versions of the same application on a single client.. Packaging Applications Now you might be wondering how you create a fully functional independent environment for your virtualized application to run in. For this task, you use SoftGrid Sequencer. This wizardbased tool allows you to package applications in a virtual environment that can be delivered and executed on the client. The sequencing process involves three steps: Installation, Configuration and Test, and Execution. In the first step, Installation, the SoftGrid Sequencer uses an active watch process to monitor the installation of the application and assess application dependencies. Once complete, the Configuration and Test phase is used to make any necessary changes to the default configuration in order to ensure the desired first-run experience. Finally, in the Execution phase, the SoftGrid Sequencer compiles and orders the code block necessary to launch the application. Feature Block 1 (FB1) is the essential code required to launch the application, allowing the user to run the application without downloading the entire package. Once an application has been sequenced, four files are created: a virtualizationenabled application file (.sft), an Open Software Description file (.osd), an Icon file (.ico), and a project file (.sprj). These are then copied to the content directory of SVAS. Alternatively, an administrator can publish.ico and.osd files to the clients using an HTTP server. While SoftGrid typically provisions applications to run independently of each other in isolated environments, SystemGuard does permit some application interaction. You should carefully examine any dependencies applications may have on one another and sequence applications together if they rely on interacting with each other. This process is commonly referred to as suiting. Note that not all applications that require interaction with one another can be sequenced 6

6 The management console provides a single administrative tool from which applications can be published, terminated, and so on. together. Suiting is a very intricate process and should be done only after careful examination of the dependencies, as sometimes sequencing two or more applications defeats the purpose of virtualization. Simplifying Administration The SoftGrid management console provides a single tool for performing all the administrative tasks. The management console is installed on the SVAS by default and can be installed on any other server or workstation. It is an MMC 3.0 snap-in and uses the SoftGrid Management Web Service to connect to the SoftGrid DataStore, giving authorized administrators full access to data stored in the database for management purposes. The connection between the management console and the SoftGrid Management Web Service uses Microsoft.NET Framework remoting, making it possible to install the management console and the Web service on the same or different servers. Larger organizations should run more than one instance of the SoftGrid Management Web Service. The SoftGrid Management Web Service runs on Windows 2000 or later with IIS 5.0 or later. The.NET Framework 2.0 or later is required, as well as Microsoft Data Access Components (MDAC) 2.7 or later for data store connectivity. The management console provides a single administrative tool from which applications can be published, terminated, and so on. Tasks are organized into nine main categories or containers. The Applications container is where the administrator can do things such as import.sprj files to publish newer applications, specify.osd location, remove applications, and so on. By default, this container includes a published package you can use to test client connectivity to the application server. A file type association is created when the applications are sequenced. Once the package is imported, the file type associations become available in the management console. The File Type Association container provides a single place for administrators to modify all file type associations. The Packages container controls versions of packages for active upgrades; these are application upgrades that can be done without the user disconnecting or the server being shut down. The administrator can also delete a package from the management console using this container. Note that deleting a package from the Packages container will remove the.sft file fromthe management console and the data store but will not delete it from the content directory on the application server. As we mentioned earlier, when a user launches an application, SoftGrid Client checks for license availability and launches the application only if a license is available in a data store. The Application Licenses container is where administrators can associate licenses with applications unlimited licenses, concurrent licenses, and named licenses are all supported. Server Groups contains a logical grouping of application virtualization servers and logging information. Administrators can add new server groups or modify properties (such as ports used for communication or allocated memory and processes) of an existing group. In the Provider Policies container, the administrator can create a set of rules called policies. The custom provider policies are used to give users access to numerous applications under different sets of conditions. You can use the Account Authorities container to specify a domain and credentials that will be used when SoftGrid needs access to read the domain's directory information. SoftGrid Administrators contains the user groups responsible for administering the SoftGrid environment. In this container, administrators can add or remove groups to control access permissions. Lastly, the Reports container, as its name implies, allows administrators to generate reports to check the overall health of the SoftGrid environment. The following reports are available: Application Utilization, Software Audit, System Utilization, User/ Group Activity, and System Error. Setting up the Client The SoftGrid Client is installed on the operating system of the computer the user will use to access the virtualized application. As we mentioned earlier, two client types are supported: Microsoft SoftGrid for Desktops or Microsoft SoftGrid for Terminal Servers. Each approach hasadvantages but also certain performance tradeoffs, in terms of network latency, server farm consolidation, and ease of management. 6

7 SoftGrid relies on Active Directory (or Windows NT 4.0) domain users and groups for provisioning applications to authorized users. In a desktop implementation, applications are available locally and there is little dependency on network availability and throughput. This approach is recommended, for instance, for organizations that have branch offices with limited IT infrastructure. Terminal Services is a good option for an organization that has already rolled out terminal servers. This scenario makes efficient use of hardware and software, drastically reducing the number of necessary servers. And, of course, it enables a true free seating environment. Large organizations will typically have a combination of desktop and terminal server infrastructure. Installing and configuring the various components is similar for both approaches when you set up a SoftGrid deployment. The client can be deployed using any standard method, such as manual installation or automated deployment using a tool such as Systems Management Server Although the installation of the client is straightforward, there are some properties you must provide at the time of installation such things as the location of the installation, the cache size, the drive letter to be used for the virtual drive, the location of application data files, and so on. Once the client has been installed, some additional settings can be specified or changed using the client management console. To launch the client management console, go to the control panel and launch SoftGrid Client Management from Administrative tools. You can choose to connect to the local machine or to a remote machine. The SoftGrid on local host root tab is where you can specify most of the functional parameters, including logging directory, application data directory, client run and display settings, error and informational message pop-up frequency, maximum cache size, virtualized drive, network and connectivity options when disconnected from SoftGrid server, and permissions. You can view and change applications in the Applications container. The Applications container provides status information about the local application, such as whether the application is running, if the application is locked in cache, and what percentage of the application (.sft file) has been streamed into the local cache. The File Type Association container allows you to view, change, and remove a file type association. For more details, see our discussion of the File Type Association in the previous section. The Desktop Configuration container allows you to specify, change, and manually refresh the application server settings you specified during installation. Here, you can also select whether the client refresh should happen at the time of user logon (this is the default selection) and the length of the auto refresh interval. Active Directory SoftGrid relies on Active Directory (or Windows NT 4.0) domain users and groups for provisioning applications to authorized users. In a multi-domain environment, users can be provisioned using the appropriate group memberships (SoftGrid supports local, global, and universal group memberships) and trust relationships with the domain where SVAS is installed. When installing SVAS, you are prompted for different service accounts and groups, which help with the integration with Active Directory and are subsequently used for administrative purposes. Thus, there are three groups and accounts that you should create prior to installation: a SoftGrid Browser Account, a SoftGrid Administrators Group, and a SoftGrid Users Group. The SoftGrid Browser Account is responsible for browsing Active Directory and,therefore, requires read-only rights to all the Active Directory domains in a multi-domain environment. The SoftGrid Administrators Group is used to grant administrative access to SoftGrid Management Console and SoftGrid Management Web Service. And the SoftGrid Users Group is used to assign default provider policy, which is used to give all users in the domain access to applications published through the management console. Microsoft SoftGrid Application Virtualization helps reduce the complexities inherent in enterprise application management. With SoftGrid you can overcome formidable challenges that, until now, have been unavoidable, and transform your computing environment into a dynamic, services-oriented infrastructure. 7

8 TAKE has developed an efficient and cost effective approach to application migration which includes assessment and reporting on the compatibility of applications which helps to reduce time and cost Application Stewarship TAKE provides application stewardship as part of application packaging process for our client in reduced costs saving you much time in finding the technical details of the applications. We meet with the developers, users and testers to perform a test install of each application before packaging. The complete stewardship is performed on each application and the same is documented. Application steward is mainly the process of collecting the technical details, dependencies and requirements of the application. The following are the main objectives of this process. To know the system requirements of the applications like required hard drive, memory and operating system. To know any pre dependencies for the applications if exists. To know privileges required by the user to install and run the applications. To know the complete installation instructions and procedures for the applications To know the testing procedures and collect the test data to test the packages. To know possible risk of installation failure for those applications. To know the number of target work stations and their operating system. All the above are taken care of if the clients can provide us the right contact persons for all the applications that we have to package MSI Packaging(Windows Installer technology) Windows Installer provides consistent and reliable methods to customize installations, update and upgrade applications, and resolve configuration problems. Using Windows Installer the operating system implements all of the proper installation rules. An application needs only to describe itself in a Windows Installer package. Windows Installer then performs the installation tasks for each application, which can help prevent problems. Windows Installer provides a standard packaging format for applications and a standard method for customizing applications. Preparing or obtaining a Windows Installer package file for installation is called packaging the software. Each product has its own Windows Installer package file. Depending on the application to be deployed, packaging software can be as simple as performing an administrative installation to prepare the application for later installation by clients from a network location. Packaging can also be as complex as reauthoring the entire application, or even repackaging the application, which involves capturing the required modifications when installing an application and replacing the application's native installation program with a customized setup. Quality Testing Prior to deploying a Windows Installer based application, typically you need to test it in the targeted deployment environment to ensure the application works as expected. However, it is often not feasible (or possible) to test each piece of an application's functionality, due to the complexity of the application and/or its interface. Behind the scenes, there may be dozens or hundreds of attempts to access files, registry keys, or services; errors may only become apparent in rare and isolated circumstances Deployment Deployment tests are performed against the installed product, ensuring that the product has been installed correctly and all key functionality works in the installed environment. Test Cases in this area are primarily designed to identify whether the application fails to work properly due to permission settings on the registry or individual files. Migration can be done on a entire set of applications that are identified and tested for compatibility with the new operating system. TAKE has developed an efficient and cost effective approach to application migration which includes assessment and reporting on the compatibility of applications which helps to reduce time and cost. 8

9 TAKE Solutions, Inc. Global Headquarters Chennai, India 80/81, MBC Towers, 6th Floor Alwarpet Chennai , Towell- TAKE Solutions, LLC Middle East Office PO Box 270 PC 112 Ruwi Sultanate of Oman Tel Fax Copyright 2009 All content is the property of TAKE Solutions, Inc. All rights reserved. All other trademarks mentioned are the property of their respective owners.

Application Virtualisation: The Future of Distributed Computing?

Application Virtualisation: The Future of Distributed Computing? Application Virtualisation: The Future of Distributed Computing? UKCMG Annual Conference 2007 Tuesday 26 th June Session 2C3 Abstract Virtualisation is rapidly becoming the standard operating model for

More information

KASPERSKY LAB. Kaspersky Administration Kit version 6.0. Administrator s manual

KASPERSKY LAB. Kaspersky Administration Kit version 6.0. Administrator s manual KASPERSKY LAB Kaspersky Administration Kit version 6.0 Administrator s manual KASPERSKY ADMINISTRATION KIT VERSION 6.0 Administrator s manual Kaspersky Lab Visit our website: http://www.kaspersky.com/

More information

Virtualization and Windows 7

Virtualization and Windows 7 9 Chapter Virtualization and Windows 7 Information in this Chapter Windows XP Mode Many Forms of Virtualization Summary Windows Virtual PC is an optional component of Windows 7 Professional, Enterprise,

More information

THE COMPLETE VIEWER FOR MS PROJECT. Deployment White Paper

THE COMPLETE VIEWER FOR MS PROJECT. Deployment White Paper THE COMPLETE VIEWER FOR MS PROJECT Seavus DOOEL 2010 2 TABLE OF CONTENTS 1 DEPLOYMENT OPTIONS... 3 1.1 SINGLE USER INSTALLATION... 3 1.2 CONCURRENT USER INSTALLATION... 4 1.3 SINGLE COMPANY KEY INSTALLATION...

More information

PC-Duo Web Console Installation Guide

PC-Duo Web Console Installation Guide PC-Duo Web Console Installation Guide Release 12.1 August 2012 Vector Networks, Inc. 541 Tenth Street, Unit 123 Atlanta, GA 30318 (800) 330-5035 http://www.vector-networks.com Copyright 2012 Vector Networks

More information

Aspera Connect User Guide

Aspera Connect User Guide Aspera Connect User Guide Windows XP/2003/Vista/2008/7 Browser: Firefox 2+, IE 6+ Version 2.3.1 Chapter 1 Chapter 2 Introduction Setting Up 2.1 Installation 2.2 Configure the Network Environment 2.3 Connect

More information

How To Install An Appsense Desktop Manager On A Windows 7.5 (Windows 7) With A Windows 8.5.1 (Windows 8) (Windows) (Powerpoint) (Amd64) (Apple Windows 7) (Networking

How To Install An Appsense Desktop Manager On A Windows 7.5 (Windows 7) With A Windows 8.5.1 (Windows 8) (Windows) (Powerpoint) (Amd64) (Apple Windows 7) (Networking Environment Manager Installation and Upgrade Guide Version 8 FR4 SP2 INSTALLATION AND UPGRADE GUIDE ii AppSense Limited, 2013 All rights reserved. No part of this document may be produced in any form (including

More information

Getting Started with ESXi Embedded

Getting Started with ESXi Embedded ESXi 4.1 Embedded vcenter Server 4.1 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent

More information

Desktop Management, Profile Migration and Cross Platform Delivery. Technical Overview

Desktop Management, Profile Migration and Cross Platform Delivery. Technical Overview Desktop Management, Profile Migration and Cross Platform Delivery Executive Summary This document provides a technical overview of how AppSense Environment Manager can deliver a flexible and managed user

More information

Desktop Application Virtualization and Application Streaming: Function and Security Benefits

Desktop Application Virtualization and Application Streaming: Function and Security Benefits Desktop Application Virtualization and Application Streaming: Function and Security Benefits Tom Olzak August 2007 Current security issues caused by an increasing number of threats, application vulnerabilities,

More information

Microsoft Terminal Server and Citrix Presentation Server Deployment Environments

Microsoft Terminal Server and Citrix Presentation Server Deployment Environments Microsoft Terminal Server and Citrix Presentation Server Deployment Environments Understanding the use of Act! in a Terminal Server or Citrix Presentation Server environment Table of Contents Introduction...

More information

WhatsUp Gold v16.3 Installation and Configuration Guide

WhatsUp Gold v16.3 Installation and Configuration Guide WhatsUp Gold v16.3 Installation and Configuration Guide Contents Installing and Configuring WhatsUp Gold using WhatsUp Setup Installation Overview... 1 Overview... 1 Security considerations... 2 Standard

More information

Server & Workstation Installation of Client Profiles for Windows

Server & Workstation Installation of Client Profiles for Windows C ase Manag e m e n t by C l i e n t P rofiles Server & Workstation Installation of Client Profiles for Windows T E C H N O L O G Y F O R T H E B U S I N E S S O F L A W General Notes to Prepare for Installing

More information

Table of Contents. Introduction...9. Installation...17. Program Tour...31. The Program Components...10 Main Program Features...11

Table of Contents. Introduction...9. Installation...17. Program Tour...31. The Program Components...10 Main Program Features...11 2011 AdRem Software, Inc. This document is written by AdRem Software and represents the views and opinions of AdRem Software regarding its content, as of the date the document was issued. The information

More information

ILTA HANDS ON Securing Windows 7

ILTA HANDS ON Securing Windows 7 Securing Windows 7 8/23/2011 Table of Contents About this lab... 3 About the Laboratory Environment... 4 Lab 1: Restricting Users... 5 Exercise 1. Verify the default rights of users... 5 Exercise 2. Adding

More information

StarTel. Course Syllabus

StarTel. Course Syllabus Course Syllabus Microsoft SoftGrid Application Virtualization Key Data Product #: FFA-00004 Course #: 5016A-EN Number of Days: Format: 4 Instructor-Led Certification Exams: None This course syllabus should

More information

HELP DOCUMENTATION E-SSOM DEPLOYMENT GUIDE

HELP DOCUMENTATION E-SSOM DEPLOYMENT GUIDE HELP DOCUMENTATION E-SSOM DEPLOYMENT GUIDE Copyright 1998-2013 Tools4ever B.V. All rights reserved. No part of the contents of this user guide may be reproduced or transmitted in any form or by any means

More information

Propalms TSE Deployment Guide

Propalms TSE Deployment Guide Propalms TSE Deployment Guide Version 7.0 Propalms Ltd. Published October 2013 Overview This guide provides instructions for deploying Propalms TSE in a production environment running Windows Server 2003,

More information

Citrix Provisioning Services Administrator s Guide Citrix Provisioning Services 5.1 SP2

Citrix Provisioning Services Administrator s Guide Citrix Provisioning Services 5.1 SP2 Citrix Provisioning Services Administrator s Guide Citrix Provisioning Services 5.1 SP2 December 2009 Revision 4 Copyright and Trademark Notice Information in this document is subject to change without

More information

ALTIRIS Software Delivery Solution for Windows 6.1 SP3 Product Guide

ALTIRIS Software Delivery Solution for Windows 6.1 SP3 Product Guide ALTIRIS Software Delivery Solution for Windows 6.1 SP3 Product Guide Notice Altiris Software Delivery Solution for Windows 6.1 SP3 Product Guide 2007 Altiris, Inc. All rights reserved. Document Date: February

More information

TECHNICAL DOCUMENTATION SPECOPS DEPLOY / APP 4.7 DOCUMENTATION

TECHNICAL DOCUMENTATION SPECOPS DEPLOY / APP 4.7 DOCUMENTATION TECHNICAL DOCUMENTATION SPECOPS DEPLOY / APP 4.7 DOCUMENTATION Contents 1. Getting Started... 4 1.1 Specops Deploy Supported Configurations... 4 2. Specops Deploy and Active Directory...5 3. Specops Deploy

More information

Virtual Application Management with Microsoft Application Virtualization 4.6 and System Center 2012 Configuration Manager

Virtual Application Management with Microsoft Application Virtualization 4.6 and System Center 2012 Configuration Manager Virtual Application Management with Microsoft Application Virtualization 4.6 and System Center 2012 Configuration Manager This whitepaper describes the virtual application management capabilities provided

More information

Outpost Network Security

Outpost Network Security Administrator Guide Reference Outpost Network Security Office Firewall Software from Agnitum Abstract This document provides information on deploying Outpost Network Security in a corporate network. It

More information

Module Comparison Chart

Module Comparison Chart Module Comparison Chart DYNAMIC CONFIGURATION MODULE Desktop Transformation Transforms any existing desktop infrastructure into managed user workspaces using live data and a step-bystep approach that minimizes

More information

Desktop Virtualization Strategy

Desktop Virtualization Strategy Choosing the right solution for your needs ABSTRACT Several forms of desktop virtualization can help organizations satisfy users needs for mobility and flexibility, while relieving pressure on information

More information

Virtual CD v10. Network Management Server Manual. H+H Software GmbH

Virtual CD v10. Network Management Server Manual. H+H Software GmbH Virtual CD v10 Network Management Server Manual H+H Software GmbH Table of Contents Table of Contents Introduction 1 Legal Notices... 2 What Virtual CD NMS can do for you... 3 New Features in Virtual

More information

Pro-Watch Software Suite Installation Guide. 2013 Honeywell Release 4.1

Pro-Watch Software Suite Installation Guide. 2013 Honeywell Release 4.1 Pro-Watch Software Suite Release 4.1 Installation Guide Document 7-901073V2 Pro-Watch Software Suite Installation Guide 2013 Honeywell Release 4.1 Copyright 2013 Honeywell. All rights reserved. Pro-Watch

More information

NetWrix Password Manager. Quick Start Guide

NetWrix Password Manager. Quick Start Guide NetWrix Password Manager Quick Start Guide Contents Overview... 3 Setup... 3 Deploying the Core Components... 3 System Requirements... 3 Installation... 4 Windows Server 2008 Notes... 4 Upgrade Path...

More information

Remote Application Server Version 14. Last updated: 25-02-15

Remote Application Server Version 14. Last updated: 25-02-15 Remote Application Server Version 14 Last updated: 25-02-15 Information in this document is subject to change without notice. Companies, names, and data used in examples herein are fictitious unless otherwise

More information

Accelerating Microsoft Windows 7 migrations with Citrix XenApp

Accelerating Microsoft Windows 7 migrations with Citrix XenApp Citrix XenApp and Microsoft Windows 7 White Paper Accelerating Microsoft Windows 7 migrations with Citrix XenApp XenApp will accelerate your Windows 7 migration, save money and resources, minimize disruption

More information

Simplify Suite in a VDI Environment

Simplify Suite in a VDI Environment Simplify Suite in a VDI Environment Before jumping onto the VDI bandwagon, ensure a smooth transition. tricerat solves the problems you may face when transitioning to VDI. Andrew Parlette, VP of Product

More information

VMware ThinApp Application Virtualization Made Simple

VMware ThinApp Application Virtualization Made Simple VMware ThinApp Application Virtualization Made Simple Rob Groenhuis Senior Systems Engineer VMware Netherlands BV 2009 VMware Inc. All rights reserved Agenda VMware s Vision Why Application Virtualization?

More information

Installation instructions for MERLIN Dashboard

Installation instructions for MERLIN Dashboard Installation instructions for MERLIN Dashboard Contents Installation Prerequisites:... 2 Procedure to manually backup and restore Views and Settings in AxOEE Manager... 3 For XP users go to:... 3 For Vista

More information

VMware ThinApp Agentless Application Virtualization Overview W HITE P APER

VMware ThinApp Agentless Application Virtualization Overview W HITE P APER VMware ThinApp Agentless Application W HITE P APER VMware defines application virtualization as the ability to deploy software without modifying the host computer or making any changes to the local operating

More information

Administration Guide. . All right reserved. For more information about Specops Deploy and other Specops products, visit www.specopssoft.

Administration Guide. . All right reserved. For more information about Specops Deploy and other Specops products, visit www.specopssoft. . All right reserved. For more information about Specops Deploy and other Specops products, visit www.specopssoft.com Copyright and Trademarks Specops Deploy is a trademark owned by Specops Software. All

More information

Remote Application Server Version 14. Last updated: 06-02-15

Remote Application Server Version 14. Last updated: 06-02-15 Remote Application Server Version 14 Last updated: 06-02-15 Information in this document is subject to change without notice. Companies, names, and data used in examples herein are fictitious unless otherwise

More information

Deltek Vision 7.0 LA. Technical Readiness Guide

Deltek Vision 7.0 LA. Technical Readiness Guide Deltek Vision 7.0 LA Technical Readiness Guide May 15, 2012 While Deltek has attempted to verify that the information in this document is accurate and complete, some typographical or technical errors may

More information

Out n About! for Outlook Electronic In/Out Status Board. Administrators Guide. Version 3.x

Out n About! for Outlook Electronic In/Out Status Board. Administrators Guide. Version 3.x Out n About! for Outlook Electronic In/Out Status Board Administrators Guide Version 3.x Contents Introduction... 1 Welcome... 1 Administration... 1 System Design... 1 Installation... 3 System Requirements...

More information

v.2.5 2015 Devolutions inc.

v.2.5 2015 Devolutions inc. v.2.5 Contents 3 Table of Contents Part I Getting Started 6... 6 1 What is Devolutions Server?... 7 2 Features... 7 3 System Requirements Part II Management 10... 10 1 Devolutions Server Console... 11

More information

Citrix Systems, Inc.

Citrix Systems, Inc. Citrix Password Manager Quick Deployment Guide Install and Use Password Manager on Presentation Server in Under Two Hours Citrix Systems, Inc. Notice The information in this publication is subject to change

More information

Pearl Echo Installation Checklist

Pearl Echo Installation Checklist Pearl Echo Installation Checklist Use this checklist to enter critical installation and setup information that will be required to install Pearl Echo in your network. For detailed deployment instructions

More information

Thin Client & Virtual Desktop White Paper

Thin Client & Virtual Desktop White Paper Thin Client & Virtual Desktop White Paper TABLE OF CONTENTS Overview 2 Compatible Thin Client Products 2 Thin Client Implementation Basics 2 Content Creation and Targeting... 2 Content Display... 3 Increase

More information

Ultimus and Microsoft Active Directory

Ultimus and Microsoft Active Directory Ultimus and Microsoft Active Directory May 2004 Ultimus, Incorporated 15200 Weston Parkway, Suite 106 Cary, North Carolina 27513 Phone: (919) 678-0900 Fax: (919) 678-0901 E-mail: documents@ultimus.com

More information

App-V Deploy and Publish

App-V Deploy and Publish App-V Deploy and Publish Tools from TMurgent Technologies Updated Aug 5, 2010 Version 1.8 Introduction: The deployment of Virtual Applications in the simplest way possible, without the need for complicated

More information

1 Introduction to Microsoft Enterprise Desktop Virtualization (MED-V)... 3 1.1 Terminology... 4 1.2 Key Capabilities... 4

1 Introduction to Microsoft Enterprise Desktop Virtualization (MED-V)... 3 1.1 Terminology... 4 1.2 Key Capabilities... 4 MED-V v1 Contents 1 Introduction to Microsoft Enterprise Desktop Virtualization (MED-V)... 3 1.1 Terminology... 4 1.2 Key Capabilities... 4 2 High-level Architecture... 6 2.1 System Requirements for MED-V

More information

VERITAS Backup Exec TM 10.0 for Windows Servers

VERITAS Backup Exec TM 10.0 for Windows Servers VERITAS Backup Exec TM 10.0 for Windows Servers Quick Installation Guide N134418 July 2004 Disclaimer The information contained in this publication is subject to change without notice. VERITAS Software

More information

Cloud Services MDM. ios User Guide

Cloud Services MDM. ios User Guide Cloud Services MDM ios User Guide 10/24/2014 CONTENTS Overview... 3 Supported Devices... 3 System Capabilities... 3 Enrollment and Activation... 4 Download the Agent... 4 Enroll Your Device Using the Agent...

More information

with the ArchiveSync Add-On Evaluator s Guide 2015 Software Pursuits, Inc.

with the ArchiveSync Add-On Evaluator s Guide 2015 Software Pursuits, Inc. with the ArchiveSync Add-On Evaluator s Guide 2015 Table of Contents Introduction... 2 System Requirements... 2 Contact Information... 3 Required Add-Ons for ArchiveSync in Real-Time... 3 Communications

More information

Technical White Paper BlackBerry Enterprise Server

Technical White Paper BlackBerry Enterprise Server Technical White Paper BlackBerry Enterprise Server BlackBerry Enterprise Edition for Microsoft Exchange For GPRS Networks Research In Motion 1999-2001, Research In Motion Limited. All Rights Reserved Table

More information

System Administration Training Guide. S100 Installation and Site Management

System Administration Training Guide. S100 Installation and Site Management System Administration Training Guide S100 Installation and Site Management Table of contents System Requirements for Acumatica ERP 4.2... 5 Learning Objects:... 5 Web Browser... 5 Server Software... 5

More information

How To Manage Storage With Novell Storage Manager 3.X For Active Directory

How To Manage Storage With Novell Storage Manager 3.X For Active Directory www.novell.com/documentation Installation Guide Novell Storage Manager 4.1 for Active Directory September 10, 2015 Legal Notices Condrey Corporation makes no representations or warranties with respect

More information

About This Guide... 4. Signature Manager Outlook Edition Overview... 5

About This Guide... 4. Signature Manager Outlook Edition Overview... 5 Contents About This Guide... 4 Signature Manager Outlook Edition Overview... 5 How does it work?... 5 But That's Not All...... 6 And There's More...... 6 Licensing... 7 Licensing Information... 7 System

More information

INSTALL AND CONFIGURATION GUIDE. Atlas 5.1 for Microsoft Dynamics AX

INSTALL AND CONFIGURATION GUIDE. Atlas 5.1 for Microsoft Dynamics AX INSTALL AND CONFIGURATION GUIDE Atlas 5.1 for Microsoft Dynamics AX COPYRIGHT NOTICE Copyright 2012, Globe Software Pty Ltd, All rights reserved. Trademarks Dynamics AX, IntelliMorph, and X++ have been

More information

Upgrading Client Security and Policy Manager in 4 easy steps

Upgrading Client Security and Policy Manager in 4 easy steps Page 1 of 13 F-Secure White Paper Upgrading Client Security and Policy Manager in 4 easy steps Purpose This white paper describes how to easily upgrade your existing environment running Client Security

More information

Mobile Device Management Version 8. Last updated: 17-10-14

Mobile Device Management Version 8. Last updated: 17-10-14 Mobile Device Management Version 8 Last updated: 17-10-14 Copyright 2013, 2X Ltd. http://www.2x.com E mail: info@2x.com Information in this document is subject to change without notice. Companies names

More information

Citrix EdgeSight Administrator s Guide. Citrix EdgeSight for Endpoints 5.3 Citrix EdgeSight for XenApp 5.3

Citrix EdgeSight Administrator s Guide. Citrix EdgeSight for Endpoints 5.3 Citrix EdgeSight for XenApp 5.3 Citrix EdgeSight Administrator s Guide Citrix EdgeSight for Endpoints 5.3 Citrix EdgeSight for enapp 5.3 Copyright and Trademark Notice Use of the product documented in this guide is subject to your prior

More information

Pro Bundle Evaluator s Guide. 2015 Software Pursuits, Inc.

Pro Bundle Evaluator s Guide. 2015 Software Pursuits, Inc. Pro Bundle Evaluator s Guide 2015 Table of Contents Introduction... 2 System Requirements... 2 Contact Information... 3 About the Communications Agent Add-On... 3 Other SureSync Add-Ons... 4 File Locking

More information

Installation Guide - Client. Rev 1.5.0

Installation Guide - Client. Rev 1.5.0 Installation Guide - Client Rev 1.5.0 15 th September 2006 Introduction IntraNomic requires components to be installed on each PC that will use IntraNomic. These IntraNomic Client Controls provide advanced

More information

Vector Asset Management User Manual

Vector Asset Management User Manual Vector Asset Management User Manual This manual describes how to set up Vector Asset Management 6.0. It describes how to use the: Vector AM Console Vector AM Client Hardware Inventory Software Inventory

More information

XIA Configuration Server

XIA Configuration Server XIA Configuration Server XIA Configuration Server v7 Installation Quick Start Guide Monday, 05 January 2015 1 P a g e X I A C o n f i g u r a t i o n S e r v e r Contents Requirements... 3 XIA Configuration

More information

Administrators Help Manual

Administrators Help Manual Administrators Help Manual Lepide Active Directory Self Service Lepide Software Private Limited Page 1 Administrators Help Manual for Active Directory Self-Service Lepide Active Directory Self Service

More information

Contents. Platform Compatibility. Directory Connector SonicWALL Directory Services Connector 3.1.7

Contents. Platform Compatibility. Directory Connector SonicWALL Directory Services Connector 3.1.7 Directory Connector SonicWALL Directory Services Connector 3.1.7 Contents Platform Compatibility... 1 New Features... 2 Known Issues... 3 Resolved Issues... 4 Overview... 7 About SonicWALL Single Sign-On

More information

Pcounter Web Report 3.x Installation Guide - v2014-11-30. Pcounter Web Report Installation Guide Version 3.4

Pcounter Web Report 3.x Installation Guide - v2014-11-30. Pcounter Web Report Installation Guide Version 3.4 Pcounter Web Report 3.x Installation Guide - v2014-11-30 Pcounter Web Report Installation Guide Version 3.4 Table of Contents Table of Contents... 2 Installation Overview... 3 Installation Prerequisites

More information

Label Gallery Software for Microsoft Windows Terminal Services and Citrix MetaFrame

Label Gallery Software for Microsoft Windows Terminal Services and Citrix MetaFrame Label Gallery Software for Microsoft Windows Terminal Services and Citrix MetaFrame White Paper Version 20100716 2009 SATO CORPORATION. All rights reserved. http://www.satoworldwide.com softwaresupport@satogbs.com

More information

VMware Mirage Web Manager Guide

VMware Mirage Web Manager Guide Mirage 5.1 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of this document,

More information

Remote Desktop Services

Remote Desktop Services Remote Desktop Services White Paper November 2014 Maximizing the Value and Performance of QuickBooks Enterprise with Remote Desktop Services Formerly known as Windows Terminal Services, Remote Desktop

More information

whitepaper A New Approach to Per User Application Management Spanning conventional and virtual infrastructure

whitepaper A New Approach to Per User Application Management Spanning conventional and virtual infrastructure whitepaper A New Approach to Per User Application Management Spanning conventional and virtual infrastructure INTRODUCTION Our premise is simple: existing methodologies for delivering and deploying Windows

More information

Gavriella Schuster Sr. Director, Windows Product Management

Gavriella Schuster Sr. Director, Windows Product Management Microsoft Application Gavriella Schuster Sr. Director, Windows Product Management Over 5M Seats DEM System Center Operations Manager 2007 System Center Virtual App Server Translating software inventory

More information

Consulting Solutions WHITE PAPER Citrix XenDesktop Citrix Personal vdisk Technology Planning Guide

Consulting Solutions WHITE PAPER Citrix XenDesktop Citrix Personal vdisk Technology Planning Guide Consulting Solutions WHITE PAPER Citrix XenDesktop Citrix Personal vdisk Technology Planning Guide www.citrix.com Overview XenDesktop offers IT administrators many options in order to implement virtual

More information

Das AdminStudio beinhaltet eine ganze Reihe von Tools zum Thema Anwendungspaketierung- und Virtualisierung, die wir ihnen nachfolgend zeigen wollen:

Das AdminStudio beinhaltet eine ganze Reihe von Tools zum Thema Anwendungspaketierung- und Virtualisierung, die wir ihnen nachfolgend zeigen wollen: Das AdminStudio beinhaltet eine ganze Reihe von Tools zum Thema Anwendungspaketierung- und Virtualisierung, die wir ihnen nachfolgend zeigen wollen: Managing Your Application Portfolio You use Application

More information

StorageCraft ShadowStream User Guide StorageCraft Copyright Declaration

StorageCraft ShadowStream User Guide StorageCraft Copyright Declaration StorageCraft Copyright Declaration StorageCraft ImageManager, StorageCraft ShadowProtect, StorageCraft Cloud, and StorageCraft Cloud Services, together with any associated logos, are trademarks of StorageCraft

More information

Universal Management Service 2015

Universal Management Service 2015 Universal Management Service 2015 UMS 2015 Help All rights reserved. No parts of this work may be reproduced in any form or by any means - graphic, electronic, or mechanical, including photocopying, recording,

More information

Workspace Manager 2014 Module Comparison Chart

Workspace Manager 2014 Module Comparison Chart Workspace Manager 2014 Module Comparison Chart DYNAMIC CONFIGURATION MODULE Desktop Transformation Transforms any existing desktop infrastructure into managed user workspaces using live data and a step-bystep

More information

Microsoft System Center Virtual Application Server

Microsoft System Center Virtual Application Server Microsoft System Center Virtual Application Server Branch Configuration Guide March 2007 Table of Contents Introduction... 1 Microsoft System Center Virtual Application Server Components... 2 The Microsoft

More information

Exclaimer Signature Manager 2.0 User Manual

Exclaimer Signature Manager 2.0 User Manual Exclaimer Exclaimer UK +44 (0) 1252 531 422 USA 1-888-450-9631 info@exclaimer.com Contents GETTING STARTED... 10 Signature Manager Overview... 11 How Does it Work?... 11 But That's Not All...... 12 And

More information

Technical Overview of Terminal Services

Technical Overview of Terminal Services Technical Overview of Terminal Services Microsoft Corporation Updated: January 2005 Abstract Windows Server 2003 includes the Terminal Services features of Windows 2000, the client and protocol enhancements

More information

Installation Guide for WebAdmin Customers

Installation Guide for WebAdmin Customers Panda Managed Office Protection Installation Guide for WebAdmin Customers Contents 1. Introduction... 4 2. Installing Panda Managed Office Protection from Panda WebAdmin... 4 2.1. Accessing the Panda Managed

More information

AT&T Global Network Client Client Features Guide. Version 9.6

AT&T Global Network Client Client Features Guide. Version 9.6 Version 9.6 AT&T Global Network Client Client Features Guide 2015 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks contained herein are trademarks of AT&T Intellectual

More information

Effective Use of Individual User Profiles with Software Distribution

Effective Use of Individual User Profiles with Software Distribution The following paper was originally published in the Digest of the Large Scale System Administration of Windows NT Workshop Seattle, Washington, August 1997 For more information about USENIX Association

More information

Intelligent Laptop Virtualization No compromises for IT or end users. VMware Mirage danny.roefflaer@iriscorporate.com

Intelligent Laptop Virtualization No compromises for IT or end users. VMware Mirage danny.roefflaer@iriscorporate.com Intelligent Laptop Virtualization No compromises for IT or end users VMware Mirage danny.roefflaer@iriscorporate.com Little video to start with... The Problem with Laptops Windows XP support is expiring

More information

START YOUR INVENTORY WITH SCANFRE

START YOUR INVENTORY WITH SCANFRE START YOUR INVENTORY WITH SCANFRE April 2014 LANDPARK SCANFREE «Quickly estimate your data processing systems before considering their evolution. Landpark Scanfree, solution for your IT asset tracking

More information

NETWRIX IDENTITY MANAGEMENT SUITE

NETWRIX IDENTITY MANAGEMENT SUITE NETWRIX IDENTITY MANAGEMENT SUITE FEATURES AND REQUIREMENTS Product Version: 3.3 February 2013. Legal Notice The information in this publication is furnished for information use only, and does not constitute

More information

System Planning, Deployment, and Best Practices Guide

System Planning, Deployment, and Best Practices Guide www.novell.com/documentation System Planning, Deployment, and Best Practices Guide ZENworks Application Virtualization 9.0 February 22, 2012 Legal Notices Novell, Inc., makes no representations or warranties

More information

ThinPoint Quick Start Guide

ThinPoint Quick Start Guide ThinPoint Quick Start Guide 2 ThinPoint Quick Start Guide Table of Contents Part 1 Introduction 3 Part 2 ThinPoint Windows Host Installation 3 1 Compatibility... list 3 2 Pre-requisites... 3 3 Installation...

More information

Moxa Device Manager 2.0 User s Guide

Moxa Device Manager 2.0 User s Guide First Edition, March 2009 www.moxa.com/product 2009 Moxa Inc. All rights reserved. Reproduction without permission is prohibited. Moxa Device Manager 2.0 User Guide The software described in this manual

More information

NETWRIX ACCOUNT LOCKOUT EXAMINER

NETWRIX ACCOUNT LOCKOUT EXAMINER NETWRIX ACCOUNT LOCKOUT EXAMINER ADMINISTRATOR S GUIDE Product Version: 4.1 July 2014. Legal Notice The information in this publication is furnished for information use only, and does not constitute a

More information

Microsoft Corporation. Status: Preliminary documentation

Microsoft Corporation. Status: Preliminary documentation Microsoft Corporation Status: Preliminary documentation Beta content: This guide is currently in beta form. The AppLocker team greatly appreciates you reviewing the document and looks forward to receiving

More information

Topaz Installation Sheet

Topaz Installation Sheet Topaz Installation Sheet P/N 460924001E ISS 08FEB12 Content Introduction... 3 Recommended minimum requirements... 3 Setup for Internet Explorer:... 4 Topaz installation... 10 Technical support... 14 Copyright

More information

User Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream

User Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream User Manual Onsight Management Suite Version 5.1 Another Innovation by Librestream Doc #: 400075-06 May 2012 Information in this document is subject to change without notice. Reproduction in any manner

More information

How VMware Mirage Complements and Extends Microsoft System Center Configuration Manager TECHNICAL WHITE PAPER

How VMware Mirage Complements and Extends Microsoft System Center Configuration Manager TECHNICAL WHITE PAPER How VMware Mirage Complements and Extends Microsoft System Center Configuration Manager TECHNICAL WHITE PAPER Table of Contents. Introduction... 3 Intended Audience.... 3 What Is VMware Mirage?... 3 What

More information

Lesson Plans Microsoft s Managing and Maintaining a Microsoft Windows Server 2003 Environment

Lesson Plans Microsoft s Managing and Maintaining a Microsoft Windows Server 2003 Environment Lesson Plans Microsoft s Managing and Maintaining a Microsoft Windows Server 2003 Environment (Exam 70-290) Table of Contents Table of Contents... 1 Course Overview... 2 Section 0-1: Introduction... 4

More information

Freshservice Discovery Probe User Guide

Freshservice Discovery Probe User Guide Freshservice Discovery Probe User Guide 1. What is Freshservice Discovery Probe? 1.1 What details does Probe fetch? 1.2 How does Probe fetch the information? 2. What are the minimum system requirements

More information

WatchGuard Mobile User VPN Guide

WatchGuard Mobile User VPN Guide WatchGuard Mobile User VPN Guide Mobile User VPN establishes a secure connection between an unsecured remote host and a protected network over an unsecured network using Internet Protocol Security (IPSec).

More information

Solution Recipe: Improve PC Security and Reliability with Intel Virtualization Technology

Solution Recipe: Improve PC Security and Reliability with Intel Virtualization Technology Solution Recipe: Improve PC Security and Reliability with Intel Virtualization Technology 30406_VT_Brochure.indd 1 6/20/06 4:01:14 PM Preface Intel has developed a series of unique Solution Recipes designed

More information

CentreWare Internet Services Setup and User Guide. Version 2.0

CentreWare Internet Services Setup and User Guide. Version 2.0 CentreWare Internet Services Setup and User Guide Version 2.0 Xerox Corporation Copyright 1999 by Xerox Corporation. All rights reserved. XEROX, The Document Company, the digital X logo, CentreWare, and

More information

TANDBERG MANAGEMENT SUITE 10.0

TANDBERG MANAGEMENT SUITE 10.0 TANDBERG MANAGEMENT SUITE 10.0 Installation Manual Getting Started D12786 Rev.16 This document is not to be reproduced in whole or in part without permission in writing from: Contents INTRODUCTION 3 REQUIREMENTS

More information

NetWrix SQL Server Change Reporter

NetWrix SQL Server Change Reporter NetWrix SQL Server Change Reporter Version 2.2 Enterprise Edition Quick Start Guide Contents NetWrix SQL Server Change Reporter Enterprise Edition Quick Start Guide 1. INTRODUCTION... 3 1.1 KEY FEATURES...

More information

EZ GPO. Power Management Tool for Network Administrators.

EZ GPO. Power Management Tool for Network Administrators. EZ GPO Power Management Tool for Network Administrators. Table of Contents Introduction...3 Installation...4 Configuration...6 Base Options...7 Options Properties Dialogue...8 Suggested Configuration Settings...9

More information

White Paper. Deployment of ActiveX Controls via Microsoft Windows Active Directory. Fabasoft Folio 2015 Update Rollup 2

White Paper. Deployment of ActiveX Controls via Microsoft Windows Active Directory. Fabasoft Folio 2015 Update Rollup 2 White Paper Fabasoft Folio 2015 Update Rollup 2 Copyright Fabasoft R&D GmbH, Linz, Austria, 2015. All rights reserved. All hardware and software names used are registered trade names and/or registered

More information

INFUSION BUSINESS SOFTWARE Installation and Upgrade Guide

INFUSION BUSINESS SOFTWARE Installation and Upgrade Guide INFUSION BUSINESS SOFTWARE Installation and Upgrade Guide 27/01/2016 Published by Infusion Business Software Ltd All Rights Reserved Copyright Infusion Business Software Ltd 2012 Copyright No part of this

More information