NetSpective Logon Agent Guide for NetAuditor

Save this PDF as:
 WORD  PNG  TXT  JPG

Size: px
Start display at page:

Download "NetSpective Logon Agent Guide for NetAuditor"

Transcription

1 NetSpective Logon Agent Guide for NetAuditor

2 The NetSpective Logon Agent The NetSpective Logon Agent is a simple application that runs on client machines on your network to inform NetSpective (and/or NetAuditor) which network user owns which IP addresses. It normally does not need to be installed on Windows clients because it can be launched as part of a domain logon script. However, the Mac version requires you to install it on each client machine. The Logon Agent supports various command-line arguments to allow it to run in different modes of operation. For example, you can configure it to run in persistent mode (where it stays running to report when a client s IP address changes) or to shut down immediately after reporting the IP addresses assigned to the current login (only reliable if your users log out each day and then log in the next morning). You can configure it to create a system tray icon (for positive feedback when it s running) or to stay hidden. You can also enable/disable logging for trouble-shooting purposes. Before you get started, you must gather a list of IP addresses of all NetSpective and/or NetAuditor machines you want the Logon Agents to communicate with. Next, you need to find and open LogonAgent.zip (or LogonAgent.dmg for Mac OS X). If you re using NetSpective, you can find it on the Utilities page in its administrative interface. If you re using NetAuditor, you can find it in <NetAuditor install folder>\support. Note: NetSpective appliances are always listening for Logon Agent messages, but NetAuditor must be configured to listen for them. If you plan to have Logon Agent communicate with NetAuditor, you must create and enable a Logon Agent collection method on your NetAuditor server before you start.

3 Logon Agent for Windows Before you attempt to configure the Logon Agent to be launched automatically for all domain users, we recommend that you test it manually on a client machine to get comfortable with it and make sure everything works as expected. On Windows you start with LogonAgent.zip, which contains two files: wflogon.exe The logon agent executable wfcall.bat An example logon script you may use as a base-line to help you get started with creating your own logon script. Usage: wflogon.exe [-v] [-p] [-s] [-ddomain] [-uusername] IPADDRESS [IPADDRESS...] wflogon.exe [-v] -q IPADDRESS [IPADDRESS...] Options: -v The verbose option tells wflogon.exe to log additional information to the Windows Event Log while it is running. -p The persistent option tells wflogon.exe to remain running until logoff so it can detect and notify NetSpective/NetAuditor when local IP addresses change. If it s not persistent, the Logon Agent can t detect changes due to sleep, hibernate, or changing networks (e.g. switching between wi-fi and wired). -s The silent option is only used with the persistent option. It tells wflogon.exe not to create a Windows systray icon (so it stays hidden). -q The quit option tells NetSpective/NetAuditor to stop associating the current IP addresses with the current user. It should only be used from a logoff script, and only when the logon script does NOT use the persistent flag. -d The domain option is used to override the domain name. This option should not be used if wflogon.exe correctly detects the current domain name. -u The user name option is used to override the user name. This option should not be used if wflogon.exe correctly detects the current domain name. Note: The IP addresses must be specified at the end of the command-line (after any options) Recommended Initial Test: wflogon.exe -v -p <specify your own IP addresses here>

4 Verification in the Client If you ran the recommended command above, you should have a blue NetSpective icon in your system tray. When you let the mouse cursor hover over it, a tool tip will pop up to show the domain name, user name, and all local IP addresses, like this: If you ran it in silent mode, you should look for wflogon.exe in the Windows Task Manager. (It will only be visible in the Processes tab.) You can also check the Windows Event Viewer for messages logged by WFLogon:

5 Verification in NetSpective To verify that NetSpective correctly received the Logon Agent messages generated by your test run, log into its administrative web interface, select Users, and select the [Current Logged On] group. It should list all user names it has recently received from any running Logon Agents.

6 Verification in NetAuditor To verify that NetAuditor correctly received the Logon Agent messages generated by your test run, you should open the NetAuditor administrative client and select the Logon Agent collection method you configured. It should provide you with a list of logs collected by date, and that list should include today s date. If you click today s date, it should open today s log file in Wordpad. You should be able to find your user name in today s file:

7 Creating a Logon Script for Active Directory 2008 The easiest way to ensure that all of your Windows clients run the Logon Agent is to create an Active Directory Group Policy Object to launch it from a logon script. Note: Active Directory relies on the Domain Name Service (DNS) to provide Group Policy access. This may require installing DNS on the domain controller and configuring the client systems so that they use the controller as their DNS server. Consult the appropriate documentation on Active Directory from Microsoft for more details. Creating a Group Policy Object 1) Log into a domain controller (or another machine with access to the Group Policy Management Tools) and select Start, Programs, Administration Tools, and then Group Policy Management. Expand the forest and then the domain that contains the first set of users you want to track.

8 2) Right click on the Group Policy Objects (GPO) and select New 3) On the New GPO dialog enter a descriptive name like NetSpective Logon Agent. Leave the Source Starter GPO set to (none).

9 4) Expand the Group Policy Objects entry in the tree, right-click the new GPO, and select Edit.

10 5) In the GPO Management Editor window that appears, expand User Configuration and Windows Settings, and then select Scripts (Logon/Logoff). 6) Right-click or double-click the Logon entry on the right to display the logon script properties, and then select the Add button.

11 7) Select the Browse button from the Add a Script dialog. It should open the folder created for this GPO on your domain s NETLOGON share. To ensure that all of your Windows clients can access the NetSpective Logon Agent files properly, we recommend that you copy wflogon.exe to this folder. If you plan to use wfcall.bat, you should also

12 copy that file to this folder. 8) Select either wfcall.bat or wflogon.exe based on your requirements. If you select the exe, you must specify its command-line parameters in the Script Parameters field for the Logon Agent to function properly. If you select the bat, you must edit the batch file to have it specify the appropriate command-line parameters for wflogon.exe. Read the section below for a full explanation of the command-line parameters.

13 9) Once you have saved all settings and returned to the Group Policy Management window, select the Detail tab and change the GPO status to Enabled. Note: You may want to perform a limited test before enabling it for the entire domain. If so, change the Authenticated Users group in the Scope tab to a specific test user or group. When you have finished testing the GPO, change it back to include whatever groups you feel need to run the Logon Agent. 10) Soon after it is enabled, the Logon Agent should be launched every time a user logs into that domain. There are propagation delays between domain controllers as well as between server and client. Note: You can skip the delay on the client by running gpupdate /force, but that only works if the GPO has already been propagated to the server it connects to. Customizing a Logon Batch File If you have an existing logon script that executes a batch file, you may also get that batch file to launch the Logon Agent by adding a few lines to it. Please refer to the sample wfcall.bat included in the LogonAgent.zip file. The important lines in it are here: REM add a call to NetSpective logon agent, located in this share REM use full UNC path START \\PDC01\NETLOGON\wflogon.exe -p

14 Important: The START command is needed when using the persistent option to keep the batch file from waiting for wflogon.exe to exit. Note: You may use a different network share if you prefer, but it will be your responsibility to ensure that your users have the necessary privileges to access it. Either way, we recommend that you specify the full UNC path.

15 Creating a Logon Script for Novell For Novell, the NetSpective Logon Agent executable should be placed in a specific shared folder on the domain server or somewhere on the network. The application can then be called from a logon script that can be set up on the Novell Server. The logon script must set the environment variables WF_USERNAME and WF_USERDOMAIN then execute the logon agent executable. Figure 8 contains a sample Novell logon script making the call to the Logon Agent. There are multiple ways to set up logon scripts on a Novell Domain. The logon scripts can be added per User, using a Profile or at the Organizational Unit (OU). For example, to set up a logon script at the OU, open the Novell ConsoleOne application. Navigate the Novell directory until you find the OU that the logon script will be added to. In order for the logon script to work it must be added to the OU that contains the users that are to be affected. Once the OU has been found, right click on the OU and select properties. From the properties window select the login script tab and add the logon script. Figure 3 illustrates the basic steps in adding a logon script to the Organizational Unit. Check your Novell documentation for more information on setting up logon scripts. Edit the Container

16 Add the Logon Script Note: NetSpective does not support all of the characters that are usable in Novell usernames. The characters <>;:" do not work in NetSpective. Editing the Script If all users share the same logon script (or a master script is available), edit the script so that it contains the call to the Logon Agent as described in the previous sections. For multiple logon scripts, edit all appropriate scripts. Refer to the following examples at the end of this document. Novell Sample Please refer to the following example of a short Novell logon script, which includes the setting of the environment variables WF_USERNAME and WF_USERDOMAIN and the required call to the NetSpective Logon Agent. Note that the path for the executable may vary between domains. REM Sample Novell logon script REM set environment variables REM DOS SET WF_USERNAME="%LOGIN_NAME.%LOGIN_CONTEXT" REM Call netspective logon agent REM

17 Logon Agent for Mac OS X The Logon Agent for Mac OS X must be installed on each client. To begin the install, mount and open the LogonAgent.dmg disk image file. Inside that image is the install package logonagent.mpkg. Select the logonagent.mpkg to start the installation process. Note: The installation requires administrative credentials, and it will ask you to confirm the install by entering your password.

18 The installation will install a LaunchDaemon property list file and the LogonAgent executable: /Library/LaunchDaemons/com.telemate.logonagent.daemon.plist /Library/Application\ Support/Telemate.Net/LogonAgent/LogonAgent Both files require administrative privileges to be accessed or modified. The NetSpective LogonAgent for Mac OS X will run as a daemon service through LaunchD. To start and stop LogonAgent the launchctl command can be used. The launchctl command requires administrative privileges, so you must run it with the sudo command to request those privileges (see example below). Setting up the Default Config The installation of LogonAgent does not create a default config. To set the configuration for LogonAgent, a property list file must be created in the /Library/Preferences/ folder. This again requires administrative privileges and can be performed from the terminal with the defaults command. Sample default Configure for installing LogonAgent onto multiple Macintosh systems sudo defaults write /Library/Preferences/com.telemate.logonagent "address" -array ' ' ' ' (Note: The - array of IP Addresses for broadcasting logons of User ID and IP address association to more than one NetSpective appliance.) sudo defaults write /Library/Preferences/com.telemate.logonagent "address" -array ' ' (Note: In this example the default config is broadcasting to a single NetSpective Appliance.) A simple script can be created to execute all steps required to configuration and installation the LogonAgent from a central location. Below is an example sudo defaults write /Library/Preferences/com.telemate.logonagent "address" -array ' ' sudo /usr/sbin/installer -verbose -pkg logonagent.mpkg -target / Modifications to the Default Config You must restart the LogonAgent any time its configuration changes. This can be done by using the above launchctl load/unload commands or by restarting the machine. Use these commands when you need to manually start/stop the LogonAgent: Stop LogonAgent: sudo launchctl unload /Library/LaunchDaemons/com.telemate.logonagent.daemon.plist Start LogonAgent: sudo launchctl load /Library/LaunchDaemons/com.telemate.logonagent.daemon.plist

19 The NetSpective Terminal Server Agent The NetSpective Logon Agent will not work properly on Terminal/Citrix Servers because they map each IP address to a single user name, and each Terminal Server hosts several users on a single IP address at the same time. The NetSpective Terminal Server Agent addresses this by extending the mapping down to the port level. As soon as any user-level application opens a network socket and binds a port, the agent tells NetSpective (and/or NetAuditor) which user locked that port. The agent sends an unlock message when the socket is closed (in case a system service grabs that port next). To get started, find and launch TerminalServerAgent.exe on one of your Terminal/Citrix Servers. If you re using NetSpective, you can find it on the Utilities page in its administrative interface. If you re using NetAuditor, you can find it in <NetAuditor install folder>\support. Keep in mind that it installs as a normal application and does not make any system changes until you enable it in the configuration utility. The Terminal Server Agent consists of a configuration utility and a Winsock Layered Service Provider (LSP) module. LSPs are used by used by many anti-virus, anti-spam and anti-spyware vendors to scan and shut down network connections in real-time. As most anti-virus software blocks the installation of new LSPs, you may need to disable your anti-virus software to configure the Terminal Server Agent. Depending on how strict the anti-virus software is, you may even need to uninstall it, install and configure the Terminal Server Agent, and then reinstall the anti-virus software. The NetSpective LSP intercepts the initiation of TCP sessions to inform NetSpective about connection ownership. This solution requires 2003 and/or Citrix Presentation Server 4. Please install NetSpective Logon Agent for Terminal Server on every Terminal Server in your network to provide personalized filtering policies for all of your users. The Configuration Utility This utility shows you what LSP's you currently have registered and allows you to register or unregister the NetSpective LSP. You must also enter the IP addresses of all NetSpective devices monitoring the current server s connection to the internet. If you add, remove, or change the IP address of a NetSpective device on your network, you need to run this utility to update the IP addresses. You are not required to reboot after making this change. However, if you choose to register or unregister the NetSpective LSP, it is necessary to reboot the server.

20 If you do encounter conflicts with another Layered Service Provider, we provide a command-line utility for trouble-shooting, installing, and removing LSP's. By default, it is installed here: Utility: %ProgramFiles%\NetSpective Logon Agent\LSPInstall.exe Documentation: %ProgramFiles%\NetSpective Logon Agent\README.TXT Windows Server 2003 / 2008 (x86-64) The current release of the Terminal Server Agent has both 32-bit and 64-bit versions of the LSP. This allows it to monitor both 32-bit and 64-bit WinSock applications. Depending on whether your Terminal Server runs a 32-bit OS or a 64-bit OS, the configuration utility should automatically detect and register/unregister the correct versions of the LSP.

NetSpective Content Filter Authentication Guide

NetSpective Content Filter Authentication Guide NetSpective Content Filter Authentication Guide Copyright 2002-2012 by TeleMate.Net Software, LLC. All rights reserved Although the author and publisher have made every effort to ensure that the information

More information

Tool Tip. SyAM Management Utilities and Non-Admin Domain Users

Tool Tip. SyAM Management Utilities and Non-Admin Domain Users SyAM Management Utilities and Non-Admin Domain Users Some features of SyAM Management Utilities, including Client Deployment and Third Party Software Deployment, require authentication credentials with

More information

Creating Home Directories for Windows and Macintosh Computers

Creating Home Directories for Windows and Macintosh Computers ExtremeZ-IP Active Directory Integrated Home Directories Configuration! 1 Active Directory Integrated Home Directories Overview This document explains how to configure home directories in Active Directory

More information

HOW TO SILENTLY INSTALL CLOUD LINK REMOTELY WITHOUT SUPERVISION

HOW TO SILENTLY INSTALL CLOUD LINK REMOTELY WITHOUT SUPERVISION HOW TO SILENTLY INSTALL CLOUD LINK REMOTELY WITHOUT SUPERVISION Version 1.1 / Last updated November 2012 INTRODUCTION The Cloud Link for Windows client software is packaged as an MSI (Microsoft Installer)

More information

OUTLOOK ADDIN V1.5 ABOUT THE ADDIN

OUTLOOK ADDIN V1.5 ABOUT THE ADDIN OUTLOOK ADDIN V1.5 ABOUT THE ADDIN The SpamTitan Outlook Addin v1.5 allows reporting of SPAM and HAM messages to the SpamTitan appliance, these messages are then examined by the SpamTitan Bayesian filter

More information

Automating client deployment

Automating client deployment Automating client deployment 1 Copyright Datacastle Corporation 2014. All rights reserved. Datacastle is a registered trademark of Datacastle Corporation. Microsoft Windows is either a registered trademark

More information

Guide to deploy MyUSBOnly via Windows Logon Script Revision 1.1. Menu

Guide to deploy MyUSBOnly via Windows Logon Script Revision 1.1. Menu Menu INTRODUCTION...2 HOW DO I DEPLOY MYUSBONLY ON ALL OF MY COMPUTERS...3 ADMIN KIT...4 HOW TO SETUP A LOGON SCRIPTS...5 Why would I choose one method over another?...5 Can I use both methods to assign

More information

ACTIVE DIRECTORY DEPLOYMENT

ACTIVE DIRECTORY DEPLOYMENT ACTIVE DIRECTORY DEPLOYMENT CASAS Technical Support 800.255.1036 2009 Comprehensive Adult Student Assessment Systems. All rights reserved. Version 031809 CONTENTS 1. INTRODUCTION... 1 1.1 LAN PREREQUISITES...

More information

Integrating Mac OS X 10.6 with Active Directory. 1 April 2010

Integrating Mac OS X 10.6 with Active Directory. 1 April 2010 Integrating Mac OS X 10.6 with Active Directory 1 April 2010 Introduction Apple Macintosh Computers running Mac OS X 10.6 can be integrated with the Boston University Active Directory to allow use of Active

More information

Using Logon Agent for Transparent User Identification

Using Logon Agent for Transparent User Identification Using Logon Agent for Transparent User Identification Websense Logon Agent (also called Authentication Server) identifies users in real time, as they log on to domains. Logon Agent works with the Websense

More information

Active Directory Software Deployment

Active Directory Software Deployment APPLICATION N0TE ST-0128 March 24, 2006 Product: Active Directory / PCM Deployment System version: ShoreTel 6 Active Directory Software Deployment Courtesy of: Dylan Moser with LANtelligence Inc. This

More information

Citrix Access Gateway Plug-in for Windows User Guide

Citrix Access Gateway Plug-in for Windows User Guide Citrix Access Gateway Plug-in for Windows User Guide Access Gateway 9.2, Enterprise Edition Copyright and Trademark Notice Use of the product documented in this guide is subject to your prior acceptance

More information

NETASQ SSO Agent Installation and deployment

NETASQ SSO Agent Installation and deployment NETASQ SSO Agent Installation and deployment Document version: 1.3 Reference: naentno_sso_agent Page 1 / 20 Copyright NETASQ 2013 General information 3 Principle 3 Requirements 3 Active Directory user

More information

SpamTitan Outlook Addin V2.0

SpamTitan Outlook Addin V2.0 SpamTitan Outlook Addin V2.0 The SpamTitan Outlook Addin v2.0 allows users to do a varity of spam filtering management from the outlook client, including Report Spam and Ham messages to the SpamTitan Bayesian

More information

Virtual CD v10. Network Management Server Manual. H+H Software GmbH

Virtual CD v10. Network Management Server Manual. H+H Software GmbH Virtual CD v10 Network Management Server Manual H+H Software GmbH Table of Contents Table of Contents Introduction 1 Legal Notices... 2 What Virtual CD NMS can do for you... 3 New Features in Virtual

More information

ENABLE LOGON/LOGOFF AUDITING

ENABLE LOGON/LOGOFF AUDITING Lepide Software LepideAuditor Suite ENABLE LOGON/LOGOFF AUDITING This document explains the steps required to enable the auditing of logon and logoff events for a domain. Table of Contents 1. Introduction...

More information

Integrating LANGuardian with Active Directory

Integrating LANGuardian with Active Directory Integrating LANGuardian with Active Directory 01 February 2012 This document describes how to integrate LANGuardian with Microsoft Windows Server and Active Directory. Overview With the optional Identity

More information

ILTA HANDS ON Securing Windows 7

ILTA HANDS ON Securing Windows 7 Securing Windows 7 8/23/2011 Table of Contents About this lab... 3 About the Laboratory Environment... 4 Lab 1: Restricting Users... 5 Exercise 1. Verify the default rights of users... 5 Exercise 2. Adding

More information

CONNECT-TO-CHOP USER GUIDE

CONNECT-TO-CHOP USER GUIDE CONNECT-TO-CHOP USER GUIDE VERSION V8 Table of Contents 1 Overview... 3 2 Requirements... 3 2.1 Security... 3 2.2 Computer... 3 2.3 Application... 3 2.3.1 Web Browser... 3 2.3.2 Prerequisites... 3 3 Logon...

More information

Create, Link, or Edit a GPO with Active Directory Users and Computers

Create, Link, or Edit a GPO with Active Directory Users and Computers How to Edit Local Computer Policy Settings To edit the local computer policy settings, you must be a local computer administrator or a member of the Domain Admins or Enterprise Admins groups. 1. Add the

More information

Network Setup Guide. Introduction. Setting up for use over LAN

Network Setup Guide. Introduction. Setting up for use over LAN Network Setup Guide This manual contains the setup information required to use the machine over wired LAN. If you use the machine with USB connection, refer to your setup sheet. Introduction To use the

More information

2. Using Notepad, create a file called c:\demote.txt containing the following information:

2. Using Notepad, create a file called c:\demote.txt containing the following information: Unit 4 Additional Projects Configuring the Local Computer Policy You need to prepare your test lab for your upcoming experiments. First, remove a child domain that you have configured. Then, configure

More information

Global VPN Client Getting Started Guide

Global VPN Client Getting Started Guide Global VPN Client Getting Started Guide 1 Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your system. CAUTION: A CAUTION indicates potential

More information

Test Note Phone Manager Deployment Windows Group Policy Sever 2003 and XP SPII Clients

Test Note Phone Manager Deployment Windows Group Policy Sever 2003 and XP SPII Clients Test Note Phone Manager Deployment Windows Group Policy Sever 2003 and XP SPII Clients Note: I have only tested these procedures on Server 2003 SP1 (DC) and XP SPII client, in a controlled lab environment,

More information

SELF SERVICE RESET PASSWORD MANAGEMENT WEB INTERFACE GUIDE

SELF SERVICE RESET PASSWORD MANAGEMENT WEB INTERFACE GUIDE SELF SERVICE RESET PASSWORD MANAGEMENT WEB INTERFACE GUIDE Copyright 1998-2015 Tools4ever B.V. All rights reserved. No part of the contents of this user guide may be reproduced or transmitted in any form

More information

Chapter. Managing Group Policy MICROSOFT EXAM OBJECTIVES COVERED IN THIS CHAPTER:

Chapter. Managing Group Policy MICROSOFT EXAM OBJECTIVES COVERED IN THIS CHAPTER: Chapter 10 Managing Group Policy MICROSOFT EXAM OBJECTIVES COVERED IN THIS CHAPTER: Implement and troubleshoot Group Policy. Create a Group Policy object (GPO). Link an existing GPO. Delegate administrative

More information

User Guide. CTERA Agent. August 2011 Version 3.0

User Guide. CTERA Agent. August 2011 Version 3.0 User Guide CTERA Agent August 2011 Version 3.0 Copyright 2009-2011 CTERA Networks Ltd. All rights reserved. No part of this document may be reproduced in any form or by any means without written permission

More information

HELP DOCUMENTATION SSRPM WEB INTERFACE GUIDE

HELP DOCUMENTATION SSRPM WEB INTERFACE GUIDE HELP DOCUMENTATION SSRPM WEB INTERFACE GUIDE Copyright 1998-2013 Tools4ever B.V. All rights reserved. No part of the contents of this user guide may be reproduced or transmitted in any form or by any means

More information

ContentWatch Auto Deployment Tool

ContentWatch Auto Deployment Tool ContentWatch Auto Deployment Tool ContentWatch gives administrators the ability to easily distribute ContentProtect (or say our products) over any network. With our Unattended Installer you can install

More information

WhatsUp Gold v16.3 Installation and Configuration Guide

WhatsUp Gold v16.3 Installation and Configuration Guide WhatsUp Gold v16.3 Installation and Configuration Guide Contents Installing and Configuring WhatsUp Gold using WhatsUp Setup Installation Overview... 1 Overview... 1 Security considerations... 2 Standard

More information

Websense v7.6 Install or Upgrade Checklist

Websense v7.6 Install or Upgrade Checklist Websense v7.6 Install or Upgrade Checklist Greetings from Websense Technical Support. Most Websense upgrades complete successfully, and from my years of troubleshooting, I have learned a number of steps

More information

1. Set Daylight Savings Time... 3. 2. Create Migrator Account... 3. 3. Assign Migrator Account to Administrator group... 4

1. Set Daylight Savings Time... 3. 2. Create Migrator Account... 3. 3. Assign Migrator Account to Administrator group... 4 1. Set Daylight Savings Time... 3 a. Have client log into Novell/Local Machine with Administrator Account...3 b. Access Adjust Date/Time...3 c. Make sure the time zone is set to Central Time...3 2. Create

More information

NovaBACKUP xsp Version 15.0 Upgrade Guide

NovaBACKUP xsp Version 15.0 Upgrade Guide NovaBACKUP xsp Version 15.0 Upgrade Guide NovaStor / November 2013 2013 NovaStor, all rights reserved. All trademarks are the property of their respective owners. Features and specifications are subject

More information

TECHNICAL DOCUMENTATION SPECOPS DEPLOY / APP 4.7 DOCUMENTATION

TECHNICAL DOCUMENTATION SPECOPS DEPLOY / APP 4.7 DOCUMENTATION TECHNICAL DOCUMENTATION SPECOPS DEPLOY / APP 4.7 DOCUMENTATION Contents 1. Getting Started... 4 1.1 Specops Deploy Supported Configurations... 4 2. Specops Deploy and Active Directory...5 3. Specops Deploy

More information

Installation Logon Recording Basis. By AD Logon Name AD Logon Name(recommended) By Windows Logon Name IP Address

Installation Logon Recording Basis. By AD Logon Name AD Logon Name(recommended) By Windows Logon Name IP Address Internet Recorder Binding User Names to AD Server & Recording Skype Text Conversation Path: Recording Analysis > Setting Terminologies: AD Server (User Name Logon Name Binding) The AD logon names can be

More information

Web-Access Security Solution

Web-Access Security Solution WavecrestCyBlock Client Version 2.1.13 Web-Access Security Solution UserGuide www.wavecrest.net Copyright Copyright 1996-2014, Wavecrest Computing, Inc. All rights reserved. Use of this product and this

More information

Configuration Information

Configuration Information This chapter describes some basic Email Security Gateway configuration settings, some of which can be set in the first-time Configuration Wizard. Other topics covered include Email Security interface navigation,

More information

User Guide. Version 3.2. Copyright 2002-2009 Snow Software AB. All rights reserved.

User Guide. Version 3.2. Copyright 2002-2009 Snow Software AB. All rights reserved. Version 3.2 User Guide Copyright 2002-2009 Snow Software AB. All rights reserved. This manual and computer program is protected by copyright law and international treaties. Unauthorized reproduction or

More information

CTERA Agent for Windows

CTERA Agent for Windows User Guide CTERA Agent for Windows May 2012 Version 3.1 Copyright 2009-2012 CTERA Networks Ltd. All rights reserved. No part of this document may be reproduced in any form or by any means without written

More information

Installation Notes for Outpost Network Security (ONS) version 3.2

Installation Notes for Outpost Network Security (ONS) version 3.2 Outpost Network Security Installation Notes version 3.2 Page 1 Installation Notes for Outpost Network Security (ONS) version 3.2 Contents Installation Notes for Outpost Network Security (ONS) version 3.2...

More information

Sophos Endpoint Security and Control standalone startup guide

Sophos Endpoint Security and Control standalone startup guide Sophos Endpoint Security and Control standalone startup guide Sophos Endpoint Security and Control version 9 Sophos Anti-Virus for Mac OS X, version 7 Document date: October 2009 Contents 1 Before you

More information

Contents 1. Introduction 2. Security Considerations 3. Installation 4. Configuration 5. Uninstallation 6. Automated Bulk Enrollment 7.

Contents 1. Introduction 2. Security Considerations 3. Installation 4. Configuration 5. Uninstallation 6. Automated Bulk Enrollment 7. Contents 1. Introduction 2. Security Considerations 3. Installation 4. Configuration 5. Uninstallation 6. Automated Bulk Enrollment 7. Troubleshooting Introduction Adaxes Self-Service Client provides secure

More information

Network Connect Installation and Usage Guide

Network Connect Installation and Usage Guide Network Connect Installation and Usage Guide I. Installing the Network Connect Client..2 II. Launching Network Connect from the Desktop.. 9 III. Launching Network Connect Pre-Windows Login 11 IV. Installing

More information

VERALAB LDAP Configuration Guide

VERALAB LDAP Configuration Guide VERALAB LDAP Configuration Guide VeraLab Suite is a client-server application and has two main components: a web-based application and a client software agent. Web-based application provides access to

More information

HP MediaSmart Server Software Upgrade from v.1 to v.3

HP MediaSmart Server Software Upgrade from v.1 to v.3 HP MediaSmart Server Software Upgrade from v.1 to v.3 Table of Contents Upgrade Your Server Software to HP MediaSmart Server v.3 2 Before You Begin 3 What's New... 3 Features That Will Change... 4 Prepare

More information

MailStore Outlook Add-in Deployment

MailStore Outlook Add-in Deployment MailStore Outlook Add-in Deployment A MailStore Server installation deploys the MailStore Outlook Add-in as a Windows Installer package (MSI) that can be installed on client machines using software distribution.

More information

Windows Firewall Configuration with Group Policy for SyAM System Client Installation

Windows Firewall Configuration with Group Policy for SyAM System Client Installation with Group Policy for SyAM System Client Installation SyAM System Client can be deployed to systems on your network using SyAM Management Utilities. If Windows Firewall is enabled on target systems, it

More information

Configuring a Custom Load Evaluator Use the XenApp1 virtual machine, logged on as the XenApp\administrator user for this task.

Configuring a Custom Load Evaluator Use the XenApp1 virtual machine, logged on as the XenApp\administrator user for this task. Lab 8 User name: Administrator Password: Password1 Contents Exercise 8-1: Assigning a Custom Load Evaluator... 1 Scenario... 1 Configuring a Custom Load Evaluator... 1 Assigning a Load Evaluator to a Server...

More information

BorderGuard Client. Version 4.4. November 2013

BorderGuard Client. Version 4.4. November 2013 BorderGuard Client Version 4.4 November 2013 Blue Ridge Networks 14120 Parke Long Court, Suite 103 Chantilly, Virginia 20151 703-631-0700 WWW.BLUERIDGENETWORKS.COM All Products are provided with RESTRICTED

More information

ThinPoint Quick Start Guide

ThinPoint Quick Start Guide ThinPoint Quick Start Guide 2 ThinPoint Quick Start Guide Table of Contents Part 1 Introduction 3 Part 2 ThinPoint Windows Host Installation 3 1 Compatibility... list 3 2 Pre-requisites... 3 3 Installation...

More information

Monitor Print Popup for Mac. Product Manual. www.monitorbm.com

Monitor Print Popup for Mac. Product Manual. www.monitorbm.com Monitor Print Popup for Mac Product Manual www.monitorbm.com Monitor Print Popup for Mac Product Manual Copyright 2013 Monitor Business Machines Ltd The software contains proprietary information of Monitor

More information

HP MediaSmart Server Software Upgrade from v.2 to v.3

HP MediaSmart Server Software Upgrade from v.2 to v.3 HP MediaSmart Server Software Upgrade from v.2 to v.3 Table of Contents Table of Contents Upgrade Your Server Software to HP MediaSmart Server v.3 2 Before You Begin 3 What's New 3 Features That Will

More information

Password Manager Windows Desktop Client

Password Manager Windows Desktop Client Password Manager Windows Desktop Client EmpowerID provides an extension that allows organizations to plug into Password Manager to customize the Windows logon experience beyond that supplied by the standard

More information

Discovery Guide. Secret Server. Table of Contents

Discovery Guide. Secret Server. Table of Contents Secret Server Discovery Guide Table of Contents Introduction... 3 How Discovery Works... 3 Active Directory / Local Windows Accounts... 3 Unix accounts... 3 VMware ESX accounts... 3 Why use Discovery?...

More information

Arkay Remote Data Backup Client Quick Start Guide

Arkay Remote Data Backup Client Quick Start Guide Arkay Remote Data Backup Client Quick Start Guide Version 6.1.56.27 September 2005 Quick Start Guide It's easy to get started with Arkay Remote Data Backup and Recovery Service. To start using Arkay Remote

More information

Installing and Configuring Login PI

Installing and Configuring Login PI Installing and Configuring Login PI Login PI Hands-on lab In this lab, you will configure Login PI to provide performance insights for a Windows Server 2012 R2 Remote Desktop Services installation. To

More information

NetIQ Advanced Authentication Framework. FIDO U2F Authentication Provider Installation Guide. Version 5.1.0

NetIQ Advanced Authentication Framework. FIDO U2F Authentication Provider Installation Guide. Version 5.1.0 NetIQ Advanced Authentication Framework FIDO U2F Authentication Provider Installation Guide Version 5.1.0 Table of Contents 1 Table of Contents 2 Introduction 3 About This Document 3 System Requirements

More information

Network Scanner Tool R3.1. User s Guide Version 3.0.04

Network Scanner Tool R3.1. User s Guide Version 3.0.04 Network Scanner Tool R3.1 User s Guide Version 3.0.04 Copyright 2000-2004 by Sharp Corporation. All rights reserved. Reproduction, adaptation or translation without prior written permission is prohibited,

More information

Management Utilities Configuration for UAC Environments

Management Utilities Configuration for UAC Environments Management Utilities Configuration for UAC Environments For optimal use of SyAM Management Utilities, Windows client machines should be configured with User Account Control disabled or set to the least

More information

The SSL device also supports the 64-bit Internet Explorer with new ActiveX loaders for Assessment, Abolishment, and the Access Client.

The SSL device also supports the 64-bit Internet Explorer with new ActiveX loaders for Assessment, Abolishment, and the Access Client. WatchGuard SSL v3.2 Release Notes Supported Devices SSL 100 and 560 WatchGuard SSL OS Build 355419 Revision Date January 28, 2013 Introduction WatchGuard is pleased to announce the release of WatchGuard

More information

How to monitor AD security with MOM

How to monitor AD security with MOM How to monitor AD security with MOM A article about monitor Active Directory security with Microsoft Operations Manager 2005 Anders Bengtsson, MCSE http://www.momresources.org November 2006 (1) Table of

More information

Version 5.0. SurfControl Web Filter for Citrix Installation Guide for Service Pack 2

Version 5.0. SurfControl Web Filter for Citrix Installation Guide for Service Pack 2 Version 5.0 SurfControl Web Filter for Citrix Installation Guide for Service Pack 2 NOTICES Updates to the SurfControl documentation and software, as well as Support information are available at www.surfcontrol.com/support.

More information

Aventail Connect Client with Smart Tunneling

Aventail Connect Client with Smart Tunneling Aventail Connect Client with Smart Tunneling User s Guide Windows v8.7.0 1996-2006 Aventail Corporation. All rights reserved. Aventail, Aventail Cache Control, Aventail Connect, Aventail Connect Mobile,

More information

CA ARCserve Backup Patch Manager for Windows

CA ARCserve Backup Patch Manager for Windows CA ARCserve Backup Patch Manager for Windows User Guide r16 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation

More information

STATISTICA VERSION 12 STATISTICA ENTERPRISE SMALL BUSINESS INSTALLATION INSTRUCTIONS

STATISTICA VERSION 12 STATISTICA ENTERPRISE SMALL BUSINESS INSTALLATION INSTRUCTIONS STATISTICA VERSION 12 STATISTICA ENTERPRISE SMALL BUSINESS INSTALLATION INSTRUCTIONS Notes 1. The installation of STATISTICA Enterprise Small Business entails two parts: a) a server installation, and b)

More information

Administration Guide. . All right reserved. For more information about Specops Deploy and other Specops products, visit www.specopssoft.

Administration Guide. . All right reserved. For more information about Specops Deploy and other Specops products, visit www.specopssoft. . All right reserved. For more information about Specops Deploy and other Specops products, visit www.specopssoft.com Copyright and Trademarks Specops Deploy is a trademark owned by Specops Software. All

More information

Lenovo Online Data Backup User Guide Version 1.8.14

Lenovo Online Data Backup User Guide Version 1.8.14 Lenovo Online Data Backup User Guide Version 1.8.14 Contents Chapter 1: Installing Lenovo Online Data Backup...5 Downloading the Lenovo Online Data Backup Client...5 Installing the Lenovo Online Data

More information

How to - Install EventTracker and Change Audit Agent

How to - Install EventTracker and Change Audit Agent How to - Install EventTracker and Change Audit Agent Agent Deployment User Manual Publication Date: Oct.17, 2015 EventTracker 8815 Centre Park Drive Columbia MD 21045 www.eventtracker.com Abstract EventTracker

More information

How to Configure Microsoft System Operation Manager to Monitor Active Directory, Group Policy and Exchange Changes Using NetWrix Active Directory

How to Configure Microsoft System Operation Manager to Monitor Active Directory, Group Policy and Exchange Changes Using NetWrix Active Directory How to Configure Microsoft System Operation Manager to Monitor Active Directory, Group Policy and Exchange Changes Using NetWrix Active Directory Change Reporter Table of Contents General Information...

More information

owncloud Configuration and Usage Guide

owncloud Configuration and Usage Guide owncloud Configuration and Usage Guide This guide will assist you with configuring and using YSUʼs Cloud Data storage solution (owncloud). The setup instructions will include how to navigate the web interface,

More information

Features - Microsoft Data Protection Manager

Features - Microsoft Data Protection Manager Page 1 of 63 Features - Microsoft Data Protection Manager TABLE OF CONTENTS OVERVIEW SYSTEM REQUIREMENTS - MICROSOFT DATA PROTECTION MANAGER INSTALLATION Install the Microsoft Data Protection Manager BACKUP

More information

on-hand viewer on iphone / ipod touch manual installation and configuration of an FTP server for Mac OS X to transfer data to on-hand viewer application on iphone / ipod touch table of contents 1. Introduction

More information

NetIQ Advanced Authentication Framework - MacOS Client

NetIQ Advanced Authentication Framework - MacOS Client NetIQ Advanced Authentication Framework - MacOS Client Installation Guide Version 5.2.0 1 Table of Contents 1 Table of Contents 2 Introduction 3 About This Document 3 About MacOS Client 4 System Requirements

More information

User Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream

User Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream User Manual Onsight Management Suite Version 5.1 Another Innovation by Librestream Doc #: 400075-06 May 2012 Information in this document is subject to change without notice. Reproduction in any manner

More information

Using LDAP Authentication in a PowerCenter Domain

Using LDAP Authentication in a PowerCenter Domain Using LDAP Authentication in a PowerCenter Domain 2008 Informatica Corporation Overview LDAP user accounts can access PowerCenter applications. To provide LDAP user accounts access to the PowerCenter applications,

More information

Outpost Network Security

Outpost Network Security Administrator Guide Reference Outpost Network Security Office Firewall Software from Agnitum Abstract This document provides information on deploying Outpost Network Security in a corporate network. It

More information

Spector 360 Deployment Guide. Version 7

Spector 360 Deployment Guide. Version 7 Spector 360 Deployment Guide Version 7 December 11, 2009 Table of Contents Deployment Guide...1 Spector 360 DeploymentGuide... 1 Installing Spector 360... 3 Installing Spector 360 Servers (Details)...

More information

Safe internet for business use: Getting Started Guide

Safe internet for business use: Getting Started Guide Safe internet for business use: Getting Started Guide Table of Contents 1. Preface 1 2. Before You Install 2 2.1 Disabling Firewalls 2 2.2 About Accelerators 3 3. About Profiles 4 4. Installation and Initial

More information

1-bay NAS User Guide

1-bay NAS User Guide 1-bay NAS User Guide INDEX Index... 1 Log in... 2 Basic - Quick Setup... 3 Wizard... 3 Add User... 6 Add Group... 7 Add Share... 9 Control Panel... 11 Control Panel - User and groups... 12 Group Management...

More information

Download/Install IDENTD

Download/Install IDENTD Download/Install IDENTD IDENTD is the small software program that must be installed on each user s computer if multiple filters are to be used in ComSifter. The program may be installed and executed locally

More information

2X ApplicationServer & LoadBalancer Manual

2X ApplicationServer & LoadBalancer Manual 2X ApplicationServer & LoadBalancer Manual 2X ApplicationServer & LoadBalancer Contents 1 URL: www.2x.com E-mail: info@2x.com Information in this document is subject to change without notice. Companies,

More information

MAS 90. Installation and System Administrator's Guide 4WIN1010-02/04

MAS 90. Installation and System Administrator's Guide 4WIN1010-02/04 MAS 90 Installation and System Administrator's Guide 4WIN1010-02/04 Copyright 1998-2004 Best Software, Inc. All rights reserved. Rev 02 Contents Chapter 1 Introduction 1 How to Use This Manual 1 Graphic

More information

Configuring Active Directory Binding for OS X (10.4.x) within Miami Dade Schools

Configuring Active Directory Binding for OS X (10.4.x) within Miami Dade Schools Configuring Active Directory Binding for OS X (10.4.x) within Miami Dade Schools 1) Login to the Mac OS X (10.4.x) workstation with a local administrative account. 2) Open (double-click) the hard drive

More information

DC Agent Troubleshooting

DC Agent Troubleshooting DC Agent Troubleshooting Topic 50320 DC Agent Troubleshooting Web Security Solutions v7.7.x, 7.8.x 27-Mar-2013 This collection includes the following articles to help you troubleshoot DC Agent installation

More information

S/Medicine Mac OS X Domain Binding Instructions

S/Medicine Mac OS X Domain Binding Instructions Office of Origin: Information Technology 1. Purpose The purpose of this document is to outline the steps necessary to bind Macintosh computers using the Mac OS to the SOM domain in order for clients to

More information

Installation Instruction STATISTICA Enterprise Small Business

Installation Instruction STATISTICA Enterprise Small Business Installation Instruction STATISTICA Enterprise Small Business Notes: ❶ The installation of STATISTICA Enterprise Small Business entails two parts: a) a server installation, and b) workstation installations

More information

XMap 7 Administration Guide. Last updated on 12/13/2009

XMap 7 Administration Guide. Last updated on 12/13/2009 XMap 7 Administration Guide Last updated on 12/13/2009 Contact DeLorme Professional Sales for support: 1-800-293-2389 Page 2 Table of Contents XMAP 7 ADMINISTRATION GUIDE... 1 INTRODUCTION... 5 DEPLOYING

More information

Online Backup Client User Manual Mac OS

Online Backup Client User Manual Mac OS Online Backup Client User Manual Mac OS 1. Product Information Product: Online Backup Client for Mac OS X Version: 4.1.7 1.1 System Requirements Operating System Mac OS X Leopard (10.5.0 and higher) (PPC

More information

Online Backup Client User Manual Mac OS

Online Backup Client User Manual Mac OS Online Backup Client User Manual Mac OS 1. Product Information Product: Online Backup Client for Mac OS X Version: 4.1.7 1.1 System Requirements Operating System Mac OS X Leopard (10.5.0 and higher) (PPC

More information

Installation and User Guide

Installation and User Guide MANJRASOFT PTY LTD Aneka 3.0 Manjrasoft 5/13/2013 This document describes in detail the steps involved in installing and configuring an Aneka Cloud. It covers the prerequisites for the installation, the

More information

NetWrix USB Blocker. Version 3.6 Administrator Guide

NetWrix USB Blocker. Version 3.6 Administrator Guide NetWrix USB Blocker Version 3.6 Administrator Guide Table of Contents 1. Introduction...3 1.1. What is NetWrix USB Blocker?...3 1.2. Product Architecture...3 2. Licensing...4 3. Operation Guide...5 3.1.

More information

M86 Authenticator USER GUIDE. Software Version: 2.0.10 Document Version: 04.26.11

M86 Authenticator USER GUIDE. Software Version: 2.0.10 Document Version: 04.26.11 M86 Authenticator USER GUIDE Software Version: 2.0.10 Document Version: 04.26.11 M86 AUTHENTICATOR USER GUIDE 2011 M86 Security All rights reserved. 828 W. Taft Ave., Orange, CA 92865, USA Version 1.01,

More information

QUANTIFY INSTALLATION GUIDE

QUANTIFY INSTALLATION GUIDE QUANTIFY INSTALLATION GUIDE Thank you for putting your trust in Avontus! This guide reviews the process of installing Quantify software. For Quantify system requirement information, please refer to the

More information

2. Installation and System requirements

2. Installation and System requirements RELEASE NOTES F-Secure Anti-Virus for Windows Servers Version 9.00 build 333 Copyright 1993-2010 F-Secure Corporation. All Rights Reserved. Portions Copyright 2004 BackWeb Technologies Inc. This product

More information

CTERA Agent for Mac OS-X

CTERA Agent for Mac OS-X User Guide CTERA Agent for Mac OS-X September 2013 Version 4.0 Copyright 2009-2013 CTERA Networks Ltd. All rights reserved. No part of this document may be reproduced in any form or by any means without

More information

Thin Client Manager. Table of Contents. 1-10ZiG Manager. 2 - Thin Client Management. 3 - Remote client configurations. 1 of 16

Thin Client Manager. Table of Contents. 1-10ZiG Manager. 2 - Thin Client Management. 3 - Remote client configurations. 1 of 16 1 of 16 Thin Client Manager Table of Contents 1-10ZiG Manager 1.1 - Configuring and Managing the Server 1.1.1 - Server Settings 1.1.2 - Starting and Stopping the Server 1.2 - Configuring and Starting the

More information

White Paper. Deploying EUM. SurfControl Web Filter for MS Windows. rev. 1.1, January 2005. Enterprise Threat Protection

White Paper. Deploying EUM. SurfControl Web Filter for MS Windows. rev. 1.1, January 2005. Enterprise Threat Protection White Paper Deploying EUM SurfControl Web Filter for MS Windows rev. 1.1, January 2005 Enterprise Threat Protection ..... ACKNOWLEDGEMENTS SurfControl wishes to acknowledge the following people for their

More information

Kaseya 2. User Guide. Version R8. English

Kaseya 2. User Guide. Version R8. English Kaseya 2 Discovery User Guide Version R8 English September 19, 2014 Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept EULATOS as

More information

Installation Steps for PAN User-ID Agent

Installation Steps for PAN User-ID Agent Installation Steps for PAN User-ID Agent If you have an Active Directory domain, and would like the Palo Alto Networks firewall to match traffic to particular logged-in users, you can install the PAN User-ID

More information

Advanced Event Viewer Manual

Advanced Event Viewer Manual Advanced Event Viewer Manual Document version: 2.2944.01 Download Advanced Event Viewer at: http://www.advancedeventviewer.com Page 1 Introduction Advanced Event Viewer is an award winning application

More information