Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION

Size: px
Start display at page:

Download "Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION"

Transcription

1 Sharing Files Chapter 4 NOT ABOUT FOR SALE THIS OR CHAPTER DISTRIBUTION In this chapter, we work with the mechanisms provided by operating systems like Unix and Windows to protect files and folders. We also take a technical look at the fifth phase of the security process: monitoring the system. The chapter focuses on these topics: R SALE OR DISTRIBUTION Tailoring the security policy to grant special NOT access FOR to SALE individuals OR or DISTRIBUTION groups Permission flags in Unix-like systems Access control lists in Macintosh and Windows systems Monitoring system events through logging 4.1 Controlled Sharing Earlier in the text, we chose between Bob s isolation policy and a share-everything policy. What happens if Bob needs to share files with one or two other users but not with the rest of the suite? Bob hired a clerk to do data entry for his new client, a big surveying company. The new clerk, Tina, has her own login on Bob s computer ( tina ). However, the isolation policy blocks Bob and Tina from sharing files, unless Bob logs in as administrator and bypasses the access restrictions. R SALE OR It DISTRIBUTION is clear that we can create files and folders NOT and establish FOR SALE access OR rights DISTRIBUTION for them. We can share files with some people and hide them from others, simply by configuring the right permissions. In small cases we might get this correct through trial-and-error, but we might also leak data while implementing our solution. Instead, we begin with identifying our objectives, threats, risks, and requirements. We plan and implement our controls based on the requirements. When we NOT write FOR the requirements SALE OR and DISTRIBUTION policy, we want to capture our general intent. When we write up implementation details, we get specific. In this case, the requirements talk about people and general types of information (Bob, Tina, and shared bookkeeping..

2 134 Chapter 4 Sharing Files data). Jones Implementation & Bartlett controls Learning, talk about files, folders, users, and access Jones rights. Here & Bartlett are Learn the two requirements we add to our isolation policy: Bob and Tina shall be able to read and modify the surveying company s bookkeeping data. No one shall have access to bookkeeping data, except Bob and Tina. Jones & Although Bartlett global Learning, restrictions like no one shall are sometimes Jones hard & Bartlett to verify, accurate Learning, NOT FOR SALE policy statements OR DISTRIBUTION may require them. Tailored File Security Policies To share the project files, Bob needs to adjust his user isolation security policy. Practical problems like this often arise when using one-size-fits-all policies like isolate everyone or share everything. We address such things with tailored access policies. Three examples of tailored policies are: 1. Privacy 2. Shared reading 3. Jones Shared updating & Bartlett Learning, NOT We can FOR describe SALE a tailored OR DISTRIBUTION policy in several ways. Here we take a systematic NOT FOR approach. SALE OR DIST We implement each tailored policy underneath a systemwide default policy of either isolation or sharing. The tailored policy specifies additional access rights. These new rights may add to or replace the default rights. For each new set of rights, the tailored Jones & policy Bartlett needs Learning, to consider four things: NOT FOR SALE 1. Which OR DISTRIBUTION files or other resources are involved (for example, NOT FOR files relating SALE to OR Surveyors DISTRIBUTION or perhaps Tina s personal files )? 2. Which users are granted these new rights (for example, users editing the books for Surveyors )? s & Bartlett Learning, 3. Do we Deny by Default, or do we Jones retain the & default Bartlett access Learning, rights for these files? 4. Which access rights do we enforce: NOT full FOR access, SALE execute, OR read-only, DISTRIBUTION or no access? Typically, the files in question will reside within a particular directory and be used by a particular group of people. When we describe the policy, however, we must be careful to describe what we want, rather than how we ll do it. Bob s Sharing Dilemma Bob needs to implement a tailored updating policy so that he can share files with Tina. But how should he do it? For each file, we can control access by the owner, administrators, and the rest of the users. If that s all we have, there s no way to grant access to two specific users while Jones & Bartlett blocking access Learning, to the rest. NOT FOR SALE Bob OR could DISTRIBUTION solve this sharing dilemma if he always logs NOT in FOR to a system SALE administration OR DISTRIBUTION account. On some systems, these accounts use a specific user identity with a name like system or root that receives all system-related access rights. If Bob does this, the..

3 4.1 Controlled Sharing 135 account will have Jones full access & Bartlett to Tina s Learning, files. If he wants to create files to share with Tina, Jones & Bartlett Learn however, he must make Tina the owner of those files. Otherwise, he wouldn t be able to restrict access exclusively to Tina and himself. This solution poses a problem: Least Privilege. It may seem convenient to log into a system routinely as root or some other administrative identity, but it poses a real risk to the system. If Bob unexpectedly exposes the system to a virus or malicious website Jones while using & Bartlett administrative Learning, privileges, the system may quickly become Jones compromised. & Bartlett Learning, NOT FOR We can SALE solve Bob s OR DISTRIBUTION problem if we can specify additional access NOT rights FOR for each SALE file OR and DISTRIBUTION folder. There are two choices, depending on which operating system we use: 1. Keep a list of access rights for each file, called the access control list (ACL). Each entry in the ACL identifies a specific user and contains a list of access rights s & Bartlett Learning, granted to that user. This is available on modern Jones versions & Bartlett of Windows Learning, and on Apple s OS X. 2. Keep one additional set of access rights, and associate it with a user group. Associate a group with each file, just as we associate a user, the owner, with each file. This is available on all Unix-based systems. Windows uses Jones a simple & Bartlett version of ACLs Learning, to provide basic file sharing on home editions of Windows. NOT FOR All SALE Unix-based OR systems DISTRIBUTION provide group-based access controls. Practical Tip: Always organize your files into separate folders according to their access rights. Bob and Tina need to share the bookkeeping files for the surveying company. They put the files they need to share into a specific folder. They set up the folder s access rights to let them share the files. Neither Bob nor Tina should store files in that folder unless both of them should be sharing that file. If Bob hires another clerk to work on a different customer s books, he should set up a separate folder for that clerk. s & Bartlett Learning, Basic File Sharing on Windows R SALE OR Windows DISTRIBUTION provides a very simple mechanism for NOT sharing FOR files SALE among OR users DISTRIBUTION on a personal computer. The mechanism begins with an isolation policy; users have no access to other users personal files. Building on the isolation policy, we assign additional permissions to selected users. To implement tailored sharing, we put the files in a folder and enable file sharing for that folder. File sharing recognizes three sets of access rights: 1. Owner rights: the person who owns the folder, who has full rights to read, modify, or delete anything in the folder. This can t be changed from the file-sharing window. Jones 2. & Reader Bartlett rights: Learning, users with the right to read files in the folder. NOT FOR 3. Read/Write SALE OR rights: DISTRIBUTION users who can both read and write files NOT in the FOR folder. SALE OR DISTRIBUTION On Windows 8.1, Bob can easily share files or folders for reading. First, he creates the shared folder, named Survey. Next, he right-clicks on the folder and selects Share.. 4Sharing Files

4 136 Chapter 4 Sharing Files Used with permission from Microsoft. Figure 4.1 Jones & Sharing Bartlett files Learning, for reading on Microsoft Windows 8.1. with from the menu. This displays a submenu that lists users with whom he can share the folder (Figure 4.1). Bob selects Tina from the list, and Windows allows her to read the file. s & Bartlett Learning, Bob must take different steps to grant Jones Tina both & Bartlett read and write Learning, access to the files. Instead of selecting Tina s name from the Share With menu, he selects Specific People. This displays the basic file-sharing window (Figure 4.2). Bob uses the Add button in the window to add Tina as the user with whom he will share. Next, he sets her access rights to Read/Write. The Windows 7 Sharing Wizard provides a similar mechanism. The Share With menu works together with the basic file-sharing window to establish access Jones rights. & Bartlett If the Share Learning, With menu selects a user name, then the name Jones will appear & Bartlett Learn in the NOT file-sharing FOR SALE window OR with DISTRIBUTION Read access rights. We can use the window NOT FOR to grant SALE OR DIST Read/Write rights or to remove rights entirely User Groups If Bob and Tina are using a Unix-based system or a professional Jones & version Bartlett of Windows, Learning, they can use group rights to protect their files. They define NOT a FOR user group, SALE which OR serves DISTRIBUTION as another set of users for whom we specify access rights. A simple implementation adds two items to each file s access control data: the name of the file s group, and a set of flags..

5 4.1 Controlled Sharing 137 4Sharing Files Figure 4.2 Microsoft s basic file-sharing window. Used with permission from Microsoft. for access rights. If a user belongs to the file s group and tries to access the file, the system applies the group access rights. In Bob s case, he sets up a survey group that contains Tina and himself (Figure 4.3). He then ensures that each file containing survey information belongs to that group. Each file in the group contains the following access information: File s owner: Either Bob or Tina File s group: Survey, containing Tina and Bob Owner access: RW- System access: RW- Group access: RW- NOT FOR World SALE access: OR DISTRIBUTION To provide access rights for groups, the system integrates group identifiers into many of the same places as user identifiers. When a process begins, it inherits a group identifier..

6 138 Chapter 4 Sharing Files Used with permission from Microsoft. Figure 4.3 s & Bartlett Learning, Editing the survey user group on Windows. from the user who started it. When the process tries to access a file, the system checks the user identity and the group identity, and it applies the specified rights if one of them matches. If neither matches, the process receives any rights granted to the world NOT of FOR users. SALE OR DISTRIBUTION Administrative Groups In a sense, access permissions for the world represent permissions for a particular group. Likewise, some systems have one or more built-in administrative groups that provide special privileges for managing the system. In Windows, this is the role of the Administrators group. Unix-based systems often have a similar group that is sometimes called the wheel group...

7 4.1 Controlled Sharing 139 If a system provides Jones administrative & Bartlett Learning, groups, administrators can log in using personal user identities. If the identity is a member of the administrative group, the user receives administrative access to the computer s resources. This provides better control than logging in directly with a privileged user name like root or SYSTEM. If administrators log in with individual, personalized identities, we can more easily track their individual actions. If an administrator performs a malicious act, we can identify the user who Jones performed & Bartlett the act, even Learning, if that user was logged in as an administrator. NOT FOR Even though SALE the OR administrative DISTRIBUTION groups give us a better way of NOT tracking FOR administrative SALE OR DISTRIBUTION actions, it s still risky to log in with such power. Many organizations provide administrators with two separate identities: one for routine activities and one for more risky administrative tasks. The administrative identifier is a member of the administrative group. s & Bartlett When Learning, logged with the administrative identity, Jones the user has & Bartlett full administrative Learning, powers. When Bob set up the computer shared with Alice, he created separate user names for users and for administration. The users bob and alice are regular users. SuperBob is like the Bob account, except that it is also in the Administrators group. When Bob hired Tina, he logged in as SuperBob and created a separate user name for Tina. He also established the survey group containing the two of them (Figure 4.3) Least Privilege and Administrative Users Despite the risks, many people routinely log into their personal computers with full administrative powers. Some see it as their right and privilege, because they own the computer in question. Many users don t realize the risks involved. Jones If Bob & Bartlett visits a malicious Learning, website or downloads a virus while logged Jones in as & an Bartlett administrator, FOR the SALE malicious OR software DISTRIBUTION can use his administrative privileges NOT to FOR infest his SALE computer. OR DISTRIBUTION Learning, NOT If Bob is logged in only as a regular user, then the infestation will, at most, affect his user environment. Many viruses are blocked when they try to infest a regular user; they depend on administrative privileges for their attacks to work. Not all administrative accounts have unlimited rights. Some systems define user s & Bartlett identities Learning, that represent special activities performed Jones by the & operating Bartlett system. Learning, If we display R SALE OR the process DISTRIBUTION status on Unix (the ps command), NOT or the FOR Task SALE Manager OR on DISTRIBUTION Windows (Figure 4.4), we can list all running processes along with the user names associated with those processes. The display shows one or more special user identities for running network services, including the file Jones server and & Bartlett web server. Learning, Other identities, like SYSTEM and LOCAL SERVICE, are NOT responsible FOR SALE for utility OR processes DISTRIBUTION that keep the system running. Individuals can t log in with such user names. Administration By Regular Users As an alternative to having administrators with too much power, some operating systems provide ways of temporarily granting administrative powers to people logged in to regular user accounts. The temporary permission relies on the person authenticating as an authorized administrator. The temporary administrative privilege applies to a program started by the user and disappears when the program ends... 4Sharing Files

8 140 Chapter 4 Sharing Files Used with permission from Microsoft. Figure 4.4 The Task Manager s process display on Microsoft Windows. For years, the all-powerful Unix root account has been too powerful for individual users to use, but too useful to eliminate entirely. Today, Unix-based systems may have administrators who belong to administrative groups, but the administrators still must s & Bartlett Learning, rely on root to make serious changes to Jones the system. & Bartlett Typically, Learning, they use the setuid opera- tion, which temporarily changes a user s NOT identity. FO To run a program as root, the administrator runs the setuid program, specifies the new user identity to be root, and directs it to run an administrative function under that user identity. The setuid function prompts for the root password, and it starts the program Jones if the & user Bartlett types the Learning, right password. Most Unix administrators today Jones use a & Bartlett Learn prepackaged NOT FOR sudo SALE function OR DISTRIBUTION that runs setuid with the identity of root. Apple s OS X provides sudo, like most Unix-based systems, but it also implements a separate mechanism for configuring sensitive parts of the system. For example, Figure 4.5 shows a screen that changes the system s behavior when restarting. To enable the Target Disk Mode button, the user first must click on the padlock, which demands an Jones & Bartlett administrator s Learning, password. Once the user types the password, Jones the & padlock Bartlett switches Learning, to NOT FOR SALE unlocked OR DISTRIBUTION and the system enables the button. The same user interface allows regular users to modify many critical system preferences. OS X uses a similar arrangement to allow regular users to adjust the rights on files and..

9 4.1 Controlled Sharing 141 4Sharing Files Figure 4.5 Screen shot reprinted with permission from Apple Inc. OS X padlock unlocks with an administrator s password. R SALE OR folders: DISTRIBUTION Again, there is a padlock that controls NOT the permission FOR SALE settings OR and DISTRIBUTION an administrative password unlocks that lock. User Account Control On Windows Starting with Windows Vista, Microsoft s operating systems provide a similar mechanism, called user account control, or UAC for short. Whenever a user tries to run an administrative function, Windows tells the user and asks for approval. If the user is a regular, nonadministrative user, then the user must provide an administrative password before the task proceeds (Figure 4.6). The principle behind UAC is that the really dangerous attacks on a computer begin with some extraordinary event, like using administrative privileges or making changes to critical programs in the Windows operating system. For example, the attack might try to Figure 4.6 User account control pop-up window. Used with permission from Microsoft...

10 142 Chapter 4 Sharing Files install Jones a back door. & Bartlett If the system Learning, always asks before performing such actions, Jones there & is Bartlett a Learn better chance that a user will detect the attack and repel it. 4.2 File Permission Flags Jones & In Bartlett earlier examples, Learning, we indicated file permissions and other Jones access & rights Bartlett by abbreviations: Learning, NOT FOR SALE R for OR read, DISTRIBUTION W for write, and so on. If the system granted NOT FOR a particular SALE right, OR we DISTRIBUTION showed the appropriate letter and showed a hyphen ( - ) otherwise. These correspond to file permission flags that the system sets to true if the right is present and false otherwise. s & Bartlett Learning, The best-known modern implementation Jones of file & permission Bartlett Learning, flags is Unix. Ken Thompson and Dennis Ritchie at Bell NOT Telephone FOR Laboratories SALE OR originally DISTRIBUTION developed Unix in the early 1970s. Since then, Unix technology has been the foundation of many systems, including the Solaris operating system, Apple s Macintosh OS X, and the open source Gnu and Linux software. Unix-like systems became so significant in computing that the IEEE developed standards for such systems through its Portable Operating System Interface Jones (POSIX) & Bartlett committee. Learning, Some experts refer to Unix file permissions Jones as POSIX & Bartlett Learn file NOT permissions. FO Unix implements three file-access rights (read, write, and execute/search) for each of these three sets of identities: 1. Owner (called user rights in Unix): the user who owns a file 2. Group: users belonging to the group associated with the file 3. World (called other rights in Unix): all other users Figure 4.7 illustrates Unix permission flags for a typical file. The owner typically has the right to read and write the file. Users in the file s group, and all other users, customarily receive permission to read the file but not to write it. If a file is executable, then anyone s & Bartlett Learning, granted the right to read the file also is granted Jones permission & Bartlett to execute Learning, it. In practice, most files that have execute permission also NOT have FOR read permission. SALE OR This DISTRIBUTION is not technically required in all cases, but it is customary. NOT Owner FOR SALE RightsOR DISTRIBUTION Group Rights World NOT Rights FOR SALE OR DIST Read Write Execute Read Write Execute Read Write Execute Figure 4.7 Unix file permissions for a typical file...

11 4.2 File Permission Flags 143 ls -l total 56 1 rick ops 4321 Nov 23 08:58 data1.txt -rwxr-xr-x 1 rick ops Nov 23 10:19 hello -rw-r--r--@ 1 rick rick 59 Nov 23 10:18 hello.c 4Sharing Files Figure 4.8 NOT Unix FOR directory SALE listing OR DISTRIBUTION command ls. Unix uses similar permission flags to protect folders, which are always called directories. Learning, To open a file listed in a particular directory Jones or to search & Bartlett a directory Learning, to find another s & Bartlett R SALE OR directory DISTRIBUTION inside it, a user needs execute access NOT to that FOR directory. SALE To OR list DISTRIBUTION the contents of a directory, the user needs read access to that directory. To create or delete files, the user needs write access to the files directory. Figure 4.8 illustrates permission flags as they appear in text-oriented Unix shell commands. The typed command appears italics. The ls command lists files in the current directory. If we type ls -l we get the long directory listing shown here that includes file ownership and permissions. The left column contains permission codes rw-r- and such to indicate access rights for each file. After skipping the first hyphen, the three-letter groups indicate rights for the file s owner, the file s group, and the rest of the world, respectively. File names appear in Jones the right & column. Bartlett The Learning, permissions for the data files data1.txt and Jones hello.c & Bartlett match the Learning, NOT permissions FOR SALE shown OR in DISTRIBUTION Figure 4.7. The column containing rick NOT denotes FOR the SALE files owner, OR DISTRIBUTION and the next column to the right identifies the owning group (either rick or ops ). Unix users have several commands for adjusting a file s rights: chmod short for change mode, it can change the rights granted to the owner, s & Bartlett Learning, group, or rest of the world, for a file R SALE OR DISTRIBUTION chown short for change owner, it changes NOT FOR the identity SALE of a OR file s DISTRIBUTION owner chgrp short for change group, it changes the identity of the group associated with a file Permission Flags and Ambiguities Bob wants to create a file and allow everyone, including Tina, to see it, but he also wants to protect it from change. The file belongs to the survey group, which contains Tina and Bob. Table 4.1 shows the access rules Bob set up. Bob gives the world read access to the file. He gives the group no access to the file. Will Tina be able to read the file? Jones Because & Bartlett Tina is both Learning, a member of the survey group and a member Jones of & the Bartlett world, Learning, NOT the FOR access SALE rights OR are ambiguous. DISTRIBUTION On the one hand, a missing access NOT right FOR might SALE mean OR that DISTRIBUTION we should forbid access to Tina, since she s a member of the survey group and the group is granted no access. However, Bob, the owner, is also a member of the survey group...

12 144 Chapter 4 Sharing Files Jones & Bartlett TABLE 4.1 Learning, Ambiguous access rules Effective Access Identity Class Access Bob Tina World Owner (Bob) RW RW Group (Bob and Tina) ing, System (administrators) RW World (everyone else) R- NOT?? FOR R- SALE OR DISTRIBUTION Should we forbid access to him, too? On the other hand, the missing rights may simply mean that Tina acquires any rights she deserves from being a member of the world. On Microsoft Windows, access permissions tend to accumulate. As a member of both the survey group and the world, Tina receives all accesses granted to those groups. In this example, Tina has read access. Unix-based systems combine rules differently. If a permission flag fails to grant a particular Jones right, & then Bartlett the right Learning, is denied. When checking permissions, the Jones system selects & Bartlett Learn the NOT set of FOR users (owner, SALE group, OR DISTRIBUTION or world) that best fits the user accessing NOT the file. FOR The SALE OR DIST choice is made as follows: If the root user accesses a file, the system grants full access to the file. If the file s owner accesses a file, the system applies the owner rights. Jones & Bartlett If a group Learning, member (who is not the file s owner) accesses Jones the & file, Bartlett the system Learning, applies NOT FOR SALE the OR group DISTRIBUTION rights. If the user is neither the owner nor a member of the file s group, the system applies the world rights. When we apply the Unix rules to Tina, the system denies access. Unix-like systems block s & Bartlett Learning, access to the file through explicit denial: Jones Because & Tina Bartlett is a member Learning, of the group and the group has no access rights, Tina receives NOT no FOR access rights. SALE If OR Bob accesses DISTRIBUTION the file, however, the system applies the owner rights and grants read/write access. If a user is neither Bob nor a member of the survey group, then the system applies world rights and allows read-only access. Tina herself would have read access if she weren t a member of the survey group. If Bob Jones removes & Bartlett read access Learning, rights from one of his own files, he can no longer Jones read & the Bartlett Learn file, even if the rest of the world has read access. Because it is Bob s file, he can change the permissions back to allow read access, but he won t be able to read the file until he changes the permissions. Jones & Bartlett Permission Learning, Flag Examples Let us return to Bob s desktop computer policy and extend it to protect the surveyor customer files (a tailored updating policy). First, we review the five generic risks, the sixth associated with Bob, and add a seventh:..

13 4.2 File Permission Flags 145 TABLE 4.2 Jones Policy & additions Bartlett for tailored Learning, sharing of the survey files Policy NOT Policy FOR Statement SALE OR DISTRIBUTION Risks 8 The system shall have a regular user named Tina. 4, 7 9 Tina shall have a password to protect her login. 2, 3, 4, 5, 7 10 All surveying company files shall belong to the survey group. 7 Jones & 11 Bartlett Only Bob Learning, and Tina shall be members of the survey group. Jones 4, & 7 Bartlett Learning, NOT FOR 12SALE Bob OR and DISTRIBUTION Tina shall have full access to files in the survey group. NOT FOR 1, 4, SALE 7 OR DISTRIBUTION 4Sharing Files 7. Disclosure of the surveyor company files to people outside the bookkeeping s & Bartlett Learning, company, which could compromise the company Jones to & its Bartlett competitor. Learning, Bob s original policy appears in Tables 3.3 and 3.4. To address the seventh risk, we add the policy statements shown in Table 4.2. To implement this policy, we create an account for Tina, and Tina establishes a password for it; then we add to the security controls listed in Table 3.7. This yields the controls listed Jones in Table 4.3. & Bartlett Remember Learning, what an X ( execute ) permission means when applied NOT to a directory: FOR SALE It indicates OR DISTRIBUTION the right to search the directory when trying NOT to FOR SALE OR DIST locate a file by name. Note that we always specify group access permissions, even for personal files. When creating a new user, most Unix-based systems automatically create a separate group just for that user. By default, all files created by that user belong to the user s personal group. When Bob or Tina creates files containing surveyor company information, they must explicitly assign those files to the survey group. Security Controls For The File-Sharing Policy Now let us look at a more general example: the file-sharing policy described in Table 3.5. The policy grants read access to all files by default and execute access to shared application programs. Table 4.4 shows the appropriate security controls. Occasionally, either Bob or Tina should go through and set the access rights on all files (and folders) inside their shared folder. This ensures that both have access rights to everything and that nobody else has inadvertently been given access rights to anything. TABLE 4.3 Security controls for Tina and the shared project files Control Owning Group Access Rights Policy Number File Owner (members) Owner Group World Statement 11 Tina s directory Tina Tina RWX RWX 4, 9 12 Tina s files Tina Tina RWX RW- 4, 9 13 Project directory Bob or Tina Bob, Tina RWX RWX 10, 11, Project files Bob or Tina Bob, Tina RWX RW- 10, 11, 12..

14 146 Chapter 4 Sharing Files TABLE Jones 4.4 Security & Bartlett controls Learning, for the file-sharing policy in Table 3.5 Control Owning Group Access Rights Policy Number File Owner (members) Owner Group World Statement 1 Executables System System RWX RWX R-X 1, 3 2 User directories User User RWX RWX R-X 4, 5 Jones & Bartlett 3 Learning, User files User User RWX Jones RW- & Bartlett R-- 4, Learning, Access Control Lists and OS X In many access control problems, we have a single group of users who all need identical access rights to a particular set of files. We can easily solve such problems with group permissions. There are, however, cases where we can t use file permission flags and a single user group to achieve Least Privilege. Consider a policy that requires these three conditions: 1. Block access to the user community in general. 2. Grant read-only access to one group of users. 3. Grant read/write access to a second group of users. We can t do this with Unix-style permission flags and achieve Least Privilege. We might Jones & come Bartlett close Learning, if we grant read-only access to everyone and read/write Jones & access Bartlett to the Learning, second group. We also might come close if we create a single large group out of the first and second groups. We then grant read/write access to all, and we tell members of the first group to restrain themselves. To achieve Least Privilege, we need access control lists (ACLs). In Section 4.1, we introduced Windows home edition ACLs that grant rights to specific users. This particular implementation can solve the problem just described: We s & Bartlett Learning, list all users individually and grant the appropriate Jones & access Bartlett to each Learning, one. This is a reasonable solution if we are controlling the rights NOT for only FOR a handful SALE of OR people. DISTRIBUTION It becomes impractical as the groups grow in size. To implement the policy for larger groups, it is easier and more reliable to establish separate user groups. We then establish permissions for each group instead of setting permissions on a per-user basis. It is much easier to verify correct group membership than it is to review the access rights for dozens of individual users. NOT Fortunately, FOR most SALE modern OR DISTRIBUTION ACL implementation can specify permissions NOT for FOR groups SALE of OR DIST users as well as individuals. Modern Unix-based systems that include ACLs, like Apple s OS X, support group permissions as well as individual user permissions. Professional and business versions of Windows also support group permissions. NOT FOR SALE Macintosh OR OS DISTRIBUTION X ACLs Macintosh OS X ACLs are built on top of standard Unix permissions and designed to work well with Windows-style ACLs (Figure 4.9). Most users interact with these ACLs..

15 4.3 Access Control Lists and OS X 147 4Sharing Files Screen shot reprinted with permission from Apple Inc. Figure 4.9 Macintosh ACL for Bob and Tina s shared file. through the standard Macintosh GUI, known as the Finder. Superficially, OS X ACLs are similar to the simple Windows ACLs shown in Figure 4.2. We start with access allowed by the owner, and we can add access rights for other users. As with the earlier example, one of the users can simply add access rights for the s & Bartlett other. Learning, Just as Tina granted access to Bob, Bob can Jones grant access & Bartlett for Tina Learning, (Figure 4.9). R SALE OR To DISTRIBUTION modify the ACL, we must first unlock it NOT by clicking FOR on SALE the padlock OR DISTRIBUTION in the lower right-hand corner. Unfortunately, we need administrator rights to make changes to an ACL. Thus, Bob had to type in an administrator s name and password in order to fix the ACL. Once we unlock the ACL, we add another user by clicking on the + box in the lower left-hand Jones corner. The & Bartlett Finder then Learning, displays a list of existing users, and we click the name we NOT wish to FOR add. SALE OR DISTRIBUTION To change the access rights in an ACL entry, we have two choices. If we want to remove all access permissions, we can delete the corresponding ACL entry. To do this, we select the corresponding row and then click on the - sign in the lower left. Default rights, like those assigned to the owner, owning group, or world, can t be Jones deleted. & To Bartlett remove access Learning, for one of those, we click on the corresponding Jones entry & Bartlett under Learning, NOT Privilege FOR SALE and choose OR DISTRIBUTION the access rights we want. Figure 4.10 shows NOT the FOR pop-up SALE menu OR DISTRIBUTION to choose the access rights. In the example, we choose No Access rights for everyone not listed in the ACL...

16 148 Chapter 4 Sharing Files Screen shot reprinted with permission from Apple Inc. Figure Jones 4.10 & Bartlett Learning, Modifying NOT FOR the rights SALE on a OR Macintosh DISTRIBUTION ACL entry. Jones & Bartlett Unlike the Learning, simple Windows ACLs described earlier, OS Jones X allows & Bartlett us to add ACL Learning, NOT FOR SALE entries for OR groups DISTRIBUTION as well as users. We first create a group NOT by FOR selecting SALE User OR Accounts DISTRIBUTION under the System Preferences application. We unlock the application by clicking on the padlock in the lower left and typing an administrator s password; then we click on the plus + sign above the padlock, and we choose to create a group. Once the group exists, we can modify its name and members by editing the screen shown in Figure s & Bartlett Learning, We give the group the name survey Jones and select & Bartlett members by Learning, checking them in the Membership window. In the figure, NOT we have FOR selected SALE Bob OR and DISTRIBUTION Tina as members. Note that other groups also may be members of groups. To include a group in an ACL, we first display and unlock the ACL, then we click the plus sign to add a new entry. We select the group s name from the list, and then set the group s Jones access & rights. Bartlett Learning, NOT When we FOR create SALE a new OR file on DISTRIBUTION a Macintosh, the file grants full rights to NOT the owner FOR and SALE OR DIST read-only access to everyone else. This does not, however, mean that we are sharing files by default. Every user has a home directory that carries his or her user name; within that directory are personal directories with names like Desktop, Documents, Downloads, Library, and Pictures. By default, other users cannot read these directories. Even if they Jones & Bartlett have read access Learning, to the files themselves, they can t read the Jones files because & Bartlett they can t Learning, reach NOT FOR SALE them easily. OR DISTRIBUTION Only the Public directory grants read access NOT to users FOR in SALE general. OR DISTRIBUTION If we wish to share files with others, we either place the files in the Public directory, or in another directory that s not part of our user file directories. For example, Bob might..

17 4.3 Access Control Lists and OS X 149 4Sharing Files Figure 4.11 Choosing users for a group in Apple s OS X. Screen shot reprinted with permission from Apple Inc. R SALE OR create DISTRIBUTION a Projects directory in the root directory NOT that FOR is readable SALE by OR everyone. DISTRIBUTION Within that directory, he creates a new directory for every project, and he sets access permissions to allow project members only. When Tina creates a file in their shared survey directory, the file will grant full access to her and Jones read access & Bartlett to everyone Learning, else. This is the default behavior. The protections on its directory will protect the file from other users. The system will not, however, automatically fill in the ACL with permissions for Bob. He will be able to read the file because, by default, he receives read access with the rest of the world. Unlike the rest of the world, he can read the directory. This allows him to actually read the file. Although this approach will protect the survey files from being read by outsiders, it Jones is best & to Bartlett explicitly change Learning, permissions to block access by people outside Jones the & group. Bartlett Bob Learning, NOT won t FOR share SALE his administrative OR DISTRIBUTION password with Tina, so she can t NOT change FOR ACLs SALE herself. OR DISTRIBUTION However, she can type in a chmod command by hand to remove access by the world ( others ) to her new files...

18 150 Chapter 4 Sharing Files 4.4 Jones Microsoft & Bartlett Windows Learning, ACLs ACLs first appeared in Windows operating systems with the introduction of Windows NT in The ACLs evolved over subsequent releases of professional versions of Windows, including Windows 8.1. The basic file sharing introduced in Section uses Jones & the Bartlett ACL system Learning, through a simplified interface. All changes Jones made through & Bartlett basic Learning, file NOT FOR SALE sharing OR are reflected DISTRIBUTION in the ACLs. Windows has produced a particularly effective ACL implementation by providing flexible and sophisticated inheritance. In most cases, the file in a folder inherits access rights cleanly and simply from the enclosing directory. Files and folders automatically inherit changes made to an enclosing folder s access rights. This makes it easier to s & Bartlett Learning, manage rights in file hierarchies. The ACLs used in Macintosh OS X NOT and Sun s FOR Solaris SALE operating OR DISTRIBUTION system are similar to those in Windows to ensure they work well together. Version 4 of the Network File System also adopted an ACL mechanism that is very similar to Windows. Although these ACLs are similar, each has its own interface, graphical and otherwise, for viewing and changing Jones ACLs. & In Bartlett addition, Learning, the other systems use different techniques to Jones inherit ACL & Bartlett Learn settings and apply default rights. On Windows, we display a file s ACL by selecting the file and choosing the Properties menu entry. The ACLs reside under the Security tab (Figure 4.12). The top pane Figure 4.12 Access control list from Microsoft Windows. Used with permission from Microsoft...

19 4.4 Microsoft Windows ACLs 151 of the ACL window Jones lists & the Bartlett entries for Learning, different users or classes of users. When we Jones click & Bartlett Learn on one of those entries, the lower pane displays the corresponding access rights and restrictions. A check mark under Allow grants that right; a check mark under Deny blocks that right. As with earlier ACL examples, the access rights in Figure 4.12 can t be expressed with a set of file permission flags. The ACL describes rights for two different users, Bob and Jones SYSTEM, & Bartlett and for Learning, two different groups, Administrators and Jones Survey. & Windows Bartlett Learning, NOT provides FOR SALE several different OR DISTRIBUTION displays for ACLs. The display in Figure NOT 4.12 FOR only SALE shows the OR DISTRIBUTION rights for the user or group chosen in the display s upper pane. In the figure we see only the rights granted to the survey group. We need to select the other entries individually to see the rights granted to those users or groups. s & Bartlett When Learning, a Windows ACL has two or more entries Jones that apply & Bartlett to the current Learning, process, the access rights are combined. We discussed this earlier with the example in Table 4.1. If Bob gives read access to everyone and omits any access rights for the survey group, Tina can still read it. The absence of a right does not forbid access in Windows ACLs. 4Sharing Files Denying Jones Acces Windows allows us to explicitly deny access rights. The ACLs provide separate Allow and Deny flags (Figure 4.13) for each right. On Unix, we deny access by being silent, by failing to grant access rights. On Windows, we can specifically deny access to particular users or groups. This produces more ambiguity: What does it mean if one ACL Jones entry grants & Bartlett access while Learning, another denies access? NOT FOR Windows SALE resolves OR DISTRIBUTION this by always applying the Deny entries first. NOT The FOR system SALE looks OR at DISTRIBUTION the access rights being requested and the identity of the process making the request. If a Deny entry matches a user name or group associated with the process, Windows denies the specified access rights. Windows then reviews the Allow entries. If any entry matches the process owner or one of its groups, then the corresponding access rights are granted, s & Bartlett unless Learning, the right was previously denied through a Jones Deny entry. & Bartlett Learning, R SALE OR This DISTRIBUTION makes Deny access convenient in some NOT cases FOR but tricky SALE in others. OR DISTRIBUTION Let us return to the example of Bob, Tina, and the survey group. Clearly Bob wants to give read/write access to the survey group, so he puts the appropriate rights in the ACL. After a meeting with the secretive manager of the surveying company, he decides to revise the ACLs. He adds an ACL entry Jones to his & survey Bartlett files to Learning, specifically deny access by the user Alice. When Alice NOT logs in, FOR she is SALE denied access OR DISTRIBUTION to the survey files even if some other ACL NOT entry FOR SALE OR DIST grants her access by mistake. This produces the result Bob wants. Following another uncomfortable talk with the surveying company manager, however, Bob gets worried. If he creates another user, then he ll have to update the ACLs to deny that new user, too. Bob decides it s easier to simply deny access by Users to the survey data Jones files. He & assumes Bartlett that Learning, Tina will still have access since she is a member Jones of the survey & Bartlett group. Learning, NOT FOR Instead, SALE Windows OR DISTRIBUTION applies all Deny ACL entries first. Because NOT Tina FOR (and Bob, SALE for that OR DISTRIBUTION matter) is a user and all users are denied access, Tina is denied access; nobody can access the survey files until Bob removes the Deny entry...

20 152 Chapter 4 Sharing Files Used with permission from Microsoft. Figure 4.13 Denying access in a Windows ACL. The Deny feature can make an ACL hard to interpret. The Windows ACL display in Figure 4.14 lists the rights by the sets of users involved. However, a single set of users may be subject to both Allow and Deny rights, and all Deny rights are applied first. We must examine the list twice: once applying the Deny rights, and again applying the Allow rights. NOT FOR SALE Determining OR DISTRIBUTION Access Rights To determine the actual rights applied to a particular file under Windows, we have two choices. First, we can manually review the rights for each user and group. We need to..

21 4.4 Microsoft Windows ACLs 153 4Sharing Files Used with permission from Microsoft. Figure 4.14 Advanced security settings for Windows ACLs. keep track of Allow and Deny rights, apply the Deny rights first, and apply Allow rights only if they don t contradict an earlier Deny right in the ACL. Our second choice is to s & Bartlett click Learning, on the Advanced button at the bottom of Jones the ACL & window. Bartlett This Learning, opens another R SALE OR window DISTRIBUTION that gives us finer control over the access NOT rights. FOR If we SALE click OR on the DISTRIBUTION Effective Permissions tab in that window, we can ask Windows to determine the access rights granted to a particular user or group. Building Effective Acls In general, Deny by Default yields the best approach to building ACLs. We start with no rules granting access to anyone. We add access rights required by the owner and the system, and then we add access rights required by others who use the files. We won t need to use Deny entries if we haven t granted access rights we must later rescind. Occasionally, we might encounter a case where it s more practical to use a Deny entry than to build the ACL using Deny by Default. For example, a college may have a user group for all students called, of course, Students. As soon as people register, they are added to the group. However, there are certain items that incoming freshmen aren t allowed to use. We can implement this with Deny by Default if we create a separate..

22 154 Chapter 4 Sharing Files group Jones containing & Bartlett Students Learning, Minus Freshmen. However, it is easier to create Jones a separate & Bartlett Learn group named Freshmen and create a Deny entry that applies just to Freshmen. It should be easier to move students in and out of the Freshmen group than to maintain a separate Students Minus Freshmen group. Jones & Bartlett Default Learning, File Protection When we create a file, we rarely stop and think about NOT its access FOR rights. SALE We assume OR DISTRIBUTION the file will receive appropriate rights automatically. In practice, we often rely on the file s directory to protect the file for us. In Unix-based systems, new files are assigned a default set of file-protection flags. These flags usually grant the owner full access and provide read-only access to everyone else. If the file is in a private folder, like My Documents, the folder itself is unreadable by others. Even if users are allowed to read the file, they can t actually reach it if they can t retrieve it from its folder. Inherited Rights Systems Jones that support & Bartlett ACLs, Learning, like Apple s OS X, often support an inheritance mechanism for NOT assigning FOR ACLs SALE to new OR files. DISTRIBUTION We assign the ACL we want to a particular folder. When we create new files in that folder, the files receive the inherited ACLs. While this makes ACLs a bit more practical, there are still shortcomings. In OS X, for example, there is no way to assign the inherited ACLs except through typed commands. The mechanism rarely is used in practice. Another problem is that the systems often use static inheritance. If we make any changes to the inherited ACL, we will need to manually propagate the changed ACL to all files in the folder. Mac OS X and other Unix-based systems often provide tools to simplify the problem of changing access rights on a set of files. For example, OS X provides a menu item Apply to enclosed items that applies a folder s access rights to all files and folders it contains. Dynamic ACLs Microsoft Windows 2000 introduced dynamic ACLs that inherit access rights from the enclosing folder. In other words, the files themselves don t really keep their own ACLs. Instead, they use the parent ACL, which is retrieved from their folder. When we create a new file, it simply inherits access rights from the folder in which we save the file. This Jones inheritance & Bartlett is dynamic Learning, because we can change permissions on all files in a folder just NOT by changing FOR SALE permissions OR on DISTRIBUTION the folder itself. As long as the files inside the folder inherit their ACL from the folder, we change all ACLs when we change the folder s ACL. Dynamic ACLs also make it more difficult to establish tailored access rights. According to Deny by Default, we make fewest mistakes when we start with no access rights and then add the ones we need. The inherited rights may include rights we don t want to grant, and then we must disable inheritance before we establish the rights we want. Windows usually applies a global user isolation policy. When we create a file in our own Documents directory, we are generally the only user with access to it. The system..

23 4.4 Microsoft Windows ACLs 155 may grant administrative Jones & access Bartlett to certain Learning, groups and identities as well to support built-in system functions, but regular users are not granted access by default. It can be difficult to grant access to files stored in a user s personal folders. When Bob created his Survey Folder, he placed it on the root directory of his C: drive. This makes it easy for other users to find. The path name is short and simple. This does not pose a security problem as long as Bob restricts the folder s access rights. Bob can t Jones do this & from Bartlett the ACL Learning, display the Properties window (Figure 4.12). Jones He must & Bartlett click on Learning, NOT the FOR Advanced SALE OR button DISTRIBUTION at the bottom to see the Advanced ACL NOT display FOR (Figure SALE 4.14). OR DISTRIBUTION The display shows the default permissions established for the new Survey Folder. The right two columns describe the inheritance; the entire ACL is inherited from the C: drive root. By default, Users and Authenticated Users have broad access rights to the folder. s & Bartlett This Learning, is a problem. Folders created in the root directory Jones of Bob s & Bartlett tower computer Learning, share their contents by default. This grants access to Alice and to any other new users brought in. To set the permissions correctly, Bob must eliminate the undesired rights. He can t simply delete the offending inherited entries and leave other inherited entries in place. He can t deny access to Authenticated Users, since that also denies access to Tina and him. He must disable inheritance on the Survey Files folder to eliminate the unwanted access permissions. Jones He clicks & Bartlett on the button Learning, marked Disable inheritance, located below the Add NOT button. FOR SALE He may OR reenable DISTRIBUTION inheritance by clicking the button again. When Bob clicks the Disable inheritance button, Windows asks him which permissions, if any, it should give to this disinherited folder. He may either convert inherited permissions into explicit permissions, which simply copies the existing permissions, or he may remove all permissions. It is probably safer to convert the permissions and then remove the unwanted ones. If we remove all inherited permissions, we may accidentally hide files or folders from the system and disable useful services like file backups. Bob converts the permissions instead of removing them. Below the inheritance button is a check box about replacing child object permissions. The check box lets us copy existing, inherited permissions to files and folders enclosed in s & Bartlett this Learning, one. This doesn t apply to Bob s situation, since Jones he has & just Bartlett created Learning, an empty folder. R SALE OR There DISTRIBUTION are no files or subfolders. After the system copies the permissions, Bob deletes the rights for Users and Authenticated users. He leaves the rights for SYSTEM and Administrators; it isn t clear which system features will fail if we omit those. We leave system-specific permissions in place unless we have a really compelling reason to remove them. Finally, Bob Jones adds ACL & entries. Bartlett He adds Learning, one for himself, giving him full control. He Jones adds & Bartlett Learn another for the NOT survey FOR group, SALE and OR gives DISTRIBUTION it full control. This yields the ACL in Figure NOT FOR SALE OR DIST New files or folders created in the Survey Folder will inherit this ACL. Though unnecessary, Bob could add a Deny entry for Alice, as illustrated in Figure In either case, the new access rules apply to all files and folders inside the Survey Folder. Jones The & access Bartlett rights Learning, shown a file s Security tab combine both the Jones inherited & rights Bartlett and Learning, NOT any FOR rights SALE we apply OR directly DISTRIBUTION to that file. Inherited rights appear NOT as rights FOR with SALE greyed-out OR DISTRIBUTION boxes either checked or unchecked. If we decide to change the rights of a file, the locally assigned (not inherited) rights appear as solid boxes. 4Sharing Files..

WINDOWS 7 & HOMEGROUP

WINDOWS 7 & HOMEGROUP WINDOWS 7 & HOMEGROUP SHARING WITH WINDOWS XP, WINDOWS VISTA & OTHER OPERATING SYSTEMS Abstract The purpose of this white paper is to explain how your computers that are running previous versions of Windows

More information

Hosting Users Guide 2011

Hosting Users Guide 2011 Hosting Users Guide 2011 eofficemgr technology support for small business Celebrating a decade of providing innovative cloud computing services to small business. Table of Contents Overview... 3 Configure

More information

Creating Home Directories for Windows and Macintosh Computers

Creating Home Directories for Windows and Macintosh Computers ExtremeZ-IP Active Directory Integrated Home Directories Configuration! 1 Active Directory Integrated Home Directories Overview This document explains how to configure home directories in Active Directory

More information

Sentral servers provide a wide range of services to school networks.

Sentral servers provide a wide range of services to school networks. Wazza s QuickStart File Sharing for Macs on a Sentral Server Mac OS X, Sentral Background Sentral servers provide a wide range of services to school networks. One of those services is a space for sharing

More information

In the same spirit, our QuickBooks 2008 Software Installation Guide has been completely revised as well.

In the same spirit, our QuickBooks 2008 Software Installation Guide has been completely revised as well. QuickBooks 2008 Software Installation Guide Welcome 3/25/09; Ver. IMD-2.1 This guide is designed to support users installing QuickBooks: Pro or Premier 2008 financial accounting software, especially in

More information

Creating and Managing Shared Folders

Creating and Managing Shared Folders Creating and Managing Shared Folders Microsoft threw all sorts of new services, features, and functions into Windows 2000 Server, but at the heart of it all was still the requirement to be a good file

More information

Cloud Server powered by Mac OS X. Getting Started Guide. Cloud Server. powered by Mac OS X. AKJZNAzsqknsxxkjnsjx Getting Started Guide Page 1

Cloud Server powered by Mac OS X. Getting Started Guide. Cloud Server. powered by Mac OS X. AKJZNAzsqknsxxkjnsjx Getting Started Guide Page 1 Getting Started Guide Cloud Server powered by Mac OS X Getting Started Guide Page 1 Getting Started Guide: Cloud Server powered by Mac OS X Version 1.0 (02.16.10) Copyright 2010 GoDaddy.com Software, Inc.

More information

Recommended File System Ownership and Privileges

Recommended File System Ownership and Privileges FOR MAGENTO COMMUNITY EDITION Whenever a patch is released to fix an issue in the code, a notice is sent directly to your Admin Inbox. If the update is security related, the incoming message is colorcoded

More information

1. Open the Account Settings window by clicking on Account Settings from the Entourage menu.

1. Open the Account Settings window by clicking on Account Settings from the Entourage menu. Using TLS Encryption with Microsoft Entourage This guide assumes that you have previously configured Entourage to work with your Beloit College email account. If you have not, you can create an account

More information

TEL2821/IS2150: INTRODUCTION TO SECURITY Lab: Operating Systems and Access Control

TEL2821/IS2150: INTRODUCTION TO SECURITY Lab: Operating Systems and Access Control TEL2821/IS2150: INTRODUCTION TO SECURITY Lab: Operating Systems and Access Control Version 3.4, Last Edited 9/10/2011 Students Name: Date of Experiment: Read the following guidelines before working in

More information

Sophos Anti-Virus for Mac OS X: Home Edition Help

Sophos Anti-Virus for Mac OS X: Home Edition Help Sophos Anti-Virus for Mac OS X: Home Edition Help For standalone Macs running Mac OS X Product version: 9C Document date: June 2013 Sophos TOC 3 Contents About Sophos Anti-Virus...5 About the Scans window...5

More information

E-mail Encryption Guide version 1.2, by Thomas Reed

E-mail Encryption Guide version 1.2, by Thomas Reed E-mail Encryption Guide version 1.2, by Thomas Reed In order for two people to send and receive encrypted e-mails to/from each other, both parties need: An e-mail reader that supports encryption (such

More information

User's Manual. Intego VirusBarrier Server 2 / VirusBarrier Mail Gateway 2 User's Manual Page 1

User's Manual. Intego VirusBarrier Server 2 / VirusBarrier Mail Gateway 2 User's Manual Page 1 User's Manual Intego VirusBarrier Server 2 / VirusBarrier Mail Gateway 2 User's Manual Page 1 VirusBarrier Server 2 and VirusBarrier Mail Gateway 2 for Macintosh 2008 Intego. All Rights Reserved Intego

More information

your Apple warranty; see http://www.drivesavers.com/. There are two main failure modes for a mirrored RAID 1 set:

your Apple warranty; see http://www.drivesavers.com/. There are two main failure modes for a mirrored RAID 1 set: 48981c03.qxd 12/6/07 8:56 PM Page 142 142 File Systems RAID set creation takes only a few moments, and once it s complete, you should see new RAID set volume in the Disk Utility list and in the Finder.

More information

Parallels Panel. Parallels Small Business Panel 10.2: User's Guide. Revision 1.0

Parallels Panel. Parallels Small Business Panel 10.2: User's Guide. Revision 1.0 Parallels Panel Parallels Small Business Panel 10.2: User's Guide Revision 1.0 Copyright Notice ISBN: N/A Parallels 660 SW 39 th Street Suite 205 Renton, Washington 98057 USA Phone: +1 (425) 282 6400 Fax:

More information

Enabling Backups for Windows and MAC OS X

Enabling Backups for Windows and MAC OS X Enabling Backups for Windows and MAC OS X TM Trademarks and Copyrights Copyright Storix, Inc. 1999-2005 Storix is a registered trademark of Storix, Inc. SBAdmin is a trademark of Storix, Inc in the USA

More information

Take Your Mac OS X Security to NSA Standards June 19, 2014 by Larry Chafin

Take Your Mac OS X Security to NSA Standards June 19, 2014 by Larry Chafin Take Your Mac OS X Security to NSA Standards June 19, 2014 by Larry Chafin Forword While doing research for another article, I came across NSA s security setup for Mac OS X. No, the information gained

More information

Macintosh Printer Management using Centrify DirectControl Group Policies

Macintosh Printer Management using Centrify DirectControl Group Policies WHITE PAPER CENTRIFY CORP. MARCH 2010 Macintosh Printer Management using Centrify DirectControl Group Policies ABSTRACT This white paper examines various approaches to managing printer configuration files

More information

BULLGUARD BAckUp GUIDE

BULLGUARD BAckUp GUIDE BULLGUARD backup GUIDE CONTENTS BullGuard Backup introduction page 3 Installing BullGuard Backup page 6 Uninstalling BullGuard Backup page 11 Registering BullGuard Backup: creating an account page 12 Running

More information

Utilities. 2003... ComCash

Utilities. 2003... ComCash Utilities ComCash Utilities All rights reserved. No parts of this work may be reproduced in any form or by any means - graphic, electronic, or mechanical, including photocopying, recording, taping, or

More information

Many home and small office networks exist for no

Many home and small office networks exist for no C H A P T E R Accessing and Sharing Network Resources Many home and small office networks exist for no other reason than to share a broadband Internet connection. The administrators of those networks attach

More information

How to Configure Outlook 2013 to connect to Exchange 2010

How to Configure Outlook 2013 to connect to Exchange 2010 How to Configure Outlook 2013 to connect to Exchange 2010 Outlook 2013 will install and work correctly on any version of Windows 7 or Windows 8. Outlook 2013 won t install on Windows XP or Vista. 32-bit

More information

Objectives. At the end of this chapter students should be able to:

Objectives. At the end of this chapter students should be able to: NTFS PERMISSIONS AND SECURITY SETTING.1 Introduction to NTFS Permissions.1.1 File Permissions and Folder Permission.2 Assigning NTFS Permissions and Special Permission.2.1 Planning NTFS Permissions.2.2

More information

Sophos Anti-Virus for Mac OS X Help

Sophos Anti-Virus for Mac OS X Help Sophos Anti-Virus for Mac OS X Help For networked and standalone Macs running Mac OS X Product version: 9 Document date: June 2013 Sophos TOC 3 Contents About Sophos Anti-Virus...5 About the Scans window...5

More information

Introduction to MS WINDOWS XP

Introduction to MS WINDOWS XP Introduction to MS WINDOWS XP Mouse Desktop Windows Applications File handling Introduction to MS Windows XP 2 Table of Contents What is Windows XP?... 3 Windows within Windows... 3 The Desktop... 3 The

More information

KU Information Technology provides wireless access for both the KU campus community and for guest users at many points across campus.

KU Information Technology provides wireless access for both the KU campus community and for guest users at many points across campus. Wireless at KU KU Information Technology provides wireless access for both the KU campus community and for guest users at many points across campus. The Campus IT map provides building locations where

More information

Sophos SafeGuard Native Device Encryption for Mac Administrator help. Product version: 7

Sophos SafeGuard Native Device Encryption for Mac Administrator help. Product version: 7 Sophos SafeGuard Native Device Encryption for Mac Administrator help Product version: 7 Document date: December 2014 Contents 1 About SafeGuard Native Device Encryption for Mac...3 1.1 About this document...3

More information

Getting the most out of your new Aalto workstation An Aalto IT guide for personnel migrating to the new Aalto workstation environment

Getting the most out of your new Aalto workstation An Aalto IT guide for personnel migrating to the new Aalto workstation environment Getting the most out of your new Aalto workstation An Aalto IT guide for personnel migrating to the new Aalto workstation environment What services do I use with the old TKK password, and what do I use

More information

Frequently Asked Questions

Frequently Asked Questions Frequently Asked Questions Share Drive Frequently Asked Questions Table of Contents How do I change my password?... How do I reset my password if I forgot it?... How do I share files/folders with Groups

More information

Planning and Implementing an OU Structure

Planning and Implementing an OU Structure 3 CHAPTER THREE Planning and Implementing an OU Structure Terms you ll need to understand: Organizational unit (OU) Delegation of control Group Policy Security group Linked policies Techniques/concepts

More information

Manual Password Depot Server 8

Manual Password Depot Server 8 Manual Password Depot Server 8 Table of Contents Introduction 4 Installation and running 6 Installation as Windows service or as Windows application... 6 Control Panel... 6 Control Panel 8 Control Panel...

More information

Migrating Your Windows File Server to a CTERA Cloud Gateway. Cloud Attached Storage. February 2015 Version 4.1

Migrating Your Windows File Server to a CTERA Cloud Gateway. Cloud Attached Storage. February 2015 Version 4.1 Migrating Your Windows File Server to a CTERA Cloud Gateway Cloud Attached Storage February 2015 Version 4.1 Copyright 2009-2015 CTERA Networks Ltd. All rights reserved. No part of this document may be

More information

How to Configure Outlook 2003 to connect to Exchange 2010

How to Configure Outlook 2003 to connect to Exchange 2010 How to Configure Outlook 2003 to connect to Exchange 2010 Outlook 2003 will install and work correctly on any version of Windows XP, Vista, Windows 7 or Windows 8. These instructions describe how to setup

More information

GoldKey Software. User s Manual. Revision 7.12. WideBand Corporation www.goldkey.com. Copyright 2007-2014 WideBand Corporation. All Rights Reserved.

GoldKey Software. User s Manual. Revision 7.12. WideBand Corporation www.goldkey.com. Copyright 2007-2014 WideBand Corporation. All Rights Reserved. GoldKey Software User s Manual Revision 7.12 WideBand Corporation www.goldkey.com 1 Table of Contents GoldKey Installation and Quick Start... 5 Initial Personalization... 5 Creating a Primary Secure Drive...

More information

Installing LearningBay Enterprise Part 2

Installing LearningBay Enterprise Part 2 Installing LearningBay Enterprise Part 2 Support Document Copyright 2012 Axiom. All Rights Reserved. Page 1 Please note that this document is one of three that details the process for installing LearningBay

More information

Getting Started with Dynamic Web Sites

Getting Started with Dynamic Web Sites PHP Tutorial 1 Getting Started with Dynamic Web Sites Setting Up Your Computer To follow this tutorial, you ll need to have PHP, MySQL and a Web server up and running on your computer. This will be your

More information

NAS 253 Introduction to Backup Plan

NAS 253 Introduction to Backup Plan NAS 253 Introduction to Backup Plan Create backup jobs using Backup Plan in Windows A S U S T O R C O L L E G E COURSE OBJECTIVES Upon completion of this course you should be able to: 1. Create backup

More information

How to Use Windows Firewall With User Account Control (UAC)

How to Use Windows Firewall With User Account Control (UAC) Keeping Windows 8.1 safe and secure 14 IN THIS CHAPTER, YOU WILL LEARN HOW TO Work with the User Account Control. Use Windows Firewall. Use Windows Defender. Enhance the security of your passwords. Security

More information

Setting Up ALERE with Client/Server Data

Setting Up ALERE with Client/Server Data Setting Up ALERE with Client/Server Data TIW Technology, Inc. November 2014 ALERE is a registered trademark of TIW Technology, Inc. The following are registered trademarks or trademarks: FoxPro, SQL Server,

More information

User's Manual. Intego Remote Management Console User's Manual Page 1

User's Manual. Intego Remote Management Console User's Manual Page 1 User's Manual Intego Remote Management Console User's Manual Page 1 Intego Remote Management Console for Macintosh 2007 Intego, Inc. All Rights Reserved Intego, Inc. www.intego.com This manual was written

More information

IT Quick Reference Guides Sharing, Delegation and Multiple Accounts

IT Quick Reference Guides Sharing, Delegation and Multiple Accounts IT Quick Reference Guides Sharing, Delegation and Multiple Accounts Outlook 2010 Guides This guide is meant as a mini-manual for using shared accounts, mailboxes and calendars in Outlook 2010. This is

More information

Server & Workstation Installation of Client Profiles for Windows

Server & Workstation Installation of Client Profiles for Windows C ase Manag e m e n t by C l i e n t P rofiles Server & Workstation Installation of Client Profiles for Windows T E C H N O L O G Y F O R T H E B U S I N E S S O F L A W General Notes to Prepare for Installing

More information

Configuring, Customizing, and Troubleshooting Outlook Express

Configuring, Customizing, and Troubleshooting Outlook Express 3 Configuring, Customizing, and Troubleshooting Outlook Express............................................... Terms you ll need to understand: Outlook Express Newsgroups Address book Email Preview pane

More information

10 steps to better secure your Mac laptop from physical data theft

10 steps to better secure your Mac laptop from physical data theft 10 steps to better secure your Mac laptop from physical data theft Executive summary: This paper describes changes Mac users can make to improve the physical security of their laptops, discussing the context

More information

Sophos Anti-Virus for Mac OS X Help

Sophos Anti-Virus for Mac OS X Help Sophos Anti-Virus for Mac OS X Help For networked and standalone Macs running Mac OS X version 10.4 or later Product version: 8 Document date: April 2012 Contents 1 About Sophos Anti-Virus...3 2 Scanning

More information

Folder Management in Outlook for Macintosh

Folder Management in Outlook for Macintosh Folder Management in Outlook Introduction Learn to create and manage folders in your mailbox on the Exchange server, in Personal Folders saved on your computer s hard disk or to a local network server,

More information

Snow Inventory. Installing and Evaluating

Snow Inventory. Installing and Evaluating Snow Inventory Installing and Evaluating Snow Software AB 2002 Table of Contents Introduction...3 1. Evaluate Requirements...3 2. Download Software...3 3. Obtain License Key...4 4. Install Snow Inventory

More information

on-hand viewer on iphone / ipod touch manual installation and configuration of an FTP server for Mac OS X to transfer data to on-hand viewer application on iphone / ipod touch table of contents 1. Introduction

More information

Clickfree Software User Guide

Clickfree Software User Guide Clickfree Software User Guide Last Revised: Nov 2, 2011 Clickfree_backup_software_user_guide_v1.0 Clickfree and the Clickfree logo are trademarks or registered trademarks of Storage Appliance Corporation.

More information

aims sql server installation guide

aims sql server installation guide aims sql server installation guide Document Version: 4000 February 2015 CONTENTS AIMS Installation Guide... 3 Installing the AIMS Software... 4 Pre-Requisites... 4 Installation... 4 Shortcuts... 4 Directory

More information

Windows Domain Network Configuration Guide

Windows Domain Network Configuration Guide Windows Domain Network Configuration Guide Windows Domain Network Configuration Guide for CCC Pathways Copyright 2008 by CCC Information Services Inc. All rights reserved. No part of this publication may

More information

Understanding and Using NetInfo. Includes information on setting up Mac OS X Server and NetInfo to increase the power of your Mac OS X network

Understanding and Using NetInfo. Includes information on setting up Mac OS X Server and NetInfo to increase the power of your Mac OS X network Understanding and Using NetInfo Includes information on setting up Mac OS X Server and NetInfo to increase the power of your Mac OS X network K Apple Computer, Inc. 2001 Apple Computer, Inc. All rights

More information

Open Directory. Contents. Before You Start 2. Configuring Rumpus 3. Testing Accessible Directory Service Access 4. Specifying Home Folders 4

Open Directory. Contents. Before You Start 2. Configuring Rumpus 3. Testing Accessible Directory Service Access 4. Specifying Home Folders 4 Contents Before You Start 2 Configuring Rumpus 3 Testing Accessible Directory Service Access 4 Specifying Home Folders 4 Open Directory Groups 6 Maxum Development Corp. Before You Start Open Directory

More information

Security. The user and group account information for LookoutDirect 4 is kept in the Lookout.sec file, installed in your Windows SYSTEM directory.

Security. The user and group account information for LookoutDirect 4 is kept in the Lookout.sec file, installed in your Windows SYSTEM directory. 6 This chapter describes the two types of LookoutDirect operational security: network security and control security. Viewing security is primarily based in control security. You can use either or both

More information

How to Configure Outlook 2007 to connect to Exchange 2010

How to Configure Outlook 2007 to connect to Exchange 2010 How to Configure Outlook 2007 to connect to Exchange 2010 Outlook 2007 will install and work correctly on any version of Windows XP, Vista, Windows 7 or Windows 8. These instructions describe how to setup

More information

Wazza s QuickStart 13. Leopard Server - Windows Domain

Wazza s QuickStart 13. Leopard Server - Windows Domain Wazza s QuickStart 13. Leopard Server - Windows Domain About the Document This document is the 13th in a series of documents describing the process of installing and configuring a Mac OS X 10.5 Server

More information

CIFS Permissions Best Practices Nasuni Corporation Natick, MA

CIFS Permissions Best Practices Nasuni Corporation Natick, MA Nasuni Corporation Natick, MA Overview You use permissions to control user access to data. There are two basic considerations when using permissions to control user access to data: Which users have access

More information

Samsung Xchange for Mac User Guide. Winter 2013 v2.3

Samsung Xchange for Mac User Guide. Winter 2013 v2.3 Samsung Xchange for Mac User Guide Winter 2013 v2.3 Contents Welcome to Samsung Xchange IOS Desktop Client... 3 How to Install Samsung Xchange... 3 Where is it?... 4 The Dock menu... 4 The menu bar...

More information

1 of 10 1/31/2014 4:08 PM

1 of 10 1/31/2014 4:08 PM 1 of 10 1/31/2014 4:08 PM copyright 2014 How to backup Microsoft SQL Server with Nordic Backup Pro Before creating a SQL backup set within Nordic Backup Pro it is first necessary to verify that the settings

More information

User s Guide For Department of Facility Services

User s Guide For Department of Facility Services Doc s File Server User s Guide For Department of Facility Services For Ver : 7.2.88.1020 Rev : 1_05-27-2011 Created by : Elliott Jeyaseelan 2 Table of Contents SERVER LOGIN & AUTHENTICATION REQUIREMENTS

More information

Ross Video Limited. DashBoard Server and User Rights Management User Manual

Ross Video Limited. DashBoard Server and User Rights Management User Manual Ross Video Limited DashBoard Server and User Rights Management User Manual DashBoard Server and User Rights Management User Manual Ross Part Number: 8351DR-004A-01 Release Date: March 22, 2011. Printed

More information

HOW TO CONFIGURE SQL SERVER REPORTING SERVICES IN ORDER TO DEPLOY REPORTING SERVICES REPORTS FOR DYNAMICS GP

HOW TO CONFIGURE SQL SERVER REPORTING SERVICES IN ORDER TO DEPLOY REPORTING SERVICES REPORTS FOR DYNAMICS GP HOW TO CONFIGURE SQL SERVER REPORTING SERVICES IN ORDER TO DEPLOY REPORTING SERVICES REPORTS FOR DYNAMICS GP When you install SQL Server you have option to automatically deploy & configure SQL Server Reporting

More information

USERS MANUAL FOR OWL A DOCUMENT REPOSITORY SYSTEM

USERS MANUAL FOR OWL A DOCUMENT REPOSITORY SYSTEM USERS MANUAL FOR OWL A DOCUMENT REPOSITORY SYSTEM User Manual Table of Contents Introducing OWL...3 Starting to use Owl...4 The Logging in page...4 Using the browser...6 Folder structure...6 Title Bar...6

More information

DECS DER APPLE WIRELESS HELPER DOCUMENT

DECS DER APPLE WIRELESS HELPER DOCUMENT DECS DER APPLE WIRELESS HELPER DOCUMENT A GUIDE TO THE DEPLOYMENT OF APPLE MAC NOTEBOOK COMPUTERS IN DECS WIRELESS NETWORKS apple Chris Downing, Senior Systems Engineer apple Viano Jaksa, Area Manager

More information

Apple Server Diagnostics User Guide. For Version 3X106

Apple Server Diagnostics User Guide. For Version 3X106 Apple Server Diagnostics User Guide For Version 3X106 KKApple Inc. 2009 Apple Inc. All rights reserved. Under the copyright laws, this manual may not be copied, in whole or in part, without the written

More information

SQL Server 2008 R2 Express Edition Installation Guide

SQL Server 2008 R2 Express Edition Installation Guide Hardware, Software & System Requirements for SQL Server 2008 R2 Express Edition To get the overview of SQL Server 2008 R2 Express Edition, click here. Please refer links given below for all the details

More information

Email Getting Started Guide Unix Platform

Email Getting Started Guide Unix Platform Edition/Issue Email Getting Started Guide Unix Platform One of the most important features of your new Web Hosting account is access to a personalized Email solution that includes individual Email addresses

More information

MacScan. MacScan User Guide. Detect, Isolate and Remove Spyware

MacScan. MacScan User Guide. Detect, Isolate and Remove Spyware MacScan MacScan User Guide Detect, Isolate and Remove Spyware Part 1 1.1 Introduction MacScan is a spyware detection utility for Macintosh OS X that finds and removes spyware and other Internet files

More information

AIR FORCE ASSOCIATION S CYBERPATRIOT NATIONAL YOUTH CYBER EDUCATION PROGRAM UNIT EIGHT. Ubuntu Security. www.uscyberpatriot.org

AIR FORCE ASSOCIATION S CYBERPATRIOT NATIONAL YOUTH CYBER EDUCATION PROGRAM UNIT EIGHT. Ubuntu Security. www.uscyberpatriot.org AIR FORCE ASSOCIATION S CYBERPATRIOT NATIONAL YOUTH CYBER EDUCATION PROGRAM UNIT EIGHT Ubuntu Security www.uscyberpatriot.org AIR FORCE ASSOCIATION S CYBERPATRIOT NATIONAL YOUTH CYBER EDUCATION PROGRAM

More information

Local Caching Servers (LCS): User Manual

Local Caching Servers (LCS): User Manual Local Caching Servers (LCS): User Manual Table of Contents Local Caching Servers... 1 Supported Browsers... 1 Getting Help... 1 System Requirements... 2 Macintosh... 2 Windows... 2 Linux... 2 Downloading

More information

Archiving and Managing Your Mailbox

Archiving and Managing Your Mailbox Archiving and Managing Your Mailbox We Need You to Do Your Part We ask everyone to participate in routinely cleaning out their mailbox. Large mailboxes with thousands of messages impact backups and may

More information

Cloud Backup Express

Cloud Backup Express Cloud Backup Express Table of Contents Installation and Configuration Workflow for RFCBx... 3 Cloud Management Console Installation Guide for Windows... 4 1: Run the Installer... 4 2: Choose Your Language...

More information

GPG installation and configuration

GPG installation and configuration Contents Introduction... 3 Windows... 5 Install GPG4WIN... 5 Configure the certificate manager... 7 Configure GPG... 7 Create your own set of keys... 9 Upload your public key to the keyserver... 11 Importing

More information

Web+Center Version 7.x Windows Quick Install Guide 2 Tech Free Version Rev March 7, 2012

Web+Center Version 7.x Windows Quick Install Guide 2 Tech Free Version Rev March 7, 2012 Web+Center Version 7.x Windows Quick Install Guide 2 Tech Free Version Rev March 7, 2012 1996-2012 Internet Software Sciences Welcome to the Web+Center Installation and Configuration guide. This document

More information

Sophos Anti-Virus for Mac OS X Help. For networked and single computers running Mac OS X version 10.4 or later

Sophos Anti-Virus for Mac OS X Help. For networked and single computers running Mac OS X version 10.4 or later Sophos Anti-Virus for Mac OS X Help For networked and single computers running Mac OS X version 10.4 or later Product version: 7 Document date: October 2009 Contents 1 About Sophos Anti-Virus...3 2 On-access

More information

Reflection DBR USER GUIDE. Reflection DBR User Guide. 995 Old Eagle School Road Suite 315 Wayne, PA 19087 USA 610.964.8000 www.evolveip.

Reflection DBR USER GUIDE. Reflection DBR User Guide. 995 Old Eagle School Road Suite 315 Wayne, PA 19087 USA 610.964.8000 www.evolveip. Reflection DBR USER GUIDE 995 Old Eagle School Road Suite 315 Wayne, PA 19087 USA 610.964.8000 www.evolveip.net Page 1 of 1 Table of Contents Overview 3 Reflection DBR Client and Console Installation 4

More information

HP ProtectTools for Small Business Security Software, Version 5.10. User Guide

HP ProtectTools for Small Business Security Software, Version 5.10. User Guide HP ProtectTools for Small Business Security Software, Version 5.10 User Guide Copyright 2010 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.

More information

1. Installation Overview

1. Installation Overview Quick Install Guide 1. Installation Overview Thank you for selecting Bitdefender Business Solutions to protect your business. This document enables you to quickly get started with the installation of Bitdefender

More information

Spector 360 Deployment Guide. Version 7.3 January 3, 2012

Spector 360 Deployment Guide. Version 7.3 January 3, 2012 Spector 360 Deployment Guide Version 7.3 January 3, 2012 Table of Contents Deploy to All Computers... 48 Step 1: Deploy the Servers... 5 Recorder Requirements... 52 Requirements... 5 Control Center Server

More information

The safer, easier way to help you pass any IT exams. Exam : 9L0-518. OS X Server Essentials 10.8 Exam. Title : Version : Demo 1 / 6

The safer, easier way to help you pass any IT exams. Exam : 9L0-518. OS X Server Essentials 10.8 Exam. Title : Version : Demo 1 / 6 Exam : 9L0-518 Title : OS X Server Essentials 10.8 Exam Version : Demo 1 / 6 1.In Server app, which procedure will configure OS X Server to let members of a specific group use the Messages service? A.

More information

Xcalibur. Foundation. Administrator Guide. Software Version 3.0

Xcalibur. Foundation. Administrator Guide. Software Version 3.0 Xcalibur Foundation Administrator Guide Software Version 3.0 XCALI-97520 Revision A May 2013 2013 Thermo Fisher Scientific Inc. All rights reserved. LCquan, Watson LIMS, and Web Access are trademarks,

More information

Setting Up Your FTP Server

Setting Up Your FTP Server Requirements:! A computer dedicated to FTP server only! Linksys router! TCP/IP internet connection Steps: Getting Started Configure Static IP on the FTP Server Computer: Setting Up Your FTP Server 1. This

More information

Mac OS VPN Set Up Guide

Mac OS VPN Set Up Guide Mac OS VPN Set Up Guide If internet traffic is not being sent over the VPN then go to System Preferences- >Network and click on your VPN connection. Click the "Advanced..." button, and in the "Options"

More information

Microsoft Security Essentials Installation and Configuration Guide

Microsoft Security Essentials Installation and Configuration Guide Microsoft Security Essentials Installation and Configuration Guide This installation guide is for users who are intending to download the software from Microsoft s web site. If you are not intending on

More information

Table of Contents SQL Server Option

Table of Contents SQL Server Option Table of Contents SQL Server Option STEP 1 Install BPMS 1 STEP 2a New Customers with SQL Server Database 2 STEP 2b Restore SQL DB Upsized by BPMS Support 6 STEP 2c - Run the "Check Dates" Utility 7 STEP

More information

User Guide Online Backup

User Guide Online Backup User Guide Online Backup Table of contents Table of contents... 1 Introduction... 2 Adding the Online Backup Service to your Account... 2 Getting Started with the Online Backup Software... 4 Downloading

More information

Sendspace Wizard Desktop Tool Step-By-Step Guide

Sendspace Wizard Desktop Tool Step-By-Step Guide Sendspace Wizard Desktop Tool Step-By-Step Guide Copyright 2007 by sendspace.com This publication is designed to provide accurate and authoritative information for users of sendspace, the easy big file

More information

Upgrading from MSDE to SQL Server 2005 Express Edition with Advanced Services SP2

Upgrading from MSDE to SQL Server 2005 Express Edition with Advanced Services SP2 Upgrading from MSDE to SQL Server 2005 Express Edition with Advanced Services SP2 Installation and Configuration Introduction This document will walk you step by step in removing MSDE and the setup and

More information

Sophos Enterprise Console Help. Product version: 5.1 Document date: June 2012

Sophos Enterprise Console Help. Product version: 5.1 Document date: June 2012 Sophos Enterprise Console Help Product version: 5.1 Document date: June 2012 Contents 1 About Enterprise Console...3 2 Guide to the Enterprise Console interface...4 3 Getting started with Sophos Enterprise

More information

1. Scope of Service. 1.1 About Boxcryptor Classic

1. Scope of Service. 1.1 About Boxcryptor Classic Manual for Mac OS X Content 1. Scope of Service... 3 1.1 About Boxcryptor Classic... 3 1.2 About this manual... 4 2. Installation... 5 2.1 Installing Boxcryptor Classic... 5 2.2 Licensing Boxcryptor Classic

More information

Integrating Mac OS X 10.6 with Active Directory. 1 April 2010

Integrating Mac OS X 10.6 with Active Directory. 1 April 2010 Integrating Mac OS X 10.6 with Active Directory 1 April 2010 Introduction Apple Macintosh Computers running Mac OS X 10.6 can be integrated with the Boston University Active Directory to allow use of Active

More information

Please check www.milestonesys.com for updates to make sure you install the most recent version of our software.

Please check www.milestonesys.com for updates to make sure you install the most recent version of our software. Guide Contents Dear Milestone Customer, With the purchase of Milestone XProtect Central you have chosen a very powerful central monitoring solution, providing instant overview of any number of Milestone

More information

Apple Mac Fundamentals: A Tutorial. Updated 24/4/2013 By Mac Thing enquiries@macthing.co.uk http://www.macthing.co.uk. Table of Contents:

Apple Mac Fundamentals: A Tutorial. Updated 24/4/2013 By Mac Thing enquiries@macthing.co.uk http://www.macthing.co.uk. Table of Contents: Apple Mac Fundamentals: A Tutorial. Updated 24/4/2013 By Mac Thing enquiries@macthing.co.uk http://www.macthing.co.uk Table of Contents: 1) The Macintosh HD 2) Your Home Directory 3) The Finder 4) The

More information

GO!Enterprise MDM Device Application User Guide Installation and Configuration for BlackBerry

GO!Enterprise MDM Device Application User Guide Installation and Configuration for BlackBerry GO!Enterprise MDM Device Application User Guide Installation and Configuration for BlackBerry GO!Enterprise MDM Version 4.11.x GO!Enterprise MDM for BlackBerry 1 Table of Contents GO!Enterprise MDM for

More information

Working Together - Your Apple Mac and Microsoft Windows

Working Together - Your Apple Mac and Microsoft Windows Contains information about complex concepts and /or requires technical knowledge to get the most out of the article. Aimed at the more experienced / ambitious ICT manager or accidental techie. Working

More information

How to Install Applications (APK Files) on Your Android Phone

How to Install Applications (APK Files) on Your Android Phone How to Install Applications (APK Files) on Your Android Phone Overview An Android application is stored in an APK file (i.e., a file named by {Application Name}.apk). You must install the APK on your Android

More information

Chapter 3 ADDRESS BOOK, CONTACTS, AND DISTRIBUTION LISTS

Chapter 3 ADDRESS BOOK, CONTACTS, AND DISTRIBUTION LISTS Chapter 3 ADDRESS BOOK, CONTACTS, AND DISTRIBUTION LISTS 03Archer.indd 71 8/4/05 9:13:59 AM Address Book 3.1 What Is the Address Book The Address Book in Outlook is actually a collection of address books

More information

A Crash Course in OS X D. Riley and M. Allen

A Crash Course in OS X D. Riley and M. Allen Objectives A Crash Course in OS X D. Riley and M. Allen To learn some of the basics of the OS X operating system - including the use of the login panel, system menus, the file browser, the desktop, and

More information

Attix5 Pro Server Edition

Attix5 Pro Server Edition Attix5 Pro Server Edition V7.0.3 User Manual for Linux and Unix operating systems Your guide to protecting data with Attix5 Pro Server Edition. Copyright notice and proprietary information All rights reserved.

More information

Installing Oracle 12c Enterprise on Windows 7 64-Bit

Installing Oracle 12c Enterprise on Windows 7 64-Bit JTHOMAS ENTERPRISES LLC Installing Oracle 12c Enterprise on Windows 7 64-Bit DOLOR SET AMET Overview This guide will step you through the process on installing a desktop-class Oracle Database Enterprises

More information