Symantec Cyber Readiness Challenge Player s Manual

Size: px
Start display at page:

Download "Symantec Cyber Readiness Challenge Player s Manual"

Transcription

1 Symantec Cyber Readiness Challenge Player s Manual Version 1.6 January 20, 2014

2 Table of Contents Introduction The Cyber Readiness Challenge Your Credentials Accessing the Competition Scoring Obtaining Support Continuing Professional Education (CPE) Credit Cyber Readiness Challenge Event Preparation Rules Resources Required Using a Live CD or a Virtual Machine on Your System Connecting to the Event Requirements Settings Connecting Using the Scoreboard and Team Chat Preface Accessing the Scoreboard The Scoreboard Navigating Between Levels Viewing Your Progress Support Team Chat VPN Configuration for Kali Launch Kali Client Install VPN Configuration for BackTrack 5R3 with Gnome Launch BackTrack Client Installation VPN Configuration for Windows Client Installation VPN Configuration for Mac OS X Client Installation Appendices Appendix A: Resources Symantec

3 Introduction Welcome to Symantec s Cyber Readiness Challenge! Sun Tzu once said, "Know both yourself and your enemy and you can win a hundred battles without jeopardy." The Symantec Cyber Readiness Challenge is an immersive, interactive capture the flag competition that models scenarios after the current threat landscape using realistic, virtualized IT infrastructure. Designed for many levels of technical skill and experience it puts participants in the hacker's shoes to understand their targets, technology and thought processes so they can ultimately better protect their organization and themselves. Offered as both online and live onsite events at numerous locations around the world, participants will have the opportunity to test, practice and develop their security skills within a unique and real world inspired environment developed by Symantec, the global leader in security. While participating in this event, you will have the opportunity to: Sharpen skills such as forensics, ethical hacking and more Expand your awareness of targets and threats Learn and try new techniques and tools Compete against your peers for prizes and bragging rights Earn Continuing Professional Education, or CPE, credit Bringing together some of the world's leading experts in IT security, this innovative competition will offer a keynote presentation by renowned security experts on the current security landscape and provides a fantastic environment for networking and knowledge sharing. For more information on future events, rules and technical requirements, please visit the following URL: Please read this manual for important information about connecting to and playing in the event Symantec

4 1 The Cyber Readiness Challenge This section will provide an overview of the Cyber Readiness Challenge experience. 1.1 Your Credentials Every participant has their own username and password for the event. Your username and password are used to connect to the event via a Virtual Private Network (VPN), and to log into the scoring system (the Scoreboard ) to get your objectives and enter your answers. The username ( handle ) and password you registered or were provided at the event are used to log into the VPN and the scoreboard. Do not lose or disclose your password to anyone. 1.2 Accessing the Competition The online environment for the Cyber Readiness Challenge is run from several datacenters globally. Prior to the start of the event each participant will receive an providing information about how to access their event. Each participant will need a computer or a virtual machine to access the environment. There are two main ways to participate: Using the participant s computer with a native operating system or an ethical hacking toolset such as Kali or BackTrack installed or dual-booted, such as using a live CD/DVD, connecting with VPN software provided by the online environment Using the participant s computer with an ethical hacking toolset running in a virtual machine, with the VM connecting with VPN software provided by the online environment More information about these options, including detailed setup instructions, will be provided in later sections of this document. 1.3 Scoring The objective is for individuals, or their teams for team events, to capture as many flags as possible during the event. All participants should log into the Scoreboard to see the questions and to enter their answers to score points. Each question and answer set is referred to as a flag. The competition is broken into levels, starting with level one (1), with flags for each level. A flag is any piece of information requested in the Scoreboard and is the only thing points will be awarded for. As you make your way through the event additional levels with more flags will open. Scoring is based on the capture of flags for each of the five (5) stages of a cyber attack: Reconnaissance, Incursion, Discovery, Capture and Exfiltration. There will be varying degrees of difficulty for sets of flags: easy (worth 300 points), moderate (worth 500 points), and hard (worth 1000 points). Hints will be available for some of the early levels. Up to three (3) hints may be taken to help with capturing a flag. Taking a hint will reduce the point value of a flag; taking all three hints will reduce it to zero (0) points. If you get stuck on a flag, don t get discouraged! The hints are there to help make this a fun learning experience. Don t be afraid to take them it s your opportunity to learn something new about security and the risks we face. Scoring a Flag Capture Description: A list of flags will be provided in the Scoreboard. Examples include: 1. Provide the clear text password of a fictional user. 2. Breach a system or application and retrieve a credit card number. 3. Find a specific file and provide the MD5 value Symantec

5 Scoring using the Scoreboard : 1. Successfully find the answer to a flag (question) requested on the Scoreboard. 2. If you are not already, log into the Scoreboard using your username (handle) and password. Note that this is only available while connected to the event; it is not an Internet site. 3. Enter the answer for the flag. You will receive immediate feedback if the answer is correct. You will not be penalized for incorrect answers. To View Your Score To view your score, the list of flags, or to submit captured flags, log on to the Scoreboard using your username and password while connected via VPN to the online event. 1.4 Obtaining Support Support during the competition will be available several ways: From Symantec employees staffing the event Through support options available in the Scoreboard once connected to the environment (documented in a later section) By to at any time, including if participants are having problems connecting to the environment to access support in the Scoreboard 1.5 Continuing Professional Education (CPE) Credit You will be eligible for continuing education credits, or CPEs, towards certification requirements from organizations such as (ISC) 2 and ISACA, and possibly from others as well. A Verification of Attendance form will be provided onsite or 2-4 weeks after completion of the event. Please refer to your accreditation guidelines for specific guidance including reporting requirements. Changes to the 2013 (ISC) 2 Continuing Professional Education (CPE) Policies & Guidelines allow for Group A credit for this type of activity under Performing unique projects and activities on-the-job Symantec

6 2 Cyber Readiness Challenge Event Preparation 2.1 Rules Please refer to the Contest Rules on the Cyber Readiness Challenge site at The objective of this test is to try to breach the environment without causing disruption or damage. As such testing that may disable services, alter or destroy files or content, interfere with other participants ability to play, or be a Denial of Service (DoS) may not be conducted unless otherwise directed during the event. Any individual found intentionally interfering with game play may be disqualified. 2.2 Resources Required Participants will need to have access to certain resources, such as an ethical hacking (or attack) environment, for game play. There are several options to meet these resources. Some participants may have existing resources at their disposal, including a preferred attack environment and tools for their use; you are encouraged to use what you are familiar with. 1. Participants will provide their own computer, such as a laptop, with the following minimum recommended requirements: 1 Ghz Intel x86 compatible processor (2 Ghz with virtualization extensions recommended) 2 GB of RAM 20 GB of free disk space Operating system including Windows 2000 or later, OS X or later, Linux /2.6.4 or later, and/or Kali Linux (BackTrack is no longer recommended as it has been replaced by Kali) Virtualization, if desired, including VMware Workstation or Player (for Windows or Linux), VMware Fusion (for Mac OS X), or VirtualBox (multiple OS') The latest version of Java on Mac OS X 2. Participants will provide their own ethical hacking toolkit, such as Backtrack or Kali 3. Internet access may be required for events, such as online Challenges; for onsite events, a wired and/or wireless network may be used Network requirements for all participants: Participants will be using a VPN from their system and will need to have access to the Internet to connect (e.g. home network, coffee shop or Internet café, permitted office or corporate network, etc.) Since an encrypted networking such as the Virtual Private Network (VPN) will be used to access the online competition network, Internet service providers will not see or be affected by any attack traffic used during play. Remember to connect to the VPN before starting any scans or event-related activity to prevent accidentally affecting others. For participants using their own computer: Participants are welcome to use their own computer, such as: Dual-booting to an installed or a live CD/DVD/USB image such as Kali Linux A virtual machine installed on their system (for example, using the free VMware Player or free VirtualBox with Kali) If you currently do not have an ethical hacking environment, or a toolset, we recommend trying Kali. It is free to download and use. Due to some reported issues with the latest 64-bit version we recommend the 32-bit for now Symantec

7 2.3 Using a Live CD or a Virtual Machine on Your System Many participants may want to use the Kali Linux to play the game. Kali is pre-configured with a variety of ethical hacking software and is a quick and easy way to get the tools necessary to participate. The latest version can always be found at We recommend using the 32-bit version. Unless you install Kali on your computer, which is an option, there are two main ways to run it: 1) Boot from a Kali Linux Live CD or Kali Linux Live USB Drive This is the best option if you are a beginner to the information security world. By booting from a live CD, you get to use a fully featured version of Kali Linux without actually installing it or modifying your hard drive in any way. If you re setting up for the event at the last minute, go with this option, as it will get you playing in the shortest amount of time. However, know that the performance will not be as good as using a virtual machine or installing to a hard drive, especially with a CD or a DVD. It will still be usable. Once you have downloaded the appropriate ISO file from the Kali Linux website burn it to a CD or a DVD with software such as ImgBurn. Alternatively, if you want to make a live USB drive, follow these instructions: Finally, restart your computer and interrupt your normal system startup. Then, select the CD/DVD/USB drive from the boot options menu. 2) Run Kali Linux in a Virtual Machine A virtual machine is a virtual computer that exists inside your physical computer. By using free software such as VMware Player or VirtualBox, you can run Kali Linux inside a virtual machine that will run inside the operating system that you already have on your computer. This option is useful if you want to have quick access to various Windows tools that don t exist on Kali. Additionally, with this method you can connect to the game network from inside the virtual machine, leaving the network of your main operating system still able to access the Internet in case you have to do any research. If you go with this option, make sure that you configure the machine s network adapter to use the bridged option, which gives Kali direct access to the network. Using this mode will ensure that you bypass several networking and hacking pitfalls. Once the virtual machine is created, you can either live boot from the downloaded ISO file (if you are short on time) or perform a normal Kali Linux install (if you want the best performance). More information on installing Kali Linux can be found here: Symantec

8 3 Connecting to the Event 3.1 Requirements Online events are accessed using a Virtual Private Network (VPN). The VPN software will be provided during the connection and setup process, if required. Step by step setup instructions follow for several different environments: Kali BackTrack Microsoft Windows Mac OS X Note that once you are inside the game using the VPN provided or by directly connecting in an in-person event you will not be able to access the Internet (for security purposes). However, feel free to disconnect and reconnect from the game to do research as many times as you like, or use another system for Googling. Once connected to the provided VPN address: The scoreboard address will be provided; you should log into the scoreboard as soon as you are connected The target address range will be provided; nothing outside this range should be attacked 3.2 Settings VPN Settings Field VPN Address Username Password Target Address Range (These are the attack targets in the online event) Nothing outside this range should be attacked! Scoreboard Do not attack or attempt to brute force the scoreboard! Setting Provided by or at the start of the event Selected by each participant when registering, or provided at the event Set by each participant when registering, or provided at the event Provided by or in the Scoreboard once the event starts Provided by or at the start of the event 3.3 Connecting When you connect to the online environment using the address (URL) provided and your web browser, you will be presented with a login screen. Use your username (handle) and password set or provided for the event. The following sections of this document will provide instructions for setting up the VPN software. Once connected to the online environment: You should log into the Scoreboard as soon as you are connected The target address range will be provided in the Scoreboard; nothing outside this range should be attacked Symantec

9 4 Using the Scoreboard and Team Chat 4.1 Preface This section documents some of the operation and features of the Scoreboard. The Scoreboard is used to obtain the flags, or questions you will answer to score points. It also has a team chat so that you can talk to and work with your team members, and support options to report problems and request support from the Cyber Readiness Challenge team. 4.2 Accessing the Scoreboard You can access the Scoreboard using a browser. Note that it is only available while connected to the event; it is not an Internet site. 4.3 The Scoreboard As you can see in this example the Scoreboard shows several types of information, such as which level you are on, the flags for the level, your score (points), the time remaining in the competition, hints available for each flag, etc. 4.4 Navigating Between Levels On the top-left-hand corner near LEVEL you will see the list of levels that you currently have access to. At the beginning, you will only have access to level 1, but as you progress through the game you will unlock more levels. Use the links in this section to navigate back and forth between different levels to review your progress or work on flags you may have skipped. 4.5 Viewing Your Progress You can view information about your progress using the Progress link in the top menu Symantec

10 4.6 Support There is a trouble ticket system built into the Scoreboard. If you have problems at any point during the game, click on the "Support" link on the top menu. From there, you can submit a trouble ticket that will be seen by the Cyber Readiness Challenge team. When your ticket has been replied to, Scoreboard will automatically notify you via the top menu, like this: If you are having a problem with an individual flag you can report it using the Report a Problem button found on each flag. This will open a ticket noting the flag you are having problems with. Additionally, administrators can also put out global tickets. If you have never submitted any tickets but you still see that you have a support notification, this is probably the reason. Global tickets are used to convey information quickly to all of the players at once. For example, a global ticket would be issued if a particular flag is malfunctioning. 4.7 Team Chat From the Team Chat link on the top menu you can access a separate web page that will allow you to chat with your team members. This provides a way for the team to exchange ideas and collaborate on flags Symantec

11 5 VPN Configuration for Kali Please note that these instructions should also apply to other versions of Linux. BackTrack is covered separately in this document. If you are using a virtual computer requested during registration you will NOT need to perform these steps. The VPN software is already installed for you. 5.1 Launch Kali Step 1 Start Kali, either native or a virtual machine (VM). If you are using a VM, bridged mode is recommended. a. Log in with your credentials (the default username is root, and password is the one that was set at the time of installation). b. Make sure you have a valid IP address and can access the Internet (see your network admin for help). 5.2 Client Install Step 3 Install AnyConnect Client. a. Kali s default Internet browser is called Iceweasel. Start Iceweasel by clicking on the following icon on the menu bar. b. Navigate to the VPN address URL that was given to you in . c. Log in with your user name and password. d. You will be prompted to install missing plugins since Java is not automatically configured for use within Iceweasel. Do NOT install the missing plugin. Wait until the Sun Java applet install times out and then click on the Linux i386 link to download the VPN software installer. e. Download the vpnsetup.sh file to the /root folder of the file system. f. Execute the ls command in a terminal window and you should see the vpnsetup.sh file Symantec

12 g. Change the permissions on the file by performing: chmod +x vpnsetup.sh h. Execute the ls command again to ensure that the file is now executable. If the file is green, then it can be executed. i. Execute the vpnsetup.sh script by typing:./vpnsetup.sh j. Start the VPN client GUI by clicking on the menu icon in the lower left corner, navigating Applications to Internet, and selecting the Cisco AnyConnect Secure Mobility Client Symantec

13 Note: if you are on a live (not installed) version of Kali the AnyConnect option will not automatically be added to the menu during installation. If this is the case you can start the client in a terminal window using the nohup /opt/cisco/anyconnect/bin/vnpui & command. k. Enter the VPN URL address used previously (provided to you in ). l. When prompted, enter your username and password from registration. m. The VPN should now start; to test, open Iceweasel and log into the scoreboard. You are now connected begin working through the flags in the scoreboard and attacking the permitted target address range once directed to do so once the event begins! Symantec

14 6 VPN Configuration for BackTrack 5R3 with Gnome Please note that these instructions should also apply to most versions of Linux. 6.1 Launch BackTrack Step 1 Start BackTrack, either native or a virtual machine (VM). If you are using a VM, bridged mode is recommended. a. Log in with your credentials (the default username is root and password is toor). b. Make sure you have a valid IP address and can access the Internet (see your network admin for help). c. Start the Gnome desktop by typing startx and press the Enter. 6.2 Client Installation a. Start Firefox by clicking on the top left hand corner. Select Internet -> Firefox Web Browser. b. Navigate to the VPN address URL that was given to you in . c. Click on the NoScript icon next to the location bar and Allow cyberreadinesschallenge.com Symantec

15 d. Log in with your user name and password. e. Wait until the Sun Java applet install times out and then click on the Linux i386 link. f. Transfer the vpnsetup.sh file to the /root folder of the Linux OS. g. Start the Terminal application and change directory to /root (cd /root) Symantec

16 h. Execute the ls command and you should see the vpnsetup.sh file. i. Change the permissions on the file by performing chmod +x vpnsetup.sh j. Execute the ls command again to ensure that the file is now executable. If the file is green, then it can be executed. k. Execute the vpnsetup.sh script by executing./vpnsetup.sh Symantec

17 l. If the script asks you to accept the terms in the license agreement, press Y and Enter. m. Start the VPN client GUI by clicking on the menu icon in the lower left corner, navigating to Internet, and selecting the Cisco VPN GUI. n. Enter the VPN URL address used previously (provided to you in ). o. When prompted, enter your username and password from registration. p. The VPN should now start; to test, open Firefox and log into the scoreboard. q. You are now connected begin working through the flags in the scoreboard and attacking the permitted target address range once the event begins! Symantec

18 7 VPN Configuration for Windows 7.1 Client Installation Step 1 Start Windows, either native or a virtual machine (VM); if you are using a VM, bridged mode is recommended. a. Log in with your credentials. b. Make sure you have a valid IP address and can access the Internet (see your network admin for help). Step 2 Open Internet Explorer a. Launch Internet Explorer. b. Click on Tools and then Internet Options. c. Click on the Security tab Symantec

19 d. Click on Trusted sites. Next click on Sites. e. In the Add this website to the zone field enter the VPN IP Address or domain that you were given during registration and click the Add button. f. Navigate Internet Explorer to the VPN URL Address that you were given during registration Symantec

20 g. Login to the Cisco SSL VPN Service Portal with your user name and password Symantec

21 h. Click on the yellow banner to allow the AnyConnect add-on to be installed. i. When the User Account Control pops up, click the Yes button. j. The web page might show an error that VPN connection establishment failed. However, if you click on the Cisco AnyConnect Icon in the notifications area you will see that in fact the VPN is connected Symantec

22 m. Open your browser and log into the scoreboard. You are now connected begin working through the flags in the scoreboard and attacking the permitted target address range once the event begins! Symantec

23 8 VPN Configuration for Mac OS X 8.1 Client Installation Step 1 The following instructions are for Mac OS X, tested on the Intel 64 bit platform. OS X within a virtual machine environment is not supported. Pre-requisite: Make sure the latest version of Java is installed. Use java.com to download and install if needed. a. Log in with your credentials. b. Make sure you have a valid IP address and can access the Internet (see your network admin for help). Step 2 a. Navigate Safari to the IP Address or host that you were given during registration. b. Login to the Cisco SSL VPN Service Portal with your user name and password Symantec

24 c. If the following screen appears, you may not have Java installed. Obtain Java from java.com, install it, and retry the previous step of logging into the SSL VPN Service Portal. d. Click on Yes if the following security warning screen pops up Symantec

25 e. Click on Run when the following screen pops up: f. At this point, the Client Downloader should appear: g. If prompted for system credentials, enter them and click OK: Symantec

26 h. If the installation was successful, the VPN connection should establish: i. Once connected, the following icon should appear as a Menu Bar Extra: j. The VPN should now start; to test, open Firefox and log into the scoreboard. k. You are now connected begin working through the flags in the scoreboard and attacking the permitted target address range! l. To quit or disconnect the VPN, click on the menu bar extra icon and select Disconnect or Quit Cisco AnyConnect. m. After installation, the VPN client can be accessed in the future by opening Cisco AnyConnect Secure Mobility Client from the Applications folder: You are now connected begin working through the flags in the scoreboard and attacking the permitted target address range once the event begins! Symantec

27 Appendices Appendix A: Resources Symantec

28 Appendix A: Resources The following resources may be useful: Kali Linux Metasploit Kali Linux is the next generation of BackTrack, is a penetration testing arsenal that aids security professionals in the ability to perform assessments in a purely native environment dedicated to hacking. Based on open-source tools it has been customized down to every package, kernel configuration, script and patch solely for the purpose of the penetration tester. The i386 version is currently recommended for VPN compatibility, and VMware and ISO images are available. Kali Linux: A collaboration of the open source community and Rapid7, Metasploit software helps security and IT professionals identify security issues, verify vulnerability mitigations, and manage expert-driven security assessments. Metasploit Community Edition simplifies network discovery and vulnerability verification for specific exploits and is available at: Rapid7 has some Metasploit tutorial videos that provide a quick introduction to network scanning and basic exploitation. They will help in getting started with Metasploit Community and in understanding basic methodology. https://community.rapid7.com/community/solutions/metasploit/blog/2011/12/21/metasploit-tutorial-an-introductionto-metasploit-community The Armitage graphical user interface (GUI) makes working with Metasploit easier, and is built into BackTrack. A good introduction and how-to is available at: Setting up a Penetration Testing Lab Rapid7 and Metasploit have a good how-to for setting up a penetration testing lab to learn or attempt exploits. It s available at: https://community.rapid7.com/docs/doc Symantec

Penetration Testing LAB Setup Guide

Penetration Testing LAB Setup Guide Penetration Testing LAB Setup Guide (Internal Attacker - Beginner version) By: magikh0e - magikh0e@ihtb.org Last Edit: July 07 2012 This guide assumes a few things... 1. You have installed Backtrack before

More information

Windows and MAC User Handbook Remote and Secure Connection Version 1.01 09/19/2013. User Handbook

Windows and MAC User Handbook Remote and Secure Connection Version 1.01 09/19/2013. User Handbook Windows and MAC User Handbook How to Connect Your PC or MAC Remotely and Securely to Your U.S. Department of Commerce Account Developed for You by the Office of IT Services (OITS)/IT Service Desk *** For

More information

Vulnerability analysis

Vulnerability analysis Vulnerability analysis License This work by Z. Cliffe Schreuders at Leeds Metropolitan University is licensed under a Creative Commons Attribution-ShareAlike 3.0 Unported License. Contents License Contents

More information

VMware Horizon FLEX User Guide

VMware Horizon FLEX User Guide Horizon FLEX 1.1 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of this

More information

IS L06 Protect Servers and Defend Against APTs with Symantec Critical System Protection

IS L06 Protect Servers and Defend Against APTs with Symantec Critical System Protection IS L06 Protect Servers and Defend Against APTs with Symantec Critical System Protection Description Lab flow At the end of this lab, you should be able to Discover how to harness the power and capabilities

More information

IDS and Penetration Testing Lab ISA656 (Attacker)

IDS and Penetration Testing Lab ISA656 (Attacker) IDS and Penetration Testing Lab ISA656 (Attacker) Ethics Statement Network Security Student Certification and Agreement I,, hereby certify that I read the following: University Policy Number 1301: Responsible

More information

VMware Horizon FLEX User Guide

VMware Horizon FLEX User Guide Horizon FLEX 1.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of this

More information

VPN AND CITRIX INSTALLATION GUIDE

VPN AND CITRIX INSTALLATION GUIDE Information Technology VPN AND CITRIX INSTALLATION GUIDE Overview of the CISCO SSL VPN Portal TMCC's Cisco SSL Virtual Private Network (VPN) portal was designed to give TMCC employees secure access to

More information

Virtual Server Installation Manual April 8, 2014 Version 1.8

Virtual Server Installation Manual April 8, 2014 Version 1.8 Virtual Server Installation Manual April 8, 2014 Version 1.8 Department of Health and Human Services Administration for Children and Families Office of Child Support Enforcement REVISION HISTORY Version

More information

Clientless SSL VPN Users

Clientless SSL VPN Users Manage Passwords, page 1 Username and Password Requirements, page 3 Communicate Security Tips, page 3 Configure Remote Systems to Use Clientless SSL VPN Features, page 3 Manage Passwords Optionally, you

More information

VMware Horizon FLEX User Guide

VMware Horizon FLEX User Guide Horizon FLEX 1.5 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of this

More information

Instruction Guide Mentor/Coach Free Play Practice Event November 2015

Instruction Guide Mentor/Coach Free Play Practice Event November 2015 Instruction Guide Mentor/Coach Free Play Practice Event November 2015 1 San Diego Mayor s Cup Mentor/Coach Practice Round Guide Table of Contents Introduction 3 Tips for Success 3 Round Times 3 Linux Virtual

More information

Instructions for Department of Public Health (DPH) WebConnect (Mac)

Instructions for Department of Public Health (DPH) WebConnect (Mac) Instructions for Department of Public Health (DPH) WebConnect (Mac) UCSF at SFGH Computing and Network Services Hours of Operation: Monday Friday 8 AM to 5PM Pacific Time Website: http://tiny.ucsf.edu/sfghcns

More information

SSL VPN Service. Once you have installed the AnyConnect Secure Mobility Client, this document is available by clicking on the Help icon on the client.

SSL VPN Service. Once you have installed the AnyConnect Secure Mobility Client, this document is available by clicking on the Help icon on the client. Contents Introduction... 2 Prepare Work PC for Remote Desktop... 4 Add VPN url as a Trusted Site in Internet Explorer... 5 VPN Client Installation... 5 Starting the VPN Application... 6 Connect to Work

More information

Verax Service Desk Installation Guide for UNIX and Windows

Verax Service Desk Installation Guide for UNIX and Windows Verax Service Desk Installation Guide for UNIX and Windows March 2015 Version 1.8.7 and higher Verax Service Desk Installation Guide 2 Contact Information: E-mail: sales@veraxsystems.com Internet: http://www.veraxsystems.com/

More information

Net 2. NetApp Electronic Library. User Guide for Net 2 Client Version 6.0a

Net 2. NetApp Electronic Library. User Guide for Net 2 Client Version 6.0a Net 2 NetApp Electronic Library User Guide for Net 2 Client Version 6.0a Table of Contents 1 INTRODUCTION AND KEY FEATURES... 3 SOME OF THE KEY FEATURES INCLUDE:... 3 INSTALLATION PREREQUISITES:... 3 2

More information

NSi Mobile Installation Guide. Version 6.2

NSi Mobile Installation Guide. Version 6.2 NSi Mobile Installation Guide Version 6.2 Revision History Version Date 1.0 October 2, 2012 2.0 September 18, 2013 2 CONTENTS TABLE OF CONTENTS PREFACE... 5 Purpose of this Document... 5 Version Compatibility...

More information

The BackTrack Successor

The BackTrack Successor SCENARIOS Kali Linux The BackTrack Successor On March 13, Kali, a complete rebuild of BackTrack Linux, has been released. It has been constructed on Debian and is FHS (Filesystem Hierarchy Standard) complaint.

More information

Remote Access Services Apple Macintosh - Installation Guide

Remote Access Services Apple Macintosh - Installation Guide Remote Access Services Apple Macintosh - Installation Guide Version. February, 05 P age Contents GETTING STARTED... JAVA VERIFICATION, INSTALLATION, AND CONFIGURATION... Checking Mac OS version... Java

More information

Accessing vlabs using the VMware Horizon View Client for OSX

Accessing vlabs using the VMware Horizon View Client for OSX Accessing vlabs using the VMware Horizon View Client for OSX This document will demonstrate how to download, install, and connect to a virtual lab desktop from a personal Mac OSX computer using the VMware

More information

Scholastic Reading Inventory Installation Guide

Scholastic Reading Inventory Installation Guide Scholastic Reading Inventory Installation Guide For use with Scholastic Reading Inventory version 2.0.1 or later and SAM version 2.0.2 or later Copyright 2011 by Scholastic Inc. All rights reserved. Published

More information

Virtual Learning Environment. Internet Explorer Browser Connectivity Troubleshooting

Virtual Learning Environment. Internet Explorer Browser Connectivity Troubleshooting Virtual Learning Environment Internet Explorer Browser Connectivity Troubleshooting This document is for Ultimate Software use only. No part of this document may be reproduced in any form or by any means,

More information

Remote Access Services Microsoft Windows - Installation Guide

Remote Access Services Microsoft Windows - Installation Guide Remote Access Services Microsoft Windows - Installation Guide Version 3.1 February 23, 2015 1 P age Contents GETTING STARTED... 3 JAVA VERIFICATION, INSTALLATION, AND CONFIGURATION... 3 Windows XP... 3

More information

Use of the SSL VPN requires a Mac with a broadband Internet connection and the following minimum requirements:

Use of the SSL VPN requires a Mac with a broadband Internet connection and the following minimum requirements: We highly recommend that you use a Windows computer to connect to the DPH WebConnect website. Macintosh computers are not recommended and not supported by DPH IT. Although we have been able to successfully

More information

Charter Business Desktop Security Administrator's Guide

Charter Business Desktop Security Administrator's Guide Charter Business Desktop Security Administrator's Guide Table of Contents Chapter 1: Introduction... 4 Chapter 2: Getting Started... 5 Creating a new user... 6 Recovering and changing your password...

More information

Microsoft Windows Installation and Troubleshooting Guide

Microsoft Windows Installation and Troubleshooting Guide Remote Access Services Microsoft Windows - Installation and Troubleshooting Guide Version 2.1 February 19, 2013 1 P age TABLE OF CONTENTS 1 MICROSOFT WINDOWS XP INSTALLATION PROCEDURES... 3 2 MICROSOFT

More information

DSI File Server Client Documentation

DSI File Server Client Documentation Updated 11/23/2009 Page 1 of 10 Table Of Contents 1.0 OVERVIEW... 3 1.0.1 CONNECTING USING AN FTP CLIENT... 3 1.0.2 CONNECTING USING THE WEB INTERFACE... 3 1.0.3 GETTING AN ACCOUNT... 3 2.0 TRANSFERRING

More information

VPN Web Portal Usage Guide

VPN Web Portal Usage Guide VPN Web Portal Usage Guide Table of Contents WHAT IS VPN WEB CLIENT 4 SUPPORTED WEB BROWSERS 4 LOGGING INTO VPN WEB CLIENT 5 ESTABLISHING A VPN CONNECTION 6 KNOWN ISSUES WITH MAC COMPUTERS 6 ACCESS INTRANET

More information

VPN: Virtual Private Network Setup Instructions

VPN: Virtual Private Network Setup Instructions VPN: Virtual Private Network Setup Instructions Virtual Private Network (VPN): For e-journals and web-based databases, plus applications like EndNote's Online Search (formerly "Connect") and business systems.

More information

Why do I need a pen test lab? Requirements. Virtual Machine Downloads

Why do I need a pen test lab? Requirements. Virtual Machine Downloads Why do I need a pen test lab? Hacking and or scanning machines without consent is against the law in most countries To become an effective penetration tester or ethical hacker you need to practice to enhance

More information

SSL VPN Support Guide

SSL VPN Support Guide Page 1 SSL VPN Support Guide Revision date: 4/16/14 Page 2 Table of Contents Before calling the Service Desk..pg 3 What the Service Desk can assist users with. pg 4 Instructions for PC users (Internet

More information

Senior Systems Cloud Services

Senior Systems Cloud Services Senior Systems Cloud Services In this guide... Senior Systems Cloud Services 1 Cloud Services User Guide 2 Working In Your Cloud Environment 3 Cloud Profile Management Tool 6 How To Save Files 8 How To

More information

IBM Remote Lab Platform Citrix Setup Guide

IBM Remote Lab Platform Citrix Setup Guide Citrix Setup Guide Version 1.8.2 Trademarks IBM is a registered trademark of International Business Machines Corporation. The following are trademarks of International Business Machines Corporation in

More information

MiraCosta College now offers two ways to access your student virtual desktop.

MiraCosta College now offers two ways to access your student virtual desktop. MiraCosta College now offers two ways to access your student virtual desktop. We now feature the new VMware Horizon View HTML access option available from https://view.miracosta.edu. MiraCosta recommends

More information

AT-UWC Wireless LAN Controller. Installation Guide. Software Version

AT-UWC Wireless LAN Controller. Installation Guide. Software Version Software Version Installation Guide This Installation Guide is an introductory guide to help you start the software-based AT-UWC Wireless LAN Controller. It describes how to run the AT-UWC-Install program

More information

DOE VPN Client Installation and Setup Guide March 2011

DOE VPN Client Installation and Setup Guide March 2011 DOE VPN Client Installation and Setup Guide March 2011 Table of Contents Introduction... 3 System Requirements... 3 Microsoft Windows... 3 Mac OS X... 4 Windows... 4 Installation for the Cisco AnyConnect

More information

SSL VPN Support Guide

SSL VPN Support Guide P a g e 1 SSL VPN Support Guide Revision date: 5/4/10 P a g e 2 Table of Contents Before calling the Support Desk..pg 3 What the Support Desk can assist users with. pg 4 Instructions for PC users (Internet

More information

Installing Oracle 12c Enterprise on Windows 7 64-Bit

Installing Oracle 12c Enterprise on Windows 7 64-Bit JTHOMAS ENTERPRISES LLC Installing Oracle 12c Enterprise on Windows 7 64-Bit DOLOR SET AMET Overview This guide will step you through the process on installing a desktop-class Oracle Database Enterprises

More information

Junos Pulse VPN Client Installation

Junos Pulse VPN Client Installation Junos Pulse VPN Client Installation Windows 7 Installation p 2-6 Windows 8.1 Installation p 7-11 Macintosh version 10.6 and greater p 12-17 *This vpn appliance is to replace the Legacy SP vpn client Cisco

More information

Server Configuration and Deployment (part 1) Lotus Foundations Essentials

Server Configuration and Deployment (part 1) Lotus Foundations Essentials Server Configuration and Deployment (part 1) Lab Manual Lotus Foundations Essentials Introduction: In this lab, students will configure an IBM Lotus Foundations server using a virtual image to perform

More information

Enterprise Site Manager (ESM) & Administrator Console Installation / Uninstall

Enterprise Site Manager (ESM) & Administrator Console Installation / Uninstall Enterprise Site Manager (ESM) & Administrator Console Installation / Uninstall July 2013 For further information visit our support page: www.pearsonwbl.edexcel.com/our-support 1 Contents Please note clicking

More information

WA1826 Designing Cloud Computing Solutions. Classroom Setup Guide. Web Age Solutions Inc. Copyright Web Age Solutions Inc. 1

WA1826 Designing Cloud Computing Solutions. Classroom Setup Guide. Web Age Solutions Inc. Copyright Web Age Solutions Inc. 1 WA1826 Designing Cloud Computing Solutions Classroom Setup Guide Web Age Solutions Inc. Copyright Web Age Solutions Inc. 1 Table of Contents Part 1 - Minimum Hardware Requirements...3 Part 2 - Minimum

More information

Non-Employee VPN Quick Start Guide

Non-Employee VPN Quick Start Guide 1. Computer Requirements Pentium-based personal computer Windows XP SP3: 128 MB RAM Windows Vista Windows 7 Home/Pro 10 MB hard disk space Microsoft Internet Explorer 6.0 or later or Mozilla Firefox 1.0

More information

Clientless SSL VPN End User Set-up

Clientless SSL VPN End User Set-up 37 CHAPTER This ections is for the system administrator who sets up Clientless (browser-based) SSL VPN for end users. It summarizes configuration requirements and tasks for the user remote system. It also

More information

Installation Guide for Pulse on Windows Server 2008R2

Installation Guide for Pulse on Windows Server 2008R2 MadCap Software Installation Guide for Pulse on Windows Server 2008R2 Pulse Copyright 2014 MadCap Software. All rights reserved. Information in this document is subject to change without notice. The software

More information

Team Foundation Server 2012 Installation Guide

Team Foundation Server 2012 Installation Guide Team Foundation Server 2012 Installation Guide Page 1 of 143 Team Foundation Server 2012 Installation Guide Benjamin Day benday@benday.com v1.0.0 November 15, 2012 Team Foundation Server 2012 Installation

More information

Guide for Setting Up Your Multi-Factor Authentication Account and Using Multi-Factor Authentication

Guide for Setting Up Your Multi-Factor Authentication Account and Using Multi-Factor Authentication Guide for Setting Up Your Multi-Factor Authentication Account and Using Multi-Factor Authentication This document serves as a How To reference guide for employees to execute the following MFA tasks: 1.

More information

RLP Citrix Setup Guide

RLP Citrix Setup Guide RLP Citrix Setup Guide M Version 2.1 Trademarks IBM is a registered trademark of International Business Machines Corporation. The following are trademarks of International Business Machines Corporation

More information

Backup & Disaster Recovery Appliance User Guide

Backup & Disaster Recovery Appliance User Guide Built on the Intel Hybrid Cloud Platform Backup & Disaster Recovery Appliance User Guide Order Number: G68664-001 Rev 1.0 June 22, 2012 Contents Registering the BDR Appliance... 4 Step 1: Register the

More information

Instruction Guide Practice Round 2 High School August 2015

Instruction Guide Practice Round 2 High School August 2015 Instruction Guide Practice Round 2 High School August 2015 1 Maryland Cyber Challenge Practice Round Instruction Guide Table of Contents Introduction 3 Tips for Success 3 Round Times 3 Linux Virtual Machine

More information

Appendix B Lab Setup Guide

Appendix B Lab Setup Guide JWCL031_appB_467-475.indd Page 467 5/12/08 11:02:46 PM user-s158 Appendix B Lab Setup Guide The Windows Server 2008 Applications Infrastructure Configuration title of the Microsoft Official Academic Course

More information

Verizon Internet Security Suite Powered by McAfee. Installation Guide for Business Users (Mac)

Verizon Internet Security Suite Powered by McAfee. Installation Guide for Business Users (Mac) Verizon Internet Security Suite Powered by McAfee Installation Guide for Business Users (Mac) ii Contents Introduction 3 System requirements 5 Installing Verizon Internet Security Suite 7 Signing in to

More information

Basic Citrix Manual. Apple Computers and Laptops. Version 1.3. Created by Joshua Lindemann

Basic Citrix Manual. Apple Computers and Laptops. Version 1.3. Created by Joshua Lindemann Basic Citrix Manual Version 1.3 Created by Joshua Lindemann Table of Contents Technology Services Help Desk... 3 Background... 4 Citrix Virtual Environment... 4 Wireless Access... 4 Security... 4 Configuring

More information

Installation Guide for Pulse on Windows Server 2012

Installation Guide for Pulse on Windows Server 2012 MadCap Software Installation Guide for Pulse on Windows Server 2012 Pulse Copyright 2014 MadCap Software. All rights reserved. Information in this document is subject to change without notice. The software

More information

VMware vcenter Log Insight Getting Started Guide

VMware vcenter Log Insight Getting Started Guide VMware vcenter Log Insight Getting Started Guide vcenter Log Insight 1.5 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by

More information

Installing Management Applications on VNX for File

Installing Management Applications on VNX for File EMC VNX Series Release 8.1 Installing Management Applications on VNX for File P/N 300-015-111 Rev 01 EMC Corporation Corporate Headquarters: Hopkinton, MA 01748-9103 1-508-435-1000 www.emc.com Copyright

More information

TSM for Windows Installation Instructions: Download the latest TSM Client Using the following link:

TSM for Windows Installation Instructions: Download the latest TSM Client Using the following link: TSM for Windows Installation Instructions: Download the latest TSM Client Using the following link: ftp://ftp.software.ibm.com/storage/tivoli-storagemanagement/maintenance/client/v6r2/windows/x32/v623/

More information

Penetration Testing LAB Setup Guide

Penetration Testing LAB Setup Guide Penetration Testing LAB Setup Guide (External Attacker - Intermediate) By: magikh0e - magikh0e@ihtb.org Last Edit: July 06 2012 This guide assumes a few things... 1. You have read the basic guide of this

More information

Manual for configuring NIC VPN in Windows OS

Manual for configuring NIC VPN in Windows OS Manual for configuring NIC VPN in Windows OS NIC is introducing a new web based VPN interface to allow s to connect to NICNET through VPN. Apart from existing Client based VPN service, this new interface

More information

ThinPoint Quick Start Guide

ThinPoint Quick Start Guide ThinPoint Quick Start Guide 2 ThinPoint Quick Start Guide Table of Contents Part 1 Introduction 3 Part 2 ThinPoint Windows Host Installation 3 1 Compatibility... list 3 2 Pre-requisites... 3 3 Installation...

More information

Online Backup Client User Manual

Online Backup Client User Manual For Mac OS X Software version 4.1.7 Version 2.2 Disclaimer This document is compiled with the greatest possible care. However, errors might have been introduced caused by human mistakes or by other means.

More information

Avaya IP Office 9.1. Set Up Guide for The IP Office Anywhere Demo Platform

Avaya IP Office 9.1. Set Up Guide for The IP Office Anywhere Demo Platform Avaya IP Office 9.1 Set Up Guide for The IP Office Anywhere Demo Platform Date: February 2015 Version: 2.0 Subject: Avaya IP Office 9.1 Anywhere Demonstration Set Up Guide Regional Availability: Global

More information

Quick Start Guide for VMware and Windows 7

Quick Start Guide for VMware and Windows 7 PROPALMS VDI Version 2.1 Quick Start Guide for VMware and Windows 7 Rev. 1.1 Published: JULY-2011 1999-2011 Propalms Ltd. All rights reserved. The information contained in this document represents the

More information

Accessing Restricted University Online Resources Using Network Connect. on the Secure Remote Access Service

Accessing Restricted University Online Resources Using Network Connect. on the Secure Remote Access Service Technology Help Desk 412 624-HELP [4357] http://technology.pitt.edu Accessing Restricted University Online Resources Using Network Connect Table of Contents Overview... 1 Connecting to the Secure Remote

More information

PEARSON Parent/Teacher Guide to Online Electronic Practice Assessment Tests (epats) FAQs, Instructions, and Hardware & Software Requirements

PEARSON Parent/Teacher Guide to Online Electronic Practice Assessment Tests (epats) FAQs, Instructions, and Hardware & Software Requirements PEARSON Parent/Teacher Guide to Online Electronic Practice Assessment Tests (epats) FAQs, Instructions, and Hardware & Software Requirements Copyright 2014 4/11/2014 Table of Contents Introduction... 1

More information

Virtual Appliance for VMware Server. Getting Started Guide. Revision 2.0.2. Warning and Disclaimer

Virtual Appliance for VMware Server. Getting Started Guide. Revision 2.0.2. Warning and Disclaimer Virtual Appliance for VMware Server Getting Started Guide Revision 2.0.2 Warning and Disclaimer This document is designed to provide information about the configuration and installation of the CensorNet

More information

1-bay NAS User Guide

1-bay NAS User Guide 1-bay NAS User Guide INDEX Index... 1 Log in... 2 Basic - Quick Setup... 3 Wizard... 3 Add User... 6 Add Group... 7 Add Share... 9 Control Panel... 11 Control Panel - User and groups... 12 Group Management...

More information

ReadyNAS Setup Manual

ReadyNAS Setup Manual ReadyNAS Setup Manual NETGEAR, Inc. 4500 Great America Parkway Santa Clara, CA 95054 USA October 2007 208-10163-01 v1.0 2007 by NETGEAR, Inc. All rights reserved. Trademarks NETGEAR, the NETGEAR logo,

More information

VPN - AnyConnect on Windows

VPN - AnyConnect on Windows VPN - AnyConnect on Windows Tufts Technology Services Training and Documentation VPN - AnyConnect on Windows 1 Table of Contents AnyConnect on a Windows PC... 3 How Do I Install AnyConnect on a Windows

More information

Table of Contents. CHAPTER 1 About This Guide... 9. CHAPTER 2 Introduction... 11. CHAPTER 3 Database Backup and Restoration... 15

Table of Contents. CHAPTER 1 About This Guide... 9. CHAPTER 2 Introduction... 11. CHAPTER 3 Database Backup and Restoration... 15 Table of Contents CHAPTER 1 About This Guide......................... 9 The Installation Guides....................................... 10 CHAPTER 2 Introduction............................ 11 Required

More information

Network Connect Installation and Usage Guide

Network Connect Installation and Usage Guide Network Connect Installation and Usage Guide I. Installing the Network Connect Client..2 II. Launching Network Connect from the Desktop.. 9 III. Launching Network Connect Pre-Windows Login 11 IV. Installing

More information

How to install and use the File Sharing Outlook Plugin

How to install and use the File Sharing Outlook Plugin How to install and use the File Sharing Outlook Plugin Thank you for purchasing Green House Data File Sharing. This guide will show you how to install and configure the Outlook Plugin on your desktop.

More information

FortiClient SSL VPN Client User s Guide

FortiClient SSL VPN Client User s Guide FortiClient SSL VPN Client User s Guide To connect to Model Driven Solutions via a SSL VPN Client session you first need a VPN login account that has been granted the proper SSL VPN group permissions and

More information

VPN: Using WebVPN SSL Client This document outlines the process for using the WebVPN SSL with Internet Explorer and Firefox

VPN: Using WebVPN SSL Client This document outlines the process for using the WebVPN SSL with Internet Explorer and Firefox VPN: Using WebVPN SSL Client This document outlines the process for using the WebVPN SSL with Internet Explorer and Firefox 1. Introduction The WebVPN SSL Client does not require the manual installation

More information

Addonics T E C H N O L O G I E S. NAS Adapter. Model: NASU2. 1.0 Key Features

Addonics T E C H N O L O G I E S. NAS Adapter. Model: NASU2. 1.0 Key Features 1.0 Key Features Addonics T E C H N O L O G I E S NAS Adapter Model: NASU2 User Manual Convert any USB 2.0 / 1.1 mass storage device into a Network Attached Storage device Great for adding Addonics Storage

More information

Bloomfield Hills Schools VPN and Viewconnect Instructions

Bloomfield Hills Schools VPN and Viewconnect Instructions Connect to Bloomfield Hills Schools VPN - Open Internet Explorer. - Type https://vpn.bloomfield.org into the address bar. - Click Continue to this website (not recommended). if prompted. - If this is your

More information

Online Test Administrator Quick Reference Guide Updated 08/02/2012 v.2.0

Online Test Administrator Quick Reference Guide Updated 08/02/2012 v.2.0 Online Test Administrator Quick Reference Guide Updated 08/02/2012 v.2.0 M e s s a g e T e s t N a v ( W h a t D o e s T h i s M e a n? ) Login Screen The student will type in the Login ID and Test Code

More information

www.novell.com/documentation SSL VPN User Guide Access Manager 3.1 SP5 January 2013

www.novell.com/documentation SSL VPN User Guide Access Manager 3.1 SP5 January 2013 www.novell.com/documentation SSL VPN User Guide Access Manager 3.1 SP5 January 2013 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of this documentation,

More information

Install and End User Reference Guide for Direct Access to Citrix Applications

Install and End User Reference Guide for Direct Access to Citrix Applications Install and End User Reference Guide for Direct Access to Citrix Applications Version 1.0 7/26/2013 This remote access end user reference guide provides an overview of how to install Citrix receiver (a

More information

Table of Contents. Troubleshooting Guide for Home Users

Table of Contents. Troubleshooting Guide for Home Users Table of Contents Introduction... 1 Chapter 1: System Requirements... 2 Recommended and Minimum Supported Requirements*... 2 Additional Information... 3 Internet Connectivity... 3 Tablet Compatibility...

More information

How to Test Out Backup & Replication 6.5 for Hyper-V

How to Test Out Backup & Replication 6.5 for Hyper-V How to Test Out Backup & Replication 6.5 for Hyper-V Mike Resseler May, 2013 2013 Veeam Software. All rights reserved. All trademarks are the property of their respective owners. No part of this publication

More information

Guide to Installing BBL Crystal MIND on Windows 7

Guide to Installing BBL Crystal MIND on Windows 7 Guide to Installing BBL Crystal MIND on Windows 7 Introduction The BBL Crystal MIND software can not be directly installed on the Microsoft Windows 7 platform, however it can be installed and run via XP

More information

Using iscsi with BackupAssist. User Guide

Using iscsi with BackupAssist. User Guide User Guide Contents 1. Introduction... 2 Documentation... 2 Terminology... 2 Advantages of iscsi... 2 Supported environments... 2 2. Overview... 3 About iscsi... 3 iscsi best practices with BackupAssist...

More information

TANDBERG MANAGEMENT SUITE 10.0

TANDBERG MANAGEMENT SUITE 10.0 TANDBERG MANAGEMENT SUITE 10.0 Installation Manual Getting Started D12786 Rev.16 This document is not to be reproduced in whole or in part without permission in writing from: Contents INTRODUCTION 3 REQUIREMENTS

More information

Macintosh Installation and Troubleshooting Guide

Macintosh Installation and Troubleshooting Guide Remote Access Services Apple Macintosh Clients - Installation and Troubleshooting Guide Version 2.1 February 19, 2013 1 P age TABLE OF CONTENTS 1 MACINTOSH MINIMUM REQUIREMENTS... 3 2 REMOTE ACCESS INSTALLATION

More information

A New Era. A New Edge. Phishing within your company

A New Era. A New Edge. Phishing within your company Phishing within your company Learning Objectives What is phishing and how to minimize its impact Obtain a basic understanding of how to use virtual machines Use BackTrack, a tool used by many security

More information

MySabre with Sabre VPN

MySabre with Sabre VPN MySabre with Sabre VPN MIGRATION / INSTALLATION GUIDE T a b l e o f C o n t e n t s Table of Contents... ii Introduction... 3 Before Installing... 3 New MySabre User Installation... 4 Appendix A ActiveX

More information

Magaya Software Installation Guide

Magaya Software Installation Guide Magaya Software Installation Guide MAGAYA SOFTWARE INSTALLATION GUIDE INTRODUCTION Introduction This installation guide explains the system requirements for installing any Magaya software, the steps to

More information

SHC Client Remote Access User Guide for Citrix & F5 VPN Edge Client

SHC Client Remote Access User Guide for Citrix & F5 VPN Edge Client SHC Client Remote Access User Guide for Citrix & F5 VPN Edge Client Version 1.1 1/15/2013 This remote access end user reference guide provides an overview of how to install Citrix receiver (a required

More information

Getting Started with PRTG Network Monitor 2012 Paessler AG

Getting Started with PRTG Network Monitor 2012 Paessler AG Getting Started with PRTG Network Monitor 2012 Paessler AG All rights reserved. No parts of this work may be reproduced in any form or by any means graphic, electronic, or mechanical, including photocopying,

More information

READYNAS INSTANT STORAGE. Quick Installation Guide

READYNAS INSTANT STORAGE. Quick Installation Guide READYNAS INSTANT STORAGE Quick Installation Guide Table of Contents Step 1 Connect to FrontView Setup Wizard 3 Installing RAIDar on Windows 3 Installing RAIDar on Mac OS X 3 Installing RAIDar on Linux

More information

WHITE PAPER SETTING UP AND USING ESTATE MASTER ON THE CLOUD INTRODUCTION

WHITE PAPER SETTING UP AND USING ESTATE MASTER ON THE CLOUD INTRODUCTION WHITE PAPER SETTING UP AND USING ESTATE MASTER ON THE CLOUD INTRODUCTION Cloud Computing can provide great flexibility for the Estate Master user. You can access your feasibilities, manage you projects

More information

Quick Start Guide for Parallels Virtuozzo

Quick Start Guide for Parallels Virtuozzo PROPALMS VDI Version 2.1 Quick Start Guide for Parallels Virtuozzo Rev. 1.1 Published: JULY-2011 1999-2011 Propalms Ltd. All rights reserved. The information contained in this document represents the current

More information

Defender 5.7 - Token Deployment System Quick Start Guide

Defender 5.7 - Token Deployment System Quick Start Guide Defender 5.7 - Token Deployment System Quick Start Guide This guide describes how to install, configure and use the Defender Token Deployment System, based on default settings and how to self register

More information

ISERink Installation Guide

ISERink Installation Guide ISERink Installation Guide Version 1.1 January 27, 2015 First developed to support cyber defense competitions (CDCs), ISERink is a virtual laboratory environment that allows students an opportunity to

More information

Remote Access. Remote Access Start-up Guide. Non Cheshire East Council PC s/laptops. Page 0

Remote Access. Remote Access Start-up Guide. Non Cheshire East Council PC s/laptops. Page 0 Remote Access Remote Access Start-up Guide Non Cheshire East Council PC s/laptops Page 0 Page 1 1. Getting Started NGD provides easy access to all your Cheshire East documents and applications whilst not

More information

VPN: Using the WebVPN SSL Client

VPN: Using the WebVPN SSL Client IS1504 VPN: Using the WebVPN SSL Client Page 1 of 10 VPN: Using the WebVPN SSL Client This document outlines the process for using the WebVPN SSL client with Internet Explorer and Firefox User Guide IS1504

More information

BaseManager & BACnet Manager VM Server Configuration Guide

BaseManager & BACnet Manager VM Server Configuration Guide BaseManager & BACnet Manager VM Server Configuration Guide For Self-Hosted BaseManager & BACnet Manager Servers Deployed as Virtual Machines August 27, 2015 Customer Service 1-866-294-5847 i Baseline Inc.

More information

GO!Enterprise MDM Device Application User Guide Installation and Configuration for BlackBerry

GO!Enterprise MDM Device Application User Guide Installation and Configuration for BlackBerry GO!Enterprise MDM Device Application User Guide Installation and Configuration for BlackBerry GO!Enterprise MDM Version 4.11.x GO!Enterprise MDM for BlackBerry 1 Table of Contents GO!Enterprise MDM for

More information

This manual provides information and instructions for Mac SharePoint Users at Fermilab. Using Sharepoint from a Mac: Terminal Server Instructions

This manual provides information and instructions for Mac SharePoint Users at Fermilab. Using Sharepoint from a Mac: Terminal Server Instructions Using SharePoint from a Mac: Terminal Server Instructions This manual provides information and instructions for Mac SharePoint Users at Fermilab. Page 0 Contents Fermilab Terminal Server Introduction...2

More information