Tivoli SecureWay Security Manager Supplement for Microsoft Windows 2000 Version 3.7

Size: px
Start display at page:

Download "Tivoli SecureWay Security Manager Supplement for Microsoft Windows 2000 Version 3.7"

Transcription

1 Tivoli SecureWay Security Manager Supplement for Microsoft Windows 2000 Version 3.7

2 Tivoli SecureWay Security Manager Supplement for Windows 2000 (October, 2000) Copyright Notice Copyright IBM Corporation 2000 All rights reserved. May only be used pursuant to a Tivoli Systems Software License Agreement, an IBM Software License Agreement, or Addendum for Tivoli Products to IBM Customer or License Agreement. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system, or translated into any computer language, in any form or by any means, electronic, mechanical, magnetic, optical, chemical, manual, or otherwise, without prior written permission of IBM Corporation. IBM Corporation grants you limited permission to make hardcopy or other reproductions of any machine-readable documentation for your own use, provided that each such reproduction shall carry the IBM Corporation copyright notice. No other rights under copyright are granted without prior written permission of IBM Corporation. The document is not intended for production and is furnished as is without warranty of any kind. All warranties on this document are hereby disclaimed, including the warranties of merchantability and fitness for a particular purpose. U.S. Government Users Restricted Rights-Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corporation. Trademarks IBM, the IBM logo, Tivoli, the Tivoli logo, AIX, AS/400, Cross-Site, NetView, OS/2, OS/390, OS/400, Policy Director, RACF, RS/6000, SecureWay, S/390, Tivoli Certified, Tivoli Enterprise, Tivoli Ready, and TME are trademarks or registered trademarks of International Business Machines Corporation or Tivoli Systems Inc. in the United States, other countries, or both. Lotus is a registered trademark of Lotus Development Corporation. Microsoft, Windows, Windows NT, Windows 2000, and the Windows logo are trademarks of Microsoft Corporation in the United States, other countries, or both. UNIX is a registered trademark of The Open Group in the United States and other countries. Java and all Java-based trademarks are trademarks of Sun Microsystems, Inc. in the United States, other countries, or both. Novell, NetWare, NetWare Directory Services, and NDS are trademarks of Novell, Inc. Other company, product, and service names may be trademarks or service marks of others. Notices References in this publication to Tivoli Systems or IBM products, programs, or services do not imply that they will be available in all countries in which Tivoli Systems or IBM operates. Any reference to these products, programs, or services is not intended to imply that only Tivoli Systems or IBM products, programs, or services can be used. Subject to valid intellectual property or other legally protectable right of Tivoli Systems or IBM, any functionally equivalent product, program, or service can be used instead of the referenced product, program, or service. The evaluation and verification of operation in conjunction with other products, except those expressly designated by Tivoli Systems or IBM, are the responsibility of the user. Tivoli Systems or IBM may have patents or pending patent applications covering subject matter in this document. The furnishing of this document does not give you any license to these patents. You can send license inquiries, in writing, to the IBM Director of Licensing, IBM Corporation, North Castle Drive, Armonk, New York , U.S.A.

3 Contents Preface... vii Who Should Read This Guide... vii Prerequisite and Related Documents... vii What This Guide Contains... vii Conventions Used in This Guide... viii Platform-specific Information... ix Icons... ix Accessing Publications Online... x Ordering Publications... x Providing Feedback about Publications... xi Contacting Customer Support... xi Chapter 1. Introduction... 1 Why Manage Windows 2000 Security Information from Tivoli? Tivoli SecureWay Security Manager and Native Security... 2 Windows 2000 Native Mode and Mixed Mode Domains... 3 Security Management and User Administration... 5 Chapter 2. Installing... 7 Software Requirements... 8 Hardware Requirements Installing with Tivoli Software Installation Service Installing Tivoli SecureWay Security Manager for Windows Desktop... 9 Command Line Chapter 3. Adding Security Records Tivoli SecureWay Security Manager Supplement for Microsoft Windows 2000 iii

4 Creating a Group Record General Considerations Defining Windows 2000-specific Group Attributes Specifying a Windows 2000-specific Group Name Assigning Windows 2000 SAM Group Names Assigning Windows 2000 Users to a Group Record Setting Access Times Command Line Examples Creating a Resource Record Permissions and Inheritance in Windows Defining Resource Attributes Creating a Windows 2000 Resource Record Setting Default Access Permissions and Permission Inheritance Setting Network Access Permissions Setting Default Access Audit Permissions and Permission Inheritance 29 Setting Shared Directory Properties Command Line Examples Creating a Role Record General Considerations Windows 2000-specific Role Attributes Specifying a Windows 2000-specific Role Name Assigning a SAM Logon Name Defining a Windows 2000 Group List Defining a Windows 2000 Resource Access List Setting Windows 2000 Resource Access Rights Defining a Windows 2000 TME Resource Access List Setting Windows 2000 TME Resource Access Rights Auditing Windows 2000 Resource Access Auditing Windows 2000 TME Resource Access iv Version 3.7

5 Command Line Examples Chapter 4. Populating and Distributing Security Profiles Populating from an Windows 2000 Endpoint Populating Group Records Populating Role Records Populating Resource Records Distributing to a Windows 2000 Endpoint Appendix A. Resource Types Windows 2000 Resource Type Attribute Support Resource Access Permissions DIRECTORY FILE REGISTRY PRINTER SHARE Appendix B. Attributes Profile Level Attributes Group Attributes Resource Attributes Role Attributes Appendix C. Messages Index Tivoli SecureWay Security Manager Supplement for Microsoft Windows 2000 v

6 vi Version 3.7

7 Preface Tivoli SecureWay Security Manager for Windows 2000 provides centralized role-based security administration for Windows 2000 endpoints. Who Should Read This Guide The target audience for this guide is system administrators who are responsible for maintaining security in an Windows 2000 environment. Users of the guide should have some knowledge of: Basic security principles The Microsoft Windows 2000 operating system Prerequisite and Related Documents The following books are a prerequisite for this guide: Tivoli SecureWay Security Manager User s Guide The following books are related to this guide: Tivoli Management Framework User s Guide Tivoli Management Framework Planning and Installation Guide Tivoli Management Framework Reference Manual What This Guide Contains This guide contains the following sections: Introduction provides an overview of Tivoli SecureWay Security Manager for Windows 2000 and defines its main components. Installing describes how to install the product from the Tivoli desktop and from the command line. Adding Security Records describes how to add security records using Tivoli SecureWay Security Manager for Windows Tivoli SecureWay Security Manager Supplement for Microsoft Windows 2000 vii

8 Preface Populating and Distributing Security Profiles describes how to populate and distribute user profiles from and to the Windows 2000 endpoint. Resource Types describes the resource types supported by Tivoli SecureWay Security Manager for Windows Attributes describes the attributes of the wcrtsec and wmodsec commands related to the Windows 2000 endpoints. Messages describes the error messages issued by Tivoli SecureWay Security Manager for Windows Conventions Used in This Guide The guide uses several typeface conventions for special terms and actions. These conventions have the following meaning: Bold Italics Monospace Commands, keywords, file names, authorization roles, URLs, or other information that you must use literally appear like this, in bold. Names of windows, dialogs, and other controls also appear like this, inbold. Variables and values that you must provide appear like this, in italics. Words and phrases that are emphasized also appear like this, in italics. Code examples, output, and system messages appear like this, in a monospace font. This guide uses the UNIX convention for specifying environment variables and for directory notation. When using the Windows NT command line, replace $variable with %variable% for environment variables and replace each forward slash (/) with a backslash (\) in directory paths. viii Version 3.7

9 Preface Note: When using the bash shell on a Windows NT system, you can use the UNIX conventions. Many procedures in this guide include icons in the left margin. These icons provide context for performing a step within a procedure. For example, if you start a procedure by double-clicking on a policy region icon, that icon appears in the left margin next to the first step. If the fourth step of the procedure instructs you to open another icon, that icon appears in the left margin next to the fourth step. Platform-specific Information For a list of the supported platform versions, see the the Tivoli SecureWay Security Manager User s Guide. For more detailed and up-to-date information, see the Tivoli SecureWay Security Manager Release Notes. Icons The following icons represent security resources: security profile system policy records group records resource records role records Tivoli SecureWay Security Manager Supplement for Microsoft Windows 2000 ix

10 Preface Security profile resources are created in the context of a profile manager. After initial distribution of a user or group profile, the profile icon appears in the view dialog of subscribers. Accessing Publications Online The Tivoli Customer Support Web site ( offers a guide to support services (the Customer Support Handbook); frequently asked questions (FAQs); and technical information, including release notes, user s guides, redbooks, and white papers. You can access Tivoli publications online at The documentation for some products is available in PDF and HTML formats. Translated documents are also available for some products. To access most of the documentation, you need an ID and a password. To obtain an ID for use on the support Web site, go to Resellers should refer to for more information about obtaining Tivoli technical documentation and support. Business Partners should refer to Ordering Publications for more information about obtaining Tivoli technical documentation. Ordering Publications Order Tivoli publications online at or by calling one of the following telephone numbers: U.S. customers: (800) Canadian customers: (800) x Version 3.7

11 Providing Feedback about Publications We are very interested in hearing about your experience with Tivoli products and documentation, and we welcome your suggestions for improvements. If you have comments or suggestions about our products and documentation, contact us in one of the following ways: Send to Fill out our customer feedback survey at Contacting Customer Support Preface If you need support for this or any Tivoli product, contact Tivoli Customer Support in one of the following ways: Submit a problem management record (PMR) electronically from our Web site at For information about obtaining support through the Tivoli Customer Support Web site, go to Submit a PMR electronically through the IBMLink system. For information about IBMLink registration and access, refer to the IBM Web page at Send to support@tivoli.com. Customers in the U.S. can call TIVOLI8 ( ). Customers outside the U.S. should refer to the Tivoli Customer Support Web site at for customer support telephone numbers. When you contact Tivoli Customer Support, be prepared to provide the customer number for your company so that support personnel can assist you more readily. Tivoli SecureWay Security Manager Supplement for Microsoft Windows 2000 xi

12 Preface xii Version 3.7

13 1 1. Introduction Introduction Tivoli SecureWay Security Manager provides you with a single point of control for managing Windows 2000, Windows NT, UNIX, NetWare, OS/2, OS/400, and OS/390 security information. When you add Tivoli SecureWay Security Manager for Windows 2000 to your installation, you add the ability to manage, create, modify, and delete security information for Windows 2000 endpoints from a single, common interface (either graphical or command line). Tivoli SecureWay Security Manager for Windows 2000 upgrades Tivoli s security management product to include new dialog options as well as new attributes that allow you to manage Windows 2000 security data. Tivoli SecureWay Security Manager provides role-based distributed client/server security management that integrates, exploits, and extends the functionality of the Tivoli systems management disciplines and existing system and application-specific security products. The Tivoli Management Agent (TMA) serves as a communication vehicle to endpoints on a variety of platforms-windows 2000, Windows NT, UNIX, NetWare, OS/2, OS/400, and OS/390-and allows you to populate security information from and distribute security information to those endpoints. See Chapter 1 of the Tivoli SecureWay Security Manager User s Guide for information about the following: Tivoli SecureWay Security Manager and its features The concepts of system policy, group, resource, and role Tivoli SecureWay Security Manager Supplement for Microsoft Windows

14 Introduction The integration with Tivoli Distributed Monitoring and Tivoli Enterprise Console The authorization roles The notification group Why Manage Windows 2000 Security Information from Tivoli? Currently, to manage Windows 2000 security information, you or your administrator must log on to a Windows 2000 system. While this in itself is not a problem, it is limiting. When you are logged onto a system, you are limited to managing the security information associated to that operating system type. In addition, to manage Windows 2000 security, you or your administrator must be an expert in all aspects of Windows 2000 security information. This effort ties up valuable resources. After you have installed Tivoli SecureWay Security Manager into your existing Tivoli installation, you can manage Windows 2000, Windows NT, UNIX, NetWare, OS/2, OS/400, and OS/390 security information from a single location. This reduces the number of user interfaces you must learn in order to secure your business. In addition, the administrator managing your security information does not need to be an expert on any of the platforms-tivoli Framework and Tivoli SecureWay Security Manager provide this expertise. While you will need an expert system administrator to set up specific aspects of your security installation, you no longer need this expert to perform the daily tasks of security management. Tivoli SecureWay Security Manager and Native Security The following diagram illustrates the relationship between Tivoli SecureWay Security Manager and the security systems on some of the supported endpoint types. 2 Version 3.7

15 Introduction 1. Introduction The security profile contains the definitions of all groups, resources, roles, and system-wide policies, each of which is stored in its own type of record. Records are stored in a system-independent format that allows profile records to be distributed across an enterprise that contains many different system types. Windows 2000 Native Mode and Mixed Mode Domains Windows 2000 domains can operate in either native mode or mixed mode. In native mode, all domain controllers must run Windows 2000 servers. Clients and member servers can still be running previous versions of Windows such as Windows NT, Windows 98, or Windows 95. In mixed mode, Windows NT 4.0 domain controllers may be present in the domain, along with clients and member Tivoli SecureWay Security Manager Supplement for Microsoft Windows

16 Introduction servers still running previous versions of Windows such as Windows NT, Windows 98, or Windows 95. Mixed mode is the default mode when a domain is created. This first release of the Tivoli SecureWay Security Manager for Windows 2000 endpoint supports mixed mode contraints only. Tivoli SecureWay Security Manager for Windows 2000 runs in native mode Windows 2000 domains, but follows the mixed mode rules. A native-mode domain provides all Windows 2000 group features, which include: Universal groups available as security groups and distribution groups Full group nesting Conversion between security groups and distribution groups Conversion of global groups and domain local groups to universal groups A mixed mode domain imposes the following conditions: Global security groups can contain only user accounts. Domain local security groups can contain other global groups and user accounts. Universal security groups cannot be created. Universal distribution groups can be created. Only distribution groups can be nested. No conversion of scope or type is allowed. Tivoli SecureWay Security Manager will not support distribution groups in the first release of the Windows 2000 endpoint. Also, it will not provide system policy support using group policy objects in native mode. Tivoli SecureWay Security Manager will support local and global groups and follow mixed mode domain rules for group membership. It will map TME group records to Active Directory global groups, and will map TME role records to Active Directory domain local groups on domain controllers and to local SAM groups 4 Version 3.7

17 Introduction on servers and workstations. This mapping will continue until native mode support is provided in a future release of the Tivoli SecureWay Security Manager for Windows 2000 endpoint. Security Management and User Administration Tivoli SecureWay Security Manager is integrated with Tivoli Framework and Tivoli SecureWay User Administration. Installing Tivoli SecureWay User Administration helps simplify the process of adding users to a security group, but the product is not required. In environments where Tivoli User Administration is installed, the Tivoli users defined in profiles are available as potential members of a security group s member list. To add a member to a security group from the desktop, you select the user profile in which the potential member is defined and double-click on the user s name. 1. Introduction Adding users to a user profile creates a situation in which the order the user and security profiles are distributed is important. A user profile containing a new user must be distributed before the security profile that contains the group to which the user is associated. Tivoli SecureWay Security Manager Supplement for Microsoft Windows

18 6 Version 3.7

19 2 Installing Tivoli SecureWay Security Manager for Windows 2000 contains the following major components that are installed separately: Tivoli SecureWay Security Manager for Windows 2000, Version 3.7, Server This product must be installed on all Windows 2000 TMRs and managed nodes from which you manage Windows 2000 gateways and endpoints. Tivoli SecureWay Security Manager for Windows 2000, Version 3.7, Gateway This product must be installed on systems that will serve as a gateway to endpoints. When you distribute to, or populate from, an endpoint, the files that are required for that type of endpoint are sent from the gateway to the endpoint. 2. Installing Before attempting to install Tivoli SecureWay Security Manager for Windows 2000, make certain that you read the following sections: Software Requirements on page 8 Hardware Requirements on page 8 In addition, you should read the Tivoli SecureWay Security Manager Release Notes. The release notes include any changes to the installation procedure as well as solutions to known problems. Tivoli SecureWay Security Manager Supplement for Microsoft Windows

20 Installing Software Requirements You must have the following products installed before attempting to install Tivoli SecureWay Security Manager for Windows 2000: Tivoli Management Framework, Version Tivoli SecureWay Security Manager, Version 3.7 Hardware Requirements For information about the hardware requirements for this application, see the Tivoli SecureWay Security Manager Release Notes. Installing with Tivoli Software Installation Service Tivoli Software Installation Service (SIS) is a product that can install multiple Tivoli products on multiple systems in parallel. This Java-based product can, therefore, install more products on more systems in much less time than the Framework s install facility. SIS performs product prerequisite checks and, if defined, user-specified prerequisite checks, ensuring as few install failures as possible. In most cases, failures now occur only when machines are turned off or removed from the network. SIS also creates an install repository (IR) into which you can import the installation image of one or more Tivoli products. You can import only those interpreter types needed in your environment, which saves you disk space and import time. The IR is then the source of all your Tivoli installations. You can even share a single IR across multiple TMRs. Tivoli recommends you upgrade the Framework install facility in your current Tivoli installation by installing SIS. If you are installing Tivoli for the first time, install SIS on the first managed node running an SIS-supported operating system. Once installed, you should use SIS to install other Tivoli products. See the Tivoli Software Installation Service User s Guide for instructions on how to install SIS in your Tivoli installation and how to install products using SIS. 8 Version 3.7

21 Installing Tivoli SecureWay Security Manager for Windows 2000 Installing You can install the Tivoli SecureWay Security Manager components from either the Tivoli desktop or the command line. Desktop Use the following steps to install the Tivoli SecureWay Security Manager components from the Tivoli desktop: 1. Select the Install -> Install Product... option from the Desktop menu to display the Install Product dialog. 2. Installing Tivoli SecureWay Security Manager Supplement for Microsoft Windows

22 Installing 2. If the product you want to install is not already displayed, click the Select Media... button to display the File Browser dialog. The File Browser dialog enables you to identify or specify the path to the installation media. If you already know the path to the CD-ROM image: a. Enter the full path in the Path Name field. b. Click the Set Path button to change to the specified directory. c. Click the Set Media & Close button to save the new media path and return to the Install Product dialog. The dialog now contains the product that is available for installation. If you do not know the exact path to the CD-ROM image: a. From the Hosts scrolling list, choose the host on which the install media is mounted. Choosing a host updates the Directories scrolling list. 10 Version 3.7

23 Installing b. From the Directories scrolling list, choose the directory containing the install media. c. Click the Set Media & Close button to save the new media path and return to the Install Product dialog. The dialog now contains the product that is available for installation. 3. From the Select Product to Install scrolling list, select one of the following: Tivoli SecureWay Security Manager for Windows 2000, Version 3.7, Server Must be installed on the TMR servers and managed nodes. Tivoli SecureWay Security Manager for Windows 2000, Version 3.7, Gateway Must be installed on all the machines that will serve as a gateway for the Windows 2000 endpoints that you want to manage. 2. Installing 4. To specify the TMR servers or gateways on which you want to install the selected component, use the arrow keys to move the machine names between the Clients to Install On scrolling list and the Available Clients scrolling list. 5. Click the Install button to begin the component installation. The installation process prompts you with a Product Install dialog. This dialog provides the list of operations that will take place during the installation process. It also warns you of any problems that you may want to correct before you install the component. 6. Click the Continue Install button to begin the installation process and display the Product Install status dialog. The Product Install status dialog presents status information as the installation proceeds. When the installation is complete, the Product Install dialog will return a completion message. 7. Click the Close button to close the dialog. Tivoli SecureWay Security Manager Supplement for Microsoft Windows

24 Installing 8. Repeat the steps 3 on page 11 through 7 on page 11 until you have installed the Tivoli SecureWay Security Manager components on all the machines where you have to install them. Command Line The following example command installs the Tivoli SecureWay Security Manager components. See the Tivoli Framework Reference Manual for more information about the winstall command. winstall ccdrom_dir icomp_name node1 node2 where: c cdrom_dir Specifies the path to the CD-ROM image. i comp_name Specifies the index file from which the Tivoli SecureWay Security Manager component is installed. The comp_name argument can be any of the following: SECW2K.IND Installs the Tivoli Server install pack. SECW2KGW.IND Installs the Tivoli Gateway install pack. node1 node2 Specifies the names of the TMR servers or gateways to install the component on. If no machine is specified, the installation runs on all the clients of the current region. 12 Version 3.7

25 3 Adding Security Records After you have installed Tivoli SecureWay Security Manager for Windows 2000, you can work with the security profiles as described in the Tivoli SecureWay Security Manager User s Guide. Most of the procedures described in the guide are also valid when you manage security profiles for Windows 2000 endpoints. This chapter describes managing security profiles for Windows 2000 endpoints, and it lists general considerations that can be useful in managing these profiles. Group, resource, and role record types are supported. System policy records are not supported in the current release of the Tivoli SecureWay Security Manager for Windows 2000 endpoint. The following procedures are described in this chapter: Creating a group record Creating a resource record Creating a role record See Populating from an Windows 2000 Endpoint on page 47 and Distributing to a Windows 2000 Endpoint on page 52 for information about populating and distributing security profiles. 3. Adding Security Records Tivoli SecureWay Security Manager Supplement for Microsoft Windows

26 Creating a Group Record Creating a Group Record Tivoli SecureWay Security Manager groups map to global groups in a Windows 2000 Active Directory. Windows 2000 global groups can only be created on Windows 2000 domain controllers. The procedures described here for creating a group record are similar to the procedures described in Chapter 5 of the Tivoli SecureWay Security Manager User s Guide. This section lists general considerations about creating a group record for a Windows 2000 endpoint, and it describes Windows 2000-specific Tivoli SecureWay Security Manager GUI group record actions and subactions, which correspond to Windows 2000-specific Tivoli SecureWay Security Manager CLI command attributes. This section also provides examples of using the command attributes from the CLI. For additional information and definitions of command attributes, see Attributes on page 65. General Considerations Before creating a group record for a Windows 2000 endpoint, consider the following: Global groups are stored in Active Directory and replicated to domains controllers within a domain. To avoid data collisions and unnecessary replication of group records, Tivoli SecureWay Security Manager requires you to specify the domain and domain controller where Active Directory updates should occur. Distinguished names identify where global groups are created in Active Directory. Tivoli SecureWay Security Manager requires the canonical name format for global groups, for example: secw2k/tivoli/group1 Note: Tivoli SecureWay Security Manager does not create containers objects. Therefore, the container secw2k/tivoli must exist in Active Directory before group1 can be created. The down-level SAM account name of a global group should contain fewer than 20 characters and must be unique within a domain. 14 Version 3.7

27 Creating a Group Record Defining Windows 2000-specific Group Attributes When you create a security record, you specify values for the attributes that define the record. From the graphical user interface (GUI), you set attribute values by clicking choices and entering data in text fields as described in the following sections of this chapter. The GUI dialog that displays the records of a particular record type for a profile also displays the attribute values for each record. From the command line interface (CLI), you set attribute values as described in Attributes on page 65. In addition to the general group attributes, you can use the following GUI subactions to define Windows 2000-specific group attributes, which are listed in parentheses: Group Names (W2KName) W2K Special Group Names (W2KSamName) W2K User List (W2KUserMembers) W2K Login Times (W2KLoginTimes) Notes: 1. Users assigned to a group must be in canonical name format. 2. Group names must be in canonical name format. Specifying a Windows 2000-specific Group Name To specify a Windows 2000-specific group name different from the value entered in the Group Name field in the Group Record Properties dialog, perform the following steps: 3. Adding Security Records Tivoli SecureWay Security Manager Supplement for Microsoft Windows

28 Creating a Group Record 1. When you click Add Record in a Security Group Records dialog, the Group Record Properties dialog is displayed. 2. If it is not already displayed, select Edit Group Names from the Actions option list to display the Group Names group box. 3. Enter a group name in canonical format in the W2K field.canonical format is shown in the following example: secw2k.com/users/thisisagroup Assigning Windows 2000 SAM Group Names To assign a logon name that will support clients and servers from previous versions of Microsoft Windows operating systems, perform the following steps in the Group Record Properties dialog: 16 Version 3.7

29 Creating a Group Record 1. Select Edit Group Names from the Actions option list. 2. Select the W2K Special Group Names attribute in the subaction list. The following group box is displayed. 3. Enter a logon name that contains no more than 20 characters, and that is unique within the domain. If a longer name is entered, it will be truncated. Note: If a SAM name is not specified, the common name of the W2KName distinguished name is used. For example, if the distinguished group name is secw2k.com/users/thisisagroup, the common name is ThisIsAGroup. 4. Click the Create or the Save button (depending on whether you are creating a new record or editing an existing record) to add the SAM name to the record. Assigning Windows 2000 Users to a Group Record To assign Windows 2000 users to a group record, perform the following steps in the Group Record Properties dialog: 1. Select Edit Member List from the Actions option list. 2. Select the W2K User List attribute. The following group box is displayed. 3. Adding Security Records Tivoli SecureWay Security Manager Supplement for Microsoft Windows

30 Creating a Group Record 3. Select an endpoint from the Endpoints subaction list. A list of users defined for that endpoint are displayed in the Available Users list. 4. Double-click a user or login name to add the selected user to the group record you are defining. The distinguished name is displayed in the Selected Users list. You can also select a user name and click the right-arrow button to move users to the Selected Users list. Notes: a. The buttons and type-in field below the Available Users list provide options for browsing, select all, clear selections, and search. b. The buttons and type-in field below the Selected Users list provide options for adding a type-in distinguished user name in canonical format, and for deleting names selected from the list. 5. Repeat steps 3 and 4 until you have listed the Tivoli-defined users that are to be members of the group record. Setting Access Times Tivoli SecureWay Security Manager allows you to define when logins are allowed for group members. You can allow users to login on any day and at any time, or you can restrict the access times to specific days and time spans. Access times must be specified in 24 hour notation. To set access times, perform the following steps in the Group Record Properties dialog: 1. Select Edit Login Time Restrictions from the Actions list 18 Version 3.7

31 Creating a Group Record 2. Select W2K Login Times from the subaction list to display the W2K Login Times group box. 3. Click the days in which users can access the resources defined in the resource record. The procedure for setting global access time restrictions is the same. You can select one or more days of the week as well as the following buttons: All Days Enables users to access the resources on any day. Week Days Enables users to access the resources on Monday, Tuesday, Wednesday, Thursday, and Friday. Clear Disables logins on all days. This option is frequently used to cancel previous selections. 4. Select the times in which the resource can be accessed. To allow access at all hours, click the Anytime check box. Otherwise, select the times from the Start Time and Stop Time pop-up menus. For terminal resources, specify the time offset and direction of the terminal relative to the processor to which it is attached. You need only perform this step if the terminal is not in the same time zone as the processor, and you are also specifying access time restrictions to limit access to the terminal to specific time periods. If you do not specify a direction from the Direction pop-up menu, then any values you select from the hours and minutes pop-up menus will be ignored. 3. Adding Security Records Tivoli SecureWay Security Manager Supplement for Microsoft Windows

32 Creating a Group Record Note: Use the wcrtsec and wmodsec commands to specify minutes that cannot be selected from the pop-up menu. Command Line Examples This section provides examples of how to set W2K attributes for a group record: 1. The following example creates a group called ThisIsAGroup in Active Directory in the Tivoli organization unit folder in the secw2k.com domain, and assigns Tim Martin and Fred Durkin as user members. Fred Durkin is assigned to the built in Users folder in the secw2k.com domain and Tim Martin is assigned to the Dev organizational folder in the secw2k.com domain. It also sets the login time restrictions to weekdays at anytime, and provides a informational description of the group. wcrtsec Group s W2KName= secw2k.com/tivoli/thisisagroup \ -s W2KUserMembers= secw2k.com/dev/tim Martin, \ secw2k.com/users/fred Durkin \ -s W2KLoginTimes= days(weekdays) time(anytime) \ -s Description= This is a global group \ -s ThisIsAGroup Note: The path to the group record (secw2k.com/tivoli) must exist at the endpoint when distributing. The user members Tim Martin and Fred Durkin must also exist at the endpoint when distributing. 2. The following example creates a group named Staff in the microsoft.com domain in the Dev organization, and assigns a user member from a user profile named Ed Smothers. wmodsec Group s W2KName= microsoft.com/dev/staff \ -s TMEUserMembers= up:ed Smothers \ -s Staff Creating a Resource Record The procedures described here for creating a resource record are similar to the procedures described in Chapter 5 of the Tivoli SecureWay Security Manager User s Guide. This section lists considerations about creating various types of resource records for a Windows 2000 endpoint, and it describes 20 Version 3.7

33 Creating a Resource Record Tivoli SecureWay Security Manager GUI actions and subactions, which correspond to Tivoli SecureWay Security Manager CLI command attributes. This section also provides examples of using the command attributes from the CLI. For exadditional information and definitions of command attributes, see Attributes on page 65. Permissions and Inheritance in Windows 2000 Windows 2000 improves file system security primarily by enabling finer-grained control over permissions, and by providing more flexible propagation and blocking features. Now you can grant or deny access for any permission. As before, explicitly granting a permission to a user specifically gives them the authorization to perform the actions associated with that permission. The Windows 2000 improvement is that you can explicitly deny a permission to a user, thereby actively revoking the authorization to perform the actions associated with that permission. Permissions will still automatically propagate down through the directory tree by default. In Windows NT 4, the only way to block inheritance of permissions from a higher level folder was to assign different permissions to the object. In Windows 2000, you can block this inheritance of permission settings by setting a flag on a child object. Resources of type DIRECTORY, FILE, REGISTRY, and PRINTER support finer-grained control over permissions, and the new Windows 2000 improvements in propagation and blocking features. Resources of type SHARE support finer-grained control over permissions, but do not support inheritance of permissions. For a listing of the permissions and apply flags available for each resource type supported in Tivoli SecureWay Security Manager for Windows 2000, see Resource Types on page Adding Security Records Setting Permissions and Inheritance in the GUI In the Tivoli SecureWay Security Manager for Windows 2000 GUI, you can set permissions to Allow or Deny access by clicking checkboxes in the Allow and Deny columns for each permission. If the object is a container object such as a DIRECTORY, you can specify which child objects inherit these permissions by setting apply flags from a pull down list. For example, the GUI apply flags for the DIRECTORY resource type are: Tivoli SecureWay Security Manager Supplement for Microsoft Windows

34 Creating a Resource Record Files only Subfolders and files only Subfolders only This folder and files This folder and subfolders This folder only (The Recurse check box unchecks if this flag is selected.) This folder, subfolders, and files The default apply flag is to apply permissions to the container object itself. When applying permissions to child objects, if you leave the Recurse check box unchecked, inherited permissions are applied only to child objects in the container. If you check the Recurse check box, permissions are recursed through the directory tree to other containers and their children. You can allow or block inheritance of parent permissions to child objects for DIRECTORY, FILE, and REGISTRY resource records by clicking Allow inheritable permissions from parent to propagate to this object checkbox. Also, when defining DIRECTORY, FILE, and REGISTRY resource records, you can check or uncheck the Allow inheritable permissions from parent to propagate to this object checkbox to accept or block inheritance from a parent object. Setting Permissions and Inheritance in the CLI In the Tivoli SecureWay Security Manager for Windows 2000 CLI, denied permissions are prepended with the x symbol. For example, xread or xr, means deny read, whereas Read or R means allow read. If you do not specify the recurse flag, the permissions apply to objects and containers within the current container only. If you specify the recurse flag, the permissions recurse the directory tree based on the apply flags. You can set the InheritPerms and InheritAuditPerms attributes to T or F to accept or deny inheritance from a parent object (if not specified, default is T). For a listing of the permissions and CLI apply flags available for each resource type supported in Tivoli SecureWay Security Manager for Windows 2000, see Resource Types on page Version 3.7

35 No Access on the DefAccess attribute in Tivoli SecureWay Security Manager for Windows 2000 removes the Everyone group from the discretionary access control list (DACL) of the object. This enables an administrator to remove the Everyone group from the DACL and still allow other groups access to the resource. Tivoli SecureWay Security Manager for Windows 2000 does not allow you to deny No Access. Notes: 1. The recurse keyword is not valid unless used with the apply keyword. 2. The recurse keyword is not valid if applied to the container object only. The following example is invalid: apply(folder) recurse Defining Resource Attributes Creating a Resource Record In addition to general attributes described in Chapter 5 of the Tivoli SecureWay Security Manager User s Guide, you can use the following GUI fields, subactions, and checkboxes to define Windows 2000 resource attributes, which are listed in parentheses: Resource Name (Name) Description (Description) Default Access (DefAccess) Inherit Parent Access Permissions (InheritPerms) Interactive Access (IacAccess) Network Access (NwAccess) Operating System Access (SysAccess) Authenticated Users Access (AuAccess) Creator Owner Access (CoAccess) Access Audit Control (ResAccessAudit) Inherit Parent Audit Permissions (InheritAuditPerms) 3. Adding Security Records Tivoli SecureWay Security Manager Supplement for Microsoft Windows

36 Creating a Resource Record Interactive Access Audit Control (IacAccessAudit) Network Access Audit Control (NwAccessAudit) Operating System Access Audit Control (SysAccessAudit) Authenticated Users Access Audit Control (AuAccessAudit) Creator Owner Access Audit Control (CoAccessAudit) Share Path (SharePath) User Limit (UserLimit) Notes: 1. When you specify the name of a FILE or DIRECTORY resource record, use a fully qualified path (<drive>:<\path\object>) as shown in the following example: C:\security\pwfile 2. When you define special groups for resource types that support apply and recurse options, you can now set these options for each special group. Creating a Windows 2000 Resource Record Perform the following steps to specify resource name, description, and resource type for a Windows 2000 resource record: 24 Version 3.7

37 Creating a Resource Record 1. When you click Add Record in a Security Resource Records dialog, the Resource Record Properties dialog is displayed. 2. Select W2K from the EndPoint Type pulldown menu. 3. If it is not already displayed, select Edit Resource Type from the Actions option list to display the Resource Type group box. 4. Click DIRECTORY to select the resource type 5. Enter a fully qualified Windows 2000 directory name in the Resource Name field. 6. Enter a description of the resource in the Description field. 3. Adding Security Records Tivoli SecureWay Security Manager Supplement for Microsoft Windows

38 Creating a Resource Record Setting Default Access Permissions and Permission Inheritance The default access permissions for the resources defined in a resource record are applied when a user attempts to access a resource, but the role access permissions for that user do not explicitly allow it. To set the default access permission for a resource record, perform the following steps in the Resource Record Properties dialog: 1. Select Edit Default Access from the Actions option list. 2. Click Default Access in the subaction list to display the Resource Default Access group box. Note: The file system options and default access permissions that are displayed depend on the selected resource type. See Resource Types on page 55 for a list of the options and access rights supported for each resource type. 26 Version 3.7

39 Creating a Resource Record 3. Click the Allow or Deny column for each access right that you want to set for the resource. 4. To apply the selected access rights to all children of the resource, click the Recurse Subdirectories checkbox and select how you want to apply permissions from the Apply Access Permissions pulldown list. Note: The Recurse Subdirectories checkbox will uncheck itself if you select This folder only from the Apply Access Permissions pulldown list. This is true of all resource types that support recurse, if you apply to the container object only. 5. Click the Allow inheritable permissions from parent to propagate to this object checkbox to accept inheritance from a parent object. Setting Network Access Permissions To set the network access permission for a resource record, perform the following steps in the Resource Record Properties dialog: 1. Select Edit Default Access from the Actions option list. 3. Adding Security Records Tivoli SecureWay Security Manager Supplement for Microsoft Windows

40 Creating a Resource Record 2. Click Network Access in the subaction list to display the Resource Network Access group box. Note: The file system options and default access permissions that are displayed depend on the selected resource type. See Resource Types on page 55 for a list of the options and access rights supported for each resource type. 3. Click the Allow or Deny column for each access right that you want to set for the resource. 4. To apply the selected access rights to all children of the resource, click the Recurse Subdirectories checkbox and select how you want to apply permissions from the Apply Access Permissions pulldown list. Note: The Recurse Subdirectories checkbox will uncheck itself if you select This folder only from the Apply Access 28 Version 3.7

41 Creating a Resource Record Permissions pulldown list. This is true of all resource types that support recurse, if you apply to the container object only. Setting Default Access Audit Permissions and Permission Inheritance To set the default access audit permissions for a resource record, perform the following steps in the Resource Record Properties dialog: 1. Select Edit Audit Control from the Actions option list. 2. Click Access Audit Control in the subaction list to display the Resource Access Audit Control group box. 3. Adding Security Records Note: The file system options and default access permissions that are displayed depend on the selected resource type. See Resource Types on page 55 for a list of the options and access rights supported for each resource type. Tivoli SecureWay Security Manager Supplement for Microsoft Windows

42 Creating a Resource Record 3. Click the Success or Failure column for each access right that you want to audit. 4. To apply the selected audit configuration to children of the resource, click the Recurse Subdirectories checkbox and select a recursion level from the Apply Access Permissions pulldown list. Note: The Recurse Subdirectories checkbox will uncheck itself if you select This folder only from the Apply Access Permissions pulldown list. This is true of all resource types that support recurse, if you apply to the container object only. 5. Click the Allow inheritable permissions from parent to propagate to this object checkbox to accept audit permission inheritance from a parent object. Setting Shared Directory Properties To set the share properties for a SHARE resource record, perform the following steps in the Resource Record Properties dialog: 1. Select Edit Resource Type from the Actions option list. 2. Click to select the SHARE resource type. 3. Click SHARE Properties in the subaction list to display the SHARE Properties group box. 4. Enter the fully qualified path to the shared directory in the SHARE Path field. 30 Version 3.7

43 Creating a Resource Record 5. Either click the Maximum Allowed checkbox to allow the maximum number set for the system, or enter a number in the Allowed Users field. Command Line Examples This section provides examples of how to set W2K attributes for a resource record: 1. The following example gives everyone Read access to the directory c:/bin and all of its subdirectories and files, and also audits failed attempts to read directory c:/bin and all of its subdirectories and files. wcrtsec Resource s DefAccess= perms(r) \ apply(folder,subfolders,files) recurse \ -s ResAccessAudit= Failure perms(r) \ apply(folder,subfolders,files) recurse W2K:DIRECTORY:c:/bin 2. The following example gives everyone Read & Execute permission to all the files directly contained in the directory c:/myexecutables. wcrtsec Resource s DefAccess= perms(r,x) apply(files) W2K:DIRECTORY:c:/MyExecutables Note: The permissions set in the previous example apply only to the files contained within the directory, not to the directory itself. In Windows 2000, this is called an inherit only ACE. An inherit only ACE is inherited by child objects that allow inheritable permissions to propagate to it. 3. The following example protects the directory c:/foo from inheriting audit and access permissions from its parent, which is directory c:/, and gives everyone Read access. wcrtsec Resource s DefAccess= perms(r) \ s InheritPerms=False W2K:DIRECTORY:c:/FOO 4. The following example denies everyone read access to the file database.txt and protects it from inheriting parent permissions. 3. Adding Security Records Tivoli SecureWay Security Manager Supplement for Microsoft Windows

IBM Client Security Solutions. Client Security User's Guide

IBM Client Security Solutions. Client Security User's Guide IBM Client Security Solutions Client Security User's Guide December 1999 1 Before using this information and the product it supports, be sure to read Appendix B - Notices and Trademarks, on page 22. First

More information

Installing and Configuring DB2 10, WebSphere Application Server v8 & Maximo Asset Management

Installing and Configuring DB2 10, WebSphere Application Server v8 & Maximo Asset Management IBM Tivoli Software Maximo Asset Management Installing and Configuring DB2 10, WebSphere Application Server v8 & Maximo Asset Management Document version 1.0 Rick McGovern Staff Software Engineer IBM Maximo

More information

Tivoli IBM Tivoli Monitoring for Transaction Performance

Tivoli IBM Tivoli Monitoring for Transaction Performance Tivoli IBM Tivoli Monitoring for Transaction Performance Version 5.3.0 Evaluation Guide GC32-9190-00 Tivoli IBM Tivoli Monitoring for Transaction Performance Version 5.3.0 Evaluation Guide GC32-9190-00

More information

Firewall Security Toolbox User s Guide

Firewall Security Toolbox User s Guide Tivoli Management Framework Firewall Security Toolbox User s Guide Version 1.3 GC23-4826-00 Tivoli Management Framework Firewall Security Toolbox User s Guide Version 1.3 GC23-4826-00 Note Before using

More information

Introducing IBM Tivoli Configuration Manager

Introducing IBM Tivoli Configuration Manager IBM Tivoli Configuration Manager Introducing IBM Tivoli Configuration Manager Version 4.2 GC23-4703-00 IBM Tivoli Configuration Manager Introducing IBM Tivoli Configuration Manager Version 4.2 GC23-4703-00

More information

Xcalibur Global Version 1.2 Installation Guide Document Version 3.0

Xcalibur Global Version 1.2 Installation Guide Document Version 3.0 Xcalibur Global Version 1.2 Installation Guide Document Version 3.0 December 2010 COPYRIGHT NOTICE TRADEMARKS 2010 Chip PC Inc., Chip PC (Israel) Ltd., Chip PC (UK) Ltd., Chip PC GmbH All rights reserved.

More information

VERITAS NetBackup 6.0

VERITAS NetBackup 6.0 VERITAS NetBackup 6.0 Backup, Archive, and Restore Getting Started Guide for UNIX, Windows, and Linux N15278C September 2005 Disclaimer The information contained in this publication is subject to change

More information

Tivoli Identity Manager

Tivoli Identity Manager Tivoli Identity Manager Version 4.6 Active Directory Adapter Installation and Configuration Guide SC32-1376-09 Tivoli Identity Manager Version 4.6 Active Directory Adapter Installation and Configuration

More information

Server Installation Guide ZENworks Patch Management 6.4 SP2

Server Installation Guide ZENworks Patch Management 6.4 SP2 Server Installation Guide ZENworks Patch Management 6.4 SP2 02_016N 6.4SP2 Server Installation Guide - 2 - Notices Version Information ZENworks Patch Management Server Installation Guide - ZENworks Patch

More information

Scheduler Job Scheduling Console

Scheduler Job Scheduling Console Tivoli IBM Tivoli Workload Scheduler Job Scheduling Console Feature Level 1.3 (Revised December 2004) User s Guide SC32-1257-02 Tivoli IBM Tivoli Workload Scheduler Job Scheduling Console Feature Level

More information

Remote Control 5.1.2. Tivoli Endpoint Manager - TRC User's Guide

Remote Control 5.1.2. Tivoli Endpoint Manager - TRC User's Guide Tivoli Remote Control 5.1.2 Tivoli Endpoint Manager - TRC User's Guide Tivoli Remote Control 5.1.2 Tivoli Endpoint Manager - TRC User's Guide Note Before using this information and the product it supports,

More information

Audit Management Reference

Audit Management Reference www.novell.com/documentation Audit Management Reference ZENworks 11 Support Pack 3 February 2014 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of

More information

IBM DB2 Data Archive Expert for z/os:

IBM DB2 Data Archive Expert for z/os: Front cover IBM DB2 Data Archive Expert for z/os: Put Your Data in Its Place Reduce disk occupancy by removing unused data Streamline operations and improve performance Filter and associate data with DB2

More information

How To Use An Org.Org Adapter On An Org Powerbook (Orb) With An Org Idm.Org (Orber) Powerbook With An Adapter (Orbor) With A Powerbook 2 (Orbi) With The Power

How To Use An Org.Org Adapter On An Org Powerbook (Orb) With An Org Idm.Org (Orber) Powerbook With An Adapter (Orbor) With A Powerbook 2 (Orbi) With The Power Tivoli Identity Manager Version 4.6 Oracle ERP Adapter Installation and Configuration Guide SC32-1189-02 Tivoli Identity Manager Version 4.6 Oracle ERP Adapter Installation and Configuration Guide SC32-1189-02

More information

Installation Guide. Novell Storage Manager 3.1.1 for Active Directory. Novell Storage Manager 3.1.1 for Active Directory Installation Guide

Installation Guide. Novell Storage Manager 3.1.1 for Active Directory. Novell Storage Manager 3.1.1 for Active Directory Installation Guide Novell Storage Manager 3.1.1 for Active Directory Installation Guide www.novell.com/documentation Installation Guide Novell Storage Manager 3.1.1 for Active Directory October 17, 2013 Legal Notices Condrey

More information

Symantec NetBackup Backup, Archive, and Restore Getting Started Guide. Release 7.5

Symantec NetBackup Backup, Archive, and Restore Getting Started Guide. Release 7.5 Symantec NetBackup Backup, Archive, and Restore Getting Started Guide Release 7.5 Symantec NetBackup Backup, Archive, and Restore Getting Started Guide The software described in this book is furnished

More information

IBM WebSphere Application Server Version 7.0

IBM WebSphere Application Server Version 7.0 IBM WebSphere Application Server Version 7.0 Centralized Installation Manager for IBM WebSphere Application Server Network Deployment Version 7.0 Note: Before using this information, be sure to read the

More information

A Brief Introduction to IBM Tivoli Storage Manager Disaster Recovery Manager A Plain Language Guide to What You Need To Know To Get Started

A Brief Introduction to IBM Tivoli Storage Manager Disaster Recovery Manager A Plain Language Guide to What You Need To Know To Get Started A Brief Introduction to IBM Tivoli Storage Manager Disaster Recovery Manager A Plain Language Guide to What You Need To Know To Get Started By Sean O Sperry Version 2.00 Copyright Notice Copyright IBM

More information

TIBCO Hawk SNMP Adapter Installation

TIBCO Hawk SNMP Adapter Installation TIBCO Hawk SNMP Adapter Installation Software Release 4.9.0 November 2012 Two-Second Advantage Important Information SOME TIBCO SOFTWARE EMBEDS OR BUNDLES OTHER TIBCO SOFTWARE. USE OF SUCH EMBEDDED OR

More information

IBM Client Security Solutions. Password Manager Version 1.4 User s Guide

IBM Client Security Solutions. Password Manager Version 1.4 User s Guide IBM Client Security Solutions Password Manager Version 1.4 User s Guide IBM Client Security Solutions Password Manager Version 1.4 User s Guide First Edition (October 2004) Copyright International Business

More information

TIBCO Runtime Agent Authentication API User s Guide. Software Release 5.8.0 November 2012

TIBCO Runtime Agent Authentication API User s Guide. Software Release 5.8.0 November 2012 TIBCO Runtime Agent Authentication API User s Guide Software Release 5.8.0 November 2012 Important Information SOME TIBCO SOFTWARE EMBEDS OR BUNDLES OTHER TIBCO SOFTWARE. USE OF SUCH EMBEDDED OR BUNDLED

More information

Security Explorer 9.5. User Guide

Security Explorer 9.5. User Guide 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license or nondisclosure agreement.

More information

Installing Management Applications on VNX for File

Installing Management Applications on VNX for File EMC VNX Series Release 8.1 Installing Management Applications on VNX for File P/N 300-015-111 Rev 01 EMC Corporation Corporate Headquarters: Hopkinton, MA 01748-9103 1-508-435-1000 www.emc.com Copyright

More information

File and Printer Sharing with Microsoft Windows

File and Printer Sharing with Microsoft Windows Operating System File and Printer Sharing with Microsoft Windows Microsoft Corporation Published: November 2003 Abstract File and printer sharing in Microsoft Windows allows you to share the contents of

More information

Administration Quick Start

Administration Quick Start www.novell.com/documentation Administration Quick Start ZENworks 11 Support Pack 3 February 2014 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of

More information

OS Deployment V2.0. User s Guide

OS Deployment V2.0. User s Guide OS Deployment V2.0 User s Guide User s Guide i Note: Before using this information and the product it supports, read the information in Notices. Copyright IBM Corporation 2003, 2011. US Government Users

More information

NetBackup Backup, Archive, and Restore Getting Started Guide

NetBackup Backup, Archive, and Restore Getting Started Guide NetBackup Backup, Archive, and Restore Getting Started Guide UNIX, Windows, and Linux Release 6.5 Veritas NetBackup Backup, Archive, and Restore Getting Started Guide Copyright 2007 Symantec Corporation.

More information

Enterprise Vault Installing and Configuring

Enterprise Vault Installing and Configuring Enterprise Vault Installing and Configuring Enterprise Vault 6.0 Legal Notice Copyright 2005 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, VERITAS, the VERITAS Logo, and Enterprise

More information

Version 2.3. Administration SC32-1430-03

Version 2.3. Administration SC32-1430-03 Tivoli IBM Tivoli License Compliance Manager Version 2.3 Administration SC32-1430-03 Tivoli IBM Tivoli License Compliance Manager Version 2.3 Administration SC32-1430-03 Note Before using this information

More information

IBM SmartCloud Analytics - Log Analysis. Anomaly App. Version 1.2

IBM SmartCloud Analytics - Log Analysis. Anomaly App. Version 1.2 IBM SmartCloud Analytics - Log Analysis Anomaly App Version 1.2 IBM SmartCloud Analytics - Log Analysis Anomaly App Version 1.2 Note Before using this information and the product it supports, read the

More information

Veritas Cluster Server Database Agent for Microsoft SQL Configuration Guide

Veritas Cluster Server Database Agent for Microsoft SQL Configuration Guide Veritas Cluster Server Database Agent for Microsoft SQL Configuration Guide Windows 2000, Windows Server 2003 5.0 11293743 Veritas Cluster Server Database Agent for Microsoft SQL Configuration Guide Copyright

More information

Oracle Enterprise Single Sign-on Provisioning Gateway. Administrator Guide Release 10.1.4.1.0 E12613-01

Oracle Enterprise Single Sign-on Provisioning Gateway. Administrator Guide Release 10.1.4.1.0 E12613-01 Oracle Enterprise Single Sign-on Provisioning Gateway Administrator Guide Release 10.1.4.1.0 E12613-01 March 2009 Oracle Enterprise Single Sign-on Provisioning Gateway, Administrator Guide, Release 10.1.4.1.0

More information

Active Directory Change Notifier Quick Start Guide

Active Directory Change Notifier Quick Start Guide Active Directory Change Notifier Quick Start Guide Software version 3.0 Mar 2014 Copyright 2014 CionSystems Inc., All Rights Reserved Page 1 2014 CionSystems Inc. ALL RIGHTS RESERVED. This guide may not

More information

Telelogic DASHBOARD Installation Guide Release 3.6

Telelogic DASHBOARD Installation Guide Release 3.6 Telelogic DASHBOARD Installation Guide Release 3.6 1 This edition applies to 3.6.0, Telelogic Dashboard and to all subsequent releases and modifications until otherwise indicated in new editions. Copyright

More information

VERITAS NetBackup 5.1

VERITAS NetBackup 5.1 VERITAS NetBackup 5.1 Backup, Archive, and Restore Getting Started Guide for UNIX and Windows N12357C Disclaimer The information contained in this publication is subject to change without notice. VERITAS

More information

Interworks. Interworks Cloud Platform Installation Guide

Interworks. Interworks Cloud Platform Installation Guide Interworks Interworks Cloud Platform Installation Guide Published: March, 2014 This document contains information proprietary to Interworks and its receipt or possession does not convey any rights to reproduce,

More information

CommVault Simpana Archive 8.0 Integration Guide

CommVault Simpana Archive 8.0 Integration Guide CommVault Simpana Archive 8.0 Integration Guide Data Domain, Inc. 2421 Mission College Boulevard, Santa Clara, CA 95054 866-WE-DDUPE; 408-980-4800 Version 1.0, Revision B September 2, 2009 Copyright 2009

More information

Novell ZENworks 10 Configuration Management SP3

Novell ZENworks 10 Configuration Management SP3 AUTHORIZED DOCUMENTATION Software Distribution Reference Novell ZENworks 10 Configuration Management SP3 10.3 November 17, 2011 www.novell.com Legal Notices Novell, Inc., makes no representations or warranties

More information

Symantec Backup Exec TM 11d for Windows Servers. Quick Installation Guide

Symantec Backup Exec TM 11d for Windows Servers. Quick Installation Guide Symantec Backup Exec TM 11d for Windows Servers Quick Installation Guide September 2006 Symantec Legal Notice Copyright 2006 Symantec Corporation. All rights reserved. Symantec, Backup Exec, and the Symantec

More information

Business Intelligence Tutorial

Business Intelligence Tutorial IBM DB2 Universal Database Business Intelligence Tutorial Version 7 IBM DB2 Universal Database Business Intelligence Tutorial Version 7 Before using this information and the product it supports, be sure

More information

Active Directory Synchronization with Lotus ADSync

Active Directory Synchronization with Lotus ADSync Redbooks Paper Active Directory Synchronization with Lotus ADSync Billy Boykin Tommi Tulisalo The Active Directory Synchronization tool, or ADSync, allows Active Directory administrators to manage (register,

More information

LepideAuditor Suite for File Server. Installation and Configuration Guide

LepideAuditor Suite for File Server. Installation and Configuration Guide LepideAuditor Suite for File Server Installation and Configuration Guide Table of Contents 1. Introduction... 4 2. Requirements and Prerequisites... 4 2.1 Basic System Requirements... 4 2.2 Supported Servers

More information

VERITAS Backup Exec TM 10.0 for Windows Servers

VERITAS Backup Exec TM 10.0 for Windows Servers VERITAS Backup Exec TM 10.0 for Windows Servers Quick Installation Guide N134418 July 2004 Disclaimer The information contained in this publication is subject to change without notice. VERITAS Software

More information

Tivoli Access Manager Agent for Windows Installation Guide

Tivoli Access Manager Agent for Windows Installation Guide IBM Tivoli Identity Manager Tivoli Access Manager Agent for Windows Installation Guide Version 4.5.0 SC32-1165-03 IBM Tivoli Identity Manager Tivoli Access Manager Agent for Windows Installation Guide

More information

How To Install Caarcserve Backup Patch Manager 27.3.2.2 (Carcserver) On A Pc Or Mac Or Mac (Or Mac)

How To Install Caarcserve Backup Patch Manager 27.3.2.2 (Carcserver) On A Pc Or Mac Or Mac (Or Mac) CA ARCserve Backup Patch Manager for Windows User Guide r16 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation

More information

VERITAS Backup Exec 9.1 for Windows Servers Quick Installation Guide

VERITAS Backup Exec 9.1 for Windows Servers Quick Installation Guide VERITAS Backup Exec 9.1 for Windows Servers Quick Installation Guide N109548 Disclaimer The information contained in this publication is subject to change without notice. VERITAS Software Corporation makes

More information

Ultimus and Microsoft Active Directory

Ultimus and Microsoft Active Directory Ultimus and Microsoft Active Directory May 2004 Ultimus, Incorporated 15200 Weston Parkway, Suite 106 Cary, North Carolina 27513 Phone: (919) 678-0900 Fax: (919) 678-0901 E-mail: documents@ultimus.com

More information

Citrix Systems, Inc.

Citrix Systems, Inc. Citrix Password Manager Quick Deployment Guide Install and Use Password Manager on Presentation Server in Under Two Hours Citrix Systems, Inc. Notice The information in this publication is subject to change

More information

Introduction. Before you begin. Installing efax from our CD-ROM. Installing efax after downloading from the internet

Introduction. Before you begin. Installing efax from our CD-ROM. Installing efax after downloading from the internet Introduction Before you begin Before you begin installing efax, please check the following: You have received confirmation that your application for the efax service has been processed. The confirmation

More information

InfoPrint 4247 Serial Matrix Printers. Remote Printer Management Utility For InfoPrint Serial Matrix Printers

InfoPrint 4247 Serial Matrix Printers. Remote Printer Management Utility For InfoPrint Serial Matrix Printers InfoPrint 4247 Serial Matrix Printers Remote Printer Management Utility For InfoPrint Serial Matrix Printers Note: Before using this information and the product it supports, read the information in Notices

More information

Patch Management for Red Hat Enterprise Linux. User s Guide

Patch Management for Red Hat Enterprise Linux. User s Guide Patch Management for Red Hat Enterprise Linux User s Guide User s Guide i Note: Before using this information and the product it supports, read the information in Notices. Copyright IBM Corporation 2003,

More information

NDA-30141 ISSUE 1 STOCK # 200893. CallCenterWorX-Enterprise IMX MAT Quick Reference Guide MAY, 2000. NEC America, Inc.

NDA-30141 ISSUE 1 STOCK # 200893. CallCenterWorX-Enterprise IMX MAT Quick Reference Guide MAY, 2000. NEC America, Inc. NDA-30141 ISSUE 1 STOCK # 200893 CallCenterWorX-Enterprise IMX MAT Quick Reference Guide MAY, 2000 NEC America, Inc. LIABILITY DISCLAIMER NEC America, Inc. reserves the right to change the specifications,

More information

2X Cloud Portal v10.5

2X Cloud Portal v10.5 2X Cloud Portal v10.5 URL: www.2x.com E-mail: info@2x.com Information in this document is subject to change without notice. Companies, names, and data used in examples herein are fictitious unless otherwise

More information

ecopy Connector for EMC Documentum

ecopy Connector for EMC Documentum ecopy Connector for EMC Documentum Version 4.0 for ecopy ShareScan OP Administrator s Guide Part Number: 73-00218 (4/2007) Licensing, Copyright, and Trademark Information The information in this document

More information

Change Management for Rational DOORS User s Guide

Change Management for Rational DOORS User s Guide Change Management for Rational DOORS User s Guide Before using this information, read the general information under Appendix: Notices on page 58. This edition applies to Change Management for Rational

More information

Core Protection for Virtual Machines 1

Core Protection for Virtual Machines 1 Core Protection for Virtual Machines 1 Comprehensive Threat Protection for Virtual Environments. Installation Guide e Endpoint Security Trend Micro Incorporated reserves the right to make changes to this

More information

Lepide Software. LepideAuditor for File Server [CONFIGURATION GUIDE] This guide informs How to configure settings for first time usage of the software

Lepide Software. LepideAuditor for File Server [CONFIGURATION GUIDE] This guide informs How to configure settings for first time usage of the software Lepide Software LepideAuditor for File Server [CONFIGURATION GUIDE] This guide informs How to configure settings for first time usage of the software Lepide Software Private Limited, All Rights Reserved

More information

Software Usage Analysis Version 1.3

Software Usage Analysis Version 1.3 Software Usage Analysis Version 1.3 Catalog Editor s Guide Catalog Editor s Guide i Note: Before using this information and the product it supports, read the information in Notices. Copyright IBM Corporation

More information

High Availability Setup Guide

High Availability Setup Guide High Availability Setup Guide Version: 9.0 Released: March 2015 Companion Guides: The UniPrint Infinity Administrator s Guide, Cluster Guide and Mobile Setup Guide can be found online for your convenience

More information

IBM VisualAge for Java,Version3.5. Remote Access to Tool API

IBM VisualAge for Java,Version3.5. Remote Access to Tool API IBM VisualAge for Java,Version3.5 Remote Access to Tool API Note! Before using this information and the product it supports, be sure to read the general information under Notices. Edition notice This edition

More information

Sage 100 ERP. Installation and System Administrator s Guide

Sage 100 ERP. Installation and System Administrator s Guide Sage 100 ERP Installation and System Administrator s Guide This is a publication of Sage Software, Inc. Version 2014 Copyright 2013 Sage Software, Inc. All rights reserved. Sage, the Sage logos, and the

More information

Business Intelligence Tutorial: Introduction to the Data Warehouse Center

Business Intelligence Tutorial: Introduction to the Data Warehouse Center IBM DB2 Universal Database Business Intelligence Tutorial: Introduction to the Data Warehouse Center Version 8 IBM DB2 Universal Database Business Intelligence Tutorial: Introduction to the Data Warehouse

More information

EMC NetWorker Module for Microsoft Exchange Server Release 5.1

EMC NetWorker Module for Microsoft Exchange Server Release 5.1 EMC NetWorker Module for Microsoft Exchange Server Release 5.1 Installation Guide P/N 300-004-750 REV A02 EMC Corporation Corporate Headquarters: Hopkinton, MA 01748-9103 1-508-435-1000 www.emc.com Copyright

More information

http://www.trendmicro.com/download

http://www.trendmicro.com/download Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,

More information

Administration Guide. Novell Storage Manager 3.1.1 for Active Directory. Novell Storage Manager 3.1.1 for Active Directory Administration Guide

Administration Guide. Novell Storage Manager 3.1.1 for Active Directory. Novell Storage Manager 3.1.1 for Active Directory Administration Guide Novell Storage Manager 3.1.1 for Active Directory Administration Guide www.novell.com/documentation Administration Guide Novell Storage Manager 3.1.1 for Active Directory October 17, 2013 Legal Notices

More information

Oracle WebCenter Content Service for Microsoft Exchange

Oracle WebCenter Content Service for Microsoft Exchange Oracle WebCenter Content Service for Microsoft Exchange Installation and Upgrade Guide 10g Release 3 (10.3) November 2008 Oracle WebCenter Content Service for Microsoft Exchange Installation and Upgrade

More information

MGC WebCommander Web Server Manager

MGC WebCommander Web Server Manager MGC WebCommander Web Server Manager Installation and Configuration Guide Version 8.0 Copyright 2006 Polycom, Inc. All Rights Reserved Catalog No. DOC2138B Version 8.0 Proprietary and Confidential The information

More information

User Document. Adobe Acrobat 7.0 for Microsoft Windows Group Policy Objects and Active Directory

User Document. Adobe Acrobat 7.0 for Microsoft Windows Group Policy Objects and Active Directory Adobe Acrobat 7.0 for Microsoft Windows Group Policy Objects and Active Directory Copyright 2005 Adobe Systems Incorporated. All rights reserved. NOTICE: All information contained herein is the property

More information

Symantec Backup Exec 2010 R2. Quick Installation Guide

Symantec Backup Exec 2010 R2. Quick Installation Guide Symantec Backup Exec 2010 R2 Quick Installation Guide 20047221 The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the agreement.

More information

Administering Group Policy with Group Policy Management Console

Administering Group Policy with Group Policy Management Console Administering Group Policy with Group Policy Management Console By Jim Lundy Microsoft Corporation Published: April 2003 Abstract In conjunction with Windows Server 2003, Microsoft has released a new Group

More information

PageScope Router. Version 1.5. Configuration Guide

PageScope Router. Version 1.5. Configuration Guide PageScope Router Version 1.5 Configuration Guide Table of Contents TABLE OF CONTENTS... 2 1. Introduction...3 1.1 IP Address and Domain Name...3 2. Sending Files to PageScope Router...4 2.1 MFP Device

More information

MULTIFUNCTIONAL DIGITAL SYSTEMS. Network Fax Guide

MULTIFUNCTIONAL DIGITAL SYSTEMS. Network Fax Guide MULTIFUNCTIONAL DIGITAL SYSTEMS Network Fax Guide 2009 KYOCERA MITA Corporation All rights reserved Preface Thank you for purchasing Multifunctional Digital Color Systems. This manual explains the instructions

More information

VERITAS NetBackup Microsoft Windows User s Guide

VERITAS NetBackup Microsoft Windows User s Guide VERITAS NetBackup Microsoft Windows User s Guide Release 3.2 Windows NT/95/98 May, 1999 P/N 100-001004 1994-1999 VERITAS Software Corporation. All rights reserved. Portions of this software are derived

More information

TIBCO Administrator User s Guide. Software Release 5.7.1 March 2012

TIBCO Administrator User s Guide. Software Release 5.7.1 March 2012 TIBCO Administrator User s Guide Software Release 5.7.1 March 2012 Important Information SOME TIBCO SOFTWARE EMBEDS OR BUNDLES OTHER TIBCO SOFTWARE. USE OF SUCH EMBEDDED OR BUNDLED TIBCO SOFTWARE IS SOLELY

More information

3 Setting up Databases on a Microsoft SQL 7.0 Server

3 Setting up Databases on a Microsoft SQL 7.0 Server 3 Setting up Databases on a Microsoft SQL 7.0 Server Overview of the Installation Process To set up GoldMine properly, you must follow a sequence of steps to install GoldMine s program files, and the other

More information

Setup and Configuration Guide for Pathways Mobile Estimating

Setup and Configuration Guide for Pathways Mobile Estimating Setup and Configuration Guide for Pathways Mobile Estimating Setup and Configuration Guide for Pathways Mobile Estimating Copyright 2008 by CCC Information Services Inc. All rights reserved. No part of

More information

Business Portal for Microsoft Dynamics GP. Project Time and Expense Administrator s Guide Release 10.0

Business Portal for Microsoft Dynamics GP. Project Time and Expense Administrator s Guide Release 10.0 Business Portal for Microsoft Dynamics GP Project Time and Expense Administrator s Guide Release 10.0 Copyright Copyright 2007 Microsoft Corporation. All rights reserved. Complying with all applicable

More information

http://docs.trendmicro.com

http://docs.trendmicro.com Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the product, please review the readme files,

More information

HP Intelligent Management Center v7.1 Virtualization Monitor Administrator Guide

HP Intelligent Management Center v7.1 Virtualization Monitor Administrator Guide HP Intelligent Management Center v7.1 Virtualization Monitor Administrator Guide Abstract This guide describes the Virtualization Monitor (vmon), an add-on service module of the HP Intelligent Management

More information

RSA Authentication Manager 7.1 Basic Exercises

RSA Authentication Manager 7.1 Basic Exercises RSA Authentication Manager 7.1 Basic Exercises Contact Information Go to the RSA corporate web site for regional Customer Support telephone and fax numbers: www.rsa.com Trademarks RSA and the RSA logo

More information

Crystal Reports Installation Guide

Crystal Reports Installation Guide Crystal Reports Installation Guide Version XI Infor Global Solutions, Inc. Copyright 2006 Infor IP Holdings C.V. and/or its affiliates or licensors. All rights reserved. The Infor word and design marks

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,

More information

http://docs.trendmicro.com/en-us/smb/hosted-email-security.aspx

http://docs.trendmicro.com/en-us/smb/hosted-email-security.aspx Trend Micro Incorporated reserves the right to make changes to this document and to the product described herein without notice. Before installing and using the product, review the readme files, release

More information

VERITAS NetBackup 6.0 Encryption

VERITAS NetBackup 6.0 Encryption VERITAS NetBackup 6.0 Encryption System Administrator s Guide for UNIX, Windows, and Linux N15274C September 2005 Disclaimer The information contained in this publication is subject to change without notice.

More information

Archive Add-in Administrator Guide

Archive Add-in Administrator Guide Archive Add-in Administrator Guide RESTRICTION ON USE, PUBLICATION, OR DISCLOSURE OF PROPRIETARY INFORMATION Copyright 2011 McAfee, Inc. This document contains information that is proprietary and confidential

More information

VERITAS NetBackup 6.0 for Microsoft Exchange Server

VERITAS NetBackup 6.0 for Microsoft Exchange Server VERITAS NetBackup 6.0 for Microsoft Exchange Server System Administrator s Guide for Windows N152688 September 2005 Disclaimer The information contained in this publication is subject to change without

More information

Cisco UCS Director Payment Gateway Integration Guide, Release 4.1

Cisco UCS Director Payment Gateway Integration Guide, Release 4.1 First Published: April 16, 2014 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387) Fax: 408 527-0883

More information

1. Set Daylight Savings Time... 3. 2. Create Migrator Account... 3. 3. Assign Migrator Account to Administrator group... 4

1. Set Daylight Savings Time... 3. 2. Create Migrator Account... 3. 3. Assign Migrator Account to Administrator group... 4 1. Set Daylight Savings Time... 3 a. Have client log into Novell/Local Machine with Administrator Account...3 b. Access Adjust Date/Time...3 c. Make sure the time zone is set to Central Time...3 2. Create

More information

Javelina Software, LLC 3524 South River Terrace Edgewater, MD 21037 USA

Javelina Software, LLC 3524 South River Terrace Edgewater, MD 21037 USA User's Guide Copyright 2002-2009 Javelina Software, LLC All rights reserved. No part of this document may be reproduced in any form or by any means without the express written permission of Javelina Software,

More information

NSi Mobile Installation Guide. Version 6.2

NSi Mobile Installation Guide. Version 6.2 NSi Mobile Installation Guide Version 6.2 Revision History Version Date 1.0 October 2, 2012 2.0 September 18, 2013 2 CONTENTS TABLE OF CONTENTS PREFACE... 5 Purpose of this Document... 5 Version Compatibility...

More information

ADP Workforce Now Security Guide. Version 2.0-1

ADP Workforce Now Security Guide. Version 2.0-1 ADP Workforce Now Security Guide Version 2.0-1 ADP Trademarks The ADP logo, ADP, and ADP Workforce Now are registered trademarks of ADP, Inc. Third-Party Trademarks Microsoft, Windows, and Windows NT are

More information

Veeam Backup Enterprise Manager. Version 7.0

Veeam Backup Enterprise Manager. Version 7.0 Veeam Backup Enterprise Manager Version 7.0 User Guide August, 2013 2013 Veeam Software. All rights reserved. All trademarks are the property of their respective owners. No part of this publication may

More information

SMART Vantage. Installation guide

SMART Vantage. Installation guide SMART Vantage Installation guide Product registration If you register your SMART product, we ll notify you of new features and software upgrades. Register online at smarttech.com/registration. Keep the

More information

bv-control for Active Directory v8.50 User Guide

bv-control for Active Directory v8.50 User Guide bv-control for Active Directory v8.50 User Guide bv-control for Active Directory v8.50 bv-control for Active Directory User Guide The software described in this book is furnished under a license agreement

More information

ORACLE USER PRODUCTIVITY KIT USAGE TRACKING ADMINISTRATION & REPORTING RELEASE 3.6 PART NO. E17087-01

ORACLE USER PRODUCTIVITY KIT USAGE TRACKING ADMINISTRATION & REPORTING RELEASE 3.6 PART NO. E17087-01 ORACLE USER PRODUCTIVITY KIT USAGE TRACKING ADMINISTRATION & REPORTING RELEASE 3.6 PART NO. E17087-01 FEBRUARY 2010 COPYRIGHT Copyright 1998, 2009, Oracle and/or its affiliates. All rights reserved. Part

More information

Full Disk Encryption Pre-Boot Authentication Reference

Full Disk Encryption Pre-Boot Authentication Reference www.novell.com/documentation Full Disk Encryption Pre-Boot Authentication Reference ZENworks 11 Support Pack 4 Beta April 2015 Legal Notices Novell, Inc., makes no representations or warranties with respect

More information

Ross Video Limited. DashBoard Server and User Rights Management User Manual

Ross Video Limited. DashBoard Server and User Rights Management User Manual Ross Video Limited DashBoard Server and User Rights Management User Manual DashBoard Server and User Rights Management User Manual Ross Part Number: 8351DR-004A-01 Release Date: March 22, 2011. Printed

More information

Novell Identity Manager

Novell Identity Manager Password Management Guide AUTHORIZED DOCUMENTATION Novell Identity Manager 3.6.1 June 05, 2009 www.novell.com Identity Manager 3.6.1 Password Management Guide Legal Notices Novell, Inc. makes no representations

More information

For Active Directory Installation Guide

For Active Directory Installation Guide For Active Directory Installation Guide Version 2.5.2 April 2010 Copyright 2010 Legal Notices makes no representations or warranties with respect to the contents or use of this documentation, and specifically

More information

Application Interface Services Server for Mobile Enterprise Applications Configuration Guide Tools Release 9.2

Application Interface Services Server for Mobile Enterprise Applications Configuration Guide Tools Release 9.2 [1]JD Edwards EnterpriseOne Application Interface Services Server for Mobile Enterprise Applications Configuration Guide Tools Release 9.2 E61545-01 October 2015 Describes the configuration of the Application

More information