Creating Organizational Units, Accounts, and Groups. Active Directory Users and Computers (ADUC) 21/05/2013

Size: px
Start display at page:

Download "Creating Organizational Units, Accounts, and Groups. Active Directory Users and Computers (ADUC) 21/05/2013"

Transcription

1 Creating Organizational Units, Accounts, and Groups Tom Brett Active Directory Users and Computers (ADUC) Active Directory Users and Computers (ADUC) After installing AD DS, the next task is to create your Organizational Units, Users, groups etc. The primary tool you ll use is Active Directory Users and Computers (ADUC). This is a GUI application with a point and click interface You can also complete the tasks from the command line If you re running Server Core, you won t have access to ADUC locally. Anything that can be entered from the command line can be scripted. 1

2 LAB : NAVIGATING ACTIVE DIRECTORY USERS AND COMPUTERS (ADUC) Launch Active Directory Users and Computers by selecting Start Administrative Tools Active Directory Users and Computers. Active Directory Users and Computers opens 2

3 Expand your Domain This exposes the containers for the Different Objects Select Builtin This shows you the predefined security Groups within AD DS Click Computers You will notice that there are presently no computers setup 3

4 If you view ADUC you will now see that there are two domain controllers there Click foreign Security Principal No security principals exist (this will be explained later) Click Managed service Accounts Again this is currently blank 4

5 Select Users This displays the prebuilt users and security groups ORGANIZATIONAL UNITS Organizational units are used to organize objects within Active Directory. Any objects (such as users, computers, groups, and so on) can be placed within an OU to make them easier to administer. 5

6 The two primary technical reasons why you ll create an OU: Management through Group Policy Administrative delegation It s common for administrators to create OUs to match each department in their organization or to create OUs to group Users with similar responsibilities. OU Management Through Group Policy Group Policy objects (GPOs) can be created and linked to sites, domains, and OUs. If you want some users to have a specific Group Policy assigned to them, you can create an OU, place the accounts within the OU, and link the GPO to the OUs. OU Administrative Delegation The second technical reason to create an OU is related to delegation. 6

7 LAB : CREATING OUs WITH ADUC Launch Active Directory Users and Computers by selecting Start Administrative Tools Active Directory Users and Computers. Right click the domain, and select New Organizational Unit. 7

8 Enter Sales as the name of the OU in the text box. Ensure the check box Protect container from accidental deletion is selected Click OK Note : Protect container from accidental deletion is a neat feature that prevents anyone (even administrators) from accidentally deleting an object. If you really want to delete an object, you still can. Modify this setting by selecting View Advanced Features in ADUC, selecting the properties of the object, selecting the Object tab, and deselecting the Protect object from accidental deletion option. Then you can delete the object The new Organizational Unit is created 8

9 It s also possible to create children OUs. Right click the Sales OU you just created, and select New Organizational Unit. Type in Users for the name, and click OK. The nested Organizational unit appears within Sales 9

10 You now have two Users objects within Active Directory. They Are very different to each other: The Users OU within the Sales OU is an OU and can have GPOs linked to it. The Users container under the domain is only a container (not an OU) and cannot have GPOs linked to it. OUs have a slightly different icon to identify them it s not just a folder but instead a folder with an icon embedded on the front of the folder reminding you it s something more. ACTIVE DIRECTORY NAMING STANDARDS 10

11 Active Directory uses the Lightweight Directory Access Protocol (LDAP) for communication. LDAP uses a distinguished name (DN) to uniquely identify each object within the directory. Since the introduction of LDAP, it has become a defacto standard which enables data exchange between directory services and applications The LDAP defines the naming of all objects in the Active Directory database It therefore provides a directory that can be integrated with other directory services For example Novell edirectory and Active Directory applications like Exchange etc. 11

12 LDAP refers to an object using its Distinguished Name (DN) This DN, references each object in the Active Directory Database using its entire hierarchical path starting with the object itself going up to the root of the domain. LDAP defines the naming of attributes that identify each part of the objects name. Object Class LDAP Naming Attribute Definition of Naming Attribute User or any Leaf CN Common Name object Organizational Unit OU Organizational Unit Name Domain DC Domain Components. One for each part of the DNS name The format of a DN uses objecttype=objectname with several object types separated by commas it is best not to use spaces in the Distinguished Name LDAP is not case sensitive If we have a user Jsmith, their distinguished name could be cn=jsmith,ou=sales,dc=ipa,dc=com 12

13 An account with a name of Sally.Smith located in the Sales OU would have this DN: cn=sally.smith,ou=sales,dc=bigfirm,dc=com An account with a name of Joe.Johnson located in the Users container would have this DN: cn=joe.johnson,cn=users,dc=bigfirm,dc=com If OUs are nested, or have OUs within them, the lowest level OU comes first in the DN name. For example, if the Sales OU had a child OU named Users and then had a user named Maria within it, the DN would be as follows: cn=maria,ou=users,ou=sales,dc=bigfirm,dc=c om The use of spaces in LDAP Distinguished Names If the DN includes any spaces, it needs to be enclosed with quotes to ensure it is interpreted correctly. For example, this doesn t require quotes because there are no spaces: cn=maria,ou=users,ou=sales,dc=bigfirm,dc=com However, the same DN with spaces must include quotes: cn=maria, ou=users, ou=sales, dc=bigfirm, dc=com 13

14 CREATING OUs WITH DSADD You can use DSAdd to create a variety of Active Directory different objects You need to execute the DSAdd command from the command line. Although it s easier to run the command from a domain controller, you can also run it from other locations by specifying the server and domain parameters. In the command Prompt you can enter DSAdd /? to view the help on DSAdd. 14

15 Imagine you had a bunch of clowns in your organization that you wanted to manage using Group Policy. The following command can be entered from the command line to create an OU named Clowns in the Bigfirm.com domain. Notice the DN is ou=clowns,dc=bigfirm,dc=com. DSAdd ou ou=clowns,dc=bigfirm,dc=com LAB : USING DSADD TO CREATE A ORGANIZATION UNIT Here we wish to add a OU called Service in Active Directory Open the command prompt on the DC and enter the following DSAdd ou ou=service,dc=tombrett,dc=local Obviously replace the DC parameters to match your infrastructure 15

16 When you press enter the OU is added If you receive an error check the syntax and the structure Review Active Directory Users and Computers to see if it was successful Active directory objects can also be created using powershell and Windows Scripting Host (using VB scripts) 16

17 USER ACCOUNTS A user account is an object that contains all of the information that defines a user in Windows Server 2008 R2 With a user account, you can: Allow or deny users to log on based on their identity Grant users access to processes and services Manage users' access to resources CREATING ACCOUNTS 17

18 Both users and computers need accounts in order to access the domain. Just as with OUs, you can use either Active Directory Users and Computers or DSAdd to create the accounts. Some accounts are created automatically For example when you join a computer to the Domain, its account (computer) is automatically created in the Active Directory system CREATING ACCOUNTS WITH ADUC To create a user account using Active Directory Users and Computers, follow these steps 18

19 Launch Active Directory Users and Computers by selecting Start Administrative Tools Active Directory Users and Computers. Right click the Users OU within the Sales OU you created earlier, and select New User. The new user object dialog box appears 19

20 Enter the first name, last name, and user logon name for the user. Click Next. Enter a password for the user in the Password and Confirm Password text boxes. Ensure the check box is selected for User must change password at next logon. Review the information on the Summary page, and click Finish. 20

21 CREATING ACCOUNTS BY USING DSADD You can use the same DSAdd command line tool to create user accounts. The basic syntax is as follows: DSAdd user DN Although most parameters are optional, you ll find that the default domain policy will prevent you from creating an enabled account with a blank password. Not only will it be disabled, but you won t be able to enable it until you set a password. You will also probably want to add information such as first name, last name, and display name. 21

22 The DSAdd user command includes the following parameters that can be used for each of the following options: Pwd: Password Fn: First name Ln: Last name Display: Display name Samid: SAMID name Upn: User principal name The Equivalent parameters in ADUC would be The full name in ADUC is the display name. When using ADUC, this is automatically created but needs to be specified with DSAdd or else it s left blank. The user logon name is developed from the UPN name, and the SAMID identifies the legacy logon name and is the same as the text in the user logon name text box. If you re creating the account with a password, you want to ensure the user changes the password as soon as they log on. The DSAdd command includes the mustchpwd parameter. When set to Yes, it will force the use to change their password. 22

23 So, to create an enabled user named JoeBloggs in the Users Sales OU with a password of Pa$$w0rd, who must change the password at next logon you could use the following command. DSAdd user CN=JoeBloggs,OU=Users,OU=Sales,DC=tombret t,dc=local disabled no pwd Pa$$w0rd mustchpwd Yes Press enter to run the dsadd command After running check ADUC to see if the user is there You may need to refresh the container (right click Refresh) 23

24 For further details on dsadd SETTING DOMAIN BASED USER ACCOUNT PROPERTIES In AD DS, there are a lot more tabs with many more settings available to you in a domainbased user account than there are in a local user account. This gives administrators much more control over their users. It also allows you to store more information with each user account. This information can be used by users or by applications. 24

25 Local / Domain User Comparison Local User Account Properties Domain User Account Properties General Tab You ll see the usual first name and last name. You also have the ability to store some other information about the user in the user s account object in Active Directory such as their office, telephone number, address, and web page. You can make use of any defined address or web page settings for this user by right clicking the account object in Active Directory Users and Computers. 25

26 Address Tab This allows you to define a postal address for the user in question. Account Tab You can see the user logon name, the UPN, and the pre Windows 2000 user logon name that you defined while creating the user. You can use these controls to modify those usernames. Clicking the Logon Hours button will open the dialog box below. This allows you to control when a user can log on to the network to access resources. It does not forcibly log the user off if they are logged in 26

27 The log on to dialog box allows you to control which computers this user can use to log in to Active Directory. Telephones Tab You can store telecommunications contact information for the user in their user account object. Organization Tab The Organization tab is another information This tab allows you to describe the role of the user within the organization tabs 27

28 Personal Virtual Desktop Tab Personal virtual desktops are a form of VDI where a virtual machine with a copy of Windows Vista or Windows 7 runs on a server in the computer room. The user will log into it using Remote Desktop via a Remote Desktop Connection Broker. This broker is required to use the functionality in this tab. COM+ Tab This is more to do with development A partition is an application configuration. This is beyond the scope of this course Member Of Tab The Member Of tab allows you to control group membership of this user account You can also control the primary group of the user. This is required only in POSIX applications or Macintosh client computers. 28

29 More Tabs will be available if you choose the advanced view. EDITING MANY USER ACCOUNTS AT ONCE If you want to modify the same properties of multiple user accounts Simply select all of the accounts and then right click one and choose properties You will only see a subset of the options 29

30 ACTIVE DIRECTORY GROUPS The basic concept of Active Directory or domainbased groups does not differ from that of local groups. You use them to collectively treat a number of objects in an identical manner. The most common reason to create groups is to organize users. More specifically, global security groups are created to organize users and then assign permissions to the groups. A single group to contain many domain based security principals, such as users and computers, and to be used across all computers within the domain that the group resides you can use groups outside of their native domain, and there is even a category that can contain members from any domain in a forest. 30

31 Whenever possible, you should assign permissions to groups rather than users. Default Built In Groups You can use the built in groups to simplify administration You can have several users in the sales department. Instead of assigning permissions to each individual in the sales department, you could create a single global security group named G_Sales. You can then make all the users in the sales department members of the G_Sales group, and assign permissions to the G_Sales group. If a user leaves, take them out of the G_Sales group, and they will no longer have the permissions of the group. If a user joins the Sales team, put them into the G_Sales group, and they will have the permissions of everyone else in the group. 31

32 There are two types of groups: distribution and security. Distribution groups are used for , Security groups are used to assign permissions. Security groups can also be used for . Distribution Group A distribution group is used to group a number of objects together that will be addressed collectively. A mail server, such as Microsoft Exchange, can present the distribution group to users as a destination address. The user can choose to send a mail to the distribution group, and the mail server will attempt to send the mail to all members of thegroup, assuming that they have addresses configured. Security Group A security group can also perform the mail distribution function. You can use a security group to assign permissions or rights to an object or a set of objects, such as an organizational unit, a folder, or a component of an application. This allows Active Directory to become not only your single authentication mechanism for your network but also your authorization mechanism. An end user can use a single user account to gain authorization to secured resources across the entire Active Directory forest, not just a domain or a single computer. 32

33 There are three group scopes: Global Global groups are used to organize users. This is the most commonly used group Domain Local are domain level groups that can be used to set up permissions on resources in the domain in which they exist. Universal Universal groups are used only in multiple domain environments. Groups can also contain other groups commonly referred to as group nesting. This may be used to simplify resource allocation The most common way to create these groups is with Active Directory Users and Computers. You can use the following steps to create a global security group. 33

34 Launch Active Directory Users and Computers by selecting Start Administrative Tools Active Directory Users and Computers. Right click the Sales OU, and select New Group. Enter G_Sales in the Group name box. 34

35 Right click the Sales OU, and select New Group. Enter G_SalesAdmins in the Group name box. This group will be granted permissions needed to administer the Sales OU. Click OK. View the Sales Organizational Unit EDITING GROUP PROPERTIES 35

36 To modify properties for a group Right click the group and choose properties The amount of tabs available will depend on whether view advanced features is selected from the ADUC menu The general tab allows you to modify the scope or security type. It also allows you to specify a group and description Changing a group from being a security group to a distribution group means that it cannot be used for assigning permissions anymore. You are warned that any permission assigned using this group may fail to function anymore. This is especially important if you are denying access to critical resources using this group. Worse still is that the group appears to have / have not rights but they are not effective 36

37 You cannot directly change a group from being a domain local group to a global group, or vice versa. You can change either scope to being a universal group. From there, you can change it back to either a domain local or a global group. The member functionality for domain based groups works just like that of local groups. You can add and remove members using the Add and Remove buttons. Domain based groups are capable of containing more types of objects than local groups can, such as the following: Other objects This flexible solution allows you to add members that are created by applications, that is, not the usual users, computers, or groups. Contacts These objects are created in Active Directory to store contact information about people or organizations. This could be used for distribution groups. Service accounts This is a new feature of Windows Server 2008 R2 where you can set up dedicated service accounts instead of creating user accounts and assigning them to services. 37

38 You cannot add security principals that are local machine based, that is, local users or local groups. These security principals exist only on their computer, so it makes no sense to add them to a domain wide or forest wide group. Domain based groups can be nested; that is, a group can be a member of another group. The Member Of tab in the group s properties, allows you to manage what groups this group is a member of. The Managed By tab allows you to elect a user or a group that can be the owner of this group. The group can be assigned rights to resources. The selected owner can be given rights to manage the membership of the group by selecting the Manager can update membership list box 38

39 Common Administrative Tasks FORGOTTEN PASSWORDS If you are using the GUI, then you need to navigate to the user account in question in Active Directory Users and Computers. Then right click the user and select Reset Password to open the Reset Password dialog box. You can now enter in a new password for the user See that the check box to force the user to change their password after logon is selected? This is the default. This is very convenient because, as you can see, the password that you gave to this user is probably the same one 39

40 You can change a user s password using the dsmod user command: Example dsmod user CN=Joe Bloggs,OU=Users,DC=bigfirm,DC=com pwd Password mustchpwd yes LOCKED OUT USERS Account lockouts are disabled by default in the Default Domain Policy. When enabled after x incorrect login attempts, AD will lock the account for 30 minutes To unlock the account prior to that an administrator will need to log in and reset the account 40

41 One of the bad possible outcomes here is a Denial Of Service Attack, where a user would run a script to incorrectly login as all the users therefore locking them all. LAB : SETUP A ACTIVE DIRECTORY SYSTEM TO MIMIC AN ORGANIZATIONS STRUCTURE Think of an organization maybe a college and mimic its organization chart using AD 41

Using LDAP Authentication in a PowerCenter Domain

Using LDAP Authentication in a PowerCenter Domain Using LDAP Authentication in a PowerCenter Domain 2008 Informatica Corporation Overview LDAP user accounts can access PowerCenter applications. To provide LDAP user accounts access to the PowerCenter applications,

More information

Microsoft Virtual Labs. Active Directory New User Interface

Microsoft Virtual Labs. Active Directory New User Interface Microsoft Virtual Labs Active Directory New User Interface 2 Active Directory New User Interface Table of Contents Active Directory New User Interface... 3 Exercise 1 User Management and Saved Queries...4

More information

Tool Tip. SyAM Management Utilities and Non-Admin Domain Users

Tool Tip. SyAM Management Utilities and Non-Admin Domain Users SyAM Management Utilities and Non-Admin Domain Users Some features of SyAM Management Utilities, including Client Deployment and Third Party Software Deployment, require authentication credentials with

More information

CHAPTER THREE. Managing Groups

CHAPTER THREE. Managing Groups 3 CHAPTER THREE Managing Groups Objectives This chapter covers the following Microsoft-specified objectives for the Managing Users, Computers, and Groups section of the Managing and Maintaining a Microsoft

More information

Chapter. Managing Group Policy MICROSOFT EXAM OBJECTIVES COVERED IN THIS CHAPTER:

Chapter. Managing Group Policy MICROSOFT EXAM OBJECTIVES COVERED IN THIS CHAPTER: Chapter 10 Managing Group Policy MICROSOFT EXAM OBJECTIVES COVERED IN THIS CHAPTER: Implement and troubleshoot Group Policy. Create a Group Policy object (GPO). Link an existing GPO. Delegate administrative

More information

Windows Server 2012 Directory Partition Containers- A Walk Through

Windows Server 2012 Directory Partition Containers- A Walk Through Windows Server 2012 Directory Partition Containers- A Walk Through Introduction: Active Directory Users and Computers form a centralized management console to manage User objects, computer objects, Groups,

More information

Test Note Phone Manager Deployment Windows Group Policy Sever 2003 and XP SPII Clients

Test Note Phone Manager Deployment Windows Group Policy Sever 2003 and XP SPII Clients Test Note Phone Manager Deployment Windows Group Policy Sever 2003 and XP SPII Clients Note: I have only tested these procedures on Server 2003 SP1 (DC) and XP SPII client, in a controlled lab environment,

More information

Quality Center LDAP Guide

Quality Center LDAP Guide Information Services Quality Assurance Quality Center LDAP Guide Version 1.0 Lightweight Directory Access Protocol( LDAP) authentication facilitates single sign on by synchronizing Quality Center (QC)

More information

Administering Active Directory Administering W2K Server

Administering Active Directory Administering W2K Server Administering Active Directory Administering W2K Server (Week 9, Wednesday 3/7/2007) Abdou Illia, Spring 2007 1 Learning Objective Default Domain policies Creating OUs and managing their objects Controlling

More information

ECAT SWE Exchange Customer Administration Tool Web Interface User Guide Version 6.7

ECAT SWE Exchange Customer Administration Tool Web Interface User Guide Version 6.7 ECAT SWE Exchange Customer Administration Tool SWE - Exchange Customer Administration Tool (ECAT) Table of Contents About this Guide... 3 Audience and Purpose... 3 What is in this Guide?... 3 CA.mail Website...

More information

Setting up Active Directory Domain Services

Setting up Active Directory Domain Services Setting up Active Directory Domain Services Tom Brett CREATING A SINGLE DOMAIN FOREST Once you have Windows Server 2008 R2 installed, it s pretty easy to create a domain you simply run the domain controller

More information

Understanding Active Directory. Heng Sovannarith heng_sovannarith@yahoo.com

Understanding Active Directory. Heng Sovannarith heng_sovannarith@yahoo.com Understanding Active Directory Heng Sovannarith heng_sovannarith@yahoo.com Active Directory Active Directory is a directory service and hierarchical data store that holds information about objects on your

More information

Module 3: Implementing an Organizational Unit Structure

Module 3: Implementing an Organizational Unit Structure Module 3: Implementing an Organizational Unit Structure Contents Overview 1 Lesson: Creating and Managing Organizational Units 2 Lesson: Delegating Administrative Control of Organizational Units 13 Lesson

More information

Module 4. Managing Groups. Contents: Lesson 1: Overview of Groups 4-3. Lesson 2: Administer Groups 4-24. Lab A: Administer Groups 4-36

Module 4. Managing Groups. Contents: Lesson 1: Overview of Groups 4-3. Lesson 2: Administer Groups 4-24. Lab A: Administer Groups 4-36 Managing Groups 4-1 Module 4 Managing Groups Contents: Lesson 1: Overview of Groups 4-3 Lesson 2: Administer Groups 4-24 Lab A: Administer Groups 4-36 Lesson 3: Best Practices for Group Management 4-41

More information

Objectives. At the end of this chapter students should be able to:

Objectives. At the end of this chapter students should be able to: NTFS PERMISSIONS AND SECURITY SETTING.1 Introduction to NTFS Permissions.1.1 File Permissions and Folder Permission.2 Assigning NTFS Permissions and Special Permission.2.1 Planning NTFS Permissions.2.2

More information

Cloud Services ADM. User Interface Guide

Cloud Services ADM. User Interface Guide Cloud Services ADM User Interface Guide 10/15/2014 CONTENTS Launching the Hosted Exchange Tab - Active Directory Users and Computers... 1 User Properties... 2 Exchange Properties... 3 Creating a New User...

More information

Contents Introduction... 3 Introduction to Active Directory Services... 4 Installing and Configuring Active Directory Services...

Contents Introduction... 3 Introduction to Active Directory Services... 4 Installing and Configuring Active Directory Services... Contents 1. Introduction... 3 1.1. Setup... 3 2. Introduction to Active Directory Services... 4 3. Installing and Configuring Active Directory Services... 5 3.1. Joining to Domain... 5 3.2. Promoting Member

More information

Group Policy 21/05/2013

Group Policy 21/05/2013 Group Policy Group Policy is not a new technology for Active Directory, but it has grown and improved with every iteration of the operating system and service pack since it was first introduced in Windows

More information

Windows Firewall Configuration with Group Policy for SyAM System Client Installation

Windows Firewall Configuration with Group Policy for SyAM System Client Installation with Group Policy for SyAM System Client Installation SyAM System Client can be deployed to systems on your network using SyAM Management Utilities. If Windows Firewall is enabled on target systems, it

More information

Adding a User to Active Directory in Windows Server 2012

Adding a User to Active Directory in Windows Server 2012 Adding a User to Active Directory in Windows Server 2012 June 19, 2013 Copyright 2013 by World Class CAD, LLC. All Rights Reserved. Setup Security Policies To add a new user on a Domain Controller on the

More information

Automating client deployment

Automating client deployment Automating client deployment 1 Copyright Datacastle Corporation 2014. All rights reserved. Datacastle is a registered trademark of Datacastle Corporation. Microsoft Windows is either a registered trademark

More information

Installing Microsoft Exchange Integration for LifeSize Control

Installing Microsoft Exchange Integration for LifeSize Control Installing Microsoft Exchange Integration for LifeSize Control September 2005 Part Number 132-00002-001, Version 1.1 Copyright Notice Copyright 2005 LifeSize Communications. All rights reserved. LifeSize

More information

Active Directory Management. User Interface Guide

Active Directory Management. User Interface Guide Active Directory Management User Interface Guide Document Revision Date: April 15, 2013 Active Directory Management User Interface Guide i Contents Launching the Hosted Exchange Tab - Active Directory

More information

NSi Mobile Installation Guide. Version 6.2

NSi Mobile Installation Guide. Version 6.2 NSi Mobile Installation Guide Version 6.2 Revision History Version Date 1.0 October 2, 2012 2.0 September 18, 2013 2 CONTENTS TABLE OF CONTENTS PREFACE... 5 Purpose of this Document... 5 Version Compatibility...

More information

Nexio Insight LDAP Synchronization Service

Nexio Insight LDAP Synchronization Service Nexio Insight LDAP Synchronization Service 15-May-2015 Revision: Release Publication Information 2015 Imagine Communications Corp. Proprietary and Confidential. Imagine Communications considers this document

More information

EPM Performance Suite Profitability Administration & Security Guide

EPM Performance Suite Profitability Administration & Security Guide BusinessObjects XI R2 11.20 EPM Performance Suite Profitability Administration & Security Guide BusinessObjects XI R2 11.20 Windows Patents Trademarks Copyright Third-party Contributors Business Objects

More information

Skyward LDAP Launch Kit Table of Contents

Skyward LDAP Launch Kit Table of Contents 04.30.2015 Table of Contents What is LDAP and what is it used for?... 3 Can Cloud Hosted (ISCorp) Customers use LDAP?... 3 What is Advanced LDAP?... 3 Does LDAP support single sign-on?... 4 How do I know

More information

Customer Tips. Configuring Color Access on the WorkCentre 7328/7335/7345 using Windows Active Directory. for the user. Overview

Customer Tips. Configuring Color Access on the WorkCentre 7328/7335/7345 using Windows Active Directory. for the user. Overview Xerox Multifunction Devices Customer Tips February 13, 2008 This document applies to the stated Xerox products. It is assumed that your device is equipped with the appropriate option(s) to support the

More information

How To Set Up A Macintosh With A Cds And Cds On A Pc Or Macbook With A Domain Name On A Macbook (For A Pc) For A Domain Account (For An Ipad) For Free

How To Set Up A Macintosh With A Cds And Cds On A Pc Or Macbook With A Domain Name On A Macbook (For A Pc) For A Domain Account (For An Ipad) For Free Setting Up a Macintosh For Use In The Medical Center The purpose of this document is to provide some assistance and direction to the users of Macintosh computers in The Medical Center network environment.

More information

Creating Home Directories for Windows and Macintosh Computers

Creating Home Directories for Windows and Macintosh Computers ExtremeZ-IP Active Directory Integrated Home Directories Configuration! 1 Active Directory Integrated Home Directories Overview This document explains how to configure home directories in Active Directory

More information

SonicOS Enhanced 3.2 LDAP Integration with Microsoft Active Directory and Novell edirectory Support

SonicOS Enhanced 3.2 LDAP Integration with Microsoft Active Directory and Novell edirectory Support SonicOS Enhanced 3.2 LDAP Integration with Microsoft Active Directory and Novell edirectory Support Document Scope This document describes the integration of SonicOS Enhanced 3.2 with Lightweight Directory

More information

IIS, FTP Server and Windows

IIS, FTP Server and Windows IIS, FTP Server and Windows The Objective: To setup, configure and test FTP server. Requirement: Any version of the Windows 2000 Server. FTP Windows s component. Internet Information Services, IIS. Steps:

More information

WebSpy Vantage Ultimate 2.2 Web Module Administrators Guide

WebSpy Vantage Ultimate 2.2 Web Module Administrators Guide WebSpy Vantage Ultimate 2.2 Web Module Administrators Guide This document is intended to help you get started using WebSpy Vantage Ultimate and the Web Module. For more detailed information, please see

More information

Module 1: Introduction to Active Directory Infrastructure

Module 1: Introduction to Active Directory Infrastructure Module 1: Introduction to Active Directory Infrastructure Contents Overview 1 Lesson: The Architecture of Active Directory 2 Lesson: How Active Directory Works 10 Lesson: Examining Active Directory 19

More information

Basic Configuration. Key Operator Tools older products. Program/Change LDAP Server (page 3 of keyop tools) Use LDAP Server must be ON to work

Basic Configuration. Key Operator Tools older products. Program/Change LDAP Server (page 3 of keyop tools) Use LDAP Server must be ON to work Where to configure: User Tools Basic Configuration Key Operator Tools older products Program/Change LDAP Server (page 3 of keyop tools) Use LDAP Server must be ON to work Administrator Tools newest products

More information

Advanced Audit Policy Configurations for LT Auditor+ Reference Guide

Advanced Audit Policy Configurations for LT Auditor+ Reference Guide Advanced Audit Policy Configurations for LT Auditor+ Reference Guide Contents WINDOWS AUDIT POLICIES REQUIRED FOR LT AUDITOR+....3 ACTIVE DIRECTORY...3 Audit Policy for the Domain...3 Advanced Auditing

More information

CruzNet Secure Set-Up Instructions for Windows Vista

CruzNet Secure Set-Up Instructions for Windows Vista CruzNet Secure Set-Up Instructions for Windows Vista 1. In order to start using CruzNet Secure, you'll first need to create a password at https://vpn.soe.ucsc.edu/. Click on the reset your password link.

More information

Deploying System Center 2012 R2 Configuration Manager

Deploying System Center 2012 R2 Configuration Manager Deploying System Center 2012 R2 Configuration Manager This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED, OR STATUTORY, AS TO THE INFORMATION IN THIS DOCUMENT.

More information

Installing Microsoft Outlook on a Macintosh. This document explains how to download, install and configure Microsoft Outlook on a Macintosh.

Installing Microsoft Outlook on a Macintosh. This document explains how to download, install and configure Microsoft Outlook on a Macintosh. Reference : USER184 Issue date : December 2002 Revision date : September 2007 Classification : Software Originator : Hugh Burt REVISED DOCUMENT Installing Microsoft Outlook on a Macintosh This document

More information

CardAccess 3000 V2.9.x New Features Configuration Guide

CardAccess 3000 V2.9.x New Features Configuration Guide CardAccess 3000 V2.9.x New Features Configuration Guide DATE: 11 OCTOBER 2012 DOCUMENT PERTAINS TO: CARDACCESS 3000 V2.9.X NEW FEA- TURES CONFIGURATION GUIDE REVISION: A Continental 2012 CardAccess 3000

More information

ThinManager and Active Directory

ThinManager and Active Directory ThinManager and Active Directory Use the F1 button on any page of a ThinManager wizard to launch Help for that page. Visit http://www.thinmanager.com/kb/index.php/special:allpages for a list of Knowledge

More information

Module 4: Implementing User, Group, and Computer Accounts

Module 4: Implementing User, Group, and Computer Accounts Module 4: Implementing User, Group, and Computer Accounts Contents Overview 1 Lesson: Introduction to Accounts 2 Lesson: Creating and Managing Multiple Accounts 8 Lesson: Implementing User Principal Name

More information

Installing and Configuring Login PI

Installing and Configuring Login PI Installing and Configuring Login PI Login PI Hands-on lab In this lab, you will configure Login PI to provide performance insights for a Windows Server 2012 R2 Remote Desktop Services installation. To

More information

ILTA HANDS ON Securing Windows 7

ILTA HANDS ON Securing Windows 7 Securing Windows 7 8/23/2011 Table of Contents About this lab... 3 About the Laboratory Environment... 4 Lab 1: Restricting Users... 5 Exercise 1. Verify the default rights of users... 5 Exercise 2. Adding

More information

Customer admin guide. UC Management Centre

Customer admin guide. UC Management Centre Customer admin guide UC Management Centre June 2013 Contents 1. Introduction 1.1 Logging into the UC Management Centre 1.2 Language Options 1.3 Navigating Around the UC Management Centre 4 4 5 5 2. Customers

More information

NETWRIX ACCOUNT LOCKOUT EXAMINER

NETWRIX ACCOUNT LOCKOUT EXAMINER NETWRIX ACCOUNT LOCKOUT EXAMINER ADMINISTRATOR S GUIDE Product Version: 4.1 July 2014. Legal Notice The information in this publication is furnished for information use only, and does not constitute a

More information

Getting Started. Autotask Integration 2008-2011, INNERAPPS, LLC. ALL RIGHTS RESERVED

Getting Started. Autotask Integration 2008-2011, INNERAPPS, LLC. ALL RIGHTS RESERVED Getting Started Autotask Integration 2008-2011, INNERAPPS, LLC. ALL RIGHTS RESERVED Identity Syncronizer Autotask MMC Getting Started Guide InnerApps, LLC 28366 Kensington Lane Suite 1 Perrysburg, OH43551

More information

User guide. Business Email

User guide. Business Email User guide Business Email June 2013 Contents Introduction 3 Logging on to the UC Management Centre User Interface 3 Exchange User Summary 4 Downloading Outlook 5 Outlook Configuration 6 Configuring Outlook

More information

Windows Clients and GoPrint Print Queues

Windows Clients and GoPrint Print Queues Windows Clients and GoPrint Print Queues Overview The following tasks demonstrate how to configure shared network printers on Windows client machines in a Windows Active Directory Domain and Workgroup

More information

To enable an application to use external usernames and passwords, you need to first configure CA EEM to use external directories.

To enable an application to use external usernames and passwords, you need to first configure CA EEM to use external directories. Most clients utilize an external directory tool, such as Microsoft Active Directory, to provide authentication. CA Embedded Entitlements Manager (EEM) can be configured to integrate with the same external

More information

Virtual Office Remote Installation Guide

Virtual Office Remote Installation Guide Virtual Office Remote Installation Guide Table of Contents VIRTUAL OFFICE REMOTE INSTALLATION GUIDE... 3 UNIVERSAL PRINTER CONFIGURATION INSTRUCTIONS... 12 CHANGING DEFAULT PRINTERS ON LOCAL SYSTEM...

More information

SafeWord Domain Login Agent Step-by-Step Guide

SafeWord Domain Login Agent Step-by-Step Guide SafeWord Domain Login Agent Step-by-Step Guide Author Johan Loos Date January 2009 Version 1.0 Contact johan@accessdenied.be Table of Contents Table of Contents... 2 Why SafeWord Agent for Windows Domains?...

More information

Quick Start Guide for Parallels Virtuozzo

Quick Start Guide for Parallels Virtuozzo PROPALMS VDI Version 2.1 Quick Start Guide for Parallels Virtuozzo Rev. 1.1 Published: JULY-2011 1999-2011 Propalms Ltd. All rights reserved. The information contained in this document represents the current

More information

Ultimus and Microsoft Active Directory

Ultimus and Microsoft Active Directory Ultimus and Microsoft Active Directory May 2004 Ultimus, Incorporated 15200 Weston Parkway, Suite 106 Cary, North Carolina 27513 Phone: (919) 678-0900 Fax: (919) 678-0901 E-mail: documents@ultimus.com

More information

Configuring Sponsor Authentication

Configuring Sponsor Authentication CHAPTER 4 Sponsors are the people who use Cisco NAC Guest Server to create guest accounts. Sponsor authentication authenticates sponsor users to the Sponsor interface of the Guest Server. There are five

More information

PaperStream Connect. Setup Guide. Version 1.0.0.0. Copyright Fujitsu

PaperStream Connect. Setup Guide. Version 1.0.0.0. Copyright Fujitsu PaperStream Connect Setup Guide Version 1.0.0.0 Copyright Fujitsu 2014 Contents Introduction to PaperStream Connect... 2 Setting up PaperStream Capture to Release to Cloud Services... 3 Selecting a Cloud

More information

Configuring Color Access on the WorkCentre 7120 Using Microsoft Active Directory Customer Tip

Configuring Color Access on the WorkCentre 7120 Using Microsoft Active Directory Customer Tip Configuring Color Access on the WorkCentre 7120 Using Microsoft Active Directory Customer Tip October 21, 2010 Overview This document describes how to limit access to color copying and printing on the

More information

USER GUIDE. Lightweight Directory Access Protocol (LDAP) Schoolwires Centricity

USER GUIDE. Lightweight Directory Access Protocol (LDAP) Schoolwires Centricity USER GUIDE Lightweight Directory Access Protocol () Schoolwires Centricity TABLE OF CONTENTS Introduction... 1 Audience and Objectives... 1 Overview... 1 Servers Supported by Centricity... 1 Benefits of

More information

Alpha High Level Description

Alpha High Level Description Alpha High Level Description Alpha is a Windows Domain Controller (DC) and Domain Name System (DNS) Server. Because Alpha was the first DC in the aia.class domain, it is also (by default) the Windows global

More information

During your session you will have access to the following lab configuration.

During your session you will have access to the following lab configuration. Introduction The Install and Configure Servers module provides you with the instruction and server hardware to develop your hands on skills in the defined topics. This module includes the following exercises:

More information

Password Manager Windows Desktop Client

Password Manager Windows Desktop Client Password Manager Windows Desktop Client EmpowerID provides an extension that allows organizations to plug into Password Manager to customize the Windows logon experience beyond that supplied by the standard

More information

Group Policy Objects: What are They and How Can They Help Your Firm?

Group Policy Objects: What are They and How Can They Help Your Firm? Group Policy Objects: What are They and How Can They Help Your Firm? By Sharon Nelson and John Simek 2011 Sensei Enterprises, Inc. The obvious first question: What is a Group Policy Object? Basically,

More information

RIGHTS RESERVED. User Guide. GoToAssist Corporate. 2008-2015, InnerApps, LLC. ALL RIGHTS RESERVED

RIGHTS RESERVED. User Guide. GoToAssist Corporate. 2008-2015, InnerApps, LLC. ALL RIGHTS RESERVED RIGHTS RESERVED User Guide GoToAssist Corporate 2008-2015, InnerApps, LLC. ALL RIGHTS RESERVED Identity Syncronizer GoToAssist Corporate User Guide InnerApps, LLC 28366 Kensington Lane Suite 1 Perrysburg,

More information

ADSelfService Plus Client Software Installation Guide

ADSelfService Plus Client Software Installation Guide ADSelfService Plus Client Software Installation Guide ( I n s t a l l a t io n t h r o u g h A DS e l f S e r v ic e P l u s w e b p o r t a l a n d M a n u a l I n s t a l l a t io n ) 1 Table of Contents

More information

Active Directory Change Notifier Quick Start Guide

Active Directory Change Notifier Quick Start Guide Active Directory Change Notifier Quick Start Guide Software version 3.0 Mar 2014 Copyright 2014 CionSystems Inc., All Rights Reserved Page 1 2014 CionSystems Inc. ALL RIGHTS RESERVED. This guide may not

More information

Using Windows Task Scheduler instead of the Backup Express Scheduler

Using Windows Task Scheduler instead of the Backup Express Scheduler Using Windows Task Scheduler instead of the Backup Express Scheduler This document contains a step by step guide to using the Windows Task Scheduler instead of the Backup Express Scheduler. Backup Express

More information

Active Directory Software Deployment

Active Directory Software Deployment APPLICATION N0TE ST-0128 March 24, 2006 Product: Active Directory / PCM Deployment System version: ShoreTel 6 Active Directory Software Deployment Courtesy of: Dylan Moser with LANtelligence Inc. This

More information

Administration Quick Start

Administration Quick Start www.novell.com/documentation Administration Quick Start ZENworks 11 Support Pack 3 February 2014 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of

More information

How to install and use the File Sharing Outlook Plugin

How to install and use the File Sharing Outlook Plugin How to install and use the File Sharing Outlook Plugin Thank you for purchasing Green House Data File Sharing. This guide will show you how to install and configure the Outlook Plugin on your desktop.

More information

Installation Guide. . All right reserved. For more information about Specops Deploy and other Specops products, visit www.specopssoft.

Installation Guide. . All right reserved. For more information about Specops Deploy and other Specops products, visit www.specopssoft. . All right reserved. For more information about Specops Deploy and other Specops products, visit www.specopssoft.com Copyright and Trademarks Specops Deploy is a trademark owned by Specops Software. All

More information

SECURE MOBILE ACCESS MODULE USER GUIDE EFT 2013

SECURE MOBILE ACCESS MODULE USER GUIDE EFT 2013 SECURE MOBILE ACCESS MODULE USER GUIDE EFT 2013 GlobalSCAPE, Inc. (GSB) Address: 4500 Lockhill-Selma Road, Suite 150 San Antonio, TX (USA) 78249 Sales: (210) 308-8267 Sales (Toll Free): (800) 290-5054

More information

How to Create a Delegated Administrator User Role / To create a Delegated Administrator user role Page 1

How to Create a Delegated Administrator User Role / To create a Delegated Administrator user role Page 1 Managing user roles in SCVMM How to Create a Delegated Administrator User Role... 2 To create a Delegated Administrator user role... 2 Managing User Roles... 3 Backing Up and Restoring the VMM Database...

More information

ILTA 2013 - HAND 6B. Upgrading and Deploying. Windows Server 2012. In the Legal Environment

ILTA 2013 - HAND 6B. Upgrading and Deploying. Windows Server 2012. In the Legal Environment ILTA 2013 - HAND 6B Upgrading and Deploying Windows Server 2012 In the Legal Environment Table of Contents Purpose of This Lab... 3 Lab Environment... 3 Presenter... 3 Exercise 1 Add Roles and Features...

More information

How To Take Advantage Of Active Directory Support In Groupwise 2014

How To Take Advantage Of Active Directory Support In Groupwise 2014 White Paper Collaboration Taking Advantage of Active Directory Support in GroupWise 2014 Flexibility and interoperability have always been hallmarks for Novell. That s why it should be no surprise that

More information

1. Set Daylight Savings Time... 3. 2. Create Migrator Account... 3. 3. Assign Migrator Account to Administrator group... 4

1. Set Daylight Savings Time... 3. 2. Create Migrator Account... 3. 3. Assign Migrator Account to Administrator group... 4 1. Set Daylight Savings Time... 3 a. Have client log into Novell/Local Machine with Administrator Account...3 b. Access Adjust Date/Time...3 c. Make sure the time zone is set to Central Time...3 2. Create

More information

Team Foundation Server 2013 Installation Guide

Team Foundation Server 2013 Installation Guide Team Foundation Server 2013 Installation Guide Page 1 of 164 Team Foundation Server 2013 Installation Guide Benjamin Day benday@benday.com v1.1.0 May 28, 2014 Team Foundation Server 2013 Installation Guide

More information

Autograph 3.3 Network Installation

Autograph 3.3 Network Installation Eastmond Publishing Ltd (Autograph) PO Box 46, Oundle, Peterborough, PE8 4JX, UK Tel: +44 (0)1832 273444 Fax: +44 (0)1832 273529 Email: support@autograph-maths.com Web: www.autograph-maths.com Technical

More information

HOW TO SILENTLY INSTALL CLOUD LINK REMOTELY WITHOUT SUPERVISION

HOW TO SILENTLY INSTALL CLOUD LINK REMOTELY WITHOUT SUPERVISION HOW TO SILENTLY INSTALL CLOUD LINK REMOTELY WITHOUT SUPERVISION Version 1.1 / Last updated November 2012 INTRODUCTION The Cloud Link for Windows client software is packaged as an MSI (Microsoft Installer)

More information

Quick Start Guide for VMware and Windows 7

Quick Start Guide for VMware and Windows 7 PROPALMS VDI Version 2.1 Quick Start Guide for VMware and Windows 7 Rev. 1.1 Published: JULY-2011 1999-2011 Propalms Ltd. All rights reserved. The information contained in this document represents the

More information

Many home and small office networks exist for no

Many home and small office networks exist for no C H A P T E R Accessing and Sharing Network Resources Many home and small office networks exist for no other reason than to share a broadband Internet connection. The administrators of those networks attach

More information

Sendspace Wizard Desktop Tool Step-By-Step Guide

Sendspace Wizard Desktop Tool Step-By-Step Guide Sendspace Wizard Desktop Tool Step-By-Step Guide Copyright 2007 by sendspace.com This publication is designed to provide accurate and authoritative information for users of sendspace, the easy big file

More information

RoomWizard Synchronization Software Manual Installation Instructions

RoomWizard Synchronization Software Manual Installation Instructions 2 RoomWizard Synchronization Software Manual Installation Instructions Table of Contents Exchange Server Configuration... 4 RoomWizard Synchronization Software Installation and Configuration... 5 System

More information

Active Directory Self-Service FAQ

Active Directory Self-Service FAQ Active Directory Self-Service FAQ General Information: info@cionsystems.com Online Support: support@cionsystems.com CionSystems Inc. Mailing Address: 16625 Redmond Way, Ste M106 Redmond, WA. 98052 http://www.cionsystems.com

More information

SharePoint AD Information Sync Installation Instruction

SharePoint AD Information Sync Installation Instruction SharePoint AD Information Sync Installation Instruction System Requirements Microsoft Windows SharePoint Services V3 or Microsoft Office SharePoint Server 2007. License management Click the trial link

More information

User Guide. Version 3.2. Copyright 2002-2009 Snow Software AB. All rights reserved.

User Guide. Version 3.2. Copyright 2002-2009 Snow Software AB. All rights reserved. Version 3.2 User Guide Copyright 2002-2009 Snow Software AB. All rights reserved. This manual and computer program is protected by copyright law and international treaties. Unauthorized reproduction or

More information

PLANNING AND DESIGNING GROUP POLICY, PART 1

PLANNING AND DESIGNING GROUP POLICY, PART 1 84-02-06 DATA SECURITY MANAGEMENT PLANNING AND DESIGNING GROUP POLICY, PART 1 Melissa Yon INSIDE What Is Group Policy?; Software Settings; Windows Settings; Administrative Templates; Requirements for Group

More information

Mapping ITS s File Server Folder to Mosaic Windows to Publish a Website

Mapping ITS s File Server Folder to Mosaic Windows to Publish a Website Mapping ITS s File Server Folder to Mosaic Windows to Publish a Website April 16 2012 The following instructions are to show you how to map your Home drive using ITS s Network in order to publish a website

More information

How to Use Remote Access Using Internet Explorer

How to Use Remote Access Using Internet Explorer Introduction Welcome to the Mount s Remote Access service. The following documentation is intended to assist first time or active users with connecting, authenticating and properly logging out of Remote

More information

Ross Video Limited. DashBoard Server and User Rights Management User Manual

Ross Video Limited. DashBoard Server and User Rights Management User Manual Ross Video Limited DashBoard Server and User Rights Management User Manual DashBoard Server and User Rights Management User Manual Ross Part Number: 8351DR-004A-01 Release Date: March 22, 2011. Printed

More information

HOTPin Integration Guide: DirectAccess

HOTPin Integration Guide: DirectAccess 1 HOTPin Integration Guide: DirectAccess Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is provided 'as is'; Celestix assumes no responsibility

More information

Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services

Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services Course Number: 6425C Course Length: 5 Days Course Overview This five-day course provides in-depth training on implementing,

More information

Quick Start Guide. IT Management On-Demand

Quick Start Guide. IT Management On-Demand 1 Quick Start Guide Quick Start Guide IT Management On-Demand Introduction... 2 Getting Started... 3 Planning Your Deployment... 5 Performing a Test Deployment... 6 Enterprise Deployment Options... 8 Remote

More information

NetWrix Password Manager. Quick Start Guide

NetWrix Password Manager. Quick Start Guide NetWrix Password Manager Quick Start Guide Contents Overview... 3 Setup... 3 Deploying the Core Components... 3 System Requirements... 3 Installation... 4 Windows Server 2008 Notes... 4 Upgrade Path...

More information

User Management Guide

User Management Guide AlienVault Unified Security Management (USM) 4.x-5.x User Management Guide USM v4.x-5.x User Management Guide, rev 1 Copyright 2015 AlienVault, Inc. All rights reserved. The AlienVault Logo, AlienVault,

More information

Click Studios. Passwordstate. Password Discovery, Reset and Validation. Requirements

Click Studios. Passwordstate. Password Discovery, Reset and Validation. Requirements Passwordstate Password Discovery, Reset and Validation Requirements This document and the information controlled therein is the property of Click Studios. It must not be reproduced in whole/part, or otherwise

More information

Active Directory. By: Kishor Datar 10/25/2007

Active Directory. By: Kishor Datar 10/25/2007 Active Directory By: Kishor Datar 10/25/2007 What is a directory service? Directory Collection of related objects Files, Printers, Fax servers etc. Directory Service Information needed to use and manage

More information

Copyright Texthelp Limited All rights reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval

Copyright Texthelp Limited All rights reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval Copyright Texthelp Limited All rights reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system, or translated into any language, in any form, by any

More information

Global Image Management System For epad-vision. User Manual Version 1.10

Global Image Management System For epad-vision. User Manual Version 1.10 Global Image Management System For epad-vision User Manual Version 1.10 May 27, 2015 Global Image Management System www.epadlink.com 1 Contents 1. Introduction 3 2. Initial Setup Requirements 3 3. GIMS-Server

More information

Lesson Plans Microsoft s Managing and Maintaining a Microsoft Windows Server 2003 Environment

Lesson Plans Microsoft s Managing and Maintaining a Microsoft Windows Server 2003 Environment Lesson Plans Microsoft s Managing and Maintaining a Microsoft Windows Server 2003 Environment (Exam 70-290) Table of Contents Table of Contents... 1 Course Overview... 2 Section 0-1: Introduction... 4

More information

Getting Started With Delegated Administration

Getting Started With Delegated Administration Getting Started With Delegated Administration Delegated Administration (available with Websense v6.1 Corporate Editions) is a powerful tool for distributing filtering and reporting responsibilities for

More information