1 TABLE OF CONTENTS...1 CITRIX REMOTE ACCESS WINDOWS TABLE OF CONTENTS...1 ADDING CITRIX.AKERMAN.COM AS A TRUSTED SITE TO INTERNET EXPLORER INSTALLING THE ENDPOINT ANALYSIS...4 LOGGING OFF THE CITRIX REMOTE CONNECTION...9 FAQ...10 TROUBLESHOOTING...10 If you receive Access Denied...10
2 ADDING CITRIX.AKERMAN.COM AS A TRUSTED SITE TO INTERNET EXPLORER From Internet Explorer, click Tools (a) and Internet Options (b). 2. Select the Security tab (a). Click Trusted Sites (b). Sites (c). Check bock for Enable Protected Mode should be unchecked.
3 3. Delete any existing text in the Add this website to the zone: field. Type https://citrix.akerman.com (a) and click Add (b). 4. Click Close in the Trusted Sites window and click OK to close the Internet Options window.
4 INSTALLING THE ENDPOINT ANALYSIS Before connecting to and using the Citrix Access Gateway for the first time, you will need to install the EndPoint Analysis (EPA) scanning client on your pc or laptop. The EPA software is designed to protect you and Akerman s assets with an extra security blanket. It provides the assurance that end devices will be at a certain security standard level prior to connecting to Akerman s internal resources. As part of this scan process, and in addition to the EPA installation, an antivirus and firewall software package will have to be present on the device trying to connect to Citrix. Following are windows and prompts that will be displayed when trying to establish a connection: 1. Open your internet browser. In the address bar, type citrix.akerman.com and press Enter. 2. You will be asked to download and install the Citrix EndPoint Analysis Plugin. The plugin will be installed and various security settings will be verified on your computer. 3. Click on the Download button to download and install the Citrix EndPoint Plugin. If you click the Skip Check button, an "access denied" page will be displayed. 4. At the File Download window: a. Click Run. b. Click Install. c. Click Finish.
5 5. When the EPA Plugin has been installed, the Citrix Endpoint Analysis window will be displayed (see below).
6 6. Click Always to bypass this window in the future. Your computer will be checked for compliance. Note: Please be patient and allow the process to finish. 7. If the compliance check is unsuccessful, please see the Troubleshooting section at the end of this document. 8. If the compliance check is successful, the Citrix login screen will be displayed. Enter your network Username, Password and Tokencode. Note: Citrix will run a diagnostic test on your machine to check if you have the application installed and/or if you have the correct version. 9. Click in the checkbox to agree to the Citrix licensing terms and click INSTALL.
7 Note: If you do not agree to terms and do not check the box, the application will not be installed. 10. Click Run. Note: If you receive the Citrix Helper Control window, click the bar to add the add-in. 11. Select the Applications (default) or Desktops tab. Click the Applications tab and click Akerman Applications or Akerman Utilities folder to expand. Akerman Applications: Grant access to individual applications such as Outlook, Expedition, etc.
8 Click the Desktops tab and click Akerman Desktop or Akerman Desktop Windowed. Akerman Desktop: Grants access to the Akerman environment as if you were in the office. The window will be full screen. Akerman Desktop Windowed: Grants Access to the Akerman environment as if you were in the office but allows easy access to your local machine (Start Menu, Taskbar, etc.). 12. When connected, your Citrix session will launch. (Example of Akerman Desktop display)
9 LOGGING OFF THE CITRIX REMOTE CONNECTION 1. From the Akerman Desktop, click Start (a) and Log Off (b). Note: If you have launched individual applications, exit out of the application(s). 2. Click Log Off. 3. Click Log Off.
10 FAQ 1. What if I do not have permission to download to the machine I am currently on? (Example: Working at a friend s house, logging in at hotel business center.) You will not be able to access Citrix. 2. Which internet browsers can I use? The Gateway can be accessed from the following browsers: Internet Explorer 8.0 and higher, and Safari. 3. After you log into citrix.akerman.com, hover your mouse over the down-arrow next to Log Off and click Reconnect. 4. How long do I have before my session terminates due to inactivity? Your Citrix session will terminate after 8 hours of inactivity. TROUBLESHOOTING 1. Click on the Citrix Loing Help Link for remediation. IMPORTANT!!!!! If you have any questions or issues please contact the Help Desk: Internal Tel. Ext.: External Tel.: (407)
Zanibal Plug-in For Microsoft Outlook Installation & User Guide Version 1.1 Zanibal LLC Phone: +1-408-887-0480, +234-1-813-1744 Email: firstname.lastname@example.org www.zanibal.com Copyright 2012, Zanibal LLC. All
formerly Help Desk Authority 9.1.3 Upgrade Guide 2 Contacting Quest Software Email: Mail: Web site: email@example.com Quest Software, Inc. World Headquarters 5 Polaris Way Aliso Viejo, CA 92656 USA www.quest.com
Contents Page Q. How do I access my email? Q. How do I change or reset a password for an email account? Q. How do I forward or redirect my messages to a different email address? Q. How do I set up an auto-reply
CIT Table of Contents Introduction... 1 General Wireless Settings... 1 1. Windows XP Wireless Configuration... 2 2. Windows XP Intel Pro Wireless Tool... 7 3. Windows Vista Using the Windows Wireless Tools...
Migrating From Bobcat Mail To Google Apps (Using Microsoft Outlook and Google Apps Sync) This document is intended for those users moving from WVWC s Bobcat Mail system to the new Google Apps mail system
Secure File Sharing FAQ & Troubleshooting Tips Q: I am accessing Secure File Sharing through a firewall. What should I do? A: Provide the following firewall rules to your IT Professional. Firewall Rules
COX BUSINESS ONLINE BACKUP Quick start Guide www.cox.com Services and features not available in all areas and package options vary by market. Rates and speeds vary by market. Number of users and network
owncloud Configuration and Usage Guide This guide will assist you with configuring and using YSUʼs Cloud Data storage solution (owncloud). The setup instructions will include how to navigate the web interface,
Cox Business Premium Online Backup USER'S GUIDE Cox Business VERSION 1.0 Table of Contents ABOUT THIS GUIDE... 4 DOWNLOADING COX BUSINESS PREMIUM ONLINE BACKUP... 5 INSTALLING COX BUSINESS PREMIUM ONLINE
COMPREHENSIVE INTERNET SECURITY SonicWALL Internet Security Appliances SonicWALL SSL-VPN 2.1 User s Guide Using This Guide About this Guide...................................................... 5 Organization
IT Quick Reference Guides Connecting to SU-Secure using Windows 8 Windows 8 Guides CONNECTING TO SU-SECURE WI-FI This document will give you instructions on how to connect your Windows 8 Computer to our
Connecting to the MBC Guest wireless network requires: FAQ s at end of document A. A connection to the wireless network SSID (identifier for a wireless LAN) from your laptop. B. Authentication to the MBC
Redstone Federal Credit Union Answers to Frequently Asked Questions Online Banking Getting Started How do I sign-up for online banking? Visit our website homepage (www.redfcu.org) and click the Sign up
User Guide Remote PIV to VDI Using a PIV Card Energy IT Services (IM-64) March 2015 Authors Prepared By Matthew Cummings Senior Systems Engineer IM-64 Version Control Date Version Document Revision Description
Archive Add-in Administrator Guide RESTRICTION ON USE, PUBLICATION, OR DISCLOSURE OF PROPRIETARY INFORMATION Copyright 2011 McAfee, Inc. This document contains information that is proprietary and confidential
COMPREHENSIVE INTERNET SECURITY SonicWALL Secure Remote Access Appliances SonicWALL SSL VPN 5.0 User s Guide Table of Contents Using This Guide About this Guide......................................................
Arkay Remote Data Backup Client Quick Start Guide Version 188.8.131.52 September 2005 Quick Start Guide It's easy to get started with Arkay Remote Data Backup and Recovery Service. To start using Arkay Remote
FAQ How does the new Big Bend Backup (powered by Keepit) work? Once you establish which of the folders on your hard drive you ll be backing up, you ll log into myaccount.bigbend.net and from your control
TeamViewer 7 Manual Remote Control TeamViewer GmbH Kuhnbergstraße 16 D-73037 Göppingen www.teamviewer.com Table of Contents 1 About TeamViewer... 5 1.1 About the software... 5 1.2 About the manual... 5
WA2262 Applied Data Science and Big Data Analytics Boot Camp for Business Analysts Classroom Setup Guide Web Age Solutions Inc. Copyright Web Age Solutions Inc. 1 Table of Contents Part 1 - Minimum Software
Page 1 of 14 ! " #!"#$ % &&' Page 2 of 14 1 INTRODUCTION One of the highly desirable features of the GlobeSurfer III device is the ability to network together Printers and External Hard Disk drives (aka
Single Sign-On in SonicOS Enhanced 5.6 Document Scope This document describes how to install and configure the Single Sign-On feature in the SonicOS Enhanced 5.6 release. This document contains the following
2008 Netgotiator AlterEGO User s Manual Getting Started with Netgotiator AlterEGO Netgotiator AlterEGO is a SaaS (Software as a Service) solution of EXILLION extreme value technologies NETGOTIATOR DOCUMENTATION
CruzNet Secure Set-Up Instructions for Windows Vista 1. In order to start using CruzNet Secure, you'll first need to create a password at https://vpn.soe.ucsc.edu/. Click on the reset your password link.
1 Windows 8 Upgrade Assistant User Guide Laplink Software, Inc. For technical support issues or questions, please visit: http://www.laplink.com/contact For other inquiries, please see contact details below: