Quest Soft Token for Windows Phone User Guide
|
|
|
- Alexandra Carter
- 9 years ago
- Views:
Transcription
1 Quest Soft Token for Windows Phone User Guide What is the Quest Soft Token for Windows Phone? The Quest Soft Token for Windows Phone is a two-factor authentication token that can be used with any OATH-compliant authentication server, such as Quest Defender, to gain secure access to network, web, and applications-based resources. Figure 1 The picture above shows an example of the Quest Soft Token for Windows Phone displayed on the Windows Phone. The token response is used as the One Time Password (OTP) when prompted to authenticate.
2 Installing the Quest Soft Token for Windows Phone Software using Windows Phone Marketplace The Quest Soft Token for Windows Phone can be downloaded and installed in the same way as any other Windows Phone application, as described below: 1. On your Windows phone device, select Marketplace. 2. Select the search button and enter Quest Soft Token. 3. Select on the Quest Soft Token application 4. Select Install. 5. The Quest Soft Token for Windows will now be available on your Windows Phone. Activating the Quest Soft Token for Windows Phone In order to use the Quest Soft Token for Windows Phone for token authentication an activation code is required. This may be provided by your Defender administrator or, if available, through the Defender Token Deployment System. More than one token can be activated and used on your Windows phone device. This section details the steps required for both types of activation. Using an Activation Code Provided by your Administrator To activate the Quest Soft Token for Windows Phone you need to import the activation code, provided to you by the administrator of your authentication server, onto your Windows Phone device. To do this: 1. On your Windows Phone device, select the Quest Soft Token for Windows Phone application to display the token screen. 2. Select the add token sign. 2
3 Multiple Tokens can be activated on a single Windows Phone device. 3. Enter a Token Name that you wish to use. Enter your activation code in the Enter Activation Code box. 4. Select activate. On completion, the Successfully activated message is displayed. 5. Select ok to continue 6. Your token will now display your token response 3
4 Please ensure that the activation code is entered correctly. If it is not entered correctly, you will receive incorrect token responses that will not be valid for authentication to the Defender Server. Using the Defender Token Deployment System The Defender Token Deployment System is a web based application that allows for the Quest Soft Token for Windows Phone to be requested directly through a local web site. The Token Deployment System is an optional Defender component. For full instructions on using the Defender Token Deployment System please refer to the Defender Token Deployment System User Guide. These instructions refer to the token activation process only. 1. After choosing the Quest Soft Token for Windows Phone from the Token Deployment System website and completing the verification process the Install and Activate Token web page is displayed. 4
5 2. This page provides the following a link to download the token software from the Windows Phone Marketplace this option should be used if your device is a Windows Phone a link to download the token software from - this option should be used if your device is a Windows Mobile the activation code, which can be copied and pasted to the Enter Activation Code dialog on your device. An option to send these details to your address. DOWNLOAD TOKEN SOFTWARE Using this link will display the Windows Phone Marketplace allowing for the Quest Soft Token to be downloaded DOWNLOAD TOKEN SOFTWARE The Quest Soft Token for Windows Mobile software can be downloaded from Using this link will download the Defender Windows Mobile Token Setup.msi and setup.exe installers. ACTIVATION CODE The activation code for your token can be copied and pasted in to the Enter Activation Code dialog on your Windows Phone device. Please see the Using an Activation code provided by your administrator for complete details on this process. 5
6 OPTION A link is provided to send the web page information to an address. By default this will be the address configured on your AD user account. Optionally your system administrator may allow the address to be changed so that the information can be sent to a different address. Select Send to send the details, a confirmation will be displayed on the webpage that the e- mail has been sent. Menu Options Renaming a Token You can rename the tokens you add to your Windows Phone device within the Quest Soft Token for Windows Phone Application: 1. On your Windows Phone device, select the Quest Soft Token for Windows Phone application to display the token screen. 2. Select token you wish to rename 3. Select rename. 4. Enter the new name you wish to give your token. Select the Back icon to rename your token 5. Select the Back icon to go back to the tokens screen 6
7 Deleting a Token You can delete the tokens you add to your Windows Phone device within the Quest Soft Token for Windows Phone Application: 1. On your Windows Phone device, select the Quest Soft Token for Windows Phone application to display the token screen. 2. Select and hold the token you wish to delete 3. Select delete. 4. Select ok. 7
8 Token Information You can find out information about your token e.g. serial number on your Windows Phone device within the Quest Soft Token for Windows Phone Application: 1. On your Windows Phone device, select the Quest Soft Token for Windows Phone application to display the token screen. 2. Select Tokens. 3. Your Token information will be displayed. Using the Quest Soft Token for Windows Phone for Authentication Once the Quest Soft Token for Windows Phone has been activated, the token response is displayed on the screen of your Windows Phone device. 1. On your Windows Phone device, select the Quest Soft Token for Windows Phone application to display the token screen. 2. If more than one token is installed then select tokens and select the token you wish to view. Select the Back icon. 8
9 3. Your token response will be displayed on your Windows Phone device Press the button to generate the next response. The 6 digit value is your One Time Password (OTP). You will be prompted to enter the OTP during the authentication process. 9
10 Authentication Procedure The following example takes you step-by-step through a user authentication procedure using Quest Defender as the authentication server: 1. The user attempts to access a website protected by Defender and is prompted to authenticate. 2. The user now enters the OTP response displayed on the Windows Phone, e.g , into the Defender Authentication field. 3. If the response is entered correctly, the user is authenticated by Defender and allowed access to the protected website. 10
11 Uninstalling using the Windows Phone Device 1. On your Windows Phone device, hold on the Quest Soft Token for Windows Phone. 2. Select uninstall 3. A confirmation box will appear to check that you wish to uninstall the application. Select yes 4. The Quest Soft Token for Windows Phone is now uninstalled from your Windows Phone device Quest Software, Inc. ALL RIGHTS RESERVED. Quest, Quest Software, the Quest Software logo are trademarks and registered trademarks of Quest Software, Inc. in the United States of America and other countries. Other trademarks and registered trademarks are property of their respective owners. 11
Quest Soft Token for Windows Mobile User Guide
Quest Soft Token for Windows Mobile User Guide This guide provides information on installing, activating and using the Quest Windows Mobile Token. What is the Quest Soft Token for Windows Mobile The Quest
Defender 5.7 - Token Deployment System Quick Start Guide
Defender 5.7 - Token Deployment System Quick Start Guide This guide describes how to install, configure and use the Defender Token Deployment System, based on default settings and how to self register
SharePoint List Filter Favorites Installation Instruction
SharePoint List Filter Favorites Installation Instruction System Requirements Microsoft Windows SharePoint Services v3 or Microsoft Office SharePoint Server 2007. License Management Click link in Organize
Defender EAP Agent Installation and Configuration Guide
Defender EAP Agent Installation and Configuration Guide Introduction A VPN is an extension of a private network that encompasses links across shared or public networks like the Internet. VPN connections
Software Token. Installation and User Guide. 2013 MasterCard Proprietary. All rights reserved.
Software Token Installation and User Guide 2013 MasterCard Proprietary. All rights reserved. Contents Overview... 1 Install the RSA Client Desktop Application... 1 Download and Save the RSA Desktop Application...
User Guide. SafeNet MobilePASS for Windows Phone
SafeNet MobilePASS for Windows Phone User Guide Technical Manual Template Release 1.0, PN: 000-000000-000, Rev. A, March 2013, Copyright 2013 SafeNet, Inc. All rights reserved. 1 Document Information Product
Windows Live Mail Setup Guide
Versions Addressed: Windows Live Mail 2011 Document Updated: 11/24/2010 Copyright 2010 Purpose: This document will assist the end user in configuring Windows Live Mail to access a POP3 email account hosted
Internet Explorer 7 for Windows XP: Obtaining MIT Certificates
Internet Explorer 7 for Windows XP: Obtaining MIT Certificates Overview In order to use secure web services at MIT, you will need to obtain two types of MIT web certificates: MIT Certificate Authority
SharePoint Wiki Redirect Installation Instruction
SharePoint Wiki Redirect Installation Instruction System Requirements: Microsoft Windows SharePoint Services v3 or Microsoft Office SharePoint Server 2007. License management: To upgrade from a trial license,
info@hand Plug-in for Microsoft Outlook User Guide
info@hand Plug-in for Microsoft Outlook User Guide Version 1.2 September 2007. This document is subject to change without notice. Disclaimer While every effort has been made to ensure the accuracy and
MAC OS X 10.5 Mail Setup
MAC OS X 10.5 Mail Setup Automatically Configuring Mail Manually Configuring Mail Changing Mail Settings Automatically Configuring Mail Mail in Mac OS X 10.5 includes the automatically set up account option.
Accessing Derbyshire County Council s Outlook Web Access (OWA) Service. Smart Phone App version
Accessing Derbyshire County Council s Outlook Web Access (OWA) Service Smart Phone App version Contents About this guide... 2 Before accessing Outlook Web Access... 3 Accessing Outlook Web Access (OWA)
SECURE MOBILE ACCESS MODULE USER GUIDE EFT 2013
SECURE MOBILE ACCESS MODULE USER GUIDE EFT 2013 GlobalSCAPE, Inc. (GSB) Address: 4500 Lockhill-Selma Road, Suite 150 San Antonio, TX (USA) 78249 Sales: (210) 308-8267 Sales (Toll Free): (800) 290-5054
Defender Configuring for Use with GrIDsure Tokens
Defender Configuring for Use with GrIDsure Tokens Introduction The GrIDsure token can be used to protect any website hosted on Internet Information Server (IIS). This guide provides information for the
Uninstall Check Scanning software (Fujitsu S300)
Uninstall Check Scanning software (Fujitsu S300) Contents What software do you need to remove?... 2 Stop the I2iA and ScanSnap services... 2 Uninstall Active X controls... 4 If you have Internet Explorer
8x8 Virtual Office Telephony Interface for Salesforce
8x8 Virtual Office Telephony Interface for Salesforce Administrator Guide May 2014 The Champion For Business Communications Table of Contents 8x8 Virtual Office Telephony Interface for Salesforce.... 3
Configuring Outlook 2013 For IMAP Connections
Configuring Outlook 2013 For IMAP Connections VERSION 1.0 1 P a g e U A C o n n e c t C o n f i g u r i n g O u t l o o k 2013 f o r I M A P 12/2013 Configuring Outlook 2013 for IMAP Connections Overview
5. For Display name, Your Full Name or the name you want to appear in the from box when writing or responding to e-mail click Next
Setting up Outlook Express. 1. Open Outlook Express 2. From Tools menu a. Choose Accounts. 3. Click Add button a. Choose Mail 5. For Display name, Your Full Name or the name you want to appear in the from
SafeWord Domain Login Agent Step-by-Step Guide
SafeWord Domain Login Agent Step-by-Step Guide Author Johan Loos Date January 2009 Version 1.0 Contact [email protected] Table of Contents Table of Contents... 2 Why SafeWord Agent for Windows Domains?...
STATISTICA VERSION 10 STATISTICA ENTERPRISE SERVER INSTALLATION INSTRUCTIONS
Notes: STATISTICA VERSION 10 STATISTICA ENTERPRISE SERVER INSTALLATION INSTRUCTIONS 1. The installation of the STATISTICA Enterprise Server entails two parts: a) a server installation, and b) workstation
Exchange 2003 Mailboxes
Exchange 2003 Mailboxes Microsoft will stop supporting Exchange 2003 mailboxes in 2014 as it comes to the end of it s life. To maintain our levels of support and performance of all our customers, we will
MCBDirect Corporate Logging on using a Soft Token
MCBDirect Corporate Logging on using a Soft Token Document issue: 2.1 Date of issue: September 2014 Contents About Soft Token authentication... 3 Logging onto MCBDirect Corporate online banking... 4 Soft
MICROSOFT STEP BY STEP INTERACTIVE VERSION 3.0 ADMINISTRATION GUIDE
MICROSOFT STEP BY STEP INTERACTIVE VERSION 3.0 ADMINISTRATION GUIDE Part 1: Network Installation Guide Introduction Part 1 of this document provides instructions for installing Microsoft Interactive Training
HOW TO SILENTLY INSTALL CLOUD LINK REMOTELY WITHOUT SUPERVISION
HOW TO SILENTLY INSTALL CLOUD LINK REMOTELY WITHOUT SUPERVISION Version 1.1 / Last updated November 2012 INTRODUCTION The Cloud Link for Windows client software is packaged as an MSI (Microsoft Installer)
Configuring a YubiKey for the YubiCloud
Configuring a YubiKey for the YubiCloud With the YubiKey Cross-Platform Personalization Tool April 9, 2013 Configuring a YubiKey for the YubiCloud 2012 Yubico. All rights reserved. Page 1 of 8 Introduction
9243054 Issue 1. Nokia and Nokia Connecting People are registered trademarks of Nokia Corporation
9243054 Issue 1 Nokia and Nokia Connecting People are registered trademarks of Nokia Corporation VPN Client User s Guide 9243054 Issue 1 Reproduction, transfer, distribution or storage of part or all of
MSI Admin Tool User Guide
MSI Admin Tool User Guide Introduction The MSI Admin Tool is a utility which allows you to pre-configure your Read&Write installation package prior to installation. The tool is primarily designed to be
Web Connect Guide MFC-J825DW MFC-J835DW. Version 0 USA
Web Connect Guide MFC-J825DW MFC-J835DW Version 0 USA Definitions of notes We use the following icon throughout this user s guide: s tell you how you should respond to a situation that may arise or give
4cast Client Specification and Installation
4cast Client Specification and Installation Version 2015.00 10 November 2014 Innovative Solutions for Education Management www.drakelane.co.uk System requirements The client requires Administrative rights
Using Entrust certificates with Microsoft Office and Windows
Entrust Managed Services PKI Using Entrust certificates with Microsoft Office and Windows Document issue: 1.0 Date of issue: May 2009 Copyright 2009 Entrust. All rights reserved. Entrust is a trademark
Contactegration for The Raiser s Edge
Contactegration for The Raiser s Edge [email protected] www.zeidman.info UK: 020 3637 0080 US: (646) 570 1131 Table of Contents Overview... 3 Installation... 3 Set up... 4 Activation... 5 Connecting
Web Connect Guide. Version A USA
Web Connect Guide Version A USA Applicable models This User s Guide applies to the following models: ADS-500W. Definitions of notes We use the following note style throughout this user s guide: Notes tell
Connecting To SOM Network Drives With Windows XP
Connecting To SOM Network Drives With Windows XP The first step to take is to make sure that you are using the UCSF VPN client when you connect. If you do not have a VPN username and password, you will
Miami University RedHawk Cluster Connecting to the Cluster Using Windows
Miami University RedHawk Cluster Connecting to the Cluster Using Windows The RedHawk cluster is a general purpose research computing resource available to support the research community at Miami University.
Using Windows Task Scheduler instead of the Backup Express Scheduler
Using Windows Task Scheduler instead of the Backup Express Scheduler This document contains a step by step guide to using the Windows Task Scheduler instead of the Backup Express Scheduler. Backup Express
Add in Guide for Microsoft Dynamics CRM May 2012
Add in Guide for Microsoft Dynamics CRM May 2012 Microsoft Dynamics CRM Addin Guide This document will guide you through configuration of the Microsoft Dynamics CRM addin. Microsoft Dynamics CRM is a bit
User Profile Manager 2.6
User Profile Manager 2.6 User Guide ForensiT Limited, Innovation Centre Medway, Maidstone Road, Chatham, Kent, ME5 9FD England. Tel: US 1-877-224-1721 (Toll Free) Intl. +44 (0) 845 838 7122 Fax: +44 (0)
Global Image Management System For epad-vision. User Manual Version 1.10
Global Image Management System For epad-vision User Manual Version 1.10 May 27, 2015 Global Image Management System www.epadlink.com 1 Contents 1. Introduction 3 2. Initial Setup Requirements 3 3. GIMS-Server
Defender Group Policy Templates Installation and Configuration Guide
Defender Group Policy Templates Installation and Configuration Guide Introduction Defender provides two Group Policy administrative templates that can be used to provide additional features and configuration
Joining Windows machines to eduroam Using SecureW2
Joining Windows machines to eduroam Using SecureW2 Connecting to the eduroam infrastructure from a Windows 7 machine requires the installation of a special authentication adaptor (called a "supplicant"
Apple Mail Setup Guide (POP3)
Versions Addressed: Mac OS X 10.4 (Tiger), 10.5 (Leopard), 10.6 (Snow Leopard) Document Updated: 9/23/2010 Copyright 2010 Smarsh, Inc. All rights Purpose: This document will assist the end user in configuring
PaperClip. em4 Cloud Client. Setup Guide
PaperClip em4 Cloud Client Setup Guide Copyright Information Copyright 2014, PaperClip Inc. - The PaperClip32 product name and PaperClip Logo are registered trademarks of PaperClip Inc. All brand and product
Dell Statistica 13.0. Statistica Enterprise Installation Instructions
Dell Statistica 13.0 2015 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license or
User Guide May 2013. Using Certificates in Outlook Express
User Guide May 2013 Using Certificates in Outlook Express FIGU RES... FIGURES.... T I TL E..............................................................................................................................
Guide to Installing BBL Crystal MIND on Windows 7
Guide to Installing BBL Crystal MIND on Windows 7 Introduction The BBL Crystal MIND software can not be directly installed on the Microsoft Windows 7 platform, however it can be installed and run via XP
STATISTICA VERSION 9 STATISTICA ENTERPRISE INSTALLATION INSTRUCTIONS FOR USE WITH TERMINAL SERVER
Notes: STATISTICA VERSION 9 STATISTICA ENTERPRISE INSTALLATION INSTRUCTIONS FOR USE WITH TERMINAL SERVER 1. These instructions focus on installation on Windows Terminal Server (WTS), but are applicable
To download and install directly to your phone
Important update: To continue logging in from T-Mobile HotSpot locations, you will need to update the T-Mobile HotSpot Login Utility on your Dash. This upgrade takes only a few minutes. There are two ways
iphone in Business How-To Setup Guide for Users
iphone in Business How-To Setup Guide for Users iphone 3G is ready for business. It supports Microsoft Exchange ActiveSync, delivering push email, calendars, and contacts. And it gives mobile users secure
PaperClip. em4 Cloud Client. Manual Setup Guide
PaperClip em4 Cloud Client Manual Setup Guide Copyright Information Copyright 2014, PaperClip Inc. - The PaperClip32 product name and PaperClip Logo are registered trademarks of PaperClip Inc. All brand
Remote Access VPN SSL VPN Access via Internet Explorer
The following instructions will allow you to access your company network remotely, via your Internet Explorer web browser. 1. Launch Internet Explorer and choose Internet Options from the Tools menu. 2.
ATTENTION: End users should take note that Main Line Health has not verified within a Citrix
Subject: Citrix Remote Access using PhoneFactor Authentication ATTENTION: End users should take note that Main Line Health has not verified within a Citrix environment the image quality of clinical cal
To configure Outlook Express for your InfoMetrics E-mail address:
To configure Outlook Express for your InfoMetrics E-mail address: 1. Open Outlook Express 2. Click the Tools menu, and select Accounts... 3. Internet Accounts window will open, click Add and menu will
Google Drive. Administrator's Guide
Google Drive Administrator's Guide November 2015 www.lexmark.com Contents 2 Contents Overview... 3 Configuring the application...4 Acquiring a Google account... 4 Accessing the configuration page for the
PaymentNet Federal Card Solutions Cardholder FAQs
PaymentNet Federal Card Solutions It s easy to find the answers to your questions about PaymentNet! June 2014 Frequently Asked Questions First Time Login How do I obtain my login information?... 2 How
Outlook Plugin. What is MangoApps for Outlook?
MangoApps for Outlook Plugin Windows - MangoApps for Windows is a single app that integrates Messenger, Outlook and Office Plugins into one unit and combines it with the secure, robust document management
Remote Working Service Remote Access - VDI User Instructions
Remote Working Service Remote Access - VDI User Instructions Created By: Devilliers Swart Created Date: 12/02/14 Document Version 1.5a Page 1 Prerequisites Check List Please note these instructions are
Symantec Enterprise Vault
Symantec Enterprise Vault Guide for Microsoft Outlook 2003/2007 Users 10.0 Light Outlook Add-In Symantec Enterprise Vault: Guide for Microsoft Outlook 2003/2007 Users The software described in this book
Stellar Phoenix Exchange Server Backup
Stellar Phoenix Exchange Server Backup Version 1.0 Installation Guide Introduction This is the first release of Stellar Phoenix Exchange Server Backup tool documentation. The contents will be updated periodically
Quick Troubleshooting Guide: Authentication Issues
Defender Quick Troubleshooting Guide: Authentication Issues Introduction This guide is provided for use by Defender administrators to help troubleshoot common Defender authentication issues. It also provides
WatchDox for Mac User Guide
WatchDox for Mac User Guide Version 2.3.0 Confidentiality This document contains confidential material that is proprietary to WatchDox. The information and ideas herein may not be disclosed to any unauthorized
About the Canon Mobile Scanning MEAP Application
About the Canon Mobile Scanning MEAP Application Canon Mobile Scanning MEAP Application (referred to as "this product" hereafter) is a MEAP application that supports receiving data scanned by an imagerunner
Active Directory Software Deployment
APPLICATION N0TE ST-0128 March 24, 2006 Product: Active Directory / PCM Deployment System version: ShoreTel 6 Active Directory Software Deployment Courtesy of: Dylan Moser with LANtelligence Inc. This
OCS Client Installation - Quick Start Guide. Web Conferencing & Secure Instant Messaging via Microsoft Office Communications Server 2007
OCS Client Installation - Quick Start Guide Web Conferencing & Secure Instant Messaging via Microsoft Office Communications Server 2007 Document Revision: March, 2010 Quick Start Guide / Introduction Page
Jumble for Microsoft Outlook
Jumble for Microsoft Outlook Jumble is a zero knowledge, end- to- end email encryption solution that integrates with existing email platforms. Jumble integrates at the email client level and removes the
Microsoft Dynamics GP. Business Analyzer
Microsoft Dynamics GP Business Analyzer April 5, 2013 Copyright Copyright 2013 Microsoft. All rights reserved. Limitation of liability This document is provided as-is. Information and views expressed in
SafeNet Authentication Manager Express. Upgrade Instructions All versions
SafeNet Authentication Manager Express Upgrade Instructions All versions www.safenet-inc.com 4690 Millennium Drive, Belcamp, Maryland 21017 USA Telephone: +1 410 931 7500 or 1 800 533 3958 www.safenet-inc.com
Outlook 2010 Setup Guide (POP3)
Versions Addressed: Microsoft Office Outlook 2010 Document Updated: 8/31/2012 Copyright 2012 Smarsh, Inc. All rights Purpose: This document will assist the end user in configuring Outlook 2010 to access
Installation Guide. (You can get these files from http://www.clariostechnology.com/intelligentreports/install)
Clarios Technology Pty. Ltd. Intelligent Reporter Installation Guide Installing Intelligent Reports JIRA plugin The Intelligent Reports plugin for JIRA is available through the Atlassian Marketplace. Follow
Connecting to eduroam using Windows 8
Connecting to eduroam using Windows 8 GUIDE User Services IT Services University of Malta 2013 User Services IT Services University of Malta Msida MSD 2080 Malta May only be reproduced with permission.
Tutorial. Patch Management
Tutorial Patch Management 2011 DeskCenter Solutions AG Table of Contents 1. Introduction...3 2. Software deployer...4 2.1 Preparing the software deployer...4 2.2 Configuring software deployers...4 3. Central
How to configure your Mac post migrating to Microsoft Office 365
How to configure your Mac post migrating to Microsoft Office 365 1 Contents Purpose... 3 Document support boundaries... 3 Examples used in this document... 3 Apple Mail on Mac OS X 10.6 (Snow Leopard)
Email: Gmail Or other POP3
Set up Gmail account (steps are mirrored for other POP3 Email) 1.Touch Email on the home screen. 2.Touch Google. 3.Read the message and touch Next. 4.Touch Create. (Or, if you already have a Google account,
Configuration Manager Wizard
Configuration Manager Wizard Quick Start The Configuration Manager Wizard enables you to configure Tenor products in a simple, easy-to-use GUI, which is part of the Tenor Configuration Manager. The Configuration
Booth Gmail Configuration
Student email is accessed via a Booth branded Gmail service. Student mailboxes will be accessed via Gmail. Configure Gmail Settings Before you connect Gmail to send and receive Booth Gmail on your mobile
Configuring IBM Cognos Controller 8 to use Single Sign- On
Guideline Configuring IBM Cognos Controller 8 to use Single Sign- On Product(s): IBM Cognos Controller 8.2 Area of Interest: Security Configuring IBM Cognos Controller 8 to use Single Sign-On 2 Copyright
Sendspace Wizard Desktop Tool Step-By-Step Guide
Sendspace Wizard Desktop Tool Step-By-Step Guide Copyright 2007 by sendspace.com This publication is designed to provide accurate and authoritative information for users of sendspace, the easy big file
IIS, FTP Server and Windows
IIS, FTP Server and Windows The Objective: To setup, configure and test FTP server. Requirement: Any version of the Windows 2000 Server. FTP Windows s component. Internet Information Services, IIS. Steps:
Avaya Modular Messaging Microsoft Outlook Client Release 5.2
Avaya Modular Messaging Microsoft Outlook Client Release 5.2 Important: Instructions in this guide are applicable only if your message store is the Avaya Message Storage Server (MSS) or Microsoft Exchange
Sentinel Protection Installer Version 7.1.1 (Windows) ReadMe
Sentinel Protection Installer Version 7.1.1 (Windows) ReadMe This readme provides an overview of the Sentinel TM Protection Installer, its installation and a few tips on using the related components (such
Windows Mail POP Instructions - Bloomsburg University Students
1. Open Windows Mail from your Start Menu. 2. Click on the Tools menu and click Accounts. 1 3. Click on Add to add your account. 4. Click on Email Account and then click Next. 2 5. Enter your full name
Hypercom Key Loading and Management (HKLM) RS232 PPP Key Injection PC Setup Guide
Hypercom Key Loading and Management (HKLM) RS232 PPP Key Injection PC Setup Guide Hypercom Corporation 8888 East Raintree Drive Scottsdale, Arizona 85260 USA Corporate Telephone: 480.642.5000 Corporate
How to Setup your E-mail Account -Apple Mail for Mac OS X 1- Open Mail
How to Setup your E-mail Account -Apple Mail for Mac OS X 1- Open Mail 2- The welcome screen will appear as follow: Fill in the above information as follow Full Name: type your display name E-Mail address:
Inmagic ODBC Driver 8.00 Installation and Upgrade Notes
Inmagic ODBC Driver 8.00 Installation and Upgrade Notes Thank you for purchasing the Inmagic ODBC Driver for DB/Text. This document is for new and upgrade customers. Use the Inmagic ODBC Driver to develop
Configure Single Sign on Between Domino and WPS
Configure Single Sign on Between Domino and WPS What we are doing here? Ok now we have the WPS server configured and running with Domino as the LDAP directory. Now we are going to configure Single Sign
PUBLIC. How to Use E-Mail in SAP Business One. Solutions from SAP. SAP Business One 2005 A SP01
PUBLIC How to Use E-Mail in SAP Business One Solutions from SAP SAP Business One 2005 A SP01 February 2007 Contents Purpose... 3 Sending an E-Mail... 4 Use... 4 Prerequisites... 4 Procedure... 4 Adding
Print Audit 6 - SQL Server 2005 Express Edition
Print Audit 6 - SQL Server 2005 Express Edition Summary This is a step-by-step guide to install SQL Server 2005 Express Edition to use as a database for Print Audit 6. Pre-Requisites There are a few pre-requisites
Banner Frequently Asked Questions (FAQs)
Banner Frequently Asked Questions (FAQs) How do I install Java?...1 Banner prompts me to download and install Java. Is this OK?....1 What Java version should I use?...2 How do I check what version of Java
Configure Outlook Express for Brandeis Gmail
Configure Outlook Express for Brandeis Gmail These instructions detail how to configure Outlook Express to access Brandeis Gmail. Note: You may need to change your UNet password before configuring your
Update Configuration. Reboot Phone To upload files to assist in diagnostics, you can choose:
Updating, Troubleshooting, and Resetting SoundPoint IP, SoundStation IP, and VVX 1500 Phones This quick tip provides step-by-step instructions on how to use multiple key combinations and phone menu options
CAE-Link Corporation. Building Design and Engineering Services. Dwg Manager. April 2004. AutoCAD 2000i through 2005. 1987 2004, CAE-Link Corporation
CAE-Link Corporation Building Design and Engineering Services Dwg Manager April 2004 AutoCAD 2000i through 2005 1987 2004, CAE-Link Corporation Copyright 2002-2003 CAE-Link Corporation All Rights Reserved
BIGPOND ONLINE STORAGE USER GUIDE Issue 1.1.0-18 August 2005
BIGPOND ONLINE STORAGE USER GUIDE Issue 1.1.0-18 August 2005 PLEASE NOTE: The contents of this publication, and any associated documentation provided to you, must not be disclosed to any third party without
Dell Statistica Document Management System (SDMS) Installation Instructions
Dell Statistica Document Management System (SDMS) Installation Instructions 2015 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described
Rohos Logon Key for Windows Remote Desktop logon with YubiKey token
Rohos Logon Key for Windows Remote Desktop logon with YubiKey token Step-by-Step Integration Guide. Tesline-Service S.R.L. 10 Calea Iesilor str., Chisinau, MD-2069, Moldova. Tel: +373-22-740-242 www.rohos.com
SharePoint AD Information Sync Installation Instruction
SharePoint AD Information Sync Installation Instruction System Requirements Microsoft Windows SharePoint Services V3 or Microsoft Office SharePoint Server 2007. License management Click the trial link
2. To encrypt the drive for future use, click Yes (Fig 1, 2). This will start the encryption process.
Dell Data Protection USB Drive Encryption Introduction To further protect PC s that have access to sensitive data, the Dell Data Protection (DDP) client detects and encrypts USB/Flash drives when they
TechNote. Contents. Introduction. System Requirements. SRA Two-factor Authentication with Quest Defender. Secure Remote Access.
Secure Remote Access SRA Two-factor Authentication with Quest Defender SonicOS Contents Introduction... 1 System Requirements... 1 Defender Configuration... 2 Dell SonicWALL SRA Configuration... 18 Two-factor
2-FACTOR AUTHENTICATION WITH
2-FACTOR AUTHENTICATION WITH 2X JUNE 2014 Two-Factor Authentication and Authy What is Two-Factor Authentication? Two-Factor Authentication is a process involving two stages to verify the identity of someone
How to install and use the File Sharing Outlook Plugin
How to install and use the File Sharing Outlook Plugin Thank you for purchasing Green House Data File Sharing. This guide will show you how to install and configure the Outlook Plugin on your desktop.
Microsoft Outlook 2000 Configuration Creation of a SPAM Filter
Microsoft Outlook 2000 Configuration Creation of a SPAM Filter This user guide aims to equip and facilitates users in creation of SPAM filtering mechanism to counter the ever increasing SPAM emails received
