SECURITY AND RESOURCE SHARING IN AN NT ENVIRONMENT

Size: px
Start display at page:

Download "SECURITY AND RESOURCE SHARING IN AN NT ENVIRONMENT"

Transcription

1 DATA SECURITY MANAGEMENT SECURITY AND RESOURCE SHARING IN AN NT ENVIRONMENT Gilbert Held INSIDE Overview; Share Creation; Setting Permissions; Multiple Identities; Considering Subfolders; Operational Control Because an understanding of the method by which shares are created facilitates an understanding of different levels of data security associated with resource sharing, this article examines in detail the creation of a shared folder on one computer and its access via another computer. In doing so, this article references a series of screen images that illustrate the actual use of the Windows NT operating system to create shares and discusses and describes methods that control access to shared resources, providing different levels of security concerning the ability of network users to access shared resources and, once accessed, their ability to manipulate data. OVERVIEW Windows NT provides users with the ability to share access to the contents of an entire drive or folder over a network. Although shares only operate at the drive and folder level, the operating system provides several methods to control access down to individual files. Because sharing is integrated with the operating system s database of user accounts and passwords, it is possible to restrict sharing to a specific user, a group of users, or several PAYOFF IDEA The ability to enable remote users to share resources on NT workstations and servers represents one of the major benefits of the use of this operating system. By enabling employees in an organization to share access to drives, folders, and files, one obtains the ability to significantly enhance productivity. However, one also provides the potential for other persons with access to the organization s network to either intentionally or unintentionally read or modify existing data as well as store new files whose contents could have an adverse effect on the operation of the organization. Thus, it is important to understand the options associated with Windows NT resource sharing, as they control access to shares as well as govern the level of security associated with network-based resources. Auerbach Publications

2 predefined user groups. In addition, because sharing is also integrated with the Windows NT file system, it is also possible to assign a variety of permissions to shared resources. However, the ability to do so depends on the file system used to create a volume. If a share resides on a volume created using the original File Allocation Table (FAT) file system that dates to the original IBM PC, shared resource permissions will be restricted to a series of basic permissions. In comparison, shares residing on a volume created through the use of the more modern NT File System (NTFS) can be assigned additional file-by-file permissions due to the enhanced level of capability of that file system. SHARE CREATION An appreciation for the security of data associated with resource sharing is best facilitated by creating a shared resource. Thus, this section will create a shared folder and examine how access to data in the folder can be controlled. The creation of a shared resource requires one first selects a drive or folder icon. Once that is accomplished, right-click on the previously selected icon to display a list of options associated with the drive or folder. Exhibit 1 illustrates the selection of the folder icon labeled PKZIPW located in the folder PKWARE and the resulting pop-up menu displayed as a result of right-clicking on the selected icon. Consider the selected folder to represent a subfolder or, for die-hard DOS fans, a subdirectory. From the pop-up menu displayed as a result of right-clicking on an icon, one can invoke sharing in one of two ways: either selecting the Properties or the Sharing menu entries. Selecting the Properties menu entry results in the display of a dialog box labeled Properties, prefixed with the name of the previously selected icon. That dialog box contains two tabs, as illustrated in Exhibit 2. The first tab is labeled General. The contents of this tab are displayed in the foreground and provide information about the selected icon, such as its location, storage size, contents, creation date, and any assigned attributes. The second tab, labeled Sharing, which is located in the background of the display, provides the ability to share the resource as well as control access to it. If one selects Properties from the pop-up menu shown in Exhibit 1, one would then have to select the Sharing tab shown in Exhibit 2. In comparison, if one selects the Sharing entry in the previously shown pop-up menu, the Sharing tab would be directly displayed. Thus, the selection of the Sharing entry from the pop-up menu can be considered as a small shortcut for accessing the sharing facility for a Properties dialog box for a selected drive or folder icon. Because one wants to create a share, one would either click on the tab labeled Sharing in Exhibit 2 or select Sharing from the pop-up menu en-

3 EXHIBIT 1 Right-clicking on a selected folder or drive icon results in a pop-up menu being displayed that enables a share to be created.

4 EXHIBIT 2 A folder or drive Properties dialog box contains two tabs, with the General tab providing information about the selected icon, while the tab labeled Sharing providing the ability to share the selected resource. try shown in Exhibit 1. Either action will result in the display of the Sharing tab for the Properties menu of the selected icon. Exhibit 3 illustrates the display of the Sharing tab for the previously selected PKZIPW folder. Several entries in the tab display were either placed by default by the operating system into an appropriate box or entered by the author of this article and will now be described as one takes a tour of the entries. When initially selecting a nonshared drive or folder, the button labeled Not Shared will be shown selected. When one clicks on the button labeled Shared As, the name of the folder by default will be placed in the box associated with the label Shared Name. One can enter a share name up to 80 characters in length; however, one should probably consider a

5 EXHIBIT 3 The Sharing tab in the Properties dialog box for a selected icon provides the ability to control resource sharing. much shorter name length, especially if the organization has Windows 95-based computers that will access the share. This is because a Windows 95 system cannot see a share name more than 12 characters in length. In addition, DOS and Windows for Workgroup users are restricted to the 8.3 DOS file naming convention; so, when in doubt as to who will access a share, it is best to use the lowest common denominator of naming restrictions. The actual composition of a share name can include all letters and numbers and the special characters $ % - ~! ( ) ^ # and &. If using long filenames, one can also include the six additional special characters +, : = [ and ]. One additional item that is worthy of mention concerns the use of the dollar sign ($) as a suffix to a share name. Doing so hides the share from direct viewing by other network users when browsing Net-

6 work Neighborhood and provides a bit of privacy. However, if improper permissions are assigned to the share, other users who know its Universal Naming Convention (UNC) address can access the data in the share. Note the down arrow to the right of the box for the Share Name. As noted shortly, the operating system provides the ability to share a resource under multiple names, allowing one to tailor access and permissions to each share name. Another word of caution is in order concerning share names: once a share is named, the only way to rename it is to disable it and then re-enable it using a new name. Continuing the tour of the Sharing tab, the box labeled Comment provides the ability to add a comment concerning the share. The User Limit area provides the ability to control the number of users that can access the share at one time. While this option does not restrict access based on any permissions, it is valuable to consider from both a license and performance perspective. That is, its use enables one to remain in compliance with certain software product licenses that restrict the number of users that can use the product at any one time. In addition, this feature allows one to consider the movement of data across a network and indirectly control both data flow on the network and its effect on network performance. For example, a shared application that enables clients to back-up the contents of their drives to a disk array on a server could bring the network to a halt if a large number of employees decided to initiate the application at the same time. SETTING PERMISSIONS Returning to the Sharing tab displayed in Exhibit 3, note the button labeled Permissions. This button provides the ability to control access to the share both via users that have accounts on the computer, as well as by setting permissions that control access to the data in the share. Exhibit 4 illustrates the result of clicking on the button labeled Permissions. This action results in the display of a dialog box labeled Access Through Share Permissions. At the lower right portion of Exhibit 4, note a drop-down menu displayed that lists the four types of access control that can be placed on a shared drive or folder: No Access, Read, Change, and Full Control. No Access, as its name implies, prevents access to the share, even if a user belongs to a group that has access to the share. Read enables the user to view data and run files that are programs. Change adds the ability to modify data in a file or delete files. Finally, Full Control adds the ability of a user to change permissions and take over ownership. Thus, the latter should be assigned with caution. Another item that deserves attention is the relationship of share access permissions to any previously established file permissions. Because the Windows NT file system is part of the operating system s security module file, system permissions

7 EXHIBIT 4 Through the Access Through Share Permissions dialog box, one can control user and user group access to a share, as well as the type of access permitted.

8 override share permissions. That is, if one previously associated a readonly permission to a file but the share for a folder in which the file resides was set to Change, a network user would be limited to reading the contents of the file or running it if it was a program. Thus, it is also important to note the file permissions within a share to ensure their settings, along with the type of share access one sets provides the intended result one seeks. Hidden from view by the drop-down menu in Exhibit 4 are buttons labeled Add and Delete. Those buttons provide the ability to control individual users and groups of users that will have access to the share being created. By clicking on the button labeled Add, the operating system links the share creation to its User Manager for Domains, allowing one to add users or user groups. By default, when setting up a share, access is assigned to the group labeled Everyone, with full control assigned to this group. In this author s opinion, this is a dangerous default and should be carefully examined prior to finalizing the share. Exhibit 5 illustrates the resulting display obtained by clicking on the obscured button labeled Add in Exhibit 4 to obtain the ability to add individual users and user groups with access to a share. Note that the resulting display resembles the display of the Windows NT Administrative Tool User Manager for Domains for, as previously noted, its linked to that facility. Thus, one can assign access to a share to any previously established Windows NT account. Multiple Identities Two powerful capabilities included in the Windows NT sharing facility are the ability to create multiple-named shares, as well as to create more than one share at a time. By clicking on the button labeled New Share shown in Exhibit 3, a dialog box appropriately labeled New Share will be displayed. An example of this dialog box is illustrated in Exhibit 6. The use of this dialog box provides the ability to assign a new name and description, as well as user access limits and permissions to the same share. Although one may initially have reservations concerning the creation of a new name and attributes for an existing share, from a security perspective this capability provides an additional level of control. For example, one might wish to create a share and provide different levels of access to different groups. However, if some groups only require temporary access to the share, it might be easier to assign them to a new name that can be easily deleted when their access requirements expire. CONSIDERING SUBFOLDERS In the example a share for the folder PKZIPW located in the PKWARE folder was created. If one creates another share and associates it with the higher level directory (PKWARE), one can segment access to a directory

9 EXHIBIT 5 Through Sharing s link to the Administrative Tool User Manager for Domains, one can enable access to the share from any previously established user or user group.

10 EXHIBIT 6 The New Share dialog box provides the ability to assign a new identity to an existing share. and one or more of its subdirectories, an important concept to note. For example, if one creates a share named PKWARE, then anyone who connects to that share can also see the contents of the subdirectory PKZIPW, which may or may not be the intention. Thus, one should carefully consider the directory structure of the computer prior to setting up shares. In some instances, it may be advisable to move a folder to a new location prior to sharing it, especially if those sharing the folder have no need for accessing files located in one or more subdirectories currently located under the folder. OPERATIONAL CONTROL Exhibit 7 illustrates the access of the shared folder PKZIPW from a Windows 2000 computer, explaining the display of Microsoft s Internet Explorer as the browsing facility. This screen display occurred by first selecting Network Neighborhood and accessing the computer WWW3 to obtain access to the shared folder. Many network managers and administrators can be lulled into complacency after they set up one or more shares. Thus, it is normally a good idea to periodically examine the User Sessions display to determine who is using the shares established on a computer. One can display information concerning the use of shares through the Windows NT Control Panel by first selecting the Server icon in the Control Panel. This action provides the ability to display a variety of computer usage data. In Exhibit 8, the User Sessions display is shown in the foreground, resulting from the pressing of the button labeled Users in the Server dialog box shown in the background. Note that in this example, the display indicates the user accessing the share as well as the share resource being accessed. Also note that if one detects a problem, one can

11 EXHIBIT 7 Viewing the shared folder from a Windows 2000 client.

12 EXHIBIT 8 Through the Server icon in the control panel, one can display information about the user of shared resources as well as disconnect users from the computer.

13 immediately disconnect the user prior to changing his or her ability to access the share via its configuration screen. SUMMARY Sharing provides an important productivity tool that enables employees to gain access to common programs and data files. However, sharing cannot be done in a vacuum and requires careful consideration of the users and user groups that require access to shared data. In addition, one must consider existing file permissions for all files in the share in conjunction with the type of access assigned to users. Finally, one needs to consider the location of shared data and the content of any subdirectories under the folders to be shared. By proper planning, one can share data in a safe and reliable manner without having a security loophole that can harm the organization. Gilbert Held is an internationally known lecturer and author of books and technical articles covering the field of data communications. He can be reached at @mcimail.com.

9 Administering Shared Folders

9 Administering Shared Folders 9 Administering Shared Folders Exam Objectives in this Chapter: Manage and troubleshoot access to shared folders. Create and remove shared folders. Why This Chapter Matters Control access to shared folders

More information

ExhIBIT 1 User Manager and Users Group

ExhIBIT 1 User Manager and Users Group 51-30-26 DATA COMMUNICATIONS MANAGEMENT SECURITY IN A WINDOWS NT ENVIRONMENT Gilbert Held INSIDE The User Manager, Creating a User Account, Comparing NT and NetWare Groups, Assigning Users to Groups, Working

More information

Lab 5 Managing Access to Shared Folders

Lab 5 Managing Access to Shared Folders Islamic University of Gaza Computer Network Lab Faculty of engineering ECOM 4121 Computer Department. Prepared by : Eng. Eman R. Al-Kurdi Managing Access to Shared Folders Objective: Manage access to shared

More information

Joining. Domain. Windows XP Pro

Joining. Domain. Windows XP Pro Joining a Domain in Windows XP Pro Table of Content HOW DO I CHANGE A COMPUTER'S DESCRIPTION, NAME, OR JOIN A DOMAIN IN WINDOWS XP PRO?... 1 TO ADD A COMPUTER DESCRIPTION... 1 TO CHANGE A COMPUTER NAME...

More information

Objectives. At the end of this chapter students should be able to:

Objectives. At the end of this chapter students should be able to: NTFS PERMISSIONS AND SECURITY SETTING.1 Introduction to NTFS Permissions.1.1 File Permissions and Folder Permission.2 Assigning NTFS Permissions and Special Permission.2.1 Planning NTFS Permissions.2.2

More information

TAMUS Terminal Server Setup BPP SQL/Alva

TAMUS Terminal Server Setup BPP SQL/Alva We have a new method of connecting to the databases that does not involve using the Texas A&M campus VPN. The new way of gaining access is via Remote Desktop software to a terminal server running here

More information

SHARING FILE SYSTEM RESOURCES

SHARING FILE SYSTEM RESOURCES 1 Chapter 9 SHARING FILE SYSTEM RESOURCES Chapter 9: SHARING FILE SYSTEM RESOURCES 2 CHAPTER OVERVIEW Create and manage file system shares and work with share permissions Use NTFS file system permissions

More information

1 of 10 1/31/2014 4:08 PM

1 of 10 1/31/2014 4:08 PM 1 of 10 1/31/2014 4:08 PM copyright 2014 How to backup Microsoft SQL Server with Nordic Backup Pro Before creating a SQL backup set within Nordic Backup Pro it is first necessary to verify that the settings

More information

Stored Documents and the FileCabinet

Stored Documents and the FileCabinet Stored Documents and the FileCabinet Introduction The stored document features have been greatly enhanced to allow easier storage and retrieval of a clinic s electronic documents. Individual or multiple

More information

Outlook Connector. Version 2 User Manual. client-side plugin. Collaborate Using Outlook. Version 2.0.0

Outlook Connector. Version 2 User Manual. client-side plugin. Collaborate Using Outlook. Version 2.0.0 Outlook Connector client-side plugin Collaborate Using Outlook Version 2 User Manual Version 2.0.0 2003-2005 Alt-N Technologies. All rights reserved. MDaemon, WorldClient, and RelayFax are registered trademarks

More information

Vodafone PC SMS 2010. (Software version 4.7.1) User Manual

Vodafone PC SMS 2010. (Software version 4.7.1) User Manual Vodafone PC SMS 2010 (Software version 4.7.1) User Manual July 19, 2010 Table of contents 1. Introduction...4 1.1 System Requirements... 4 1.2 Reply-to-Inbox... 4 1.3 What s new?... 4 2. Installation...6

More information

4cast Server Specification and Installation

4cast Server Specification and Installation 4cast Server Specification and Installation Version 2015.00 10 November 2014 Innovative Solutions for Education Management www.drakelane.co.uk System requirements Item Minimum Recommended Operating system

More information

Enabling Backups for Windows and MAC OS X

Enabling Backups for Windows and MAC OS X Enabling Backups for Windows and MAC OS X TM Trademarks and Copyrights Copyright Storix, Inc. 1999-2005 Storix is a registered trademark of Storix, Inc. SBAdmin is a trademark of Storix, Inc in the USA

More information

Many home and small office networks exist for no

Many home and small office networks exist for no C H A P T E R Accessing and Sharing Network Resources Many home and small office networks exist for no other reason than to share a broadband Internet connection. The administrators of those networks attach

More information

Auto-Archiving your Emails in Outlook

Auto-Archiving your Emails in Outlook Changing the AutoArchive Settings for all your Mailbox Folders Changing the AutoArchive Settings for all your Mailbox Folders (cont.) One way to minimize the amount of server space you are using for your

More information

Using IIS and UltraDev Locally page 1

Using IIS and UltraDev Locally page 1 Using IIS and UltraDev Locally page 1 IIS Web Server Installation IIS Web Server is the web server provided by Microsoft for platforms running the various versions of the Windows Operating system. It is

More information

Setting Up Database Security with Access 97

Setting Up Database Security with Access 97 Setting Up Database Security with Access 97 The most flexible and extensive method of securing a database is called user-level security. This form of security is similar to methods used in most network

More information

STATISTICA VERSION 9 STATISTICA ENTERPRISE INSTALLATION INSTRUCTIONS FOR USE WITH TERMINAL SERVER

STATISTICA VERSION 9 STATISTICA ENTERPRISE INSTALLATION INSTRUCTIONS FOR USE WITH TERMINAL SERVER Notes: STATISTICA VERSION 9 STATISTICA ENTERPRISE INSTALLATION INSTRUCTIONS FOR USE WITH TERMINAL SERVER 1. These instructions focus on installation on Windows Terminal Server (WTS), but are applicable

More information

STATISTICA VERSION 10 STATISTICA ENTERPRISE SERVER INSTALLATION INSTRUCTIONS

STATISTICA VERSION 10 STATISTICA ENTERPRISE SERVER INSTALLATION INSTRUCTIONS Notes: STATISTICA VERSION 10 STATISTICA ENTERPRISE SERVER INSTALLATION INSTRUCTIONS 1. The installation of the STATISTICA Enterprise Server entails two parts: a) a server installation, and b) workstation

More information

Introduction. Before you begin. Installing efax from our CD-ROM. Installing efax after downloading from the internet

Introduction. Before you begin. Installing efax from our CD-ROM. Installing efax after downloading from the internet Introduction Before you begin Before you begin installing efax, please check the following: You have received confirmation that your application for the efax service has been processed. The confirmation

More information

User Profile Manager 2.6

User Profile Manager 2.6 User Profile Manager 2.6 User Guide ForensiT Limited, Innovation Centre Medway, Maidstone Road, Chatham, Kent, ME5 9FD England. Tel: US 1-877-224-1721 (Toll Free) Intl. +44 (0) 845 838 7122 Fax: +44 (0)

More information

UOFL SHAREPOINT ADMINISTRATORS GUIDE

UOFL SHAREPOINT ADMINISTRATORS GUIDE UOFL SHAREPOINT ADMINISTRATORS GUIDE WOW What Power! Learn how to administer a SharePoint site. [Type text] SharePoint Administrator Training Table of Contents Basics... 3 Definitions... 3 The Ribbon...

More information

CTERA Agent Sync Edition for Windows

CTERA Agent Sync Edition for Windows Quick Walkthrough CTERA Agent Sync Edition for Windows November 2012 Version 3.2 2012, CTERA Networks. All rights reserved. 1 Install CTERA Agent for Windows Tip For more detailed information, refer to

More information

Using SSH Secure Shell Client for FTP

Using SSH Secure Shell Client for FTP Using SSH Secure Shell Client for FTP The SSH Secure Shell for Workstations Windows client application features this secure file transfer protocol that s easy to use. Access the SSH Secure FTP by double-clicking

More information

Folder Management in Outlook for Macintosh

Folder Management in Outlook for Macintosh Folder Management in Outlook Introduction Learn to create and manage folders in your mailbox on the Exchange server, in Personal Folders saved on your computer s hard disk or to a local network server,

More information

Figure 1: Restore Tab

Figure 1: Restore Tab Apptix Online Backup by Mozy Restore How do I restore my data? There are five ways of restoring your data: 1) Performing a Restore Using the Restore Tab You can restore files from the Apptix Online Backup

More information

ilaw Installation Procedure

ilaw Installation Procedure ilaw Installation Procedure This guide will provide a reference for a full installation of ilaw Case Management Software. Contents ilaw Overview How ilaw works Installing ilaw Server on a PC Installing

More information

BIGPOND ONLINE STORAGE USER GUIDE Issue 1.1.0-18 August 2005

BIGPOND ONLINE STORAGE USER GUIDE Issue 1.1.0-18 August 2005 BIGPOND ONLINE STORAGE USER GUIDE Issue 1.1.0-18 August 2005 PLEASE NOTE: The contents of this publication, and any associated documentation provided to you, must not be disclosed to any third party without

More information

Legal Notes. Regarding Trademarks. 2011 KYOCERA MITA Corporation

Legal Notes. Regarding Trademarks. 2011 KYOCERA MITA Corporation Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held liable for any problems arising from

More information

Lenovo Online Data Backup User Guide Version 1.8.14

Lenovo Online Data Backup User Guide Version 1.8.14 Lenovo Online Data Backup User Guide Version 1.8.14 Contents Chapter 1: Installing Lenovo Online Data Backup...5 Downloading the Lenovo Online Data Backup Client...5 Installing the Lenovo Online Data

More information

Active Directory Software Deployment

Active Directory Software Deployment APPLICATION N0TE ST-0128 March 24, 2006 Product: Active Directory / PCM Deployment System version: ShoreTel 6 Active Directory Software Deployment Courtesy of: Dylan Moser with LANtelligence Inc. This

More information

File Management Utility User Guide

File Management Utility User Guide File Management Utility User Guide Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held

More information

Site Maintenance Using Dreamweaver

Site Maintenance Using Dreamweaver Site Maintenance Using Dreamweaver As you know, it is possible to transfer the files that make up your web site from your local computer to the remote server using FTP (file transfer protocol) or some

More information

Changing Your Cameleon Server IP

Changing Your Cameleon Server IP 1.1 Overview Technical Note Cameleon requires that you have a static IP address defined for the server PC the Cameleon server application runs on. Even if the server PC has a static IP address, you may

More information

EPM Performance Suite Profitability Administration & Security Guide

EPM Performance Suite Profitability Administration & Security Guide BusinessObjects XI R2 11.20 EPM Performance Suite Profitability Administration & Security Guide BusinessObjects XI R2 11.20 Windows Patents Trademarks Copyright Third-party Contributors Business Objects

More information

SARANGSoft WinBackup Business v2.5 Client Installation Guide

SARANGSoft WinBackup Business v2.5 Client Installation Guide SARANGSoft WinBackup Business v2.5 Client Installation Guide (November, 2015) WinBackup Business Client is a part of WinBackup Business application. It runs in the background on every client computer that

More information

Moving the TRITON Reporting Databases

Moving the TRITON Reporting Databases Moving the TRITON Reporting Databases Topic 50530 Web, Data, and Email Security Versions 7.7.x, 7.8.x Updated 06-Nov-2013 If you need to move your Microsoft SQL Server database to a new location (directory,

More information

Server Installation: ServerTools

Server Installation: ServerTools Server Installation: ServerTools ServerTools Page 1 Table of Contents To Install ServerTools...3 Backup and Restore...6 Purpose...6 Background...6 Requirements...6 Creating a Backup Schedule using the

More information

Online Sharing User Manual

Online Sharing User Manual Online Sharing User Manual June 13, 2007 If discrepancies between this document and Online Sharing are discovered, please contact backupfeedback@verizon.net. Copyrights and Proprietary Notices The information

More information

Installation Manual (MSI Version)

Installation Manual (MSI Version) Installation Manual (MSI Version) 1. SYSTEM REQUIREMENTS... 2 2. INSTALLATION INSTRUCTIONS... 2 2.1 REMOTE INSTALLATION USING GROUP POLICY... 2 2.1.1 Assigning Software...2 2.1.2 Publishing Software...2

More information

Using SQL Reporting Services with Amicus

Using SQL Reporting Services with Amicus Using SQL Reporting Services with Amicus Applies to: Amicus Attorney Premium Edition 2011 SP1 Amicus Premium Billing 2011 Contents About SQL Server Reporting Services...2 What you need 2 Setting up SQL

More information

TOSHIBA GA-1310. Printing from Windows

TOSHIBA GA-1310. Printing from Windows TOSHIBA GA-1310 Printing from Windows 2009 Electronics for Imaging, Inc. The information in this publication is covered under Legal Notices for this product. 45081979 04 February 2009 CONTENTS 3 CONTENTS

More information

OPC Server Machine Configuration

OPC Server Machine Configuration OPC Server Machine Configuration General Information For remote OPC Server operation, server must be running under Windows XP Pro, Windows Server 2003, Windows Vista (Business & Ultimate), Windows 7 (Professional

More information

Technical Bulletin. SQL Express Backup Utility

Technical Bulletin. SQL Express Backup Utility Technical Bulletin SQL Express Backup Utility May 2012 Introduction This document describes the installation, configuration and use of the SATEON SQL Express Backup utility, which is used to provide scheduled

More information

Windows XP Pro: Basics 1

Windows XP Pro: Basics 1 NORTHWEST MISSOURI STATE UNIVERSITY ONLINE USER S GUIDE 2004 Windows XP Pro: Basics 1 Getting on the Northwest Network Getting on the Northwest network is easy with a university-provided PC, which has

More information

SonicWALL CDP Local Archiving

SonicWALL CDP Local Archiving This document describes how to configure, implement, and manage a local archive for your SonicWALL CDP appliance. It contains the following sections: Feature Overview section on page 1 Using Local Archiving

More information

Xerox EX Print Server, Powered by Fiery, for the Xerox 700 Digital Color Press. Printing from Windows

Xerox EX Print Server, Powered by Fiery, for the Xerox 700 Digital Color Press. Printing from Windows Xerox EX Print Server, Powered by Fiery, for the Xerox 700 Digital Color Press Printing from Windows 2008 Electronics for Imaging, Inc. The information in this publication is covered under Legal Notices

More information

Managing Contacts in Outlook

Managing Contacts in Outlook Managing Contacts in Outlook This document provides instructions for creating contacts and distribution lists in Microsoft Outlook 2007. In addition, instructions for using contacts in a Microsoft Word

More information

Backup/Restore Utility (Version 2.1)

Backup/Restore Utility (Version 2.1) TOSHIBA Strata CIX Product Bulletin PBCIX-0031 July 31, 2006 Backup/Restore Utility (Version 2.1) Backup/Restore The Backup and Restore Utility is a tool that connects to Stratagy ES, Strata ACD, Strata

More information

Colligo Email Manager 6.2. Offline Mode - User Guide

Colligo Email Manager 6.2. Offline Mode - User Guide 6.2 Offline Mode - User Guide Contents Colligo Email Manager 1 Benefits 1 Key Features 1 Platforms Supported 1 Installing and Activating Colligo Email Manager 3 Checking for Updates 4 Updating Your License

More information

Table of Contents. Page 3

Table of Contents. Page 3 Welcome to Exchange Mail Customer Full Name Your e-mail is now being delivered and stored on the new Exchange server. Your new e-mail address is @rit.edu. This is the e-mail address that you should give

More information

Training Manual. Version 6

Training Manual. Version 6 Training Manual TABLE OF CONTENTS A. E-MAIL... 4 A.1 INBOX... 8 A.1.1 Create New Message... 8 A.1.1.1 Add Attachments to an E-mail Message... 11 A.1.1.2 Insert Picture into an E-mail Message... 12 A.1.1.3

More information

How to Create User-Defined Fields and Tables

How to Create User-Defined Fields and Tables SAP Business One How-To Guide PUBLIC How to Create User-Defined Fields and Tables Applicable Release: SAP Business One 8.8 All Countries English July 2009 Table of Contents Creating User-Defined Fields

More information

TM Online Storage: StorageSync

TM Online Storage: StorageSync TM Online Storage: StorageSync 1 Part A: Backup Your Profile 1: How to download and install StorageSync? Where to download StorageSync? You may download StorageSync from your e-storage account. Please

More information

STATISTICA VERSION 11 CONCURRENT NETWORK LICENSE WITH BORROWING INSTALLATION INSTRUCTIONS

STATISTICA VERSION 11 CONCURRENT NETWORK LICENSE WITH BORROWING INSTALLATION INSTRUCTIONS data analysis data mining quality improvement web-based analytics Notes STATISTICA VERSION 11 CONCURRENT NETWORK LICENSE WITH BORROWING INSTALLATION INSTRUCTIONS 1. The installation of the Concurrent network

More information

For Active Directory Installation Guide

For Active Directory Installation Guide For Active Directory Installation Guide Version 2.5.2 April 2010 Copyright 2010 Legal Notices makes no representations or warranties with respect to the contents or use of this documentation, and specifically

More information

1. TURN OFF UAC SETTINGS

1. TURN OFF UAC SETTINGS AKOYA INSTALLATION TECHNICAL REQUIREMENTS INTERNET EXPLORER CONFIGURATION FOR AKOYA.NET 1. TURN OFF UAC SETTINGS Before making the following changes in Internet Explorer, you must be a local administrator

More information

aims sql server installation guide

aims sql server installation guide aims sql server installation guide Document Version: 4000 February 2015 CONTENTS AIMS Installation Guide... 3 Installing the AIMS Software... 4 Pre-Requisites... 4 Installation... 4 Shortcuts... 4 Directory

More information

How to install and use the File Sharing Outlook Plugin

How to install and use the File Sharing Outlook Plugin How to install and use the File Sharing Outlook Plugin Thank you for purchasing Green House Data File Sharing. This guide will show you how to install and configure the Outlook Plugin on your desktop.

More information

Kerio VPN Client. User Guide. Kerio Technologies

Kerio VPN Client. User Guide. Kerio Technologies Kerio VPN Client User Guide Kerio Technologies 2011 Kerio Technologies s.r.o. All rights reserved. This guide provides detailed description on Kerio VPN Client, version 7.1 for Windows. All additional

More information

Suite. How to Use GrandMaster Suite. Exporting with ODBC

Suite. How to Use GrandMaster Suite. Exporting with ODBC Suite How to Use GrandMaster Suite Exporting with ODBC This page intentionally left blank ODBC Export 3 Table of Contents: HOW TO USE GRANDMASTER SUITE - EXPORTING WITH ODBC...4 OVERVIEW...4 WHAT IS ODBC?...

More information

Manage Filespace with the ARS Console

Manage Filespace with the ARS Console Academic Services Exeter IT Desktop Support Manage Filespace with the ARS Console Document reference: Document type: Document status: Review period: DS021 Desktop Support Procedure Live Six months Next

More information

84-01-31 Windows NT Server Operating System Security Features Carol A. Siegel Payoff

84-01-31 Windows NT Server Operating System Security Features Carol A. Siegel Payoff 84-01-31 Windows NT Server Operating System Security Features Carol A. Siegel Payoff This article is designed to provide security administrators with a security checklist for going live with Windows NT.

More information

Using SQL Reporting Services with Amicus

Using SQL Reporting Services with Amicus Using SQL Reporting Services with Amicus Applies to: Amicus Attorney Premium 2016 (with or without Premium Billing) With Microsoft SQL Server Reporting Services, use Report Builder to generate and author

More information

Manual Password Depot Server 8

Manual Password Depot Server 8 Manual Password Depot Server 8 Table of Contents Introduction 4 Installation and running 6 Installation as Windows service or as Windows application... 6 Control Panel... 6 Control Panel 8 Control Panel...

More information

Scan to SMB(PC) Set up Guide

Scan to SMB(PC) Set up Guide Scan to SMB(PC) Set up Guide Regarding Trade Names Windows is a registered trademark of Microsoft Corporation in the U.S.A. and/or other countries. Windows XP and Windows Vista are trademarks of Microsoft

More information

CTERA Agent for Windows

CTERA Agent for Windows User Guide CTERA Agent for Windows September 2013 Version 4.0 Copyright 2009-2013 CTERA Networks Ltd. All rights reserved. No part of this document may be reproduced in any form or by any means without

More information

Carry it Easy. User Guide

Carry it Easy. User Guide Carry it Easy User Guide User Manual Version 3.2 2004-2010 CoSoSys Ltd. Carry it Easy User Manual Table of Contents Table of Contents... I 1. Introduction... 1 2. System Requirements... 1 3. Installation...

More information

Fiery EX4112/4127. Printing from Windows

Fiery EX4112/4127. Printing from Windows Fiery EX4112/4127 Printing from Windows 2008 Electronics for Imaging, Inc. The information in this publication is covered under Legal Notices for this product. 45083884 01 April 2009 CONTENTS 3 CONTENTS

More information

Sharing Software. Chapter 14

Sharing Software. Chapter 14 Chapter 14 14 Sharing Software Sharing a tool, like a software application, works differently from sharing a document or presentation. When you share software during a meeting, a sharing window opens automatically

More information

File systems security: Shared folders & NTFS permissions, EFS Disk Quotas

File systems security: Shared folders & NTFS permissions, EFS Disk Quotas File systems security: Shared folders & NTFS permissions, EFS Disk Quotas (November 2, 2015) Abdou Illia, Fall 2015 1 Learning Objective Understand Shared Folders Assign Shared Folder permissions NTFS

More information

PC Agent Quick Start. Open the Agent. Autonomy Connected Backup. Version 8.8. Revision 0

PC Agent Quick Start. Open the Agent. Autonomy Connected Backup. Version 8.8. Revision 0 T E C H N I C A L N O T E Autonomy Connected Backup Version 8.8 PC Agent Quick Start Revision 0 Use this document as a quick reference for common Connected Backup PC Agent tasks. If the Agent is not on

More information

Contents. Welcome to the Priority Zoom System Version 17 for Windows. This document contains instructions for installing the system.

Contents. Welcome to the Priority Zoom System Version 17 for Windows. This document contains instructions for installing the system. Welcome to the Priority Zoom System Version 17 for Windows. This document contains instructions for installing the system. Contents 1. Introduction... 2 2. Installing the Server... 2 3. Installing a Client...

More information

Using SSH Secure FTP Client INFORMATION TECHNOLOGY SERVICES California State University, Los Angeles Version 2.0 Fall 2008.

Using SSH Secure FTP Client INFORMATION TECHNOLOGY SERVICES California State University, Los Angeles Version 2.0 Fall 2008. Using SSH Secure FTP Client INFORMATION TECHNOLOGY SERVICES California State University, Los Angeles Version 2.0 Fall 2008 Contents Starting SSH Secure FTP Client... 2 Exploring SSH Secure FTP Client...

More information

File and Printer Sharing with Microsoft Windows

File and Printer Sharing with Microsoft Windows Operating System File and Printer Sharing with Microsoft Windows Microsoft Corporation Published: November 2003 Abstract File and printer sharing in Microsoft Windows allows you to share the contents of

More information

EMC Celerra Network Server

EMC Celerra Network Server EMC Celerra Network Server Release 5.6.47 Using Windows Administrative Tools with Celerra P/N 300-004-139 REV A02 EMC Corporation Corporate Headquarters: Hopkintons, MA 01748-9103 1-508-435-1000 www.emc.com

More information

How to use edgebox as a PDC and to Share Files

How to use edgebox as a PDC and to Share Files edgebox V4.5 How to use edgebox as a PDC and to Share Files Rev - 1.1 1 Storage and Print - Windows Domain Storage & Print EdgeBOX may be configured to interact with other hosts as if it was a Windows

More information

Creating and Managing Shared Folders

Creating and Managing Shared Folders Creating and Managing Shared Folders Microsoft threw all sorts of new services, features, and functions into Windows 2000 Server, but at the heart of it all was still the requirement to be a good file

More information

Creating client-server setup with multiple clients

Creating client-server setup with multiple clients Creating client-server setup with multiple clients Coffalyser.Net uses a SQL client server database model to store all project/experiment- related data. The client-server model has one main application

More information

NovaBACKUP. Storage Server. NovaStor / May 2011

NovaBACKUP. Storage Server. NovaStor / May 2011 NovaBACKUP Storage Server NovaStor / May 2011 2011 NovaStor, all rights reserved. All trademarks are the property of their respective owners. Features and specifications are subject to change without notice.

More information

Introduction. Activating the CFR Module License. CFR Configuration

Introduction. Activating the CFR Module License. CFR Configuration Introduction Effective August 20, 1997, the United States Food and Drug Administration released its Code of Federal Regulations (CFR) Title 21 Part 11: Electronic Records; Electronic Signatures (21 CFR

More information

Installation Instruction STATISTICA Enterprise Small Business

Installation Instruction STATISTICA Enterprise Small Business Installation Instruction STATISTICA Enterprise Small Business Notes: ❶ The installation of STATISTICA Enterprise Small Business entails two parts: a) a server installation, and b) workstation installations

More information

Premier Installation 2013.1 Guide for SQL Server Administrators

Premier Installation 2013.1 Guide for SQL Server Administrators for Depreciation, Tracking, Planning, and Reporting Premier Installation 2013.1 Guide for SQL Server Administrators Premier Installation Guide Version 2013.1 Contents Chapter 1. Introduction Supported

More information

PLANNING AND DESIGNING GROUP POLICY, PART 1

PLANNING AND DESIGNING GROUP POLICY, PART 1 84-02-06 DATA SECURITY MANAGEMENT PLANNING AND DESIGNING GROUP POLICY, PART 1 Melissa Yon INSIDE What Is Group Policy?; Software Settings; Windows Settings; Administrative Templates; Requirements for Group

More information

CTERA Agent for Windows

CTERA Agent for Windows User Guide CTERA Agent for Windows May 2012 Version 3.1 Copyright 2009-2012 CTERA Networks Ltd. All rights reserved. No part of this document may be reproduced in any form or by any means without written

More information

Creating trouble-free numbering in Microsoft Word

Creating trouble-free numbering in Microsoft Word Creating trouble-free numbering in Microsoft Word This note shows you how to create trouble-free chapter, section and paragraph numbering, as well as bulleted and numbered lists that look the way you want

More information

MICROSOFT OUTLOOK 2010 WORK WITH CONTACTS

MICROSOFT OUTLOOK 2010 WORK WITH CONTACTS MICROSOFT OUTLOOK 2010 WORK WITH CONTACTS Last Edited: 2012-07-09 1 Access to Outlook contacts area... 4 Manage Outlook contacts view... 5 Change the view of Contacts area... 5 Business Cards view... 6

More information

NetPortal All your documents, direct to your iphone

NetPortal All your documents, direct to your iphone Copyright Stratospherix 2010 Apple, the Apple logo, ipod, ipod touch, and itunes are trademarks of Apple Inc., registered in the U.S. and other countries. iphone is a trademark of Apple Inc. App Store

More information

WS_FTP Professional 12

WS_FTP Professional 12 WS_FTP Professional 12 Tools Guide Contents CHAPTER 1 Introduction Ways to Automate Regular File Transfers...5 Check Transfer Status and Logs...6 Building a List of Files for Transfer...6 Transfer Files

More information

UC Express Quick Start Guide

UC Express Quick Start Guide UC Express Quick Start Guide Programming IP Phone Keys Guide for Installation, Registration, Configuring & Programming Keys Carleton University 0 Unified Communicator Express Quick Start Guide The Unified

More information

Almyta Control System Advanced Reference Contents

Almyta Control System Advanced Reference Contents Almyta Control System Advanced Reference Contents Almyta Control System Advanced Reference... 1 Software Maintenance... 2 Sharing Your Local Company with Other Users. Networked Installation.... 5 Connecting

More information

A+ Guide to Managing and Maintaining Your PC, 7e. Chapter 2 Introducing Operating Systems

A+ Guide to Managing and Maintaining Your PC, 7e. Chapter 2 Introducing Operating Systems A+ Guide to Managing and Maintaining Your PC, 7e Chapter 2 Introducing Operating Systems Objectives Learn about the various operating systems and the differences between them Learn about the components

More information

Lepide Software. LepideAuditor for File Server [CONFIGURATION GUIDE] This guide informs How to configure settings for first time usage of the software

Lepide Software. LepideAuditor for File Server [CONFIGURATION GUIDE] This guide informs How to configure settings for first time usage of the software Lepide Software LepideAuditor for File Server [CONFIGURATION GUIDE] This guide informs How to configure settings for first time usage of the software Lepide Software Private Limited, All Rights Reserved

More information

AT&T Global Network Client v6.8.0 and Passport IP Setup Instructions for Broadband VPN Access

AT&T Global Network Client v6.8.0 and Passport IP Setup Instructions for Broadband VPN Access AT&T Global Network Client v6.8.0 and Passport IP Setup Instructions for Broadband VPN Access October 19, 2006 1 Installing AT&T GNC 6.8.0 for Broadband VPN Access... 3 Getting Started... 3 License Agreement...

More information

MS Outlook 2002/2003. V1.0 BullsEye Telecom Email

MS Outlook 2002/2003. V1.0 BullsEye Telecom Email IMAP Settings Manual Our application allows you to access your email in many different ways. For those of you who do not wish to use the Webmail interface, you may also manage your email and custom folder

More information

QUANTIFY INSTALLATION GUIDE

QUANTIFY INSTALLATION GUIDE QUANTIFY INSTALLATION GUIDE Thank you for putting your trust in Avontus! This guide reviews the process of installing Quantify software. For Quantify system requirement information, please refer to the

More information

Networking Lab - Vista Public Network Sharing

Networking Lab - Vista Public Network Sharing Networking Lab - Vista Public Network Sharing After completing the lab activity, you will be able to: Explain the differences between Windows XP and Windows Vista network sharing. Explain the purpose of

More information

Database Operations (Backup/Restore/Move/Manage) Technical Support Engineering Rosslare Security NA For more information please see www.axtraxng.

Database Operations (Backup/Restore/Move/Manage) Technical Support Engineering Rosslare Security NA For more information please see www.axtraxng. Database Operations (Backup/Restore/Move/Manage) Technical Support Engineering Rosslare Security NA For more information please see www.axtraxng.com Database management operations may be performed to insure

More information

Chapter 3 Application Monitors

Chapter 3 Application Monitors Chapter 3 Application Monitors AppMetrics utilizes application monitors to organize data collection and analysis per application server. An application monitor is defined on the AppMetrics manager computer

More information