SECURITY AND RESOURCE SHARING IN AN NT ENVIRONMENT
|
|
- Lillian Palmer
- 7 years ago
- Views:
Transcription
1 DATA SECURITY MANAGEMENT SECURITY AND RESOURCE SHARING IN AN NT ENVIRONMENT Gilbert Held INSIDE Overview; Share Creation; Setting Permissions; Multiple Identities; Considering Subfolders; Operational Control Because an understanding of the method by which shares are created facilitates an understanding of different levels of data security associated with resource sharing, this article examines in detail the creation of a shared folder on one computer and its access via another computer. In doing so, this article references a series of screen images that illustrate the actual use of the Windows NT operating system to create shares and discusses and describes methods that control access to shared resources, providing different levels of security concerning the ability of network users to access shared resources and, once accessed, their ability to manipulate data. OVERVIEW Windows NT provides users with the ability to share access to the contents of an entire drive or folder over a network. Although shares only operate at the drive and folder level, the operating system provides several methods to control access down to individual files. Because sharing is integrated with the operating system s database of user accounts and passwords, it is possible to restrict sharing to a specific user, a group of users, or several PAYOFF IDEA The ability to enable remote users to share resources on NT workstations and servers represents one of the major benefits of the use of this operating system. By enabling employees in an organization to share access to drives, folders, and files, one obtains the ability to significantly enhance productivity. However, one also provides the potential for other persons with access to the organization s network to either intentionally or unintentionally read or modify existing data as well as store new files whose contents could have an adverse effect on the operation of the organization. Thus, it is important to understand the options associated with Windows NT resource sharing, as they control access to shares as well as govern the level of security associated with network-based resources. Auerbach Publications
2 predefined user groups. In addition, because sharing is also integrated with the Windows NT file system, it is also possible to assign a variety of permissions to shared resources. However, the ability to do so depends on the file system used to create a volume. If a share resides on a volume created using the original File Allocation Table (FAT) file system that dates to the original IBM PC, shared resource permissions will be restricted to a series of basic permissions. In comparison, shares residing on a volume created through the use of the more modern NT File System (NTFS) can be assigned additional file-by-file permissions due to the enhanced level of capability of that file system. SHARE CREATION An appreciation for the security of data associated with resource sharing is best facilitated by creating a shared resource. Thus, this section will create a shared folder and examine how access to data in the folder can be controlled. The creation of a shared resource requires one first selects a drive or folder icon. Once that is accomplished, right-click on the previously selected icon to display a list of options associated with the drive or folder. Exhibit 1 illustrates the selection of the folder icon labeled PKZIPW located in the folder PKWARE and the resulting pop-up menu displayed as a result of right-clicking on the selected icon. Consider the selected folder to represent a subfolder or, for die-hard DOS fans, a subdirectory. From the pop-up menu displayed as a result of right-clicking on an icon, one can invoke sharing in one of two ways: either selecting the Properties or the Sharing menu entries. Selecting the Properties menu entry results in the display of a dialog box labeled Properties, prefixed with the name of the previously selected icon. That dialog box contains two tabs, as illustrated in Exhibit 2. The first tab is labeled General. The contents of this tab are displayed in the foreground and provide information about the selected icon, such as its location, storage size, contents, creation date, and any assigned attributes. The second tab, labeled Sharing, which is located in the background of the display, provides the ability to share the resource as well as control access to it. If one selects Properties from the pop-up menu shown in Exhibit 1, one would then have to select the Sharing tab shown in Exhibit 2. In comparison, if one selects the Sharing entry in the previously shown pop-up menu, the Sharing tab would be directly displayed. Thus, the selection of the Sharing entry from the pop-up menu can be considered as a small shortcut for accessing the sharing facility for a Properties dialog box for a selected drive or folder icon. Because one wants to create a share, one would either click on the tab labeled Sharing in Exhibit 2 or select Sharing from the pop-up menu en-
3 EXHIBIT 1 Right-clicking on a selected folder or drive icon results in a pop-up menu being displayed that enables a share to be created.
4 EXHIBIT 2 A folder or drive Properties dialog box contains two tabs, with the General tab providing information about the selected icon, while the tab labeled Sharing providing the ability to share the selected resource. try shown in Exhibit 1. Either action will result in the display of the Sharing tab for the Properties menu of the selected icon. Exhibit 3 illustrates the display of the Sharing tab for the previously selected PKZIPW folder. Several entries in the tab display were either placed by default by the operating system into an appropriate box or entered by the author of this article and will now be described as one takes a tour of the entries. When initially selecting a nonshared drive or folder, the button labeled Not Shared will be shown selected. When one clicks on the button labeled Shared As, the name of the folder by default will be placed in the box associated with the label Shared Name. One can enter a share name up to 80 characters in length; however, one should probably consider a
5 EXHIBIT 3 The Sharing tab in the Properties dialog box for a selected icon provides the ability to control resource sharing. much shorter name length, especially if the organization has Windows 95-based computers that will access the share. This is because a Windows 95 system cannot see a share name more than 12 characters in length. In addition, DOS and Windows for Workgroup users are restricted to the 8.3 DOS file naming convention; so, when in doubt as to who will access a share, it is best to use the lowest common denominator of naming restrictions. The actual composition of a share name can include all letters and numbers and the special characters $ % - ~! ( ) ^ # and &. If using long filenames, one can also include the six additional special characters +, : = [ and ]. One additional item that is worthy of mention concerns the use of the dollar sign ($) as a suffix to a share name. Doing so hides the share from direct viewing by other network users when browsing Net-
6 work Neighborhood and provides a bit of privacy. However, if improper permissions are assigned to the share, other users who know its Universal Naming Convention (UNC) address can access the data in the share. Note the down arrow to the right of the box for the Share Name. As noted shortly, the operating system provides the ability to share a resource under multiple names, allowing one to tailor access and permissions to each share name. Another word of caution is in order concerning share names: once a share is named, the only way to rename it is to disable it and then re-enable it using a new name. Continuing the tour of the Sharing tab, the box labeled Comment provides the ability to add a comment concerning the share. The User Limit area provides the ability to control the number of users that can access the share at one time. While this option does not restrict access based on any permissions, it is valuable to consider from both a license and performance perspective. That is, its use enables one to remain in compliance with certain software product licenses that restrict the number of users that can use the product at any one time. In addition, this feature allows one to consider the movement of data across a network and indirectly control both data flow on the network and its effect on network performance. For example, a shared application that enables clients to back-up the contents of their drives to a disk array on a server could bring the network to a halt if a large number of employees decided to initiate the application at the same time. SETTING PERMISSIONS Returning to the Sharing tab displayed in Exhibit 3, note the button labeled Permissions. This button provides the ability to control access to the share both via users that have accounts on the computer, as well as by setting permissions that control access to the data in the share. Exhibit 4 illustrates the result of clicking on the button labeled Permissions. This action results in the display of a dialog box labeled Access Through Share Permissions. At the lower right portion of Exhibit 4, note a drop-down menu displayed that lists the four types of access control that can be placed on a shared drive or folder: No Access, Read, Change, and Full Control. No Access, as its name implies, prevents access to the share, even if a user belongs to a group that has access to the share. Read enables the user to view data and run files that are programs. Change adds the ability to modify data in a file or delete files. Finally, Full Control adds the ability of a user to change permissions and take over ownership. Thus, the latter should be assigned with caution. Another item that deserves attention is the relationship of share access permissions to any previously established file permissions. Because the Windows NT file system is part of the operating system s security module file, system permissions
7 EXHIBIT 4 Through the Access Through Share Permissions dialog box, one can control user and user group access to a share, as well as the type of access permitted.
8 override share permissions. That is, if one previously associated a readonly permission to a file but the share for a folder in which the file resides was set to Change, a network user would be limited to reading the contents of the file or running it if it was a program. Thus, it is also important to note the file permissions within a share to ensure their settings, along with the type of share access one sets provides the intended result one seeks. Hidden from view by the drop-down menu in Exhibit 4 are buttons labeled Add and Delete. Those buttons provide the ability to control individual users and groups of users that will have access to the share being created. By clicking on the button labeled Add, the operating system links the share creation to its User Manager for Domains, allowing one to add users or user groups. By default, when setting up a share, access is assigned to the group labeled Everyone, with full control assigned to this group. In this author s opinion, this is a dangerous default and should be carefully examined prior to finalizing the share. Exhibit 5 illustrates the resulting display obtained by clicking on the obscured button labeled Add in Exhibit 4 to obtain the ability to add individual users and user groups with access to a share. Note that the resulting display resembles the display of the Windows NT Administrative Tool User Manager for Domains for, as previously noted, its linked to that facility. Thus, one can assign access to a share to any previously established Windows NT account. Multiple Identities Two powerful capabilities included in the Windows NT sharing facility are the ability to create multiple-named shares, as well as to create more than one share at a time. By clicking on the button labeled New Share shown in Exhibit 3, a dialog box appropriately labeled New Share will be displayed. An example of this dialog box is illustrated in Exhibit 6. The use of this dialog box provides the ability to assign a new name and description, as well as user access limits and permissions to the same share. Although one may initially have reservations concerning the creation of a new name and attributes for an existing share, from a security perspective this capability provides an additional level of control. For example, one might wish to create a share and provide different levels of access to different groups. However, if some groups only require temporary access to the share, it might be easier to assign them to a new name that can be easily deleted when their access requirements expire. CONSIDERING SUBFOLDERS In the example a share for the folder PKZIPW located in the PKWARE folder was created. If one creates another share and associates it with the higher level directory (PKWARE), one can segment access to a directory
9 EXHIBIT 5 Through Sharing s link to the Administrative Tool User Manager for Domains, one can enable access to the share from any previously established user or user group.
10 EXHIBIT 6 The New Share dialog box provides the ability to assign a new identity to an existing share. and one or more of its subdirectories, an important concept to note. For example, if one creates a share named PKWARE, then anyone who connects to that share can also see the contents of the subdirectory PKZIPW, which may or may not be the intention. Thus, one should carefully consider the directory structure of the computer prior to setting up shares. In some instances, it may be advisable to move a folder to a new location prior to sharing it, especially if those sharing the folder have no need for accessing files located in one or more subdirectories currently located under the folder. OPERATIONAL CONTROL Exhibit 7 illustrates the access of the shared folder PKZIPW from a Windows 2000 computer, explaining the display of Microsoft s Internet Explorer as the browsing facility. This screen display occurred by first selecting Network Neighborhood and accessing the computer WWW3 to obtain access to the shared folder. Many network managers and administrators can be lulled into complacency after they set up one or more shares. Thus, it is normally a good idea to periodically examine the User Sessions display to determine who is using the shares established on a computer. One can display information concerning the use of shares through the Windows NT Control Panel by first selecting the Server icon in the Control Panel. This action provides the ability to display a variety of computer usage data. In Exhibit 8, the User Sessions display is shown in the foreground, resulting from the pressing of the button labeled Users in the Server dialog box shown in the background. Note that in this example, the display indicates the user accessing the share as well as the share resource being accessed. Also note that if one detects a problem, one can
11 EXHIBIT 7 Viewing the shared folder from a Windows 2000 client.
12 EXHIBIT 8 Through the Server icon in the control panel, one can display information about the user of shared resources as well as disconnect users from the computer.
13 immediately disconnect the user prior to changing his or her ability to access the share via its configuration screen. SUMMARY Sharing provides an important productivity tool that enables employees to gain access to common programs and data files. However, sharing cannot be done in a vacuum and requires careful consideration of the users and user groups that require access to shared data. In addition, one must consider existing file permissions for all files in the share in conjunction with the type of access assigned to users. Finally, one needs to consider the location of shared data and the content of any subdirectories under the folders to be shared. By proper planning, one can share data in a safe and reliable manner without having a security loophole that can harm the organization. Gilbert Held is an internationally known lecturer and author of books and technical articles covering the field of data communications. He can be reached at @mcimail.com.
9 Administering Shared Folders
9 Administering Shared Folders Exam Objectives in this Chapter: Manage and troubleshoot access to shared folders. Create and remove shared folders. Why This Chapter Matters Control access to shared folders
More informationExhIBIT 1 User Manager and Users Group
51-30-26 DATA COMMUNICATIONS MANAGEMENT SECURITY IN A WINDOWS NT ENVIRONMENT Gilbert Held INSIDE The User Manager, Creating a User Account, Comparing NT and NetWare Groups, Assigning Users to Groups, Working
More informationLab 5 Managing Access to Shared Folders
Islamic University of Gaza Computer Network Lab Faculty of engineering ECOM 4121 Computer Department. Prepared by : Eng. Eman R. Al-Kurdi Managing Access to Shared Folders Objective: Manage access to shared
More informationJoining. Domain. Windows XP Pro
Joining a Domain in Windows XP Pro Table of Content HOW DO I CHANGE A COMPUTER'S DESCRIPTION, NAME, OR JOIN A DOMAIN IN WINDOWS XP PRO?... 1 TO ADD A COMPUTER DESCRIPTION... 1 TO CHANGE A COMPUTER NAME...
More informationObjectives. At the end of this chapter students should be able to:
NTFS PERMISSIONS AND SECURITY SETTING.1 Introduction to NTFS Permissions.1.1 File Permissions and Folder Permission.2 Assigning NTFS Permissions and Special Permission.2.1 Planning NTFS Permissions.2.2
More informationTAMUS Terminal Server Setup BPP SQL/Alva
We have a new method of connecting to the databases that does not involve using the Texas A&M campus VPN. The new way of gaining access is via Remote Desktop software to a terminal server running here
More informationSHARING FILE SYSTEM RESOURCES
1 Chapter 9 SHARING FILE SYSTEM RESOURCES Chapter 9: SHARING FILE SYSTEM RESOURCES 2 CHAPTER OVERVIEW Create and manage file system shares and work with share permissions Use NTFS file system permissions
More information1 of 10 1/31/2014 4:08 PM
1 of 10 1/31/2014 4:08 PM copyright 2014 How to backup Microsoft SQL Server with Nordic Backup Pro Before creating a SQL backup set within Nordic Backup Pro it is first necessary to verify that the settings
More informationStored Documents and the FileCabinet
Stored Documents and the FileCabinet Introduction The stored document features have been greatly enhanced to allow easier storage and retrieval of a clinic s electronic documents. Individual or multiple
More informationOutlook Connector. Version 2 User Manual. client-side plugin. Collaborate Using Outlook. Version 2.0.0
Outlook Connector client-side plugin Collaborate Using Outlook Version 2 User Manual Version 2.0.0 2003-2005 Alt-N Technologies. All rights reserved. MDaemon, WorldClient, and RelayFax are registered trademarks
More informationVodafone PC SMS 2010. (Software version 4.7.1) User Manual
Vodafone PC SMS 2010 (Software version 4.7.1) User Manual July 19, 2010 Table of contents 1. Introduction...4 1.1 System Requirements... 4 1.2 Reply-to-Inbox... 4 1.3 What s new?... 4 2. Installation...6
More information4cast Server Specification and Installation
4cast Server Specification and Installation Version 2015.00 10 November 2014 Innovative Solutions for Education Management www.drakelane.co.uk System requirements Item Minimum Recommended Operating system
More informationEnabling Backups for Windows and MAC OS X
Enabling Backups for Windows and MAC OS X TM Trademarks and Copyrights Copyright Storix, Inc. 1999-2005 Storix is a registered trademark of Storix, Inc. SBAdmin is a trademark of Storix, Inc in the USA
More informationMany home and small office networks exist for no
C H A P T E R Accessing and Sharing Network Resources Many home and small office networks exist for no other reason than to share a broadband Internet connection. The administrators of those networks attach
More informationAuto-Archiving your Emails in Outlook
Changing the AutoArchive Settings for all your Mailbox Folders Changing the AutoArchive Settings for all your Mailbox Folders (cont.) One way to minimize the amount of server space you are using for your
More informationUsing IIS and UltraDev Locally page 1
Using IIS and UltraDev Locally page 1 IIS Web Server Installation IIS Web Server is the web server provided by Microsoft for platforms running the various versions of the Windows Operating system. It is
More informationSetting Up Database Security with Access 97
Setting Up Database Security with Access 97 The most flexible and extensive method of securing a database is called user-level security. This form of security is similar to methods used in most network
More informationSTATISTICA VERSION 9 STATISTICA ENTERPRISE INSTALLATION INSTRUCTIONS FOR USE WITH TERMINAL SERVER
Notes: STATISTICA VERSION 9 STATISTICA ENTERPRISE INSTALLATION INSTRUCTIONS FOR USE WITH TERMINAL SERVER 1. These instructions focus on installation on Windows Terminal Server (WTS), but are applicable
More informationSTATISTICA VERSION 10 STATISTICA ENTERPRISE SERVER INSTALLATION INSTRUCTIONS
Notes: STATISTICA VERSION 10 STATISTICA ENTERPRISE SERVER INSTALLATION INSTRUCTIONS 1. The installation of the STATISTICA Enterprise Server entails two parts: a) a server installation, and b) workstation
More informationIntroduction. Before you begin. Installing efax from our CD-ROM. Installing efax after downloading from the internet
Introduction Before you begin Before you begin installing efax, please check the following: You have received confirmation that your application for the efax service has been processed. The confirmation
More informationUser Profile Manager 2.6
User Profile Manager 2.6 User Guide ForensiT Limited, Innovation Centre Medway, Maidstone Road, Chatham, Kent, ME5 9FD England. Tel: US 1-877-224-1721 (Toll Free) Intl. +44 (0) 845 838 7122 Fax: +44 (0)
More informationUOFL SHAREPOINT ADMINISTRATORS GUIDE
UOFL SHAREPOINT ADMINISTRATORS GUIDE WOW What Power! Learn how to administer a SharePoint site. [Type text] SharePoint Administrator Training Table of Contents Basics... 3 Definitions... 3 The Ribbon...
More informationCTERA Agent Sync Edition for Windows
Quick Walkthrough CTERA Agent Sync Edition for Windows November 2012 Version 3.2 2012, CTERA Networks. All rights reserved. 1 Install CTERA Agent for Windows Tip For more detailed information, refer to
More informationUsing SSH Secure Shell Client for FTP
Using SSH Secure Shell Client for FTP The SSH Secure Shell for Workstations Windows client application features this secure file transfer protocol that s easy to use. Access the SSH Secure FTP by double-clicking
More informationFolder Management in Outlook for Macintosh
Folder Management in Outlook Introduction Learn to create and manage folders in your mailbox on the Exchange server, in Personal Folders saved on your computer s hard disk or to a local network server,
More informationFigure 1: Restore Tab
Apptix Online Backup by Mozy Restore How do I restore my data? There are five ways of restoring your data: 1) Performing a Restore Using the Restore Tab You can restore files from the Apptix Online Backup
More informationilaw Installation Procedure
ilaw Installation Procedure This guide will provide a reference for a full installation of ilaw Case Management Software. Contents ilaw Overview How ilaw works Installing ilaw Server on a PC Installing
More informationBIGPOND ONLINE STORAGE USER GUIDE Issue 1.1.0-18 August 2005
BIGPOND ONLINE STORAGE USER GUIDE Issue 1.1.0-18 August 2005 PLEASE NOTE: The contents of this publication, and any associated documentation provided to you, must not be disclosed to any third party without
More informationLegal Notes. Regarding Trademarks. 2011 KYOCERA MITA Corporation
Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held liable for any problems arising from
More informationLenovo Online Data Backup User Guide Version 1.8.14
Lenovo Online Data Backup User Guide Version 1.8.14 Contents Chapter 1: Installing Lenovo Online Data Backup...5 Downloading the Lenovo Online Data Backup Client...5 Installing the Lenovo Online Data
More informationActive Directory Software Deployment
APPLICATION N0TE ST-0128 March 24, 2006 Product: Active Directory / PCM Deployment System version: ShoreTel 6 Active Directory Software Deployment Courtesy of: Dylan Moser with LANtelligence Inc. This
More informationFile Management Utility User Guide
File Management Utility User Guide Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held
More informationSite Maintenance Using Dreamweaver
Site Maintenance Using Dreamweaver As you know, it is possible to transfer the files that make up your web site from your local computer to the remote server using FTP (file transfer protocol) or some
More informationChanging Your Cameleon Server IP
1.1 Overview Technical Note Cameleon requires that you have a static IP address defined for the server PC the Cameleon server application runs on. Even if the server PC has a static IP address, you may
More informationEPM Performance Suite Profitability Administration & Security Guide
BusinessObjects XI R2 11.20 EPM Performance Suite Profitability Administration & Security Guide BusinessObjects XI R2 11.20 Windows Patents Trademarks Copyright Third-party Contributors Business Objects
More informationSARANGSoft WinBackup Business v2.5 Client Installation Guide
SARANGSoft WinBackup Business v2.5 Client Installation Guide (November, 2015) WinBackup Business Client is a part of WinBackup Business application. It runs in the background on every client computer that
More informationMoving the TRITON Reporting Databases
Moving the TRITON Reporting Databases Topic 50530 Web, Data, and Email Security Versions 7.7.x, 7.8.x Updated 06-Nov-2013 If you need to move your Microsoft SQL Server database to a new location (directory,
More informationServer Installation: ServerTools
Server Installation: ServerTools ServerTools Page 1 Table of Contents To Install ServerTools...3 Backup and Restore...6 Purpose...6 Background...6 Requirements...6 Creating a Backup Schedule using the
More informationOnline Sharing User Manual
Online Sharing User Manual June 13, 2007 If discrepancies between this document and Online Sharing are discovered, please contact backupfeedback@verizon.net. Copyrights and Proprietary Notices The information
More informationInstallation Manual (MSI Version)
Installation Manual (MSI Version) 1. SYSTEM REQUIREMENTS... 2 2. INSTALLATION INSTRUCTIONS... 2 2.1 REMOTE INSTALLATION USING GROUP POLICY... 2 2.1.1 Assigning Software...2 2.1.2 Publishing Software...2
More informationUsing SQL Reporting Services with Amicus
Using SQL Reporting Services with Amicus Applies to: Amicus Attorney Premium Edition 2011 SP1 Amicus Premium Billing 2011 Contents About SQL Server Reporting Services...2 What you need 2 Setting up SQL
More informationTOSHIBA GA-1310. Printing from Windows
TOSHIBA GA-1310 Printing from Windows 2009 Electronics for Imaging, Inc. The information in this publication is covered under Legal Notices for this product. 45081979 04 February 2009 CONTENTS 3 CONTENTS
More informationOPC Server Machine Configuration
OPC Server Machine Configuration General Information For remote OPC Server operation, server must be running under Windows XP Pro, Windows Server 2003, Windows Vista (Business & Ultimate), Windows 7 (Professional
More informationTechnical Bulletin. SQL Express Backup Utility
Technical Bulletin SQL Express Backup Utility May 2012 Introduction This document describes the installation, configuration and use of the SATEON SQL Express Backup utility, which is used to provide scheduled
More informationWindows XP Pro: Basics 1
NORTHWEST MISSOURI STATE UNIVERSITY ONLINE USER S GUIDE 2004 Windows XP Pro: Basics 1 Getting on the Northwest Network Getting on the Northwest network is easy with a university-provided PC, which has
More informationSonicWALL CDP Local Archiving
This document describes how to configure, implement, and manage a local archive for your SonicWALL CDP appliance. It contains the following sections: Feature Overview section on page 1 Using Local Archiving
More informationXerox EX Print Server, Powered by Fiery, for the Xerox 700 Digital Color Press. Printing from Windows
Xerox EX Print Server, Powered by Fiery, for the Xerox 700 Digital Color Press Printing from Windows 2008 Electronics for Imaging, Inc. The information in this publication is covered under Legal Notices
More informationManaging Contacts in Outlook
Managing Contacts in Outlook This document provides instructions for creating contacts and distribution lists in Microsoft Outlook 2007. In addition, instructions for using contacts in a Microsoft Word
More informationBackup/Restore Utility (Version 2.1)
TOSHIBA Strata CIX Product Bulletin PBCIX-0031 July 31, 2006 Backup/Restore Utility (Version 2.1) Backup/Restore The Backup and Restore Utility is a tool that connects to Stratagy ES, Strata ACD, Strata
More informationColligo Email Manager 6.2. Offline Mode - User Guide
6.2 Offline Mode - User Guide Contents Colligo Email Manager 1 Benefits 1 Key Features 1 Platforms Supported 1 Installing and Activating Colligo Email Manager 3 Checking for Updates 4 Updating Your License
More informationTable of Contents. Page 3
Welcome to Exchange Mail Customer Full Name Your e-mail is now being delivered and stored on the new Exchange server. Your new e-mail address is @rit.edu. This is the e-mail address that you should give
More informationTraining Manual. Version 6
Training Manual TABLE OF CONTENTS A. E-MAIL... 4 A.1 INBOX... 8 A.1.1 Create New Message... 8 A.1.1.1 Add Attachments to an E-mail Message... 11 A.1.1.2 Insert Picture into an E-mail Message... 12 A.1.1.3
More informationHow to Create User-Defined Fields and Tables
SAP Business One How-To Guide PUBLIC How to Create User-Defined Fields and Tables Applicable Release: SAP Business One 8.8 All Countries English July 2009 Table of Contents Creating User-Defined Fields
More informationTM Online Storage: StorageSync
TM Online Storage: StorageSync 1 Part A: Backup Your Profile 1: How to download and install StorageSync? Where to download StorageSync? You may download StorageSync from your e-storage account. Please
More informationSTATISTICA VERSION 11 CONCURRENT NETWORK LICENSE WITH BORROWING INSTALLATION INSTRUCTIONS
data analysis data mining quality improvement web-based analytics Notes STATISTICA VERSION 11 CONCURRENT NETWORK LICENSE WITH BORROWING INSTALLATION INSTRUCTIONS 1. The installation of the Concurrent network
More informationFor Active Directory Installation Guide
For Active Directory Installation Guide Version 2.5.2 April 2010 Copyright 2010 Legal Notices makes no representations or warranties with respect to the contents or use of this documentation, and specifically
More information1. TURN OFF UAC SETTINGS
AKOYA INSTALLATION TECHNICAL REQUIREMENTS INTERNET EXPLORER CONFIGURATION FOR AKOYA.NET 1. TURN OFF UAC SETTINGS Before making the following changes in Internet Explorer, you must be a local administrator
More informationaims sql server installation guide
aims sql server installation guide Document Version: 4000 February 2015 CONTENTS AIMS Installation Guide... 3 Installing the AIMS Software... 4 Pre-Requisites... 4 Installation... 4 Shortcuts... 4 Directory
More informationHow to install and use the File Sharing Outlook Plugin
How to install and use the File Sharing Outlook Plugin Thank you for purchasing Green House Data File Sharing. This guide will show you how to install and configure the Outlook Plugin on your desktop.
More informationKerio VPN Client. User Guide. Kerio Technologies
Kerio VPN Client User Guide Kerio Technologies 2011 Kerio Technologies s.r.o. All rights reserved. This guide provides detailed description on Kerio VPN Client, version 7.1 for Windows. All additional
More informationSuite. How to Use GrandMaster Suite. Exporting with ODBC
Suite How to Use GrandMaster Suite Exporting with ODBC This page intentionally left blank ODBC Export 3 Table of Contents: HOW TO USE GRANDMASTER SUITE - EXPORTING WITH ODBC...4 OVERVIEW...4 WHAT IS ODBC?...
More informationManage Filespace with the ARS Console
Academic Services Exeter IT Desktop Support Manage Filespace with the ARS Console Document reference: Document type: Document status: Review period: DS021 Desktop Support Procedure Live Six months Next
More information84-01-31 Windows NT Server Operating System Security Features Carol A. Siegel Payoff
84-01-31 Windows NT Server Operating System Security Features Carol A. Siegel Payoff This article is designed to provide security administrators with a security checklist for going live with Windows NT.
More informationUsing SQL Reporting Services with Amicus
Using SQL Reporting Services with Amicus Applies to: Amicus Attorney Premium 2016 (with or without Premium Billing) With Microsoft SQL Server Reporting Services, use Report Builder to generate and author
More informationManual Password Depot Server 8
Manual Password Depot Server 8 Table of Contents Introduction 4 Installation and running 6 Installation as Windows service or as Windows application... 6 Control Panel... 6 Control Panel 8 Control Panel...
More informationScan to SMB(PC) Set up Guide
Scan to SMB(PC) Set up Guide Regarding Trade Names Windows is a registered trademark of Microsoft Corporation in the U.S.A. and/or other countries. Windows XP and Windows Vista are trademarks of Microsoft
More informationCTERA Agent for Windows
User Guide CTERA Agent for Windows September 2013 Version 4.0 Copyright 2009-2013 CTERA Networks Ltd. All rights reserved. No part of this document may be reproduced in any form or by any means without
More informationCarry it Easy. User Guide
Carry it Easy User Guide User Manual Version 3.2 2004-2010 CoSoSys Ltd. Carry it Easy User Manual Table of Contents Table of Contents... I 1. Introduction... 1 2. System Requirements... 1 3. Installation...
More informationFiery EX4112/4127. Printing from Windows
Fiery EX4112/4127 Printing from Windows 2008 Electronics for Imaging, Inc. The information in this publication is covered under Legal Notices for this product. 45083884 01 April 2009 CONTENTS 3 CONTENTS
More informationSharing Software. Chapter 14
Chapter 14 14 Sharing Software Sharing a tool, like a software application, works differently from sharing a document or presentation. When you share software during a meeting, a sharing window opens automatically
More informationFile systems security: Shared folders & NTFS permissions, EFS Disk Quotas
File systems security: Shared folders & NTFS permissions, EFS Disk Quotas (November 2, 2015) Abdou Illia, Fall 2015 1 Learning Objective Understand Shared Folders Assign Shared Folder permissions NTFS
More informationPC Agent Quick Start. Open the Agent. Autonomy Connected Backup. Version 8.8. Revision 0
T E C H N I C A L N O T E Autonomy Connected Backup Version 8.8 PC Agent Quick Start Revision 0 Use this document as a quick reference for common Connected Backup PC Agent tasks. If the Agent is not on
More informationContents. Welcome to the Priority Zoom System Version 17 for Windows. This document contains instructions for installing the system.
Welcome to the Priority Zoom System Version 17 for Windows. This document contains instructions for installing the system. Contents 1. Introduction... 2 2. Installing the Server... 2 3. Installing a Client...
More informationUsing SSH Secure FTP Client INFORMATION TECHNOLOGY SERVICES California State University, Los Angeles Version 2.0 Fall 2008.
Using SSH Secure FTP Client INFORMATION TECHNOLOGY SERVICES California State University, Los Angeles Version 2.0 Fall 2008 Contents Starting SSH Secure FTP Client... 2 Exploring SSH Secure FTP Client...
More informationFile and Printer Sharing with Microsoft Windows
Operating System File and Printer Sharing with Microsoft Windows Microsoft Corporation Published: November 2003 Abstract File and printer sharing in Microsoft Windows allows you to share the contents of
More informationEMC Celerra Network Server
EMC Celerra Network Server Release 5.6.47 Using Windows Administrative Tools with Celerra P/N 300-004-139 REV A02 EMC Corporation Corporate Headquarters: Hopkintons, MA 01748-9103 1-508-435-1000 www.emc.com
More informationHow to use edgebox as a PDC and to Share Files
edgebox V4.5 How to use edgebox as a PDC and to Share Files Rev - 1.1 1 Storage and Print - Windows Domain Storage & Print EdgeBOX may be configured to interact with other hosts as if it was a Windows
More informationCreating and Managing Shared Folders
Creating and Managing Shared Folders Microsoft threw all sorts of new services, features, and functions into Windows 2000 Server, but at the heart of it all was still the requirement to be a good file
More informationCreating client-server setup with multiple clients
Creating client-server setup with multiple clients Coffalyser.Net uses a SQL client server database model to store all project/experiment- related data. The client-server model has one main application
More informationNovaBACKUP. Storage Server. NovaStor / May 2011
NovaBACKUP Storage Server NovaStor / May 2011 2011 NovaStor, all rights reserved. All trademarks are the property of their respective owners. Features and specifications are subject to change without notice.
More informationIntroduction. Activating the CFR Module License. CFR Configuration
Introduction Effective August 20, 1997, the United States Food and Drug Administration released its Code of Federal Regulations (CFR) Title 21 Part 11: Electronic Records; Electronic Signatures (21 CFR
More informationInstallation Instruction STATISTICA Enterprise Small Business
Installation Instruction STATISTICA Enterprise Small Business Notes: ❶ The installation of STATISTICA Enterprise Small Business entails two parts: a) a server installation, and b) workstation installations
More informationPremier Installation 2013.1 Guide for SQL Server Administrators
for Depreciation, Tracking, Planning, and Reporting Premier Installation 2013.1 Guide for SQL Server Administrators Premier Installation Guide Version 2013.1 Contents Chapter 1. Introduction Supported
More informationPLANNING AND DESIGNING GROUP POLICY, PART 1
84-02-06 DATA SECURITY MANAGEMENT PLANNING AND DESIGNING GROUP POLICY, PART 1 Melissa Yon INSIDE What Is Group Policy?; Software Settings; Windows Settings; Administrative Templates; Requirements for Group
More informationCTERA Agent for Windows
User Guide CTERA Agent for Windows May 2012 Version 3.1 Copyright 2009-2012 CTERA Networks Ltd. All rights reserved. No part of this document may be reproduced in any form or by any means without written
More informationCreating trouble-free numbering in Microsoft Word
Creating trouble-free numbering in Microsoft Word This note shows you how to create trouble-free chapter, section and paragraph numbering, as well as bulleted and numbered lists that look the way you want
More informationMICROSOFT OUTLOOK 2010 WORK WITH CONTACTS
MICROSOFT OUTLOOK 2010 WORK WITH CONTACTS Last Edited: 2012-07-09 1 Access to Outlook contacts area... 4 Manage Outlook contacts view... 5 Change the view of Contacts area... 5 Business Cards view... 6
More informationNetPortal All your documents, direct to your iphone
Copyright Stratospherix 2010 Apple, the Apple logo, ipod, ipod touch, and itunes are trademarks of Apple Inc., registered in the U.S. and other countries. iphone is a trademark of Apple Inc. App Store
More informationWS_FTP Professional 12
WS_FTP Professional 12 Tools Guide Contents CHAPTER 1 Introduction Ways to Automate Regular File Transfers...5 Check Transfer Status and Logs...6 Building a List of Files for Transfer...6 Transfer Files
More informationUC Express Quick Start Guide
UC Express Quick Start Guide Programming IP Phone Keys Guide for Installation, Registration, Configuring & Programming Keys Carleton University 0 Unified Communicator Express Quick Start Guide The Unified
More informationAlmyta Control System Advanced Reference Contents
Almyta Control System Advanced Reference Contents Almyta Control System Advanced Reference... 1 Software Maintenance... 2 Sharing Your Local Company with Other Users. Networked Installation.... 5 Connecting
More informationA+ Guide to Managing and Maintaining Your PC, 7e. Chapter 2 Introducing Operating Systems
A+ Guide to Managing and Maintaining Your PC, 7e Chapter 2 Introducing Operating Systems Objectives Learn about the various operating systems and the differences between them Learn about the components
More informationLepide Software. LepideAuditor for File Server [CONFIGURATION GUIDE] This guide informs How to configure settings for first time usage of the software
Lepide Software LepideAuditor for File Server [CONFIGURATION GUIDE] This guide informs How to configure settings for first time usage of the software Lepide Software Private Limited, All Rights Reserved
More informationAT&T Global Network Client v6.8.0 and Passport IP Setup Instructions for Broadband VPN Access
AT&T Global Network Client v6.8.0 and Passport IP Setup Instructions for Broadband VPN Access October 19, 2006 1 Installing AT&T GNC 6.8.0 for Broadband VPN Access... 3 Getting Started... 3 License Agreement...
More informationMS Outlook 2002/2003. V1.0 BullsEye Telecom Email
IMAP Settings Manual Our application allows you to access your email in many different ways. For those of you who do not wish to use the Webmail interface, you may also manage your email and custom folder
More informationQUANTIFY INSTALLATION GUIDE
QUANTIFY INSTALLATION GUIDE Thank you for putting your trust in Avontus! This guide reviews the process of installing Quantify software. For Quantify system requirement information, please refer to the
More informationNetworking Lab - Vista Public Network Sharing
Networking Lab - Vista Public Network Sharing After completing the lab activity, you will be able to: Explain the differences between Windows XP and Windows Vista network sharing. Explain the purpose of
More informationDatabase Operations (Backup/Restore/Move/Manage) Technical Support Engineering Rosslare Security NA For more information please see www.axtraxng.
Database Operations (Backup/Restore/Move/Manage) Technical Support Engineering Rosslare Security NA For more information please see www.axtraxng.com Database management operations may be performed to insure
More informationChapter 3 Application Monitors
Chapter 3 Application Monitors AppMetrics utilizes application monitors to organize data collection and analysis per application server. An application monitor is defined on the AppMetrics manager computer
More information