Borna Active Directory Manager Help
|
|
- Joleen Davis
- 7 years ago
- Views:
Transcription
1 Borna Active Directory Manager Help A BRIEF INTRODUCTION TO USE BRONA AD MANAGER IS PRESENTED IN THIS PAPER. Dana Pardaz Co.
2 Table of Content 1. Introduction Basic Configuration Connect to Domains Technician Management Creating a Technician Authentication Method Permissions Assigning Roles Permissions Based on Domain & OUs Role Management Managing Permissions User Management What is User Templates? Creating a User Template Creating a User Managing Users Computer Management What is Computer Templates? Creating a Computer Template Creating a Computer Managing Computers Group Management OU Management Reports Appendix 1. Upgrade/Extend Borne License
3 1. Introduction Borna is a web-based software capable of managing Active Directory with several domains in a centralized fashion. It allows administrators to manage users and computers, make report from Active Directory and monitor Active Directory security. Most of the features available at Borna are not accessible with built-in tools in Windows. With more than 40 different and useful reports as well as bulk user management features, Borna is an ideal choice for many organizations. Some important Borna's features are as follows: Bulk user management Bulk computer management More than 40 informative and useful reports Automation of Active Directory task Centralized management of multiple domains Dashboard containing comprehensive information about users, computers and groups Non-invasive delegation of administration User/Computer templates to simplify and regularize user/computer creation process Ability to define work-flow operations Online notification of changes Simplified the process of changing passwords Quick and simple search in Active Directory Remote management of Active Directory with the web-based interface 2. Basic Configuration To start working with Borna AD manager, you should first configure some options. For instance, all domains should be introduced to Borna with a username which has necessary privileges. In this section, all you need to configure in order to be able to work with Borna AD manager is represented. 3
4 2-1. Connect to Domains Using Borna AD manager, you can manage multiple domains in a centralized fashion. To connect Borna to a new domain, click Edit Domains in Administration tab of Borna (Fig 1). Fig 1 Connecting to a new domain Then click Add Domain Controller and fill all the fields, as it is shown in Fig 2. Note: If the user you provided to connect to an Active Directory does not have administration privileges, you cannot perform any changes in Active Directory. However, it is still possible to see reports if the user has required permissions. After you connect Borna to a new domain, you can see basic information about than domain in Dashboard page of Borna. Fig 2 Configuration needed to connect to a domain 4
5 Fig 3 Borna Dashboard 3. Technician Management Borna AD manager has a capability to create technician account (which is not necessarily equivalent to user account in AD) and assign permission to different parts of Borna and AD. You can either manually create a technician or import the corresponding user account from AD into Borna. It is possible to create an account for each staff in IT department and assign required permissions based on their responsibilities. Note: Technician accounts used for AD managements are only defined in Borna and cannot be user to login to computers like AD user account Creating a Technician To define a new technician, click Technicians in Administration tab. Fig 4 Technicians menu in Administration tab The list of all technicians is available in this page. You can create or import new technician by clicking new. To import a user from Active Directory, click Import from AD in the Create Technicians window. 5
6 3-2. Authentication Method Fig 5 Create Technicians window You can indicate the authentication method of technicians in Borna. There are two possible methods: Borna Authentication: In this method, the authentication process checks the username and password defined in Borna. Active Directory Authentication: Using this method, you do not have to create separate technician accounts. This method allows an AD user to login to Borna without a technician account. When this option is selected, the authentication process itself is performed by Borna. 6
7 3-3. Permissions Borna enables a set of fine-grained permissions that fulfill the needs of IT managers. Most routine tasks regarding Active Directory can be performed by non-technical users, such as HR users. However, delegation of these tasks in Active Directory is very complex and will get out of control after a few delegations. Borna provides simple menu and interface to delegate various tasks and control them easily. You will learn how to configure technicians' permissions in the next sections Assigning Roles A technician can have several roles assigned to. Each role grants some privileges depending on its goal. You can define new roles in Roles page which is accessible in Administration tab. You can also indicate the permission associated with each role by clicking Permissions in Administration tab. Finally, one should indicate roles of each technician. To do so, click Permissions tab in Edit Technicians page. If you do not see this page, select a technician in Technicians page and click Modify. Fig 6 Assigning roles to a technician 3-5. Permissions Based on Domain & OUs In addition to specifying roles, you can also indicate domains and OUs a technician's roles apply. To understand its importance, imagine the following scenario: You have several domains distributed in several cities which has its own IT department. In this case, you can easily assign the permissions for creating users and resetting passwords to technicians in other IT departments. You want the HR staff to have permissions to create and modify users to reduce your work-load. At the same time, since some OUs contain critical users, you do not want HR staff to see or modify these OUs. 7
8 To restrict a technician's permissions on specific OUs or domains, click All Domains and then select domains and OUs to which the role apply Role Management Fig 7 Restrict roles on specific domains and OUs In Borna AD manager, each role contains a set of permissions needed to perform specific tasks. Borna is very flexible in this case which allows definition of new roles with arbitrary permissions. To do so, click Roles in Administration tab. Then click New Role. In this page, you can specify the users to which this role assigned. You can also copy the permissions from other roles to speed up the process of role creation. Fig 8 Create roles page 8
9 3-7. Managing Permissions To manage permissions, click Permissions in Administration tab. In this page, you can indicate the permissions of each role as it is shown in the Fig User Management Fig 9 Permissions page Administrators often face several difficulties dealing with routine and tedious tasks related to user accounts, such creating users, resetting passwords, deleting user, etc. In this section, only a few features of Borna AD manager will be introduced to show the gist of what this powerful software provides What is User Templates? Each company has its set of rules for user creation. For instance, some companies force IT department to set phone and address attributes of users. In some companies, address filed in AD is very important since they might have a customized software which use the address attributes of AD users. Some companies might be highly aware of security breaches and require all users to have specific logon hours and computers. However, there is no simple and efficient way to force technicians who create users to follow the company s policy. Even if they are responsible, they may sometimes forget to fill all the required filled. Borna AD manager provides a feature that solve this big issue. In Borna, one can create user templates. Basically, a template gives a customized page which shows only the required attributes of user with certain criteria. For 9
10 instance, you can make some attributes mandatory or set a default value for some common attributes like logon hours. This powerful features facilitate management and delegation. User templates have the following features: User templates can be set to have only the attributes necessary based on the company's policy. It is possible to set a default value for different attributes. This facilitates and speeds up the user creation process. It is possible to define as many templates as you want for different users and technicians. For instance, you can define 2 templates, one for users who are about to be created in HR OUs and one for IT OUs. Templates accelerates the process of user creation whose time is valuable for companies. By default, Borna has two predefined templates used for creating users with basic or advanced information Creating a User Template To define a user template, click Add/Modify User Templates in Administration tab and click New Template. A new page will be shown as it is shown in Fig 10. In this page, you can indicate which attributes are mandatory and which one is unnecessary (invisible). Default values can also be set. Fig کاربر الگوی 10 ایجادNew template شکل. 1 صفحه page 10
11 4-3. Creating a User After creating a user template, you can use them to create new users very efficiently. To do so, click Create New User in Domain Management tab. In this page, you can select the template to want to use. Note that only the templates that you have an access on will be displayed here. As you can see, the default values will be set automatically and you cannot create a user if you forget to fill one of the mandatory attributes. Fig 11 Create a new user with user templates 4-4. Managing Users Borna AD manager have tremendous features that extremely simplifies user management. In fact, many routine and important tasks about users are those that deal with users that already have an account in Active Directory, such as resetting password, unlocking users, etc. Some of these tasks which are crucially important are very hard to perform with default tools available in windows. 11
12 Some Borna's features regarding user management are as follows: Changing user password Enabling/Disabling user accounts Deleting user accounts Unlocking user accounts Specifying logon hours Specifying logon computers Moving users Modifying user membership Modifying Contact info Modifying profile settings You can reach the above items from Domain Management tab. In all the mentioned pages, you can select a set of user accounts and click Apply to do the operation. For instance, click Change Password from Domain Management tab. You can select several users here and then change their password based on your company's policy, as it is shown in Fig 12. Fig 12 Change password page 12
13 5. Computer Management Computers, like user accounts, are highly important Active Directory objects. Computers can also be created, disabled, enabled, deleted and modified similar to user accounts. Borna AD manager provides several features to simplify computer management as it does to user accounts. In this section, a brief overview of Borna's feature will be introduced What is Computer Templates? The way with which computers are created in Active Directory highly depends on an organization's policy. In the simplest fashion, computer objects can be created simply by providing their name. However, in most organizations, the local policy forces technicians to set most computer attributes which is indeed tedious and time-consuming. Computer templates, like user templates, allows administrator to create templates with predefined values and customized settings which speeds up the process and also force technician to fill necessary fields. Computer templates' features are listed as follows: A template indicates which attributes should be set, such as computer name, manager, member of, etc. A template can have a default value for some attributes so as to speed up the computer creation process (some attributes such as member of, and manager are usually set equal for computers in an OU). Several different computer templates can be created for different purposes and assigned to different technicians Creating a Computer Template To define a user template, click Add/Modify User Computes in Administration tab and click New Template. A new page will be shown as it is shown in Fig 13. In this page, you can indicate which attributes are mandatory and which one is unnecessary (invisible). Default values can also be set. 13
14 5-3. Creating a Computer Fig 13 Computer creation template After creating a user template, you can use them to create new computers very efficiently. To do so, click Create Computers in Domain Management tab. In this page, you can select the template to want to use. Note that only the templates that you have an access on will be displayed here. As you can see, the default values will be set automatically and you cannot create a user if you forget to fill one of the mandatory attributes. Fig 14 Creating a computer with computer templates 14
15 5-4. Managing Computers In addition to creating computers, Borna AD manager provides several useful features facilitating computer management in Active Directory. Some of them are listed below: Setting/Modifying computers' membership Resetting computer accounts Enabling computers Disabling computers Deleting computers Moving computers You can reach the above items from Domain Management tab. In all the related pages, you can select a set of computer accounts and click Apply to do the operation, as we have done for user management. 6. Group Management Borna AD manager allows you to create, delete or move groups, like other objects. In order to manage groups, click Domain Management and then click Group Fig 15 Group management features Management. 7. OU Management Borna AD manager also enables administrators and technicians to manage OUs in Active Directory. It is possible to create, delete and modify OUs as simple as possible in Borna. In order to manage OUs click Domain Management and then click OU Management. To create, delete, rename or modifying an OU, right click the OU and select an option. 15
16 Fig 16 OU management 8. Reports Using default built-in tools in Windows, you cannot see the list of users whose passwords are expired. In such cases, administrators should use complicated PowerShell commands or write an script which is only possible by expert administrators. Report in Borna AD manager divides into four categories: User reports Password reports Computer reports Group reports There are more 30 reports available in Borna. Some of the most important ones are as follows: All Users Locked Out Users Disabled Users Account Expired Users Soon-to-expire User Accounts Recent Logon Failures Users with Password Never Expires OS/Service Pack Based Computer Report Last Logged on Based Computer Report 16
17 Groups Without Members To see all reports available in Borna, visit Active Directory Reports page. Fig 17 Soon-to-expire user account reports In all reports, you can filter the output based on domains and OUs. After specifying the domain, click Generate to see the result. In Fig 17, Soon-to-expire user account are shown which can be easily disabled for security reasons. You can also indicate which attributes are to be shown as columns in generated reports (Fig 18). Fig 18 Attributes which can be selected as column in Borna's reports 17
18 Appendix 1. Upgrade/Extend Borne License In order to upgrade or extend Borna license, call our sales department first. Generally, you can see your license Fig 19 Guide menu information by clicking License Information from Guide menu (Fig 19). To activate Borna AD manager, you should first copy the Activation Code from License Information page and submit a request in this page. We will send you your license file as soon as possible. You should then click Open and select the license file and finally click Apply to activate Borna (Fig 20). Fig 20 License Information page 18
Softerra Adaxes Enterprise Directory Solution
Identity and Active Directory Management Softerra Adaxes Enterprise Directory Solution Product Profile make the complex simple Copyright Copyright Softerra, Ltd. Softerra, All rights Ltd. reserved. All
More informationAD Self Password Reset Installation and configuration
AD Self Password Reset Installation and configuration AD Self Password Reset Installation 1 Manual v1.4 Table of Contents TABLE OF CONTENTS 2 SUMMARY 3 INSTALLATION 4 REMOVAL 6 AD SELF PASSWORD RESET CONFIGURATION
More informationPortal User Guide. Customers. Version 1.1. May 2013 http://www.sharedband.com 1 of 5
Portal User Guide Customers Version 1.1 May 2013 http://www.sharedband.com 1 of 5 Table of Contents Introduction... 3 Using the Sharedband Portal... 4 Login... 4 Request password reset... 4 View accounts...
More informationActive Directory Cleaner User Guide 1. Active Directory Cleaner User Guide
Active Directory Cleaner User Guide 1 Active Directory Cleaner User Guide Active Directory Cleaner User Guide 2 Table of Contents 1 Introduction...3 2 Benefits of Active Directory Cleaner...3 3 Features...3
More informationStellar Active Directory Manager
Stellar Active Directory Manager What is the need of Active Directory Manager? Every organization uses Active Directory Services (ADMS) to manage the users working in the organization. This task is mostly
More informationManageEngine ADSelfService Plus. Evaluator s Guide
ManageEngine ADSelfService Plus Evaluator s Guide Table of Contents Document Summary:...3 ADSelfService Plus Overview:...3 Core Features & Benefits:...4 ADSelfService Plus Architecture:...5 Admin Portal:...
More informationP-Synch by M-Tech Information Technology, Inc. ID-Synch by M-Tech Information Technology, Inc.
P-Synch by M-Tech Information Technology, Inc. ID-Synch by M-Tech Information Technology, Inc. Product Category: Password Management/Provisioning Validation Date: TBD Product Abstract M-Tech software streamlines
More informationDelegated Administration Quick Start
Delegated Administration Quick Start Topic 50200 Delegated Administration Quick Start Updated 22-Oct-2013 Applies to: Web Filter, Web Security, Web Security Gateway, and Web Security Gateway Anywhere,
More informationVERALAB LDAP Configuration Guide
VERALAB LDAP Configuration Guide VeraLab Suite is a client-server application and has two main components: a web-based application and a client software agent. Web-based application provides access to
More informationTable of Contents. Welcome to ADSelfService Plus... 3. Contact AdventNet... 4. Getting Started... 6
Table of Contents Welcome to ADSelfService Plus... 3 Contact AdventNet... 4 Getting Started... 6 System Requirements for ADSSP... 7 Installing ADSelfService Plus... 8 Working with ADSelfService Plus...
More informationAdvanced Audit Policy Configurations for LT Auditor+ Reference Guide
Advanced Audit Policy Configurations for LT Auditor+ Reference Guide Contents WINDOWS AUDIT POLICIES REQUIRED FOR LT AUDITOR+....3 ACTIVE DIRECTORY...3 Audit Policy for the Domain...3 Advanced Auditing
More information5 Challenges in Active Directory Management and How to Manage Them
5 Challenges in Active Directory Management and How to Manage Them Presented by: Zubair Alexander Microsoft MVP Directory Services Microsoft Certified Trainer Active Directory General Limitations Password
More informationManageEngine ADManager Plus
ManageEngine ADManager Plus Solution Document www.admanagerplus.com Contents 1. Introduction... 1 2. ADManager Plus: Under the hood... 2 2.1 Modules 3 2.2 Access to product s features 4 3. Management Active
More informationWorkflow Templates Library
Workflow s Library Table of Contents Intro... 2 Active Directory... 3 Application... 5 Cisco... 7 Database... 8 Excel Automation... 9 Files and Folders... 10 FTP Tasks... 13 Incident Management... 14 Security
More informationWith ADManager Plus, there are no extra installations required, and no OPEX, no dependencies on other software!
Document Objective: This document focuses on several key areas related to account management, reporting, delegation where a considerable amount of savings can be achieved upon deployment of ManageEngine
More informationTool Tip. SyAM Management Utilities and Non-Admin Domain Users
SyAM Management Utilities and Non-Admin Domain Users Some features of SyAM Management Utilities, including Client Deployment and Third Party Software Deployment, require authentication credentials with
More informationHIPAA Compliance Use Case
Overview HIPAA Compliance helps ensure that all medical records, medical billing, and patient accounts meet certain consistent standards with regard to documentation, handling, and privacy. Current Situation
More informationFixes for CrossTec ResQDesk
Fixes for CrossTec ResQDesk Fixes in CrossTec ResQDesk 5.00.0006 December 2, 2014 Resolved issue where the list of Operators on Category was not saving correctly when adding multiple Operators. Fixed issue
More informationUser Management Guide
AlienVault Unified Security Management (USM) 4.x-5.x User Management Guide USM v4.x-5.x User Management Guide, rev 1 Copyright 2015 AlienVault, Inc. All rights reserved. The AlienVault Logo, AlienVault,
More informationZ-Term V4 Administration Guide
Z-Term V4 Administration Guide The main purpose of Z-term is to allow for fast account termination process. Usually when an administrator terminates a departed user account, multiple consoles are used
More informationLesson Plans Microsoft s Managing and Maintaining a Microsoft Windows Server 2003 Environment
Lesson Plans Microsoft s Managing and Maintaining a Microsoft Windows Server 2003 Environment (Exam 70-290) Table of Contents Table of Contents... 1 Course Overview... 2 Section 0-1: Introduction... 4
More informationEffective Ways to Manage User Life Cycle in Active Directory
Effective Ways to Manage User Life Cycle in Active Directory What s this whitepaper about? Although Active Directory is a powerful and popular directory service, there are significant gaps between its
More informationCollaborate.ets.org Password Setup & Recovery Guide. Table of Contents
MyPassword is a self-service password management tool. Collaborate.ets.org Password Setup & Recovery Guide https://mypassword.ets.org/ Table of Contents Create/Edit Your Profile (First time use)... I Change
More informationEPM Performance Suite Profitability Administration & Security Guide
BusinessObjects XI R2 11.20 EPM Performance Suite Profitability Administration & Security Guide BusinessObjects XI R2 11.20 Windows Patents Trademarks Copyright Third-party Contributors Business Objects
More informationCreating Organizational Units, Accounts, and Groups. Active Directory Users and Computers (ADUC) 21/05/2013
Creating Organizational Units, Accounts, and Groups Tom Brett Active Directory Users and Computers (ADUC) Active Directory Users and Computers (ADUC) After installing AD DS, the next task is to create
More informationWe optimize your enterprise using Active Directory
Global leader in systems management and security solutions for Active Directory & Group Policy based environment. With extensive real world knowledge and experience, JiJi Technologies Private Limited maximizes
More informationActive Directory Self-Service Bundle
Active Directory Self-Service Bundle Makes life easier for the IT department ZervicePoint Active Directory Self-Service Bundle include a set of services that makes life easier for the IT department that
More informationReports, Features and benefits of ManageEngine ADAudit Plus
Reports, Features and benefits of ManageEngine ADAudit Plus ManageEngine ADAudit Plus is a web based Active Directory change audit software. It provides comprehensive reports on almost every change that
More informationManaging users. Account sources. Chapter 1
Chapter 1 Managing users The Users page in Cloud Manager lists all of the user accounts in the Centrify identity platform. This includes all of the users you create in the Centrify for Mobile user service
More informationNetWrix Password Manager. Quick Start Guide
NetWrix Password Manager Quick Start Guide Contents Overview... 3 Setup... 3 Deploying the Core Components... 3 System Requirements... 3 Installation... 4 Windows Server 2008 Notes... 4 Upgrade Path...
More informationecontrol 3.5 for Active Directory & Exchange Administrator Guide
econtrol 3.5 for Active Directory & Exchange Administrator Guide This Guide Welcome to the econtrol 3.5 for Active Directory and Exchange Administrator Guide. This guide is for system administrators and
More informationPartie Serveur 2008. Lab : Implement Group Policy. Create, Edit and Link GPOs. Lab : Explore Group Policy Settings and Features
Partie Serveur 2008 Implement a Group Policy Infrastructure This module explains what Group Policy is, how it works, and how best to implement Group Policy in your organization. Understand Group Policy
More informationAdministration Guide BES12. Version 12.3
Administration Guide BES12 Version 12.3 Published: 2015-10-30 SWD-20151028105551254 Contents Introduction... 11 About this guide...12 How to use this guide... 13 Steps to administer BES12... 13 Examples
More informationBroker Portal Tutorial Broker Portal Basics
Broker Portal Tutorial Broker Portal Basics Create Agent Connect Link Forgotten Password Change Your Broker Portal Password Delegate View Application Status Create Agent Connect Link Log in to your Producer
More informationActive Directory Manager Pro 5.0.0.0 New Features
Active Directory Manager Pro 5.0.0.0 New Features General Information: info@cionsystems.com Online Support: support@cionsystems.com CionSystems Inc. 16625 Redmond Way, Ste M106 Redmond, WA. 98052 http://www.cionsystems.com
More informationIntroduction to Google Apps for Business Integration
Introduction to Google Apps for Business Integration Overview Providing employees with mobile email access can introduce a number of security concerns not addressed by most standard email security infrastructures.
More informationConfiguring and Troubleshooting Windows Server 2008 Active Directory Domain Services
Course 6425C: Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services Course Details Course Outline Module 1: Introducing Active Directory Domain Services This module provides
More informationInformationNOW System Preferences
InformationNOW System Preferences About this Guide This Quick Reference Guide provides an overview of all options within the System Preferences menu except for Setup. For details regarding the Setup menu,
More informationKaseya 2. Quick Start Guide. for Network Monitor 4.1
Kaseya 2 Syslog Monitor Quick Start Guide for Network Monitor 4.1 June 5, 2012 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private Sector
More informationOwner of the content within this article is www.msexchange.org Written by Marc Grote www.it-training-grote.de
Owner of the content within this article is www.msexchange.org Written by Marc Grote www.it-training-grote.de Exchange 2003 - User, groups, distribution list and contact management with Windows 2003 Active
More informationActive Directory Self-Service FAQ
Active Directory Self-Service FAQ General Information: info@cionsystems.com Online Support: support@cionsystems.com CionSystems Inc. Mailing Address: 16625 Redmond Way, Ste M106 Redmond, WA. 98052 http://www.cionsystems.com
More informationKaseya 2. User Guide. for Network Monitor 4.1
Kaseya 2 Ping Monitor User Guide for Network Monitor 4.1 June 5, 2012 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private Sector IT organizations.
More informationGenesee Intermediate School District Technology & Media Services 2413 West Maple Avenue Flint, Michigan 48507. GenNET Self-Service Helpdesk Tipsheet
Genesee Intermediate School District Technology & Media Services 2413 West Maple Avenue Flint, Michigan 48507 GenNET Self-Service Helpdesk Tipsheet The GenNET Self-Service Help Desk is an innovative, web-based
More informationReports, Features and benefits of ManageEngine ADAudit Plus
Reports, Features and benefits of ManageEngine ADAudit Plus ManageEngine ADAudit Plus is a web based Active Directory change audit software. It provides comprehensive reports on almost every change that
More informationKaseya 2. User Guide. Version 1.1
Kaseya 2 Directory Services User Guide Version 1.1 September 10, 2011 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private Sector IT organizations.
More informationADSelfService Plus Client Software Installation Guide
ADSelfService Plus Client Software Installation Guide ( I n s t a l l a t io n t h r o u g h A DS e l f S e r v ic e P l u s w e b p o r t a l a n d M a n u a l I n s t a l l a t io n ) 1 Table of Contents
More informationNetWrix Account Lockout Examiner Version 4.0 Administrator Guide
NetWrix Account Lockout Examiner Version 4.0 Administrator Guide Table of Contents Concepts... 1 Product Architecture... 1 Product Settings... 2 List of Managed Domains and Domain Controllers... 2 Email
More informationUser Migration Tool. Note. Staging Guide for Cisco Unified ICM/Contact Center Enterprise & Hosted Release 9.0(1) 1
The (UMT): Is a stand-alone Windows command-line application that performs migration in the granularity of a Unified ICM instance. It migrates only Unified ICM AD user accounts (config/setup and supervisors)
More informationService Desk R11.2 Upgrade Procedure - Resetting USD passwords and unlocking accounts in etrust Web Admin
Service Desk R11.2 Upgrade Procedure - Resetting USD passwords and unlocking accounts in etrust Web Admin Purpose of document The purpose of this document is to assist users in reset their USD passwords
More informationVector HelpDesk - Administrator s Guide
Vector HelpDesk - Administrator s Guide Vector HelpDesk - Administrator s Guide Configuring and Maintaining Vector HelpDesk version 5.6 Vector HelpDesk - Administrator s Guide Copyright Vector Networks
More informationVirto Password Reset Web Part for SharePoint. Release 3.1.0. Installation and User Guide
Virto Password Reset Web Part for SharePoint Release 3.1.0 Installation and User Guide 2 Table of Contents OVERVIEW... 3 SYSTEM REQUIREMENTS... 3 OPERATING SYSTEM... 3 SERVER... 3 BROWSER... 4 INSTALLATION...
More informationCLEO NED Active Directory Integration. Version 1.2.0
CLEO NED Active Directory Integration Version 1.2.0 CLEO NED Active Directory Integration Manual v1.2.0 Copyright c 2010 Lancaster University Network Services Limited. All rights reserved. Microsoft, Windows,
More informationGroup Management Server User Guide
Group Management Server User Guide Table of Contents Getting Started... 3 About... 3 Terminology... 3 Group Management Server is Installed what do I do next?... 4 Installing a License... 4 Configuring
More informationPowerLink for Blackboard Vista and Campus Edition Install Guide
PowerLink for Blackboard Vista and Campus Edition Install Guide Introduction...1 Requirements... 2 Authentication in Hosted and Licensed Environments...2 Meeting Permissions... 2 Installation...3 Configuring
More informationVersion 6.5 Users Guide
Version 6.5 Users Guide INTRODUCTION 9 HOW TO USE THIS GUIDE 9 INSTALLATION PROCEEDURE 10 SYSTEM OVERVIEW 12 SYSTEM CONCEPTS AND TERMINOLOGY 12 Requests 12 Problems 13 Changes 13 System Access and Menu
More informationIntegrating LANGuardian with Active Directory
Integrating LANGuardian with Active Directory 01 February 2012 This document describes how to integrate LANGuardian with Microsoft Windows Server and Active Directory. Overview With the optional Identity
More informationMicrosoft Project Server 2010 Administrator's Guide
Microsoft Project Server 2010 Administrator's Guide 1 Copyright This document is provided as-is. Information and views expressed in this document, including URL and other Internet Web site references,
More informationQuality Center LDAP Guide
Information Services Quality Assurance Quality Center LDAP Guide Version 1.0 Lightweight Directory Access Protocol( LDAP) authentication facilitates single sign on by synchronizing Quality Center (QC)
More informationUser Management Tool 1.5
User Management Tool 1.5 2014-12-08 23:32:23 UTC 2014 Citrix Systems, Inc. All rights reserved. Terms of Use Trademarks Privacy Statement Contents User Management Tool 1.5... 3 ShareFile User Management
More informationAdministration Guide. BlackBerry Enterprise Service 12. Version 12.0
Administration Guide BlackBerry Enterprise Service 12 Version 12.0 Published: 2015-01-16 SWD-20150116150104141 Contents Introduction... 9 About this guide...10 What is BES12?...11 Key features of BES12...
More informationRES ONE Automation 2015 Task Overview
RES ONE Automation 2015 Task Overview Task Overview RES ONE Automation 2015 Configuration Tasks The library Configuration contains Tasks that relate to the configuration of a computer, such as applying
More informationA Conceptual Overview for CMS Administrators, Architects, and Developers
Sitecore CMS 6 version 0.5 Security Reference Rev. 080627 Sitecore CMS 6 Security Reference A Conceptual Overview for CMS Administrators, Architects, and Developers Table of Contents Chapter 1 Introduction...
More informationCustomer admin guide. UC Management Centre
Customer admin guide UC Management Centre June 2013 Contents 1. Introduction 1.1 Logging into the UC Management Centre 1.2 Language Options 1.3 Navigating Around the UC Management Centre 4 4 5 5 2. Customers
More informationNovaBACKUP. Storage Server. NovaStor / May 2011
NovaBACKUP Storage Server NovaStor / May 2011 2011 NovaStor, all rights reserved. All trademarks are the property of their respective owners. Features and specifications are subject to change without notice.
More informationObjectives. At the end of this chapter students should be able to:
NTFS PERMISSIONS AND SECURITY SETTING.1 Introduction to NTFS Permissions.1.1 File Permissions and Folder Permission.2 Assigning NTFS Permissions and Special Permission.2.1 Planning NTFS Permissions.2.2
More informationMedworxx Learning Management System Administration Guide. Medworxx Learning Management System Version 3.4.9.2. May 2011, Version 8
Medworxx Learning Management System Administration Guide Medworxx Learning Management System Version 3.4.9.2 May 2011, Version 8 2005, Updated 2010 Medworxx, Inc. All rights reserved. Medworxx Inc. 121
More informationA List Owner s Quick Reference Guide to BGSU s LISTSERV
Information Technology Services A List Owner s Quick Reference Guide to BGSU s LISTSERV How do I request a new LISTSERV Electronic Mailing List? If you are interested in establishing an electronic mailing
More informationBank OnLine Commercial Administrator User s Guide
Bank OnLine Commercial Administrator User s Guide Rev12-15 P.O. Box 6469 Corpus Christi, Texas 78466-6469 Cash Management E-mail: CashManagement@AmericanBank.com Support Team: (361) 653-5296 Sales Team:
More informationGetting Started Guide
Getting Started Guide Contacting ScriptLogic Contacting ScriptLogic ScriptLogic may be contacted about any questions, problems or concerns you might have at: ScriptLogic Corporation 6000 Broken Sound Parkway
More informationExecuTrain Course Outline Configuring & Troubleshooting Windows Server 2008 Active Directory Domain Services MOC 6425C 5 Days
ExecuTrain Course Outline Configuring & Troubleshooting Windows Server 2008 Active Directory Domain Services MOC 6425C 5 Days Introduction This five-day instructor-led course provides in-depth training
More informationPRODUCT WHITE PAPER LABEL ARCHIVE. Adding and Configuring Active Directory Users in LABEL ARCHIVE
PRODUCT WHITE PAPER LABEL ARCHIVE Adding and Configuring Active Directory Users in LABEL ARCHIVE TEKLYNX International March 19, 2010 Introduction Now more than ever, businesses large and small alike are
More information6425C - Windows Server 2008 R2 Active Directory Domain Services
Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services Introduction This five-day instructor-led course provides in-depth training on configuring Active Directory Domain Services
More informationMaster Data Services Environment
Master Data Services Training Guide Master Data Services Environment Portions developed by Profisee Group, Inc. 2010 Microsoft Master Data Services Overview Master Data Services Implementation Master Data
More informationUser Guide. Version R91. English
AuthAnvil User Guide Version R91 English August 25, 2015 Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept EULATOS as updated from
More informationDadeschools.net Site Administrator Security Settings Request for Comment (RFC)
Dadeschools.net Site Administrator Security Settings Request for Comment (RFC) This RFC was prepared by the Information Technology Services (ITS) Department of Miami-Dade County Public Schools (M-DCPS).
More informationaccount multiple solutions
Quick Start Guide 1 Our easy to use guide will get you up and running in no time! The guide will assist you with: Generating your Sage Pay login Navigation Creating contacts Creating system users Setting
More informationDell KACE K1000 System Management Appliance Version 5.4. Service Desk Administrator Guide
Dell KACE K1000 System Management Appliance Version 5.4 Service Desk Administrator Guide October 2012 2004-2012 Dell Inc. All rights reserved. Reproduction of these materials in any manner whatsoever without
More informationWindows Server 2008 R2: Active Directory and Server Manager Remoting
Windows Server 2008 R2: Active Directory and Server Manager Remoting Table of Contents Windows Server 2008 R2: Active Directory and Server Manager Remoting... 1 Exercise 1 Simplifying Management using
More informationTable of Contents 1. INTRODUCTION: 4 2. ACTIVE DIRECTORY MANAGEMENT 5. 2.1 ACTIVE DIRECTORY OBJECTS PROVISIONING 6 Exercise 1: User Provisioning 6
Table of Contents 1. INTRODUCTION: 4 2. ACTIVE DIRECTORY MANAGEMENT 5 2.1 ACTIVE DIRECTORY OBJECTS PROVISIONING 6 Exercise 1: User Provisioning 6 Steps to Create a Single user: 6 To make this User a member
More informationArtfulBits Password Reset Web Part
User Guide ArtfulBits Password Reset Web Part for Microsoft SharePoint Overview... 1 Feature List... 2 Why ArtfulBits Password Reset Web Part?... 2 How to Use... 2 Password Reset Process Flow... 2 Password
More informationJIJI AUDIT REPORTER FEATURES
JIJI AUDIT REPORTER FEATURES JiJi AuditReporter is a web based auditing solution for live monitoring of the enterprise changes and for generating audit reports on each and every event occurring in the
More informationGyanmandir Applications EMPLOYEE SOP FOR PMS (2009 10 )
EMPLOYEE SOP FOR PMS (2009 10 ) Table of Contents PMS...3 KRA Template:...5 ICA Individual Contribution Area....6 CR Template:...7 Tabs available in Menu for the Employee:...8 Manager s Tab:...9 Assessment
More informationIntel Entry Storage System SS4200-E Active Directory Implementation and Troubleshooting
Intel Entry Storage System SS4200-E Active Directory Implementation and Troubleshooting 1 Active Directory Overview SS4200-E Active Directory is based on the Samba 3 implementation The SS4200-E will function
More information70-640 R4: Configuring Windows Server 2008 Active Directory
70-640 R4: Configuring Windows Server 2008 Active Directory Course Introduction Course Introduction Chapter 01 - Installing the Active Directory Role Lesson: What is IDA? What is Active Directory Identity
More informationInstalling, Configuring, and Managing a Microsoft Active Directory
Installing, Configuring, and Managing a Microsoft Active Directory Course Outline Part 1: Configuring and Managing Active Directory Domain Services Installing Active Directory Domain Services Managing
More informationConfiguring and Troubleshooting Windows 2008 Active Directory Domain Services
About this Course Configuring and Troubleshooting Windows This five-day instructor-led course provides in-depth training on implementing, configuring, managing and troubleshooting Active Directory Domain
More informationZyWALL OTP Co works with Active Directory Not Only Enhances Password Security but Also Simplifies Account Management
ZyWALL OTP Co works with Active Directory Not Only Enhances Password Security but Also Simplifies Account Management Problem: The employees of a global enterprise often need to telework. When a sales representative
More informationLepide Active Directory Self Service. Configuration Guide. Follow the simple steps given in this document to start working with
Lepide Active Directory Self Service Configuration Guide 2014 Follow the simple steps given in this document to start working with Lepide Active Directory Self Service Table of Contents 1. Introduction...3
More informationKaseya 2. Quick Start Guide. for Network Monitor 4.1
Kaseya 2 VMware Performance Monitor Quick Start Guide for Network Monitor 4.1 June 7, 2012 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private
More informationAdministrators Help Manual
Administrators Help Manual Lepide Active Directory Self Service Lepide Software Private Limited Page 1 Administrators Help Manual for Active Directory Self-Service Lepide Active Directory Self Service
More informationConfiguring and Troubleshooting Windows Server 2008 Active Directory Domain Services
Active Directory About this Course This five-day instructor-led course provides in-depth training on implementing, configuring, managing and troubleshooting (AD DS) in and R2 environments. It covers core
More informationWindows Log Monitoring Best Practices for Security and Compliance
Windows Log Monitoring Best Practices for Security and Compliance Table of Contents Introduction... 3 Overview... 4 Major Security Events and Policy Changes... 6 Major Security Events and Policy Changes
More informationNetWrix Logon Reporter V 2.0
NetWrix Logon Reporter V 2.0 Quick Start Guide Table of Contents 1. Introduction... 3 1.1. Product Features... 3 1.2. Licensing... 4 1.3. How It Works... 5 1.4. Report Types Available in the Advanced Mode...
More informationConfiguring and Troubleshooting Windows Server 2008 Active Directory Domain MOC 6425
Configuring and Troubleshooting Windows Server 2008 Active Directory Domain MOC 6425 Course Outline Module 1: Introducing Active Directory Domain Services This module provides an overview of Active Directory
More informationNCAA Single-Source Sign-On System User Guide
NCAA Single-Source Sign-On System Table of Contents General Description... 1 Glossary of Terms... 1 Common Features Log In... 2 Password... 3 Log Out... 4 Tabs... 4 Buttons and Links... 4 Management and
More informationHow to monitor AD security with MOM
How to monitor AD security with MOM A article about monitor Active Directory security with Microsoft Operations Manager 2005 Anders Bengtsson, MCSE http://www.momresources.org November 2006 (1) Table of
More informationChapter. Managing Group Policy MICROSOFT EXAM OBJECTIVES COVERED IN THIS CHAPTER:
Chapter 10 Managing Group Policy MICROSOFT EXAM OBJECTIVES COVERED IN THIS CHAPTER: Implement and troubleshoot Group Policy. Create a Group Policy object (GPO). Link an existing GPO. Delegate administrative
More informationMS-6425C - Configuring Windows Server 2008 Active Directory Domain Services
MS-6425C - Configuring Windows Server 2008 Active Directory Domain Services Table of Contents Introduction Audience At Clinic Completion Prerequisites Microsoft Certified Professional Exams Student Materials
More informationTable of Contents. 1. Introduction...7 2. Active Directory Management..8. 2.1. Active Directory Objects Provisioning..8
1 Table of Contents 1. Introduction...7 2. Active Directory Management..8 2.1. Active Directory Objects Provisioning..8 Exercise 1: Single Step User Provisioning......8 - Create Single User........ 9 -
More informationSAS 9.4 Management Console
SAS 9.4 Management Console Guide to Users and Permissions SAS Documentation The correct bibliographic citation for this manual is as follows: SAS Institute Inc 2015. SAS 9.4 Management Console: Guide to
More information