Beta Test Cases. ESET NOD32 Antivirus 5/ESET Smart Security 5. A. Installation. A1. New installation Typical. Pre-conditions: Steps to reproduce:
|
|
- Winfred Barker
- 7 years ago
- Views:
Transcription
1 ESET NOD32 Antivirus 5/ESET Smart Security 5 Beta Test Cases A. Installation A1. New installation Typical The aim of this use case is to verify that it is possible to install ESET NOD32 Antivirus 5/ESET Smart Security 5 correctly in the most common scenario Typical installation, without custom settings. 2. There is no other anti-virus product installed on the system. 3. Installation package of ESET Smart Security (ESS) or ESET NOD32 Antivirus v5 "*.msi" is available and prepared on local disk. 1. Launch the installation.msi package by double-clicking on it. 2. Accept End-User License Agreement. 3. Choose "Typical" mode of installation. 4. Confirm participation in ThreatSense.net. 5. Select that you wish to enable detection of potentially unwanted applications and confirm. 6. Wait until the installation is completed. 7. When network is detected, "New network connection detected" window appears; choose protection mode Sharing. 8. When the activation wizard appears, select Activate Beta version. 9. Enter details required in the activation form (name, address, ) and confirm to proceed. 10. Restart the OS. The installation process should run and complete smoothly, without errors. Please note that if you have User Account Control enabled in Windows, launch of the installation package will result in a prompt for confirming installation or providing administrative credentials (where applicable). In a case it does not behave this way please A2. Re-installation from older version 2. Old version of EAV/ESS is installed on OS, database is updated and the OS is restarted. 3. Installation package of the new version of EAV/ESS "*.msi" is available and prepared on local disk.
2 1. Double click on the installation package (*.msi file). 2. Click "Next". 3. Choose "I accept the terms in the License Agreement" and click "Next". 4. Click "Next". 5. Click "Install". 6. Click "Finish". 7. Click on ESET icon and open the ESET application. 8. Restart your computer and start the ESET application to check the current state of the application. 1. "EAV/ESS Setup" window is displayed. 2. End-User License Agreement is shown. 3. "Installation Mode" window is displayed. 4. Option "Use current settings" is enabled. Options (Typical and Custom) at the bottom are grayed out. 5. "Ready to Install" window appears. 6. Installation of EAV/ESS is started (User Account Control window appears on some operating systems). Status progress bar is used to display the current status of installation. Finally the last window of the Setup Wizard is displayed. 7. Splash screen is shown. Prompt requiring user attention is shown (in notification area). 8. "Maximum protection may not be ensured" is shown in orange color. A computer restart is recommended. "Maximum protection" is shown in green color. B. Computer Scan B1. Running a custom scan with shutdown upon its completion The aim of this use case is to test that the scanning functionality is working correctly and that the product will shut down the PC when requested. 2. ESS v5 is installed and running correctly. 1. Click on EAV/ESS tray icon and select "Open ESET Smart Security 5 or ESET NOD32 Antivirus 5". 2. Go to Computer Scan -> Custom scan 3. From the "Scan profile" dropdown box, select "In-depth scan". 4. Use the checkboxes to select scan targets: Operating memory, disk C:\ (and other local disks if available) 5. Click "Scan". 6. When the "Scan progress" dialog window appears, click on the link "Enable shutdown after scan" for your PC to be shut down upon completion of the scan. 7. Close the main GUI window. 8. Wait until the scan is completed and the tray notification appears. 9. Wait until the countdown expires and the PC is shut down.
3 Upon its start, the in-depth custom scan should display the progress bar and a line with files currently being scanned, followed by the count of detected threats. There is a possibility to open the running scan in a new window with detailed log. After sending it back to the background, the link "Bring to foreground" can be used to return to the initial progress bar. After closing the main GUI window, the actual progress of the scan will be indicated by animated tray icon. Hovering mouse cursor over the icon will display information about the scan in progress. As soon as the scan is completed, a notification window will appear, counting down 60 seconds to the shutdown, prompting the user to save changes in open documents and applications. It also offers a possibility to shut-down immediately or cancel the shutdown. When the time elapses, the PC should shut down correctly. B2. Running a smart scan The aim of this use case is to test that the scanning functionality is working correctly and that the tray notification displays correct information and links back to the main GUI window. 2. EAV/ESS v5 is installed and running correctly. 1. Click on EAV/ESS tray icon and select "Open ESET Smart Security 5" or ESET NOD32 Antivirus 5". 2. Go to Computer Scan -> Smart Scan. 3. Close the main GUI window. 4. Wait until the scan is completed and the tray notification appears. Tray notification about completed scan will appear as soon as the scan is completed. The notification will provide short summary of the scan, including its duration, time started, time finished, number of scanned objects, infected objects and cleaned objects. The notification will automatically disappear after a few seconds, based on the notification settings (default value is 10 seconds). B3. Web access protection 1. ESS/EAV is installed correctly. 2. OS is restarted after ESS/EAV installation. 3. All default settings are applied 1. Open web page and try to download eicar.com from "Download area using the standard protocol http" part of web page (click eicar.com). Use different versions of web browsers (Internet Explorer, Mozilla Firefox, Google Chrome, Opera, ). 2. Open ESS/EAV Main window -> Tools -> Log files and select "Detected threats" from drop-down menu. 1. Web access protection detects threat. Threat alert is displayed. 2. Text HTTP filter is in Scanner column for last threat.
4 B4. POP3 or IMAP filter protection 1. ESS/EAV is installed correctly. 2. Operating system is restarted after ESS/EAV installation. 3. Main window is opened. 4. Eicar.com file is downloaded (from web page protection of all antivirus programs has to be disabled during downloading; protection of ESS/EAV has to be enabled after download) to local drive. 1. Open client (use different versions of clients or different clients). 2. Receive containing eicar.com file ( has been sent from other account). 3. Open ESS/EAV Main window -> Tools -> Logs and select "Detected threats" from drop-down menu. 1. client is opened. 2. Real-time protection detects threat. Threat alert is displayed. 3. Text "POP3 or IMAP filter" is in Scanner column for last threat. B5. -filter protection 1. ESS/EAV is installed correctly. 2. Main window is opened. 3. Eicar.com file is downloaded (from web page protection of all antivirus programs and Windows defender has to be disabled during downloading; protection of ESS/EAV has to be enabled after download) to local drive. 4. Real-time file system protection is disabled in F5 (advanced setup) Computer Antivirus and antispyware Real-time file system protection. 5. Operating system is restarted. 1. Open client (use different versions of clients). 2. Send with attached eicar.com to your test address. 3. Open ESS/EAV Main window -> Tools -> Logs and select "Detected threats" from drop-down menu. 1. client is opened. 2. scanner detects threat. Threat alert is displayed. 3. Text " filter name of the client, e.g. Thunderbird" is in Scanner column for 4. last threat.
5 C. Parental Control C1. Correct blocking of web sites The aim of this use case is to verify that, when enabled, the Parental control feature is correctly filtering websites. 1. ESS is installed and running correctly. 2. Main ESS window is opened. 1. Click Home pane on the left side of the main windows of GUI in case you are somewhere else within the main GUI. 2. Enable Parental Control in case it is not enabled. 3. Assign the role "Child" to the Windows user account you are currently using. 4. Open any web browser and try to open websites which you think are not appropriate for a minor and should therefore not be allowed for viewing by a child. Parental Control behavior should block websites inappropriate for child audience. C2. Disable Parental control for certain time 1. ESS is installed correctly. 2. Main ESS window is opened. 1. Click Home pane on the left side of the main window of GUI in case you are somewhere else within the main GUI. 2. Enable Parental Control in case it is not enabled. 3. Click on Disable Parental Control 4. A pop-up window should appear with options for how long the protection should be disabled. 5. Try to set different time periods for disabling the protection and observe if Parental control will be automatically reenabled after the specified time interval (to verify that the feature has been re-enabled, check for the message "Parental is Enabled" in the main GUI window) Parental Control should automatically be re-enabled after the specified time interval. C3. Add/remove/change URL exception for Accounts The aim of this use case is to find out if ESET Parental control is editing exceptions for URL webpages correct way. Preconditions: 1. ESS is installed correctly. 2. Main ESS window is opened.
6 1. Click Home pane on the left of GUI in a case you are somewhere else within main GUI. 2. Click on the Parental Control link in the main GUI area 3. Enable Parental Control in a case it is not enabled 4. Click on a link on the bottom of main GUI Set exception for a web page 5. Dialog should appear 6. Write down URL which you deserve to set an exception for. 7. On the lower part of dialog there should be all windows user accounts listed with the current Block or Allow state for the written down URL. When the checkbox is ticked it means the URL is blocked for the corresponding Account. 8. Thick a checkbox for the corresponding account press OK button and go to the Setup of that corresponding account. 9. Navigate to the next Tab of the newly opened window called Blocked and Allowed web pages 10. Observe if previously written down URL is recorded in the Blocked web site list box. You should create a block exception for an URL for particular Windows User Account and it should be recorded in its setup. D. ESET Cloud-Powered reputation D1. Cloud lookup for files The aim of this use case is to find out if ESET Cloud-Powered Reputation feature works correct way and displays results about files. Preconditions: 1. EAV/ESS is installed correctly. 2. Main EAV/ESS window is opened. 1. Click Home pane on the left of GUI in a case you are somewhere else within main GUI. 2. Click Tools pane on the left side of the main GUI 3. Enable Parental Control in a case it is not enabled 4. Click on a link on the bottom of main GUI Set exception for a web page 5. Dialog should appear 6. Write down URL which you deserve to set an exception for. 7. On the lower part of dialog there should be all windows user accounts listed with the current Block or Allow state for the written down URL. When the checkbox is ticked it means the URL is blocked for the corresponding Account. 8. Thick a checkbox for the corresponding account press OK button and go to the Setup of that corresponding account. 9. Navigate to the next Tab of the newly opened window called Blocked and Allowed web pages 10. Observe if previously written down URL is recorded in the Blocked web site list box. You should create a block exception for an URL for particular Windows User Account and it should be recorded in its setup
7 E. SysInspector E1. Create SysInspector snapshot The aim of this use case is to verify that it is possible to successfully create a snapshot of the OS using ESET SysInspector tool. 2. EAV/ESS v5 is installed and running correctly. 3. OS is restarted after EAV/ESS v5 installation. 1. Click on ESET icon and open main window of EAV/ESS v5. 2. Go to Tools -> SysInspector; launch SysInspector by clicking on its icon. 3. Select Create Enter a comment to briefly describe your snapshot. 5. Wait until the snapshot is created. During creation of the snapshot, progress will be displayed in the status column. As soon as it is completed, the status will read "Created". F. Uninstallation F1. Uninstallation of V5 BETA The aim of this use case is to find out potential issues while uninstalling ESET product on different Operating systems and its versions with default applications and configurations on user s machines. 2. EAV/ESS v5 is installed and running correctly. 1. Click on a Start menu of an operating system 2. Find out ESET program 3. Click on Uninstall link within ESET folder in Start menu 4. Click Next button within dialog which appear on the desktop 5. Click Remove button 6. Feel free to submit us your feedback or leave it blank an un-tick the checkbox I want to submit the questionnaire data and click Next 7. Click Remove Uninstallation process should finish successfully and not freeze after a while.
ESET NOD32 Antivirus 4 for Linux Desktop. Quick Start Guide
ESET NOD32 Antivirus 4 for Linux Desktop Quick Start Guide ESET NOD32 Antivirus 4 provides state-of-the-art protection for your computer against malicious code. Based on the ThreatSense scanning engine
More information8x8 Click2Pop User Guide
USER GUIDE 8x8 User Guide Getting Started with April 2014 Contents Introduction... 3 What s new.... 3 8x8.... 3 Here is how works...4 8x8 Click2Connect.... 4 Requirements.... 4 Installation on Microsoft
More informationTo begin, visit this URL: http://www.ibm.com/software/rational/products/rdp
Rational Developer for Power (RDp) Trial Download and Installation Instructions Notes You should complete the following instructions using Internet Explorer or Firefox with Java enabled. You should disable
More informationBIGPOND ONLINE STORAGE USER GUIDE Issue 1.1.0-18 August 2005
BIGPOND ONLINE STORAGE USER GUIDE Issue 1.1.0-18 August 2005 PLEASE NOTE: The contents of this publication, and any associated documentation provided to you, must not be disclosed to any third party without
More informationowncloud Configuration and Usage Guide
owncloud Configuration and Usage Guide This guide will assist you with configuring and using YSUʼs Cloud Data storage solution (owncloud). The setup instructions will include how to navigate the web interface,
More informationHow to install and use the File Sharing Outlook Plugin
How to install and use the File Sharing Outlook Plugin Thank you for purchasing Green House Data File Sharing. This guide will show you how to install and configure the Outlook Plugin on your desktop.
More informationConfiguring Trend Micro Content Security
9 CHAPTER This chapter describes how to configure the CSC SSM using the CSC Setup Wizard in ASDM and the CSC SSM GUI, and includes the following sections: Information About the CSC SSM, page 9-1 Licensing
More informationOutlook Profile Setup Guide Exchange 2010 Quick Start and Detailed Instructions
HOSTING Administrator Control Panel / Quick Reference Guide Page 1 of 9 Outlook Profile Setup Guide Exchange 2010 Quick Start and Detailed Instructions Exchange 2010 Outlook Profile Setup Page 2 of 9 Exchange
More informationSecuraLive ULTIMATE SECURITY
SecuraLive ULTIMATE SECURITY Home Edition for Windows USER GUIDE SecuraLive ULTIMATE SECURITY USER MANUAL Introduction: Welcome to SecuraLive Ultimate Security Home Edition. SecuraLive Ultimate Security
More information1 Intel Smart Connect Technology Installation Guide:
1 Intel Smart Connect Technology Installation Guide: 1.1 System Requirements The following are required on a system: System BIOS supporting and enabled for Intel Smart Connect Technology Microsoft* Windows*
More information8x8 Virtual Office Telephony Interface for Salesforce
8x8 Virtual Office Telephony Interface for Salesforce Administrator Guide May 2014 The Champion For Business Communications Table of Contents 8x8 Virtual Office Telephony Interface for Salesforce.... 3
More informationRemote Desktop Web Access. Using Remote Desktop Web Access
Remote Desktop Web Access What is RD Web Access? RD Web Access is a Computer Science service that allows you to access department software and machines from your Windows or OS X computer, both on and off
More informationSQL Server 2005: Report Builder
SQL Server 2005: Report Builder Table of Contents SQL Server 2005: Report Builder...3 Lab Setup...4 Exercise 1 Report Model Projects...5 Exercise 2 Create a Report using Report Builder...9 SQL Server 2005:
More informationPassport installation Windows 8 + Firefox
Passport installation Windows 8 + Firefox OS Version Windows 8 System Type 32-bit and 64-bit Browser name & version Firefox 23 Before you begin Check you have Anti Virus software installed on your computer
More informationFOR MAC. Quick Start Guide. Click here to download the most recent version of this document
FOR MAC Quick Start Guide Click here to download the most recent version of this document ESET Cyber Security Pro provides state-of-the-art protection for your computer against malicious code. Based on
More informationVodafone PC SMS 2010. (Software version 4.7.1) User Manual
Vodafone PC SMS 2010 (Software version 4.7.1) User Manual July 19, 2010 Table of contents 1. Introduction...4 1.1 System Requirements... 4 1.2 Reply-to-Inbox... 4 1.3 What s new?... 4 2. Installation...6
More informationConfiguring Thunderbird for Flinders Mail at home.
Configuring Thunderbird for Flinders Mail at home. Downloading Thunderbird can be downloaded from the Mozilla web site located at http://www.mozilla.org/download.html This web site also contains links
More informationInitial Setup of Mozilla Thunderbird with IMAP for Windows 7
Initial Setup of Mozilla Thunderbird Concept This document describes the procedures for setting up the Mozilla Thunderbird email client to download messages from Google Mail using Internet Message Access
More informationProperSync 1.3 User Manual. Rev 1.2
ProperSync 1.3 User Manual Rev 1.2 Contents Overview of ProperSync... 3 What is ProperSync... 3 What s new in ProperSync 1.3... 3 Getting Started... 4 Installing ProperSync... 4 Activating ProperSync...
More informationSetting up VMware ESXi for 2X VirtualDesktopServer Manual
Setting up VMware ESXi for 2X VirtualDesktopServer Manual URL: www.2x.com E-mail: info@2x.com Information in this document is subject to change without notice. Companies, names, and data used in examples
More informationExchange 2010. Outlook Profile/POP/IMAP/SMTP Setup Guide
Exchange 2010 Outlook Profile/POP/IMAP/SMTP Setup Guide Document Revision Date: Nov. 13, 2013 Exchange 2010 Outlook Profile/POP/IMAP/SMTP Setup Guide i Contents Introduction... 1 Exchange 2010 Outlook
More information1. Open Thunderbird. If the Import Wizard window opens, select Don t import anything and click Next and go to step 3.
Thunderbird The changes that need to be made in the email programs will be the following: Incoming mail server: newmail.one-eleven.net Outgoing mail server (SMTP): newmail.one-eleven.net You will also
More informationSharePoint 2007 Get started User Guide. Team Sites
SharePoint 2007 Get started User Guide Team Sites Contents 1. Overview... 2 1.1 What is SharePoint?... 2 1.2 What is a SharePoint Team Site?... 2 1.3 SharePoint user permissions... 2 2. Team Site features...
More informationQuick Start. Installing the software. for Webroot Internet Security Complete, Version 7.0
Quick Start for Webroot Internet Security Complete, Version 7.0 This Quick Start describes how to install and begin using the Webroot Internet Security Complete 2011 software. This integrated suite delivers
More informationSendspace Wizard Desktop Tool Step-By-Step Guide
Sendspace Wizard Desktop Tool Step-By-Step Guide Copyright 2007 by sendspace.com This publication is designed to provide accurate and authoritative information for users of sendspace, the easy big file
More informationESET NOD32 ANTIVIRUS 9
ESET NOD32 ANTIVIRUS 9 Microsoft Windows 10 / 8.1 / 8 / 7 / Vista / XP Quick Start Guide Click here to download the most recent version of this document ESET NOD32 Antivirus provides state-of-the-art protection
More informationESET SMART SECURITY 6
ESET SMART SECURITY 6 Microsoft Windows 8 / 7 / Vista / XP / Home Server Quick Start Guide Click here to download the most recent version of this document ESET Smart Security provides state-of-the-art
More informationESET NOD32 ANTIVIRUS 8
ESET NOD32 ANTIVIRUS 8 Microsoft Windows 8.1 / 8 / 7 / Vista / XP / Home Server 2003 / Home Server 2011 Quick Start Guide Click here to download the most recent version of this document ESET NOD32 Antivirus
More informationPekaoBIZNES 24 QUICK Start. User Guide First steps in the system
PekaoBIZNES 24 QUICK Start User Guide First steps in the system INTRODUCTION Managing your finances may be really convenient. After completing the steps outlined in this document, you will join a big group
More informationAliOffice 2.0 Installation Guide
January 25, 2012 AliOffice 2.0 Installation Guide Overview This document contains instructions for installing AliOffice and readying the application for the completion and submission of compliance evaluations.
More informationConfiguring Network Load Balancing with Cerberus FTP Server
Configuring Network Load Balancing with Cerberus FTP Server May 2016 Version 1.0 1 Introduction Purpose This guide will discuss how to install and configure Network Load Balancing on Windows Server 2012
More informationMalwarebytes Anti-Malware 1.42
Downloading Installing And First-Time Use Updating and Scanning Malwarebytes Anti-Malware 1.42 DOWNLOADING Download the latest version of Malwarebytes Anti-Malware (currently 1.42) from http://www.download.com.
More informationWA2262 Applied Data Science and Big Data Analytics Boot Camp for Business Analysts. Classroom Setup Guide. Web Age Solutions Inc.
WA2262 Applied Data Science and Big Data Analytics Boot Camp for Business Analysts Classroom Setup Guide Web Age Solutions Inc. Copyright Web Age Solutions Inc. 1 Table of Contents Part 1 - Minimum Software
More informationAccessing the Online Meeting Room (Blackboard Collaborate)
Step 1: Check your System and Install Required Software NOTE: Make sure you are on the computer you will be using to access the online meeting room AND that you are using the internet browser (ie: firefox,
More informationESET NOD32 Antivirus 4
ESET NOD32 Antivirus 4 User Guide (intended for product version 4.2 and higher) Microsoft Windows 7 / Vista / XP / NT4 / 2000 / 2003 / 2008 Content 1. ESET NOD32 Antivirus 4...4 1.1 What s new... 4 1.2
More informationInitial Setup of Microsoft Outlook 2011 with IMAP for OS X Lion
Initial Setup of Microsoft Outlook Concept This document describes the procedures for setting up the Microsoft Outlook email client to download messages from Google Mail using Internet Message Access Protocol
More informationESET SMART SECURITY 9
ESET SMART SECURITY 9 Microsoft Windows 10 / 8.1 / 8 / 7 / Vista / XP Quick Start Guide Click here to download the most recent version of this document ESET Smart Security is all-in-one Internet security
More informationVirtual Owl. Guide for Windows. University Information Technology Services. Training, Outreach, Learning Technologies & Video Production
Virtual Owl Guide for Windows University Information Technology Services Training, Outreach, Learning Technologies & Video Production Copyright 2015 KSU Division of University Information Technology Services
More informationDESKTOP CLIENT CONFIGURATION GUIDE BUSINESS EMAIL
DESKTOP CLIENT CONFIGURATION GUIDE BUSINESS EMAIL Version 2.0 Updated: March 2011 Contents 1. Mac Email Clients... 3 1.1 Configuring Microsoft Outlook 2011... 3 1.2 Configuring Entourage 2008... 4 1.3.
More informationInstalling S500 Power Monitor Software and LabVIEW Run-time Engine
EigenLight S500 Power Monitor Software Manual Software Installation... 1 Installing S500 Power Monitor Software and LabVIEW Run-time Engine... 1 Install Drivers for Windows XP... 4 Install VISA run-time...
More informationA Step-by-Step Patient Guide to Upload Medical Images to the Cleveland Clinic Neurological Institute
A Step-by-Step Patient Guide to Upload Medical Images to the Cleveland Clinic Neurological Institute Cleveland Clinic 1995-2014. All Rights Reserved. v.08.05.14 Table of Contents Get Started Step 1: Locate
More informationHow to configure your Windows PC post migrating to Microsoft Office 365
How to configure your Windows PC post migrating to Microsoft Office 365 1 Contents Purpose... 3 Document Support Boundaries... 3 Examples used in this document... 4 Several different Microsoft Office 365
More informationOutlook 2002. 1. Start Outlook, and click on mserver.wlu.ca. 2. From the Tools menu, choose Options
Mserver to Ipmail Conversion Instructions The new email server called ipmail is configured to allow only encrypted email sessions. Members of the Laurier community who are currently using unencrypted email
More informationHow to Install the Cisco AnyConnect VPN Client. Installing Cisco AnyConnect VPN Client on Windows with the Chrome Browser (Recommended)
How to Install the Cisco AnyConnect VPN Client Instructions for Windows (Chrome Browser - Recommended) Instructions for Windows (Internet Explorer with Java) Instructions for Mac OS (Chrome Browser) Installing
More informationSystem Administration Training Guide. S100 Installation and Site Management
System Administration Training Guide S100 Installation and Site Management Table of contents System Requirements for Acumatica ERP 4.2... 5 Learning Objects:... 5 Web Browser... 5 Server Software... 5
More informationUser guide. Business Email
User guide Business Email June 2013 Contents Introduction 3 Logging on to the UC Management Centre User Interface 3 Exchange User Summary 4 Downloading Outlook 5 Outlook Configuration 6 Configuring Outlook
More informationESET NOD32 Antivirus. Table of contents
ESET NOD32 Antivirus ESET NOD32 Antivirus provides state-of-theart protection for your computer against malicious code. Based on the ThreatSense scanning engine first introduced in the awardwinning NOD32
More informationInstalling a Browser Security Certificate for PowerChute Business Edition Agent
Installing a Browser Security Certificate for PowerChute Business Edition Agent The Agent component of PowerChute Business Edition has a "self-signed" security certificate. This means that when you access
More informationCitrix Client Install Instructions
Citrix Client Install Instructions If you are using Citrix remotely, Information Technology Services recommends updating Citrix client to the newest version available online. You must be an administrator
More informationAV Management Dashboard
LabTech AV Management Dashboard AV MANAGEMENT DASHBOARD... 1 Overview... 1 Requirements... 1 Dashboard Overview... 2 Clients/Groups... 2 Offline AV Agents... 3 Threats... 3 AV Product... 4 Sync Agent Data
More informationTM Online Storage: StorageSync
TM Online Storage: StorageSync 1 Part A: Backup Your Profile 1: How to download and install StorageSync? Where to download StorageSync? You may download StorageSync from your e-storage account. Please
More informationInstallation Guidelines (MySQL database & Archivists Toolkit client)
Installation Guidelines (MySQL database & Archivists Toolkit client) Understanding the Toolkit Architecture The Archivists Toolkit requires both a client and database to function. The client is installed
More informationONLINE ACCOUNTABILITY FOR EVERY DEVICE. Quick Reference Guide V1.0
ONLINE ACCOUNTABILITY FOR EVERY DEVICE Quick Reference Guide V1.0 TABLE OF CONTENTS ACCOUNT SET UP Creating an X3watch account DOWNLOADING AND INSTALLING X3WATCH System Requirements How to install on a
More informationU S E R M A N U A L. Alcatel-Lucent. Click to call plugin for OmniPCX Enterprise. User manual. Alcatel-Lucent Enterprise Services Page 1/12
U S E R M A N U A L Alcatel-Lucent Click to call plugin for OmniPCX Enterprise User manual Alcatel-Lucent Enterprise Services Page 1/12 Index table 1 D o c u m e n t h i s t o r y 3 2 S c o p e 3 2.1 Overview...
More information2010 Outlook Web App Client Overview
2010 Outlook Web App Client Overview The upgrade to Microsoft Exchange 2010 includes an updated web-based e-mail client, OWA. OWA stands for Outlook Web App and gives you access to your district e-mail
More informationTELSTRA BUSINESS MAIL QUICK REFERENCE GUIDE
1.1 Introduction 01 1.2 The Checklist 02 1.3 Business Mail Requirements 03 1.4 Downloading & Installing Outlook 2003 04 BEFORE YOU START 1.1 INTRODUCTION 1.1.1 Who this Guide is For 1.1.2 What s in this
More informationHow To Use Senior Systems Cloud Services
Senior Systems Cloud Services In this guide... Senior Systems Cloud Services 1 Cloud Services User Guide 2 Working In Your Cloud Environment 3 Cloud Profile Management Tool 6 How To Save Files 8 How To
More informationAdvanced Event Viewer Manual
Advanced Event Viewer Manual Document version: 2.2944.01 Download Advanced Event Viewer at: http://www.advancedeventviewer.com Page 1 Introduction Advanced Event Viewer is an award winning application
More informationHome Agent Installation Manual Windows 8 v1.0
Home Agent Installation Manual Windows 8 v1.0 By: Leonard Poulin Page 1 Version History Version Date Changes 1 2/16/2014 First release for Windows 8 Page 2 Table of Contents Version History... 2 Installation
More informationAns.: Spam Monitor support all popular email programs such as Outlook, Outlook Express, Netscape Mail, Mozilla Mail, Eudora or Opera
Faqs > Spam Monitor General Q1. What is Spam Monitor? Ans.: Spam Monitor is an easy-to-use spam filter that detects and isolates unsolicited junk mail sent to your mailbox. Designed for computer users,
More informationEasy Setup Guide for the Sony Network Camera
-878-191-11 (1) Easy Setup Guide for the Sony Network Camera For setup, a computer running the Microsoft Windows Operating System is required. For monitoring camera images, Microsoft Internet Explorer
More informationUsing Outlook Web Access
Using Outlook Web Access Log on JTSA Outlook Web Access 1. Enter the following URL into the address bar on your web browser (Internet Explorer recommended) and press enter http://exweb.jtsa.edu 2. The
More informationCHARTER BUSINESS custom hosting faqs 2010 INTERNET. Q. How do I access my email? Q. How do I change or reset a password for an email account?
Contents Page Q. How do I access my email? Q. How do I change or reset a password for an email account? Q. How do I forward or redirect my messages to a different email address? Q. How do I set up an auto-reply
More informationGuide to Installing BBL Crystal MIND on Windows 7
Guide to Installing BBL Crystal MIND on Windows 7 Introduction The BBL Crystal MIND software can not be directly installed on the Microsoft Windows 7 platform, however it can be installed and run via XP
More informationInitial Setup of Mozilla Thunderbird with IMAP for OS X Lion
Initial Setup of Mozilla Thunderbird Concept This document describes the procedures for setting up the Mozilla Thunderbird email client to download messages from Google Mail using Internet Message Access
More information8x8 Virtual Office Click2Pop for eagent Setup Guide
8x8 Virtual Office April 2012 Table of Contents 8x8 Click2Pop for eagent... 3 8x8 Click2Pop provides eagent CRM with two functions:... 3 Requirements.... 3 Installation... 3 Start the Application and Integrate
More informationExchange 2010. Outlook Profile/POP/IMAP/SMTP Setup Guide
Exchange 2010 Outlook Profile/POP/IMAP/SMTP Setup Guide September, 2013 Exchange 2010 Outlook Profile/POP/IMAP/SMTP Setup Guide i Contents Exchange 2010 Outlook Profile Configuration... 1 Outlook Profile
More informationEmail client configuration guide. Business Email
Email client configuration guide Business Email August 2013 Contents 1. Mac Email Clients 1.1 Downloading Microsoft Outlook (Professional Plan Users) 1.2 Configuring Microsoft Outlook (Full Exchange Server
More information1. Right click using your mouse on the desktop and select New Shortcut.
offers 3 login page styles: Standard Login, List Login or Quick Time Punch. Each login page can be saved as a shortcut to your desktop or as a bookmark for easy fast login access. For quicker access to
More informationStellar Phoenix Exchange Server Backup
Stellar Phoenix Exchange Server Backup Version 1.0 Installation Guide Introduction This is the first release of Stellar Phoenix Exchange Server Backup tool documentation. The contents will be updated periodically
More informationKPN SMS mail. Send SMS as fast as e-mail!
KPN SMS mail Send SMS as fast as e-mail! Quick start Start using KPN SMS mail in 5 steps If you want to install and use KPN SMS mail quickly, without reading the user guide, follow the next five steps.
More informationOPS Data Quick Start Guide
OPS Data Quick Start Guide OPS Data Features Guide Revision: October, 2014 Technical Support (24/7) - (334) 705-1605 http://www.opelikapower.com Quick Start Guide OPS Data: Beginning today, you have access
More informationInstallation Guide for Pulse on Windows Server 2012
MadCap Software Installation Guide for Pulse on Windows Server 2012 Pulse Copyright 2014 MadCap Software. All rights reserved. Information in this document is subject to change without notice. The software
More informationGrapevine Mail User Guide
Grapevine Mail User Guide Table of Contents Accessing Grapevine Mail...2 How to access the Mail portal... 2 How to login... 2 Grapevine Mail user guide... 5 Copying your contacts to the new Grapevine Mail
More informationWINDOWS 64-BIT INSTALLATION NOTES ORACLE VIRTUALBOX Micro Planner X-Pert V3.5.1 Digital Download Edition
WINDOWS 64-BIT INSTALLATION NOTES ORACLE VIRTUALBOX Micro Planner X-Pert V3.5.1 Digital Download Edition THIS DOCUMENT CONTAINS IMPORTANT INFORMATION REGARDING THE INSTALLATION AND USE OF THIS SOFTWARE.
More informationOutlook E-Mail. Step 1: Open and Configure Outlook
Outlook E-Mail Step 1: Open and Configure Outlook 1. Click the Microsoft Button in the lower left task bar 2. Select All Programs 3. Select Microsoft Office 4. Select Microsoft Outlook 5. Follow the Start
More informationSOS SO S O n O lin n e lin e Bac Ba kup cku ck p u USER MANUAL
SOS Online Backup USER MANUAL HOW TO INSTALL THE SOFTWARE 1. Download the software from the website: http://www.sosonlinebackup.com/download_the_software.htm 2. Click Run to install when promoted, or alternatively,
More informationWA1826 Designing Cloud Computing Solutions. Classroom Setup Guide. Web Age Solutions Inc. Copyright Web Age Solutions Inc. 1
WA1826 Designing Cloud Computing Solutions Classroom Setup Guide Web Age Solutions Inc. Copyright Web Age Solutions Inc. 1 Table of Contents Part 1 - Minimum Hardware Requirements...3 Part 2 - Minimum
More informationMultiSite Manager. Setup Guide
MultiSite Manager Setup Guide Contents 1. Introduction... 2 How MultiSite Manager works... 2 How MultiSite Manager is implemented... 2 2. MultiSite Manager requirements... 3 Operating System requirements...
More informationInstallation Guide for Pulse on Windows Server 2008R2
MadCap Software Installation Guide for Pulse on Windows Server 2008R2 Pulse Copyright 2014 MadCap Software. All rights reserved. Information in this document is subject to change without notice. The software
More informationSetting up Hyper-V for 2X VirtualDesktopServer Manual
Setting up Hyper-V for 2X VirtualDesktopServer Manual URL: www.2x.com E-mail: info@2x.com Information in this document is subject to change without notice. Companies, names, and data used in examples herein
More informationUsing SANDBOXIE to Safely Browse the Internet (verified with ver 4.20) Jim McKnight www.jimopi.net Sandboxie.lwp revised 5-25-2016
Using SANDBOXIE to Safely Browse the Internet (verified with ver 4.20) Jim McKnight www.jimopi.net Sandboxie.lwp revised 5-25-2016 GENERAL NOTES: These tips are based on my personal experience using Sandboxie.
More informationSuperOffice AS. CRM Online. Installing the Citrix Online Web plug-in
SuperOffice AS CRM Online Installing the Citrix Online Web plug-in Index Introduction... 3 Prerequisites... 3 Considerations... 3 FOR WINDOWS USERS:... 4 Download the installation package... 4 Installing
More informationSenior Systems Cloud Services
Senior Systems Cloud Services In this guide... Senior Systems Cloud Services 1 Cloud Services User Guide 2 Working In Your Cloud Environment 3 Cloud Profile Management Tool 6 How To Save Files 8 How To
More informationConfiguring your email client to connect to your Exchange mailbox
Configuring your email client to connect to your Exchange mailbox Contents Use Outlook Web Access (OWA) to access your Exchange mailbox... 2 Use Outlook 2003 to connect to your Exchange mailbox... 3 Add
More informationInstalling Remote Desktop Connection
SETTING UP YOUR REMOTE DESKTOP This section will assist you in setting you Remote Desktop Connection. This will allow you to create an icon for easy access to your virtual desktop. DISCLAIMER: All images
More informationConfiguring Mozilla Thunderbird to Access Your SAS Email Account
Configuring Mozilla Thunderbird to Access Your SAS Email Account 1. When you launch Thunderbird for the first time, the Import Wizard will appear: If Thunderbird detects that another email program was
More informationApplicationXtender 7.0 Upgrade on 23 September 2015
ApplicationXtender 7.0 Upgrade on 23 September 2015 After the Banner Document Management (BDM) 8.5 upgrade is performed, if you have previously installed ApplicationXtender 6.5 or its components on your
More informationHosted PBX CRM Connect
Hosted PBX CRM Connect PC User Guide V1.1 2016 XO COMMUNICATIONS, LLC. PAGE 1 XO Hosted PBX CRM User Guide Copyright Notice Trademarks Copyright 2016 XO Communications, LLC. All rights reserved. Any technical
More informationIntelligent Office: Web Optimisation Guide. Published Date: 06/11/2015. Version: 3.3
Intelligent Office: Web Optimisation Guide Published Date: 06/11/2015 Version: 3.3 Table of Contents System Requirements:... 3 Introduction... 3 Difficulties Logging on to Intelligent Office (io)... 3
More informationJob Aid: Creating Additional Remote Access Logins
This job aid describes the steps required to add an additional remote access login to the Avaya S8300, S8500, and S8700 Series Media Servers. These logins may be used to establish a Point to Point Protocol
More informationWhat is OneDrive for Business at University of Greenwich? Accessing OneDrive from Office 365
This guide explains how to access and use the OneDrive for Business cloud based storage system and Microsoft Office Online suite of products via a web browser. What is OneDrive for Business at University
More informationD2L: An introduction to CONTENT University of Wisconsin-Parkside
D2L: An introduction to CONTENT University of Wisconsin-Parkside FOR FACULTY: What is CONTENT? The Content and Course Builder tools both allow you to organize materials in D2L. Content lets you and your
More informationAdministering Jive for Outlook
Administering Jive for Outlook TOC 2 Contents Administering Jive for Outlook...3 System Requirements...3 Installing the Plugin... 3 Installing the Plugin... 3 Client Installation... 4 Resetting the Binaries...4
More informationMyNetFone Virtual Fax. Virtual Fax Installation
Table of Contents MyNetFone Virtual Fax MyNetFone Virtual Fax Installation... 1 Changing the SIP endpoint details for the fax driver... 11 Uninstalling Virtual Fax... 13 Virtual Fax Installation Follow
More informationCharter Business Desktop Security Administrator's Guide
Charter Business Desktop Security Administrator's Guide Table of Contents Chapter 1: Introduction... 4 Chapter 2: Getting Started... 5 Creating a new user... 6 Recovering and changing your password...
More informationAcronis Monitoring Service
Acronis Monitoring Service USER GUIDE Table of contents 1 About the Acronis Monitoring Service...4 2 Software Requirements...4 3 Understanding basic concepts...5 4 Getting started...7 4.1 Setting up website
More information2X ApplicationServer & LoadBalancer Manual
2X ApplicationServer & LoadBalancer Manual 2X ApplicationServer & LoadBalancer Contents 1 URL: www.2x.com E-mail: info@2x.com Information in this document is subject to change without notice. Companies,
More information3 Easy Steps to Get Started
Quick Start Guide Contents 1. What is icafe Manager?... 4 1.1. Server... 4 1.2. Client Terminal... 4 2. Downloading, Registering & Activating Cafe Code... 5 2.1. Downloading icafe Manager:... 5 2.2. Registering
More informationHelp. F-Secure Online Backup
Help F-Secure Online Backup F-Secure Online Backup Help... 3 Introduction... 3 What is F-Secure Online Backup?... 3 How does the program work?... 3 Using the service for the first time... 3 Activating
More information