Citrix XenApp user Guide
|
|
- Melinda Fox
- 7 years ago
- Views:
Transcription
1 Citrix XenApp END User Guide Document Reference Status Author s Name Citrix XenApp user Guide Mahammad Kubaib For circulation to KPC Citrix Users Issue Date 12/07/2015 Reviewed & Approved by Version control record Version Date Author Comments Draft 12/07/2015 Mahammad Kubaib Citrix XenApp User guide Kuwait Petroleum Corporation (KPC) - Internal pg. 1
2 TABLE OF CONTENTS 1. Introduction 3 2. Prerequisites Installation of Citrix receiver for windows Accessing KPC Citrix portal Accessing Citrix portal from KPC Internal Network Logging through web browser Logging through Citrix Receiver Accessing from outside KPC network Logging through web browser Logging through Citrix Receiver Citrix Toolbar Toolbar Settings Preferences Troubleshooting...24 pg. 2
3 1. Introduction. Citrix Receiver allows you to connect to KPC Apps and VDI virtual desktops provided by the KPC IT Team. The Apps and virtual desktops are web-based Windows virtual PCs equipped with Microsoft Office, Outlook and other standard KPC applications. You can access your Apps and virtual desktop via Access Portal ( using an internet browser on a Windows, Macintosh or mobile device that has the Citrix Receiver installed. With this Access Portal, you can now use one single URL ( to access your virtual desktop regardless of whether you are within KPC network or from outside Internet. This document will guide you to configure Citrix Receiver on your device to access KPC Portal. 2. Prerequisites. 2.1 Computer System Requirements Below are the computer configurations recommended by KPC IT Team. Older software and operating systems are not supported and may not function for remote access: Administrator Rights: To install applications such as Citrix receiver, administrator level User names and passwords are required (Ignore this part if you are using personal device). Windows Devices: Windows OS of XP w/sp3 or higher (Win7 / Win 8 / Vista) DSL/Cable Connection for best performance. 2.2 Active Directory (AD) Account Remote access requires an AD account for login and Authentication purposes. If you need an AD account please note the following: You are required to submit IT Service Request. If you have any questions regarding this, please contact KPC IT Service Desk. 2.3 Citrix Receiver - In order to access Citrix applications remotely, you will first need to ensure you have the Citrix Receiver application on any desktop, laptop you plan on using. To verify if you already have this application installed complete the following actions: On a Windows client, click on your start button and type in Citrix Receiver in the search field. If you have this installed, you ll see Citrix Receiver appear under program files. pg. 3
4 2.4 Any of the following browsers: Microsoft Internet Explorer (version 7, 8, 9, 10 or 11) Mozilla Firefox (version 9.0.1) Google Chrome (version 17) NOTE: If you encounter a known issue in which Google Chrome does not open launch.ica files. Please refer to the Citrix knowledge base article at Apple Safari (version 5.1.2) pg. 4
5 3. Installing Citrix Receiver for Windows To access KPC resources we need to download and install Citrix Receiver on computer. Open up Internet Explorer and type the following address: It will automatically detect the receiver and prompt to download/install the receiver if it is not present in the system. Select the check box and begin the installation by clicking Install. pg. 5
6 Installation will begin, click finish when installation is done. pg. 6
7 pg. 7
8 4. Accessing KPC Citrix portal To connect to KPC resources, just go to It will detect whether you are from inside KPC network or from outside, and will direct you to Internal or External Access Portal respectively. 4.1 Accessing Citrix portal inside KPC internal network Logging through web browser. Open Internet Explorer and type will be presented with a list of the Applications that are available to you. To view the list of Desktops, select Desktops at the top of the page. Click on the application or desktop that you want, and then it will be launched. Depending on your web browser settings, you may be prompted that the Citrix Receiver plugin is disabled or blocked, often with an option to allow it to run. Please click allow/trust as appropriate to start the application. When you have finished, click your name and then Log Off from the top right hand corner. pg. 8
9 4.1.2 Logging through Citrix Receiver. Right-click the Receiver icon in the notification area. The following menu options are displayed. When you click on Open, it will prompt for credential, please enter your domain username and password and click on Logon. pg. 9
10 After successful login, you will be presented with a list of the Applications that are available to you. To view the list of Desktops, select Desktops at the top of the page. Click on the application or desktop that you want, and then it will be launched. When you have finished, click your name and then Log Off from the top right hand corner. pg. 10
11 4.2 Accessing Citrix portal from outside the KPC network Logging through web browser. Open Internet Explorer and type will be presented with a logon page, enter the username and password and press logon when finished. You should now presented with the Duo-security Two-factor Authentication window. Duo prompts you to enroll when you log into a protected VPN, server, or web application. Click Start Setup to get started. Choose Your Authenticator: We recommend using a smartphone for the best experience. pg. 11
12 Type Your Phone Number: Select your country and type your phone number. Use the number of your smartphone, landline, or cell phone that you'll have with you when you're logging in. You can enter an extension if you chose "Landline" in the previous step. Then double-check that you entered it correctly, check the box, and click Continue. Choose Platform: Choose your device's operating system. pg. 12
13 Install Duo Mobile: Duo Mobile is an application that runs on your phone and helps you authenticate. Without it you'll still be able to log in using a phone call or text message, but Duo strongly recommends that you use Duo Mobile to authenticate quickly and easily. Follow the platform-specific instructions on the screen to install Duo Mobile. Activate Duo Mobile: Activating the application will link it to your account so you can use it for authentication. On iphone, Android, Windows Phone, and BlackBerry 10, pg. 13
14 activate Duo Mobile by scanning the barcode with the app's built-in barcode scanner. Choose your platform for specific instructions: The "Continue" button is clickable after you scan the barcode. Can t scan the barcode? Click the link and then follow the instructions. Enrollment Complete! pg. 14
15 Click Enroll another device to add another device (backup phone, etc.), or click I'm done enrolling devices to continue to the authentication prompt. If enabled by your administrator, you can manage your devices in the future via the authentication prompt. Otherwise, contact your administrator if you ever need to change your phone number, re-activate Duo Mobile, or add a second phone. Authentication: After successfully adding the device you will be presented with authentication page. Select Duo Push as it is the easiest and quickest way of authenticating. You'll get a login request sent to your phone just press Approve to authenticate. pg. 15
16 If you are running Android 4.1 or later, you can approve the request right from the notification. If you get a login request that you weren't expecting, press Deny to reject the request. You ll be given the ability to report it as fraudulent, or you can tap It was a mistake to deny the request without reporting it. pg. 16
17 After approving the login request on mobile device, you will be presented with a list of the Applications that are available to you. To view the list of Desktops, select Desktops at the top of the page. Click on the application or desktop that you want, and then it will be launched. When you have finished, click your name and then Log Off from the top right hand corner. pg. 17
18 4.2.2 Logging through Citrix Receiver. Right-click the Receiver icon in the notification area. The following menu options are displayed. When you click on Open, it will prompt for your address. Please enter the details and press Add. pg. 18
19 It will prompt for credential, please enter your domain username and password and enter Passcode as push click on Logon. After successful login, you will be presented with a list of the Applications that are available to you. To view the list of Desktops, select Desktops at the top of the page. Click on the application or desktop that you want, and then it will be launched. When you have finished, click your name and then Log Off from the top right hand corner. pg. 19
20 5. Citrix Toolbar At the top of the session window you will see a toolbar. You can show/hide this toolbar by clicking on the small bar with the arrow: Hide Toolbar pg. 20
21 5.1 Toolbar setting 5.2 Preferences If you select the Preferences menu, you can do multiple settings to fit your needs. The screenshots below show the recommended settings, but you are free to set different ones. pg. 21
22 pg. 22
23 pg. 23
24 6. Troubleshooting This section lists potential problems and solutions to assist users in resolving common Citrix related problems that may occur. Please ensure that you have reviewed the following topics before contacting KPC IT Help Desk. 1. When I try to install the Citrix Receiver my computer says that I do not have the correct permissions. a. To install Citrix Receiver you must have administrator rights on your computer. 2. I do not have Citrix Receiver a. Browse to 3. I already have Citrix Receiver installed on my computer but I keep being asked to install it. a. Click Skip to Log on to skip the auto-detect and install process and go directly to the Citrix login screen. 4. The auto-detect did not work and I still do not have Citrix Receiver. a.go to to locate your Operating System from the list and manually install Citrix Receiver to your computer. 5. I m being asked to open, run or save a launch.ica file. a. If you already have the Citrix receiver installed, find the launch.ica file, right click on it and select Open file with or Always open file with and locate the Citrix Receiver application. You may need to browse for this file under Applications (Mac OS) or under C:\Program Files (x86)\citrix\receiver (Windows). In future the Citrix Receiver should automatically open this file. b. Add as a Trusted Site within IE. For Further information, please contact: Helpdesk Ext 3456, helpdesk@kpc.com.kw pg. 24
DUO SECURITY CISCO VPN USER GUIDE 1/27/2016
DUO SECURITY CISCO VPN USER GUIDE 1/27/2016 CONTENTS Enrolling Your Devices... 2 Install Cisco AnyConnect VPN Client... 6 Connecting to a PC with Microsoft Remote Desktop... 8 Disconnecting the AnyConnect
More informationSHC Client Remote Access User Guide for Citrix & F5 VPN Edge Client
SHC Client Remote Access User Guide for Citrix & F5 VPN Edge Client Version 1.1 1/15/2013 This remote access end user reference guide provides an overview of how to install Citrix receiver (a required
More informationInstall and End User Reference Guide for Direct Access to Citrix Applications
Install and End User Reference Guide for Direct Access to Citrix Applications Version 1.0 7/26/2013 This remote access end user reference guide provides an overview of how to install Citrix receiver (a
More informationRemote Access End User Reference Guide for SHC Portal Access
Remote Access End User Reference Guide for SHC Portal Access Version 2.0 6/7/2012 This remote access end user reference guide provides an overview of how to install Citrix receiver, which is a required
More informationATTENTION: End users should take note that Main Line Health has not verified within a Citrix
Subject: Citrix Remote Access using PhoneFactor Authentication ATTENTION: End users should take note that Main Line Health has not verified within a Citrix environment the image quality of clinical cal
More informationSetting Up and Accessing VPN
Setting Up and Accessing VPN Instructions for establishing remote access to the URMC network for PC or Mac Duo Two-Factor Authentication If you have already enrolled and setup Duo Two-Factor Authentication
More informationCoillte IT has recently upgraded the Remote Access Solution to a new platform.
Overview Coillte IT has recently upgraded the Remote Access Solution to a new platform. This document explains how to gain access to the Coillte network using your home computer through the new Remote
More informationCitrix for Mac Installation
While some MCPS applications run on Macintosh computers, other applications do not function properly. One method to get these applications (such as Outlook and Special Education s O/SS) is to add a mini-program
More informationMedstar Health Dell Services
Medstar Health Dell Services Non Medstar Device Citrix Connectivity Guide October 2012 Sean Kaminski Dell Services System Admin Consultant 1 Table of Contents Overview...3 What is Citrix and why do I need
More informationTwo Factor Authentication (TFA; 2FA) is a security process in which two methods of authentication are used to verify who you are.
Two Factor Authentication Two Factor Authentication (TFA; 2FA) is a security process in which two methods of authentication are used to verify who you are. For example, one method currently utilized within
More informationGuide for Setting Up Your Multi-Factor Authentication Account and Using Multi-Factor Authentication. Mobile App Activation
Guide for Setting Up Your Multi-Factor Authentication Account and Using Multi-Factor Authentication Mobile App Activation Before you can activate the mobile app you must download it. You can have up to
More informationRemote Access Enhancements
Remote Access Enhancements Citrix/Epic Set-up Instructions Provided By: Akron Children s IT Department Date: 7/11/2012 Version: v6 2012 Children s Hospital Medical Center of Akron Table of Contents 1.
More informationHow to Remotely Access the C&CDHB Network from a Personal Device
How to Remotely Access the C&CDHB Network from a Personal Device 13/09/2012 Contents Installing the Citrix Receiver for Windows PCs... 2 Installing the Citrix Receiver for Mac OS X... 6 Installing the
More informationCarroll Hospital Center
Carroll Hospital Center Citrix Remote Access What is Citrix? Citrix is a technology that allows you to securely access a published application remotely from any device. Carroll Hospital Center uses this
More informationRemote Access. Remote Access Start-up Guide. Non Cheshire East Council PC s/laptops. Page 0
Remote Access Remote Access Start-up Guide Non Cheshire East Council PC s/laptops Page 0 Page 1 1. Getting Started NGD provides easy access to all your Cheshire East documents and applications whilst not
More informationAccess the UTHSCSA Palo Alto Networks (PAN) VPN using Global Protect VPN client and Two Factor Authentication (2FA)
Access the UTHSCSA Palo Alto Networks (PAN) VPN using Global Protect VPN client and Two Factor Authentication (2FA) Table of Contents Introduction. 1 Determine your Windows Operating System (for software
More informationHow To Use A Citrix Netscaler Thin Client V1.09.10.1 (Windows) With A Citirix Vpn Desktop (Windows 10) With An Ipad Or Ipad (Windows 8) With Vpn
Our Mission Statement To ensure that we are providing quality and efficient services and solutions that are consistent with the strategic goals of the Area, and that are closely aligned with the State's
More informationAkin Gump Strauss Hauer & Feld LLP Remote Access Resources (DUO)
Akin Gump Strauss Hauer & Feld LLP Remote Access Resources (DUO) Firm Laptop Windows Home PC Mac Computer Apple ipad Android Devices Exit akingump.com 2015 Akin Gump Strauss Hauer & Feld LLP Check Point
More informationWindows Installation 1. On a Windows PC (For MAC, skip to next section), at the file download prompt click Run.
Introduction These instructions are for Windows and MAC users ONLY. For Mobile devices (IOS/Android), use the Mobile Device document found on the portal Login Page. For Windows 8.x users: At this time,
More informationVPN Web Portal Usage Guide
VPN Web Portal Usage Guide Table of Contents WHAT IS VPN WEB CLIENT 4 SUPPORTED WEB BROWSERS 4 LOGGING INTO VPN WEB CLIENT 5 ESTABLISHING A VPN CONNECTION 6 KNOWN ISSUES WITH MAC COMPUTERS 6 ACCESS INTRANET
More informationMED ACCESS USER INSTRUCTIONS FOR INSTALLING THE CITRIX RECEIVER FOR ACCESS TO ALBERTA NETCARE VIA PLB
MED ACCESS USER INSTRUCTIONS FOR INSTALLING THE CITRIX RECEIVER FOR ACCESS TO ALBERTA NETCARE VIA PLB Last Updated: February 18, 2012. Med Access Support Alberta Netcare Portal Support Alberta Health Services
More informationCitrix Remote Access Portal U s e r M a n u a l
Citrix Remote Access Portal U s e r M a n u a l 1 P a g e Table of Contents Table of Contents... 2 Introduction... 3 1. What is Citrix and how does it work?... 4 2. PC Setup/Internet Explorer - Connecting
More informationVIRTUAL SOFTWARE LIBRARY REFERENCE GUIDE
VIRTUAL SOFTWARE LIBRARY REFERENCE GUIDE INTRODUCTION The Virtual Software Library (VSL) provides remote and on-campus access to lab/course software. This approach is intended to simplify access for all
More informationRemote Access End User Reference Guide for Access to SJLinked Version 1.0 3/11/2014
Remote Access End User Reference Guide for Access to SJLinked Version 1.0 3/11/2014 Contents Introduction... 2 Installing Citrix Receiver for Windows... 3 Before You Begin... 3 System Requirements... 3
More informationInstructions for installing Citrix Receiver
Instructions for installing Citrix Receiver Remote Access End User Reference Guide for Access to SJLinked Version 1.0 4/21/2014 Contents Introduction... 2 Installing Citrix Receiver for Windows... 3 Before
More informationWindows and MAC User Handbook Remote and Secure Connection Version 1.01 09/19/2013. User Handbook
Windows and MAC User Handbook How to Connect Your PC or MAC Remotely and Securely to Your U.S. Department of Commerce Account Developed for You by the Office of IT Services (OITS)/IT Service Desk *** For
More informationGuide for Setting Up Your Multi-Factor Authentication Account and Using Multi-Factor Authentication
Guide for Setting Up Your Multi-Factor Authentication Account and Using Multi-Factor Authentication This document serves as a How To reference guide for employees to execute the following MFA tasks: 1.
More informationTechnology Services Group Procedures. IH Anywhere guide. 0 P a g e
VDI Pilot Technology Services Group Procedures IH Anywhere guide 0 P a g e Installation Disable Apple Security Table of Contents IH Anywhere for Apple OSX (MAC)... 2 1. Installation... 2 Disable Apple
More informationJunos Pulse VPN Client Installation
Junos Pulse VPN Client Installation Windows 7 Installation p 2-6 Windows 8.1 Installation p 7-11 Macintosh version 10.6 and greater p 12-17 *This vpn appliance is to replace the Legacy SP vpn client Cisco
More informationHow to use Mints@Home
How to use Mints@Home Citrix Remote Access gives Mints users the ability to access University Of Cambridge and MINTS resources from any computer, anywhere in the world,. The service requires a high-speed
More informationInstructions for Accessing the Hodges University Virtual Lab
Instructions for Accessing the Hodges University Virtual Lab Table of Contents Adding the VLAB as a Trusted Site... 3 Accessing the VLAB using Windows 8... 5 Using Internet Explorer and Windows 8 to Access
More informationmystanwell.com Installing Citrix Client Software Information and Business Systems
mystanwell.com Installing Citrix Client Software Information and Business Systems Doc No: 020/12 Revision No: Revision Date: Page: 1 of 16 Contents Overview... 3 1. Microsoft Internet Explorer... 3 2.
More informationBT Lancashire Services
In confidence BT Lancashire Services Remote Access to Corporate Desktop (RACD) Getting Started Guide Working in partnership Confidentiality Statement BT Lancashire Services Certain information given to
More informationUsing Access.Centegra.Com (Physician Access) Secure Remote Access from the Internet
System Requirements These are the minimum requirements necessary to ensure the proper operation of Centegra Health System s Access.Centegra.Com. Administrative level access to the PC or other device used
More informationCitrix Receiver. Configuration and User Guide. For Windows Users
Citrix Receiver Configuration and User Guide For Windows Users rev: 26.01.2016 https://access.sap.com/ TABLE OF CONTENTS Introduction... 3 Installation... 3 Accessing our portal... 3 Accessing from SAP
More informationLync Online Deployment Guide. Version 1.0
Date 28/07/2014 Table of Contents 1. Provisioning Lync Online... 1 1.1 Operating System Requirements... 1 1.2 Browser Requirements Administrative Centre... 1 2. Obtaining your login Credentials & Logging
More informationMacs are not directly compatible with Noetix.
Those that use Macintosh computers to access Noetix cannot directly access Noetix through http://www.sandiego.edu/noetix. If one is on a Mac and goes to Noetix directly in a web browser, the page is likely
More informationMobile Iron User Guide
2015 Mobile Iron User Guide Information technology Sparrow Health System 9/1/2015 Contents...0 Introduction...2 Changes to your Mobile Device...2 Self Service Portal...3 Registering your new device...4
More informationRemote Access Services Apple Macintosh - Installation Guide
Remote Access Services Apple Macintosh - Installation Guide Version. February, 05 P age Contents GETTING STARTED... JAVA VERIFICATION, INSTALLATION, AND CONFIGURATION... Checking Mac OS version... Java
More informationUser Guide Microsoft Exchange Remote Test Instructions
User Guide Microsoft Exchange Remote Test Instructions University of Louisville Information Technology 1.1 Who Should Use It This guide is intended for University of Louisville Faculty and Staff participating
More informationPARK UNIVERSITY. Information Technology Services. VDI In-A-Box Virtual Desktop. Version 1.1
PARK UNIVERSITY Information Technology Services VDI In-A-Box Virtual Desktop Version 1.1 I N F O R M A T I O N T E C H N O L O G Y S E R V I C E S VIRTUAL DESKTOP USER MANUAL Park University 8700 NW River
More informationPortal Instructions for Mac
Portal Instructions for Mac Table of Contents Introduction... 1 Preparing Safari... 2 Advanced Access Instructions... 3 Installing Java... 3 Setting the Default Browser... 3 Installing the Browser Plug-in...
More informationVPN User Guide. For Mac
VPN User Guide For Mac System Requirements Operating System: Mac OSX. Internet Browser: Safari (Firefox and Google Chrome are NOT currently supported). Disclaimer Your computer must have the system requirements
More informationCONNECT-TO-CHOP USER GUIDE
CONNECT-TO-CHOP USER GUIDE VERSION V8 Table of Contents 1 Overview... 3 2 Requirements... 3 2.1 Security... 3 2.2 Computer... 3 2.3 Application... 3 2.3.1 Web Browser... 3 2.3.2 Prerequisites... 3 3 Logon...
More informationTwo-Factor Authentication (2FA) Registration Instructions Symantec VIP Access
Two-Factor Authentication (2FA) Registration Instructions Symantec VIP Access To strengthen KBR information security and safeguard company data, Information Technology will implement two-factor authentication
More informationQuick User Guide. The KLZ Home Page www.klz.org.uk
Revised June 2014 Secure Online Communication Zone Quick User Guide This quick user guide provides the basic information that is needed for users to get the best experience from using KLZ. It explains
More informationCitrix Receiver. Configuration and User Guide. For Macintosh Users
Citrix Receiver Configuration and User Guide For Macintosh Users rev: 25.03.2015 https://access.sap.com/ TABLE OF CONTENTS Introduction... 3 Installation... 3 Accessing our portal... 3 Accessing from SAP
More informationRemote Desktop Web Access. Using Remote Desktop Web Access
Remote Desktop Web Access What is RD Web Access? RD Web Access is a Computer Science service that allows you to access department software and machines from your Windows or OS X computer, both on and off
More informationContents First Time Setup... 2 Setting up the Legal Vault Client (KiteDrive)... 3 Setting up the KiteDrive Outlook Plugin... 10 Using the Legal Vault
Contents First Time Setup... 2 Setting up the Legal Vault Client (KiteDrive)... 3 Setting up the KiteDrive Outlook Plugin... 10 Using the Legal Vault Outlook Plugin... 13 Using KiteDrive to Send Large
More informationVPN User Guide. For Mac
VPN User Guide For Mac System Requirements Operating System: Mac OSX. Internet Browser: Safari (Firefox and Google Chrome are NOT currently supported). Disclaimer Your computer must have the system requirements
More informationMulti-Factor Authentication Job Aide
To start your account configuration and begin using Multi-Factor Authentication, log in to the CCHMC Multi-Factor Authentication User Portal at https://mfa.cchmc.org/multifactorauth. For assistance, please
More informationInitial DUO 2 Factor Setup, Install, Login and Verification
Please read this entire document it contains important instructions that will help you with the setup and maintenance of your DUO account. PLEASE NOTE: Use of a smartphone is the fastest and simplest way
More informationInformation Technology Services. Your mailbox is moving to the cloud. Here is what to expect.
Your mailbox is moving to the cloud. Here is what to expect. Table of Contents Information for Outlook Web App users:... 2 Information for Office 2007 and 2010 Professional users:... 2 Information for
More informationAkin Gump Strauss Hauer & Feld LLP Remote Access Resources
Akin Gump Strauss Hauer & Feld LLP Remote Access Resources Firm Laptop Windows Home PC Mac Computer Apple ipad Android Devices Exit akingump.com 2013 Akin Gump Strauss Hauer & Feld LLP Checkpoint VPN (Firm
More informationHow to remotely access your Virtual Desktop from outside the college using VMware View Client. How to guide
How to remotely access your Virtual Desktop from outside the college using VMware View Client How to guide Author: ICT Services Version: 1.0 Date: November 2015 Contents What is the VMware View Client?...
More informationThis document also includes steps on how to login into HUDMobile with a grid card and launch published applications.
Office of the Chief Information Officer Information Technology Division COMPUTER SELF-HELP DESK - TRAINING TIPS AND TRICKS HUDMOBILE ON HOME MACS This document is a step-by-step instruction to check or
More information8x8 Click2Pop User Guide
USER GUIDE 8x8 User Guide Getting Started with April 2014 Contents Introduction... 3 What s new.... 3 8x8.... 3 Here is how works...4 8x8 Click2Connect.... 4 Requirements.... 4 Installation on Microsoft
More informationOFFICE 365 SELF- CONFIGURATION GUIDE
IT HELPDESK, REPUBLIC POLYTECHNIC OFFICE 365 SELF- CONFIGURATION GUIDE Version 7.0 IT Helpdesk 6-30-2015 0 TABLE OF CONTENTS Things to note before proceeding with this guide:... 1 Office 365 ProPlus Installation
More informationAllianz Global Investors Remote Access Guide
Allianz Global Investors Remote Access Guide Web Address: http://remote.allianzgi-us.com/ Page 1 of 34 pages Please contact the Service Desk at Table of Contents 1. Introduction to the Remote Access Page
More informationHow to install and use the File Sharing Outlook Plugin
How to install and use the File Sharing Outlook Plugin Thank you for purchasing Green House Data File Sharing. This guide will show you how to install and configure the Outlook Plugin on your desktop.
More informationFlexible Identity Federation
Flexible Identity Federation User guide version 1.0.1 Publication History Date Description Revision 2015.09.25 initial release 1.0.0 2015.12.10 minor corrections 1.0.1 Copyright Orange Business Services
More informationPreparing your MAC Computer to access QuickBooks Hosted with the Citrix Receiver or Online Plugin
Please Note: While we try to provide you with the solution you need, we can t promise that the information set out below is totally error free or will necessarily resolve any problem you may have. Preparing
More informationHow do I Install and Configure MS Remote Desktop for the Haas Terminal Server on my Mac?
Enterprise Computing & Service Management How do I Install and Configure MS Remote Desktop for the Haas Terminal Server on my Mac? In order to connect remotely to a PC computer from your Mac, we recommend
More informationBaltimore County Public Schools Department of Information Technology Network Support Services System Engineering Document
Contents Access Windows... 1 Access Macintosh... 6 Access iphone/ipad... 12 Junos Pulse Installation for Android & Others... 15 Additional/Important Information... 16 Access Windows (return to top) The
More informationCitrix XenApp 6.5 User Guide. For Windows and OS X
Citrix XenApp 6.5 User Guide For Windows and OS X Table of Contents Target Audience... 3 Prerequisites... 3 Windows:... 3 OS X:... 3 Installing Client... 4 Downloading the Client:... 4 Launching the Installer...
More informationSophos UTM. Remote Access via SSL Configuring Remote Client
Sophos UTM Remote Access via SSL Configuring Remote Client Product version: 9.300 Document date: Tuesday, October 14, 2014 The specifications and information in this document are subject to change without
More informationSSL VPN Service. To get started using the NASA IV&V/WVU SSL VPN service, you must verify that you meet all required criteria specified here:
SSL VPN Service Note: This guide was written using Windows 7 with Internet Explorer 8. The same principles and techniques are applicable to new versions of Internet Explorer as well as Firefox. Any significant
More informationConnecting to Remote Desktop Windows Users
Connecting to Remote Desktop Windows Users How to log into the College Network from Home 1. Start the Remote Desktop Connection For Windows XP, Vista and Windows 7 this is found at:- Star t > All Programs
More informationResource Guide INSTALL AND CONNECT TO CISCO ANYCONNECT VPN CLIENT (FOR WINDOWS COMPUTERS)
INSTALL AND CONNECT TO CISCO ANYCONNECT VPN CLIENT (FOR WINDOWS COMPUTERS) PLEASE READ BEFORE INSTALLING THE CISCO ANYCONNECT SECURE MOBILITY CLIENT SOFTWARE: The VPN is to be used on computers that are
More informationACCESSING CERNER ON A MAC (October 1, 2012)
ACCESSING CERNER ON A MAC (October 1, 2012) For any questions regarding these instructions, or for assistance with accessing Cerner from a Mac, iphone or ipad please contact Dr. Behra at jbehra@ematucson.com.
More informationSenior Systems Cloud Services
Senior Systems Cloud Services In this guide... Senior Systems Cloud Services 1 Cloud Services User Guide 2 Working In Your Cloud Environment 3 Cloud Profile Management Tool 6 How To Save Files 8 How To
More informationXEN Web Portal Instructions
XEN Web Portal Instructions Hi Everyone! Please use this document for help on accessing the new BearCom Xen Web Portal This document contains instructions for users of Internet Explorer, Firefox, Chrome
More informationCITRIX TROUBLESHOOTING TIPS
CITRIX TROUBLESHOOTING TIPS The purpose of this document is to outline the Most Common Frequently Asked Questions regarding access to the County of York Computer Systems via Citrix. SYSTEM REQUIREMENTS:
More informationHow to Connect to Remote Desktop & How to Use Cisco AnyConnect Secure Mobility Client Secure VPN Connection
How to Connect to Remote Desktop & How to Use Cisco AnyConnect Secure Mobility Client Secure VPN Connection Revised 09/2014 These instructions presume that you already have the Cisco AnyConnect Secure
More informationHow to Install the Cisco AnyConnect VPN Client. Installing Cisco AnyConnect VPN Client on Windows with the Chrome Browser (Recommended)
How to Install the Cisco AnyConnect VPN Client Instructions for Windows (Chrome Browser - Recommended) Instructions for Windows (Internet Explorer with Java) Instructions for Mac OS (Chrome Browser) Installing
More informationHow do I Install and Configure MS Remote Desktop for the Haas Terminal Server on my Mac?
How do I Install and Configure MS Remote Desktop for the Haas Terminal Server on my Mac? In order to connect remotely to a PC computer from your Mac, we recommend the MS Remote Desktop for Mac client.
More informationThe University of Texas Rio Grande Valley. Network Security. Create a Virtual Private. Network (VPN) Connection. Network Security How-to:
Create a Virtual Private Network (VPN) Connection 1 Virtual Private Network (VPN) The VPN service provides secure (encrypted) off-campus connection to access University resources. Use VPN to access Oracle
More informationInstalling Microsoft Outlook on a Macintosh. This document explains how to download, install and configure Microsoft Outlook on a Macintosh.
Reference : USER184 Issue date : December 2002 Revision date : September 2007 Classification : Software Originator : Hugh Burt REVISED DOCUMENT Installing Microsoft Outlook on a Macintosh This document
More informationOffice of Information Technology Connecting to Microsoft Exchange User Guide
OVERVIEW The Office of Information Technology is migrating its messaging infrastructure from Microsoft Exchange 2003 to Microsoft Exchange 2010. Moving to the latest technology will provide many enhancements
More informationQ. I use a MAC How do I change my password so I can send and receive my email?
Password Change FAQ Q. I use a MAC How do I change my password so I can send and receive my email? A. First point a browser to http://www.redlands.edu/passwordmanager and change your password. Afterward,
More informationAccessing the Mercy Remote Access Portal (SSL VPN)
MERCY INFORMATION SECURITY TEAM Accessing the Mercy Remote Access Portal (SSL VPN) In order to access the Sisters of Mercy Remote Access Portal, you will need to complete the following steps. ** Important:
More informationXenApp & XenDesktop Documentation. Help Desk (202) 994-8096 www.columbian.gwu.edu/ots
XenApp & XenDesktop Documentation Help Desk (202) 994-8096 www.columbian.gwu.edu/ots 1 Version Date Comments Author v1.0 June 2011 Initial Version R. Shore v2.0 December 2011 Full Revision R. Shore v2.1
More informationSophos Mobile Control as a Service Startup guide. Product version: 3.5
Sophos Mobile Control as a Service Startup guide Product version: 3.5 Document date: August 2013 Contents 1 About this guide...3 2 What are the key steps?...4 3 First login...5 4 Change your administrator
More informationManual to Access SAP Training Systems Technical Description for Customer On-Site Training
Manual to Access SAP Training Systems Technical Description for Customer On-Site Training 2.0 draft version available as of Jan. 5th 2015. The final version will be available in January 2015 after valuable
More informationInstalling the Citrix Online Plug-In
Installing the Citrix Online Plug-In If you are a first-time user accessing NeoSystems Citrix environment, you are required to install a small program on your computer. This program will enable you to
More informationSelf Service Portal and 2FA User Guide
Self Service Portal and 2FA User Guide Accessing Symantec Self Service Portal Self Service Portal (SSP) is a web-based application which you can use to register, test, reset, or remove Symantec VIP credentials.
More informationTwo Factor Authentication - USER GUIDE
Two Factor Authentication - USER GUIDE Two Factor Authentication (or 2FA) is a two step verification process that provides an extra layer of security for you when accessing your account within Online Services.
More informationCitrix Client Install Instructions
Citrix Client Install Instructions If you are using Citrix remotely, Information Technology Services recommends updating Citrix client to the newest version available online. You must be an administrator
More informationCommack UFSD Remote Access for Microsoft Windows Vista, 7 and 8 Apple Macs, ipads, iphones And Android devices
Commack UFSD Remote Access for Microsoft Windows Vista, 7 and 8 Apple Macs, ipads, iphones And Android devices This allows district staff and students to access the Commack UFSD network from home or anywhere
More informationRemote Access Services Microsoft Windows - Installation Guide
Remote Access Services Microsoft Windows - Installation Guide Version 3.1 February 23, 2015 1 P age Contents GETTING STARTED... 3 JAVA VERIFICATION, INSTALLATION, AND CONFIGURATION... 3 Windows XP... 3
More informationHow to Set Up SSL VPN for Off Campus Access to UC eresources
How to Set Up SSL VPN for Off Campus Access to UC eresources Contents How to Set Up SSL VPN for Off Campus Access to UC eresources... 1 Off Campus Access via SSL VPN... 2 SSL VPN (Secure Sockets Layer
More informationKSC Remote Access Solution
KSC Remote Access Solution Step 1 Pulse Client Install/Configuration Installing the Pulse Client on a PC Installing the Pulse Client on a MAC Step 2 Using Remote Desktop to Access Remote Resources How
More informationInformation Technology Department. Miller School of Medicine New User Guide
Information Technology Department Miller School of Medicine New User Guide EDUCATION & COMMUNICATIONS Miller School of Medicine New User Guide 1051 NW 14 th Street #165, Miami, FL 33136 (305) 243-5999
More informationAccessing the Media General SSL VPN
Launching Applications and Mapping Drives Remote Desktop Outlook Launching Web Applications Full Access VPN Note: To access the Media General VPN, anti-virus software must be installed and running on your
More information...1 CITRIX REMOTE ACCESS WINDOWS 7...1 TABLE OF CONTENTS...1 ADDING CITRIX.AKERMAN.COM AS A TRUSTED SITE TO INTERNET EXPLORER 8.0...
TABLE OF CONTENTS...1 CITRIX REMOTE ACCESS WINDOWS 7...1 TABLE OF CONTENTS...1 ADDING CITRIX.AKERMAN.COM AS A TRUSTED SITE TO INTERNET EXPLORER 8.0...2 INSTALLING THE ENDPOINT ANALYSIS...4 LOGGING OFF
More informationInternet and Email Help. Table of Contents:
Internet and Email Help The following tips are provided to assist you in troubleshooting and managing your Plex Internet and email services. For additional issues or concerns, you may also call our Product
More informationSpectrum Health Virtual Desktop (VDI) (available only to select users at this time)
This page allows access to several Spectrum Health password protected areas. If you have any issues using these services, please contact the Spectrum Health Help Desk at 616.391.1361. Additional Security
More informationMac - Juniper Remote Desktop Instructions
Mac - Juniper Remote Desktop Instructions How to Set up & Remotely Connect to your Hospital Windows Workstation from your Remote Macintosh Computer Using the JSAM Feature of Juniper. Note: These instructions
More information