Freshservice Discovery Probe User Guide
|
|
- Sybil Todd
- 8 years ago
- Views:
Transcription
1 Freshservice Discovery Probe User Guide 1. What is Freshservice Discovery Probe? 1.1 What details does Probe fetch? 1.2 How does Probe fetch the information? 2. What are the minimum system requirements for installing Probe? 3. How do I download and install Discovery Probe on my computer? 4. What is Freshservice Discovery Agent? 4.1. What additional benefits do I get by installing the Agent? 4.2. What are the minimum system requirements for installing the Agent? 4.3. How do I download and install the Agent? 5. How to scan computers or import users from your Active Directory using Discovery Probe? 6. How to prevent unwanted software from being scanned? 7. How to convert a Non CI software application to a CI? 8. What happens when a software application is uninstalled after it has been scanned? 9. How to track dissociated or deleted software? 10. How to scan your IP Range for assets using Discovery Probe? 11. How to schedule periodic scans using Discovery Probe? 12. How to manage scanned assets and error messages using Discovery Probe? 13. How to troubleshoot common error messages displayed during asset recovery? Invalid Credentials DCOM / Firewall Settings Error Requests Blocked by Firewall Invalid SSH Credentials SSH Connection Disabled Unsupported Operating System Unable to ping device
2 What is Freshservice Discovery Probe? Discovery Probe is a Windows application that makes Asset Management easier by tracking hardware assets in your network. Once you install Probe on a computer in your network, you can use it to scan the network and discover all kinds of computers (including those running on Mac OS X or Linux), network routers, switches and other devices like printers etc. This list of devices can then be imported and populated in the list of CI s in your Freshservice account. Besides scanning for devices, you can use Probe to import users from your Active Directory and also schedule periodic scans.
3 What details does Probe fetch? Laptops and Desktop Computers For laptops and desktop machines, Probe fetches details like: Name CI Type Product (Finds the Product based on the model name of machine. If not found, creates and associates it) Manufacturer Serial Number Last Audit Date OS OS Version OS Service Pack Memory Disk Space CPU Speed CPU Core Count Mac Address Location (Needs to be manually set for the Probe entry in the account) Components: Processor, Memory, Logical Drive, Network Adapter Software: CIs and Non CIs
4 Software Applications Software applications that are added as Products in the Product Catalog will be created as CIs and the others will be created as Non CIs and listed with the host computer in the CMDB. Software CI details include: Product Version Installed Machine Installation Path Last Audit Date Installation Date Users For the Users that are imported, Probe fetches details like: First and Last Name (If no valid ID is found, the user will be created as a deleted requester) Department (Finds or creates) Address Job title Phone Number Time Zone
5 How does Probe fetch the information? Probe uses WMI Queries to fetch data from Windows machines. By using SSH, Probe executes shell commands and fetches information from Linux and Mac machines. SNMP protocol is used to fetch Object IDentifiers (OID) from Network devices like Printers, Routers, Firewall and Switches. Then later the OID can be used to fetch information for the device.
6 What are the minimum system requirements for installing Probe? Here is the complete list of requirements for installing Discovery Probe: Operating System: Windows XP, Vista, 7, 8 or higher Processor: Intel Pentium class of processors or higher RAM: 1GB or more Storage: 25MB for free space in your hard drive An active computer that is always available to perform scheduled scans and updates.
7 How do I download and install Discovery Probe on my computer? On a computer that meets all the requirements mentioned above, follow these steps to install Discovery Probe: Login to Freshservice as an admin. Then go to the Admin tab and click on Discovery.
8 Click on the Download Application button to download the setup file. Double-click to run the setup file and start the installation wizard. Once you finish the installation, the Discovery Probe icon will show up in the system tray. NOTE: As we recommend the use of Discovery Agent [see below] for Asset discovery, Windows Discovery is disabled in Probe by default. You can enable it in Probe Settings.
9 What is Freshservice Discovery Agent? Freshservice Windows Discovery Agent (FSWinAgent) is an application that you can install on all Windows machines in your network. It then helps you keep track of those machines without the interruptions that Probe might sometimes face. FSWinAgent collects the machines details without needing any authentication from the respective user. The details can then be sent to a server and populated in the Configuration Management Database (CMDB) of Freshservice. What additional benefits do I get by installing the Agent? Besides making the discovery of your assets extremely easy, the Agent helps you keep track of the assets better in the long run. Its key benefits include: Dynamic Discovery: Every time FSWinAgent detects a change in its host machine, it will update the data on the server. This makes sure that the database stays the best possible representation of your assets at all times. Periodic Discovery (also available in Probe): It sends updates to the server on a weekly basis to maintain an up to date record of all your assets. This is done regardless of whether changes were made to the asset or not. Auto Upgrade: You would not need to worry about upgrading FSWinAgent every time a new version is available. We ve got it covered. Lastly, Windows settings like DCOM and Antivirus, Firewall etc. will not impact the discoverability of assets.
10 What are the minimum system requirements for installing the Agent? Here s the list of supported Operating Systems for installing the FSWinAgent: Windows XP (Home and Professional editions only) Windows Vista Windows 7 Windows 8 Windows 8.1 Windows 2003 Windows 2003 R2 Windows 2008 Windows 2008 R2 Windows 2012 Windows 2012 R2 As a prerequisite, Microsoft.NET 4.0 client profile should be installed on the device before the agent can be installed.
11 How do I download and install the Agent? Once you install Discovery Probe, you will be prompted to authorize it, import users and scan your network. On the Scan Network phase, you get the option to download the Agent installer.
12 In case you skipped the step, you can always access the Agent download link by launching Probe and going to Settings Configuration. Then you can use one of the following methods to install the Agent on machines in your network easily: To install it on a single machine, simply double-click the msi file. To install it on all machines in a domain, use Group Policy Object in the Active Directory. To install it on all machines in a workgroup, use the PsExec tool.
13 How to scan computers or import users from your Active Directory using Discovery Probe? Follow these steps to scan computers or import users from an Active Directory. The users will be added as unverified requesters. Type the Domain Name of the Active Directory in NetBios format in the Domain Name field. Enter the Domain Controller Name or IP Address in the Domain Controller field. Domain Controller is the machine in which Active Directory is installed. Type the username and password in the corresponding fields. Please note that the user credentials should have privilege to read the Active directory. Using an Administrator account is preferable.
14 Click Import Users/Scan Domain. On the next step, Organisational Units available in the domain would be displayed. Select the OUs from which the users/computers need to be imported/scanned.
15 How to prevent unwanted software from being scanned? You would generally want Probe to track licensed software but there might be some freeware that you might not want tracked. You can add all such applications as Blacklisted Software. Login to Freshservice as an admin. Go to the Admin tab and click Discovery [under Configuration Management]. Click on Probe Settings and add the software to the list.
16 How to convert a Non CI software application to a CI? If a software application is not added in the Product Catalog in Freshservice, it is displayed as a Non CI. If a CI that you d like to track gets scanned as a Non CI in Probe, you can can convert it easily. In Freshservice, go to the CMDB tab and select the host machine. Go to the Software tab and click on Non CI s to access the list Hover over the one you d like to convert and click on Create CI.
17 In the form for creating the new CI, you can select a Product from the corresponding drop-down menu or add a new product.
18 What happens when a software application is uninstalled after it has been scanned? If Probe scans a software application and it is uninstalled later, during the next scan, it notices that the application is missing. If the application had been added as a CI in Freshservice, Probe will dissociate it from the device and it will stay in the CMDB as an orphan CI with no hardware associated with it. How to track dissociated or deleted software? If you ve dissociated a software application from the corresponding hardware device or deleted it from Freshservice s CMDB, you can track it by checking the recent activity list for the device. Login to Freshservice as an admin. Go to the device in the CMDB. Click on Activity from the list in the left pane.
19 How to scan your IP Range for assets using Discovery Probe? Here s how you scan your network for assets: Enter a start and end IP address or type in a domain you want Probe to scan. Type in the Windows Credentials - these will be used to authenticate all Windows machines in your network [required only if Windows Discovery is enabled]. Type in the SSH Credentials - these will be used to authenticate all Mac OS X and Linux based machines in your network. For other devices like printers or routers, if there is a dedicated SNMP string for your network, type it in the SNMP String field or the default string public would be considered during scan. Click on Next/Scan Network Devices to start the scan.
20 How to schedule periodic scans using Discovery Probe? Probe can help you keep track of new devices that get added to the network. Here are the steps to schedule automatic scans: Give a name to the Probe installation so that it is easily identifiable from your admin panel. Turn on Device Scanning. Choose the days on which you want Probe to run every week along with the time. Turn on Active Directory User import. Select the days when you want user information to be fetched. Click on the Get Started button to finish setting up Probe. If the schedule needs to be changed later, it can be configured through Settings Schedule.
21 How to manage scanned assets and error messages using Discovery Probe? The Results screen of the Discovery Probe is classified into 4 tabs to help you manage your assets efficiently. The Devices tab displays the list of all the discovered assets. The list shows different types of devices including workstations, network routers, printers etc. along with their names and last scan information. You will also be able to see any error messages associated with each configuration item in the list.
22 The Scan Errors tab picks out every error that occurred during recent scans and displays them as a consolidated list. Clicking on any of them will give you a detailed report on what went wrong while the system was trying to scan the asset. You can try troubleshooting the errors based on the displayed message. The Scan Device button on the top right corner of the Devices/Scan Errors tab will let the user scan individual assets.
23 Users can enter Local/Admin credentials by choosing the Local credential radio button.
24 If a user chooses Global Credentials then IPRange Scan or Domain Scan credentials should be used.
25 The next one is the Domains tab, which lists out every unique domain address that has been identified during the scan. A progress bar on the right shows you if any of the scans are currently running. You can get a quick glance at the number of users present in the domain and the total number of assets that have been scanned so far. You can also manually import users or scan the network again by using the corresponding options.the New Domain option can be used to add a new domain for scanning.
26 Finally, the IP Ranges tab lets you add any new IP ranges to your Discovery Probe and start scanning it along with any of the existing scans that might be running already. To avoid overlaps, please make sure you define new IP ranges that aren t already being monitored.
27 How to troubleshoot common error messages displayed during asset recovery? If Probe is unable to scan all the available assets, it might display an error message. Here are the troubleshooting steps for some of the common errors: Error: Invalid Credentials Cause: The credentials you provided during the scan don t match the actual username and password of the configuration item. Make sure you specify the right credentials to the Discovery Probe before the scan. Go to the Devices tab in Probe. Click on Scan Device and include the hostname with local credentials. Perform a scan and make sure everything is okay. Install the Freshservice Discovery Agent on the device to scan it seamlessly in future. Error: DCOM / Firewall Settings Error Cause: There is an issue with your DCOM/Firewall Settings that doesn't permit the asset in your network to make WMI requests. Download this executable file in the client device. Locate FSScanConfig.exe in the downloaded folder on the client machine and double click it. UAC dialog box will prompt for Administrator access. Click OK. The DCOM/Firewall Settings should have gotten resolved now. Install the Freshservice Discovery Agent on the device to scan it seamlessly in future.
28 Error: Requests Blocked by Firewall Cause: The ports required for sending and receiving WMI requests in the device might not be open. Download this executable file in the client device. Locate FSScanConfig.exe in the downloaded folder on the client machine and double click it. UAC dialog box will prompt for Administrator access. Click ok. The DCOM/Firewall Settings should have gotten resolved now. Install the Freshservice Discovery Agent on the device to scan it seamlessly in future. Error: Invalid SSH Credentials Possible Cause 1: SSH credentials given on the scan page might be wrong Update the username and password for your SSH connection Possible Cause 2: Sometimes, scanning certain parts of your devices might require root access (for Linux and OS X users) Check if the device was on during the scan. Try passing the root password of your machine to Probe (optional). Error: SSH Connection Disabled Cause: The SSH connection is disabled To enable SSH on Mac OS X: Go to System Preferences Sharing (under Internet & Wireless) Enable 'Remote Login' on the LHS list Select 'All Users' under 'Allow access for' Linux Users and Mac users can also download and install SSH server and client in the device.
29 Error: Unsupported Operating System Cause: Discovery Probe doesn't support this OS yet Send us the name of your Operating System and any other relevant details at We'll get in touch with you. Error: Unable to ping device Try pinging the device manually Open command prompt in your computer (Terminal if you are using Linux or OS X) Type ping <HostName / IP> If all the packets are sent and received and if you do not see any timeouts, then everything is working fine. Try scanning the specific device again in Probe. Possible Cause 1: The device is not available in your network Please ensure that the device is available in the same network Possible Cause 2: The device is currently turned off Please check if the device was turned on during the scan. Possible Cause 3: Your firewall is blocking ICMP packets from the Discovery Probe Check whether there is an inbound rule in your Firewall Settings to allow ICMP packets. If not, create an inbound rule in the Firewall to allow them. Install the Freshservice Discovery Agent on the device to scan it seamlessly in future. For further questions or clarifications, please contact support@freshservice.com.
Legal Notes. Regarding Trademarks. 2012 KYOCERA Document Solutions Inc.
Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held liable for any problems arising from
More informationTANDBERG MANAGEMENT SUITE 10.0
TANDBERG MANAGEMENT SUITE 10.0 Installation Manual Getting Started D12786 Rev.16 This document is not to be reproduced in whole or in part without permission in writing from: Contents INTRODUCTION 3 REQUIREMENTS
More informationRMM/MDM. Quick Reference Guide
RMM/MDM Quick Reference Guide Contents Getting Started...3 Probe and Agent Management...3 Installing a Windows Probe...3 Installing an Agent...5 Windows Agents...5 Updating Monitoring Software - Manually...5
More informationRebasoft Auditor Quick Start Guide
Copyright Rebasoft Limited: 2009-2011 1 Release 2.1, Rev. 1 Copyright Notice Copyright 2009-2011 Rebasoft Ltd. All rights reserved. REBASOFT Software, the Rebasoft logo, Rebasoft Auditor are registered
More informationNetwork Setup Instructions
Network Setup Instructions This document provides technical details for setting up the Elite Salon & Spa Management program in a network environment. If you have any questions, please contact our Technical
More informationSOS SO S O n O lin n e lin e Bac Ba kup cku ck p u USER MANUAL
SOS Online Backup USER MANUAL HOW TO INSTALL THE SOFTWARE 1. Download the software from the website: http://www.sosonlinebackup.com/download_the_software.htm 2. Click Run to install when promoted, or alternatively,
More informationUser Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream
User Manual Onsight Management Suite Version 5.1 Another Innovation by Librestream Doc #: 400075-06 May 2012 Information in this document is subject to change without notice. Reproduction in any manner
More informationCore Protection for Virtual Machines 1
Core Protection for Virtual Machines 1 Comprehensive Threat Protection for Virtual Environments. Installation Guide e Endpoint Security Trend Micro Incorporated reserves the right to make changes to this
More informationDCA Local Print Agent Push Install
DCA Local Print Agent Push Install PageTrac Support DCA Local Print Agent Push Install System Requirements Each workstation on which you install Local Print Agent must have the following: Windows operating
More informationQuick Start Guide for VMware and Windows 7
PROPALMS VDI Version 2.1 Quick Start Guide for VMware and Windows 7 Rev. 1.1 Published: JULY-2011 1999-2011 Propalms Ltd. All rights reserved. The information contained in this document represents the
More informationWhatsUpGold. v3.0. WhatsConnected User Guide
WhatsUpGold v3.0 WhatsConnected User Guide Contents CHAPTER 1 Welcome to WhatsConnected Finding more information and updates... 2 Sending feedback... 3 CHAPTER 2 Installing and Configuring WhatsConnected
More informationLifeCyclePlus Version 1
LifeCyclePlus Version 1 Last updated: 2014-04-25 Information in this document is subject to change without notice. Companies, names and data used in examples herein are fictitious unless otherwise noted.
More informationLexia Network Installation Instructions
Lexia Network Installation Instructions For Lexia Early Reading 3.x, Primary Reading 1.x, Foundation Reading 1.x, Strategies for Older Students 4.x, Cross-Trainer 1.x and Quick Reading Test 2.x (NOT for
More information1. Installation Overview
Quick Install Guide 1. Installation Overview Thank you for selecting Bitdefender Business Solutions to protect your business. This document enables you to quickly get started with the installation of Bitdefender
More informationSigniant Agent installation
Signiant Agent installation Release 11.3.0 March 2015 ABSTRACT Guidelines to install the Signiant Agent software for the WCPApp. The following instructions are adapted from the Signiant original documentation
More informationTable of Contents. Introduction...9. Installation...17. Program Tour...31. The Program Components...10 Main Program Features...11
2011 AdRem Software, Inc. This document is written by AdRem Software and represents the views and opinions of AdRem Software regarding its content, as of the date the document was issued. The information
More informationCentreWare for Microsoft Operations Manager. User Guide
CentreWare for Microsoft Operations Manager User Guide Copyright 2006 by Xerox Corporation. All rights reserved. Copyright protection claimed includes all forms and matters of copyright material and information
More informationVerizon Remote Access User Guide
Version 17.12 Last Updated: August 2012 2012 Verizon. All Rights Reserved. The Verizon names and logos and all other names, logos, and slogans identifying Verizon s products and services are trademarks
More informationSTATISTICA VERSION 12 STATISTICA ENTERPRISE SMALL BUSINESS INSTALLATION INSTRUCTIONS
STATISTICA VERSION 12 STATISTICA ENTERPRISE SMALL BUSINESS INSTALLATION INSTRUCTIONS Notes 1. The installation of STATISTICA Enterprise Small Business entails two parts: a) a server installation, and b)
More informationBefore deploying SiteAudit it is recommended to review the information below. This will ensure efficient installation and operation of SiteAudit.
SiteAudit Knowledge Base Deployment Check List June 2012 In This Article: Platform Requirements Windows Settings Discovery Configuration Before deploying SiteAudit it is recommended to review the information
More informationDeploying BitDefender Client Security and BitDefender Windows Server Solutions
Deploying BitDefender Client Security and BitDefender Windows Server Solutions Quick Install Guide Copyright 2011 BitDefender 1. Installation Overview Thank you for selecting BitDefender Business Solutions
More informationTable of Contents INTRODUCTION...7
Table of Contents INTRODUCTION...7 System Requirements... 9 Installing AssetExplorer... 10 Uninstalling AssetExplorer... 14 Registering AssetExplorer... 15 Contacting ZOHO Corporation... 16 HOME...17 Dashboard...
More informationInstalling FileMaker Pro 11 in Windows
Installing FileMaker Pro 11 in Windows Before you begin the installation process, please exit other open programs and save your work. Installation notes Before you install FileMaker Pro, review the following
More informationInstalling and Configuring WhatsUp Gold
Installing and Configuring WhatsUp Gold This guide provides information about installing and configuring WhatsUp Gold v14.2, including instructions on how to run the WhatsUp web interface through an Internet
More informationDeploying BitDefender Client Security and BitDefender Windows Server Solutions
Deploying BitDefender Client Security and BitDefender Windows Server Solutions Quick Install Guide Copyright 2010 BitDefender; 1. Installation Overview Thank you for selecting BitDefender Business Solutions
More informationInstallation Notes for Outpost Network Security (ONS) version 3.2
Outpost Network Security Installation Notes version 3.2 Page 1 Installation Notes for Outpost Network Security (ONS) version 3.2 Contents Installation Notes for Outpost Network Security (ONS) version 3.2...
More informationSYMANTEC BACKUPEXEC2010 WITH StorTrends
SYMANTEC BACKUPEXEC2010 WITH StorTrends 1 Index 1. Introduction 3 2. Test Environment 3 3. System Requirement 4 4. Storage Requirement 4 5. Installation of Symantec Backup EXEC 2010 4 6. Installing Backup
More informationKaseya 2. User Guide. Version R8. English
Kaseya 2 Discovery User Guide Version R8 English September 19, 2014 Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept EULATOS as
More informationDESLock+ Basic Setup Guide Version 1.20, rev: June 9th 2014
DESLock+ Basic Setup Guide Version 1.20, rev: June 9th 2014 Contents Overview... 2 System requirements:... 2 Before installing... 3 Download and installation... 3 Configure DESLock+ Enterprise Server...
More informationPearl Echo Installation Checklist
Pearl Echo Installation Checklist Use this checklist to enter critical installation and setup information that will be required to install Pearl Echo in your network. For detailed deployment instructions
More informationAdvanced Event Viewer Manual
Advanced Event Viewer Manual Document version: 2.2944.01 Download Advanced Event Viewer at: http://www.advancedeventviewer.com Page 1 Introduction Advanced Event Viewer is an award winning application
More informationSoftware Version 5.1 November, 2014. Xerox Device Agent User Guide
Software Version 5.1 November, 2014 Xerox Device Agent User Guide 2014 Xerox Corporation. All rights reserved. Xerox and Xerox and Design are trademarks of Xerox Corporation in the United States and/or
More informationMigrating TimeForce To A New Server
Rev. 4/28/14 Migrating TimeForce To A New Server Table of Contents 1. Installation Prerequisites... 2 Required... 2 Recommended... 3 2. Update to a Migration Compatible Version... 3 Determine the Database
More informationFREQUENTLY ASKED QUESTIONS
FREQUENTLY ASKED QUESTIONS Secure Bytes, October 2011 This document is confidential and for the use of a Secure Bytes client only. The information contained herein is the property of Secure Bytes and may
More informationInstallation Instruction STATISTICA Enterprise Small Business
Installation Instruction STATISTICA Enterprise Small Business Notes: ❶ The installation of STATISTICA Enterprise Small Business entails two parts: a) a server installation, and b) workstation installations
More informationCentralized Mac Home Directories On Windows Servers: Using Windows To Serve The Mac
Making it easy to deploy, integrate and manage Macs, iphones and ipads in a Windows environment. Centralized Mac Home Directories On Windows Servers: Using Windows To Serve The Mac 2011 ENTERPRISE DEVICE
More informationInstallation Guide: Delta Module Manager Launcher
Installation Guide: Delta Module Manager Launcher Overview... 2 Delta Module Manager Launcher... 2 Pre-Installation Considerations... 3 Hardware Requirements... 3 Software Requirements... 3 Virtualisation...
More informationVERITAS Backup Exec TM 10.0 for Windows Servers
VERITAS Backup Exec TM 10.0 for Windows Servers Quick Installation Guide N134418 July 2004 Disclaimer The information contained in this publication is subject to change without notice. VERITAS Software
More informationLifeSize Control Installation Guide
LifeSize Control Installation Guide April 2005 Part Number 132-00001-001, Version 1.0 Copyright Notice Copyright 2005 LifeSize Communications. All rights reserved. LifeSize Communications has made every
More informationWhatsUp Gold v16.3 Installation and Configuration Guide
WhatsUp Gold v16.3 Installation and Configuration Guide Contents Installing and Configuring WhatsUp Gold using WhatsUp Setup Installation Overview... 1 Overview... 1 Security considerations... 2 Standard
More informationNovell PlateSpin Recon
Getting Started Guide AUTHORIZED DOCUMENTATION Novell PlateSpin Recon 3.6.1 March 15, 2010 www.novell.com PlateSpin Recon 3.6 Getting Started Guide Legal Notices Novell, Inc., makes no representations
More informationVirtual CD v10. Network Management Server Manual. H+H Software GmbH
Virtual CD v10 Network Management Server Manual H+H Software GmbH Table of Contents Table of Contents Introduction 1 Legal Notices... 2 What Virtual CD NMS can do for you... 3 New Features in Virtual
More informationUsing WhatsUp IP Address Manager 1.0
Using WhatsUp IP Address Manager 1.0 Contents Table of Contents Welcome to WhatsUp IP Address Manager Finding more information and updates... 1 Sending feedback... 2 Installing and Licensing IP Address
More informationformerly Help Desk Authority 9.1.3 Upgrade Guide
formerly Help Desk Authority 9.1.3 Upgrade Guide 2 Contacting Quest Software Email: Mail: Web site: info@quest.com Quest Software, Inc. World Headquarters 5 Polaris Way Aliso Viejo, CA 92656 USA www.quest.com
More informationWhatsUp Gold v16.1 Installation and Configuration Guide
WhatsUp Gold v16.1 Installation and Configuration Guide Contents Installing and Configuring Ipswitch WhatsUp Gold v16.1 using WhatsUp Setup Installing WhatsUp Gold using WhatsUp Setup... 1 Security guidelines
More informationInstallation Overview
Contents Installation Overview... 2 How to Install Ad-Aware Management Server... 3 How to Deploy the Ad-Aware Security Solutions... 5 General Deployment Conditions... 5 Deploying Ad-Aware Management Agent...
More informationRedtail CRM Integration. Users Guide. 2011 Cities Digital, Inc. All rights reserved. Contents i
Redtail CRM Integration Users Guide 2011 Cities Digital, Inc. All rights reserved. Contents i Contents Redtail Integration with Laserfiche by Cities Digital 1 Overview... 1 Requirements 3 Minimum Server
More informationTable of Contents. FleetSoft Installation Guide
FleetSoft Installation Guide Table of Contents FleetSoft Installation Guide... 1 Minimum System Requirements... 2 Installation Notes... 3 Frequently Asked Questions... 4 Deployment Overview... 6 Automating
More informationSoftware Installation Requirements
Software Installation Guide PrintIQ TM Software Installation Requirements Please use the following guide to ensure that you're meeting all requirements prior to installing the PrintIQ TM Xerox Device Agent
More informationDefender 5.7 - Token Deployment System Quick Start Guide
Defender 5.7 - Token Deployment System Quick Start Guide This guide describes how to install, configure and use the Defender Token Deployment System, based on default settings and how to self register
More informationEnterprise Remote Control 5.6 Manual
Enterprise Remote Control 5.6 Manual Solutions for Network Administrators Copyright 2015, IntelliAdmin, LLC Revision 3/26/2015 http://www.intelliadmin.com Page 1 Table of Contents What is Enterprise Remote
More informationHP MediaSmart Server Software Upgrade from v.1 to v.3
HP MediaSmart Server Software Upgrade from v.1 to v.3 Table of Contents Upgrade Your Server Software to HP MediaSmart Server v.3 2 Before You Begin 3 What's New... 3 Features That Will Change... 4 Prepare
More informationNetWrix USB Blocker. Version 3.6 Administrator Guide
NetWrix USB Blocker Version 3.6 Administrator Guide Table of Contents 1. Introduction...3 1.1. What is NetWrix USB Blocker?...3 1.2. Product Architecture...3 2. Licensing...4 3. Operation Guide...5 3.1.
More informationenicq 5 System Administrator s Guide
Vermont Oxford Network enicq 5 Documentation enicq 5 System Administrator s Guide Release 2.0 Published November 2014 2014 Vermont Oxford Network. All Rights Reserved. enicq 5 System Administrator s Guide
More informationNexio Connectus with Nexio G-Scribe
Nexio Connectus with Nexio G-Scribe 2.1.2 3/20/2014 Edition: A 2.1.2 Publication Information 2014 Imagine Communications. Proprietary and Confidential. Imagine Communications considers this document and
More informationNetwork Setup Guide. Introduction. Setting up for use over LAN
Network Setup Guide This manual contains the setup information required to use the machine over wired LAN. If you use the machine with USB connection, refer to your setup sheet. Introduction To use the
More informationHP Client Automation Standard Fast Track guide
HP Client Automation Standard Fast Track guide Background Client Automation Version This document is designed to be used as a fast track guide to installing and configuring Hewlett Packard Client Automation
More informationXStream Remote Control: Configuring DCOM Connectivity
XStream Remote Control: Configuring DCOM Connectivity APPLICATION BRIEF March 2009 Summary The application running the graphical user interface of LeCroy Windows-based oscilloscopes is a COM Automation
More informationSoftware Version 5.2 June 2015. Xerox Device Agent User Guide
Software Version 5.2 June 2015 Xerox Device Agent User Guide 2015 Xerox Corporation. All rights reserved. Xerox, Xerox and Design and Phaser are trademarks of Xerox Corporation in the United States and/or
More informationSetting Up Scan to SMB on TaskALFA series MFP s.
Setting Up Scan to SMB on TaskALFA series MFP s. There are three steps necessary to set up a new Scan to SMB function button on the TaskALFA series color MFP. 1. A folder must be created on the PC and
More informationGUARD1 PLUS SE Administrator's Manual
GUARD1 PLUS SE Administrator's Manual Version 4.4 30700 Bainbridge Road Solon, Ohio 44139 Phone 216-595-0890 Fax 216-595-0991 info@guard1.com www.guard1.com i 2010 TimeKeeping Systems, Inc. GUARD1 PLUS
More informationQuick Start Guide for Parallels Virtuozzo
PROPALMS VDI Version 2.1 Quick Start Guide for Parallels Virtuozzo Rev. 1.1 Published: JULY-2011 1999-2011 Propalms Ltd. All rights reserved. The information contained in this document represents the current
More informationCreating client-server setup with multiple clients
Creating client-server setup with multiple clients Coffalyser.Net uses a SQL client server database model to store all project/experiment- related data. The client-server model has one main application
More informationLifeSize Control TM Deployment Guide
LifeSize Control TM Deployment Guide July 2011 LifeSize Control Deployment Guide 2 LifeSize Control This guide is for network administrators who use LifeSize Control to manage video and voice communications
More informationConfiguring Devices for Use with Cisco Configuration Professional (CCP) 2.5
Configuring Devices for Use with Cisco Configuration Professional (CCP) 2.5 Objectives Part 1: Configure CCP Access for Routers Enable HTTP/HTTPS server. Create a user account with privilege level 15.
More informationInstallation Guide for Pulse on Windows Server 2008R2
MadCap Software Installation Guide for Pulse on Windows Server 2008R2 Pulse Copyright 2014 MadCap Software. All rights reserved. Information in this document is subject to change without notice. The software
More informationowncloud Configuration and Usage Guide
owncloud Configuration and Usage Guide This guide will assist you with configuring and using YSUʼs Cloud Data storage solution (owncloud). The setup instructions will include how to navigate the web interface,
More informationProjetex 9 Workstation Setup Quick Start Guide 2012 Advanced International Translations
Projetex 9 Workstation Setup Quick Start Guide 1 Projetex 9 Help Table of Contents Disclaimer 2 System Requirements 2 Registration/Upgrade 3 Projetex Workstation Setup 5 User Login to Projetex Workstation
More informationThinPoint Quick Start Guide
ThinPoint Quick Start Guide 2 ThinPoint Quick Start Guide Table of Contents Part 1 Introduction 3 Part 2 ThinPoint Windows Host Installation 3 1 Compatibility... list 3 2 Pre-requisites... 3 3 Installation...
More informationLepide Event Log Manager. Users Help Manual. Lepide Event Log Manager. Lepide Software Private Limited. Page 1
Users Help Manual Lepide Event Log Manager Lepide Software Private Limited. Page 1 Users Help Manual for Lepide Event Log Manager Lepide Software Private Limited, All Rights Reserved This User Guide and
More informationCharter Business Desktop Security Administrator's Guide
Charter Business Desktop Security Administrator's Guide Table of Contents Chapter 1: Introduction... 4 Chapter 2: Getting Started... 5 Creating a new user... 6 Recovering and changing your password...
More informationGetting Started with Vision 6
Getting Started with Vision 6 Version 6.9 Notice Copyright 1981-2009 Netop Business Solutions A/S. All Rights Reserved. Portions used under license from third parties. Please send any comments to: Netop
More informationNETWORK PRINT MONITOR User Guide
NETWORK PRINT MONITOR User Guide Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held liable
More informationLepideAuditor Suite for File Server. Installation and Configuration Guide
LepideAuditor Suite for File Server Installation and Configuration Guide Table of Contents 1. Introduction... 4 2. Requirements and Prerequisites... 4 2.1 Basic System Requirements... 4 2.2 Supported Servers
More informationXIA Configuration Server
XIA Configuration Server XIA Configuration Server v7 Installation Quick Start Guide Monday, 05 January 2015 1 P a g e X I A C o n f i g u r a t i o n S e r v e r Contents Requirements... 3 XIA Configuration
More informationComodo LoginPro Software Version 1.5
Comodo LoginPro Software Version 1.5 User Guide Guide Version 1.5.030513 Comodo Security Solutions 1255 Broad Street STE 100 Clifton, NJ 07013 Table of Contents 1.Introduction to Comodo LoginPro... 3 1.1.System
More informationUsing Device Discovery
2 CHAPTER You can use Active Discovery to scan your network for new monitors (Active Monitors and Performance Monitors) and devices on a regular basis. Newly discovered items are added to the Active Discovery
More informationSnow Active Directory Discovery
Product Snow Active Directory Discovery Version 1.0 Release date 2014-04-29 Document date 2014-04-29 Snow Active Directory Discovery Installation & Configuration Guide Page 2 of 9 This document describes
More informationRapid Assessment Key User Manual
Rapid Assessment Key User Manual Table of Contents Getting Started with the Rapid Assessment Key... 1 Welcome to the Print Audit Rapid Assessment Key...1 System Requirements...1 Network Requirements...1
More informationInstallation Manual (MSI Version)
Installation Manual (MSI Version) 1. SYSTEM REQUIREMENTS... 2 2. INSTALLATION INSTRUCTIONS... 2 2.1 REMOTE INSTALLATION USING GROUP POLICY... 2 2.1.1 Assigning Software...2 2.1.2 Publishing Software...2
More informationRemote Support Jumpoint Guide: Unattended Access to Computers in a Network 3. Requirements and Considerations to Install a Jumpoint 4.
Jumpoint Guide 2015 Bomgar Corporation. All rights reserved worldwide. BOMGAR and the BOMGAR logo are trademarks of Bomgar Corporation; other trademarks shown are the property of their respective owners.
More informationPoint of Sale 2015 Enterprise. Installation Guide
Point of Sale 2015 Enterprise Installation Guide Contents About this guide 3 System Requirements - Microsoft SQL Server 2008 R2 Express 3 System Requirements - POS Enterprise 2015 (Administrator) 3 System
More informationIntegrating LANGuardian with Active Directory
Integrating LANGuardian with Active Directory 01 February 2012 This document describes how to integrate LANGuardian with Microsoft Windows Server and Active Directory. Overview With the optional Identity
More informationTest Center Enterprise. ios Device Onboarding Guide
Test Center Enterprise ios Device Onboarding Guide Copyright Copyright 2012 Keynote DeviceAnywhere. All Rights Reserved. March 2012. Notice 2012 Keynote DeviceAnywhere. All rights reserved. THE INFORMATION
More informationPractice Management Installation Guide. Requirements/Prerequisites: Workstation Requirements. Page 1 of 5
Practice Management Installation Guide Your computers must meet the Workstation, Server and Network Requirements (see below for specifics). These requirements will ensure that Practice Management will
More informationOut n About! for Outlook Electronic In/Out Status Board. Administrators Guide. Version 3.x
Out n About! for Outlook Electronic In/Out Status Board Administrators Guide Version 3.x Contents Introduction... 1 Welcome... 1 Administration... 1 System Design... 1 Installation... 3 System Requirements...
More informationActive Directory integration with CloudByte ElastiStor
Active Directory integration with CloudByte ElastiStor Prerequisite Change the time and the time zone of the Active Directory Server to the VSM time and time zone. Enabling Active Directory at VSM level
More informationInstallation and Connection Guide to the simulation environment GLOBAL VISION
Installation and Connection Guide to the simulation environment GLOBAL VISION Hardware and Software Requirements The following hardware specification is recommended for client machines: 2 GHz Pentium class
More informationAVG 8.5 Anti-Virus Network Edition
AVG 8.5 Anti-Virus Network Edition User Manual Document revision 85.2 (23. 4. 2009) Copyright AVG Technologies CZ, s.r.o. All rights reserved. All other trademarks are the property of their respective
More informationInstallation Guidelines (MySQL database & Archivists Toolkit client)
Installation Guidelines (MySQL database & Archivists Toolkit client) Understanding the Toolkit Architecture The Archivists Toolkit requires both a client and database to function. The client is installed
More informationTufts VPN Client User Guide for Windows
Tufts VPN Client User Guide for Windows Introduction The Tufts Virtual Private Network (VPN) implementation is a service that is provided to the faculty and staff of Tufts University to enable secure access
More informationNagios XI Monitoring Windows Using WMI
Purpose The Industry Standard in IT Infrastructure Monitoring This document describes how to monitor Windows machines with Nagios XI using WMI. WMI (Windows Management Instrumentation) allows for agentless
More informationInterworks. Interworks Cloud Platform Installation Guide
Interworks Interworks Cloud Platform Installation Guide Published: March, 2014 This document contains information proprietary to Interworks and its receipt or possession does not convey any rights to reproduce,
More informationGetting started. Symantec AntiVirus Corporate Edition. About Symantec AntiVirus. How to get started
Getting started Corporate Edition Copyright 2005 Corporation. All rights reserved. Printed in the U.S.A. 03/05 PN: 10362873 and the logo are U.S. registered trademarks of Corporation. is a trademark of
More informationImportant. Please read this User s Manual carefully to familiarize yourself with safe and effective usage.
Important Please read this User s Manual carefully to familiarize yourself with safe and effective usage. About This Manual This manual describes how to install and configure RadiNET Pro Gateway and RadiCS
More informationLocal Caching Servers (LCS): User Manual
Local Caching Servers (LCS): User Manual Table of Contents Local Caching Servers... 1 Supported Browsers... 1 Getting Help... 1 System Requirements... 2 Macintosh... 2 Windows... 2 Linux... 2 Downloading
More informationNSi Mobile Installation Guide. Version 6.2
NSi Mobile Installation Guide Version 6.2 Revision History Version Date 1.0 October 2, 2012 2.0 September 18, 2013 2 CONTENTS TABLE OF CONTENTS PREFACE... 5 Purpose of this Document... 5 Version Compatibility...
More informationInstalling GFI MailSecurity
Installing GFI MailSecurity Introduction This chapter explains how to install and configure GFI MailSecurity. You can install GFI MailSecurity directly on your mail server or you can choose to install
More informationInstallation Guide for Pulse on Windows Server 2012
MadCap Software Installation Guide for Pulse on Windows Server 2012 Pulse Copyright 2014 MadCap Software. All rights reserved. Information in this document is subject to change without notice. The software
More informationILTA HANDS ON Securing Windows 7
Securing Windows 7 8/23/2011 Table of Contents About this lab... 3 About the Laboratory Environment... 4 Lab 1: Restricting Users... 5 Exercise 1. Verify the default rights of users... 5 Exercise 2. Adding
More information