Agents Hands-On Exercises. Agent Hands On Exercise

Size: px
Start display at page:

Download "Agents Hands-On Exercises. Agent Hands On Exercise"

Transcription

1 Agent Hands On Exercise

2 2 Chapter 2 Agents Hands-On Exercises Background Information You have just been hired as the lead IT Administrator at the Florida International University (FIU) to manage the computers at the School of Computing and Information Sciences (SCIS), the Machine Room (MR), the Green Library (GL), and the College of Engineering and Computing (CEC). As shown in Fig. 2.49, SCIS, MR, GL, and CEC are physically located in four buildings. SCIS maintains about 200 desktop workstations in its instructional lab, MR maintains about 5 servers, GL maintains about 50 open access guest desktops, and CEC maintains about 500 PCs and laptops. The exact number and configurations of computers are not well documented. Typically, the servers run Windows 2003 and the desktop workstations, PCs, and laptops all run Windows XP. Active Directory is implemented in one of the servers, named dc, and is assigned to all computers in SCIS and GL, but not to those in CEC. As the lead IT Administrator of the organization you are responsible for ensuring that all systems run efficiently with minimal disruption of computing services to the users. Fig A logical diagram of FIU s network infrastructure. As your limited budget, available manpower, and system availability requirements do not allow for onsite maintenance of all computers, you must automate routine tasks and remotely perform the majority of system maintenance activities. You have, therefore, decided to employ a Kaseya server to help you manage all computers at SCIS, MR, GL, and CEC. Over the weekend you installed the Kaseya server. The Kasaya server is now fully operational and you can start deploying the Kaseya agents to SCIS, MR, GL, and CEC computers and customizing the agents to your needs. Technical Information Your dedicated virtual environment includes the computers and network devices depicted in Fig and further described below: NAT Router: & & &

3 Chapter 2 Agents Hands-On Exercises 3 SCIS: ws1.scis.fiu.edu MR: dc.scis.fiu.edu & & GL: guest1.gl.fiu.edu CEC: pc1.cec.fiu.edu Note: This virtual environment includes only a limited number of representative servers and workstations physically housed in the four buildings. Part 1 Now that the Kaseya server is operational and the logical layout is known, it is time to start deploying Kaseya agents and customizing Kaseya to your needs. To begin, you need to setup FIU as the organization and SCIS, MR, GL and CEC as groups, under FIU, so that everything is organized to reflect the logical diagram shown in Fig Fig shows a quick view of the organizational hierarchy. Fig FIU Organizational Hierarchy Create an organization named FIU-<USERNAME> (replace <USERNAME> with your Kaseya login name): Note: As you will be sharing the Kaseya server with other students, everything referring to your dedicated virtual environment should have a unique name by adding your username as its suffix to distinguish your dedicated environment from those of others. When you register for virtual labs, you will receive a document (called Data Sheet ) that includes all the specific information about your dedicated virtual environment, including your <USERNAME>, <LOGIN_CREDENTIALS>, the <DOMAIN_ADMIN_CREDENTIALS>, <NAT_ ROUTER_IP>, <DC_RDP_PORT>, <WS_RDP_PORT>, <GUEST_RDP_PORT>, <PC_RDP_PORT>, <LAPTOP_RDP_PORT> and <KASEYA_SERVER>. Note that all such variables are embedded within < and > and follow this formatting style: <ITALIC_BOLD>. 1. Open the System module. Go to Orgs / Groups / Depts / Staff > Manage. 2. Click on the New button.

4 4 Chapter 2 Agents Hands-On Exercises Fig Create the organization in Kaseya. 3. Type in FIU-<USERNAME> under ID and Organization Name- Under the organization name ( FIU- <USERNAME> ), create machine groups to specify the physical locations of the computers. The names of the machine groups are as follows: SCIS, MR, GL, and CEC. Fig Adding organization details. 4. Verify if the newly created Organization ( FIU-<USERNAME> ) is checked. Fig Adding organization details. 5. Click on Machine Group on the right hand side of the module. 6. Click on New in this section.

5 Chapter 2 Agents Hands-On Exercises 5 7. Create a group by typing its name ( SCIS ) under Machine Group Name. Click Save. Fig Machine Group Names 8. Repeat steps 4-8 for the MR, GL, and CEC groups. Part 2 Having set up the organization and groups, the next step is to install an agent on dc so that we can start discovering the computers associated with the domain. -Create a package for agent deployment named package4mr-<username>. This package will be used to install agents on all of the servers in MR. 9. Open the Agent module. Go to Install Agents > Deploy Agents. Click on Create Package and a new window will open up. Fig Adding organization details. 10. Under Specify how the machine ID is assigned, choose Computer Name - the computer name and under Specify how the group ID is assigned, choose Existing Group - FIU-<USERNAME>.MR as the group. Click next to continue.

6 6 Chapter 2 Agents Hands-On Exercises Fig an Agent Package Fig an Agent Package 11. On the next screen, make sure to leave everything at its default values and click next. 12. In the Select agent type drop down box choose Windows as the operating system. 13. Make sure Securely bind administrator credentials to the install package? is checked and enter the <DOMAIN_ADMIN_CREDENTIALS> (which you can find in your assigned dedicated virtual environment sheet) under this selection box. 14. Next, under Package Name type package4mr-<username> and under Package Description

7 Chapter 2 Agents Hands-On Exercises 7 type MR. Fig an Agent Package 15. Click on Save. Use an RDP client (e.g., Microsoft Terminal Server Console, which can be accessed by running mstsc.exe or any other RDP client such as webrdp) to login to the domain controller For example, you can run this command on a Windows XP, for example, to remote login to this machine: mstsc.exe /admin /v:<nat_ ROUTER_IP>:<DC_RDP_PORT>. Install a custom Kaseya agent using the package that you created in steps 8-14, package4mr-<username>, on this machine manually. 16. While logged into dc through RDP, open a browser (IE is preferred), point it to the <KASEYA_SERV- ER>, and use your <LOGIN_CREDENTIALS> to log into Kaseya and go to Agents > Install Agents > Deploy Agents. Click on the link package4mr-<username>. Download and install the file. Fig Installing Agent Package 17. Verify the agent is installed successfully by going to Machine Status > Agent Status. Look for the icon next to dc.mr.fiu-<username>. The icon should not be grayed out. Another way to verify the successful installation of the agent is to check whether the agent icon shows in the system tray and

8 8 Chapter 2 Agents Hands-On Exercises whether it is blue (not gray). Fig Successfully installed agent. Note: The agent icon, by default, is not shown when connecting to a computer remotely, using, for example, a RDP client or the VMware Server Console. Even if you remotely connect to the console session, the agent icon will not show in the system tray. To fix this, you should run regedit.exe on the remote machine and browse to HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\ CurrentVersion\Run\ and look for a key with its name starting with KAS and value similar to C:\Program Files\Kaseya\...\KaUsrTsk. exe. Now you need to double click on this key and add remote to the end of the value data for this key, outside the double quotes for the KaUsrTsk.exe command. The value data should look like this: C:\Program Files\Kaseya\...\KaUsrTsk.exe remote. Next, you need to reboot the machine and login to see the agent icon in the system tray. To reboot a remote machine, you can run shutdown r. Part 3 You have successfully installed an agent on dc. You now want to install agents on other computers at SCIS and GL remotely using the agent installed on dc. As dc is a domain controller, running LAN Watch on this machine will discover all the machines that are being controlled by this domain controller. Also, using LAN Watch, you can discover the IP addresses of all the network devices on the subnets that the domain controller is directly attached to. Schedule a LAN watch on the dc to discover all the computers in the domain as well as all the computers and network devices attached to the /24 and /24 networks. 18. Open the Agent module, go to LAN Discovery > LAN Watch. 19. Click on the check-box next to dc. 20. Enter the IP range of your scan in the Scan Range fields ( ). Click on Schedule and a new window will open up.

9 Chapter 2 Agents Hands-On Exercises 9 Fig Setting up LAN Watch 21. Schedule the LAN Watch to run now. Fig Executing LAN Watch 22. Set the distribution to 0 minute to make sure that LAN Watch will start immediately. 23. Finally click on Submit.

10 10 Chapter 2 Agents Hands-On Exercises Fig more packages for the other buildings. Fig Agent Packages. 24. As this process may take some time (approximately 5-10 minutes), you are advised to read through and move on to the next instructions and perform those that are not dependent on LAN Watch (go to steps 24-33). 25. Create three packages for agent deployment named package4scis-<username>, Package4GL-<USERNAME>, and Package4CEC-<USERNAME> to automatically add newly deployed agents to the SCIS, GL, and CEC groups. 26. Open the Agent module. Go to Install Agents > Deploy Agents. 27. Click on Create Package and a new window will open up. 28. Under Specify how the machine ID is assigned, choose Computer Name - the computer name. 29. Under Specify how the group ID is assigned, choose Existing Group - FIU-<USERNAME>.SCIS as the group.click next to continue. On the next screen, make sure to leave everything at its default values and click next.

11 Chapter 2 Agents Hands-On Exercises 11 Fig Agent Packages. 30. Under Select agent type choose Windows as the operating system. 31. Make sure Securely bind administrator credentials to the install package? is checked and put in the administrator credentials under it. 32. Under Package Name type, enter SCIS and under Package Description, type Package4SCIS- <USERNAME>. 33. Click on Save. Fig Agent Packages. 34. Repeat these steps for the Package4GL-<USERNAME> and the Package4CEC-<USERNAME>. Note: Since the CEC building is not on the domain. Leave the Domain textbox blank when creating the CEC package. Use View AD Users and deploy an agent every time the user Student logs in using the new Package4SCIS- <USERNAME>. We use this agent deployment strategy because students using the instructional lab computers may uninstall the Kaseya Agents. This way, we make sure that every time a new student logs into an instructional lab computer, if needed, a Kaseya agent is installed. 35. Open the Agent module. Go to LAN Discovery > View AD Users. 36. On the new page, under Logon Name, Student should be visible. If the usernames are not shown, select fiu-<username> from the Machine Group dropdown. 37. Click on the check-box next to Student, then under Select an Agent Package to install choose the package Package4SCIS-<USERNAME>. 38. Click on Install Agent Policy to install the agent.

12 12 Chapter 2 Agents Hands-On Exercises Fig Installing Agents 39. Use an RDP client to remotely login to ws1 using Student as login and <PASSWORD> as password. During the login process, you should see a window popping up showing the progress bar for the Kaseya agent installation. 40. Once completely logged in and the installation window disappeared, check to see the Kaseya icon in the system tray bar and also see if the newly installed agent on ws1 checks into the Kaseya server by checking the Machine Status > Agent Status page in VSA. Note: This setting is best for computers that are part of an active directory, have multiple users and some of the users may uninstall the agent. Also, it is very useful if you want to install agent on all computers that some specific users may log into. To remove this option, choose the user in View AD Users and click on Cancel. -Use View AD Computers and deploy an agent on guest1 (a machine that was discovered via LAN Watch) using the new Package4GL-<USERNAME>. We use this agent deployment strategy for the guest computers in GL, as they are joined to the active directory but the image on these computers are refreshed every night, which does not contain the Kaseya agent. 41. Open the Agent module. Go to LAN Discovery > View AD Computers. On the new page, under DNS Host Name, guest1 should be visible. 42. Click on the check-box next to guest1, then under Select an Agent Package to install choose the package Package4GL-<USERNAME>. 43. Click on Install Agent Policy to install the agent. Fig View AD Computers

13 WWSD? WHAT WOULD SADJADI DO? WWSD? Chapter 2 Agents Hands-On Exercises guest1 must be restarted in order for Active Directory to install the agent packages. Using RDP, log into dc and go to Start > Run. Then type in shutdown i and press OK. Using the GUI, restart guest1 remotely. 45. Check the Machine Status > Agent Status page to see if the newly installed agent on guest1 checks into the Kaseya server. Note: To see the agent icon in the system tray while in a remote session, you need to fix the registry key and restart the remote computer as indicated in the notes for deploying an agent to dc. `Note: This setting is best for those who want to deploy agents every time the specified computer restarts regardless of who logs into the computer. To remove this option, choose the computer in View AD Computers and click on Cancel. Install the custom Kaseya agent, Package4CEC-<USERNAME>, on pc1 machine manually. 46. Remotely login to pc1 through RDP (use mstsc.exe /admin /v:<nat_router_ip>:<pc1_rdp_ PORT> ), open a browser (IE is preferred), point it to the <KASEYA_SERVER>, and use your <LOG- IN_CREDENTIALS> to log into Kaseya and go to Agents > Install Agents > Deploy Agents. Click on the link package4cec-<username>. Download and install the file. 47. Verify the agent is installed successfully by going to Machine Status > Agent Status. Look for the icon next to pc1.cec.fiu-<username>. The icon should not be grayed out. Fig Executing LAN Watch. Note: To see the agent icon in the system tray while in a remote session, you need to fix the registry key and restart the remote computer as indicated in the notes for deploying an agent to dc. Note: In a real environment, instead of your <LOGIN_CREDENTIAL>, you should use the username and password that has administrator privileges on pc1. For the sake of simplicity, in your dedicate virtual environment, we have used your <LOGIN_CREDENTIALS> to create a user with administrator privileges on all the virtual machine. WWSD: Manual installation of agents can be easier if you click on the checkbox, labeled List on dl.asp next to the package you want to deploy, in the Agent > Deploy Agents page. This will allow you to see the selected packages in this URL: dl.asp. You can then install the agent without logging into Kaseya VSA. Since the configuration within CEC is not well-documented, you feel that it is wise to do a LAN Watch just to make sure you account for all the computers within CEC just in case you missed a computer. Also, as there may be new computers deployed or laptops that may only show up on the network every now and then, you may want to schedule the LAN Watch daily. Schedule a LAN watch on pc1 to discover all the computers on the /24 network.

14 14 Chapter 2 Agents Hands-On Exercises 48. Open the Agent module. Go to LAN Discovery > LAN Watch. 49. Click on the check-box next to pc1.cec.fiu-<username>. 50. Next, in the Scan Range fields, put in the IP range of your scan ( ). 51. Click on Schedule and a new window will open up. Fig Executing LAN Watch (cont) Fig Executing LAN Watch (cont) 52. Schedule the LAN Watch to run daily at this time. 53. Set the distribution to 0 minute to make sure that LAN Watch will start immediately. 54. Finally click on Submit. Note: Like the previous LAN Watch, it will take some time before this process is done. Please wait patiently before continuing or perform other tasks that are not dependent to this procedure. You have found a laptop that is inside CEC named laptop1. This computer is not on Active Directory, so you must install an agent via Install Agents so you can maintain it. Use LAN Watch to deploy an agent on laptop1 using the Package4CEC-<USERNAME> Package.

15 Chapter 2 Agents Hands-On Exercises Open the Agent module. Go to LAN Discovery > Install Agents. 56. Click on the pc1 and a new window will open up. Fig Install Agents 57. On the new page, under Host Name, laptop1 should be visible. 58. Click on the check-boxes next to laptop1, then under Select a Windows Agent Package to install choose the package Package4CEC-<USERNAME>. 59. Use your <LOGIN_CREDENTIALS> to enter the Username and Password. Note: For the Admin Login textbox, include the name of the target machine too. For example, for this exercise, enter laptop1\johndoe Fig Install Agents (cont) 60. Click on Install. Note: To see the agent icon in the system tray while in a remote session, you need to fix the registry key and restart the remote computer as indicated in the notes for deploying an agent to dc. Note: The page should automatically refresh and give you a notification when the agent is installed correctly. If you see an error, please go back and redo the last two steps.

16 16 Chapter 2 Agents Hands-On Exercises Part 4 Now that all machines are discovered and agents are deployed on them, you now want to be able to better manage the agent by developing some views that allow you to filter them based on their role, their operating system, the software installed on them, etc. In this exercise, two views, namely, servers and workstations will be created. Define a view named Windows 2003 Server-<USERNAME> that once selected will only show machines with Windows Server 2003 operating system on them. Then define another view named XP-<USERNAME> that will only show machines with the Windows XP operating system on them. After you perform the following steps, make sure to check the correctness of this newly created views by trying them. 61. Open the Agent module and click on Agent Status. Go to the Views dropdown list, and make sure <No View> is selected. 62. Click on Edit. A new window should open up. Fig Check Agent Status 63. Click on the checkbox next to OS Type and under the same name choose Windows Server 2003 as the operating system being filtered. Fig Views 64. Next, click on Save as and enter Windows 2003 Server-<USERNAME>. 65. Click Ok. The view should now be created. 66. Repeat these steps and create the XP-<USERNAME> view. 67. To test the correctness of the views, go to Agent Status and under the View dropdown list, select Windows 2003 Server-<USERNAME>, or XP-<USERNAME>. 68. To see all computers, under the same dropdown list, click on <No View>.

17 Chapter 2 Agents Hands-On Exercises 17 Fig View using Windows 2003 Server - johndoe Fig View using xp - johndoe Part 5 In the process of exploring Kaseya s VSA, you realized the agent s right click menu can be configured. You decide to remove the agent icon from the server machines since its unnecessary; however, you decide that some of the settings will be useful for all XP machines and their associated users. You don t want users to exit out of the agent program and you want an option inside of the menu to go to your company s website. Also you realize that it will be wise to disable the Disable Remote Control option and Set Account only on certain workstations (namely, ws1, guest1, and pc1). Disable the Agent Icon for dc. 69. Open the Agent module. Go to Configure Agents > Agent Menu. 70. Put a check next to the server(s). 71. Make sure Enable Agent Icon is unchecked. 72. Click on Update. Refresh the page until the red text turn into black, which indicates that the changes have taken effect on the agent.

18 WWSD? WHAT WOULD SADJADI DO? WWSD? 18 Chapter 2 Agents Hands-On Exercises Fig Configuring the Agent Menu 73. To verify the outcome of the changes to the agent menu, you need to RDP to dc and check whether the agent icon is still visible in the system tray. Fig Editing Agent Menu options for the XP Machines. Disable Exit and edit the Your Company URL text box for all the XP machines. 74. Open the Agent module. Go to Configure Agents > Agent Menu. 75. Put a checkbox next to all the XP computers. 76. Uncheck the box next to Exit. 77. Go to the Your Company URL text box and change it to FIU Web Portal or the name of your company. 78. In the box right next to it, type in or the URL of your company. 79. Click on Update. Refresh the page until the red text turn into black, which indicates that the changes have taken effect on the agents. 80. Use RDP and <LOGIN_CREDENTIALS> to remotely login to ws1, guest1, pc1, and laptop1 and check whether the exit option is still available in the agent menu by right clicking the agent icon in the system tray. WWSD: Using views can allow you to quickly filter and then use Select All check box, accelerating your interactions with Kaseya VSA when you would like to perform similar tasks on all machines with the same characteristics (e.g., role, operating system, and installed software). Thus, spending some time to develop some useful views can save you time in the long run.

19 Chapter 2 Agents Hands-On Exercises 19 Remove the Disable Remote Control and Set Account options for the agents on ws1, guest1 and pc Open the Agent module. Go to Configure Agents > Agent Menu. 82. Put a checkbox next to ws1, guest1, and pc1 workstations. 83. Make sure the checkboxes next to Disable Remote Control and Set Account is unchecked. 84. Click on Update. Refresh the page until the red text turn into black, which indicates that the changes have taken effect on the agents. 85. Use RDP and <LOGIN_CREDENTIALS> to remotely login to ws1, guest1, pc1, and laptop1 and check whether the Set Account option is still available in the agent menu by right clicking the agent icon in the system tray. Part 6 Management is tired of people playing solitaire on the computers. They want to find a way to block it, through Kaseya, so that it cannot be executed on any managed machine. Use the Application Blocker to block solitaire. 86. Click on the Agent module, then go to Protection > Application Blocker. 87. Select the checkboxes next to dc, ws1, guest1, and pc Type in sol.exe in the textbox next to Add application to block. 89. Click on the Block button. Fig Application Blocker Note: The file name for solitaire is sol.exe.

20 20 Chapter 2 Agents Hands-On Exercises Part 7 The management has now asked you to print out a report of your work. They need to see immediate progress and you only have a matter of hours to prepare the report. Going around to each computer will take too long, so you look to Kaseya to fulfill your reporting needs. Generate a report through the Info Center module showing the successful check-in and install of agents using Agent Logs report. 90. Open the Info Center module. Go to Reporting > Reports. Fig Reports 91. Click on your Private folder, myreports <USERNAME>, choose New Report and a new window will open up. 92. Under Template Category choose Logs. 93. Under Report Template choose Agent Logs. 94. Click Next. Fig Reports (cont)

21 Chapter 2 Agents Hands-On Exercises Leave all the default options and choose Save. Fig Reports (cont) 96. Select the newly created report under your folder then choose Run Report Now. Fig Reports (cont) 97. Choose FIU-<USERNAME> next to Organization in the new window. 98. Click on Submit. 99. Once the scheduled report is done, the report is open automatically.

22 22 Chapter 2 Agents Hands-On Exercises Fig. 2.86

23 Chapter 2 Agents Hands-On Exercises 23

Ticketing Hands-on Exercise

Ticketing Hands-on Exercise Ticketing Hands-on Exercise 2 Chapter 8 Ticketing Hands-On Exercises Background Story You have been hired as the lead IT Administrator at the Florida International University (FIU) to manage the computers

More information

Patch Management Hands-On Exercises. Patch Management Hands-on Exercise

Patch Management Hands-On Exercises. Patch Management Hands-on Exercise Patch Management Hands-On Exercises Patch Management Hands-on Exercise 192 Chapter 5 Patch Management Hands-On Exercises Background Story You have been hired as the lead IT Administrator at the Florida

More information

Backup Hands-On Exercises. Backup Hands-on Exercise

Backup Hands-On Exercises. Backup Hands-on Exercise Backup Hands-on Exercise 2 Chapter 10 Backup Hands-On Exercises Background Story You have been hired as the lead IT Administrator at the Florida International University (FIU) to manage the computers at

More information

Kaseya 2. Installation guide. Version 7.0. English

Kaseya 2. Installation guide. Version 7.0. English Kaseya 2 Kaseya Server Setup Installation guide Version 7.0 English September 4, 2014 Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept

More information

Installation Notes for Outpost Network Security (ONS) version 3.2

Installation Notes for Outpost Network Security (ONS) version 3.2 Outpost Network Security Installation Notes version 3.2 Page 1 Installation Notes for Outpost Network Security (ONS) version 3.2 Contents Installation Notes for Outpost Network Security (ONS) version 3.2...

More information

Kaseya 2. User Guide. Version R8. English

Kaseya 2. User Guide. Version R8. English Kaseya 2 Discovery User Guide Version R8 English September 19, 2014 Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept EULATOS as

More information

Kaseya 2. User Guide. Version 1.1

Kaseya 2. User Guide. Version 1.1 Kaseya 2 Directory Services User Guide Version 1.1 September 10, 2011 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private Sector IT organizations.

More information

User Guide. Version 3.2. Copyright 2002-2009 Snow Software AB. All rights reserved.

User Guide. Version 3.2. Copyright 2002-2009 Snow Software AB. All rights reserved. Version 3.2 User Guide Copyright 2002-2009 Snow Software AB. All rights reserved. This manual and computer program is protected by copyright law and international treaties. Unauthorized reproduction or

More information

Setting up VMware ESXi for 2X VirtualDesktopServer Manual

Setting up VMware ESXi for 2X VirtualDesktopServer Manual Setting up VMware ESXi for 2X VirtualDesktopServer Manual URL: www.2x.com E-mail: info@2x.com Information in this document is subject to change without notice. Companies, names, and data used in examples

More information

User Guide. Version R91. English

User Guide. Version R91. English AuthAnvil User Guide Version R91 English August 25, 2015 Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept EULATOS as updated from

More information

Dial-up Installation for CWOPA Users (Windows Operating System)

Dial-up Installation for CWOPA Users (Windows Operating System) Dial-up Installation for CWOPA Users (Windows Operating System) 1 Table of Contents Download and Install Digital Certificates... 3 Internet Explorer 8/9 Certificate Installation.3 Windows XP Instructions

More information

Kaseya 2. User Guide. Version 1.0

Kaseya 2. User Guide. Version 1.0 Kaseya 2 Policy Management User Guide Version 1.0 June 6, 2012 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private Sector IT organizations.

More information

Password Manager Windows Desktop Client

Password Manager Windows Desktop Client Password Manager Windows Desktop Client EmpowerID provides an extension that allows organizations to plug into Password Manager to customize the Windows logon experience beyond that supplied by the standard

More information

Kaseya Fundamentals Workshop DAY ONE

Kaseya Fundamentals Workshop DAY ONE Kaseya Fundamentals Workshop DAY ONE Developed by Kaseya University Powered by IT Scholars Kaseya Version 6.5 Last updated March, 2014 Day One Overview Kaseya System Architecture Workshop LAB environment

More information

SNMP Manager User s Manual

SNMP Manager User s Manual SNMP Manager User s Manual Table of Contents 1. Introduction...2 2. SNMP Manager Install, Quick Start and Uninstall...2 2.1. Software Installation...2 2.2. Software Quick Start...2 2.3. Software Uninstall...2

More information

User Guide. Kaseya 2008

User Guide. Kaseya 2008 Agent Configuration and Deployment User Guide Kaseya 2008 March 25, 2008 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private Sector IT organizations.

More information

Patch Management Table of Contents:

Patch Management Table of Contents: Table of Contents: Manage Machines Manage Updates Patch Policy Configure Patch Parameters 153 Chapter 5 - Sadjadi et al. Introduction As new operating system and software updates are released in an ever

More information

D-Link Central WiFiManager Configuration Guide

D-Link Central WiFiManager Configuration Guide Table of Contents D-Link Central WiFiManager Configuration Guide Introduction... 3 System Requirements... 3 Access Point Requirement... 3 Latest CWM Modules... 3 Scenario 1 - Basic Setup... 4 1.1. Install

More information

Symantec PGP Whole Disk Encryption Hands-On Lab V 3.7

Symantec PGP Whole Disk Encryption Hands-On Lab V 3.7 Symantec PGP Whole Disk Encryption Hands-On Lab V 3.7 Description This hands-on lab session covers the hard drive encryption technologies from PGP. Students will administer a typical Whole Disk Encryption

More information

NetWrix USB Blocker. Version 3.6 Administrator Guide

NetWrix USB Blocker. Version 3.6 Administrator Guide NetWrix USB Blocker Version 3.6 Administrator Guide Table of Contents 1. Introduction...3 1.1. What is NetWrix USB Blocker?...3 1.2. Product Architecture...3 2. Licensing...4 3. Operation Guide...5 3.1.

More information

Snow Active Directory Discovery

Snow Active Directory Discovery Product Snow Active Directory Discovery Version 1.0 Release date 2014-04-29 Document date 2014-04-29 Snow Active Directory Discovery Installation & Configuration Guide Page 2 of 9 This document describes

More information

Remote Desktop Web Access. Using Remote Desktop Web Access

Remote Desktop Web Access. Using Remote Desktop Web Access Remote Desktop Web Access What is RD Web Access? RD Web Access is a Computer Science service that allows you to access department software and machines from your Windows or OS X computer, both on and off

More information

ACTIVE DIRECTORY DEPLOYMENT

ACTIVE DIRECTORY DEPLOYMENT ACTIVE DIRECTORY DEPLOYMENT CASAS Technical Support 800.255.1036 2009 Comprehensive Adult Student Assessment Systems. All rights reserved. Version 031809 CONTENTS 1. INTRODUCTION... 1 1.1 LAN PREREQUISITES...

More information

IIS, FTP Server and Windows

IIS, FTP Server and Windows IIS, FTP Server and Windows The Objective: To setup, configure and test FTP server. Requirement: Any version of the Windows 2000 Server. FTP Windows s component. Internet Information Services, IIS. Steps:

More information

Quick Scan Features Setup Guide. Scan to E-mail Setup. See also: System Administration Guide: Contains details about E-mail setup.

Quick Scan Features Setup Guide. Scan to E-mail Setup. See also: System Administration Guide: Contains details about E-mail setup. Quick Scan Features Setup Guide XE3024EN0-2 This guide includes instructions for: Scan to E-mail Setup on page 1 Scan to Mailbox Setup on page 6 Network Scanning Setup on page 9 Scan to PC Setup on page

More information

Training module 2 Installing VMware View

Training module 2 Installing VMware View Training module 2 Installing VMware View In this second module we ll install VMware View for an End User Computing environment. We ll install all necessary parts such as VMware View Connection Server and

More information

ILTA HANDS ON Securing Windows 7

ILTA HANDS ON Securing Windows 7 Securing Windows 7 8/23/2011 Table of Contents About this lab... 3 About the Laboratory Environment... 4 Lab 1: Restricting Users... 5 Exercise 1. Verify the default rights of users... 5 Exercise 2. Adding

More information

Remote Terminal Service (RTS) User Guide (Version 2.1)

Remote Terminal Service (RTS) User Guide (Version 2.1) Remote Terminal Service (RTS) User Guide (Version 2.1) Page 1 Table of Content Content Page 1 Introduction 3 2 Prerequisite 3 3 Logon Corporate Network via Internet 4 4 Download and Install RTS Client

More information

Global Image Management System For epad-vision. User Manual Version 1.10

Global Image Management System For epad-vision. User Manual Version 1.10 Global Image Management System For epad-vision User Manual Version 1.10 May 27, 2015 Global Image Management System www.epadlink.com 1 Contents 1. Introduction 3 2. Initial Setup Requirements 3 3. GIMS-Server

More information

Kaseya 2. Quick Start Guide. for Network Monitor 4.1

Kaseya 2. Quick Start Guide. for Network Monitor 4.1 Kaseya 2 VMware Performance Monitor Quick Start Guide for Network Monitor 4.1 June 7, 2012 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private

More information

Enterprise Remote Control 5.6 Manual

Enterprise Remote Control 5.6 Manual Enterprise Remote Control 5.6 Manual Solutions for Network Administrators Copyright 2015, IntelliAdmin, LLC Revision 3/26/2015 http://www.intelliadmin.com Page 1 Table of Contents What is Enterprise Remote

More information

Remote Desktop access via Faculty Terminal Server Using Internet Explorer (versions 5.x-7.x)

Remote Desktop access via Faculty Terminal Server Using Internet Explorer (versions 5.x-7.x) Remote Desktop access via Faculty Terminal Server Using Internet Explorer (versions 5.x-7.x) Start your Internet Explorer browser and direct it to the faculty home page. Click on the link Remote Access,

More information

WorldExtend IronDoor 3.5 Publishing a Terminal Services Application

WorldExtend IronDoor 3.5 Publishing a Terminal Services Application WorldExtend IronDoor 3.5 Publishing a Terminal Services Application WorldExtend, LLC. Published: September 2008 Abstract This guide will walk you through the steps required to publish a terminal services

More information

How to deploy SurveilStar PC/Internet Monitoring Software

How to deploy SurveilStar PC/Internet Monitoring Software How to deploy SurveilStar PC/Internet Monitoring Software 1/16 How to deploy SurveilStar PC/Internet Monitoring Software (Latest updated: April. 9, 2015) www.surveilstar.com This document provides detailed

More information

XStream Remote Control: Configuring DCOM Connectivity

XStream Remote Control: Configuring DCOM Connectivity XStream Remote Control: Configuring DCOM Connectivity APPLICATION BRIEF March 2009 Summary The application running the graphical user interface of LeCroy Windows-based oscilloscopes is a COM Automation

More information

Comodo LoginPro Software Version 1.5

Comodo LoginPro Software Version 1.5 Comodo LoginPro Software Version 1.5 User Guide Guide Version 1.5.030513 Comodo Security Solutions 1255 Broad Street STE 100 Clifton, NJ 07013 Table of Contents 1.Introduction to Comodo LoginPro... 3 1.1.System

More information

How to Use Remote Access Using Internet Explorer

How to Use Remote Access Using Internet Explorer Introduction Welcome to the Mount s Remote Access service. The following documentation is intended to assist first time or active users with connecting, authenticating and properly logging out of Remote

More information

Advanced Event Viewer Manual

Advanced Event Viewer Manual Advanced Event Viewer Manual Document version: 2.2944.01 Download Advanced Event Viewer at: http://www.advancedeventviewer.com Page 1 Introduction Advanced Event Viewer is an award winning application

More information

Windows Server 2008 R2 Initial Configuration Tasks

Windows Server 2008 R2 Initial Configuration Tasks Windows Server 2008 R2 Initial Configuration Tasks I am not responsible for your actions or their outcomes, in any way, while reading and/or implementing this tutorial. I will not provide support for the

More information

Using Remote Desktop to access your Office Computer or Faculty Remote Desktop Server August, 2005 This document consists of two main parts and an

Using Remote Desktop to access your Office Computer or Faculty Remote Desktop Server August, 2005 This document consists of two main parts and an Using Remote Desktop to access your Office Computer or Faculty Remote Desktop Server August, 2005 This document consists of two main parts and an addendum. The first part will be the steps required to

More information

From a Finder window choose Applications (shown circled in red) and then double click the Tether icon (shown circled in green).

From a Finder window choose Applications (shown circled in red) and then double click the Tether icon (shown circled in green). From a Finder window choose Applications (shown circled in red) and then double click the Tether icon (shown circled in green). You will be presented with a dialog box asking for you to enter an ad-hoc

More information

2XApplication Server XG v10.6

2XApplication Server XG v10.6 2XApplication Server XG v10.6 Introduction 1 URL: www.2x.com E-mail: info@2x.com Information in this document is subject to change without notice. Companies, names, and data used in examples herein are

More information

SHAREPOINT 2013 IN INFRASTRUCTURE AS A SERVICE

SHAREPOINT 2013 IN INFRASTRUCTURE AS A SERVICE SHAREPOINT 2013 IN INFRASTRUCTURE AS A SERVICE Contents Introduction... 3 Step 1 Create Azure Components... 5 Step 1.1 Virtual Network... 5 Step 1.1.1 Virtual Network Details... 6 Step 1.1.2 DNS Servers

More information

Intelligent Power Protector User manual extension for Microsoft Virtual architectures: Hyper-V 6.0 Manager Hyper-V Server (R1&R2)

Intelligent Power Protector User manual extension for Microsoft Virtual architectures: Hyper-V 6.0 Manager Hyper-V Server (R1&R2) Intelligent Power Protector User manual extension for Microsoft Virtual architectures: Hyper-V 6.0 Manager Hyper-V Server (R1&R2) Hyper-V Manager Hyper-V Server R1, R2 Intelligent Power Protector Main

More information

Deploying System Center 2012 R2 Configuration Manager

Deploying System Center 2012 R2 Configuration Manager Deploying System Center 2012 R2 Configuration Manager This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED, OR STATUTORY, AS TO THE INFORMATION IN THIS DOCUMENT.

More information

User Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream

User Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream User Manual Onsight Management Suite Version 5.1 Another Innovation by Librestream Doc #: 400075-06 May 2012 Information in this document is subject to change without notice. Reproduction in any manner

More information

HDA Integration Guide. Help Desk Authority 9.0

HDA Integration Guide. Help Desk Authority 9.0 HDA Integration Guide Help Desk Authority 9.0 2011ScriptLogic Corporation ALL RIGHTS RESERVED. ScriptLogic, the ScriptLogic logo and Point,Click,Done! are trademarks and registered trademarks of ScriptLogic

More information

SSL VPN Setup for Windows

SSL VPN Setup for Windows SSL VPN Setup for Windows SSL VPN allows you to connect from off campus to access campus resources such as Outlook email client, file sharing and remote desktop. These instructions will guide you through

More information

SevOne NMS Download Installation and Implementation Guide

SevOne NMS Download Installation and Implementation Guide SevOne NMS Download Installation and Implementation Guide 5.3.X 530 V0002 Contents 1. Get Started... 3 2. SevOne Download Installation... 6 3. Appliance Network Configuration... 9 4. Install License and

More information

SecuraLive ULTIMATE SECURITY

SecuraLive ULTIMATE SECURITY SecuraLive ULTIMATE SECURITY Home Edition for Windows USER GUIDE SecuraLive ULTIMATE SECURITY USER MANUAL Introduction: Welcome to SecuraLive Ultimate Security Home Edition. SecuraLive Ultimate Security

More information

Setting up Hyper-V for 2X VirtualDesktopServer Manual

Setting up Hyper-V for 2X VirtualDesktopServer Manual Setting up Hyper-V for 2X VirtualDesktopServer Manual URL: www.2x.com E-mail: info@2x.com Information in this document is subject to change without notice. Companies, names, and data used in examples herein

More information

Welcome to the QuickStart Guide

Welcome to the QuickStart Guide QuickStart Guide Welcome to the QuickStart Guide This QuickStart Guide provides the information you need to install and start using Express Software Manager. For more comprehensive help on using Express

More information

Dell UPS Local Node Manager USER'S GUIDE EXTENSION FOR MICROSOFT VIRTUAL ARCHITECTURES Dellups.com

Dell UPS Local Node Manager USER'S GUIDE EXTENSION FOR MICROSOFT VIRTUAL ARCHITECTURES Dellups.com CHAPTER: Introduction Microsoft virtual architecture: Hyper-V 6.0 Manager Hyper-V Server (R1 & R2) Hyper-V Manager Hyper-V Server R1, Dell UPS Local Node Manager R2 Main Operating System: 2008Enterprise

More information

How To Use Senior Systems Cloud Services

How To Use Senior Systems Cloud Services Senior Systems Cloud Services In this guide... Senior Systems Cloud Services 1 Cloud Services User Guide 2 Working In Your Cloud Environment 3 Cloud Profile Management Tool 6 How To Save Files 8 How To

More information

CONNECT-TO-CHOP USER GUIDE

CONNECT-TO-CHOP USER GUIDE CONNECT-TO-CHOP USER GUIDE VERSION V8 Table of Contents 1 Overview... 3 2 Requirements... 3 2.1 Security... 3 2.2 Computer... 3 2.3 Application... 3 2.3.1 Web Browser... 3 2.3.2 Prerequisites... 3 3 Logon...

More information

Setting up Citrix XenServer for 2X VirtualDesktopServer Manual

Setting up Citrix XenServer for 2X VirtualDesktopServer Manual Setting up Citrix XenServer for 2X VirtualDesktopServer Manual URL: www.2x.com E-mail: info@2x.com Information in this document is subject to change without notice. Companies, names, and data used in examples

More information

Florida Atlantic University VPN Client Installation Guide

Florida Atlantic University VPN Client Installation Guide Florida Atlantic University VPN Client Installation Guide VPN Client Installation Guide Page 1 Cisco VPN Client Installation Guide Please read the instructions below to assist with the process of downloading,

More information

Introduction. Before you begin. Installing efax from our CD-ROM. Installing efax after downloading from the internet

Introduction. Before you begin. Installing efax from our CD-ROM. Installing efax after downloading from the internet Introduction Before you begin Before you begin installing efax, please check the following: You have received confirmation that your application for the efax service has been processed. The confirmation

More information

2XApplication Server XG v10.1

2XApplication Server XG v10.1 2XApplication Server XG v10.1 Introduction 1 URL: www.2x.com E-mail: info@2x.com Information in this document is subject to change without notice. Companies, names, and data used in examples herein are

More information

Thin Client Manager. Table of Contents. 1-10ZiG Manager. 2 - Thin Client Management. 3 - Remote client configurations. 1 of 16

Thin Client Manager. Table of Contents. 1-10ZiG Manager. 2 - Thin Client Management. 3 - Remote client configurations. 1 of 16 1 of 16 Thin Client Manager Table of Contents 1-10ZiG Manager 1.1 - Configuring and Managing the Server 1.1.1 - Server Settings 1.1.2 - Starting and Stopping the Server 1.2 - Configuring and Starting the

More information

Setting up Hyper-V for 2X VirtualDesktopServer Manual

Setting up Hyper-V for 2X VirtualDesktopServer Manual Setting up Hyper-V for 2X VirtualDesktopServer Manual URL: www.2x.com E-mail: info@2x.com Information in this document is subject to change without notice. Companies, names, and data used in examples

More information

HELP DOCUMENTATION E-SSOM DEPLOYMENT GUIDE

HELP DOCUMENTATION E-SSOM DEPLOYMENT GUIDE HELP DOCUMENTATION E-SSOM DEPLOYMENT GUIDE Copyright 1998-2013 Tools4ever B.V. All rights reserved. No part of the contents of this user guide may be reproduced or transmitted in any form or by any means

More information

SharePoint AD Information Sync Installation Instruction

SharePoint AD Information Sync Installation Instruction SharePoint AD Information Sync Installation Instruction System Requirements Microsoft Windows SharePoint Services V3 or Microsoft Office SharePoint Server 2007. License management Click the trial link

More information

Version 3.8. Installation Guide

Version 3.8. Installation Guide Version 3.8 Installation Guide Copyright 2007 Jetro Platforms, Ltd. All rights reserved. This document is being furnished by Jetro Platforms for information purposes only to licensed users of the Jetro

More information

User Guide. version 1.2

User Guide. version 1.2 Network Discovery User Guide version 1.2 February 15, 2012 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private Sector IT organizations. Kaseya's

More information

Kaseya 2. User Guide. for VSA 6.3

Kaseya 2. User Guide. for VSA 6.3 Kaseya 2 Remote Control User Guide for VSA 6.3 May 10, 2012 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private Sector IT organizations.

More information

User Guide. version 1.0

User Guide. version 1.0 User Guide version 1.0 December 16, 2010 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private Sector IT organizations. Kaseya's IT Automation

More information

Thinspace deskcloud. Quick Start Guide

Thinspace deskcloud. Quick Start Guide Thinspace deskcloud Quick Start Guide Version 1.2 Published: SEP-2014 Updated: 16-SEP-2014 2014 Thinspace Technology Ltd. All rights reserved. The information contained in this document represents the

More information

Trend Micro KASEYA INTEGRATION GUIDE

Trend Micro KASEYA INTEGRATION GUIDE Trend Micro KASEYA INTEGRATION GUIDE INTRODUCTION Trend Micro Worry-Free Business Security Services is a server-free security solution that provides protection anytime and anywhere for your business data.

More information

Creating Home Directories for Windows and Macintosh Computers

Creating Home Directories for Windows and Macintosh Computers ExtremeZ-IP Active Directory Integrated Home Directories Configuration! 1 Active Directory Integrated Home Directories Overview This document explains how to configure home directories in Active Directory

More information

Trend ScanMail. for Microsoft Exchange. Quick Start Guide

Trend ScanMail. for Microsoft Exchange. Quick Start Guide Trend ScanMail for Microsoft Exchange Quick Start Guide Trend ScanMail for Microsoft Exchange ScanMail for Exchange This Quick Start Guide provides a step-by-step guide to installing ScanMail for Exchange,

More information

Citrix Remote Access Portal U s e r M a n u a l

Citrix Remote Access Portal U s e r M a n u a l Citrix Remote Access Portal U s e r M a n u a l 1 P a g e Table of Contents Table of Contents... 2 Introduction... 3 1. What is Citrix and how does it work?... 4 2. PC Setup/Internet Explorer - Connecting

More information

Active Directory Management. Agent Deployment Guide

Active Directory Management. Agent Deployment Guide Active Directory Management Agent Deployment Guide Document Revision Date: April 26, 2013 Active Directory Management Deployment Guide i Contents System Requirements... 1 Hardware Requirements... 2 Agent

More information

Installation Guide Command WorkStation 5.5 with Fiery Extended Applications 4.1

Installation Guide Command WorkStation 5.5 with Fiery Extended Applications 4.1 Installation Guide Command WorkStation 5.5 with Fiery Extended Applications 4.1 About Fiery Extended Applications Fiery Extended Applications (FEA) 4.1 is a package of the following applications for use

More information

Pearl Echo Installation Checklist

Pearl Echo Installation Checklist Pearl Echo Installation Checklist Use this checklist to enter critical installation and setup information that will be required to install Pearl Echo in your network. For detailed deployment instructions

More information

How to Remotely View Security Cameras Using the Internet

How to Remotely View Security Cameras Using the Internet How to Remotely View Security Cameras Using the Internet Introduction: The ability to remotely view security cameras is one of the most useful features of your EZWatch Pro system. It provides the ability

More information

WebSpy Vantage Ultimate 2.2 Web Module Administrators Guide

WebSpy Vantage Ultimate 2.2 Web Module Administrators Guide WebSpy Vantage Ultimate 2.2 Web Module Administrators Guide This document is intended to help you get started using WebSpy Vantage Ultimate and the Web Module. For more detailed information, please see

More information

Install and Configure RelayFax

Install and Configure RelayFax RelayFax Network Fax Manager How To Quick Start Guide Install and Configure RelayFax Welcome to RelayFax Network Fax Manager. This guide is designed to help you quickly install and start using your RelayFax.

More information

Active Directory Self-Service FAQ

Active Directory Self-Service FAQ Active Directory Self-Service FAQ General Information: info@cionsystems.com Online Support: support@cionsystems.com CionSystems Inc. Mailing Address: 16625 Redmond Way, Ste M106 Redmond, WA. 98052 http://www.cionsystems.com

More information

LifeCyclePlus Version 1

LifeCyclePlus Version 1 LifeCyclePlus Version 1 Last updated: 2014-04-25 Information in this document is subject to change without notice. Companies, names and data used in examples herein are fictitious unless otherwise noted.

More information

Contents. Supported Platforms. Event Viewer. User Identification Using the Domain Controller Security Log. SonicOS

Contents. Supported Platforms. Event Viewer. User Identification Using the Domain Controller Security Log. SonicOS SonicOS User Identification Using the Domain Controller Security Log Contents Supported Platforms... 1 Event Viewer... 1 Configuring Group Policy to Enable Logon Audit... 2 Events in Security Log... 4

More information

Server Installation, Administration and Integration Guide

Server Installation, Administration and Integration Guide Server Installation, Administration and Integration Guide Version 1.1 Last updated October 2015 2015 sitehelpdesk.com, all rights reserved TABLE OF CONTENTS 1 Introduction to WMI... 2 About Windows Management

More information

How to use SURA in three simple steps:

How to use SURA in three simple steps: How to use SURA in three simple steps: Most of SURA s functionality can be accessed through these three steps. 1) Download SURA to your computer Go to the SU Downloads page to obtain the SURA utility.

More information

Web-Access Security Solution

Web-Access Security Solution WavecrestCyBlock Client Version 2.1.13 Web-Access Security Solution UserGuide www.wavecrest.net Copyright Copyright 1996-2014, Wavecrest Computing, Inc. All rights reserved. Use of this product and this

More information

Quick Installation Guide

Quick Installation Guide V48.01 Model: FI8919W Quick Installation Guide Outdoor Pan/Tilt Wireless IP Camera For Windows OS ------- Page 1 For MAC OS ------- Page 15 ShenZhen Foscam Intelligent Technology Co., Ltd Quick Installation

More information

PineApp Surf-SeCure Quick

PineApp Surf-SeCure Quick PineApp Surf-SeCure Quick Installation Guide September 2010 WEB BASED INSTALLATION SURF-SECURE AS PROXY 1. Once logged in, set the appliance s clock: a. Click on the Edit link under Time-Zone section.

More information

Kaseya 2. User Guide. Version 6.1

Kaseya 2. User Guide. Version 6.1 Kaseya 2 Kaseya SQL Server Reporting Services (SSRS) Configuration User Guide Version 6.1 January 28, 2011 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and

More information

SETTING UP REMOTE ACCESS ON EYEMAX PC BASED DVR.

SETTING UP REMOTE ACCESS ON EYEMAX PC BASED DVR. SETTING UP REMOTE ACCESS ON EYEMAX PC BASED DVR. 1. Setting up your network to allow incoming connections on ports used by Eyemax system. Default ports used by Eyemax system are: range of ports 9091~9115

More information

WatchGuard Mobile User VPN Guide

WatchGuard Mobile User VPN Guide WatchGuard Mobile User VPN Guide Mobile User VPN establishes a secure connection between an unsecured remote host and a protected network over an unsecured network using Internet Protocol Security (IPSec).

More information

Kaseya 2. User Guide. Version 6.5 and 1.1

Kaseya 2. User Guide. Version 6.5 and 1.1 Kaseya 2 Policy Management User Guide Version 6.5 and 1.1 January 23, 2014 Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept EULA

More information

Allworx Installation Course

Allworx Installation Course VPN Hello and welcome. In the VPN section we will cover the steps for enabling the VPN feature on the Allworx server and how to set up a VPN connection to the Allworx System from your PC. Page 1 VPN The

More information

Magento Extension Point of Sales User Manual Version 1.0

Magento Extension Point of Sales User Manual Version 1.0 Magento Extension Point of Sales Version 1.0 1. Overview... 2 2. Integration... 2 3. General Settings... 3 3.1 Point of sales Settings... 3 3.2 Magento Client Computer Settings... 3 4. POS settings...

More information

System Administration Training Guide. S100 Installation and Site Management

System Administration Training Guide. S100 Installation and Site Management System Administration Training Guide S100 Installation and Site Management Table of contents System Requirements for Acumatica ERP 4.2... 5 Learning Objects:... 5 Web Browser... 5 Server Software... 5

More information

Automating client deployment

Automating client deployment Automating client deployment 1 Copyright Datacastle Corporation 2014. All rights reserved. Datacastle is a registered trademark of Datacastle Corporation. Microsoft Windows is either a registered trademark

More information

Quick Installation Guide

Quick Installation Guide V46.01 Model: FI8918W Quick Installation Guide Indoor Pan/Tilt Wireless IP Camera Black White For Windows OS ------- Page 1 For MAC OS ------- Page 11 ShenZhen Foscam Intelligent Technology Co., Ltd Quick

More information

Quick Instructions Installing on a VPS (Virtual Private Server)

Quick Instructions Installing on a VPS (Virtual Private Server) Introduction A Virtual Private Server is a virtual PC held in a remote data centre, which can be accessed via a username/password from any other computer. There are a number of scenarios where you might

More information

User Manual for Web. Help Desk Authority 9.0

User Manual for Web. Help Desk Authority 9.0 User Manual for Web Help Desk Authority 9.0 2011ScriptLogic Corporation ALL RIGHTS RESERVED. ScriptLogic, the ScriptLogic logo and Point,Click,Done! are trademarks and registered trademarks of ScriptLogic

More information

INTRODUCTION TO VIRTUAL DESKTOP BINGHAMTON UNIVERSITY

INTRODUCTION TO VIRTUAL DESKTOP BINGHAMTON UNIVERSITY INTRODUCTION TO VIRTUAL DESKTOP AT BINGHAMTON UNIVERSITY ACCESS MATLAB, PRO ENGINEER, SPSS, STATA, VIRTUALLY! Presently Virtual Desktop can be accessed via your personal computer, laptop or from home Available

More information

owncloud Configuration and Usage Guide

owncloud Configuration and Usage Guide owncloud Configuration and Usage Guide This guide will assist you with configuring and using YSUʼs Cloud Data storage solution (owncloud). The setup instructions will include how to navigate the web interface,

More information

Deployment of Keepit for Windows

Deployment of Keepit for Windows Deployment of Keepit for Windows Keepit A/S October 13, 2010 1 Introduction When deploying Keepit in larger setups with many desktops and servers, installing Keepit individually on each computer is cumbersome

More information