Quest Soft Token for Windows Desktop User Guide

Size: px
Start display at page:

Download "Quest Soft Token for Windows Desktop User Guide"

Transcription

1 Quest Soft Token for Windows Desktop User Guide This guide provides information on installing, activating and using the Quest Soft Token for Windows Desktop. What is the Quest Soft Token for Windows Desktop The Quest Soft Token for Windows Desktop is a two-factor authentication token that can be used with Quest Defender, to gain secure access to network, web, and applications-based resources. The Token can be programmed as a synchronous OATH compliant token or using Defender SNK, AES or 3DES encryption in both synchronous and asynchronous (challenge / response) modes. The picture above shows an example of the Quest Soft Token for Windows Desktop. The token response is used as the One Time Password (OTP) when prompted to authenticate. The Quest Soft Token for Windows Desktop is also referred to as the Defender Desktop Token.

2 Installing the Quest Soft Token for Windows Desktop software Your system administrator will provide you with the Quest Soft Token for Windows Desktop software. This file may be made available to you through a network share, a CD or optionally through the Defender Token Deployment System. To install the Quest Soft Token for Windows Desktop software using the installation file, perform the following steps: 1. Locate and run the Defender Desktop Token Installer.exe file. The Defender Desktop Token Installation Wizard starts: 2. Select Next. The Defender Desktop Token Installation Wizard (License Agreement) page is displayed. Check the box to accept the License agreement, then select Next. The Defender Desktop Token Installation Wizard (Install Location) page is displayed: 3. Select Finish to accept the default location. Alternatively, selcct Browse to choose a different location, then select Finish. The Installation Progress dialog box is displayed: 2

3 4. The Installation Complete dialog box is then displayed: 5. Select Finish. On completion of the installation a Defender Desktop Token program group is created. 3

4 Activating the Quest Soft Token for Windows Desktop In order to use Quest Soft Token for Windows Desktop for token authentication an activation code is required. This may be provided by your Defender administrator or, if available, through the Defender Token Deployment System. This section details the steps required for both types of activation. Using an Activation code provided by your administrator 1. From the Start menu, select Programs, Defender Desktop Token. The Token Activation Wizard (Welcome) dialog box is displayed: 2. Select Next. The Enter Activation Code dialog box is displayed: When the Defender Administrator generates a Defender Desktop Token for a user, a username.txt file is automatically created. This file can optionally contain the token details for a single user or token details for multiple users. For further information, refer to the Quest Soft Token for Windows Desktop Administration Guide. 3. Select Browse to select the required username.txt file. The activation key is automatically copied from the username.txt file and pasted into the Code field. Alternatively, you can copy the activation code and paste it into the Code field. 4

5 4. Select Next. The Token Activation Wizard - Select Storage Location dialog box is displayed: 5. To store the activated Quest Soft Token for Windows Desktop: in your application data folder, select the Your application data folder button in a different folder, select the Another Folder radio button, then select Browse to navigate to the required location on an attached device, such as an Aladdin USB token, select the Attached Device button, then select the required device from the list. 6. If you have more than one active Quest Soft Token for Windows Desktop and want this token to be selected for authentication by default, check the Make this token the default token checkbox. If you have more than one active Quest Soft Token for Windows Desktop and do not want to authenticate using the default token, you can specify an alternative token during logon. 7. Select Next. The Token Activation Wizard - Select Passphrase dialog box is displayed: Figure 8: Token Activation Wizard (Select Passphrase) dialog box 5

6 8. In the New Passphrase field, type the passphrase that you will enter to unlock the Desktop Token before authentication. 9. In the Confirm Passphrase field, type the passphrase again to confirm your choice. As you type your passphrase, the strength box indicates the strength of the passphrase by showing a red (weak) or green (strong) indicator. Quest recommends the use of a strong passphrase. A strong passphrase should contain a combination of uppercase and lowercase letters, numbers and punctuation marks, and be at least eight characters long. If you choose a weak passphrase, the following message is displayed: To use the passphrase you entered in the Token Activation Wizard - Select Passphrase dialog box, click Yes. To return to the Token Activation Wizard - Select Passphrase dialog box and enter a different passphrase, click No. Your Administrator can enforce the use of a strong password. 10. The Token Activation Wizard (Enter Token Name) dialog box is displayed: 11. In the Token Name field, type a name that will help you identify this token. If you choose not to give the token a name, the token serial number will be used as the token name. 12. Select Next. The Token Activation Wizard (Defender Desktop Token 6

7 Activation Complete) dialog box is displayed: On completion of the activation procedure, the token can be managed from the Start menu, Defender Desktop Token program group, shown below: If you specified a default token during the activation procedure, the Enter Passphrase dialog for the default token will be displayed when you select the Defender Desktop Token program group from the Start menu. To display the token management options, or select an alternative token for authentication, click Tokens. For authentication information, refer to Authenticating with a Defender Desktop Token. 7

8 Using the Defender Token Deployment System The Defender Token Deployment System is a web based application that allows for the Quest Soft Token for Windows Desktop to be requested directly through a local web site. The activation code can be received by or a self-activating version of the token software can be downloaded. The Token Deployment System is an optional Defender component. For full instructions on using the Defender Token Deployment System please refer to the Defender Token Deployment System User Guide. These instructions refer to the token activation process only. 1. After choosing the Windows Desktop token from the Token Deployment System website and completing the verification process the Install and Activate Token web page is displayed. 2. This page provides the following a link to download the token software from the activation code, which can be copied and pasted to the Quest Soft Token for Windows Desktop activation dialog. A link to download a self-activating installer. An option to send these details to your address. 8

9 Download Token Software The Quest Soft Token for Windows Desktop software can be downloaded from Using this link will download the Defender Desktop Token Installer.exe installer. ACTIVATION CODE The activation code for your token can be copied and pasted in to the Quest Soft Token for Windows Desktop activation dialog as below. Please see the Using an Activation code provided by your administrator for complete details on this process. SELF-ACTIVATING INSTALLER This option will download a self-activating installer to your local workstation. The exact procedure and messages displayed to download the file will depend on your browser version. Using the self-activating installer link will automatically launch the token activation wizard for you so it will be ready to use once the installation process is complete. OPTION A link is provided to send the web page information to an address. By default this will be the address configured on your AD user account. Optionally your system administrator may allow the address to be changed so that the information can be sent to a different address. Select Send to send the details, a confirmation will be displayed on the webpage that the e- mail has been sent. 9

10 Token Management Options The following token management options are available from the Defender Desktop Tokens console. MENU OPTION DESCRIPTION click to display a list of folders that will be searched to locate Defender Desktop Tokens. Edit Folders To remove a folder from the list, click the required folder, then click Remove. To add a new folder to the list, click Add then type the location of the folder to be included in the token search. Select and Close select the token and enter the passphrase when prompted. Close Select to close the dialog 10

11 Token Activate New Token Default Rename select Activate New Token to start the Desktop Token Activation Wizard. For further information, refer to Activating your Defender Desktop Token. select the required Defender Desktop Token then select Default to set the token as your default token. select the required Defender Desktop Token then select Rename to change the name of the token. select the required Defender Desktop Token, then select Delete to remove the token. Delete Note: If you use this option to delete a Defender Desktop Token, you must also ensure that the corresponding Defender Desktop Token definition is deleted in Active Directory. Contact your Defender administrator for assistance. select the required Defender Desktop Token, then select Move to move the token to a different location. Move Change passphrase Reset passphrase Properties Note: If you use this option to move a token to a different folder, the folder is automatically included in the list of folders for searching. select the required Defender Desktop Token, then select Change passphrase to change the current passphrase. select the required Defender Desktop Token, then select Reset passphrase to reset a locked passphrase. select the required Defender Desktop Token then select Properties to display the token information page. View Icons Details select to display tokens as icons. select to display tokens as details. Options Prompt for username to unlock token Centre Window at Startup select the required Defender Desktop Token, then select Options, Prompt for username to unlock token to display the username at the passphrase prompt. The passphrase is also required. select this option to ensure that the login dialog is always positioned centrally on the user s display. Help About Defender Desktop Token click Help, About to display version information for the Defender Desktop Token program. 11

12 Changing the Passphrase To change the passphrase for a Defender Desktop Token: 1. From the Start menu, select Programs, Defender Desktop Token, Defender Desktop Token. The Enter Passphrase page is displayed. 2. Select Tokens to display the console and ensure that the required token is selected. 3. On the menu bar, select Token, Change Passphrase. The Change Passphrase Wizard starts. 4. Select Next. You are prompted to enter your current passphrase for this token. Enter the passphrase. 5. Select Next. Enter your new passphrase for this token. 6. Confirm the new passphrase. 7. Select Next. The Change Passphrase Wizard confirms that the passphrase was changed successfully. If you forget your Passphrase If you forget your passphrase or your token is locked because you have exceeded the permitted number of incorrect passphrase attempts, the following message is displayed: Your passphrase is locked. You must reset your passphrase. To begin the unlock procedure, which requires a dialog with the Defender Administrator: 1. Select Start, Programs, Defender Desktop Token, Defender Desktop Token. 12

13 2. Select Tokens. The Defender Desktop Tokens dialog is displayed: Right-click the token that you want to reset, then select Reset Passphrase from the list or use the Reset Passphrase option from the Token menu. The Defender Desktop Token Wizard starts: 4. Select Next. 13

14 5. Tell your Administrator the number displayed in the Challenge field. Your Administrator will then reply with an unlock code. 6. Enter the unlock code into the Unlock Code field. 7. In the New Passphrase field, type your new passphrase. In the Confirm Passphrase field, type your new passphrase again to confirm. 9. Click Next. The Defender Desktop Token Passphrase Reset Complete dialog is displayed: 14

15 Authenticating with a Quest Soft Token for Windows Desktop This section describes how to authenticate to a Defender protected network using the Quest Soft Token for Windows Desktop (Defender Desktop Token). Synchronous Mode If you are authenticating to a network that uses a response only method: 1. Connect to your network using your usual communications software. When the connection is made, a Defender Security Server intercepts the call. 2. When prompted by the Defender Security Server, enter your user ID in your communications software. From the Start menu, select Programs, Defender Desktop Token, Defender Desktop Token. If you have more than one Defender Desktop Token installed and have specified one token as your default token, the Enter Passphrase dialog box is displayed: 3. In the Passphrase field, type your passphrase. 4. Select OK. The Defender Desktop Token Response dialog box is displayed: 5. Select Get Response. The token response is displayed in the Response field. To automatically copy the token response to the clipboard and leave the Defender Desktop Token Response window open, check the Automatically copy response to the clipboard checkbox. To automatically close the Defender Desktop Token Response window after the response has been copied to the clipboard, check the Automatically close this window checkbox. If you chose not to automatically copy the token response to the clipboard, select Copy to copy the response to the clipboard. Select Cancel to close the Defender Desktop Token Response window. 15

16 6. Paste the Defender Desktop Token response into your communications software. Place the cursor in the communication software window and press Control-V to paste the response into the communication software window. 7. Press Enter on your computer keyboard. 8. Defender verifies the response. If the response the Defender Security Server receives matches the one it expects, you are connected and granted access to the protected network. Asynchronous Mode If you are authenticating to a network that uses a challenge/response method: 1. Connect to your network using your usual communications software. When the connection is made, a Defender Security Server intercepts the call. 2. When prompted by the Defender Security Server, enter your user ID in your communications software.the Defender Security Server displays a challenge value in your communications software. 3. From the Start menu, select Programs, Defender Desktop Token, Defender Desktop Token. If you: have more than one Defender Desktop Token assigned to you, the Defender Desktop Tokens dialog box is displayed. Select the required token. Go to Step 4. specified a default token during the activation procedure, the Enter Passphrase dialog for the default token will be displayed when you select the Defender Desktop Token program group from the Start menu. To display the token management options, or select an alternative token for authentication, click Tokens. Select the required token. Go to Step The Enter Passphrase dialog box is displayed: 5. In the Passphrase field, type your passphrase. Click OK. The Defender Desktop Token Response page is displayed: 16

17 7. In the Challenge field, type the challenge displayed by the Defender Security Server. 8. To automatically copy the token response to the clipboard and close the Defender Desktop Token Response window, check the box, then select Get Response. If you chose not to automatically copy the token response to the clipboard, select Get Response, then use the copy function to copy the response to the clipboard. Select Cancel to close the Defender Desktop Token Response window. 9. Place the cursor in the communication software window and press Control-V to paste the response into the window. 10. Press Enter on your computer keyboard. 11. Defender verifies the response. If the response the Defender Security Server receives matches the one it expects, you are connected and granted access to the protected network Quest Software, Inc. ALL RIGHTS RESERVED. Quest, Quest Software, the Quest Software logo are trademarks and registered trademarks of Quest Software, Inc. in the United States of America and other countries. Other trademarks and registered trademarks are property of their respective owners. 17

Quest Soft Token for Windows Phone User Guide

Quest Soft Token for Windows Phone User Guide Quest Soft Token for Windows Phone User Guide What is the Quest Soft Token for Windows Phone? The Quest Soft Token for Windows Phone is a two-factor authentication token that can be used with any OATH-compliant

More information

Quest Soft Token for Windows Mobile User Guide

Quest Soft Token for Windows Mobile User Guide Quest Soft Token for Windows Mobile User Guide This guide provides information on installing, activating and using the Quest Windows Mobile Token. What is the Quest Soft Token for Windows Mobile The Quest

More information

Defender Configuring for Use with GrIDsure Tokens

Defender Configuring for Use with GrIDsure Tokens Defender Configuring for Use with GrIDsure Tokens Introduction The GrIDsure token can be used to protect any website hosted on Internet Information Server (IIS). This guide provides information for the

More information

Defender 5.7 - Token Deployment System Quick Start Guide

Defender 5.7 - Token Deployment System Quick Start Guide Defender 5.7 - Token Deployment System Quick Start Guide This guide describes how to install, configure and use the Defender Token Deployment System, based on default settings and how to self register

More information

PaymentNet Federal Card Solutions Cardholder FAQs

PaymentNet Federal Card Solutions Cardholder FAQs PaymentNet Federal Card Solutions It s easy to find the answers to your questions about PaymentNet! June 2014 Frequently Asked Questions First Time Login How do I obtain my login information?... 2 How

More information

SafeWord Domain Login Agent Step-by-Step Guide

SafeWord Domain Login Agent Step-by-Step Guide SafeWord Domain Login Agent Step-by-Step Guide Author Johan Loos Date January 2009 Version 1.0 Contact johan@accessdenied.be Table of Contents Table of Contents... 2 Why SafeWord Agent for Windows Domains?...

More information

SafeGuard Enterprise Web Helpdesk. Product version: 6.1

SafeGuard Enterprise Web Helpdesk. Product version: 6.1 SafeGuard Enterprise Web Helpdesk Product version: 6.1 Document date: February 2014 Contents 1 SafeGuard web-based Challenge/Response...3 2 Scope of Web Helpdesk...4 3 Installation...5 4 Allow Web Helpdesk

More information

Getting Started With Citrix ShareFile

Getting Started With Citrix ShareFile Guide Getting Started With Citrix ShareFile Learn the basics of your ShareFile account. Plus, get the answers to some of our most frequently asked how-to questions. ShareFile.com Welcome to ShareFile!

More information

2. To encrypt the drive for future use, click Yes (Fig 1, 2). This will start the encryption process.

2. To encrypt the drive for future use, click Yes (Fig 1, 2). This will start the encryption process. Dell Data Protection USB Drive Encryption Introduction To further protect PC s that have access to sensitive data, the Dell Data Protection (DDP) client detects and encrypts USB/Flash drives when they

More information

Flexible Identity. OTP software tokens guide. Multi-Factor Authentication. version 1.0

Flexible Identity. OTP software tokens guide. Multi-Factor Authentication. version 1.0 Flexible Identity Multi-Factor Authentication OTP software tokens guide version 1.0 Publication History Date Description Revision 2014.02.07 initial release 1.0 Copyright Orange Business Services 2 of

More information

How to install and use the File Sharing Outlook Plugin

How to install and use the File Sharing Outlook Plugin How to install and use the File Sharing Outlook Plugin Thank you for purchasing Green House Data File Sharing. This guide will show you how to install and configure the Outlook Plugin on your desktop.

More information

User guide. Business Email

User guide. Business Email User guide Business Email June 2013 Contents Introduction 3 Logging on to the UC Management Centre User Interface 3 Exchange User Summary 4 Downloading Outlook 5 Outlook Configuration 6 Configuring Outlook

More information

STATISTICA VERSION 10 STATISTICA ENTERPRISE SERVER INSTALLATION INSTRUCTIONS

STATISTICA VERSION 10 STATISTICA ENTERPRISE SERVER INSTALLATION INSTRUCTIONS Notes: STATISTICA VERSION 10 STATISTICA ENTERPRISE SERVER INSTALLATION INSTRUCTIONS 1. The installation of the STATISTICA Enterprise Server entails two parts: a) a server installation, and b) workstation

More information

SafeGuard Enterprise Web Helpdesk. Product version: 6 Document date: February 2012

SafeGuard Enterprise Web Helpdesk. Product version: 6 Document date: February 2012 SafeGuard Enterprise Web Helpdesk Product version: 6 Document date: February 2012 Contents 1 SafeGuard web-based Challenge/Response...3 2 Installation...5 3 Authentication...8 4 Select the Web Helpdesk

More information

Instructions For Opening UHA Encrypted Email

Instructions For Opening UHA Encrypted Email Receiving Encrypted Email You have received a secure, encrypted message from UHA. The message will contain the following notice and an attachment named SecureMessageAtt.hml. The attachment is shown circled

More information

MCBDirect Corporate Logging on using a Soft Token

MCBDirect Corporate Logging on using a Soft Token MCBDirect Corporate Logging on using a Soft Token Document issue: 2.1 Date of issue: September 2014 Contents About Soft Token authentication... 3 Logging onto MCBDirect Corporate online banking... 4 Soft

More information

OUTLOOK WEB APP (OWA): MAIL

OUTLOOK WEB APP (OWA): MAIL Office 365 Navigation Pane: Navigating in Office 365 Click the App Launcher and then choose the application (i.e. Outlook, Calendar, People, etc.). To modify your personal account settings, click the Logon

More information

Getting Started with Microsoft Outlook with Exchange Online Software from Time Warner Cable Business Class

Getting Started with Microsoft Outlook with Exchange Online Software from Time Warner Cable Business Class Getting Started with Microsoft Outlook with Exchange Online Software from Time Warner Cable Business Class A Guide for Administrators Table of Contents Requirements... 3 1. Activate & Setup Online Software

More information

Setting up VMware ESXi for 2X VirtualDesktopServer Manual

Setting up VMware ESXi for 2X VirtualDesktopServer Manual Setting up VMware ESXi for 2X VirtualDesktopServer Manual URL: www.2x.com E-mail: info@2x.com Information in this document is subject to change without notice. Companies, names, and data used in examples

More information

Yale Software Library

Yale Software Library Yale Software Library http://www.yale.edu/its/software/ For assistance contact the ITS Help Desk 203-432-9000, helpdesk@yale.edu Two-factor authentication: Installation and configuration instructions for

More information

Configuring Thunderbird for Flinders Mail at home.

Configuring Thunderbird for Flinders Mail at home. Configuring Thunderbird for Flinders Mail at home. Downloading Thunderbird can be downloaded from the Mozilla web site located at http://www.mozilla.org/download.html This web site also contains links

More information

STATISTICA VERSION 9 STATISTICA ENTERPRISE INSTALLATION INSTRUCTIONS FOR USE WITH TERMINAL SERVER

STATISTICA VERSION 9 STATISTICA ENTERPRISE INSTALLATION INSTRUCTIONS FOR USE WITH TERMINAL SERVER Notes: STATISTICA VERSION 9 STATISTICA ENTERPRISE INSTALLATION INSTRUCTIONS FOR USE WITH TERMINAL SERVER 1. These instructions focus on installation on Windows Terminal Server (WTS), but are applicable

More information

SafeGuard Enterprise Web Helpdesk

SafeGuard Enterprise Web Helpdesk SafeGuard Enterprise Web Helpdesk Product version: 5.60 Document date: April 2011 Contents 1 SafeGuard web-based Challenge/Response...3 2 Installation...5 3 Authentication...8 4 Select the Web Help Desk

More information

QUANTIFY INSTALLATION GUIDE

QUANTIFY INSTALLATION GUIDE QUANTIFY INSTALLATION GUIDE Thank you for putting your trust in Avontus! This guide reviews the process of installing Quantify software. For Quantify system requirement information, please refer to the

More information

Exchange 2010. Outlook Profile/POP/IMAP/SMTP Setup Guide

Exchange 2010. Outlook Profile/POP/IMAP/SMTP Setup Guide Exchange 2010 Outlook Profile/POP/IMAP/SMTP Setup Guide Document Revision Date: Nov. 13, 2013 Exchange 2010 Outlook Profile/POP/IMAP/SMTP Setup Guide i Contents Introduction... 1 Exchange 2010 Outlook

More information

NetIQ Advanced Authentication Framework - Smartphone Applications

NetIQ Advanced Authentication Framework - Smartphone Applications NetIQ Advanced Authentication Framework - Smartphone Applications User Guide Version 3.0 1 Table of Contents 1 Table of Contents 2 Introduction 3 About This Document 3 System Requirements 4 Install Smartphone

More information

Baylor Secure Messaging. For Non-Baylor Users

Baylor Secure Messaging. For Non-Baylor Users Baylor Secure Messaging For Non-Baylor Users TABLE OF CONTENTS SECTION ONE: GETTING STARTED...4 Receiving a Secure Message for the First Time...4 Password Configuration...5 Logging into Baylor Secure Messaging...7

More information

XCM Internet Explorer Settings

XCM Internet Explorer Settings XCM Internet Explorer Settings For best results, you must prepare your Internet Explorer (IE) browser so that interactions with the XCM site are fully trusted (XCM only supports Microsoft s Internet Explorer).

More information

ThinManager and Active Directory

ThinManager and Active Directory ThinManager and Active Directory Use the F1 button on any page of a ThinManager wizard to launch Help for that page. Visit http://www.thinmanager.com/kb/index.php/special:allpages for a list of Knowledge

More information

How To Set Up Dataprotect

How To Set Up Dataprotect How To Set Up Dataprotect This document will show you how to install and configure your computer for a Typical installation. If you have questions about configuring a Custom installation please contact

More information

SECURE EMAIL USER GUIDE OUTLOOK 2000

SECURE EMAIL USER GUIDE OUTLOOK 2000 WELLS FARGO AUTHENTICATION SERVICES DATED: MAY 2003 TABLE OF CONTENTS GENERAL INFORMATION... 1 INSTALLING THE WELLS FARGO ROOT CERTIFICATE CHAIN.. 2 INSTALLING THE CERTIFICATES INTO IE... 3 SETTING UP

More information

Entrust Certificate Services for Adobe CDS

Entrust Certificate Services for Adobe CDS Entrust Certificate Services Entrust Certificate Services for Adobe CDS Getting Started Guide Entrust SafeNet Authentication Client: 8.3 Date of issue: July 2015 Document issue: 3.0 Revisions Issue and

More information

Symantec PGP Whole Disk Encryption Hands-On Lab V 3.7

Symantec PGP Whole Disk Encryption Hands-On Lab V 3.7 Symantec PGP Whole Disk Encryption Hands-On Lab V 3.7 Description This hands-on lab session covers the hard drive encryption technologies from PGP. Students will administer a typical Whole Disk Encryption

More information

TechNote. Contents. Introduction. System Requirements. SRA Two-factor Authentication with Quest Defender. Secure Remote Access.

TechNote. Contents. Introduction. System Requirements. SRA Two-factor Authentication with Quest Defender. Secure Remote Access. Secure Remote Access SRA Two-factor Authentication with Quest Defender SonicOS Contents Introduction... 1 System Requirements... 1 Defender Configuration... 2 Dell SonicWALL SRA Configuration... 18 Two-factor

More information

Using Entrust certificates with Microsoft Office and Windows

Using Entrust certificates with Microsoft Office and Windows Entrust Managed Services PKI Using Entrust certificates with Microsoft Office and Windows Document issue: 1.0 Date of issue: May 2009 Copyright 2009 Entrust. All rights reserved. Entrust is a trademark

More information

Table of Contents. Welcome... 2. Login... 3. Password Assistance... 4. Self Registration... 5. Secure Mail... 7. Compose... 8. Drafts...

Table of Contents. Welcome... 2. Login... 3. Password Assistance... 4. Self Registration... 5. Secure Mail... 7. Compose... 8. Drafts... Table of Contents Welcome... 2 Login... 3 Password Assistance... 4 Self Registration... 5 Secure Mail... 7 Compose... 8 Drafts... 10 Outbox... 11 Sent Items... 12 View Package Details... 12 File Manager...

More information

owncloud Configuration and Usage Guide

owncloud Configuration and Usage Guide owncloud Configuration and Usage Guide This guide will assist you with configuring and using YSUʼs Cloud Data storage solution (owncloud). The setup instructions will include how to navigate the web interface,

More information

Kaspersky Password Manager USER GUIDE

Kaspersky Password Manager USER GUIDE Kaspersky Password Manager USER GUIDE Dear User! Thank you for choosing our product. We hope that this documentation helps you in your work and provides answers you may need. Any type of reproduction or

More information

The following items are trademarks or registered trademarks of Kaba Mas in the United States and/or other countries. GITCON

The following items are trademarks or registered trademarks of Kaba Mas in the United States and/or other countries. GITCON The Gitcon Access Management Software Installation Guide is a publication of Kaba Mas LLC (hereinafter Kaba Mas). No part of this book may be reproduced or transmitted in any form or by any means, electronic

More information

Aventail Connect Client with Smart Tunneling

Aventail Connect Client with Smart Tunneling Aventail Connect Client with Smart Tunneling User s Guide Windows v8.7.0 1996-2006 Aventail Corporation. All rights reserved. Aventail, Aventail Cache Control, Aventail Connect, Aventail Connect Mobile,

More information

Password Depot for Android

Password Depot for Android Password Depot for Android Table Of Contents Table Of Contents... 2 User interface... 3 Action Bar... 3 Overflow Menu... 4 Entry menu... 5 Context Bar... 6 Settings... 7 Creating a password file... 8 Opening

More information

SOS SO S O n O lin n e lin e Bac Ba kup cku ck p u USER MANUAL

SOS SO S O n O lin n e lin e Bac Ba kup cku ck p u USER MANUAL SOS Online Backup USER MANUAL HOW TO INSTALL THE SOFTWARE 1. Download the software from the website: http://www.sosonlinebackup.com/download_the_software.htm 2. Click Run to install when promoted, or alternatively,

More information

SECURE MOBILE ACCESS MODULE USER GUIDE EFT 2013

SECURE MOBILE ACCESS MODULE USER GUIDE EFT 2013 SECURE MOBILE ACCESS MODULE USER GUIDE EFT 2013 GlobalSCAPE, Inc. (GSB) Address: 4500 Lockhill-Selma Road, Suite 150 San Antonio, TX (USA) 78249 Sales: (210) 308-8267 Sales (Toll Free): (800) 290-5054

More information

Active Directory Management. Agent Deployment Guide

Active Directory Management. Agent Deployment Guide Active Directory Management Agent Deployment Guide Document Revision Date: June 12, 2014 Active Directory Management Deployment Guide i Contents System Requirements...1 Hardware Requirements...1 Installation...3

More information

IIS, FTP Server and Windows

IIS, FTP Server and Windows IIS, FTP Server and Windows The Objective: To setup, configure and test FTP server. Requirement: Any version of the Windows 2000 Server. FTP Windows s component. Internet Information Services, IIS. Steps:

More information

IBM Security Access Manager for Enterprise Single Sign-On Version 8.2.1. User Guide IBM SC23-9950-05

IBM Security Access Manager for Enterprise Single Sign-On Version 8.2.1. User Guide IBM SC23-9950-05 IBM Security Access Manager for Enterprise Single Sign-On Version 8.2.1 User Guide IBM SC23-9950-05 IBM Security Access Manager for Enterprise Single Sign-On Version 8.2.1 User Guide IBM SC23-9950-05

More information

To successfully initialize Microsoft Outlook (Outlook) the first time, email settings need to be verified.

To successfully initialize Microsoft Outlook (Outlook) the first time, email settings need to be verified. TO: UAN CLIENTS FROM: UAN STAFF DATE: OCTOBER 8, 2008 SUBJECT: Steps for Initial Setup of Microsoft Outlook To successfully initialize Microsoft Outlook (Outlook) the first time, email settings need to

More information

HOW TO USE OIT EMAIL VIA THE WEB

HOW TO USE OIT EMAIL VIA THE WEB HOW TO USE OIT EMAIL VIA THE WEB A) Logging into your MyOIT account which includes your email account 1) Open a browser such as Firefox, Chrome or Safari. Please do not use Internet Explorer. 2) In the

More information

Initial Setup of Microsoft Outlook 2011 with IMAP for OS X Lion

Initial Setup of Microsoft Outlook 2011 with IMAP for OS X Lion Initial Setup of Microsoft Outlook Concept This document describes the procedures for setting up the Microsoft Outlook email client to download messages from Google Mail using Internet Message Access Protocol

More information

Installation Instruction STATISTICA. Concurrent Network License with Borrowing Domain Based Registration

Installation Instruction STATISTICA. Concurrent Network License with Borrowing Domain Based Registration Installation Instruction STATISTICA Concurrent Network License with Borrowing Domain Based Registration Notes: ❶ The installation of the Concurrent network version entails two parts: a) a server installation,

More information

1. Set Daylight Savings Time... 3. 2. Create Migrator Account... 3. 3. Assign Migrator Account to Administrator group... 4

1. Set Daylight Savings Time... 3. 2. Create Migrator Account... 3. 3. Assign Migrator Account to Administrator group... 4 1. Set Daylight Savings Time... 3 a. Have client log into Novell/Local Machine with Administrator Account...3 b. Access Adjust Date/Time...3 c. Make sure the time zone is set to Central Time...3 2. Create

More information

OS X 10.6 SNOW LEOPARD: KEYCHAIN ACCESS MANAGING & UNDERSTANDING KEYCHAIN

OS X 10.6 SNOW LEOPARD: KEYCHAIN ACCESS MANAGING & UNDERSTANDING KEYCHAIN OS X 10.6 SNOW LEOPARD: KEYCHAIN ACCESS MANAGING & UNDERSTANDING KEYCHAIN MANAGING KEYCHAINS Mac OS X features a sophisticated system that automatically protects all your authentication assets in encrypted

More information

Cox Business Premium Online Backup USER'S GUIDE. Cox Business VERSION 1.0

Cox Business Premium Online Backup USER'S GUIDE. Cox Business VERSION 1.0 Cox Business Premium Online Backup USER'S GUIDE Cox Business VERSION 1.0 Table of Contents ABOUT THIS GUIDE... 4 DOWNLOADING COX BUSINESS PREMIUM ONLINE BACKUP... 5 INSTALLING COX BUSINESS PREMIUM ONLINE

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,

More information

Initial Setup of Mozilla Thunderbird with IMAP for Windows 7

Initial Setup of Mozilla Thunderbird with IMAP for Windows 7 Initial Setup of Mozilla Thunderbird Concept This document describes the procedures for setting up the Mozilla Thunderbird email client to download messages from Google Mail using Internet Message Access

More information

TM Online Storage: StorageSync

TM Online Storage: StorageSync TM Online Storage: StorageSync 1 Part A: Backup Your Profile 1: How to download and install StorageSync? Where to download StorageSync? You may download StorageSync from your e-storage account. Please

More information

Getting Started with MozyPro Online Backup Online Software from Time Warner Cable Business Class

Getting Started with MozyPro Online Backup Online Software from Time Warner Cable Business Class Getting Started with MozyPro Online Backup Online Software from Time Warner Cable Business Class A Guide for Users MozyPro is an online backup service with an easy to use interface so you can start backing

More information

Internet Explorer 7 for Windows XP: Obtaining MIT Certificates

Internet Explorer 7 for Windows XP: Obtaining MIT Certificates Internet Explorer 7 for Windows XP: Obtaining MIT Certificates Overview In order to use secure web services at MIT, you will need to obtain two types of MIT web certificates: MIT Certificate Authority

More information

NeoMail Guide. Neotel (Pty) Ltd

NeoMail Guide. Neotel (Pty) Ltd NeoMail Guide Neotel (Pty) Ltd NeoMail Connect Guide... 1 1. POP and IMAP Client access... 3 2. Outlook Web Access... 4 3. Outlook (IMAP and POP)... 6 4. Outlook 2007... 16 5. Outlook Express... 24 1.

More information

8x8 Virtual Office Telephony Interface for Salesforce

8x8 Virtual Office Telephony Interface for Salesforce 8x8 Virtual Office Telephony Interface for Salesforce Administrator Guide May 2014 The Champion For Business Communications Table of Contents 8x8 Virtual Office Telephony Interface for Salesforce.... 3

More information

Connecting To SOM Network Drives With Windows XP

Connecting To SOM Network Drives With Windows XP Connecting To SOM Network Drives With Windows XP The first step to take is to make sure that you are using the UCSF VPN client when you connect. If you do not have a VPN username and password, you will

More information

Software Token. Installation and User Guide. 2013 MasterCard Proprietary. All rights reserved.

Software Token. Installation and User Guide. 2013 MasterCard Proprietary. All rights reserved. Software Token Installation and User Guide 2013 MasterCard Proprietary. All rights reserved. Contents Overview... 1 Install the RSA Client Desktop Application... 1 Download and Save the RSA Desktop Application...

More information

SFTP Server User Login Instructions. Open Internet explorer and enter the following url: https://sftp.sae.org

SFTP Server User Login Instructions. Open Internet explorer and enter the following url: https://sftp.sae.org SFTP Server User Login Instructions Open Internet explorer and enter the following url: https://sftp.sae.org You will be prompted for a user id and password as such. Please enter your account id and password.

More information

WhatsUp Gold v16.1 Installation and Configuration Guide

WhatsUp Gold v16.1 Installation and Configuration Guide WhatsUp Gold v16.1 Installation and Configuration Guide Contents Installing and Configuring Ipswitch WhatsUp Gold v16.1 using WhatsUp Setup Installing WhatsUp Gold using WhatsUp Setup... 1 Security guidelines

More information

Pendragon Forms Industrial

Pendragon Forms Industrial Pendragon Forms Industrial Version 7 Installation & Reference Guide for Android Devices Contents What Is Pendragon Forms Industrial?... 2 Installing Pendragon Forms Industrial... 2 Installing Pendragon

More information

Welcome to Business Internet Banking

Welcome to Business Internet Banking Welcome to Business Internet Banking Member FDIC Table of Contents Logging On to Business Internet Banking. 3 Viewing Balances. 6 Viewing Transaction Information. 7 Issuing Stop Payments. 9 Viewing estatements.

More information

Exchange 2010. Outlook Profile/POP/IMAP/SMTP Setup Guide

Exchange 2010. Outlook Profile/POP/IMAP/SMTP Setup Guide Exchange 2010 Outlook Profile/POP/IMAP/SMTP Setup Guide September, 2013 Exchange 2010 Outlook Profile/POP/IMAP/SMTP Setup Guide i Contents Exchange 2010 Outlook Profile Configuration... 1 Outlook Profile

More information

Using Websense Data Endpoint Client Software

Using Websense Data Endpoint Client Software 1 Using Websense Data Endpoint Client Software Related topics: Disabling the endpoint client, page 3 Viewing contained files, page 5 Viewing logs, page 6 Updating the endpoint client, page 7 Your organization

More information

Remote Access: Citrix Client Setup

Remote Access: Citrix Client Setup Introduction: The following documentation is intended to assist first time or active users with installation of the Citrix ICA connection software required to access the MSVU Remote Access system desktop

More information

Forcepoint Sidewinder, Virtual Appliance Evaluation for Desktop. Installation Guide 8.x. Revision A

Forcepoint Sidewinder, Virtual Appliance Evaluation for Desktop. Installation Guide 8.x. Revision A Forcepoint Sidewinder, Virtual Appliance Evaluation for Desktop Installation Guide 8.x Revision A Table of contents 1 Overview...3 2 Verify system requirements...4 Virtualization requirements...4 Admin

More information

Setting Up Email. on Your Sprint Power Vision SM Mogul by HTC

Setting Up Email. on Your Sprint Power Vision SM Mogul by HTC Setting Up Email on Your Sprint Power Vision SM Mogul by HTC Intellectual Property Notices 2007 Sprint Nextel. All rights reserved. No reproduction in whole or in part without prior written approval. SPRINT

More information

3 Setting up Databases on a Microsoft SQL 7.0 Server

3 Setting up Databases on a Microsoft SQL 7.0 Server 3 Setting up Databases on a Microsoft SQL 7.0 Server Overview of the Installation Process To set up GoldMine properly, you must follow a sequence of steps to install GoldMine s program files, and the other

More information

Connecting to HomeRun over the Web

Connecting to HomeRun over the Web (o HomeRun Integrated Clinical and Financial Homecare Software Connecting to HomeRun over the Web White Oak Systems, LLC 8 Research Parkway Wallingford, CT 06492 Phone: 866-679-7702 info@whiteoaksys.com

More information

LogMeIn Network Console Version 8 Getting Started Guide

LogMeIn Network Console Version 8 Getting Started Guide LogMeIn Network Console Version 8 Getting Started Guide April 2007 1. About the Network Console... 2 2. User Interface...2 3. Quick Start... 2 4. Network & Subnet Scans...3 5. Quick Connect...3 6. Operations...

More information

WHAT IS VIRTUAL DESKTOP? WHAT YOU NEED LOG IN TO VIRTUAL DESKTOP SET UP CITRIX RECEIVER REMOTE ACCESS GUIDE

WHAT IS VIRTUAL DESKTOP? WHAT YOU NEED LOG IN TO VIRTUAL DESKTOP SET UP CITRIX RECEIVER REMOTE ACCESS GUIDE WHAT IS VIRTUAL DESKTOP? Virtual Desktop is an online environment that allows you to access NSF applications and a virtual desktop that mimics a Windows 7 environment. You can use Virtual Desktop to use

More information

Transitioning from TurningPoint 5 to TurningPoint Cloud - LMS 1

Transitioning from TurningPoint 5 to TurningPoint Cloud - LMS 1 Transitioning from TurningPoint 5 to TurningPoint Cloud - LMS 1 A Turning Account is a unique identifier that is used to tie together all software accounts and response devices. A Turning Account is required

More information

UP L18 Enhanced MDM and Updated Email Protection Hands-On Lab

UP L18 Enhanced MDM and Updated Email Protection Hands-On Lab UP L18 Enhanced MDM and Updated Email Protection Hands-On Lab Description The Symantec App Center platform continues to expand it s offering with new enhanced support for native agent based device management

More information

Welcome Guide for MP-1 Token for Microsoft Windows

Welcome Guide for MP-1 Token for Microsoft Windows Welcome Guide for MP-1 Token for Microsoft Windows Protecting Your On-line Identity Authentication Service Delivery Made EASY Copyright 2012 SafeNet, Inc. All rights reserved. All attempts have been made

More information

STATISTICA VERSION 11 CONCURRENT NETWORK LICENSE WITH BORROWING INSTALLATION INSTRUCTIONS

STATISTICA VERSION 11 CONCURRENT NETWORK LICENSE WITH BORROWING INSTALLATION INSTRUCTIONS data analysis data mining quality improvement web-based analytics Notes STATISTICA VERSION 11 CONCURRENT NETWORK LICENSE WITH BORROWING INSTALLATION INSTRUCTIONS 1. The installation of the Concurrent network

More information

Marcum LLP MFT Guide

Marcum LLP MFT Guide MFT Guide Contents 1. Logging In...3 2. Installing the Upload Wizard...4 3. Uploading Files Using the Upload Wizard...5 4. Downloading Files Using the Upload Wizard...8 5. Frequently Asked Questions...9

More information

Sophos Mobile Control User guide for Android

Sophos Mobile Control User guide for Android Sophos Mobile Control User guide for Android Product version: 2.5 Document date: July 2012 Contents 1 About Sophos Mobile Control... 3 2 Login to the Self Service Portal... 4 3 Set up Sophos Mobile Control

More information

Using SSH Secure File Transfer to Upload Files to Banner

Using SSH Secure File Transfer to Upload Files to Banner Using SSH Secure File Transfer to Upload Files to Banner Several Banner processes, including GLP2LMP (Create PopSelect Using File), require you to upload files from your own computer to the computer system

More information

Sophos Mobile Control as a Service Startup guide. Product version: 3.5

Sophos Mobile Control as a Service Startup guide. Product version: 3.5 Sophos Mobile Control as a Service Startup guide Product version: 3.5 Document date: August 2013 Contents 1 About this guide...3 2 What are the key steps?...4 3 First login...5 4 Change your administrator

More information

Software Installation Requirements

Software Installation Requirements Software Installation Guide PrintIQ TM Software Installation Requirements Please use the following guide to ensure that you're meeting all requirements prior to installing the PrintIQ TM Xerox Device Agent

More information

1. Application Overview... 3. 2. System Requirements... 3. 3. Installation... 3. 4. Splash Screen... 4. 5. Registration Screen...

1. Application Overview... 3. 2. System Requirements... 3. 3. Installation... 3. 4. Splash Screen... 4. 5. Registration Screen... 1 P a g e Table of Contents 1. Application Overview... 3 2. System Requirements... 3 3. Installation... 3 4. Splash Screen... 4 5. Registration Screen... 5 5.1 Registration... 5 6. Login Screen... 7 6.1

More information

Network Scanner Tool V3.5. User s Guide Version 3.5.01

Network Scanner Tool V3.5. User s Guide Version 3.5.01 Network Scanner Tool V3.5 User s Guide Version 3.5.01 Copyright 2000-2016 by SHARP CORPORATION. All rights reserved. Reproduction, adaptation or translation without prior written permission is prohibited,

More information

Load Bulletin ADP, Inc. Dealer Services 1950 Hassell Road Hoffman Estates, IL 60169-6308

Load Bulletin ADP, Inc. Dealer Services 1950 Hassell Road Hoffman Estates, IL 60169-6308 Load Bulletin ADP, Inc. Dealer Services 1950 Hassell Road Hoffman Estates, IL 60169-6308 Make sure the media label contains this number: NP-ASP-AE1.0 ADP Network Phone ASP Assistant Enterprise Loading

More information

CBH Provider EDI Browser Manual

CBH Provider EDI Browser Manual CBH Provider EDI Browser Manual Table of Contents PGP Software Installation Windows XP 2 PGP Software Installation Windows 7 9 Main Screen 16 Log In Screen 19 Report: Authorizations 21 Decryption Instructions

More information

Installation Guide Revision 1.0.

Installation Guide Revision 1.0. Sage Intelligence Financial Reporting for Sage ERP X3 Installation Guide Revision 1.0. The software described in this document is protected by copyright, And may not be copied on any medium except as specifically

More information

Avalanche Site Edition

Avalanche Site Edition Avalanche Site Edition Version 4.8 avse ug 48 20090325 Revised 03/20/2009 ii Copyright 2008 by Wavelink Corporation All rights reserved. Wavelink Corporation 6985 South Union Park Avenue, Suite 335 Midvale,

More information

VMware Horizon FLEX User Guide

VMware Horizon FLEX User Guide Horizon FLEX 1.5 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of this

More information

Transitioning from TurningPoint 5 to TurningPoint Cloud - NO LMS 1

Transitioning from TurningPoint 5 to TurningPoint Cloud - NO LMS 1 Transitioning from TurningPoint 5 to TurningPoint Cloud - NO LMS 1 A Turning Account is a unique identifier that is used to tie together all software accounts and response devices. A Turning Account is

More information

Crystal Reports Installation Guide

Crystal Reports Installation Guide Crystal Reports Installation Guide Version XI Infor Global Solutions, Inc. Copyright 2006 Infor IP Holdings C.V. and/or its affiliates or licensors. All rights reserved. The Infor word and design marks

More information

Installation Guide. (You can get these files from http://www.clariostechnology.com/intelligentreports/install)

Installation Guide. (You can get these files from http://www.clariostechnology.com/intelligentreports/install) Clarios Technology Pty. Ltd. Intelligent Reporter Installation Guide Installing Intelligent Reports JIRA plugin The Intelligent Reports plugin for JIRA is available through the Atlassian Marketplace. Follow

More information

AD Self Password Reset Installation and configuration

AD Self Password Reset Installation and configuration AD Self Password Reset Installation and configuration AD Self Password Reset Installation 1 Manual v1.4 Table of Contents TABLE OF CONTENTS 2 SUMMARY 3 INSTALLATION 4 REMOVAL 6 AD SELF PASSWORD RESET CONFIGURATION

More information

State of Michigan Data Exchange Gateway. Web-Interface Users Guide 12-07-2009

State of Michigan Data Exchange Gateway. Web-Interface Users Guide 12-07-2009 State of Michigan Data Exchange Gateway Web-Interface Users Guide 12-07-2009 Page 1 of 21 Revision History: Revision # Date Author Change: 1 8-14-2009 Mattingly Original Release 1.1 8-31-2009 MM Pgs 4,

More information

Using Device Discovery

Using Device Discovery 2 CHAPTER You can use Active Discovery to scan your network for new monitors (Active Monitors and Performance Monitors) and devices on a regular basis. Newly discovered items are added to the Active Discovery

More information

Tech Tips Helpful Tips for Pelco Products

Tech Tips Helpful Tips for Pelco Products DX4104 UPDATING FROM THE NETWORK SERVER October 29, 2009 DX4104 UPDATING FROM THE NETWORK SERVER The Operation/Configuration manual provides users an option for updating the server through the network

More information

Table of Contents. Changing Your Password in Windows NT p. 1. Changing Your Password in Alpha Connection.. pp. 1-3

Table of Contents. Changing Your Password in Windows NT p. 1. Changing Your Password in Alpha Connection.. pp. 1-3 Table of Contents Changing Your Password in Windows NT p. 1 Changing Your Password in Alpha Connection.. pp. 1-3 Not Able to Get Outlook Express Mail Because Alpha Connection Password Expires... pp. 3-4

More information