How To Run A Linux Agent On Alandesk (For Free) On A Linux Server (For A Non-Free) On Your Ubuntu Computer (For Cheap) On An Ubuntu 2.5 (For Ubuntu) On Linux

Size: px
Start display at page:

Download "How To Run A Linux Agent On Alandesk (For Free) On A Linux Server (For A Non-Free) On Your Ubuntu Computer (For Cheap) On An Ubuntu 2.5 (For Ubuntu) On Linux"

Transcription

1 LANDesk Management Suite 8.8 SP3 Best Known Method for Managing Linux Agents

2 Contents Introduction... 4 Scope... 4 Assumptions... 4 Supported Linux Platforms... 4 Prerequisite Software... 4 The Linux Agent vs. the Linux Server Agent...5 Manually Installing the Linux Agent...5 Deploying the Linux Agent Using LANDesk Management Suite... 6 Configuring the LANDesk Scheduler Server Credentials... 6 Creating the Linux Agent Configuration...7 Linux Agent...7 Linux Server Agent...7 Adding an Unmanaged Linux Server or Workstation to the Console.. 8 Manually Adding a Linux Server or Workstation to All Devices. 8 Discovering Unmanaged Linux Servers and Workstations... 8 Scheduling a Task to Deploy the Linux Agent... 9 Linux Agent Post-installation Configuration... 9 Configuring the Linux Firewall... 9 Configuring SELinux to Allow RPM Distributions Scheduled Agent-Side Tasks with cron Scheduling Inventory and/or Vulnerability Scans with cron Deploying a cron Configuration as a Scheduled Task Configuring the LANDesk Inventory Scanner for Linux Enabling Inventory Scanning of BIOS Information for Linux Workstations Using Patch Manager with Linux Agents Downloading Linux Patch Vulnerability Content Downloading the Linux Patch Software Scheduling Daily Vulnerability Downloads Filtering Patch Content Creating a Custom Vulnerability Uninstalling the Linux Agent...27

3 Software Distribution Deploying RPMs Step 1 Place the RPM on a Web Share Step 2 Create a Distribution Package Step 3 Create a Scheduled Task Running Custom Scripts Deploying a Shell Script as a Custom Script Imaging Linux Agents Windows PE or Linux PE? Preparing a Base Image Software on the Base Image IP Address Configuration Host Name Patching Capturing the Base Image Deployment Appendix A - Troubleshooting the Linux Agent Install The Core Server Never Connects to the Linux Device Missing Dependencies Unsupported Platforms Appendix B Sample Custom Definition Appendix C OS Deployment Script Examples...37 Windows PE Capture Script Linux PE Capture Script Windows PE Deploy Script Linux PE Deploy Script About LANDesk Software... 42

4 Introduction The LANDesk Management Suite workstation management has extended into management of Linux* workstation and servers for some time. The Linux Agent can run on almost any Linux platform. LANDesk Software has chosen to officially support only a few of these, such as Red Hat 3, 4, and 5, SUSE 10, and Ubuntu 6 and 7. The Linux Agent provides the ability to do the following: Send inventory scans to the Core Server Remotely install RPMs with a scheduled task from the Core Server. Check for vulnerabilities (supported Linux version only). Run remote execute commands in Custom Scripts. The Linux Agent can be pushed from the Core Server to Red Hat 3, 4, 5 and SUSE 10. Ubuntu currently requires a manual installation. Scope This document will be a comprehensive discussion about Linux desktop management. Assumptions This white paper assumes that the reader is a LANDesk administrator and familiar with Desktop Management principles as well as a Linux administrator and familiar with the Linux operating system. Supported Linux Platforms The following Linux platforms are officially supported: Red Hat 3, 4, 5 (32 bit and 64 bit) Both desktop and server platforms are supported. SUSE 10 (32 bit and 64 bit) Both desktop and server platforms are supported. SUSE has released version 11 for which we intend to add support, though we have not done so as of yet. Ubuntu 6.x, 7.x (32 bit) Ubuntu is a Debian based Linux distribution that is now has a version 8 and 9 which we are working to support officially. Unofficially the agent can install on those versions and send in scans as of 8.8 SP3. Note: The Linux agent can run on other platforms, however, LANDesk Software only guarantees the above platforms and only allows for support on the above platforms. Any assistance, support, or functionality desired for additional platforms is not covered through a support contract but should be purchased from LANDesk Professional Services or a valued LANDesk Partner. Prerequisite Software

5 The Linux agent installation indicates when software that is required and is not installed. Software is required to run the agent, and the following list is the software that must be installed. xinetd compat-libstdc++ (Red Hat 3, 4) sysstat (Linux Server agent only) For more information on other requirements, such as what is required to push a LANDesk agent, refer to the following section of the LANDesk help file: LANDesk Management Suite Configuring device agents Configuring Linux and UNIX device agents The Linux Agent vs. the Linux Server Agent The Linux Agent and the Linux Server Agent are similar. The difference is everything the Linux Agent installs, the Server Agent also installs; however, the Linux Server Agent installs much more than the Linux Agent installs. Particularly the functionality around Monitoring is not installed by the Linux Agent and is installed with the Server Manager agent. Monitoring allows for the ability to scan the BIOS, work with some IPMI settings, etc. The Linux Agent (at least as of 8.8 SP2A) by default cannot scan important BIOS information that is usually desired, such as Serial Number and Asset Tag. These two pieces of data are highly desired, which makes it appear that the Linux Server Agent should always be used, even for Linux workstations. However, installing the Linux Server Agent is not recommended on Linux workstations. There is a simple workaround to get BIOS scans to occur on the Linux Agent, and deploying the Linux Agent to Linux workstations is still best. The workaround is to extract and deploy two RPMs to the Linux Agents. This is discussed later in the How to Scan the BIOS Information section. Manually Installing the Linux Agent 1. Open a shell on the Linux Server or Workstation. This can be done either directly on the Linux Server or Workstation or by connecting via SSH. 2. As root, or using sudo, run the following commands from the shell: a. Mount a drive to the ldlogon share on the Core Server. # mkdir /mnt/ldlogon # mount t cifs o username=user,workgroup=domain \ //Core/ldlogon /mnt/ldogon Note: On older Linux platforms cifs may need to be replaced with smbfs. b. Change to the mounted drive and run the installer. # cd /mnt/ldlogon #./linuxpull.sh "Default Linux Configuration.ini"

6 The Linux agent will install. c. Run an inventory scan. The installer does not run an inventory scan by default. # /usr/landesk/common/ldiscan.sh Alternatively, a shell script is included in the /usr/landesk/common that can be called that automatically uses the Core Server name from the /etc/ldiscnux.conf file. A copy of this shell script is placed in /etc/cron.daily that runs the inventory scan every day. Deploying the Linux Agent Using LANDesk Management Suite The Linux agent install must be done using the following process: 1. Configure the LANDesk Scheduler Server Addition. 2. Create a Linux Agent. 3. Add the Linux device to the Console. a. Add an Unmanaged Linux Server or Workstation to the Console. b. Discover Unmanaged Linux Servers and Workstations with Unmanaged Device Discovery. 4. Schedule the Linux Agent Deployment. Configuring the LANDesk Scheduler Server Credentials Use the Configure Services Scheduler Change login window to enter the SSH credentials you want the scheduler service to use as alternate credentials. The scheduler service uses these credentials to install the agents on your servers. You should be prompted to restart the scheduler service. If you aren't, click Stop and then Start on the Scheduler tab to restart the service. This activates your changes. Do the following from the Core Server (it cannot be done on an additional Remote Console): 1. On the Core Server, in the Management Suite Console, go to Configure Services Scheduler Change login. 2. Change the Scheduler Service to use an account other than Local System. This cannot be the root account used for Linux servers or workstations. The scheduler Service itself should be running as an Active Directory service account that you would have to create in Active Directory for LANDesk use. If Active Directory is not in use, another domain or local account will suffice.

7 3. Under Alternate Credentials, click Add. a. For the User name, type in root. b. Leave the Domain field blank. c. For the Password type in the password. d. Retype the password for Confirm Password. e. Click Ok to add the alternate credentials. 4. Click Ok again to exit the Change Login screen. 5. When prompted, choose to restart the Scheduler Service. Creating the Linux Agent Configuration After you've configured your Linux servers and added Linux credentials to the core server, you must create a Linux agent configuration. Linux Agent To create a Linux Agent configuration: 1. In Tools Configuration Agent configuration, click the New Linux button. 2. Enter a Configuration name. 3. On the Start page, the Standard LANDesk agent and software distribution agents are required and the LANDesk Vulnerability Scanner is optional but installed by default. 4. Check other screens and read the help documentation where needed to see if you need to change any other option. Otherwise keep all other default options. 5. Click Save. Linux Server Agent To create a Linux Server Agent configuration: 1. In Tools Configuration Agent configuration, click the New Server Configuration button. 2. Enter a Configuration name. 3. Select Linux Server Edition from the Configuration Type. 4. On the Start page, the Default LANDesk agent is required and the other features are optional but installed by default. 5. Check other screens and read the help documentation where needed to see if you need to change any other option. Otherwise keep all other default options.

8 Note: LANDesk Software tries to gray out any options not specific to the Linux Server Agent, but unfortunately many options are not grayed out that do not work with the Linux Server Agent. 6. Click Save. Adding an Unmanaged Linux Server or Workstation to the Console Management Suite can only push a Device in All Devices or in Unmanaged Devices. To push the Linux Agent to a Linux Server or Workstation, the device must either be added to the All Devices manually or discovered using Unmanaged Device Discovery. If you are only testing with a single Linux device, manually add the device to All Devices. If you are working with many Linux devices, Unmanaged Device Discovery is a more efficient solution. Manually Adding a Linux Server or Workstation to All Devices To add a device to All devices in the console: 1. In the Management Suite Console, in the Network View, right-click All devices and click Insert New Computer. 2. Enter the Name, IP Name (FQDN), and IP Address. 3. Click OK. The device is now added to All devices. Note: Adding a device to All devices does not install the agent or make the device managed. The agent must still be deployed to this device. Discovering Unmanaged Linux Servers and Workstations To discover your Linux servers and deploy a configuration to them: 1. From the Management Suite Console, click Tools Configuration Unmanaged Device discovery. 2. Click the Scan Network icon. 3. In the Scanner Configuration window, click New. 4. Type a name for the new configuration.

9 Note: By default only a standard network scan is done. If more scan options are desired, click the More >> button. Read the help file to understand the options. 5. Enter an IP range. If you have many Linux servers, enter a subnet or list of subnets. If you are only working with one machine, enter the Linux server's IP address for the starting and ending IP ranges. 6. Click Scan now once you've added your discovery IP ranges. Scheduling a Task to Deploy the Linux Agent To create a scheduled task to deploy the Linux Agent: 1. In the Management Suite Console, click Tools Configuration Agent configuration. 2. Right-click the agent configuration and click Schedule agent deployment. The agent is scheduled and the scheduled tasks pane is automatically opened. 3. Either from the All devices in the Network View or from Unmanaged Device Discovery, drag the Linux device(s) and drop them over the scheduled task. 4. Right-click the task and choose Start now. Linux Agent Post-installation Configuration That LANDesk agent does not configure the Linux firewall. It does add a shell script to cron.daily so an inventory scan is run daily, but no vulnerability scan is configured. The cron.daily may not suit your needs and a more complex cron job may be desired. Configuring the Linux Firewall The following ports must be enabled for the Core Server to remotely manage the Linux device: Agent Function TCP UDP Agent Deployment 22 (SSH) n/a Management Agent (cba8) 9595 (Ping Discovery Service) 9595 (Ping Discovery Service) Messaging System (msgsys) 9594 (Messaging System) n/a LANDesk Management Agent LANDesk Gateway 9593 (cba8) n/a 9592 (LDGateway - Exists but is not currently in use) n/a

10 The following is a screen shot of a working Red Hat 5 firewall configuration. SUSE and Ubuntu have difference interfaces to the firewall but have some similarities. You can find more information on their Web sites.

11 Configuring SELinux to Allow RPM Distributions If SELinux is enabled, and it is enabled if you select the defaults during an installation of Red Hat, then when the Core Server attempts to deploy an RPM as a distribution package, SELinux will block this action. SUSE and Ubuntu do not come with SELinux by default. SUSE comes with AppArmor instead of SELinux and while AppArmor could prevent agent functionality, it does not appear to do so by default. To configure SELinux to allow RPM distributions, perform the following: 1. Create the following file on a Linux device using a Linux editor. LANDesk.te module LANDesk ; require { type inetd_t; type rpm_script_t; class process transition; } #============= inetd_t ============== allow inetd_t rpm_script_t:process transition; 2. Copy the file to a web share. 3. Create a shell script using a Linux editor that will compile and install this SELinux configuration. ConfigureSELinuxForLANDesk.sh #!/bin/sh cd /tmp /usr/bin/checkmodule -M -m -o LANDesk.mod LANDesk.te /usr/bin/semodule_package -o LANDesk.pp -m LANDesk.mod /usr/sbin/semodule -i LANDesk.pp #cleanup rm f /tmp/landesk.te /tmp/landesk.mod /tmp/landesk.pp exit 0 4. In the Management Suite Console, click Tools Distribution Manage Scripts. 5. Create a New Custom Script.

12 This opens a LANDesk Custom Script in the default editor for.ini files. Write a new custom script that (1) transfers both the ConfigureSELinuxForLANDesk.sh and the LANDesk.te files to the Linux agent s /tmp directory, and (2) runs the shell script to compile and install the SELinux configuration for LANDesk, and (3) cleans up after itself. The following is an example of such a Custom Script. Your web paths will be different. [MACHINES_LINUX] ; Download the files REMEXEC0=/usr/bin/wget -O /tmp/configselinuxforlandesk.sh, STATUS SYNC REMEXEC1=/usr/bin/wget -O /tmp/landesk.te, STATUS SYNC ; Make the shell script executable REMEXEC2=/bin/chmod +x /tmp/configselinuxforlandesk.sh, STATUS SYNC ; Execute the shell script REMEXEC3=/tmp/ConfigSELinuxForLANDesk.sh, STATUS SYNC ; Clean up after ourselves by deleting the shell script REMEXEC4=rm -f /tmp/configselinuxforlandesk.sh, STATUS SYNC 6. Save the file with an appropriate name and make sure the extension is.ini. 7. Verify that it does not save with the.txt extension. The script now appears in the Manage Scripts window. 8. Right-click the new Managed Script and click Schedule. 9. Drag the Linux devices and schedule the task. 10. Right-click the task and click Start now. Once successful this task should build and install a configuration module to all RPMs to be deployed by the Core Server. Scheduled Agent-Side Tasks with cron By default Management Suite adds a shell script to /etc/cron.daily, which runs the inventory scanner shell script daily. You can customize this script if desired. A manual page or man page exists for cron and crontab. These man pages can usually be found by running the following commands on a Linux device from a shell: $ man cron $ man crontab

13 $ man 5 crontab These man pages can also be found online. Scheduling Inventory and/or Vulnerability Scans with cron For inventory scans, by default a Windows agent is configured to send a small hardware scan immediately after booting up. The Windows agent will also perform an inventory scan that includes a software scan daily. However, windows devices support delta scans (delta scans are scans where only the changes are sent to the Core Server), while Linux devices currently do not perform a delta scan and always send full scans. So if the default cron.daily task does not work in your environment, the following is an example design that may better suit your needs. For vulnerability scans, by default a Windows agent is configured to perform a vulnerability scan each day. While one could argue whether or not Linux Operating Systems and their installed software have more or less vulnerabilities vs. windows, the important factor here is that when you are vulnerable you get patched no matter what the Operating System is. Different corporations have chosen to scan at different intervals, every four hours, daily, every three days, once a week. Look at your environment and determine the best interval for your Linux workstations and Core Servers. There will probably be different settings for both. If using the default of placing a shell script to run an inventory scan in cron.daily does not meet your needs, and/or you are certain that you need to schedule a vulnerability scan, the following is an example of three alternate cron jobs: Send a hardware scan on boot Linux Workstations usually use DHCP over static IP addressing. The workstations may not get the same IP address every time. So to manage Linux Workstations, a scan containing their new IP address immediately should be sent after boot up. Otherwise, inventory will have the old IP address and connection attempts may fail. For Linux Servers, or any device with Static IP addressing, this cron job is unnecessary. Send a full scan every two days - Because the scanner does not do delta scans, you should do a full scan every other day instead of daily. For Linux Servers, a scan once a week may be enough. Run a vulnerability scan Mon Wed Fri Vulnerability scans only need to happen when you are vulnerable. If you have a good baseline image scanning from the Core Server only when new vulnerabilities are downloaded could be fine. However, some devices may be off when such a scan is pushed. So every other week day, a vulnerability scan could run. For Linux Servers, you may want to change this to once a week.

14 The following is a procedure to configure the above settings: Note: For large numbers of nodes, you would want to stagger you clients so they don t all send inventory scans to the Core Server at the exact same time. 1. From the Linux shell, as root or using sudo, run the following command: # crontab e Note: By default this opens the vi editor. The vi editor can seem complex at first and you may need to do a web search to find information on using it. A reference sheet for vi can be found by doing a web search for vi cheat sheet. Such a reference sheet can be found here: 2. Add the following lines to the crontab file: #Min Hour DayOfMon Month DayOfWeek Command * * */2 /usr/landesk/common/ldiscan.sh * * 1,3,5 /usr/landesk/ldms/ldiscan ntt f- For Linux Servers, you may choose to use different settings that run these tasks less often: #Min Hour DayOfMon Month DayOfWeek Command * * 0 /usr/landesk/common/ldiscan.sh 30 1 * * 1 /usr/landesk/ldms/vulscan 3. Close and save the file. To close, press ESC. Then hold down Shift and press :. Now type wq! and hit enter. This command sequence should close the file. Deploying a cron Configuration as a Scheduled Task Deploying a cron configuration involves the following processes: Creating the crontab file on a Linux device Placing the crontab file on a web share Create a Custom Script to do the following o Transferring the crontab file to the Linux agents o Installing the crontab file

15 The following example demonstrates this: 11. On a Linux device, create a crontab file by opening vi or another editor and writing the file. For this example the file will be assumed to have the following name: LANDeskCrontab Note: It is best to write the file using an editor on a Linux platform instead of a windows editor because the new line characters are different on Linux than on Windows and this could potentially cause problems. 1. Copy the LANDeskCrontab file to a web share. 2. In the Management Suite Console, click Tools Distribution Manage Scripts. 3. Create a New Custom Script. This opens a LANDesk Custom Script in notepad. 4. Delete all the default lines and add the following lines: [MACHINES_LINUX] ; Download the crontab file REMEXEC0=/usr/bin/wget -O /tmp/landeskcrontab, STATUS SYNC ; Install the crontab file REMEXEC1=/usr/bin/crontab /tmp/landeskcrontab, STATUS SYNC ; Clean up by deleting the crontab file REMEXEC2=rm -f /tmp/landeskcrontab, STATUS SYNC 4. Save the file with an appropriate name such as Install Linux Workstation crontab and make sure the extension is.ini. Make sure it does not save with the.txt extension. If it does, remove the.txt extension. The script now appears in the Manage Scripts window. 12. Right-click on the new Managed Script and choose Schedule. 13. Drag the Linux devices and schedule the task. 14. Right-click on the task and choose start now. The crontab should now be installed.

16 Configuring the LANDesk Inventory Scanner for Linux Inventory scans use a configuration file. On Linux, this file is stored at: /etc/ldadppl.conf The following is an example of this default file without the comments, to show how it has not been configured. It is completely up to the LANDesk administrator to deploy a separate ldappl.conf if desired. Currently the default ldappl.conf cannot be changed. You must change it after the agent is installed. [LANDesk Inventory] Version=2.0 Revision=8.10a Duplicate=ON Mode=Listed [Applications] [Excluded Applications] [Ignore] [Excluded Ignore] It is up to you to determine what you want to scan and what you don t want to scan on your Linux Agents. No assumptions whatsoever are made by default. This following is a copy of the default file with the comments. As it standard with Linux configuration files, the comments are included so that the configuration file is self documenting: [LANDesk Inventory] ; Revision is the revision number of the ldappl file. Version=2.0 Revision=8.10a ; Duplicate can be ON or OFF. If ON any applications that are found more ; than once by the scanners will be entered into the database. If set to ; OFF, the scanners will only find the application once. Duplicate=ON ; Here indicate the configuration text files to scan for. Start with ; ConfFile1 and increment by one for each conf file. Don't skip any ; numbers. Note that full file paths need to be specified. ;ConfFile1=/etc/smb.conf ;ConfFile2=/etc/foo.conf ;ConfFile3=/etc/bar.conf ; Directory exclusion directives. There can be only 1 item per line. ; Enumeration of "ExcludeDir" must start at 1 and be continuous. ; Don't skip any numbers. Ending "/" is required. ;ExcludeDir1=/var/ ;ExcludeDir2=/net/ ; Directory inclusion directives. There can be only 1 item per line. ; Enumeration of "IncludeDir" must start at 1 and be continuous. ; Don't skip any numbers. Ending /" is required. ;IncludeDir1=/opt/

17 ;IncludeDir2=/tmp/ ; Special directive to support binary lookups on files only. ; Normally, the scanner will only check to see if the ; executable flag is set for the file. The FileMode flag ; changes this behavior. With the FileMode flag set to ; Binary, the scanner will run the file command on each ; file it encounters to determine if the file is binary. ; This WILL slow down the software scan. If the FileMode ; is not set, or does not exist, the scanner will operate ; normally and just check for the executable bit. ;FileMode=binary ; There are three modes supported. Listed, Unlisted, and All. A brief ; description of each mode: : ; Listed - In this mode, only executable files that are listed in the ; ldappl.conf file will be collected. This means that if there is an executable ; that is not listed in this file, the inventory will not have any data ; pertaining to that executable. ; ; Unlisted - In this mode, only executables with an unknown file name will be ; collected. This mode can be used to send all unknown executable names to a ; text file (using the -o command line option) that can then be used to add ; entries to the ldappl.conf file. If the data is sent to the inventory server, ; the application name will be the file name. The version number will be the ; file size. ; ; All - This mode is a combination of Listed and Unlisted as detailed above. ; ;Mode=Unlisted ;Mode=All Mode=Listed ;Format for describing software is: ;<I>,BinaryName,FileSize,English Name,Version ;Currently <I> is the only option supported with Linux and Unix scanners. The ;<p> and <f> options are reserved for the Win32 scanner. [Applications] ;USERADD above, BASE below ;Here are some examples. The size must be at least three digits long. For example, ;a 10 byte file would be entered as: ;<I>,foo,010,foo application,version 123 ;<I>,arch,2864,arch application,redhat 5.2 ;<I>,ash,62660,ash application,redhat 5.2 ;<I>,ash.static,153752,ash.static application,redhat 5.2 ;<I>,userd,35603,Intel Remote Control Agent for Linux (libc5),6.3 ;<I>,userd,39553,Intel Remote Control Agent for Linux (libc6),6.3 ;<I>,ldiscnlx,70897,Intel Inventory Scanner for Linux (libc5),6.3 ;<I>,ldiscnlx,71239,Intel Inventory Scanner for Linux (libc5),6.3 ;<I>,ldiscnux,136108,Intel Inventory Scanner for Linux,6.6 [Excluded Applications] ;Use this section to temporarily move a file out of the Applications section

18 ;USERADD above, BASE below [Ignore] ;USERADD above, BASE below ;Following is a example of how to exclude a file ;<I>,vi [Excluded Ignore] ;Use this section to temporarily move a file out of the Ignore section ;USERADD above, BASE below The following is an example of a customized ldappl.conf file: [LANDesk Inventory] Version=2.1 Revision= Duplicate=ON ConfFile1=/etc/resolv.conf ConfFile2=/etc/cdrecord.conf ConfFile3=/etc/dhclient-eth0.conf ConfFile4=/etc/dhcp6c.conf ConfFile5=/etc/grub.conf ConfFile6=/etc/host.conf ConfFile7=/etc/nsswitch.conf ConfFile8=/etc/ntp.conf ConfFile9=/etc/resolv.conf ConfFile10=/etc/sysctl.conf ConfFile11=/etc/syslog.conf ConfFile12=/etc/xinetd.conf ConfFile13=/etc/yum.conf ConfFile14=/etc/X11/xorg.conf ConfFile15=/etc/cups/cupsd.conf ConfFile16=/etc/cups/printers.conf ConfFile17=/etc/samba/smb.conf ConfFile18=/etc/wpa_supplicant/wpa_supplicant.conf ConfFile19=/etc/httpd/conf/httpd.conf ExcludeDir1=/var/db ExcludeDir2=/var/log ExcludeDir3=/tmp/ ExcludeDir4=/root/ Mode=Listed [Applications] [Excluded Applications] [Ignore] [Excluded Ignore]

19 Enabling Inventory Scanning of BIOS Information for Linux Workstations By default the Linux Agent for workstations does not include the files necessary to scan the BIOS. However, the Linux Server Agent does include those files, so the following steps are not necessary on Linux Servers. It is better to not install the Linux Server Agent to workstations. Instead, it is better to install the Linux Agent and add the needed software for BIOS scanning post installation. Two additional RPMs are needed to scan BIOS information. They are: ldsmbios smbase These two RPMs can be extracted from the monitoring.tar.gz file and deployed as an RPM distribution package. These steps are described below: 1. Browse to \\CoreServer\ldlogon\unix\linux. 2. Using a zip utility, extract the monitoring.tar.gz file. Note: Some zip utilities can unzip and extract the tar file in one step, but some utilities will require two steps where you have to first unzip the file and then you have to extract the tar file. Once extracted, both the ldsmbios and the smbase RPMs should be visible. 3. Copy these RPMs to a Web share. 4. From the Management Suite Console, click Tools Distribution Distribution Packages. 5. Right-click Public packages and click New Linux Package (it must be a public package). 6. Type a name and a description for the package. 7. For the primary file, enter the Web share path to the smbase RPM. 8. Save the Distribution Package. 9. Repeat the steps to create an RPM distribution package for ldsmbios, however, before saving it, also configure the ldsmbios package to have a dependency of the smbase package. 10. Deploy the ldsmbios RPM distribution package (which will install both RPMs since smbase was configured as a dependency). 11. Run an Inventory scan. BIOS information is now obtained by the Inventory scan. Using Patch Manager with Linux Agents Patch Manager can be used with both Linux workstations and Linux servers. There are two parts to a patch and each part is downloaded separately and differently. The two parts are:

20 The vulnerability content This is the information needed to detect if a machine is vulnerable, such as the detection rules. The software patch This is the actual software installer (usually and RPM for Linux) that repairs the vulnerability found by a detection rule. Downloading vulnerability content does not necessarily download the software patch. These are two different downloads and are both handled differently. Sometimes the ability to repair a detection rule is included in the detection rule. For example, if a detection rule can be repaired with a shell script and no binary files need to be replaced, then the shell script is usually included as part of the detection rule and no software patch is needed. Downloading Linux Patch Vulnerability Content To download Security and Patch information for Linux, perform the following: 1. In the Management Suite Console, click Tools Security Security and Patch Manager. 2. Click the Download updates icon (first icon) in the Security and Patch Manager tool bar to bring up the Download updates window. 3. Under the Updates tab, under Definition types, check the boxes for each Red Hat and SUSE definition type options. 4. Uncheck all other Definition type options. 5. Under the Languages field, check the appropriate languages. 6. Click the appropriate server from the Select update source site drop-down menu. 7. Leave the other settings as defaults. 8. Click the Update Now button. The vulnerability content will now be downloaded. Downloading the Linux Patch Software If you go back to the Download updates window, and look at the Download patches option, you will see that by default it is checked and the download option for detected definitions only is the default option selected. This will download any patch as long as the patch is autodownloadable. The problem with Linux patches is that most are NOT autodownloadable. Because of the Red Hat and SUSE license agreements, and the fact that a login is required to download their patches, the Linux patch software is not auto-downloadable. For Linux patches, you must manually download the patches and place them in your Patch Location. For example, for Red Hat, you would have to have a service contract and a user name and password to log into Alternately if you have a repository, you can copy these patches from a local repository. Note: In the future LANDesk Software intends on integrating with the Linux operating system s default software update technology such as YUM for Red Hat.

21 Scheduling Daily Vulnerability Downloads You may want to check for new vulnerability content daily without having to manually perform the task. You can schedule the Download updates process. To schedule the Download updates process, follow the steps in the Download Linux Patch Vulnerability Content procedure and click Schedule Update in step 8. A window appears showing you the options you have chosen and allows you to give the task a descriptive name. Provide a very descriptive name and click OK. Note: It is a good idea to screen shot this window. Once the task is created, there is currently no way to see what settings the task was originally configured with. A Scheduled task Properties window opens with two different pages in a tree view. The Overview Page and the Scheduled task page. The Overview page allows you to choose the owner of the task and whether to show the task in common tasks. The Schedule task page allows you to schedule when this task will run. It is common to configure this task to Start later, sometime between 10:00 pm and 5:00 am and repeat every day. Filtering Patch Content Often Windows, Macintosh, and Linux devices are all being managed by the same Core Server. If looking at Patch content, and patches for all these device types are showing, it can be difficult to sort through and find the Linux patches. LANDesk Software has provided the filter feature to allow you to configure a filter to only show the patches for a specific platform at a time. When in the Console and looking at the Security and Patch Manager pane, there is a filter dropdown menu on the right of the menu bar. To configure a filter, perform the following: 1. In the Management Suite Console, click Tools Security Security and Patch Manager. 2. Click Manage Filters from the Filter drop-down menu ( right of the Security and Patch Manager pane s menu bar). 3. On the Manage Filters, click New to open the Filter Properties window. 4. Type a name. For this example, Red Hat 5 will be used. 5. Check the Filter operating systems checkbox.

22 6. Check the checkboxes only for the regular non-64 bit Red Hat 5 platforms. There are only two items as shown below: 7. Click OK to save and close the Filter Properties window. 8. On the Manage Filters windows, verify that the new Red Hat 5 filter is highlighted. 9. Click Use Filter to close and use the newly created filter. The patches are now filters to only show Red Hat 5 patches. 10. Repeat the above steps to make any filters for your company. Creating a Custom Vulnerability You may want to create your own custom vulnerability and have Management Suite see who is vulnerable and allow you to run a shell script to fix it.

23 Note: This feature is available by default in any versions starting with 8.8 SP3 and 9.0. If on 8.8 SP2 or SP2a, apply this patch: PAT Provide the ability to run shell scripts in place of VBScripts when using Linux Platforms. Earlier versions do not have this feature. This patch will be included in any future versions, such as 8.8 and 9.0. To demonstrate this feature, imagine you have an update you need to make to your hosts file and you want to create a custom vulnerability that will look for a line in the hosts file and if it is not there, add it. Follow thi procedure to make this happen: 1. On a Linux computer write and test a shell script that returns an exit code of 0 if the hosts file has the new line, and an exit code of 1 if the hosts file does not have the new line. The following is an example script: DetectHostsEntry.sh #!/bin/sh if cat /etc/hosts grep /etc/hosts grep MyServer then # Device is NOT vulnerable. The hosts file is correct. exit 0; else # Device is vulnerable. The hosts file is not correct. exit 1; fi Note: Do not be confused by the return codes. The shell script must be written with the following information about the return codes in mind: exit 0 = Not vulnerable exit 1 = Vulnerable 2. On a Linux computer write and test a shell script that adds the new line to /etc/hosts. The following is an example script.

24 AddHostEntry.sh #!/bin/sh echo e \\tServerName exit 0 3. In the Management Suite console, click Tools Security Security and Patch Manager. 4. Before starting the Custom definition, under Type choose Custom Definitions and under Filter, click All items. 5. Click the Create custom definition icon (fourth from the left on the menu bar). A sample ID is generated. This can be changed to a value that more clearly defines the patch, such as Fix_hosts_file. 6. Enter a title such as the following: This makes sure the /etc/hosts file is up to date. 7. Configure the Severity as desired or leave the defaults. 8. Verify that the Status is set to Scan. 9. Create a rule by clicking the Add button at the bottom left of the window. 10. In the Properties for Rule 1 window, change the name to be something more descriptive, such as Check hosts for MyServer. 11. Add any comments if desired or leave the Comments field blank. 12. On the left tree list, click Affected Platforms. 13. CLick the desired Linux platform checkboxes. For this example, click the Red Hat platform checkbox. 14. On the left tree list, click Custom Script. 15. Enter a description if desired, or leave this field blank. 16. In the Script Content field, paste in the text from the DetectHostsEntry.sh script.

25 17. On the left tree list, click Patch Information. 18. Click This issue can be repaired without downloading a patch from the drop down menu. 19. For Requires reboot, click No. 20. For Silent install, click Yes. 21. On the left tree list, click Patch Install Commands. 22. Add a command by clicking the Add button. 23. CLick Run script from the drop down menu and click Ok. 24. A text field now appears. Paste the text from the AddHostEntry.sh file. Note: The text field will prompt for a VBScript, but do not be confused, even though it is prompting for a VBScript, this is the proper location to enter shell scripts for Linux custom vulnerabilities. 25. Click OK to save and close the rule. 26. Click OK again to save and close the custom vulnerability. 27. Right-click the vulnerability and click Repair. 28. Check only the Repair as a scheduled task option, leave all other options as defaults. 29. Click OK. 30. Drag your Linux device to the Scheduled task. 31. Right-click the task and click Start now. 32. Wait for the task to finish.

26 Note: The task should come back as successful, however, this does not mean the fix was applied. Linux vulscan does not scan and fix in one task. If the vulnerability was already detected prior to running this task, the fix will be applied. However, if the vulnerability was not already detected when successful the first time, the target device has only scanned for the vulnerability and has not applied the vulnerability. If you find the device in All devices, right-click it, and click Security and Patch Information, if the machine is vulnerable and did not repair, you will see this vulnerability under Detected Custom Definitions. The task must be launched as second time to repair the vulnerability. 33. Right-click the task and click Properties. 34. On the tree view on the left, click Schedule task. 35. Click the Start now radio button. 36. Click All from the Schedule these devices drop down menu. 37. Click Save to close the Scheduled tasks. Properties window and to start the task on all devices, including those that already show successful. 38. Wait for the task to finish. Note: The task should come back successful, and for this second deployment of this task, it should have repaired the vulnerability because the If you find the device in All devices, right-click it, and click Security and Patch Information, if the machine has repaired, you will no longer see this vulnerability under Detected Custom Definitions. However, you should see the patch under Clean/Repair History. However, if you clear your history, this information will not be available. If you want to enhance the custom definition, you could configure it to detect Installed Patches, that way, even if you clear your history, it will be possible to verify that this patch was installed by looking at Installed Patches. Your device should now be patched.

27 Uninstalling the Linux Agent Open a shell on the Linux Server or Workstation. This can be done either directly on the Linux Server or Workstation or by connecting via SSH. As root, or using sudo, run the following commands from the shell: 1. From the Core Server, mount a drive to the ldmain share. # mkdir /mnt/ldmain # mount t cifs o username=user,workgroup=domain \ //Core/ldmain /mnt/ldmain Note: On older Linux platforms cifs may need to be replaced with smbfs. 2. Copy the Linux uninstaller locally. # cp /mnt/ldmain/linuxuninstall.tar.gz /tmp 3. Extract linuxuninstall.tar.gz. # cd /tmp # tar -xzf linuxuninstall.tar.gz 4. Run the extracted uninstaller (the command is case sensitive). #./linuxuninstall.sh f ALL Note: For more uninstall options, run linuxuninstall.sh with the following parameter: #./linuxuninstall.sh -? Software Distribution Management Suite supports deploying RPMs to Linux agents. Currently only RPM deployment is supported. However, you can configure dependent packages if required. Other package types, such as.deb are not yet supported as a Distribution Package. Deploying RPMs Deploying an RPM with Management Suite can be done following this process:

28 Place the RPM on a Web share. Create a Distribution Package Create a Scheduled Task To Deploy an RPM, perform the following steps: Step 1 Place the RPM on a Web Share 1. Obtain a copy of the RPM. RPMs can come a CD, such as the Red Hat installation media or it can come from many different online sites. 2. Place the RPM on a Web share in the Core Server s ldlogon directory Note: If you do not have a Web share you know of, don t worry. The Core Server has a Web share by default. There is a folder in ldlogon called RPMS. Place you RPM files in that folder. Be aware that while you can use your Core Server as a package server, it is recommended that you have a separate package server so your Core Server doesn t suffer additional load. Step 2 Create a Distribution Package 1. From the Management Suite Console, click Tools Distribution Distribution Packages. 2. Right-click Public packages and click New Linux Package (it must be a public package). 3. Give the package a name and a description. 4. For the primary file, enter the Web share path to the RPM file. This would be something like the following: 5. Click Save. At this point the RPM is parsed and its dependencies are displayed in a window. Some of these dependencies are going to already exist on all you workstation. 6. Check the checkbox next to any dependencies that all of your Linux systems are sure to have. 7. Click Ok to finish. The Distribution Package is now created. Step 3 Create a Scheduled Task 1. From the Management Suite Console, click Tools Distribution Scheduled Tasks.

29 2. Right-click My Tasks and click Create Software Distribution Task. 3. Click the desired Distribution Package. 4. Click the desired Delivery Method. 5. Click Save. 6. Add the target devices to the task either by dragging devices or a by dragging a query to the task. 7. Right-click the task and click Start Now. Running Custom Scripts Custom Script functionality is available for Linux Agents and a lot of functionality can be obtained through these as they are very customizable. A good example of a Custom Script that works with Linux can be found be looking at the bottom of an Inventory Scanner script. You can see that the following script ran an inventory scan regardless of the platform, but for each platform, it does this a different way. [MACHINES_LINUX] REMEXEC1=/usr/LANDesk/ldms/ldiscan -ntt=%server%:5007 Deploying a Shell Script as a Custom Script A shell script can be deployed with LANDesk Management Suite. The process is to download the shell script, run the shell script, and then clean up by deleting the shell script. To deploy a Shell Script as a Custom Script do the following: 1. Place the shell script on a Web share. 2. In the Management Suite Console, click Tools Distribution Manage Scripts. 3. Create a New Custom Script. This opens a LANDesk Custom Script in the default editor for.ini files. 4. Delete all of the default lines and add the following lines:

30 [MACHINES_LINUX] ; Download thefile REMEXEC0=/usr/bin/wget -O /tmp/testfile.sh, STATUS SYNC ; Make the file executable REMEXEC1=/bin/chmod +x /tmp/testfile.sh, STATUS SYNC ; Execute the shell script REMEXEC2=/tmp/testfile.sh, STATUS SYNC ; Clean up after ourselves by deleting the shell script REMEXEC3=rm -f /tmp/testfile.sh, STATUS SYNC 5. Save the file with an appropriate name and make sure the extension is.ini. 6. Verify that it does not save with the.txt extension. The script now appears in the Manage Scripts window. 7. Right-click the new Managed Script and click Schedule. 8. Drag the Linux devices and schedule the task. 9. Right-click the task and click Start now. The custom script is now scheduled and running. Imaging Linux Agents Imaging a Linux system could take hundreds of pages on its own, however, the attempt here is to highlight some key points that can help you take your imaging process model and implement it with LANDesk Management Suite. Provisioning or OS Deployment can be used, but this document will only cover OS Deployment. Windows PE or Linux PE? Linux PE and Windows PE can both be used to image Linux. Just because you are imaging Linux does not mean you have to use Linux PE. In fact, Windows PE may actually work better. A lot of production hardware requires very new drivers for network cards and drive controllers. Linux PE is a stripped down Linux build and is very difficult to alter. Adding drivers cannot be done in any easy manner. However, it can read EXT3 file systems without a problem. However, in Windows PE it is really easy to manage drivers, but by default, it is not going to be able to read your EXT2/3 file systems. There are Windows drivers to read EXT2/3, ReiserFS that you may be able to find and add yourself.

31 Preparing a Base Image A lot of thought should go into a base image. There are many items to consider. Some will be discussed in the following subsections. Software on the Base Image When creating a base image it is important to list all possible software that could be used in your environment and decide which software should be included on the image and which software should be left off the image and installed post-imaging. It is also important to determine any software (such as the LANDesk agent) that has data that must be unique on each agent. This software should be installed post-imaging. Some software allows you to delete the unique data and it will regenerate. It is not supported to put the agent on an image. LANDesk Software recommends installing the agent configuration after imaging. This avoids issues that may occur with our unique Device ID, as well as prevents any issues upgrading the agent that may make the image unusable. There also may be unexpected results using older agents with newer Core Servers. If the agent is not on your base image, then when you upgrade the Core Server, you do not have to upgrade your base image. If you must add the agent to the base image, even though it is not supported, you must remove the Device ID value from the /etc/ldiscnux.conf before creating the image. IP Address Configuration Multiple machines cannot exist on the same network with the same IP address. Any static IP address should be removed and the image should be configured for DHCP. This way the name and IP address will not be identical between imaged devices. If static IP addressing is desired, more work is involved. Somehow, you will have to create a process to map each Linux device to an IP address and change the IP address post-imaging. Host Name Multiple machines cannot exist on the same network with the same hostname. That means that if you image multiple devices at the same time, they should not have the same hostname. In Linux, the hostname can be managed via DHCP, which can make imaging much easier because the image process does not have to name the computers. Patching It is a good idea to decide what patches you plan to have on your base image. The more patches on your base image now, the less you will have to deploy later. It is also easier to manage future patches if the base image is up to date. Capturing the Base Image To capture a base image, perform the following: 1. Use Provisioning or OS Deployment to create an image capture process.

32 2. PXE boot the Linux device or create a Windows PE or Linux PE ISO or USB drive and boot from it. 3. Run the Capture Script or manually map a drive and run the imaging tool to capture the drive to the mapped drive. Tip: Create a capture script in OS Deployment using the GUI. The GUI designs the script for windows, but for a capture script, there is little difference between capturing an image of a windows drive or a Linux drive. Deployment Whether you use OS Deployment or Provisioning, you are going to have to do some advanced customization for the image deployment as there is not a wizard to create a Linux specific imaging process for you. To deploy a base image, perform the following 1. Use Provisioning or OS Deployment to create an image deployment process. 2. PXE boot the Linux device or create a Windows PE or Linux PE ISO or USB drive and boot from it. 3. Run the Deploy Script or manually map a drive and run the imaging tool to deploy the image. Tip: Create a deployment script in OS Deployment using the GUI. The GUI designs the script for windows, but once created, the windows commands can be easily removed or replaced with tasks needed for your Linux imaging process.

Intelligent Power Protector User manual extension for Microsoft Virtual architectures: Hyper-V 6.0 Manager Hyper-V Server (R1&R2)

Intelligent Power Protector User manual extension for Microsoft Virtual architectures: Hyper-V 6.0 Manager Hyper-V Server (R1&R2) Intelligent Power Protector User manual extension for Microsoft Virtual architectures: Hyper-V 6.0 Manager Hyper-V Server (R1&R2) Hyper-V Manager Hyper-V Server R1, R2 Intelligent Power Protector Main

More information

IBM WebSphere Application Server Version 7.0

IBM WebSphere Application Server Version 7.0 IBM WebSphere Application Server Version 7.0 Centralized Installation Manager for IBM WebSphere Application Server Network Deployment Version 7.0 Note: Before using this information, be sure to read the

More information

Monitoring Clearswift Gateways with SCOM

Monitoring Clearswift Gateways with SCOM Technical Guide Version 01 28/11/2014 Documentation Information File Name Document Author Document Filename Monitoring the gateways with _v1.docx Iván Blesa Monitoring the gateways with _v1.docx Issue

More information

Dell UPS Local Node Manager USER'S GUIDE EXTENSION FOR MICROSOFT VIRTUAL ARCHITECTURES Dellups.com

Dell UPS Local Node Manager USER'S GUIDE EXTENSION FOR MICROSOFT VIRTUAL ARCHITECTURES Dellups.com CHAPTER: Introduction Microsoft virtual architecture: Hyper-V 6.0 Manager Hyper-V Server (R1 & R2) Hyper-V Manager Hyper-V Server R1, Dell UPS Local Node Manager R2 Main Operating System: 2008Enterprise

More information

Deploying System Center 2012 R2 Configuration Manager

Deploying System Center 2012 R2 Configuration Manager Deploying System Center 2012 R2 Configuration Manager This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED, OR STATUTORY, AS TO THE INFORMATION IN THIS DOCUMENT.

More information

Kaspersky Endpoint Security 8 for Linux INSTALLATION GUIDE

Kaspersky Endpoint Security 8 for Linux INSTALLATION GUIDE Kaspersky Endpoint Security 8 for Linux INSTALLATION GUIDE A P P L I C A T I O N V E R S I O N : 8. 0 Dear User! Thank you for choosing our product. We hope that this documentation will help you in your

More information

Freshservice Discovery Probe User Guide

Freshservice Discovery Probe User Guide Freshservice Discovery Probe User Guide 1. What is Freshservice Discovery Probe? 1.1 What details does Probe fetch? 1.2 How does Probe fetch the information? 2. What are the minimum system requirements

More information

LANDesk Management Suite 9.0. Getting started with Patch Manager

LANDesk Management Suite 9.0. Getting started with Patch Manager LANDesk Management Suite 9.0 Getting started with Patch Manager DOWNLOAD PATCH CONTENT TO THE CORE SERVER INTRODUCTION This document is intended to assist LANDesk Management Suite administrators with implementing

More information

Smart Cloud Integration Pack. For System Center Operation Manager. v1.1.0. User's Guide

Smart Cloud Integration Pack. For System Center Operation Manager. v1.1.0. User's Guide Smart Cloud Integration Pack For System Center Operation Manager v1.1.0 User's Guide Table of Contents 1. INTRODUCTION... 6 1.1. Overview... 6 1.2. Feature summary... 7 1.3. Supported Microsoft System

More information

User Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream

User Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream User Manual Onsight Management Suite Version 5.1 Another Innovation by Librestream Doc #: 400075-06 May 2012 Information in this document is subject to change without notice. Reproduction in any manner

More information

CommandCenter Secure Gateway

CommandCenter Secure Gateway CommandCenter Secure Gateway Quick Setup Guide for CC-SG Virtual Appliance and lmadmin License Server Management This Quick Setup Guide explains how to install and configure the CommandCenter Secure Gateway.

More information

Online Backup Client User Manual Linux

Online Backup Client User Manual Linux Online Backup Client User Manual Linux 1. Product Information Product: Online Backup Client for Linux Version: 4.1.7 1.1 System Requirements Operating System Linux (RedHat, SuSE, Debian and Debian based

More information

Welcome to the QuickStart Guide

Welcome to the QuickStart Guide QuickStart Guide Welcome to the QuickStart Guide This QuickStart Guide provides the information you need to install and start using Express Software Manager. For more comprehensive help on using Express

More information

RecoveryVault Express Client User Manual

RecoveryVault Express Client User Manual For Linux distributions Software version 4.1.7 Version 2.0 Disclaimer This document is compiled with the greatest possible care. However, errors might have been introduced caused by human mistakes or by

More information

User Guide. Version 3.2. Copyright 2002-2009 Snow Software AB. All rights reserved.

User Guide. Version 3.2. Copyright 2002-2009 Snow Software AB. All rights reserved. Version 3.2 User Guide Copyright 2002-2009 Snow Software AB. All rights reserved. This manual and computer program is protected by copyright law and international treaties. Unauthorized reproduction or

More information

Note: With v3.2, the DocuSign Fetch application was renamed DocuSign Retrieve.

Note: With v3.2, the DocuSign Fetch application was renamed DocuSign Retrieve. Quick Start Guide DocuSign Retrieve 3.2.2 Published April 2015 Overview DocuSign Retrieve is a windows-based tool that "retrieves" envelopes, documents, and data from DocuSign for use in external systems.

More information

1. Installation Overview

1. Installation Overview Quick Install Guide 1. Installation Overview Thank you for selecting Bitdefender Business Solutions to protect your business. This document enables you to quickly get started with the installation of Bitdefender

More information

Pearl Echo Installation Checklist

Pearl Echo Installation Checklist Pearl Echo Installation Checklist Use this checklist to enter critical installation and setup information that will be required to install Pearl Echo in your network. For detailed deployment instructions

More information

Online Backup Client User Manual

Online Backup Client User Manual For Linux distributions Software version 4.1.7 Version 2.0 Disclaimer This document is compiled with the greatest possible care. However, errors might have been introduced caused by human mistakes or by

More information

safend a w a v e s y s t e m s c o m p a n y

safend a w a v e s y s t e m s c o m p a n y safend a w a v e s y s t e m s c o m p a n y SAFEND Data Protection Suite Installation Guide Version 3.4.5 Important Notice This guide is delivered subject to the following conditions and restrictions:

More information

Snow Inventory. Installing and Evaluating

Snow Inventory. Installing and Evaluating Snow Inventory Installing and Evaluating Snow Software AB 2002 Table of Contents Introduction...3 1. Evaluate Requirements...3 2. Download Software...3 3. Obtain License Key...4 4. Install Snow Inventory

More information

Local Caching Servers (LCS): User Manual

Local Caching Servers (LCS): User Manual Local Caching Servers (LCS): User Manual Table of Contents Local Caching Servers... 1 Supported Browsers... 1 Getting Help... 1 System Requirements... 2 Macintosh... 2 Windows... 2 Linux... 2 Downloading

More information

Moxa Device Manager 2.0 User s Guide

Moxa Device Manager 2.0 User s Guide First Edition, March 2009 www.moxa.com/product 2009 Moxa Inc. All rights reserved. Reproduction without permission is prohibited. Moxa Device Manager 2.0 User Guide The software described in this manual

More information

Configuring MailArchiva with Insight Server

Configuring MailArchiva with Insight Server Copyright 2009 Bynari Inc., All rights reserved. No part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any

More information

AlienVault Unified Security Management (USM) 4.x-5.x. Deploying HIDS Agents to Linux Hosts

AlienVault Unified Security Management (USM) 4.x-5.x. Deploying HIDS Agents to Linux Hosts AlienVault Unified Security Management (USM) 4.x-5.x Deploying HIDS Agents to Linux Hosts USM 4.x-5.x Deploying HIDS Agents to Linux Hosts, rev. 2 Copyright 2015 AlienVault, Inc. All rights reserved. AlienVault,

More information

Deploying BitDefender Client Security and BitDefender Windows Server Solutions

Deploying BitDefender Client Security and BitDefender Windows Server Solutions Deploying BitDefender Client Security and BitDefender Windows Server Solutions Quick Install Guide Copyright 2010 BitDefender; 1. Installation Overview Thank you for selecting BitDefender Business Solutions

More information

Online Backup Linux Client User Manual

Online Backup Linux Client User Manual Online Backup Linux Client User Manual Software version 4.0.x For Linux distributions August 2011 Version 1.0 Disclaimer This document is compiled with the greatest possible care. However, errors might

More information

Attix5 Pro Server Edition

Attix5 Pro Server Edition Attix5 Pro Server Edition V7.0.3 User Manual for Linux and Unix operating systems Your guide to protecting data with Attix5 Pro Server Edition. Copyright notice and proprietary information All rights reserved.

More information

Discovery Guide. Secret Server. Table of Contents

Discovery Guide. Secret Server. Table of Contents Secret Server Discovery Guide Table of Contents Introduction... 3 How Discovery Works... 3 Active Directory / Local Windows Accounts... 3 Unix accounts... 3 VMware ESX accounts... 3 Why use Discovery?...

More information

Introduction to Operating Systems

Introduction to Operating Systems Introduction to Operating Systems It is important that you familiarize yourself with Windows and Linux in preparation for this course. The exercises in this book assume a basic knowledge of both of these

More information

System Administration Training Guide. S100 Installation and Site Management

System Administration Training Guide. S100 Installation and Site Management System Administration Training Guide S100 Installation and Site Management Table of contents System Requirements for Acumatica ERP 4.2... 5 Learning Objects:... 5 Web Browser... 5 Server Software... 5

More information

1. Product Information

1. Product Information ORIXCLOUD BACKUP CLIENT USER MANUAL LINUX 1. Product Information Product: Orixcloud Backup Client for Linux Version: 4.1.7 1.1 System Requirements Linux (RedHat, SuSE, Debian and Debian based systems such

More information

LepideAuditor Suite for File Server. Installation and Configuration Guide

LepideAuditor Suite for File Server. Installation and Configuration Guide LepideAuditor Suite for File Server Installation and Configuration Guide Table of Contents 1. Introduction... 4 2. Requirements and Prerequisites... 4 2.1 Basic System Requirements... 4 2.2 Supported Servers

More information

Deploying BitDefender Client Security and BitDefender Windows Server Solutions

Deploying BitDefender Client Security and BitDefender Windows Server Solutions Deploying BitDefender Client Security and BitDefender Windows Server Solutions Quick Install Guide Copyright 2011 BitDefender 1. Installation Overview Thank you for selecting BitDefender Business Solutions

More information

25265 - SYSTEM ADMINISTRATION LAB

25265 - SYSTEM ADMINISTRATION LAB 25265 - SYSTEM ADMINISTRATION LAB Ex.NO:1 Installation of Windows Server 2003 AIM: To write Installation of Windows 2003 Server. PROCEDURE: To install Windows Server 2003: 1 Insert the Windows Server 2003

More information

Installing Operating Systems

Installing Operating Systems CHAPTER 6 The unattended operating system installation function helps you install the Microsoft Windows and RedHat Linux operating system families. UCS-SCU has integrated device drivers including RAID

More information

FREQUENTLY ASKED QUESTIONS

FREQUENTLY ASKED QUESTIONS FREQUENTLY ASKED QUESTIONS Secure Bytes, October 2011 This document is confidential and for the use of a Secure Bytes client only. The information contained herein is the property of Secure Bytes and may

More information

How To Set Up A Backupassist For An Raspberry Netbook With A Data Host On A Nsync Server On A Usb 2 (Qnap) On A Netbook (Qnet) On An Usb 2 On A Cdnap (

How To Set Up A Backupassist For An Raspberry Netbook With A Data Host On A Nsync Server On A Usb 2 (Qnap) On A Netbook (Qnet) On An Usb 2 On A Cdnap ( WHITEPAPER BackupAssist Version 5.1 www.backupassist.com Cortex I.T. Labs 2001-2008 2 Contents Introduction... 3 Hardware Setup Instructions... 3 QNAP TS-409... 3 Netgear ReadyNas NV+... 5 Drobo rev1...

More information

Consolidated Monitoring, Analysis and Automated Remediation For Hybrid IT Infrastructures. Goliath Performance Monitor Installation Guide v11.

Consolidated Monitoring, Analysis and Automated Remediation For Hybrid IT Infrastructures. Goliath Performance Monitor Installation Guide v11. Consolidated Monitoring, Analysis and Automated Remediation For Hybrid IT Infrastructures Goliath Performance Monitor Installation Guide v11.5 (v11.5) Document Date: March 2015 www.goliathtechnologies.com

More information

OnCommand Performance Manager 1.1

OnCommand Performance Manager 1.1 OnCommand Performance Manager 1.1 Installation and Setup Guide For Red Hat Enterprise Linux NetApp, Inc. 495 East Java Drive Sunnyvale, CA 94089 U.S. Telephone: +1 (408) 822-6000 Fax: +1 (408) 822-4501

More information

Actualtests.C2010-508.40 questions

Actualtests.C2010-508.40 questions Actualtests.C2010-508.40 questions Number: C2010-508 Passing Score: 800 Time Limit: 120 min File Version: 5.6 http://www.gratisexam.com/ C2010-508 IBM Endpoint Manager V9.0 Fundamentals Finally, I got

More information

CA arcserve Unified Data Protection Agent for Linux

CA arcserve Unified Data Protection Agent for Linux CA arcserve Unified Data Protection Agent for Linux User Guide Version 5.0 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as

More information

Using Symantec NetBackup with Symantec Security Information Manager 4.5

Using Symantec NetBackup with Symantec Security Information Manager 4.5 Using Symantec NetBackup with Symantec Security Information Manager 4.5 Using Symantec NetBackup with Symantec Security Information Manager Legal Notice Copyright 2007 Symantec Corporation. All rights

More information

Ekran System Help File

Ekran System Help File Ekran System Help File Table of Contents About... 9 What s New... 10 System Requirements... 11 Updating Ekran to version 4.1... 13 Program Structure... 14 Getting Started... 15 Deployment Process... 15

More information

AzMERIT Secure Browser Installation Manual For Technology Coordinators

AzMERIT Secure Browser Installation Manual For Technology Coordinators AzMERIT Secure Browser Installation Manual For Technology Coordinators 2014-2015 Revised January 5, 2015 Prepared by the American Institutes for Research Descriptions of the operation of the Test Information

More information

Appendix B Lab Setup Guide

Appendix B Lab Setup Guide JWCL031_appB_467-475.indd Page 467 5/12/08 11:02:46 PM user-s158 Appendix B Lab Setup Guide The Windows Server 2008 Applications Infrastructure Configuration title of the Microsoft Official Academic Course

More information

Cloud Storage Quick Start Guide

Cloud Storage Quick Start Guide Cloud Storage Quick Start Guide Copyright - GoGrid Cloud Hosting. All rights reserved Table of Contents 1. About Cloud Storage...3 2. Configuring RHEL and CentOS Servers to Access Cloud Storage...3 3.

More information

Installing and Configuring vcloud Connector

Installing and Configuring vcloud Connector Installing and Configuring vcloud Connector vcloud Connector 2.7.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new

More information

CA ARCserve D2D for Linux

CA ARCserve D2D for Linux CA ARCserve D2D for Linux User Guide r16.5 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation ) is for your

More information

System Area Manager. Remote Management

System Area Manager. Remote Management System Area Manager Remote Management Remote Management System Area Manager provides remote management functions for its managed systems, including Wake on LAN, Shutdown, Restart, Remote Console and for

More information

NovaBACKUP. User Manual. NovaStor / November 2011

NovaBACKUP. User Manual. NovaStor / November 2011 NovaBACKUP User Manual NovaStor / November 2011 2011 NovaStor, all rights reserved. All trademarks are the property of their respective owners. Features and specifications are subject to change without

More information

Deep Freeze and Microsoft System Center Configuration Manager 2012 Integration

Deep Freeze and Microsoft System Center Configuration Manager 2012 Integration 1 Deep Freeze and Microsoft System Center Configuration Manager 2012 Integration Technical Paper Last modified: May 2015 Web: www.faronics.com Email: sales@faronics.com Phone: 800-943-6422 or 604-637-3333

More information

Online Backup Client User Manual

Online Backup Client User Manual Online Backup Client User Manual Software version 3.21 For Linux distributions January 2011 Version 2.0 Disclaimer This document is compiled with the greatest possible care. However, errors might have

More information

Installation Overview

Installation Overview Contents Installation Overview... 2 How to Install Ad-Aware Management Server... 3 How to Deploy the Ad-Aware Security Solutions... 5 General Deployment Conditions... 5 Deploying Ad-Aware Management Agent...

More information

Virtual Appliances. Virtual Appliances: Setup Guide for Umbrella on VMWare and Hyper-V. Virtual Appliance Setup Guide for Umbrella Page 1

Virtual Appliances. Virtual Appliances: Setup Guide for Umbrella on VMWare and Hyper-V. Virtual Appliance Setup Guide for Umbrella Page 1 Virtual Appliances Virtual Appliances: Setup Guide for Umbrella on VMWare and Hyper-V Virtual Appliance Setup Guide for Umbrella Page 1 Table of Contents Overview... 3 Prerequisites... 4 Virtualized Server

More information

ACTIVE DIRECTORY DEPLOYMENT

ACTIVE DIRECTORY DEPLOYMENT ACTIVE DIRECTORY DEPLOYMENT CASAS Technical Support 800.255.1036 2009 Comprehensive Adult Student Assessment Systems. All rights reserved. Version 031809 CONTENTS 1. INTRODUCTION... 1 1.1 LAN PREREQUISITES...

More information

Aspera Connect User Guide

Aspera Connect User Guide Aspera Connect User Guide Windows XP/2003/Vista/2008/7 Browser: Firefox 2+, IE 6+ Version 2.3.1 Chapter 1 Chapter 2 Introduction Setting Up 2.1 Installation 2.2 Configure the Network Environment 2.3 Connect

More information

Contents. 1-10ZiG Manager. 2 - Thin Client Management. 1.1 - Configuring and Managing the Server. 1.1.1 - Server Settings. 1.1.2 - Network Settings

Contents. 1-10ZiG Manager. 2 - Thin Client Management. 1.1 - Configuring and Managing the Server. 1.1.1 - Server Settings. 1.1.2 - Network Settings Contents 1-10ZiG Manager 1.1 - Configuring and Managing the Server 1.1.1 - Server Settings 1.1.2 - Network Settings 1.1.3 - Ports Used 1.1.4 - Discovery Settings 1.1.5 - Advanced Settings 1.1.6 - Starting

More information

Global VPN Client Getting Started Guide

Global VPN Client Getting Started Guide Global VPN Client Getting Started Guide 1 Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your system. CAUTION: A CAUTION indicates potential

More information

Table of Contents. Introduction...9. Installation...17. Program Tour...31. The Program Components...10 Main Program Features...11

Table of Contents. Introduction...9. Installation...17. Program Tour...31. The Program Components...10 Main Program Features...11 2011 AdRem Software, Inc. This document is written by AdRem Software and represents the views and opinions of AdRem Software regarding its content, as of the date the document was issued. The information

More information

Sophos Enterprise Console Help. Product version: 5.1 Document date: June 2012

Sophos Enterprise Console Help. Product version: 5.1 Document date: June 2012 Sophos Enterprise Console Help Product version: 5.1 Document date: June 2012 Contents 1 About Enterprise Console...3 2 Guide to the Enterprise Console interface...4 3 Getting started with Sophos Enterprise

More information

Allworx OfficeSafe Operations Guide Release 6.0

Allworx OfficeSafe Operations Guide Release 6.0 Allworx OfficeSafe Operations Guide Release 6.0 No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, photocopy,

More information

Setting up VMware ESXi for 2X VirtualDesktopServer Manual

Setting up VMware ESXi for 2X VirtualDesktopServer Manual Setting up VMware ESXi for 2X VirtualDesktopServer Manual URL: www.2x.com E-mail: info@2x.com Information in this document is subject to change without notice. Companies, names, and data used in examples

More information

Backup & Disaster Recovery Appliance User Guide

Backup & Disaster Recovery Appliance User Guide Built on the Intel Hybrid Cloud Platform Backup & Disaster Recovery Appliance User Guide Order Number: G68664-001 Rev 1.0 June 22, 2012 Contents Registering the BDR Appliance... 4 Step 1: Register the

More information

HP Device Manager 4.6

HP Device Manager 4.6 Technical white paper HP Device Manager 4.6 Installation and Update Guide Table of contents Overview... 3 HPDM Server preparation... 3 FTP server configuration... 3 Windows Firewall settings... 3 Firewall

More information

XMap 7 Administration Guide. Last updated on 12/13/2009

XMap 7 Administration Guide. Last updated on 12/13/2009 XMap 7 Administration Guide Last updated on 12/13/2009 Contact DeLorme Professional Sales for support: 1-800-293-2389 Page 2 Table of Contents XMAP 7 ADMINISTRATION GUIDE... 1 INTRODUCTION... 5 DEPLOYING

More information

Table of Contents. CHAPTER 1 About This Guide... 9. CHAPTER 2 Introduction... 11. CHAPTER 3 Database Backup and Restoration... 15

Table of Contents. CHAPTER 1 About This Guide... 9. CHAPTER 2 Introduction... 11. CHAPTER 3 Database Backup and Restoration... 15 Table of Contents CHAPTER 1 About This Guide......................... 9 The Installation Guides....................................... 10 CHAPTER 2 Introduction............................ 11 Required

More information

ServiceDesk 7.1 Installation and Upgrade. ServiceDesk 7.1 Installation and Upgrade - Using Domain Service Credentials A Step by Step Guide

ServiceDesk 7.1 Installation and Upgrade. ServiceDesk 7.1 Installation and Upgrade - Using Domain Service Credentials A Step by Step Guide ServiceDesk 7.1 Installation and Upgrade - Using Domain Service Credentials A Step by Step Guide Contents ServiceDesk 7.1 Installation and Upgrade - Using Domain Service Credentials A Step by Step Guide...

More information

Exchange Server Backup and Restore

Exchange Server Backup and Restore WHITEPAPER BackupAssist Version 6 www.backupassist.com Cortex I.T. 2001-2007 2 Contents 1. Introduction... 3 1.1 Overview... 3 1.2 Requirements... 3 1.3 Requirements for remote backup of Exchange 2007...

More information

WhatsUp Gold v16.3 Installation and Configuration Guide

WhatsUp Gold v16.3 Installation and Configuration Guide WhatsUp Gold v16.3 Installation and Configuration Guide Contents Installing and Configuring WhatsUp Gold using WhatsUp Setup Installation Overview... 1 Overview... 1 Security considerations... 2 Standard

More information

Virtual Appliance for VMware Server. Getting Started Guide. Revision 2.0.2. Warning and Disclaimer

Virtual Appliance for VMware Server. Getting Started Guide. Revision 2.0.2. Warning and Disclaimer Virtual Appliance for VMware Server Getting Started Guide Revision 2.0.2 Warning and Disclaimer This document is designed to provide information about the configuration and installation of the CensorNet

More information

GE Healthcare Life Sciences UNICORN 5.31. Administration and Technical Manual

GE Healthcare Life Sciences UNICORN 5.31. Administration and Technical Manual GE Healthcare Life Sciences UNICORN 5.31 Administration and Technical Manual Table of Contents Table of Contents 1 Network setup... 1.1 Network terms and concepts... 1.2 Network environment... 1.3 UNICORN

More information

2. Boot using the Debian Net Install cd and when prompted to continue type "linux26", this will load the 2.6 kernel

2. Boot using the Debian Net Install cd and when prompted to continue type linux26, this will load the 2.6 kernel These are the steps to build a hylafax server. 1. Build up your server hardware, preferably with RAID 5 (3 drives) plus 1 hotspare. Use a 3ware raid card, 8000 series is a good choice. Use an external

More information

BMC FootPrints Asset Core - Asset Discovery. Version 11.7

BMC FootPrints Asset Core - Asset Discovery. Version 11.7 BMC FootPrints Asset Core - Asset Discovery Version 11.7 Legal Notices Copyright 1999, 2009 BMC Software, Inc. Copyright 1994-2013 Numara Software, Inc. BMC, BMC Software, and the BMC Software logo are

More information

FMAudit Local Agent Deployment Expectation Settings to Prepare Your Client IT Departments

FMAudit Local Agent Deployment Expectation Settings to Prepare Your Client IT Departments FMAudit Local Agent Deployment Expectation Settings to Prepare Your Client IT Departments Please review the Local Agent Best Practice Documents. They will explain how the Local Agent works and how to set

More information

Active Directory integration with CloudByte ElastiStor

Active Directory integration with CloudByte ElastiStor Active Directory integration with CloudByte ElastiStor Prerequisite Change the time and the time zone of the Active Directory Server to the VSM time and time zone. Enabling Active Directory at VSM level

More information

Portions of this product were created using LEADTOOLS 1991-2009 LEAD Technologies, Inc. ALL RIGHTS RESERVED.

Portions of this product were created using LEADTOOLS 1991-2009 LEAD Technologies, Inc. ALL RIGHTS RESERVED. Installation Guide Lenel OnGuard 2009 Installation Guide, product version 6.3. This guide is item number DOC-110, revision 1.038, May 2009 Copyright 1992-2009 Lenel Systems International, Inc. Information

More information

Moxa Device Manager 2.3 User s Manual

Moxa Device Manager 2.3 User s Manual User s Manual Third Edition, March 2011 www.moxa.com/product 2011 Moxa Inc. All rights reserved. User s Manual The software described in this manual is furnished under a license agreement and may be used

More information

Reflection DBR USER GUIDE. Reflection DBR User Guide. 995 Old Eagle School Road Suite 315 Wayne, PA 19087 USA 610.964.8000 www.evolveip.

Reflection DBR USER GUIDE. Reflection DBR User Guide. 995 Old Eagle School Road Suite 315 Wayne, PA 19087 USA 610.964.8000 www.evolveip. Reflection DBR USER GUIDE 995 Old Eagle School Road Suite 315 Wayne, PA 19087 USA 610.964.8000 www.evolveip.net Page 1 of 1 Table of Contents Overview 3 Reflection DBR Client and Console Installation 4

More information

4cast Client Specification and Installation

4cast Client Specification and Installation 4cast Client Specification and Installation Version 2015.00 10 November 2014 Innovative Solutions for Education Management www.drakelane.co.uk System requirements The client requires Administrative rights

More information

Desktop Surveillance Help

Desktop Surveillance Help Desktop Surveillance Help Table of Contents About... 9 What s New... 10 System Requirements... 11 Updating from Desktop Surveillance 2.6 to Desktop Surveillance 3.2... 13 Program Structure... 14 Getting

More information

InventoryControl for use with QuoteWerks Quick Start Guide

InventoryControl for use with QuoteWerks Quick Start Guide InventoryControl for use with QuoteWerks Quick Start Guide Copyright 2013 Wasp Barcode Technologies 1400 10 th St. Plano, TX 75074 All Rights Reserved STATEMENTS IN THIS DOCUMENT REGARDING THIRD PARTY

More information

2X ApplicationServer & LoadBalancer Manual

2X ApplicationServer & LoadBalancer Manual 2X ApplicationServer & LoadBalancer Manual 2X ApplicationServer & LoadBalancer Contents 1 URL: www.2x.com E-mail: info@2x.com Information in this document is subject to change without notice. Companies,

More information

Setting up VMware Server v1 for 2X VirtualDesktopServer Manual

Setting up VMware Server v1 for 2X VirtualDesktopServer Manual Setting up VMware Server v1 for 2X VirtualDesktopServer Manual URL: www.2x.com E-mail: info@2x.com Information in this document is subject to change without notice. Companies, names, and data used in examples

More information

EVault for Data Protection Manager. Course 361 Protecting Linux and UNIX with EVault

EVault for Data Protection Manager. Course 361 Protecting Linux and UNIX with EVault EVault for Data Protection Manager Course 361 Protecting Linux and UNIX with EVault Table of Contents Objectives... 3 Scenario... 3 Estimated Time to Complete This Lab... 3 Requirements for This Lab...

More information

SPECOPS DEPLOY / OS 4.6 DOCUMENTATION

SPECOPS DEPLOY / OS 4.6 DOCUMENTATION Technical documentation: SPECOPS DEPLOY / OS 4.6 DOCUMENTATION By Shay Byrne, Product Manager 1 Getting Started... 4 1.1 Specops Deploy / OS Supported Configurations...4 1.2 Specops Deploy and Active Directory...

More information

The Barracuda Network Connector. System Requirements. Barracuda SSL VPN

The Barracuda Network Connector. System Requirements. Barracuda SSL VPN Barracuda SSL VPN The Barracuda SSL VPN allows you to define and control the level of access that your external users have to specific resources inside your internal network. For users such as road warriors

More information

LANDesk Management Suite 9. Best Practices for Agent Configuration and Deployment (BKM)

LANDesk Management Suite 9. Best Practices for Agent Configuration and Deployment (BKM) LANDesk Management Suite 9 Best Practices for Agent Configuration and Deployment (BKM) Revision 1.00 Don White Dec 10, 2009 Copyright 2002-2009 Avocent Corporation. All rights reserved. Avocent, LANDesk,

More information

Universal Management Service 2015

Universal Management Service 2015 Universal Management Service 2015 UMS 2015 Help All rights reserved. No parts of this work may be reproduced in any form or by any means - graphic, electronic, or mechanical, including photocopying, recording,

More information

Installing Booked scheduler on CentOS 6.5

Installing Booked scheduler on CentOS 6.5 Installing Booked scheduler on CentOS 6.5 This guide will assume that you already have CentOS 6.x installed on your computer, I did a plain vanilla Desktop install into a Virtual Box VM for this test,

More information

McAfee Asset Manager Console

McAfee Asset Manager Console Installation Guide McAfee Asset Manager Console Version 6.5 COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection,

More information

Installation Guide. . All right reserved. For more information about Specops Deploy and other Specops products, visit www.specopssoft.

Installation Guide. . All right reserved. For more information about Specops Deploy and other Specops products, visit www.specopssoft. . All right reserved. For more information about Specops Deploy and other Specops products, visit www.specopssoft.com Copyright and Trademarks Specops Deploy is a trademark owned by Specops Software. All

More information

NetIQ. How to guides: AppManager v7.04 Initial Setup for a trial. Haf Saba Attachmate NetIQ. Prepared by. Haf Saba. Senior Technical Consultant

NetIQ. How to guides: AppManager v7.04 Initial Setup for a trial. Haf Saba Attachmate NetIQ. Prepared by. Haf Saba. Senior Technical Consultant How to guides: AppManager v7.04 Initial Setup for a trial By NetIQ Prepared by Haf Saba Senior Technical Consultant Asia Pacific 1 Executive Summary This document will walk you through an initial setup

More information

WebSpy Vantage Ultimate 2.2 Web Module Administrators Guide

WebSpy Vantage Ultimate 2.2 Web Module Administrators Guide WebSpy Vantage Ultimate 2.2 Web Module Administrators Guide This document is intended to help you get started using WebSpy Vantage Ultimate and the Web Module. For more detailed information, please see

More information

DS License Server V6R2013x

DS License Server V6R2013x DS License Server V6R2013x DS License Server V6R2013x Installation and Configuration Guide Contains JAVA SE RUNTIME ENVIRONMENT (JRE) VERSION 7 Contains IBM(R) 64-bit SDK for AIX(TM), Java(TM) Technology

More information

Legal Notes. Regarding Trademarks. 2012 KYOCERA Document Solutions Inc.

Legal Notes. Regarding Trademarks. 2012 KYOCERA Document Solutions Inc. Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held liable for any problems arising from

More information

FOG Guide. IPBRICK International. July 17, 2013

FOG Guide. IPBRICK International. July 17, 2013 FOG Guide IPBRICK International July 17, 2013 1 Copyright c IPBRICK International All rights reserved. The information in this manual is subject to change without prior notice. The presented explanations,

More information

Moving the TRITON Reporting Databases

Moving the TRITON Reporting Databases Moving the TRITON Reporting Databases Topic 50530 Web, Data, and Email Security Versions 7.7.x, 7.8.x Updated 06-Nov-2013 If you need to move your Microsoft SQL Server database to a new location (directory,

More information

User's Manual. Intego VirusBarrier Server 2 / VirusBarrier Mail Gateway 2 User's Manual Page 1

User's Manual. Intego VirusBarrier Server 2 / VirusBarrier Mail Gateway 2 User's Manual Page 1 User's Manual Intego VirusBarrier Server 2 / VirusBarrier Mail Gateway 2 User's Manual Page 1 VirusBarrier Server 2 and VirusBarrier Mail Gateway 2 for Macintosh 2008 Intego. All Rights Reserved Intego

More information

Consolidated Monitoring, Analysis and Automated Remediation For Hybrid IT Infrastructures. Goliath Performance Monitor Installation Guide v11.

Consolidated Monitoring, Analysis and Automated Remediation For Hybrid IT Infrastructures. Goliath Performance Monitor Installation Guide v11. Consolidated Monitoring, Analysis and Automated Remediation For Hybrid IT Infrastructures Goliath Performance Monitor Installation Guide v11.6 (v11.6) Document Date: August 2015 www.goliathtechnologies.com

More information