Test Case 3 Active Directory Integration
|
|
- Gilbert Duane Ford
- 8 years ago
- Views:
Transcription
1 April 12, 2010 Author: Audience: Joe Lowry and SWAT Team Evaluator Test Case 3 Active Directory Integration The following steps will guide you through the process of directory integration. The goal of directory integration is to be able to apply filtering and/or shaping rules to your existing Active Directory security group/ou structure and to be able to report on and correlate all internet usage to a directory user. Once the integration is completed and groups have been built within composer, all management of group membership can be performed from your directory server. Three Step Process to accomplish Directory Integration This is a three step process that needs to be followed in order. Network Composer will gain access to your directory structure by installing an agent, referred to as CDA (Cymphonix Directory Agent), on your server followed by configuring Network Composer to communicate with the agent. Lastly you will choose one of three options available to identify user information. Install the Directory Agent on your server NOTE: This agent can be installed on any domain controller that is running the Active Directory Domain Services role, it does not have to be installed on the primary domain controller. You will first login to the server where you plan on installing the Active Directory Server Agent and then login to Network Composer from there to download the agent and finally install it. You must add Network Composer to your trusted zones within Internet Explorer to be able to login to the GUI and to be able to download files from Network Composer. Also, flash must be installed in order to login to the Network Composer. You can download the most recent version of flash from
2 2 1. Once logged into the server where you ll be installing the Active Directory Server agent, launch Internet Explorer (You must use IE 6.0 or better to manage the Network Composer). Locate the IE toolbar and go to Tools > Internet Options > Security Tab > Trusted Sites > Sites. In the Add this website to the zone field, type in (type in if you have the Require server verification ( for all sites in this zone checked), and then click Add.
3 3 2. Log into your Network Composer, from your server, being careful to use the correct URL; could be http or https depending on how you made your entry into the Trusted Sites. Then click on the admin tab. 3. Click on Downloads. Then click on Directory Agent Software. 4. Click on Download 32-bit Active Directory Agent Server Agent.
4 4 5. A File Download box with open in a pop up window. Click on Click here to download your file to initiate the download request. 6. Depending on if you re installing this on a windows 2003 server or a windows 2008 server; you will need to install the Directory Agent in a specific way. Since 2008 server has more security there is an extra step involved that requires you install the.exe as an administrator. If Installing from a Windows 2003 server: a. Click Run when the Download box opens. b. Proceed directly to step 7.
5 5 If installing from a Windows 2008 server: a. Click Save when the download box opens b. Save the file to your desktop c. Right click on the adagent icon located on your desktop, adagent32.exe, and choose the Run as administrator option.
6 6 d. If you receive the User Account Control dialogue, click yes to allow the changes. e. Proceed to step Click on the Run button on the Security warning box. 8. Click next on the first screen.
7 7 9. On the next screen accept the license agreement and click next. 10. Click next on this screen (unless you want to choose a custom install location).
8 8 11. On this screen you can normally leave the default port number there. (The only reason to change it is if you have another application that uses that port, otherwise it is fine to use the default port). 12. Enter a password for use with the Network Composer (this does not need to be a password for any user in your domain; it is only used for secure communication between this agent and Network Composer). Then click next.
9 9 13. Click the Install button to begin the install. 14. Click finish when done.
10 If the Windows Firewall is turned on within this server where you installed the Active Directory Server Agent, you will need to make an exception for the directory agent to be able to communicate with Network Composer. The communication utilizes TCP port 3462 unless you changed the port during setup. To make the exception launch your Windows Firewall from your control panel. Then go to the Exceptions tab and click on Add Port.
11 In the Name Field enter Active Directory Server Agent. Enter 3462 for the Port Number and select TCP for the protocol and then click OK. Configure Network Composer to communicate with Active Directory Server Agent This is the second step of the Directory Integration where we configure Network Composer to communicate with the Directory Server Agent. 1. Login to the Network Composer, from your workstation or server, and click on the Manage tab. 2. Click on Directory Users & Nodes, then Directory Agent.
12 12 3. Click on the Create button. 4. Enter a Name for the Directory Agent (normally the name of the domain). 5. You can enter a description in the description field but it is an optional field. 6. Enter the IP address of the Active Directory Server where you installed the Agent Utility. 7. Enter the Password you created when you installed the Agent. 8. Click on Save. You have now setup your Network Composer to use Active Directory Integration. Identify when users authenticate to the network and their IP address This is the third and final step to the directory integration process. There are three options available, two of them are clientless. Deploying cymdir.exe is the directory client method while IP Lookup and Web Login page are clientless web authentication options. Each option is listed below including a quick synopsis. Option 1 Deploy statically compiled client executable cymdir.exe. This option allows Network Composer to immediately identify when users are accessing the network while synchronizing with defined groups, OUs, or user attributes by receiving definitive log-in and logout events in heart beats of information sent from this client executable once running on the workstation. The cymdir.exe is not a program or application install, thus there are no changes to the file structure or registry changes to the workstation. Rather, it only exists and runs as a process in memory and goes away at log off. This method is the most widely used because it gives you full functionality and obtains the most accurate reporting data. It is also completely seamless to the end user requiring no interaction. We will deploy the statically compiled executable file (cymdir.exe) onto one or both of your test PC s using a manual method.
13 13 NOTE: When deploying cymdir.exe into your corporate environment you will use the GPO login script method for ease of deployment instead of the manual method used here. 1. From your workstation download the cymdir.exe file from compose. Login to Composer and go to Admin > Downloads > Directory Agent Software > Download 32-bit Windows Directory Client Agent. 2. Click here to download your file and when given the choice save the file to the desktop of your workstation.
14 14 3. Click save and choose your desktop as the destination to start the download. 4. Once the download is complete you may need to remove a security flag from the file that Internet Explorer places on executable files. To do this, Right click on the file and select Properties. If there is an Unblock button available in the Security section on the General tab click Unblock. NOTE: If the file is already unblocked you will the Unblock button at the bottom of the General tab
15 15 5. On your workstation click on the Start menu, then Run. Browse to the location of Cymdir.exe OR simply drag the icon from your desktop into the run box. Once the full path of the cymdir.exe file exists in the Run dialogue box add a space to the very end of the path followed by the bridge IP address of your composer. Then click OK. Example: "C:\Documents and Settings\Administrator\Desktop\cymdir.exe" When prompted with the Security Warning dialogue box, click the Run button.
16 16 7. If you launch your Task Manager you should see a process called cymdir.exe running. 8. If cymdir.exe is running on the workstation Network Composer should be receiving your user information. You can verify this within Network Composer by going to Admin > Diagnostic Tools > Directory Agent Users. You should see your username listed. 9. If you see your username in the list this means all of your subsequent traffic will be associated to the directory username and you can continue with Test Case 3a. Option 2 IP Lookup IP Lookup relies upon the directory server to query the workstation for user, domain and IP information versus the information being sent directly to Network Composer from the workstation when using the directory client (cymdir). There are some dependencies that have to be in place to use this option to allow the native windows api query to complete from server to workstation.
17 17 The main advantage of using this option is that it s clientless and all mechanics of the authentication in this mode are seamless to the end user. The main disadvantage of this method is the lack of a specific login and logout event. What this means is that any application traffic passed before we identify the user, (We identify the user soon as a browser session is launched) will only be associated to the IP address or network node. Checklist (Dependencies that must be in place) before implementing IP Lookup: File and Printer Sharing for Microsoft Networks installed on workstation Any HIDS (Host Intrusion Detection System) or firewall service running on the workstation(s) is allowing the File and printer services. Workstations Primary DNS server set to the IP address of the Active Directory server Workstations are joined to the domain and use Windows 2000 SP4 or above CDA,Directory Agent Service specifically, is configured on your directory server to Log On with administrator rights 1. NOTE: To verify or change this go to the server where the CDA is installed and open your services. (Start > Run > Type Services.msc) Once within services locate the service named Directory Agent and right click on the service and select Properties. Click the Log On tab, and then change the Log on as from local system account to an administrator account by selecting the radial button next to This account and specify an account that has administrator privileges. 2. Technical Brief Why does the Directory Agent service have to be configured to run with administrative privileges to use the IP Lookup option? We use NetWkstaUserEnum() to get the user name at the given IP address and then we pass that (username) to ADsOpenObject()/ADsGetObject() followed by ExecuteSearch() It "follows" that anybody using any of these APIs needs Admin rights. If they weren't controlled, this would mean that anybody could get Active Directory info on anybody else just for the asking. Configure Network Composer to use the IP Lookup web authentication/directory Option mode and specify which workstation(s) will utilize this mode. IP lookup is configured and required through IUR s (Internet Usage Rules), subsequently the IUR is applied to a specific Network Composer Group whom you desire to utilize the IP Lookup method. The Network Composer group can contain the desired workstation(s) by utilizing different choices of member types, whether that is by IP, VLAN, Subnet, etc.
18 18 Note: Network Composer can utilize one, or a combination of directory authentication options. If you were to use IP Lookup in a combination with other available methods you have to specify which workstations utilize IP Lookup by creating a Network Composer group containing those devices (by using any of the available member types available, eg.- IP, VLAN, subnet). Secondly, you must configure an Internet Usage Rule for IP Lookup as the web authentication mode and then associate the IUR to the previously created group through the policy manager. Note: To implement IP Lookup for all devices on the network it is a much simpler process. You will configure the default IUR, which is associated to the catch all default group, to use IP Lookup. Since this is the rule that everyone (all network nodes) is using be default, this will force IP Lookup for all devices. This Apply IP Lookup network wide concept will be the approach behind the following steps. 1. Log in to Network Composer and go to Manage > Policies & Rules > Internet Usage Rules > Click Default Usage Rules. Now that you re in the Add/Edit Internet Usage Rule Set screen open the Web Authentication tab, Check the boxes next to Require Web Based Authentication and Directory Agent IP Lookup and finally click Save. 2. If you re using this Option and completed the previous steps you can now go directly to Test Case 3a. Once a directory user is authenticated via the IP Lookup mode (seamless to end user and happens soon as the user initiates a browser session) their traffic is no longer subject to the rules applied to the network node, now their traffic is associated and subject to their Directory Group and associated IUR. Option 3 Login Page When a user attempts to load a web page they will be presented with a credential challenge window where valid domain credentials must be entered to continue. Once valid credentials are entered, the user is allowed to browse and content filtering and/or shaping will be applied according to their directory user name and group information. Internet usage is also correlated to the authenticated directory user. The advantage of this option is that it s clientless and can be utilized where users have Directory accounts but their devices are not members of the domain. For example, you may have a wireless network or Macintosh workstations where users don t authenticate to the domain but are able to
19 19 browse the web. By implementing this option you will be able to force authentication to such users and report on their internet usage by user name The Login Page mode is configured and required through IUR s (Internet Usage Rules), subsequently the IUR is applied to a specific Network Composer Group whom you desire to force the login authentication. The Network Composer group can contain the desired workstation(s) by utilizing different choices of member types, whether that is by IP, VLAN, Subnet, etc., You will first create a Network Composer group that contains your workstation and then apply an IUR (Internet Usage Rule) that has the login mode enabled to the group through Policy Manager. 1. Login to Network Composer and go to Manage > Policies & Rules > Groups > Create. Choose Create a Network Composer Group. This will bring you to the Add/Edit Group Detail. In the Name field type Web Login Group. Locate your node according to the current IP address configured on your workstation and then select it and Add to the group, followed by Save. 2. Go to Manage > Policies & Rules > Internet Usage Rules > Create. This will bring you to the Add/Edit Internet Usage Rule Set. In the Rule Set Name field type Web login Rule. Go to the Web Authentication tab Check the boxes next to Require Web Based Authentication and Enable Login Page and finally click Save.
20 20 3. If you re using this Option and completed the previous steps you can now go directly to Test Case 3a. Once a directory user is authenticated via the Login page mode (user enters credentials) their traffic is no longer subject to the rules applied to the network node, now their traffic is associated and subject to their Directory Group and associated IUR. Test Case 3a - Creating a Directory Group Within the Network Composer you can create a Composer Directory Group which allows you to incorporate Security Groups, OU s or individual members from your existing directory architecture and subsequently apply unique policies. The other advantage to creating groups outside of granular policy control is the ability to utilize the Correlate by Group reporting option. This test case will take you through the necessary steps to create a directory group. 1. Log in to Network Composer and go to Manage> Policies & Rules> Groups> Create > Create a Directory Agent Group > Click Ok.
21 21 2. You will now be in the Add/Edit Directory Agent Group Detail. You can create a Directory Agent Group that contains members from your Active Directory server, either by security group, OU, or attribute. For a test case we recommend just adding one OU or security group that you can comfortably subject content filtering and/or shaping to such as your IT group. (NOTE: This must be a security group that isn t set as any users Primary Group. By default all users Primary Group is set to Domain Users ). In the Name field enter something that relates to the users, such as IT Group, in the Description field enter Members contained within description of group. a. Click Add Members which will bring you to the Add Directory Group Members screen. b. Check the box next to IT Group (or a different group that you feel is appropriate for testing) and then click OK at the bottom of the page. c. Now that you re back at the Add/Edit Directory Agent Group Detail click the Save button
22 22 3. You have now successfully created a Directory Agent Group that allows you to accomplish two things. a. You can run reports and correlate the results by Group giving you aggregate reporting data to a specific directory group. For Example - How much bandwidth a domain users group is using versus a domain admins group. b. You can apply content filtering (IUR s Internet Usage Rules) and/or Shaping rules according to the directory user s OU or Security Group membership or even by a specific user attribute. You would associate a unique IUR and/or shaping rule to the directory group through Policy manager.
23 23 Test Case 3b - Real Time Reporting by Directory User In this test case you will utilize the Real Time URL monitor to view web hits generated by a directory user. As a user accesses URL s you will be able to monitor this in real time as well as other useful pieces of information. 1. Log in to Network Composer and go to Report > Dashboards > Real time URL Monitor. 2. Open a second browser window that will enable you to still view and monitor the Real time URL monitor. Then begin browsing to the following sites: NOTE: If using Directory Option 3, you will be presented with a credential challenge window when entering the first URL. When prompted, enter in your valid domain credentials and continue browsing to the other URL s. 3. As you pass traffic to the internet you should be able to see within the Real Time URL Monitor the specific URL s your visiting and Directory User information associated to each hit.
24 24 4. You can also view the current state of all directory agent users by going to Admin > Diagnostic Tools > Directory Agent Users. Users with recent activity will be displayed along with their IP Address, Group membership and mode (Client executable, IP Lookup, or Log In) information. If you want to verify if a user is being authenticated and subsequently traffic is being associated to a particular user name you can use this tool to verify the user is showing with a Logged in status.
25 25 Test Case 3c Historical Reporting by Directory User In this test case you will utilize reports to view historical data collected specific to a directory user. Historical data is updated every 5 minutes, so assure at least 5 minutes have passed since browsing to the afore mentioned URL s. This will make sure the reporting data exists in the following reports before you go to view them. View specific HTTP content, Host URL s, visited by a specific directory user. 1. Log in to Network Composer and go to Report > Web Usage > Overview/Hits. 2. Right click Allowed > Highlight Report Correlations and select Correlate by Directory User.
26 26 3. Right Click on your directory user name in the Details section and highlight Report Correlations and select Correlate by Host. 4. You should now be viewing the specific Host (web sites) that specific directory user visited. View the application data correlated by directory user. This allows you to see how much data associated to any application set breaks down to a per user utilization. 1. Go to Report > Applications > Application Set Overview. 2. In the Details section Right Click HTTP and highlight Report Correlations and select Correlate by Directory User. You are viewing the total HTTP application data used per directory user. You can correlate any of the other application sets by directory user as well.
Active Directory Integration
January 11, 2011 Author: Audience: SWAT Team Evaluator Product: Cymphonix Network Composer EX Series, XLi OS version 9 Active Directory Integration The following steps will guide you through the process
More informationFilter Avoidance and Anonymous Proxy Guard
March 21, 2011 Author: Audience: SWAT Team Evaluator Product: Cymphonix Network Composer EX Series, XLi OS version 9 Filter Avoidance and Anonymous Proxy Guard Filter Avoidance The award winning XLi technology
More informationTool Tip. SyAM Management Utilities and Non-Admin Domain Users
SyAM Management Utilities and Non-Admin Domain Users Some features of SyAM Management Utilities, including Client Deployment and Third Party Software Deployment, require authentication credentials with
More informationSetting Up Scan to SMB on TaskALFA series MFP s.
Setting Up Scan to SMB on TaskALFA series MFP s. There are three steps necessary to set up a new Scan to SMB function button on the TaskALFA series color MFP. 1. A folder must be created on the PC and
More informationWindows Clients and GoPrint Print Queues
Windows Clients and GoPrint Print Queues Overview The following tasks demonstrate how to configure shared network printers on Windows client machines in a Windows Active Directory Domain and Workgroup
More informationHow do I use Citrix Staff Remote Desktop
How do I use Citrix Staff Remote Desktop September 2014 Initial Log On In order to login into the new Citrix system, you need to go to the following web address. https://remotets.tees.ac.uk/ Be sure to
More informationIIS, FTP Server and Windows
IIS, FTP Server and Windows The Objective: To setup, configure and test FTP server. Requirement: Any version of the Windows 2000 Server. FTP Windows s component. Internet Information Services, IIS. Steps:
More informationILTA HANDS ON Securing Windows 7
Securing Windows 7 8/23/2011 Table of Contents About this lab... 3 About the Laboratory Environment... 4 Lab 1: Restricting Users... 5 Exercise 1. Verify the default rights of users... 5 Exercise 2. Adding
More informationWhatsUp Gold v16.3 Installation and Configuration Guide
WhatsUp Gold v16.3 Installation and Configuration Guide Contents Installing and Configuring WhatsUp Gold using WhatsUp Setup Installation Overview... 1 Overview... 1 Security considerations... 2 Standard
More informationPreparing for GO!Enterprise MDM On-Demand Service
Preparing for GO!Enterprise MDM On-Demand Service This guide provides information on...... An overview of GO!Enterprise MDM... Preparing your environment for GO!Enterprise MDM On-Demand... Firewall rules
More informationHow To Create An Easybelle History Database On A Microsoft Powerbook 2.5.2 (Windows)
Introduction EASYLABEL 6 has several new features for saving the history of label formats. This history can include information about when label formats were edited and printed. In order to save this history,
More informationQUANTIFY INSTALLATION GUIDE
QUANTIFY INSTALLATION GUIDE Thank you for putting your trust in Avontus! This guide reviews the process of installing Quantify software. For Quantify system requirement information, please refer to the
More informationTECHNICAL NOTE. The following information is provided as a service to our users, customers, and distributors.
page 1 of 11 The following information is provided as a service to our users, customers, and distributors. ** If you are just beginning the process of installing PIPSPro 4.3.1 then please note these instructions
More informationNETASQ SSO Agent Installation and deployment
NETASQ SSO Agent Installation and deployment Document version: 1.3 Reference: naentno_sso_agent Page 1 / 20 Copyright NETASQ 2013 General information 3 Principle 3 Requirements 3 Active Directory user
More informationNSi Mobile Installation Guide. Version 6.2
NSi Mobile Installation Guide Version 6.2 Revision History Version Date 1.0 October 2, 2012 2.0 September 18, 2013 2 CONTENTS TABLE OF CONTENTS PREFACE... 5 Purpose of this Document... 5 Version Compatibility...
More informationOkta/Dropbox Active Directory Integration Guide
Okta/Dropbox Active Directory Integration Guide Okta Inc. 301 Brannan Street, 3rd Floor San Francisco CA, 94107 info@okta.com 1-888- 722-7871 1 Table of Contents 1 Okta Directory Integration Edition for
More informationUser Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream
User Manual Onsight Management Suite Version 5.1 Another Innovation by Librestream Doc #: 400075-06 May 2012 Information in this document is subject to change without notice. Reproduction in any manner
More informationActive Directory Self-Service FAQ
Active Directory Self-Service FAQ General Information: info@cionsystems.com Online Support: support@cionsystems.com CionSystems Inc. Mailing Address: 16625 Redmond Way, Ste M106 Redmond, WA. 98052 http://www.cionsystems.com
More informationUSER CONFERENCE 2011 SAN FRANCISCO APRIL 26 29. Running MarkLogic in the Cloud DEVELOPER LOUNGE LAB
USER CONFERENCE 2011 SAN FRANCISCO APRIL 26 29 Running MarkLogic in the Cloud DEVELOPER LOUNGE LAB Table of Contents UNIT 1: Lab description... 3 Pre-requisites:... 3 UNIT 2: Launching an instance on EC2...
More informationF-Secure Messaging Security Gateway. Deployment Guide
F-Secure Messaging Security Gateway Deployment Guide TOC F-Secure Messaging Security Gateway Contents Chapter 1: Deploying F-Secure Messaging Security Gateway...3 1.1 The typical product deployment model...4
More informationWhatsUp Gold v16.1 Installation and Configuration Guide
WhatsUp Gold v16.1 Installation and Configuration Guide Contents Installing and Configuring Ipswitch WhatsUp Gold v16.1 using WhatsUp Setup Installing WhatsUp Gold using WhatsUp Setup... 1 Security guidelines
More informationNovaBACKUP xsp Version 15.0 Upgrade Guide
NovaBACKUP xsp Version 15.0 Upgrade Guide NovaStor / November 2013 2013 NovaStor, all rights reserved. All trademarks are the property of their respective owners. Features and specifications are subject
More informationintertrax Suite resource MGR Web
intertrax Suite resource MGR Web Resource Management Installation Guide Version 4 2012 Copyright 2003-2012 by Salamander Technologies, Inc. Protected by US Patents 5,573,278; 5,596,652; 5,793,882; 6,761,312;
More informationSharp Remote Device Manager (SRDM) Server Software Setup Guide
Sharp Remote Device Manager (SRDM) Server Software Setup Guide This Guide explains how to install the software which is required in order to use Sharp Remote Device Manager (SRDM). SRDM is a web-based
More informationDeploying Windows Streaming Media Servers NLB Cluster and metasan
Deploying Windows Streaming Media Servers NLB Cluster and metasan Introduction...................................................... 2 Objectives.......................................................
More informationVirtual Office Remote Installation Guide
Virtual Office Remote Installation Guide Table of Contents VIRTUAL OFFICE REMOTE INSTALLATION GUIDE... 3 UNIVERSAL PRINTER CONFIGURATION INSTRUCTIONS... 12 CHANGING DEFAULT PRINTERS ON LOCAL SYSTEM...
More informationDefender 5.7 - Token Deployment System Quick Start Guide
Defender 5.7 - Token Deployment System Quick Start Guide This guide describes how to install, configure and use the Defender Token Deployment System, based on default settings and how to self register
More informationInstallation Guide. Research Computing Team V1.9 RESTRICTED
Installation Guide Research Computing Team V1.9 RESTRICTED Document History This document relates to the BEAR DataShare service which is based on the product Power Folder, version 10.3.232 ( some screenshots
More informationecopy ShareScan v4.3 Pre-Installation Checklist
ecopy ShareScan v4.3 Pre-Installation Checklist This document is used to gather data about your environment in order to ensure a smooth product implementation. The Network Communication section describes
More informationHELIX MEDIA LIBRARY INSTALL GUIDE FOR WINDOWS SERVER 2003 Helix Media Library Version 1.1. Revision Date: July 2011
HELIX MEDIA LIBRARY INSTALL GUIDE FOR WINDOWS SERVER 2003 Helix Media Library Version 1.1 Revision Date: July 2011 Summary of Contents Summary of Contents... 2 Pre Installation Checklist... 4 Prerequisites...
More informationPearl Echo Installation Checklist
Pearl Echo Installation Checklist Use this checklist to enter critical installation and setup information that will be required to install Pearl Echo in your network. For detailed deployment instructions
More informationImmotec Systems, Inc. SQL Server 2005 Installation Document
SQL Server Installation Guide 1. From the Visor 360 installation CD\USB Key, open the Access folder and install the Access Database Engine. 2. Open Visor 360 V2.0 folder and double click on Setup. Visor
More informationFlexSim LAN License Server
FlexSim LAN License Server Installation Instructions Rev. 20150318 Table of Contents Introduction... 2 Using lmtools... 2 1. Download the installation files... 3 2. Install the license server... 4 3. Connecting
More informationXenDesktop Implementation Guide
Consulting Solutions WHITE PAPER Citrix XenDesktop XenDesktop Implementation Guide Pooled Desktops (Local and Remote) www.citrix.com Contents Contents... 2 Overview... 4 Initial Architecture... 5 Installation
More informationActive Directory Management. Agent Deployment Guide
Active Directory Management Agent Deployment Guide Document Revision Date: April 26, 2013 Active Directory Management Deployment Guide i Contents System Requirements... 1 Hardware Requirements... 2 Agent
More informationStep-By-Step Guide to Deploying Lync Server 2010 Enterprise Edition
Step-By-Step Guide to Deploying Lync Server 2010 Enterprise Edition The installation of Lync Server 2010 is a fairly task-intensive process. In this article, I will walk you through each of the tasks,
More informationDynamic DNS How-To Guide
Configuration Guide Dynamic DNS How-To Guide Overview This guide will show you how to set up a Dynamic DNS host name under the D-Link DDNS service with your D-Link ShareCenter TM. Dynamic DNS is a protocol
More informationPineApp Surf-SeCure Quick
PineApp Surf-SeCure Quick Installation Guide September 2010 WEB BASED INSTALLATION SURF-SECURE AS PROXY 1. Once logged in, set the appliance s clock: a. Click on the Edit link under Time-Zone section.
More informationSystem Administration Training Guide. S100 Installation and Site Management
System Administration Training Guide S100 Installation and Site Management Table of contents System Requirements for Acumatica ERP 4.2... 5 Learning Objects:... 5 Web Browser... 5 Server Software... 5
More informationVirtual Appliance for VMware Server. Getting Started Guide. Revision 2.0.2. Warning and Disclaimer
Virtual Appliance for VMware Server Getting Started Guide Revision 2.0.2 Warning and Disclaimer This document is designed to provide information about the configuration and installation of the CensorNet
More informationiboss Enterprise Deployment Guide iboss Web Filters
iboss Enterprise Deployment Guide iboss Web Filters Copyright Phantom Technologies, Inc. All rights reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval
More informationSetting up Sharp MX-Color Imagers for Inbound Fax Routing to Email or Network Folder
Setting up Sharp MX-Color Imagers for Inbound Fax Routing to Email or Network Folder MX-2300, MX-2600, MX-2700, MX-3100, MX-3501, MX-4501, MX-5500, MX-6200, MX-6201, MX-7000, MX-7001, *MX-M850, *MX-M950,
More informationisupplier PORTAL ACCESS SYSTEM REQUIREMENTS
TABLE OF CONTENTS Recommended Browsers for isupplier Portal Recommended Microsoft Internet Explorer Browser Settings (MSIE) Recommended Firefox Browser Settings Recommended Safari Browser Settings SYSTEM
More informationConfiguring SonicWALL TSA on Citrix and Terminal Services Servers
Configuring on Citrix and Terminal Services Servers Document Scope This solutions document describes how to install, configure, and use the SonicWALL Terminal Services Agent (TSA) on a multi-user server,
More informationOneLogin Integration User Guide
OneLogin Integration User Guide Table of Contents OneLogin Account Setup... 2 Create Account with OneLogin... 2 Setup Application with OneLogin... 2 Setup Required in OneLogin: SSO and AD Connector...
More informationWeston Public Schools Virtual Desktop Access Instructions
Instructions for connecting to the Weston Schools Virtual Desktop Environment Notes: You will have to have administrator permission on your computer in order to install a VMWare Client application which
More informationWorking Together - Your Apple Mac and Microsoft Windows
Contains information about complex concepts and /or requires technical knowledge to get the most out of the article. Aimed at the more experienced / ambitious ICT manager or accidental techie. Working
More informationilaw Installation Procedure
ilaw Installation Procedure This guide will provide a reference for a full installation of ilaw Case Management Software. Contents ilaw Overview How ilaw works Installing ilaw Server on a PC Installing
More informationBarracuda Web Filter Demo Guide Version 3.3 GETTING STARTED
Version 3.3 GETTING STARTED What is the Web Filter? Integrated content filtering and application blocking Best-of-breed spyware protection Integrated gateway antivirus Desktop spyware protection Firmware
More informationUsing Remote Web Workplace Version 1.01
Using Remote Web Workplace Version 1.01 Remote web workplace allows you to access your Windows XP desktop through Small Business Server 2003 from a web browser. 1. Connect to the Internet in your remote
More informationHow To - Implement Single Sign On Authentication with Active Directory
How To - Implement Single Sign On Authentication with Active Directory Applicable to English version of Windows This article describes how to implement single sign on authentication with Active Directory
More informationDelegated Administration Quick Start
Delegated Administration Quick Start Topic 50200 Delegated Administration Quick Start Updated 22-Oct-2013 Applies to: Web Filter, Web Security, Web Security Gateway, and Web Security Gateway Anywhere,
More informationTANDBERG MANAGEMENT SUITE 10.0
TANDBERG MANAGEMENT SUITE 10.0 Installation Manual Getting Started D12786 Rev.16 This document is not to be reproduced in whole or in part without permission in writing from: Contents INTRODUCTION 3 REQUIREMENTS
More informationTeam Foundation Server 2013 Installation Guide
Team Foundation Server 2013 Installation Guide Page 1 of 164 Team Foundation Server 2013 Installation Guide Benjamin Day benday@benday.com v1.1.0 May 28, 2014 Team Foundation Server 2013 Installation Guide
More informationApplication Note 8: TrendView Recorders DCOM Settings and Firewall Plus DCOM Settings for Trendview Historian Server
Application Note 8: TrendView Recorders DCOM Settings and Firewall Plus DCOM Settings for Trendview Historian Server DCOM Configuration Introduction This document is intended to provide a check-list of
More informationBackground Deployment 3.1 (1003) Installation and Administration Guide
Background Deployment 3.1 (1003) Installation and Administration Guide 2010 VoIP Integration March 14, 2011 Table of Contents Product Overview... 3 Personalization... 3 Key Press... 3 Requirements... 4
More informationInstallation and Deployment
Installation and Deployment Help Documentation This document was auto-created from web content and is subject to change at any time. Copyright (c) 2016 SmarterTools Inc. Installation and Deployment SmarterStats
More informationTraining module 2 Installing VMware View
Training module 2 Installing VMware View In this second module we ll install VMware View for an End User Computing environment. We ll install all necessary parts such as VMware View Connection Server and
More informationhttp://docs.trendmicro.com
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the product, please review the readme files,
More informationVersion 3.8. Installation Guide
Version 3.8 Installation Guide Copyright 2007 Jetro Platforms, Ltd. All rights reserved. This document is being furnished by Jetro Platforms for information purposes only to licensed users of the Jetro
More informationLotus Notes 6.x Client Installation Guide for Windows. Information Technology Services. CSULB
The goal of this document This document was created by the Information Technology Services department to assist the Lotus Notes Coordinators in the successful installation of Lotus Notes release 6 (R6)
More informationHow To Install A New Database On A 2008 R2 System With A New Version Of Aql Server 2008 R 2 On A Windows Xp Server 2008 (Windows) R2 (Windows Xp) (Windows 8) (Powerpoint) (Mysql
Microsoft SQL Server Express 2008 R2 Install on Windows Server 2008 r2 for HoleBASE SI The following guide covers setting up a SQL server Express 2008 R2 system and adding a new database and user for HoleBASE
More informationDreamFactory on Microsoft SQL Azure
DreamFactory on Microsoft SQL Azure Account Setup and Installation Guide For general information about the Azure platform, go to http://www.microsoft.com/windowsazure/. For general information about the
More informationInvestment Management System. Connectivity Guide. IMS Connectivity Guide Page 1 of 11
Investment Management System Connectivity Guide IMS Connectivity Guide Page 1 of 11 1. Introduction This document details the necessary steps and procedures required for organisations to access the Homes
More informationQuick Start Guide Sendio Hosted
Sendio Email System Protection Appliance Quick Start Guide Sendio Hosted Sendio 6.x and 7.x Sendio, Inc. 4911 Birch St, Suite 150 Newport Beach, CA 92660 USA +1.949.274.4375 www.sendio.com QUICK START
More informationHELP DOCUMENTATION E-SSOM DEPLOYMENT GUIDE
HELP DOCUMENTATION E-SSOM DEPLOYMENT GUIDE Copyright 1998-2013 Tools4ever B.V. All rights reserved. No part of the contents of this user guide may be reproduced or transmitted in any form or by any means
More informationSetting Up Your FTP Server
Requirements:! A computer dedicated to FTP server only! Linksys router! TCP/IP internet connection Steps: Getting Started Configure Static IP on the FTP Server Computer: Setting Up Your FTP Server 1. This
More informationTeam Foundation Server 2010, Visual Studio Ultimate 2010, Team Build 2010, & Lab Management Beta 2 Installation Guide
Page 1 of 243 Team Foundation Server 2010, Visual Studio Ultimate 2010, Team Build 2010, & Lab Management Beta 2 Installation Guide (This is an alpha version of Benjamin Day Consulting, Inc. s installation
More informationInstallation Notes for Outpost Network Security (ONS) version 3.2
Outpost Network Security Installation Notes version 3.2 Page 1 Installation Notes for Outpost Network Security (ONS) version 3.2 Contents Installation Notes for Outpost Network Security (ONS) version 3.2...
More informationRemote Desktop Solution, (RDS), replacing CITRIX Home Access
Remote Desktop Solution, (RDS), replacing CITRIX Home Access RDS Applications on a Computer Overview RDS has replaced citrix for remote access at home for College staff and pupils. This does not replace
More informationNAC Guest. Lab Exercises
NAC Guest Lab Exercises November 25 th, 2008 2 Table of Contents Introduction... 3 Logical Topology... 4 Exercise 1 Verify Initial Connectivity... 6 Exercise 2 Provision Contractor VPN Access... 7 Exercise
More informationHow To Connect To Bloomerg.Com With A Network Card From A Powerline To A Powerpoint Terminal On A Microsoft Powerbook (Powerline) On A Blackberry Or Ipnet (Powerbook) On An Ipnet Box On
Transport and Security Specification 15 July 2015 Version: 5.9 Contents Overview 3 Standard network requirements 3 Source and Destination Ports 3 Configuring the Connection Wizard 4 Private Bloomberg Network
More informationGetting Started with Clearlogin A Guide for Administrators V1.01
Getting Started with Clearlogin A Guide for Administrators V1.01 Clearlogin makes secure access to the cloud easy for users, administrators, and developers. The following guide explains the functionality
More informationImportant Notes for WinConnect Server ES Software Installation:
Important Notes for WinConnect Server ES Software Installation: 1. Only Windows 8/8.1 Enterprise, Windows 8/8.1 Professional (32-bit & 64-bit) or Windows Server 2012 (64-bit) or Windows Server 2012 Foundation
More informationHP Client Automation Standard Fast Track guide
HP Client Automation Standard Fast Track guide Background Client Automation Version This document is designed to be used as a fast track guide to installing and configuring Hewlett Packard Client Automation
More informationWhatsUp Gold v16.2 Installation and Configuration Guide
WhatsUp Gold v16.2 Installation and Configuration Guide Contents Installing and Configuring Ipswitch WhatsUp Gold v16.2 using WhatsUp Setup Installing WhatsUp Gold using WhatsUp Setup... 1 Security guidelines
More informationHow To - Implement Clientless Single Sign On Authentication in Single Active Directory Domain Controller Environment
How To - Implement Clientless Single Sign On Authentication in Single Active Directory Domain Controller Environment How To - Implement Clientless Single Sign On Authentication with Active Directory Applicable
More informationXyLoc Security Server w/ AD Integration (XSS-AD 5.x.x) Administrator's Guide
XyLoc Security Server w/ AD Integration (XSS-AD 5.x.x) Administrator's Guide Contacting Ensure Technologies Email: support@ensuretech.com Phone: (734) 547-1600 Home Office: Ensure Technologies 135 S Prospect
More informationMultiSite Manager. Setup Guide
MultiSite Manager Setup Guide Contents 1. Introduction... 2 How MultiSite Manager works... 2 How MultiSite Manager is implemented... 2 2. MultiSite Manager requirements... 3 Operating System requirements...
More informationCYCLOPE let s talk productivity
Cyclope 6 Installation Guide CYCLOPE let s talk productivity Cyclope Employee Surveillance Solution is provided by Cyclope Series 2003-2014 1 P age Table of Contents 1. Cyclope Employee Surveillance Solution
More informationInstallation Guide for Pulse on Windows Server 2008R2
MadCap Software Installation Guide for Pulse on Windows Server 2008R2 Pulse Copyright 2014 MadCap Software. All rights reserved. Information in this document is subject to change without notice. The software
More informationHosted Microsoft Exchange Client Setup & Guide Book
Hosted Microsoft Exchange Client Setup & Guide Book Section 1 Microsoft Outlook Web Access (OWA) access directions Section 2 Windows Mobile Phone ActiveSync setup & configuration Section 3 - Apple iphone
More informationPC Monitor Enterprise Server. Setup Guide
PC Monitor Enterprise Server Setup Guide Prerequisites Server Requirements - Microsoft Windows Server 2008 R2 or 2012-2GB RAM - IIS 7.5 or IIS 8.0 (with ASP.NET 4.0 installed) - Microsoft SQL Server 2008
More informationInstallation Guide For ChoiceMail Enterprise Edition
Installation Guide For ChoiceMail Enterprise Edition How to Install ChoiceMail Enterprise On A Server In Front Of Your Company Mail Server August, 2004 Version 2.6x Copyright DigiPortal Software, 2002-2004
More informationIntraVUE Plug Scanner/Recorder Installation and Start-Up
IntraVUE Plug Scanner/Recorder Installation and Start-Up The IntraVUE Plug is a complete IntraVUE Hardware/Software solution that can plug directly into any network to continually scan and record details
More informationInstall MS SQL Server 2012 Express Edition
Install MS SQL Server 2012 Express Edition Sohodox now works with SQL Server Express Edition. Earlier versions of Sohodox created and used a MS Access based database for storing indexing data and other
More informationClick Studios. Passwordstate. Installation Instructions
Passwordstate Installation Instructions This document and the information controlled therein is the property of Click Studios. It must not be reproduced in whole/part, or otherwise disclosed, without prior
More informationV Series Rapid Deployment Version 7.5
V Series Rapid Deployment Version 7.5 Table of Contents Module 1: First Boot Module 2: Configure P1 and N interfaces Module 3: Websense Software installation (Reporting Server) Module 4: Post installation
More informationUsing Logon Agent for Transparent User Identification
Using Logon Agent for Transparent User Identification Websense Logon Agent (also called Authentication Server) identifies users in real time, as they log on to domains. Logon Agent works with the Websense
More informationWebSpy Vantage Ultimate 2.2 Web Module Administrators Guide
WebSpy Vantage Ultimate 2.2 Web Module Administrators Guide This document is intended to help you get started using WebSpy Vantage Ultimate and the Web Module. For more detailed information, please see
More informationMFPConnect Monitoring. Monitoring with IPCheck Server Monitor. Integration Manual Version 2.05.00 Edition 1
MFPConnect Monitoring Monitoring with IPCheck Server Monitor Integration Manual Version 2.05.00 Edition 1 TABLE OF CONTENTS 1. INTRODUCTION...3 2. REQUIREMENTS...4 3. RESTRICTIONS...5 4. INSTALLATION...6
More informationImportant Notes for WinConnect Server VS Software Installation:
Important Notes for WinConnect Server VS Software Installation: 1. Only Windows Vista Business, Windows Vista Ultimate, Windows 7 Professional, Windows 7 Ultimate, Windows Server 2008 (32-bit & 64-bit),
More informationHow To Manage Storage With Novell Storage Manager 3.X For Active Directory
www.novell.com/documentation Installation Guide Novell Storage Manager 4.1 for Active Directory September 10, 2015 Legal Notices Condrey Corporation makes no representations or warranties with respect
More informationVirtual Appliance Setup Guide
The Virtual Appliance includes the same powerful technology and simple Web based user interface found on the Barracuda Web Application Firewall hardware appliance. It is designed for easy deployment on
More informationMultiSite Manager. Setup Guide
MultiSite Manager Setup Guide Contents 1. Introduction... 2 How MultiSite Manager works... 2 How MultiSite Manager is implemented... 2 2. MultiSite Manager requirements... 3 Operating System requirements...
More informationMultiSite Manager. User Guide
MultiSite Manager User Guide Contents 1. Getting Started... 2 Opening the MultiSite Manager... 2 Navigating MultiSite Manager... 2 2. The All Sites tabs... 3 All Sites... 3 Reports... 4 Licenses... 5 3.
More informationRSA SecurID Ready Implementation Guide
RSA SecurID Ready Implementation Guide Partner Information Last Modified: December 18, 2006 Product Information Partner Name Microsoft Web Site http://www.microsoft.com/isaserver Product Name Internet
More informationDeploying System Center 2012 R2 Configuration Manager
Deploying System Center 2012 R2 Configuration Manager This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED, OR STATUTORY, AS TO THE INFORMATION IN THIS DOCUMENT.
More informationContents. Platform Compatibility. Directory Connector SonicWALL Directory Services Connector 3.1.7
Directory Connector SonicWALL Directory Services Connector 3.1.7 Contents Platform Compatibility... 1 New Features... 2 Known Issues... 3 Resolved Issues... 4 Overview... 7 About SonicWALL Single Sign-On
More informationVirtual Appliance Setup Guide
The Barracuda SSL VPN Vx Virtual Appliance includes the same powerful technology and simple Web based user interface found on the Barracuda SSL VPN hardware appliance. It is designed for easy deployment
More information