AddLocalUser AddLocalGroup AddLocalUserToLocalGroup AddDomainUserToLocalGroup AddDomainGroupToLocalGroup
|
|
- Helena Campbell
- 8 years ago
- Views:
Transcription
1 Written by Rob Zylowski Originally developed for Unidesk and posted on Sr. Solutions Architect, Unidesk Corporation Managing User or Group Permissions on Virtual Desktops When managing virtual infrastructure there are times that it becomes important to add a user or group into a virtual desktop in some systematic way. This may be because you have an application that requires the account be deployed or because you want to use the account to manage the desktops in some way. If you are using a shared image technology like VMware View Composer or Citrix Provisioning Services the changes can be made to the base image and they will propagate to all the desktops the next time that image is deployed. However, if you are using a persistent desktop model with full clone virtual desktops or something like Unidesk you will need to perform the addition on each desktop. The easiest way to do this is with GPO Preferences as long as you use a version of Active Directory that supports this. If you don t, or for some reason you can t create preferences then you can use a script to perform the work. This document outlines the use of GPO preferences and the creation of scripts that perform the following functions: AddLocalUser AddLocalGroup AddLocalUserToLocalGroup AddDomainUserToLocalGroup AddDomainGroupToLocalGroup RemoveLocalUser RemoveLocalGroup RemoveLocalUserFromLocalGroup RemoveDomainUserFromLocalGroup RemoveDomainGroupFromLocalGroup Included along with the document are the actual scripts both in PowerShell for Windows 7 and VBscript for Windows XP. Managing User or Group Permissions on Virtual Desktops Page 1
2 Editing the SAM Database using GPO Preferences If you are running your Windows Domain on Windows Server 2008 or later and using XP with Sp2 and Client Side Extensions or Windows 7 then you can use Windows Group Policy Preferences to add accounts and groups to your client systems. This is the easiest way to do this. As an aside you want to make sure that your VDI desktops are in a separate OU path from your physical systems so that you can control group policy separately. To add accounts or groups to the local SAM edit you VDI group policy and select Computer Configuration>Preferences>Control Panel Settings>Local Users and Groups. Then choose New Local User or Local Group. Obviously, if you need to add a new user to a new group you must add the user first then the group. The entries can be moved up or down after you create them. Managing User or Group Permissions on Virtual Desktops Page 2
3 You can also add a user to an existing group. Here are some examples Managing User or Group Permissions on Virtual Desktops Page 3
4 And here are the results Managing User or Group Permissions on Virtual Desktops Page 4
5 Editing the SAM Database using A Script So what can you do if you do not have access to GPO preferences? You can use a script to modify the SAM database and call that script with a normal startup GPO. Download the accompanying script to use in your layer here <link to scripts zip>. We are displaying the usage with the PowerShell script we created for Windows 7. There is also a VB script available for Windows XP. When you look at the script you will see the following functions that have been developed AddLocalUser AddLocalGroup AddLocalUserToLocalGroup AddDomainUserToLocalGroup AddDomainGroupToLocalGroup RemoveLocalUser RemoveLocalGroup RemoveLocalUserFromLocalGroup RemoveDomainUserFromLocalGroup RemoveDomainGroupFromLocalGroup You can use the script o perform any and all of these during the same run by adjusting which are called. You can do multiples by copying one line to another. It s important to get the order correct note in the example below we add a local user, then we add that user to a local group. If you use the script there are a couple of places that you must customize it. The first is right at the top where you will enter your domain in the variable global:domain = Managing User or Group Permissions on Virtual Desktops Page 5
6 Also if you add local accounts you must determine if you will set the Password Never Expires flag and the User Cannot change Password. By default in the script only the Password never expires flag is set. See the AddLocalUser Function below for more detail. Add a cmd script to run the PowerShell script into your layer In order to run the Powershell script we created we need to create a CMD script to call it then have the script run at startup using SYSTEM permissions. If we were to run in a logon script then the user would have to be an administrator to be able to run the script. In your application layer create a cmd file that will launch the PowerShell script. An example is shown here. Setting the execution policy to remotesigned allows local PowerShell scripts to run without being signed. If desired you can add a line to delete the script after it runs. This will remove any passwords you have in the script. If you did not add any users or you would rather that the script run on every startup to ensure the accoutns are wlays there do not use a del in the CMD script. Make sure you also configure and copy the PowerShell script to the c:\windows\setup\scripts folder os that is it available for the script file to call. Add a Startup GPO to Run the script Now add a GPO to run the CMD file on startup. In your VDI group policy goto Computer Configuration>Windows Settings>Scripts>Startup> And add a script pointing to c:\windows\setup\scripts\addusersandgroups.cmd Managing User or Group Permissions on Virtual Desktops Page 6
7 Scripts Created On the following pages I outline the scripts I created that you can use. Function AddLocalUser This function is used to add a new local user to a desktop. By default the password is set to never expire. If desired remove the # in line2 64 and 65 to also set user cannot change password. When the command is run you must pass it the account name, account description and the password. Managing User or Group Permissions on Virtual Desktops Page 7
8 Function AddLocalGroup This function is used to add a new local group to a desktop. When the command is run you must pass it the group name, and description. Managing User or Group Permissions on Virtual Desktops Page 8
9 Function AddLocalUserToLocalGroup This function is used to add a local user to a local group. When the command is run you must pass it the user account name, and the group name. We first check to see if the user is already in the group. If not we add it. Function AddDomainUserToLocalGroup This function is used to add a domain user to a local group. When the command is run you must pass it the user account name, and the group name. The domain is set as a global variable. We first check to see if the user is already in the group. If not we add it. Managing User or Group Permissions on Virtual Desktops Page 9
10 Function AddDomainGroupToLocalGroup This function is used to add a domain group to a local group. When the command is run you must pass it the domain group name, and the local group name. The domain is set as a global variable. We first check to see if the domain group is already in the local group. If not we add it. Managing User or Group Permissions on Virtual Desktops Page 10
11 Function RemoveLocalUser This function is used to remove a local user from a desktop. When the command is run you must pass it the account name. We check to make sure the account exists and of so we remove it. Managing User or Group Permissions on Virtual Desktops Page 11
12 Function RemoveLocalGroup This function is used to remove a local group form a desktop. When the command is run you must pass it the group name. We check to see if the group exists and if it does we delete it. Managing User or Group Permissions on Virtual Desktops Page 12
13 Function RemoveLocalUserFromLocalGroup This function is used to remove a local user from a local group. When the command is run you must pass it the user account name, and the group name. We first check to see if the user is already in the group. If so we remove it. Function RemoveDomainUserFromLocalGroup This function is used to remove a domain user from a local group. When the command is run you must pass it the user account name, and the group name. The domain is set as a global variable. We first check to see if the user is already in the group. If so we remove it. Managing User or Group Permissions on Virtual Desktops Page 13
14 Function RemoveDomainGroupFromLocalGroup This function is used to remove a domain group from a local group. When the command is run you must pass it the domain group name, and the local group name. The domain is set as a global variable. We first check to see if the domain group is already in the local group. If so we remove it. Function IsGroupMember There is one last function used in the script. This function is used to determine if a user or group is a member of a local group. It is called by all the other functions and returns a global variable as True or False. Managing User or Group Permissions on Virtual Desktops Page 14
Preparing a Windows 7 Gold Image for Unidesk
Preparing a Windows 7 Gold Image for Unidesk What is a Unidesk gold image? In Unidesk, a gold image is, essentially, a virtual machine that contains the base operating system and usually, not much more
More informationAdd User to Administrators Group using SQL Lookup Table
Add User to Administrators Group using SQL Lookup Table Summary This utility is intended to aid customers in the ability to make the user of a desktop a local administrator on the desktop. In order to
More informationSpecops Command. Installation Guide
Specops Software. All right reserved. For more information about Specops Command and other Specops products, visit www.specopssoft.com Copyright and Trademarks Specops Command is a trademark owned by Specops
More informationIntegration Guide: Using Unidesk 3.x with Citrix XenDesktop
TECHNICAL WHITE PAPER Integration Guide: Using Unidesk 3.x with Citrix XenDesktop This document provides a high- level overview of the Unidesk product as well as design considerations for deploying Unidesk
More informationDeployment of Keepit for Windows
Deployment of Keepit for Windows Keepit A/S October 13, 2010 1 Introduction When deploying Keepit in larger setups with many desktops and servers, installing Keepit individually on each computer is cumbersome
More informationDesktop Web Access Single Sign-On Configuration Guide
Waypoint Global Suite Single Sign-On relies on establishing a relationship between a Windows network user identity and a Suite user (Windows Authentication). This is accomplished by assigning to each of
More informationACTIVE DIRECTORY DEPLOYMENT
ACTIVE DIRECTORY DEPLOYMENT CASAS Technical Support 800.255.1036 2009 Comprehensive Adult Student Assessment Systems. All rights reserved. Version 031809 CONTENTS 1. INTRODUCTION... 1 1.1 LAN PREREQUISITES...
More informationActive Directory Integration
January 11, 2011 Author: Audience: SWAT Team Evaluator Product: Cymphonix Network Composer EX Series, XLi OS version 9 Active Directory Integration The following steps will guide you through the process
More informationWindows Clients and GoPrint Print Queues
Windows Clients and GoPrint Print Queues Overview The following tasks demonstrate how to configure shared network printers on Windows client machines in a Windows Active Directory Domain and Workgroup
More informationVMware User Environment Manager
VMware User Environment Manager Deployed in 60 Minutes or Less Author: Dale Carter Senior Solution Architect VMware Technology Consulting Services April 2015 Table of Contents 1. VMware User Environment
More informationCloudPortal Services Manager Version 11.0 CU1 Deployment Guide
CloudPortal Services Manager Version 11.0 CU1 Deployment Guide Contents Install... 3 Recommended deploy process... 3 Impacted Servers... 3 Prerequisites... 3 Upgrade the database... 4 Upgrade the platform
More informationWindows Logging Configuration: Audit Policy Configuration
Windows Logging Configuration: Audit Policy Configuration Windows Auditing Windows audit policy requires computer level and in some cases object level configuration. At the computer level, Windows has
More informationCloudPortal Services Manager Version 11.0 CU2 Deployment Guide
CloudPortal Services Manager Version 11.0 CU2 Deployment Guide Contents Install... 3 Requirements... 3 Recommended deployment procedure... 3 Impacted Servers... 3 Prerequisites... 4 Upgrade the database...
More informationSARANGSoft WinBackup Business v2.5 Client Installation Guide
SARANGSoft WinBackup Business v2.5 Client Installation Guide (November, 2015) WinBackup Business Client is a part of WinBackup Business application. It runs in the background on every client computer that
More informationMS 50255B: Managing Windows Environments with Group Policy (4 Days)
www.peaklearningllc.com MS 50255B: Managing Windows Environments with Group Policy (4 Days) Introduction In course you will learn how to reduce costs and increase efficiencies in your network. You will
More informationAutomatic Network Deployment
White paper Automatic Network Deployment Easy way to manage add-in deployment February 2012 Version 1.3 Standss (South Pacific) Limited Contents Introduction... 3 Getting Started... 3 Installing MSI Package
More informationMailStore Outlook Add-in Deployment
MailStore Outlook Add-in Deployment A MailStore Server installation deploys the MailStore Outlook Add-in as a Windows Installer package (MSI) that can be installed on client machines using software distribution.
More informationMS-50255: Managing, Maintaining, and Securing Your Networks Through Group Policy. Course Objectives. Required Exam(s) Price.
MS-50255: Managing, Maintaining, and Securing Your Networks Through Group Policy Discover how to consolidate the administration of an enterprise IT infrastructure with Group Policy. In this four-day instructor
More informationPearl Echo Installation Checklist
Pearl Echo Installation Checklist Use this checklist to enter critical installation and setup information that will be required to install Pearl Echo in your network. For detailed deployment instructions
More informationQuick Start Guide. IT Management On-Demand
1 Quick Start Guide Quick Start Guide IT Management On-Demand Introduction... 2 Getting Started... 3 Planning Your Deployment... 5 Performing a Test Deployment... 6 Enterprise Deployment Options... 8 Remote
More informationWeb-Access Security Solution
WavecrestCyBlock Client Version 2.1.13 Web-Access Security Solution UserGuide www.wavecrest.net Copyright Copyright 1996-2014, Wavecrest Computing, Inc. All rights reserved. Use of this product and this
More informationQuick Start Guide for VMware and Windows 7
PROPALMS VDI Version 2.1 Quick Start Guide for VMware and Windows 7 Rev. 1.1 Published: JULY-2011 1999-2011 Propalms Ltd. All rights reserved. The information contained in this document represents the
More informationChapter. Managing Group Policy MICROSOFT EXAM OBJECTIVES COVERED IN THIS CHAPTER:
Chapter 10 Managing Group Policy MICROSOFT EXAM OBJECTIVES COVERED IN THIS CHAPTER: Implement and troubleshoot Group Policy. Create a Group Policy object (GPO). Link an existing GPO. Delegate administrative
More informationAvatier Identity Management Suite
Avatier Identity Management Suite Integrating Exchange 2010 With Identity Enforcer Version 9 2603 Camino Ramon Suite 110 San Ramon, CA 94583 Phone: 800-609-8610 925-217-5170 FAX: 925-217-0853 Email: support@avatier.com
More information50255: Managing Windows Environments with Group Policy
50255: Managing Windows Environments with Group Policy Microsoft - Servidores Localidade: Lisboa Data: 01 Oct 2015 Preço: 1520 ( Os valores apresentados não incluem IVA. Oferta de IVA a particulares e
More informationCreate, Link, or Edit a GPO with Active Directory Users and Computers
How to Edit Local Computer Policy Settings To edit the local computer policy settings, you must be a local computer administrator or a member of the Domain Admins or Enterprise Admins groups. 1. Add the
More informationInstallation Guide. . All right reserved. For more information about Specops Inventory and other Specops products, visit www.specopssoft.
. All right reserved. For more information about Specops Inventory and other Specops products, visit www.specopssoft.com Copyright and Trademarks Specops Inventory is a trademark owned by Specops Software.
More informationRemote Desktop Reporter Agent Deployment Guide
Remote Desktop Reporter Agent Deployment Guide Table of Contents Overview... 2 Agent Components... 2 Agent Security... 2 Windows Firewall Considerations... 3 Installation Procedure and Configuration Parameters...
More informationDeploying Dedicated Virtual Desktops in Hosted Environments
Deploying Dedicated Virtual Desktops in Hosted Environments Citrix XenDesktop 5.6 for Windows Server 2008 R2 Deploying Dedicated Desktops in Hosted Environments Hosted Server VDI enables CSPs to provide
More informationDeploying Dedicated Virtual Desktops in Hosted Environments
Deploying Dedicated Virtual Desktops in Hosted Environments Technical Preview Release Citrix XenDesktop 5.6 for Windows Server 2008 R2 Deploying Dedicated Desktops in Hosted Environments Hosted Server
More informationAd Hoc Transfer Plug-in for Outlook Installation Guide
IPSWITCH TECHNICAL BRIEF Ad Hoc Transfer Plug-in for Outlook Installation Guide In This Document Installing the Ad Hoc Transfer Plug-in for Outlook...1 Silent Install for Ad Hoc Transfer Plug-in for Outlook...3
More informationGuide to deploy MyUSBOnly via Windows Logon Script Revision 1.1. Menu
Menu INTRODUCTION...2 HOW DO I DEPLOY MYUSBONLY ON ALL OF MY COMPUTERS...3 ADMIN KIT...4 HOW TO SETUP A LOGON SCRIPTS...5 Why would I choose one method over another?...5 Can I use both methods to assign
More informationInstallation Guide. . All right reserved. For more information about Specops Deploy and other Specops products, visit www.specopssoft.
. All right reserved. For more information about Specops Deploy and other Specops products, visit www.specopssoft.com Copyright and Trademarks Specops Deploy is a trademark owned by Specops Software. All
More informationContentWatch Auto Deployment Tool
ContentWatch Auto Deployment Tool ContentWatch gives administrators the ability to easily distribute ContentProtect (or say our products) over any network. With our Unattended Installer you can install
More informationThird and Fourth Boots If the autologon process is used to optimize NP logons then it adds a third and fourth boot to the process.
Unidesk Desktop Build and Scripting Documentation Guide This guide is intended to provide Unidesk customer and partners with an understanding of how Unidesk desktops are built and the scripting options
More informationLT Auditor+ 2013. Windows Assessment SP1 Installation & Configuration Guide
LT Auditor+ 2013 Windows Assessment SP1 Installation & Configuration Guide Table of Contents CHAPTER 1- OVERVIEW... 3 CHAPTER 2 - INSTALL LT AUDITOR+ WINDOWS ASSESSMENT SP1 COMPONENTS... 4 System Requirements...
More informationEventTracker: Support to Non English Systems
EventTracker: Support to Non English Systems Publication Date: April 25, 2012 EventTracker 8815 Centre Park Drive Columbia MD 21045 www.eventtracker.com Introduction This document has been prepared to
More informationAutograph 3.3 Network Installation
Eastmond Publishing Ltd (Autograph) PO Box 46, Oundle, Peterborough, PE8 4JX, UK Tel: +44 (0)1832 273444 Fax: +44 (0)1832 273529 Email: support@autograph-maths.com Web: www.autograph-maths.com Technical
More informationAdvanced Audit Policy Configurations for LT Auditor+ Reference Guide
Advanced Audit Policy Configurations for LT Auditor+ Reference Guide Contents WINDOWS AUDIT POLICIES REQUIRED FOR LT AUDITOR+....3 ACTIVE DIRECTORY...3 Audit Policy for the Domain...3 Advanced Auditing
More informationConfiguring, Managing and Maintaining Windows Server 2008 Servers
Configuring, Managing and Maintaining Windows Server 2008 Servers MOC6419 About this Course This five-day instructor-led course combines five days worth of instructor-led training content from the Network
More informationInstallation Guide. . All right reserved. For more information about Specops Deploy and other Specops products, visit www.specopssoft.
. All right reserved. For more information about Specops Deploy and other Specops products, visit www.specopssoft.com Copyright and Trademarks Specops Deploy is a trademark owned by Specops Software. All
More informationFor Splunk Universal Forwarder and Splunk Cloud
Quick Start Guide; For Splunk Universal Forwarder and Splunk Cloud This document details the procedure for manually installing Layer8 software agents, and forwarding data to an existing Splunk Enterprise
More informationHOW TO SILENTLY INSTALL CLOUD LINK REMOTELY WITHOUT SUPERVISION
HOW TO SILENTLY INSTALL CLOUD LINK REMOTELY WITHOUT SUPERVISION Version 1.1 / Last updated November 2012 INTRODUCTION The Cloud Link for Windows client software is packaged as an MSI (Microsoft Installer)
More informationManaging Windows Environments with Group Policy
3 Riverchase Office Plaza Hoover, Alabama 35244 Phone: 205.989.4944 Fax: 855.317.2187 E-Mail: rwhitney@discoveritt.com Web: www.discoveritt.com Managing Windows Environments with Group Policy Course: MS50255C
More informationGroup Policy 21/05/2013
Group Policy Group Policy is not a new technology for Active Directory, but it has grown and improved with every iteration of the operating system and service pack since it was first introduced in Windows
More information4cast Client Specification and Installation
4cast Client Specification and Installation Version 2015.00 10 November 2014 Innovative Solutions for Education Management www.drakelane.co.uk System requirements The client requires Administrative rights
More informationNetSpective Logon Agent Guide for NetAuditor
NetSpective Logon Agent Guide for NetAuditor The NetSpective Logon Agent The NetSpective Logon Agent is a simple application that runs on client machines on your network to inform NetSpective (and/or NetAuditor)
More informationWolfTech Active Directory: SCCM 101
WolfTech Active Directory: SCCM 101 July 28th, 2011 2-5pm Daniels 201 August 5th, 2011 2-5pm Daniels 201 http://activedirectory.ncsu.edu/ What is going to covered? What is SCCM Roles Console Client Inventory
More informationNobeltec TZ: Microsoft SQL Server problems
Nobeltec TZ: Microsoft SQL Server problems Description: TimeZero uses Microsoft SQL server to manage routes, marks, logbook and track data. Microsoft SQL server is installed as part of the TimeZero installation.
More informationZ-Hire V3 Administration Guide
Z-Hire V3 Administration Guide The main purpose of Z-hire is to allow for fast account deployment. Usually when an administrator provisions a new user account, multiple consoles are used to get the job
More informationCYCLOPE let s talk productivity
Cyclope 6 Installation Guide CYCLOPE let s talk productivity Cyclope Employee Surveillance Solution is provided by Cyclope Series 2003-2014 1 P age Table of Contents 1. Cyclope Employee Surveillance Solution
More informationQuick Start Guide for Parallels Virtuozzo
PROPALMS VDI Version 2.1 Quick Start Guide for Parallels Virtuozzo Rev. 1.1 Published: JULY-2011 1999-2011 Propalms Ltd. All rights reserved. The information contained in this document represents the current
More informationTraining module 2 Installing VMware View
Training module 2 Installing VMware View In this second module we ll install VMware View for an End User Computing environment. We ll install all necessary parts such as VMware View Connection Server and
More informationAdminStudio 2013. Release Notes. 16 July 2013. Introduction... 3. New Features... 6
AdminStudio 2013 Release Notes 16 July 2013 Introduction... 3 New Features... 6 Microsoft App-V 5.0 Support... 6 Support for Conversion to App-V 5.0 Virtual Packages... 7 Automated Application Converter
More informationConfiguring Managing and Maintaining Windows Server 2008 Servers (6419B)
Configuring Managing and Maintaining Windows Server 2008 Servers (6419B) Who Should Attend This course is intended for Windows Server administrators who operate Windows Servers on a daily basis and want
More informationZ-Term V4 Administration Guide
Z-Term V4 Administration Guide The main purpose of Z-term is to allow for fast account termination process. Usually when an administrator terminates a departed user account, multiple consoles are used
More informationGroup Policy Objects: What are They and How Can They Help Your Firm?
Group Policy Objects: What are They and How Can They Help Your Firm? By Sharon Nelson and John Simek 2011 Sensei Enterprises, Inc. The obvious first question: What is a Group Policy Object? Basically,
More informationManaging Windows Environments with Group Policy 50255D; 5 Days, Instructor-led
Managing Windows Environments with Group Policy 50255D; 5 Days, Instructor-led Course Description In this course you will learn how to reduce costs and increase efficiencies in your network. You will discover
More informationEasy way to manage add-in deployment
White paper Automatic Network Deployment Easy way to manage add-in deployment March 2011 Version 1.4 Standss (South Pacific) Limited Contents Introduction... 3 Getting Started... 3 Installing MSI Package
More information6419: Configuring, Managing, and Maintaining Server 2008
6419: Configuring, Managing, and Maintaining Server 2008 Course Number: 6419 Category: Technical Duration: 5 days Course Description This five-day instructor-led course combines five days worth of instructor-led
More informationClick Studios. Passwordstate. Password Discovery, Reset and Validation. Requirements
Passwordstate Password Discovery, Reset and Validation Requirements This document and the information controlled therein is the property of Click Studios. It must not be reproduced in whole/part, or otherwise
More informationUsing Logon Agent for Transparent User Identification
Using Logon Agent for Transparent User Identification Websense Logon Agent (also called Authentication Server) identifies users in real time, as they log on to domains. Logon Agent works with the Websense
More informationTerminal Server Citrix MetaFrame Installation Guide
Out n About! for Outlook Electronic In/Out Status Board Terminal Server Citrix MetaFrame Installation Guide Version 3.x Contents Introduction...1 Welcome... 1 Installation...2 Citrix Installation... 2
More informationGetting Started with Citrix XenApp 6
P U B L I S H I N G professional expertise distilled Getting Started with Citrix XenApp 6 Guillermo Musumeci Chapter No.7 "Managing Policies" In this package, you will find: A Biography of the author of
More informationWelcome to the QuickStart Guide
QuickStart Guide Welcome to the QuickStart Guide This QuickStart Guide provides the information you need to install and start using Express Software Manager. For more comprehensive help on using Express
More informationThis document details the procedure for installing Layer8 software agents and reporting dashboards.
Quick Start Guide This document details the procedure for installing Layer8 software agents and reporting dashboards. Deployment to data analysis takes approximately 15 minutes. If you wish to deploy via
More informationInstallation Guide - Client. Rev 1.5.0
Installation Guide - Client Rev 1.5.0 15 th September 2006 Introduction IntraNomic requires components to be installed on each PC that will use IntraNomic. These IntraNomic Client Controls provide advanced
More informationPropalms TSE Quickstart Guide
Propalms TSE Quickstart Guide TSE 7.0 Propalms Ltd. Published February 2013 Overview Note: This guide is based on installation on Windows Server 2012. However, it is also applicable if you are using a
More informationErado Archiving & Setup Instruction Microsoft Exchange 2007 Push Journaling
Erado Archiving & Setup Instruction Microsoft Exchange 2007 Push Journaling This document covers the following Microsoft Exchange Server Editions Microsoft Exchange Enterprise Edition 2007 Microsoft Exchange
More informationMicrosoft XP Professional Remote Desktop Connection
Microsoft XP Professional Remote Desktop Connection With Remote Desktop, you get full, secure access to your work computer via an Internet or network connection. For example, you can connect to your office
More informationInstallation and Deployment
Installation and Deployment Help Documentation This document was auto-created from web content and is subject to change at any time. Copyright (c) 2016 SmarterTools Inc. Installation and Deployment SmarterStats
More informationEgress Switch Client Deployment Guide V4.x
Egress Switch Client Deployment Guide V4.x www.egress.com 2007-2013 Egress Software Technologies Ltd Table of Contents System Requirements... 4 Deployment Process... 4 Computer & User Based Policy Application...
More informationMOC 6419: Configuring, Managing, and Maintaining Windows Server 2008
1 of 6 1/6/2010 3:23 PM MOC 6419: Configuring, Managing, and Maintaining Windows Server 2008 This five-day instructor-led course combines five days worth of instructor-led training content from the Network
More informationContents 1. Introduction 2. Security Considerations 3. Installation 4. Configuration 5. Uninstallation 6. Automated Bulk Enrollment 7.
Contents 1. Introduction 2. Security Considerations 3. Installation 4. Configuration 5. Uninstallation 6. Automated Bulk Enrollment 7. Troubleshooting Introduction Adaxes Self-Service Client provides secure
More informationEndpoint Client Installation using Group Policy (Logon Script):
Endpoint Client Installation using Group Policy (Logon Script): Table of Contents Introduction... 2 Creating a Batch File... 2 Logon Script Permissions... 3 Assigning the Logon Script to User(s)... 3 Domain
More informationJAVS Scheduled Publishing. Installation/Configuration... 4 Manual Operation... 6 Automating Scheduled Publishing... 7 Windows XP... 7 Windows 7...
1 2 Copyright JAVS 1981-2010 Contents Scheduled Publishing... 4 Installation/Configuration... 4 Manual Operation... 6 Automating Scheduled Publishing... 7 Windows XP... 7 Windows 7... 12 Copyright JAVS
More informationSQL Server 2008 R2 Express Edition Installation Guide
Hardware, Software & System Requirements for SQL Server 2008 R2 Express Edition To get the overview of SQL Server 2008 R2 Express Edition, click here. Please refer links given below for all the details
More informationServer Edition Administrator s Guide
Server Edition Administrator s Guide July 13, 2010 Introduction This document covers FinePrint, pdffactory, and pdffactory Pro Server Editions (SE). Installing SE on a Windows server provides easy deployment
More informationApp-V Deploy and Publish
App-V Deploy and Publish Tools from TMurgent Technologies Updated Aug 5, 2010 Version 1.8 Introduction: The deployment of Virtual Applications in the simplest way possible, without the need for complicated
More informationAugmenting VMware View Horizon (VDI) with Micro Focus Client Management
White Paper ZENworks Augmenting VMware View Horizon (VDI) with Micro Focus Client Management Table of Contents page Making the VMware View Horizon Management Solution Work Beyond Your Wildest Dreams...2
More informationSetting up VMware Server v1 for 2X VirtualDesktopServer Manual
Setting up VMware Server v1 for 2X VirtualDesktopServer Manual URL: www.2x.com E-mail: info@2x.com Information in this document is subject to change without notice. Companies, names, and data used in examples
More informationLepide Active Directory Self Service. Configuration Guide. Follow the simple steps given in this document to start working with
Lepide Active Directory Self Service Configuration Guide 2014 Follow the simple steps given in this document to start working with Lepide Active Directory Self Service Table of Contents 1. Introduction...3
More informationTool Tip. SyAM Management Utilities and Non-Admin Domain Users
SyAM Management Utilities and Non-Admin Domain Users Some features of SyAM Management Utilities, including Client Deployment and Third Party Software Deployment, require authentication credentials with
More informationHow to Setup and Connect to an FTP Server Using FileZilla. Part I: Setting up the server
How to Setup and Connect to an FTP Server Using FileZilla The ability to store data on a server and being able to access the data from anywhere in the world has allowed us to get rid of external flash
More informationDeploying the Splunk App for Microso> Exchange
Copyright 2014 Splunk Inc. Deploying the Splunk App for Microso> Exchange Jeff Bernt SDET Disclaimer During the course of this presentahon, we may make forward- looking statements regarding future events
More informationAdministrator s Guide
Attachment Save for Exchange Administrator s Guide document version 1.8 MAPILab, December 2015 Table of contents Intro... 3 1. Product Overview... 4 2. Product Architecture and Basic Concepts... 4 3. System
More informationUser Management Resource Administrator 7.2
User Management Resource Administrator 7.2 Table Of Contents What is User Management Resource Administrator... 1 UMRA Scripts... 1 UMRA Projects... 1 UMRA Software... 1 Quickstart - Sample project wizard...
More informationMirtrak 6 Powered by Cyclope
Mirtrak 6 Powered by Cyclope Installation Guide Mirtrak Activity Monitoring Solution v6 is powered by Cyclope Series 2003-2013 Info Technology Supply Ltd. 2 Hobbs House, Harrovian Business Village, Bessborough
More informationInstalling and Configuring Login PI
Installing and Configuring Login PI Login PI Hands-on lab In this lab, you will configure Login PI to provide performance insights for a Windows Server 2012 R2 Remote Desktop Services installation. To
More informationPropalms TSE Quickstart Guide
Propalms TSE Quickstart Guide TSE 6.5 on Windows Server 2003 Propalms Ltd. Published February 2011 Overview This guide walks you through installing the first server in a Propalms TSE Team. Once complete
More informationTrial environment setup. Exchange Server Archiver - 3.0
Trial environment setup Exchange Server Archiver - 3.0 Introduction This document describes how you can set up a trial environment for using Exchange Server Archiver with Exchange Server 2007. You do not
More informationRemoteLab 2.0 Admin Guide
RemoteLab 2.0 Admin Guide Table of Contents RemoteLab 2.0 Admin Guide... 1 Getting Started with RemoteLab 2.0 (Server Configuration)... 2 System Requirements:... 2 Create your RemoteLab database:... 2
More informationConfiguring, Managing and Maintaining Windows Server 2008 Servers
Configuring, Managing and Maintaining Windows Server 2008 Servers About this Course This five-day instructor-led course combines five days worth of instructor-led training content from the Network Infrastructure
More informationUsing Group Policies to Install AutoCAD. CMMU 5405 Nate Bartley 9/22/2005
Using Group Policies to Install AutoCAD CMMU 5405 Nate Bartley 9/22/2005 Before we get started This manual provides a step-by-step process for creating a Group Policy that will install AutoCAD to a Windows
More informationRES ONE Automation 2015 Task Overview
RES ONE Automation 2015 Task Overview Task Overview RES ONE Automation 2015 Configuration Tasks The library Configuration contains Tasks that relate to the configuration of a computer, such as applying
More informationApp Orchestration 2.0
App Orchestration 2.0 Integrated Provisioning Deployment Guide Prepared by: Nicholas Ceballos Commissioning Editor: Linda Belliveau Version: 6.0 Last Updated: December 12, 2013 Page 1 Contents Integrated
More informationAdobe Acrobat 9 Deployment on Microsoft Windows Group Policy and the Active Directory service
Adobe Acrobat 9 Deployment on Microsoft Windows Group Policy and the Active Directory service white paper TABLE OF CONTENTS 1. Document overview......... 1 2. References............. 1 3. Product overview..........
More informationINSTALLING MICROSOFT SQL SERVER AND CONFIGURING REPORTING SERVICES
INSTALLING MICROSOFT SQL SERVER AND CONFIGURING REPORTING SERVICES TECHNICAL ARTICLE November 2012. Legal Notice The information in this publication is furnished for information use only, and does not
More informationHow to monitor AD security with MOM
How to monitor AD security with MOM A article about monitor Active Directory security with Microsoft Operations Manager 2005 Anders Bengtsson, MCSE http://www.momresources.org November 2006 (1) Table of
More informationInstalling GFI Network Server Monitor
Installing GFI Network Server Monitor System requirements Computers running GFI Network Server Monitor require: Windows 2000 (SP4 or higher), 2003 or XP Pro operating systems. Windows scripting host 5.5
More information