OpenInsight Data Encryption at Rest (RTIDER)

Size: px
Start display at page:

Download "OpenInsight Data Encryption at Rest (RTIDER)"

Transcription

1 OpenInsight Data Encryption at Rest (RTIDER) Version 1.1 A Division of Revelation Technologies, Inc.

2 COPYRIGHT NOTICE Revelation Technologies, Inc. All rights reserved. No part of this publication may be reproduced by any means, be it transmitted, transcribed, photocopied, stored in a retrieval system, or translated into any language in any form, without the written permission of Revelation Technologies, Inc. SOFTWARE COPYRIGHT NOTICE Your license agreement with Revelation Technologies, Inc. authorizes the conditions under which copies of the software can be made and the restrictions imposed on the computer system(s) on which they may be used. Any unauthorized duplication or use of any software product produced by Revelation Technologies, Inc., in whole or in part, in any manner, in print or an electronic storage-and-retrieval system, is strictly forbidden. TRADEMARK NOTICE OpenInsight is a registered trademark of Revelation Technologies, Inc. Windows 2000, Windows XP Professional, Windows Vista Business, Windows 7, Windows 8, Windows Server 2003, Windows Server 2008, Windows Server 2012 and above are registered trademarks of Microsoft, Inc. Part No Printed in the United States of America. 2

3 Table of Contents SECTION I: INTRODUCTION TO RTIDER... 4 DIFFERENT TYPES OF ENCRYPTED VOLUMES - SITE-SPECIFIC AND PASS... 4 SECTION II: CONFIGURATION OF RTIDER SYSTEM... 5 RTIDERSERVER INSTALL, SETUP, AND CONFIGURATION... 5 RTIDERCLIENT INSTALL, SETUP, AND CONFIGURATION SECTION III: CONFIGURE ENCRYPTION SERVER SECTION IV: CREATING VOLUMES CREATING A RTIDER VOLUME CREATING A PASS VOLUME SECTION IV: CREATING ENCRYPTED TABLES CREATING A NEW ENCRYPTED TABLE COPYING AN EXISTING TABLE TO AN ENCRYPTED VOLUME CHANGING ENCRYPTION SETTINGS AFTER CREATION SECTION V: MOVING DATA BETWEEN NORMAL AND ENCRYPTED VOLUMES ON A SINGLE SYSTEM SECTION VI: MOVING DATA BETWEEN RTIDER SYSTEMS

4 Section I: Introduction to RTIDER OpenInsight version 9.3 and above incorporates a new encryption service that system administrators can deploy to encrypt (on a field by field level) data in OpenInsight. The data will be encrypted at rest using industry standard encryption routines. Clients and the encryption service use the Windows Communication Foundation (WCF) to communicate, thus allowing the data to be encrypted in transit. Through the use of an Encryption Server (normally, but not necessarily, the same machine as the Universal Driver server), each OpenInsight workstation seamlessly and securely encrypts data for storage when written into an encrypted volume. The metadata and actual table contents are stored on the encryption server use AES encryption algorithm with a key size of 256 and 2 key iterations. For more information on this type of encryption see: Different types of encrypted volumes - site-specific and PASS There are two different types of encrypted volumes. A normal RTIDER volume uses encryption keys that are maintained by the Encryption Server; all workstations accessing this Encryption Server can (with proper permissions) access the data, but the tables contained in these volumes cannot be used by any other system running its own Encryption Server. Alternatively, a volume can be defined as an RTIDER PASS (Password Authenticated Single Session) volume; to access tables in a PASS volume, the user must enter the required passphrases during table attachment. The PASS volume can be moved among different Encryption Server systems, and is thus suitable for transporting data either temporarily (for example, when copying tables between fixed systems) or permanently (for example, putting such tables on a pen drive). 4

5 Section II: Configuration of RTIDER system Prior to installing the Encryption Server, system administrators may choose to create a new privileged user on the Windows PC that will act as the server. This user MUST have permissions to access the registry on the server. If a new user is not created, an existing user with the proper permissions (NOT the default system user normally assigned to services) may be used instead. RTIDERServer install, setup, and configuration To install the Encryption Server software, system administrators must run the Encryption Server Setup routine. They will be prompted to enter the address and port number assigned to the Encryption Server, so that this information can be updated for the subsequent Encryption Client installations. After installation, the system administrator must change the "Login User" for the Encryption Server service before starting the Encryption Server software, and must in addition make sure that the specified port number is accessible from all the desired clients. Administrators will also need to run the "one time configuration" for the Encryption Server, to specify which Windows groups will be allowed to perform various encryption roles. 5

6 6 1. The RTIDERServer setup executable can be found in the DERServer folder under your OpenInsight directory. Right click on the executable and Run as administrator.

7 7

8 8 2. The default location is C:\Revsoft\RTIDERServer.

9 3. If the Service Details are incorrect you will not be able to continue. 9

10 10 4. The default TCP port for the Encryption Server is 8188.

11 11

12 12 5. Make sure that the RTIDERService is started prior to using the Encryption Server.

13 RTIDERClient install, setup, and configuration 1. The Encryption Client software is automatically installed during the client setup process (performed by running the clientsetup.exe contained in the OpenInsight folder). 13

14 14 2. Specify the location you want to store the client install files.

15 3. Click No to install the.net 4.0 framework which is required for the Encryption Service. 15

16 16

17 Section III: Configure Encryption Server 1. To configure the Encryption Server open the Database Manager from Application Tools. 17

18 18 2. From the Database Manager select Utilitiies, OpenInsight Tables, Data Encryption At Rest, Configure Server.

19 19

20 3. If the Encryption Server has already been configured you will receive the following message. Do NOT change your Passphrase or Encryption Seed. 4. Secure your Server Passphrase and Encryption Seed in a secure location. You will need these in the event of disaster recovery to regain access to your encrypted data. 20

21 5. One or more Windows Groups are assigned to one or more Encryption Server Roles provided with the Encryption Server. Members of the groups that are in the Role Manager role are the people who can assign groups to the other roles. 21

22 22 6. The Security Groups can be selected from a popop.

23 7. Members of the groups in the Server Manager roles can change the encryption settings on the server. 23

24 24 8. Members of the groups that are in the Table Manager role can define or change the encryption settings on tables.

25 9. Members of the groups that are in the Assign Impersonators role can programmatically set which group they wish to impersonate. This is used when multiple different permissions are required, but all users log into Windows as the same user (e.g. the O4W user). 25

26 Members of the groups that are in the Data Access roles are allowed to access the encryption system. Any users who are not members of these groups will not be able to connect to the encryption server.

27 27

28 Section IV: Creating Volumes Creating a RTIDER volume Before encrypted tables can be created, an encrypted volume must first be defined. For a normal RTIDER volume, the normal CREATE_VOLUME procedure is used, with additional encryption parameters passed in as part of the "control_location" parameter: Create_Volume( volume_name, filing_system, location, control_location, status) The volume_name is the name of the new volume to create; the filing_system must be "RTP57E" for an encrypted volume; the location is the physical Windows directory for this volume; and the control_location contains the encryption delimited: server_address : server_port : show_protected Where server_address is the IP address of the Encryption Server, server_port is the port number that the Encryption Server service is "listening" on, and show_protected is a flag (0 or 1) to indicate whether encrypted fields should be blanked out (0) or displayed in their encrypted format (1) by users who do not have permissions to decrypt those fields. 1. To Create a Volume open the Database Manager from Application Tools. 28

29 2. Enter your Volume Name and Location and click the Save button. If Show encrypted is selected then users with no permissions will see the encrypted value. If Hide encrypted is selected then users with no permissions will see a blank value for all encrypted data. 29

30 30 3. You can add or remove one or more MFS to an entire volume instead of individual tables.

31 Creating a PASS volume To create a PASS volume, you must use the CREATE_VOLUME_PASS procedure: Create_Volume_Pass( volume_name, location, control_location, passphrase, initvector, status) Where volume_name, location, and control_location are defined as above, and passphrase and initvector are the unique pieces that will be used to encrypt the information in this volume. The passphrase and the initvector are both user-defined strings or words; they should be unique to each PASS volume, but may be anything that is both memorable and easy to keep secret. Note that, since PASS volumes require the passphrase and initvector to be specified each time they are initially accessed, you should NOT add tables in the PASS volume(s) to your database definition. Instead, you must always run ATTACH_TABLE_PASS to attach, on a per-session basis, the tables in the PASS volume: Attach_Table_PASS( volume_pointer_name, tablelist, database, passphrase, initvector, status) 1. To Create a PASS Volume open the Database Manager from Application Tools. 31

32 32 2. Enter your Volume Name and Location. Select PASS and enter the PASS Volume Passphrase and Encryption Seed. Click the Save button.

33 1. To Attach a PASS Volume open the Database Manager from Application Tools. 2. Select the PASS Volume location and enter the PASS Volume Passphrase and Encryption Seed. 33

34 34

35 Section IV: Creating encrypted tables Tables in the encrypted volume can be created using the CREATE_TABLE procedure, which has now been extended to include an additional parameter: Create_Table(locationlist, tablename, dictflag, databaseid, tableattributeslist, protectflag, unused, unused, encryptinfo) The encryptinfo parameter defines which fields in the table should be encrypted, which groups should be able to access the data in the table, and how keys should be processed. This parameter delimited as follows: 1. list_of_fields 2. list_of_groups 3. error flag 4. key part flag Field 1 (list_of_fields) contains a list of which fields should be encrypted; this list is comma-delimited, and may contain 0 (to indicate the key field), 0*<keypart> (for example, 0*1) (to indicate part of the key field), or -1 (to indicate all fields, including the key field). An example of the list_of_fields may be "0,1,3,4", or "-1". Field 2 (list_of_groups) defines which Windows groups should have access to each of the encrypted fields; this list is in the format <fieldnumber>:<groupname>{;<groupname>;<groupname>}{,<fieldnumber>...}. For each field that may be encrypted (as defined in the list_of_fields), you may specify one or more Windows groups that can access that fields' information. As above, the field number may contain 0 (for the key field), 0*<keypart> (for a key part), or -1 (for all fields, including the key field); the group names can also be "*" to indicate "all valid Windows users in this domain." An example of the list_of_groups may be "0:inventory;acctg,1:*,3:acctg,4:inventory" or "- 1:*". If a user attempts to update a record for which he/she does not have full permissions, the Encryption Server can either "merge" the original record's fields with the updated data, or generate an error. If field 3 (error flag) is set to 1, then an error is returned; if set to 0, then the modified data is merged with the protected fields. If a key contains multiple parts (separated by the key delimiter "*"), it can be encrypted as a single piece of information, or each key part can be encrypted separately. If field 4 (key part flag) is set to 1, then each key part is encrypted separately; if set to 0, the entire key is treated as a single string, and the key delimiters are ignored during the encryption process). Please note that it is specifically allowed to create a table with no encryption information in an encrypted volume - simply pass in an empty string ("") for the encryptinfo parameter. If instead you wish to create an encrypted table with the default settings, pass in a parameter with 4 fields, each of which are the empty string (""). 35

36 Creating a new encrypted table 1. You can create a new encrypted table from Database Manager, Utilities, OpenInsight Tables, Data Encryption at Rest, Create Table. 36

37 2. You can also create an encrypted table from Database Manager. Choose File, New Table. 37

38 38 3. Click the Browse button and select Defined Locations.

39 4. Select the location of your Encrypted Volume. Encrypted volumes are denoted with a Filing System of RTP57E. 39

40 40 5. Add your data dictionary columns.

41 6. Tables created in encrypted volumes will be prompted with the following form to set the encryption settings for this table. 41

42 42 7. You can set the encryption level at none, all fields or specific fields. For users with no permissions you can choose to not allow record updates or allow record updates leaving the encrypted field unchanged. Record keys can be encrypted as a single string or individually by key parts.

43 8. Field level encryption can be set by checking the appropriate dictionary name. Access groups are set to default settings of the Encryption Server. 43

44 44 9. Specific Access Groups can be selected on a field level by double clicking on Access Groups.

45 10. Select the appropriate Access Groups for this field from the popup provided. 45

46 46

47 11. The Encryption Attributes can be altered on a table as long as no data has been added to that table. Field Level encryption settings can only be altered on empty tables. From the Table Builder menu choose File, Encryption Attributes. 47

48 If a table contains data the only encryption parameter that can be modified is Update rows with restricted access.

49 13. In this example we will add data rows to our newly created table from Database Manager. 49

50 Right click on the table and choose Table Browser.

51 15. From Table Browser add several data rows and Save. 51

52 The data location of this encrypted table can be seen in line 6 of the SYSTABLES*CONTACTS record.

53 17. If we open this file in Notepad you can see that the fields we selected are encrypted. 53

54 Copying an existing table to an encrypted volume 1. You can copy an existing table to an encrypted volume by selecting Copy Table wizard from the Database Manager, Utilities, OpenInsight Tables, Data Encryption at Rest, Copy Table Wizard. 54

55 2. You can also copy an existing table to an encrypted volume from Database Manager. Choose File, Encrypted Copy Table Wizard. 55

56 56 3. Select the table that you want to copy to an encrypted volume.

57 4. Tables that contain indexes cannot be copied to an encrypted volume. The indexes must be removed prior to copying the table. 57

58 5. Once the indexes have been removed you can select your source table to copy. 6. Select the location an encrypted volume that you want to copy your table into. 58

59 59

60 7. Choose the application for the copied table. 8. By default the copied table name is the same as your source table name. You can change the table name. 60

61 9. Choose your level of encryption for this table. 10. Select the columns which will be encrypted. 61

62 You have the option to delete the source unencrypted table (not recommended) upon completion of the Wizard.

63 12. Upon completion of the Wizard, the table has been copied to the encrypted volume and removed from the unencrypted volume. 63

64 Table Browser will display the copied data rows.

65 Changing encryption settings after creation 1. It is possible to change the encryption settings after the table has been created; this is especially useful if you wish to use the Table Builder to create the proper dictionary definitions before deciding which fields should be encrypted. However, you MUST change the encryption settings BEFORE any data has been stored in the table. 65

66 66

67 2. In this example we are changing the Access Groups for the FAX field. 67

68 68 3. Users who are not members of this group cannot see the FAX data.

69 4. Here we are setting the Access Group back to the original setting. 69

70 70 5. Members of this Access Group can now view the FAX field.

71 Section V: Moving data between normal and encrypted volumes on a single system To encrypt existing tables, or remove encryption from an already-encrypted table, you can use the COPY_TABLE procedure, which now supports an additional parameter: Copy_Table(tablename, location, database, newtablename, lockflag, deleteflag, overwriteflag, existflag, status, removerelationalindexing, encryptinfo) The encryptinfo parameter contains the same information as specified above in CREATE_TABLE. It is only required when copying to an encrypted (RTP57E) volume. When copying from an encrypted volume to a normal volume, or between normal (RTP57) volumes, the encryptinfo parameter can be omitted. 71

72 Section VI: Moving data between RTIDER systems Data stored in normal RTIDER volumes can only be read by the Encryption Server on which it was created. To move data to another RTIDER system, you must create a PASS volume, and then use COPY_TABLE to duplicate the data in the PASS volume. Once completed, the entire contents of the physical Windows folder where the PASS volume was defined can be moved to the target RTIDER system, attached (using ATTACH_TABLE_PASS), and then COPY_TABLE can again be called to move the transported data onto the new RTIDER system. If you do not wish to transport an entire table's contents, but still wish to protect one or more rows via encryption during transport, the steps to follow are almost the same - create a PASS volume, create an encrypted table in the PASS volume, use COPY_ROW to copy data from the source table to this "transport" table, move the Windows folder to the target system, attach the PASS volume with ATTACH_TABLE_PASS, and then COPY_ROW the data to the target table. 72

73 Revelation Software, Inc 99 Kinderkamack Road Ste 109 Westwood, NJ U.S.A Toll Free: Phone: Fax: Revelation Software Ltd. Boundary House Boston Road London, W7 2QE U.K. Phone: Fax: info@revsoft.co.uk BrightIdeas New Zealand 44 Cockle Bay Rd, Howick Auckland, 2014 New Zealand Phone: info@revelation.asia Revelation Software is a division of Revelation Technologies, Inc. Part No

OpenInsight Single Sign-On (SSO)

OpenInsight Single Sign-On (SSO) OpenInsight Single Sign-On (SSO) Version 1.1 A Division of Revelation Technologies, Inc. COPYRIGHT NOTICE 1996-2014 Revelation Technologies, Inc. All rights reserved. No part of this publication may be

More information

OpenInsight License Renewal and Installation/Upgrade Authorization Process

OpenInsight License Renewal and Installation/Upgrade Authorization Process OpenInsight License Renewal and Installation/Upgrade Authorization Process Versions 8.0.3 and above A Division of Revelation Technologies, Inc. COPYRIGHT NOTICE 1996-2014 Revelation Technologies, Inc.

More information

Network Driver Update for Large Keys

Network Driver Update for Large Keys Network Driver Update for Large Keys Version 1.0 A Division of Revelation Technologies, Inc. COPYRIGHT NOTICE 1996-2009 Revelation Technologies, Inc. All rights reserved. No part of this publication may

More information

OECGI3.EXE Installation and Configuration Quick Start Guide

OECGI3.EXE Installation and Configuration Quick Start Guide OECGI3.EXE Installation and Configuration Quick Start Guide Version 1.1 A Division of Revelation Technologies, Inc. COPYRIGHT NOTICE 1996-2012 Revelation Technologies, Inc. All rights reserved. No part

More information

OpenInsight 9.3 Arev32 Quick Start Guide

OpenInsight 9.3 Arev32 Quick Start Guide OpenInsight 9.3 Arev32 Quick Start Guide A Division of Revelation Technologies, Inc. COPYRIGHT NOTICE 1996-2011 Revelation Technologies, Inc. All rights reserved. No part of this publication may be reproduced

More information

Monitor Print Popup for Mac. Product Manual. www.monitorbm.com

Monitor Print Popup for Mac. Product Manual. www.monitorbm.com Monitor Print Popup for Mac Product Manual www.monitorbm.com Monitor Print Popup for Mac Product Manual Copyright 2013 Monitor Business Machines Ltd The software contains proprietary information of Monitor

More information

SafeGuard Enterprise Web Helpdesk. Product version: 6 Document date: February 2012

SafeGuard Enterprise Web Helpdesk. Product version: 6 Document date: February 2012 SafeGuard Enterprise Web Helpdesk Product version: 6 Document date: February 2012 Contents 1 SafeGuard web-based Challenge/Response...3 2 Installation...5 3 Authentication...8 4 Select the Web Helpdesk

More information

Astaro Security Gateway V8. Remote Access via L2TP over IPSec Configuring ASG and Client

Astaro Security Gateway V8. Remote Access via L2TP over IPSec Configuring ASG and Client Astaro Security Gateway V8 Remote Access via L2TP over IPSec Configuring ASG and Client 1. Introduction This guide contains complementary information on the Administration Guide and the Online Help. If

More information

SafeGuard Enterprise Web Helpdesk

SafeGuard Enterprise Web Helpdesk SafeGuard Enterprise Web Helpdesk Product version: 5.60 Document date: April 2011 Contents 1 SafeGuard web-based Challenge/Response...3 2 Installation...5 3 Authentication...8 4 Select the Web Help Desk

More information

Omniquad Exchange Archiving

Omniquad Exchange Archiving Omniquad Exchange Archiving Deployment and Administrator Guide Manual version 3.1.2 Revision Date: 20 May 2013 Copyright 2012 Omniquad Ltd. All rights reserved. Omniquad Ltd Crown House 72 Hammersmith

More information

User Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream

User Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream User Manual Onsight Management Suite Version 5.1 Another Innovation by Librestream Doc #: 400075-06 May 2012 Information in this document is subject to change without notice. Reproduction in any manner

More information

SafeGuard Enterprise Web Helpdesk. Product version: 6.1

SafeGuard Enterprise Web Helpdesk. Product version: 6.1 SafeGuard Enterprise Web Helpdesk Product version: 6.1 Document date: February 2014 Contents 1 SafeGuard web-based Challenge/Response...3 2 Scope of Web Helpdesk...4 3 Installation...5 4 Allow Web Helpdesk

More information

Improving Performance of Microsoft CRM 3.0 by Using a Dedicated Report Server

Improving Performance of Microsoft CRM 3.0 by Using a Dedicated Report Server Improving Performance of Microsoft CRM 3.0 by Using a Dedicated Report Server January 2006 Downloaded from http://www.sonomapartners.com/ - 1 - Information in this document, including URL and other Internet

More information

Desktop Deployment Guide ARGUS Enterprise 10.6. 5/29/2015 ARGUS Software An Altus Group Company

Desktop Deployment Guide ARGUS Enterprise 10.6. 5/29/2015 ARGUS Software An Altus Group Company ARGUS Enterprise 10.6 5/29/2015 ARGUS Software An Altus Group Company for ARGUS Enterprise Version 10.6 5/29/2015 Published by: ARGUS Software, Inc. 3050 Post Oak Boulevard Suite 900 Houston, Texas 77056

More information

ilaw Installation Procedure

ilaw Installation Procedure ilaw Installation Procedure This guide will provide a reference for a full installation of ilaw Case Management Software. Contents ilaw Overview How ilaw works Installing ilaw Server on a PC Installing

More information

CRM to Exchange Synchronization

CRM to Exchange Synchronization CRM to Exchange Synchronization Installation, Configuration and End-User Instructions VERSION 1.0 DATE PREPARED: 9/1/2012 DEVELOPMENT: BRITE GLOBAL, INC. 2012 Brite Global, Incorporated. All rights reserved.

More information

for Networks Installation Guide for the application on the server July 2014 (GUIDE 2) Lucid Rapid Version 6.05-N and later

for Networks Installation Guide for the application on the server July 2014 (GUIDE 2) Lucid Rapid Version 6.05-N and later for Networks Installation Guide for the application on the server July 2014 (GUIDE 2) Lucid Rapid Version 6.05-N and later Copyright 2014, Lucid Innovations Limited. All Rights Reserved Lucid Research

More information

TASKE Call Center Management Tools

TASKE Call Center Management Tools TASKE Call Center Management Tools Version 7 Integrating and Configuring Blue Pumpkin PrimeTime and PrimeTime Skills TASKE Technology Inc. Copyright 2000, TASKE Technology Inc. All rights reserved. Printed

More information

Installation and Connection Guide to the simulation environment GLOBAL VISION

Installation and Connection Guide to the simulation environment GLOBAL VISION Installation and Connection Guide to the simulation environment GLOBAL VISION Hardware and Software Requirements The following hardware specification is recommended for client machines: 2 GHz Pentium class

More information

Using Microsoft Windows Authentication for Microsoft SQL Server Connections in Data Archive

Using Microsoft Windows Authentication for Microsoft SQL Server Connections in Data Archive Using Microsoft Windows Authentication for Microsoft SQL Server Connections in Data Archive 2014 Informatica Corporation. No part of this document may be reproduced or transmitted in any form, by any means

More information

Creating IBM Cognos Controller Databases using Microsoft SQL Server

Creating IBM Cognos Controller Databases using Microsoft SQL Server Guideline Creating IBM Cognos Controller Databases using Microsoft SQL Product(s): IBM Cognos Controller 8.1 or higher Area of Interest: Financial Management 2 Copyright Copyright 2008 Cognos ULC (formerly

More information

OPENGATE SMALL BUSINESS SOFTWARE

OPENGATE SMALL BUSINESS SOFTWARE OPENGATE SMALL BUSINESS SOFTWARE VERSION 1.1 Administrator's Guide Version 10.10.2009 This document is copyright 2007-2009 OpenGate Software. The information contained in this document is subject to change

More information

for Networks Installation Guide for the application on the server August 2014 (GUIDE 2) Lucid Exact Version 1.7-N and later

for Networks Installation Guide for the application on the server August 2014 (GUIDE 2) Lucid Exact Version 1.7-N and later for Networks Installation Guide for the application on the server August 2014 (GUIDE 2) Lucid Exact Version 1.7-N and later Copyright 2014, Lucid Innovations Limited. All Rights Reserved Lucid Research

More information

CTERA Agent for Windows

CTERA Agent for Windows User Guide CTERA Agent for Windows May 2012 Version 3.1 Copyright 2009-2012 CTERA Networks Ltd. All rights reserved. No part of this document may be reproduced in any form or by any means without written

More information

NovaBACKUP. Storage Server. NovaStor / May 2011

NovaBACKUP. Storage Server. NovaStor / May 2011 NovaBACKUP Storage Server NovaStor / May 2011 2011 NovaStor, all rights reserved. All trademarks are the property of their respective owners. Features and specifications are subject to change without notice.

More information

enicq 5 System Administrator s Guide

enicq 5 System Administrator s Guide Vermont Oxford Network enicq 5 Documentation enicq 5 System Administrator s Guide Release 2.0 Published November 2014 2014 Vermont Oxford Network. All Rights Reserved. enicq 5 System Administrator s Guide

More information

MobileStatus Server Installation and Configuration Guide

MobileStatus Server Installation and Configuration Guide MobileStatus Server Installation and Configuration Guide Guide to installing and configuring the MobileStatus Server for Ventelo Mobilstatus Version 1.2 June 2010 www.blueposition.com All company names,

More information

White Paper. Installation and Configuration of Fabasoft Folio IMAP Service. Fabasoft Folio 2015 Update Rollup 3

White Paper. Installation and Configuration of Fabasoft Folio IMAP Service. Fabasoft Folio 2015 Update Rollup 3 White Paper Fabasoft Folio 2015 Update Rollup 3 Copyright Fabasoft R&D GmbH, Linz, Austria, 2016. All rights reserved. All hardware and software names used are registered trade names and/or registered

More information

How to Secure a Groove Manager Web Site

How to Secure a Groove Manager Web Site How to Secure a Groove Manager Web Site Information in this document, including URL and other Internet Web site references, is subject to change without notice. Unless otherwise noted, the companies, organizations,

More information

SMART Classroom Suite 2011

SMART Classroom Suite 2011 SMART Classroom Suite 2011 Windows operating systems System administrator s guide Trademark notice SMART Board, SMART Classroom Suite, SMART Notebook, SMART Response, SMART Sync, SMART Document Camera,

More information

Installing LearningBay Enterprise Part 2

Installing LearningBay Enterprise Part 2 Installing LearningBay Enterprise Part 2 Support Document Copyright 2012 Axiom. All Rights Reserved. Page 1 Please note that this document is one of three that details the process for installing LearningBay

More information

SafeGuard PrivateCrypto 2.40 help

SafeGuard PrivateCrypto 2.40 help SafeGuard PrivateCrypto 2.40 help Document date: September 2009 Contents 1 Introduction... 2 2 Installation... 4 3 SafeGuard PrivateCrypto User Application... 5 4 SafeGuard PrivateCrypto Explorer extensions...

More information

File Management Utility User Guide

File Management Utility User Guide File Management Utility User Guide Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held

More information

Sophos Enterprise Console server to server migration guide. Product version: 5.1 Document date: June 2012

Sophos Enterprise Console server to server migration guide. Product version: 5.1 Document date: June 2012 Sophos Enterprise Console server to server migration guide Product : 5.1 Document date: June 2012 Contents 1 About this guide...3 2 Terminology...4 3 Assumptions...5 4 Prerequisite...6 5 What are the key

More information

BlackShield ID Agent for Remote Web Workplace

BlackShield ID Agent for Remote Web Workplace Agent for Remote Web Workplace 2010 CRYPTOCard Corp. All rights reserved. http:// www.cryptocard.com Copyright Copyright 2010, CRYPTOCard All Rights Reserved. No part of this publication may be reproduced,

More information

FrontDesk. (Server Software Installation) Ver. 1.0.1. www.frontdeskhealth.com

FrontDesk. (Server Software Installation) Ver. 1.0.1. www.frontdeskhealth.com FrontDesk (Server Software Installation) Ver. 1.0.1 www.frontdeskhealth.com This document is the installation manual for installing the FrontDesk Server, Kiosk/Touch Screen, and License Management Tool

More information

Interworks. Interworks Cloud Platform Installation Guide

Interworks. Interworks Cloud Platform Installation Guide Interworks Interworks Cloud Platform Installation Guide Published: March, 2014 This document contains information proprietary to Interworks and its receipt or possession does not convey any rights to reproduce,

More information

SMART Sync 2011. Windows operating systems. System administrator s guide

SMART Sync 2011. Windows operating systems. System administrator s guide SMART Sync 2011 Windows operating systems System administrator s guide Trademark notice SMART Sync, smarttech and the SMART logo are trademarks or registered trademarks of SMART Technologies ULC in the

More information

Sophos Enterprise Console server to server migration guide. Product version: 5.2

Sophos Enterprise Console server to server migration guide. Product version: 5.2 Sophos Enterprise Console server to server migration guide Product : 5.2 Document date: December 2014 Contents 1 About this guide...3 2 Terminology...4 3 Assumptions...5 4 Prerequisite...6 5 What are the

More information

STEP BY STEP IIS, DotNET and SQL-Server Installation for an ARAS Innovator9x Test System

STEP BY STEP IIS, DotNET and SQL-Server Installation for an ARAS Innovator9x Test System STEP BY STEP IIS, DotNET and SQL-Server Installation for an ARAS Innovator9x Test System Abstract The intention of this document is to ensure successful installation of 3rd-Party software required for

More information

Technical Note. Configuring Outlook Web Access with Secure WebMail Proxy for eprism

Technical Note. Configuring Outlook Web Access with Secure WebMail Proxy for eprism Technical Note Configuring Outlook Web Access with Secure WebMail Proxy for eprism Information in this document is subject to change without notice. This document may be distributed freely only in whole,

More information

NovaBACKUP Central Management Console

NovaBACKUP Central Management Console NovaBACKUP Central Management Console User Manual NovaStor / November 2013 2013 NovaStor, all rights reserved. All trademarks are the property of their respective owners. Features and specifications are

More information

Metalogix SharePoint Backup. Advanced Installation Guide. Publication Date: August 24, 2015

Metalogix SharePoint Backup. Advanced Installation Guide. Publication Date: August 24, 2015 Metalogix SharePoint Backup Publication Date: August 24, 2015 All Rights Reserved. This software is protected by copyright law and international treaties. Unauthorized reproduction or distribution of this

More information

HELP DOCUMENTATION E-SSOM DEPLOYMENT GUIDE

HELP DOCUMENTATION E-SSOM DEPLOYMENT GUIDE HELP DOCUMENTATION E-SSOM DEPLOYMENT GUIDE Copyright 1998-2013 Tools4ever B.V. All rights reserved. No part of the contents of this user guide may be reproduced or transmitted in any form or by any means

More information

Lepide Active Directory Self Service. Installation Guide. Lepide Active Directory Self Service Tool. Lepide Software Private Limited Page 1

Lepide Active Directory Self Service. Installation Guide. Lepide Active Directory Self Service Tool. Lepide Software Private Limited Page 1 Installation Guide Lepide Active Directory Self Service Tool Lepide Software Private Limited Page 1 Lepide Software Private Limited, All Rights Reserved This User Guide and documentation is copyright of

More information

Out n About! for Outlook Electronic In/Out Status Board. Administrators Guide. Version 3.x

Out n About! for Outlook Electronic In/Out Status Board. Administrators Guide. Version 3.x Out n About! for Outlook Electronic In/Out Status Board Administrators Guide Version 3.x Contents Introduction... 1 Welcome... 1 Administration... 1 System Design... 1 Installation... 3 System Requirements...

More information

Remark FTP Utility. For Remark Office OMR. User s Guide

Remark FTP Utility. For Remark Office OMR. User s Guide Remark FTP Utility For Remark Office OMR User s Guide Remark Products Group 301 Lindenwood Drive, Suite 100 Malvern, PA 19355-1772 USA www.gravic.com Disclaimer The information contained in this document

More information

PageScope Enterprise Suite

PageScope Enterprise Suite 5 PageScope Enterprise Suite Setup & Configuration Guide Date : 09/12/2008 Written by: Tony Gliatta, Vartkes Tashjian, Rob Posenato Location: CEC Lab, HQ Ramsey, NJ Step by Step Installation Field Guide

More information

LPR for Windows 95/98/Me/2000/XP TCP/IP Printing User s Guide. Rev. 03 (November, 2001)

LPR for Windows 95/98/Me/2000/XP TCP/IP Printing User s Guide. Rev. 03 (November, 2001) LPR for Windows 95/98/Me/2000/XP TCP/IP Printing User s Guide Rev. 03 (November, 2001) Copyright Statement Trademarks Copyright 1997 No part of this publication may be reproduced in any form or by any

More information

Bentley CONNECT Dynamic Rights Management Service

Bentley CONNECT Dynamic Rights Management Service v1.0 Implementation Guide Last Updated: March 20, 2013 Table of Contents Notices...5 Chapter 1: Introduction to Management Service...7 Chapter 2: Configuring Bentley Dynamic Rights...9 Adding Role Services

More information

SELF SERVICE RESET PASSWORD MANAGEMENT DATABASE REPLICATION GUIDE

SELF SERVICE RESET PASSWORD MANAGEMENT DATABASE REPLICATION GUIDE SELF SERVICE RESET PASSWORD MANAGEMENT DATABASE REPLICATION GUIDE Copyright 1998-2015 Tools4ever B.V. All rights reserved. No part of the contents of this user guide may be reproduced or transmitted in

More information

AdminToys Suite. Installation & Setup Guide

AdminToys Suite. Installation & Setup Guide AdminToys Suite Installation & Setup Guide Copyright 2008-2009 Lovelysoft. All Rights Reserved. Information in this document is subject to change without prior notice. Certain names of program products

More information

Veeam Task Manager for Hyper-V

Veeam Task Manager for Hyper-V Veeam Task Manager for Hyper-V Version 1.0 User Guide July, 2014 2014 Veeam Software. All rights reserved. All trademarks are the property of their respective owners. No part of this publication may be

More information

BlackShield ID Agent for Terminal Services Web and Remote Desktop Web

BlackShield ID Agent for Terminal Services Web and Remote Desktop Web Agent for Terminal Services Web and Remote Desktop Web 2010 CRYPTOCard Corp. All rights reserved. http:// www.cryptocard.com Copyright Copyright 2010, CRYPTOCard All Rights Reserved. No part of this publication

More information

Andover Continuum. Network Security Configuration Guide

Andover Continuum. Network Security Configuration Guide Andover Continuum Network Security Configuration Guide 2010, Schneider Electric All Rights Reserved No part of this publication may be reproduced, read or stored in a retrieval system, or transmitted,

More information

Projetex 9 Workstation Setup Quick Start Guide 2012 Advanced International Translations

Projetex 9 Workstation Setup Quick Start Guide 2012 Advanced International Translations Projetex 9 Workstation Setup Quick Start Guide 1 Projetex 9 Help Table of Contents Disclaimer 2 System Requirements 2 Registration/Upgrade 3 Projetex Workstation Setup 5 User Login to Projetex Workstation

More information

1 Main components... 3

1 Main components... 3 Quick Start Guide Table of contents 1 Main components... 3 2 Supported operating systems and environments... 4 2.1 Acronis vmprotect 8 Windows Agent... 4 2.2 Acronis vmprotect 8 Virtual Appliance... 4

More information

IIS, FTP Server and Windows

IIS, FTP Server and Windows IIS, FTP Server and Windows The Objective: To setup, configure and test FTP server. Requirement: Any version of the Windows 2000 Server. FTP Windows s component. Internet Information Services, IIS. Steps:

More information

a) Network connection problems (check these for existing installations)

a) Network connection problems (check these for existing installations) How do I resolve issues with a Client not connecting to the Best Practice server instance? This FAQ is intended to answer common questions about resolving issues with a Best Practice client not connecting

More information

Infinity Web Viewer Reference Guide

Infinity Web Viewer Reference Guide Infinity Web Viewer Reference Guide Table of Contents Overview... 1 Security Considerations... 1 System Setup... 1 Infinity Configuration... 1 Workstation Prerequisites... 2 Configuring Internet Security...

More information

Universal Management Service 2015

Universal Management Service 2015 Universal Management Service 2015 UMS 2015 Help All rights reserved. No parts of this work may be reproduced in any form or by any means - graphic, electronic, or mechanical, including photocopying, recording,

More information

Issue Tracking Anywhere Installation Guide

Issue Tracking Anywhere Installation Guide TM Issue Tracking Anywhere Installation Guide The leading developer of version control and issue tracking software Table of Contents Introduction...3 Installation Guide...3 Installation Prerequisites...3

More information

Contents Notice to Users

Contents  Notice to Users Web Remote Access Contents Web Remote Access Overview... 1 Setting Up Web Remote Access... 2 Editing Web Remote Access Settings... 5 Web Remote Access Log... 7 Accessing Your Home Network Using Web Remote

More information

How To Install Powerpoint 6 On A Windows Server With A Powerpoint 2.5 (Powerpoint) And Powerpoint 3.5.5 On A Microsoft Powerpoint 4.5 Powerpoint (Powerpoints) And A Powerpoints 2

How To Install Powerpoint 6 On A Windows Server With A Powerpoint 2.5 (Powerpoint) And Powerpoint 3.5.5 On A Microsoft Powerpoint 4.5 Powerpoint (Powerpoints) And A Powerpoints 2 DocAve 6 Service Pack 1 Installation Guide Revision C Issued September 2012 1 Table of Contents About the Installation Guide... 4 Submitting Documentation Feedback to AvePoint... 4 Before You Begin...

More information

Configuring Steel-Belted RADIUS Proxy to Send Group Attributes

Configuring Steel-Belted RADIUS Proxy to Send Group Attributes Configuring Steel-Belted RADIUS Proxy to Send Group Attributes Copyright 2007 Sophos Group. All rights reserved. No part of this publication may be reproduced, stored in retrieval system, or transmitted,

More information

Sophos Disk Encryption License migration guide. Product version: 5.61 Document date: June 2012

Sophos Disk Encryption License migration guide. Product version: 5.61 Document date: June 2012 Sophos Disk Encryption License migration guide Product version: 5.61 Document date: June 2012 Contents 1 About this guide...3 2 Add encryption to an existing Sophos security solution...5 3 SDE/SGE 4.x

More information

For Active Directory Installation Guide

For Active Directory Installation Guide For Active Directory Installation Guide Version 2.5.2 April 2010 Copyright 2010 Legal Notices makes no representations or warranties with respect to the contents or use of this documentation, and specifically

More information

Creating a System DSN for Crystal Reports to Access a Sentinel Server Database. Configuration Guide Version 1.0

Creating a System DSN for Crystal Reports to Access a Sentinel Server Database. Configuration Guide Version 1.0 Creating a System DSN for Crystal Reports to Access a Sentinel Server Database Configuration Guide Version 1.0 July 2007 Configuration Guide Part Number: 62-14332000, V1.0 Copyright 1995-2007 Ringdale

More information

Xerox Multifunction Devices. Verify Device Settings via the Configuration Report

Xerox Multifunction Devices. Verify Device Settings via the Configuration Report Xerox Multifunction Devices Customer Tips March 15, 2007 This document applies to these Xerox products: X WC 4150 X WCP 32/40 X WCP 35/45/55 X WCP 65/75/90 X WCP 165/175 X WCP 232/238 X WCP 245/255 X WCP

More information

Astaro Security Gateway V8. Remote Access via SSL Configuring ASG and Client

Astaro Security Gateway V8. Remote Access via SSL Configuring ASG and Client Astaro Security Gateway V8 Remote Access via SSL Configuring ASG and Client 1. Introduction This guide contains complementary information on the Administration Guide and the Online Help. If you are not

More information

OPC Server Machine Configuration

OPC Server Machine Configuration OPC Server Machine Configuration General Information For remote OPC Server operation, server must be running under Windows XP Pro, Windows Server 2003, Windows Vista (Business & Ultimate), Windows 7 (Professional

More information

Secure Agent Quick Start for Windows

Secure Agent Quick Start for Windows Secure Agent Quick Start for Windows 1993-2015 Informatica Corporation. No part of this document may be reproduced or transmitted in any form, by any means (electronic, photocopying, recording or otherwise)

More information

Networking Best Practices Guide. Version 6.5

Networking Best Practices Guide. Version 6.5 Networking Best Practices Guide Version 6.5 Summer 2010 Copyright: 2010, CCH, a Wolters Kluwer business. All rights reserved. Material in this publication may not be reproduced or transmitted in any form

More information

ResPAK Internet Module

ResPAK Internet Module ResPAK Internet Module This document provides an overview of the ResPAK Internet Module which consists of the RNI Web Services application and the optional ASP.NET Reservations web site. The RNI Application

More information

Interact for Microsoft Office

Interact for Microsoft Office Interact for Microsoft Office Installation and Setup Guide Perceptive Content Version: 7.0.x Written by: Product Knowledge, R&D Date: October 2014 2014 Perceptive Software. All rights reserved Perceptive

More information

Device LinkUP + Desktop LP Guide RDP

Device LinkUP + Desktop LP Guide RDP Device LinkUP + Desktop LP Guide RDP Version 2.1 January 2016 Copyright 2015 iwebgate. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval

More information

ez Agent Administrator s Guide

ez Agent Administrator s Guide ez Agent Administrator s Guide Copyright This document is protected by the United States copyright laws, and is proprietary to Zscaler Inc. Copying, reproducing, integrating, translating, modifying, enhancing,

More information

Folder Proxy + OWA + ECP/EAC Guide. Version 2.0 April 2016

Folder Proxy + OWA + ECP/EAC Guide. Version 2.0 April 2016 Version 2.0 April 2016 Folder Proxy + OWA + ECP/EAC Guide Copyright 2016 iwebgate. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system,

More information

Customer Tips. Configuring Color Access on the WorkCentre 7328/7335/7345 using Windows Active Directory. for the user. Overview

Customer Tips. Configuring Color Access on the WorkCentre 7328/7335/7345 using Windows Active Directory. for the user. Overview Xerox Multifunction Devices Customer Tips February 13, 2008 This document applies to the stated Xerox products. It is assumed that your device is equipped with the appropriate option(s) to support the

More information

MadCap Software. Upgrading Guide. Pulse

MadCap Software. Upgrading Guide. Pulse MadCap Software Upgrading Guide Pulse Copyright 2014 MadCap Software. All rights reserved. Information in this document is subject to change without notice. The software described in this document is furnished

More information

Installing Policy Patrol on a separate machine

Installing Policy Patrol on a separate machine Policy Patrol 3.0 technical documentation July 23, 2004 Installing Policy Patrol on a separate machine If you have Microsoft Exchange Server 2000 or 2003 it is recommended to install Policy Patrol on the

More information

Matrix Technical Support Mailer 61 SMDR [Offline & Online] Through Ethernet Port

Matrix Technical Support Mailer 61 SMDR [Offline & Online] Through Ethernet Port Matrix Technical Support Mailer 61 SMDR [Offline & Online] Through Ethernet Port Dear Friends, 02/07/2013 This mailer tells us how to generate SMDR [Offline\Online] through Ethernet port. This feature

More information

WINDOWS 7 & HOMEGROUP

WINDOWS 7 & HOMEGROUP WINDOWS 7 & HOMEGROUP SHARING WITH WINDOWS XP, WINDOWS VISTA & OTHER OPERATING SYSTEMS Abstract The purpose of this white paper is to explain how your computers that are running previous versions of Windows

More information

Strategic Asset Tracking System User Guide

Strategic Asset Tracking System User Guide Strategic Asset Tracking System User Guide Contents 1 Overview 2 Web Application 2.1 Logging In 2.2 Navigation 2.3 Assets 2.3.1 Favorites 2.3.3 Purchasing 2.3.4 User Fields 2.3.5 History 2.3.6 Import Data

More information

AvePoint CallAssist 3.2.5 for Microsoft Dynamics CRM. Installation and Configuration Guide

AvePoint CallAssist 3.2.5 for Microsoft Dynamics CRM. Installation and Configuration Guide AvePoint CallAssist 3.2.5 for Microsoft Dynamics CRM Installation and Configuration Guide Revision K Issued November 2014 Table of Contents Overview... 4 Prerequisites... 5 Environment Requirements...

More information

Deploying BitDefender Client Security and BitDefender Windows Server Solutions

Deploying BitDefender Client Security and BitDefender Windows Server Solutions Deploying BitDefender Client Security and BitDefender Windows Server Solutions Quick Install Guide Copyright 2011 BitDefender 1. Installation Overview Thank you for selecting BitDefender Business Solutions

More information

How To Create An Easybelle History Database On A Microsoft Powerbook 2.5.2 (Windows)

How To Create An Easybelle History Database On A Microsoft Powerbook 2.5.2 (Windows) Introduction EASYLABEL 6 has several new features for saving the history of label formats. This history can include information about when label formats were edited and printed. In order to save this history,

More information

MICROSTRATEGY 9.3 Supplement Files Setup Transaction Services for Dashboard and App Developers

MICROSTRATEGY 9.3 Supplement Files Setup Transaction Services for Dashboard and App Developers NOTE: You can use these instructions to configure instructor and student machines. Software Required Microsoft Access 2007, 2010 MicroStrategy 9.3 Microsoft SQL Server Express 2008 R2 (free from Microsoft)

More information

DIGIPASS Authentication for GajShield GS Series

DIGIPASS Authentication for GajShield GS Series DIGIPASS Authentication for GajShield GS Series With Vasco VACMAN Middleware 3.0 2008 VASCO Data Security. All rights reserved. Page 1 of 1 Integration Guideline Disclaimer Disclaimer of Warranties and

More information

Installation Guide. (June 2014)

Installation Guide. (June 2014) Installation Guide Medtech Fax Solution (for Windows 7 and later) (June 2014) IMPORTANT NOTE Medtech recommends that all Medtech upgrades and database back-up and restore processes are performed by a Medtech

More information

DIGIPASS Authentication for Citrix Access Gateway VPN Connections

DIGIPASS Authentication for Citrix Access Gateway VPN Connections DIGIPASS Authentication for Citrix Access Gateway VPN Connections With VASCO Digipass Pack for Citrix 2006 VASCO Data Security. All rights reserved. Page 1 of 31 Integration Guideline Disclaimer Disclaimer

More information

Getting Started with MozyPro Online Backup Online Software from Time Warner Cable Business Class

Getting Started with MozyPro Online Backup Online Software from Time Warner Cable Business Class Getting Started with MozyPro Online Backup Online Software from Time Warner Cable Business Class A Guide for Users MozyPro is an online backup service with an easy to use interface so you can start backing

More information

STATISTICA VERSION 9 STATISTICA ENTERPRISE INSTALLATION INSTRUCTIONS FOR USE WITH TERMINAL SERVER

STATISTICA VERSION 9 STATISTICA ENTERPRISE INSTALLATION INSTRUCTIONS FOR USE WITH TERMINAL SERVER Notes: STATISTICA VERSION 9 STATISTICA ENTERPRISE INSTALLATION INSTRUCTIONS FOR USE WITH TERMINAL SERVER 1. These instructions focus on installation on Windows Terminal Server (WTS), but are applicable

More information

Copyright. Disclaimer. Introduction 1. System Requirements... 3. Installing the software 4

Copyright. Disclaimer. Introduction 1. System Requirements... 3. Installing the software 4 Digital Signatures User Guide Revision 1.2 build 1, Document Revision 1.12 Published 31. Octover 2011 ii Contents Copyright Disclaimer iii iii Introduction 1 System Requirements... 3 Installing the software

More information

Dell Statistica 13.0. Statistica Enterprise Installation Instructions

Dell Statistica 13.0. Statistica Enterprise Installation Instructions Dell Statistica 13.0 2015 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license or

More information

ADFS Integration Guidelines

ADFS Integration Guidelines ADFS Integration Guidelines Version 1.6 updated March 13 th 2014 Table of contents About This Guide 3 Requirements 3 Part 1 Configure Marcombox in the ADFS Environment 4 Part 2 Add Relying Party in ADFS

More information

Microsoft Corporation. Project Server 2010 Installation Guide

Microsoft Corporation. Project Server 2010 Installation Guide Microsoft Corporation Project Server 2010 Installation Guide Office Asia Team 11/4/2010 Table of Contents 1. Prepare the Server... 2 1.1 Install KB979917 on Windows Server... 2 1.2 Creating users and groups

More information

StarWind iscsi SAN Software: Challenge-Handshake Authentication Protocol (CHAP) for Authentication of Users

StarWind iscsi SAN Software: Challenge-Handshake Authentication Protocol (CHAP) for Authentication of Users StarWind iscsi SAN Software: Challenge-Handshake Authentication Protocol (CHAP) for Authentication of Users www.starwindsoftware.com Copyright 2008-2011. All rights reserved. COPYRIGHT Copyright 2008-2011.

More information

INSTALL AND CONFIGURATION GUIDE. Atlas 5.1 for Microsoft Dynamics AX

INSTALL AND CONFIGURATION GUIDE. Atlas 5.1 for Microsoft Dynamics AX INSTALL AND CONFIGURATION GUIDE Atlas 5.1 for Microsoft Dynamics AX COPYRIGHT NOTICE Copyright 2012, Globe Software Pty Ltd, All rights reserved. Trademarks Dynamics AX, IntelliMorph, and X++ have been

More information

Setting Up ALERE with Client/Server Data

Setting Up ALERE with Client/Server Data Setting Up ALERE with Client/Server Data TIW Technology, Inc. November 2014 ALERE is a registered trademark of TIW Technology, Inc. The following are registered trademarks or trademarks: FoxPro, SQL Server,

More information