Role Based Administration for LDMS 9.0 SP2
|
|
|
- Brandon Collins
- 10 years ago
- Views:
Transcription
1 Role Based Administration for LDMS 9.0 SP2 This article is designed to help you understand Role Based Administration for LDMS 9.0 SP2 and how to configure it. We will try to give you as much information about the different components of Role Based Administration for LDMS 9.0 SP2 and how to set each of those up. In 9.0 SP2, the Local Users and Group is key component to using LANDesk. Unlike previous version of LANDesk, the LANDesk Administrators, LANDesk Management Suite, and LANDesk Script Writers groups are only used to give users rights to the LANDesk directory structure. These groups do not add the users to the User Management console as they did in past versions, in fact the users do not need to be in these groups to add a user to the User Management console, but the user will not be able to log in to the console until they are added to a group. We will discuss this later in detail. These file level rights are necessary for using the different components within the LANDesk Console. The first thing that you need to do is understand what each of the LANDesk groups allow the user to access and how that will affect console usage. a. The LANDesk Administrators group is the failsafe group for console access. Anyone in this group has full rights in the console, including script writing. By default, the user account that installed Management Suite is added to this group. If you don't have many console users or you don't want to limit the console users that you do have, you can bypass role-based administration entirely and just add users to this group. b. The LANDesk Management Suite group allows basic core access. The Management Suite folders are read-only. Users in this group can't write to the scripts directory, so they won't be able to manage scripts. Patching vulnerabilities and OS deployment won't work correctly for users in this group because both those features use scripts. c. The LANDesk Script Writers group includes the rights of the LANDesk Management Suite group and it also allows users to write to the scripts folder. Patching vulnerabilities, OS deployment, or adding device to Bare Metal Servers require membership in this group. Add users to LANDesk group from the Windows Computer Management 1. Navigate to the server's Administrative Tools > Computer Management > Local Users and Groups > Groups utility. 2. Right-click the LANDesk group you want, and then click Add to group. 3. In the group's Properties dialog box, click Add. 4. In the Select the users and groups dialog box, select the desired users (and groups) from the list and click Add. 5. Click OK.
2 Creating the Authentication Source 1. Open the Core console 2. On the console toolbar, select Tools > Administration > User Management 3. In the User management tool, right-click Users and groups and click New Active Directory source. 3a. Or you can use the green (+) with the dropdown and click New Active Directory source. 4. In the Authentication source dialog box, enter credentials that give access to the Active Directory. To add a Management Suite console user or group 1. In the Users and groups tree, right-click the authentication source containing the user or group you want, and click New user or group.
3 2. In the authentication source directory, select the user or group you want to add and click Add. If you want to select individual users within a group, right-click the group and click Select users to add. You can then select the users you want and click Add selected users. NOTE: If the dialog box reminding you to manually add the user or group you selected to the appropriate local LANDesk Windows group, click OK. Click Close. If you haven't already, use the Windows Local Users and Groups tool to add the new user or group to the appropriate local LANDesk Windows group as described earlier in this section. Note: The user should end up looking like this in the console, prior to assigning the roles and scopes. (Notice the Roles and Scopes highlighted in yellow have no assignments) 3. Once you have added the User to, you will then need to assign that user to the Roles and Scope that define what you want the user to be able to do in the console.
4 4. To assign the Roles and Scopes, right click on the user or group and select Properties. You will then be presented with the IU shown above. Use the Edit buttons to add the Roles and Scopes. (See Below) Note: Once you get the Roles and Scopes assigned the user or group show look like this. Notice the difference between the LD Test Users group and the Test User.
5 Create Roles 1. In the User management tool, right-click Roles and click New role. 2. In the Role properties dialog box, enter a role Name. 3. Enable or disable the rights you want by clicking on the symbol in the appropriate column. Each click toggles the right's state. 4. In the tree click Users and groups and select the users and groups that will have the new role. Creating Scopes 1. Click Tools > Administration > User Management. 2. Right-click Scopes and click New Scope. 3. In the Scope Properties dialog box, enter a name for the new scope. 4. Specify the type of scope you want to create (LDMS query, LDAP or custom directory, or device group) by clicking a scope type from the drop-down list, and then clicking New. 5. If you're creating an LDMS query-based scope, define the query in the New scope query dialog box, and then click OK. 6. If you're creating a directory-based scope, select locations (LDAP directory and/or custom directory) from the Select visible devices list (you can browse the directory by clicking Browse directories), and then click OK. Click on the plus (+) and minus (-) signs to expand and collapse nodes in the directory tree. All nodes under a selected parent node will be included in the scope. LDAP directory locations are determined by a device's directory service location. Custom directory locations are determined by a device's computer location attribute in the inventory database. This attribute is defined during device agent configuration. 7. If you're creating a device group-based scope, select a group from the available device group list, and then click OK. 8. Click OK again to save the scope and close the dialog box. Create a Scope Based on an Existing Query 1. Right-click Scopes and click New scope from query. 2. Select the query you want and click OK. 3. A copy of the query will be made and a new scope appears in the tree with a name based on the source query name.
6 Using teams A role-based administration team is a group of users that can view and share ownership of tasks and configurations that belong to the team. For example, if you have multiple departments that want to share queries or tasks, you can group the departments into a team. A team's tasks and configurations appear in a special group named after the team in a tool's tree view. For example, if you have a team named "Salt Lake" that you are a member of, you would see a "'Salt Lake' devices" subgroup under the Devices group in the Network view. People can belong to multiple teams. Keep in mind that teams are not rights bases, meaning that you do not assign rights to a team, this is different than previous versions. People who aren't in a particular team won't see that team's group anywhere in the console. People with the administrator right see all teams and team content. While you can use public folders to share console content, public folder content is visible to everyone with rights to a tool. The advantage with teams is that only team members see team content, potentially making content more organized and accessible to team members. Teams consist of one or more group permissions. You can even create teams with as few as 1 or 2 people. For example, if a person is out sick, you can add that person's substitute to the same team. Or, if you have two people that share responsibilities, you can put them in the same team. Administrators and team members can change the ownership of tree items by right-clicking them and clicking Info. Information dialog boxes have an Owner drop-down list where you can select the item's owner. To create a team 1. In the User management tool, right-click Teams and click New team. 2. Enter a team Name. 3. Select the Users and Groups that you want in the team. 4. Click OK. Understanding rights and states There are four types of rights a user can have: View: Allows users to access a console tool. Edit: Allows users to make changes in the associated console tool. Includes the view right. Deploy: Allows users to create, modify, or delete any scheduled tasks associated with the associated console tool. Edit public: Allows users to create, modify, or delete items in a console tool's Public folder.
7 Not all rights support all types. For example, the "Public query management" right can only have the "Edit public" type. It wouldn't make sense to also have the "View," "Edit," or "Deploy" types. There are three states a right can have: A checkmark An X A not applicable symbol (Circle with Slash) Clicking on a checkmark or an X will toggle its state. If users have no rights for a tool, they won't see the tool when they log into the console. The tool won't appear in the Toolbox or in the Tools menu. The Scheduled tasks tool is only visible to users who have a "Deploy" right, and in that case, they can only work with tasks associated with the tool they have deploy rights for. All other tasks are read-only. Understanding the default roles There are a number of default roles under the Roles tree. You can edit or delete any of these default roles, except for LANDesk Administrator. IT Help Desk LANDesk Administrator Patch Management Power Management Provisioning Security Software distribution Software licensing LANDesk Administrators have full rights to all scopes and rights. They also have full access to the Users tool and can make any changes they want. Only users with the Administrator right can configure LANDesk services running on the core. Understanding the "Edit public" right A tool's Public group is visible to all users. Items in the public group are read-only, unless you have the "Edit public" right. Users that have "Edit public" rights on a feature can only edit public items for that feature. Other public items will be read-only. Read-only items are still useful, since users can copy those items to the "My..." tree group and edit them there. The Scheduled tasks tool's Public group works slightly differently. All tasks in the Public group are visible to users with a "deploy" right, including tasks for features users may not have access to. However, only tasks that users have a "Deploy" right for are editable. The rest are read-only. If you have "Edit Public" and "Deploy" right types, you can create new tasks in the Public group as well as add/remove tasks from it.
8 Viewing the user log and deleting users You can also use the Users and groups tree to delete console users or groups. When you delete a user or group, you'll be prompted to decide how you want to handle console items they are the owners of, such as queries, scheduled tasks, and so on. You can either have the console automatically delete any items they own or you can have the console reassign items they own to another user or group that you select. Note that deleting a user or group only deletes that user or group from the Management Suite user database. You'll need to also manually remove the user or group from local LANDesk Windows groups they are members of. If you don't do this, the deleted user will still be able to log into the console. To delete a console user Click Tools > Administration > User management. In the Users management tree, click Users and groups. Select the user or group you want to delete and press the Delete key. If you want to delete objects associated with the user, click OK. If you want to reassign objects associated with the console user, select Assign objects to the following user/group or team and click the user, group, or team you want to receive the objects and click OK. Remove the user from the local LANDesk Windows group or Active Directory group that gives them console access. Viewing user or group properties In the Users and groups tree, you can right-click a user or group in the right pane and click Properties. This properties dialog box shows all the properties and effective rights for that user. The properties dialog box has the following pages: Summary: Summarizes that user's/group's roles, scopes, teams, group membership, and effective rights. Effective rights: Shows a more detailed view of the user's/group's effective rights. Roles: Shows explicit and inherited roles. You can select which explicit roles apply to that user or group. Scopes: Shows explicit and inherited scopes. You can select which explicit scopes apply to that user or group. Teams: Shows explicit and inherited teams. You can select which explicit teams apply to that user or group. RC time restrictions: Allows you to apply and modify RC time restrictions. For more information, see Using remote control time restrictions in the help file. Group membership: Shows which groups that user is a member of. Group members: Shows the members of a group if a group is selected. Shows the group a user is a member of if a user is selected. If you make changes to the editable pages, you need to click OK to apply them. You can then re-open the properties dialog box if necessary.
Mobile device management
Mobile device management The Mobility management tool is an add-on to LANDesk Management Suite that lets you discover mobile devices that access Microsoft Outlook mailboxes on your system. The tool does
Setting Up Jive for SharePoint Online and Office 365. Introduction 2
Setting Up Jive for SharePoint Online and Office 365 Introduction 2 Introduction 3 Contents 4 Contents Setting Up Jive for SharePoint Online and Office 365...5 Jive for SharePoint Online System Requirements...5
Create, Link, or Edit a GPO with Active Directory Users and Computers
How to Edit Local Computer Policy Settings To edit the local computer policy settings, you must be a local computer administrator or a member of the Domain Admins or Enterprise Admins groups. 1. Add the
Tool Tip. SyAM Management Utilities and Non-Admin Domain Users
SyAM Management Utilities and Non-Admin Domain Users Some features of SyAM Management Utilities, including Client Deployment and Third Party Software Deployment, require authentication credentials with
Microsoft Dynamics CRM Clients
Microsoft Dynamics CRM Clients A user can work with Microsoft Dynamics CRM in two ways: By accessing the Microsoft Dynamics CRM application using Microsoft Internet Explorer, Google Chrome, FireFox, and
Mobility Manager 9.5. Users Guide
Mobility Manager 9.5 Users Guide LANDESK MOBILITY MANAGER Copyright 2002-2013, LANDesk Software, Inc. and its affiliates. All rights reserved. LANDesk and its logos are registered trademarks or trademarks
Moving the Web Security Log Database
Moving the Web Security Log Database Topic 50530 Web Security Solutions Version 7.7.x, 7.8.x Updated 22-Oct-2013 Version 7.8 introduces support for the Web Security Log Database on Microsoft SQL Server
DigitalPersona Pro Server for Active Directory v4.x Quick Start Installation Guide
DigitalPersona Pro Server for Active Directory v4.x Quick Start Installation Guide 1 of 7 DigitalPersona Pro Server for Active Directory v4.x Quick Start Installation Guide Process Overview Step Description
Moving the TRITON Reporting Databases
Moving the TRITON Reporting Databases Topic 50530 Web, Data, and Email Security Versions 7.7.x, 7.8.x Updated 06-Nov-2013 If you need to move your Microsoft SQL Server database to a new location (directory,
CIFS Permissions Best Practices Nasuni Corporation Natick, MA
Nasuni Corporation Natick, MA Overview You use permissions to control user access to data. There are two basic considerations when using permissions to control user access to data: Which users have access
Managing Identities and Admin Access
CHAPTER 4 This chapter describes how Cisco Identity Services Engine (ISE) manages its network identities and access to its resources using role-based access control policies, permissions, and settings.
Thin Client Manager. Table of Contents. 1-10ZiG Manager. 2 - Thin Client Management. 3 - Remote client configurations. 1 of 16
1 of 16 Thin Client Manager Table of Contents 1-10ZiG Manager 1.1 - Configuring and Managing the Server 1.1.1 - Server Settings 1.1.2 - Starting and Stopping the Server 1.2 - Configuring and Starting the
HOW TO SILENTLY INSTALL CLOUD LINK REMOTELY WITHOUT SUPERVISION
HOW TO SILENTLY INSTALL CLOUD LINK REMOTELY WITHOUT SUPERVISION Version 1.1 / Last updated November 2012 INTRODUCTION The Cloud Link for Windows client software is packaged as an MSI (Microsoft Installer)
Fairfield University Using Xythos for File Sharing
Fairfield University Using Xythos for File Sharing Version 7.0 Table of Contents I: Manage your Department Folder...2 Your Department Folder... 2 II: Sharing Folders and Files Inside of Fairfield U...3
Active Directory integration with CloudByte ElastiStor
Active Directory integration with CloudByte ElastiStor Prerequisite Change the time and the time zone of the Active Directory Server to the VSM time and time zone. Enabling Active Directory at VSM level
Instructions for Configuring a SAS Metadata Server for Use with JMP Clinical
Instructions for Configuring a SAS Metadata Server for Use with JMP Clinical These instructions describe the process for configuring a SAS Metadata server to work with JMP Clinical. Before You Configure
SafeGuard Enterprise Administrator help
SafeGuard Enterprise Administrator help Product version: 5.60 Document date: April 2011 Contents 1 The SafeGuard Management Center...4 2 Log on to the SafeGuard Management Center...5 3 Operating steps
Sophos Enterprise Console Help. Product version: 5.1 Document date: June 2012
Sophos Enterprise Console Help Product version: 5.1 Document date: June 2012 Contents 1 About Enterprise Console...3 2 Guide to the Enterprise Console interface...4 3 Getting started with Sophos Enterprise
DeviceLock Management via Group Policy
User Manual DeviceLock Management via Group Policy SmartLine Inc 1 Contents Using this Manual...3 1. General Information...4 1.1 Overview...4 1.2 Applying Group Policy...5 1.3 Standard GPO Inheritance
History Explorer. View and Export Logged Print Job Information WHITE PAPER
History Explorer View and Export Logged Print Job Information WHITE PAPER Contents Overview 3 Logging Information to the System Database 4 Logging Print Job Information from BarTender Designer 4 Logging
NSi Mobile Installation Guide. Version 6.2
NSi Mobile Installation Guide Version 6.2 Revision History Version Date 1.0 October 2, 2012 2.0 September 18, 2013 2 CONTENTS TABLE OF CONTENTS PREFACE... 5 Purpose of this Document... 5 Version Compatibility...
HDA Integration Guide. Help Desk Authority 9.0
HDA Integration Guide Help Desk Authority 9.0 2011ScriptLogic Corporation ALL RIGHTS RESERVED. ScriptLogic, the ScriptLogic logo and Point,Click,Done! are trademarks and registered trademarks of ScriptLogic
PRODUCT WHITE PAPER LABEL ARCHIVE. Adding and Configuring Active Directory Users in LABEL ARCHIVE
PRODUCT WHITE PAPER LABEL ARCHIVE Adding and Configuring Active Directory Users in LABEL ARCHIVE TEKLYNX International March 19, 2010 Introduction Now more than ever, businesses large and small alike are
4cast Server Specification and Installation
4cast Server Specification and Installation Version 2015.00 10 November 2014 Innovative Solutions for Education Management www.drakelane.co.uk System requirements Item Minimum Recommended Operating system
WatchDox Administrator's Guide. Application Version 3.7.5
Application Version 3.7.5 Confidentiality This document contains confidential material that is proprietary WatchDox. The information and ideas herein may not be disclosed to any unauthorized individuals
LANDESK Service Desk. Desktop Manager
LANDESK Service Desk Desktop Manager LANDESK SERVICE DESK DESKTOP MANAGER GUIDE This document contains information, which is the confidential information and/or proprietary property of LANDESK Software,
Using Group Policies to Install AutoCAD. CMMU 5405 Nate Bartley 9/22/2005
Using Group Policies to Install AutoCAD CMMU 5405 Nate Bartley 9/22/2005 Before we get started This manual provides a step-by-step process for creating a Group Policy that will install AutoCAD to a Windows
BusinessObjects Enterprise XI Release 2
BusinessObjects Enterprise XI Release 2 How to configure an Internet Information Services server as a front end to a WebLogic application server Overview Contents This document describes the process of
LANDesk Management Suite 9.0. Getting started with Patch Manager
LANDesk Management Suite 9.0 Getting started with Patch Manager DOWNLOAD PATCH CONTENT TO THE CORE SERVER INTRODUCTION This document is intended to assist LANDesk Management Suite administrators with implementing
Using Jive for Outlook
Using Jive for Outlook TOC 2 Contents Using Jive for Outlook...3 Client System Requirements... 3 Getting Started with Jive for Outlook... 3 Jview and View as email...5 Viewing Social Information... 5 Finding
Table of Contents SQL Server Option
Table of Contents SQL Server Option STEP 1 Install BPMS 1 STEP 2a New Customers with SQL Server Database 2 STEP 2b Restore SQL DB Upsized by BPMS Support 6 STEP 2c - Run the "Check Dates" Utility 7 STEP
Install the Production Treasury Root Certificate (Vista / Win 7)
Install the Production Treasury Root Certificate (Vista / Win 7) The Production Treasury Root Certificate should be maintained on your local workstations to use OTCnet Check Capture and Deposit Reporting.
LepideAuditor Suite for File Server. Installation and Configuration Guide
LepideAuditor Suite for File Server Installation and Configuration Guide Table of Contents 1. Introduction... 4 2. Requirements and Prerequisites... 4 2.1 Basic System Requirements... 4 2.2 Supported Servers
NETWRIX ACCOUNT LOCKOUT EXAMINER
NETWRIX ACCOUNT LOCKOUT EXAMINER ADMINISTRATOR S GUIDE Product Version: 4.1 July 2014. Legal Notice The information in this publication is furnished for information use only, and does not constitute a
Administrator s Plus. Backup Process. A Get Started Guide
Administrator s Plus Backup Process A Get Started Guide Table of Contents Create a Backup... 1 Schedule an Automatic Backup... 3 Create a Backup Backing up your information is an important part of data
ECAT SWE Exchange Customer Administration Tool Web Interface User Guide Version 6.7
ECAT SWE Exchange Customer Administration Tool SWE - Exchange Customer Administration Tool (ECAT) Table of Contents About this Guide... 3 Audience and Purpose... 3 What is in this Guide?... 3 CA.mail Website...
Test Automation Integration with Test Management QAComplete
Test Automation Integration with Test Management QAComplete This User's Guide walks you through configuring and using your automated tests with QAComplete's Test Management module SmartBear Software Release
StarTeam/CaliberRM LDAP QuickStart Manager 2009. Administration Guide
StarTeam/CaliberRM LDAP QuickStart Manager 2009 Administration Guide Borland Software Corporation 8310 N Capital of Texas Bldg 2, Ste 100 Austin, TX 78731 USA http://www.borland.com Borland Software Corporation
Technical Bulletin 005 Revised 2010/12/10
sitesecuresoftware.com Site-Secure Facility & Security Management Software Technical Bulletin 005 Revised 2010/12/10 Search Active Directory from SQL Server 2000-2005 Table of Contents Introduction...
Management Center. Installation and Upgrade Guide. Version 8 FR4
Management Center Installation and Upgrade Guide Version 8 FR4 APPSENSE MANAGEMENT CENTER INSTALLATION AND UPGRADE GUIDE ii AppSense Limited, 2012 All rights reserved. part of this document may be produced
RSA Event Source Configuration Guide. Microsoft Internet Information Services
Configuration Guide Microsoft Internet Information Services Last Modified: Thursday, February 13, 2014 Event Source (Device) Product Information Vendor Microsoft Event Source (Device) Internet Information
Dell SonicWALL Notice Concerning Multiple LDAP Vulnerabilities
Dell SonicWALL Notice Concerning Multiple LDAP Vulnerabilities Dell SonicWALL has identified multiple LDAP authentication protocol vulnerabilities exposed when SonicOS is configured to use Microsoft Active
How To Install Ctera Agent On A Pc Or Macbook With Acedo (Windows) On A Macbook Or Macintosh (Windows Xp) On An Ubuntu 7.5.2 (Windows 7) On Pc Or Ipad
Deploying CTERA Agent via Microsoft Active Directory and Single Sign On Cloud Attached Storage September 2015 Version 5.0 Copyright 2009-2015 CTERA Networks Ltd. All rights reserved. No part of this document
MS Outlook 2002/2003. V1.0 BullsEye Telecom Email
IMAP Settings Manual Our application allows you to access your email in many different ways. For those of you who do not wish to use the Webmail interface, you may also manage your email and custom folder
Deep Freeze and Microsoft System Center Configuration Manager 2012 Integration
1 Deep Freeze and Microsoft System Center Configuration Manager 2012 Integration Technical Paper Last modified: May 2015 Web: www.faronics.com Email: [email protected] Phone: 800-943-6422 or 604-637-3333
Configuration Manager
After you have installed Unified Intelligent Contact Management (Unified ICM) and have it running, use the to view and update the configuration information in the Unified ICM database. The configuration
HDAccess Administrators User Manual. Help Desk Authority 9.0
HDAccess Administrators User Manual Help Desk Authority 9.0 2011ScriptLogic Corporation ALL RIGHTS RESERVED. ScriptLogic, the ScriptLogic logo and Point,Click,Done! are trademarks and registered trademarks
User Guide. Version 3.2. Copyright 2002-2009 Snow Software AB. All rights reserved.
Version 3.2 User Guide Copyright 2002-2009 Snow Software AB. All rights reserved. This manual and computer program is protected by copyright law and international treaties. Unauthorized reproduction or
NETWRIX WINDOWS SERVER CHANGE REPORTER
NETWRIX WINDOWS SERVER CHANGE REPORTER INSTALLATION AND CONFIGURATION GUIDE Product Version: 4.0 March 2013. Legal Notice The information in this publication is furnished for information use only, and
DeviceLock Management via Group Policy
User Manual DeviceLock Management via Group Policy SmartLine Inc 1 Contents Using this Manual...3 1. General Information...4 1.1 Overview...4 1.2 Applying Group Policy...5 2. DeviceLock Service Deployment...6
5nine EASY Backup Quick User Guide
5nine EASY Backup Quick User Guide Installation Supported Operating Systems: Microsoft Windows Server 2008 Microsoft Windows Server 2008 R2 Microsoft Windows Server 2008 R2 Core SP1 Microsoft Hyper-V Server
Delegated Administration Quick Start
Delegated Administration Quick Start Topic 50200 Delegated Administration Quick Start Updated 22-Oct-2013 Applies to: Web Filter, Web Security, Web Security Gateway, and Web Security Gateway Anywhere,
Managing User Accounts
Managing User Accounts This chapter includes the following sections: Configuring Local Users, page 1 Active Directory, page 2 Viewing User Sessions, page 6 Configuring Local Users Before You Begin You
The cloud server setup program installs the cloud server application, Apache Tomcat, Java Runtime Environment, and PostgreSQL.
GO-Global Cloud 4.1 QUICK START SETTING UP A WINDOWS CLOUD SERVER AND HOST This guide provides instructions for setting up a cloud server and configuring a host so it can be accessed from the cloud server.
Managing User Accounts
Managing User Accounts This chapter includes the following sections: Active Directory, page 1 Configuring Local Users, page 3 Viewing User Sessions, page 5 Active Directory Active Directory is a technology
Mobility Manager 9.0. Installation Guide
Mobility Manager 9.0 Installation Guide LANDESK MOBILITY MANAGER Copyright 2002-2012, LANDesk Software, Inc. and its affiliates. All rights reserved. LANDesk and its logos are registered trademarks or
TAMUS Terminal Server Setup BPP SQL/Alva
We have a new method of connecting to the databases that does not involve using the Texas A&M campus VPN. The new way of gaining access is via Remote Desktop software to a terminal server running here
SPHOL207: Database Snapshots with SharePoint 2013
2013 SPHOL207: Database Snapshots with SharePoint 2013 Hands-On Lab Lab Manual This document is provided as-is. Information and views expressed in this document, including URL and other Internet Web site
Team Foundation Server 2012 Installation Guide
Team Foundation Server 2012 Installation Guide Page 1 of 143 Team Foundation Server 2012 Installation Guide Benjamin Day [email protected] v1.0.0 November 15, 2012 Team Foundation Server 2012 Installation
NetWrix Account Lockout Examiner Version 4.0 Administrator Guide
NetWrix Account Lockout Examiner Version 4.0 Administrator Guide Table of Contents Concepts... 1 Product Architecture... 1 Product Settings... 2 List of Managed Domains and Domain Controllers... 2 Email
How to Create a Delegated Administrator User Role / To create a Delegated Administrator user role Page 1
Managing user roles in SCVMM How to Create a Delegated Administrator User Role... 2 To create a Delegated Administrator user role... 2 Managing User Roles... 3 Backing Up and Restoring the VMM Database...
Attix5 Pro Server Edition
Attix5 Pro Server Edition V7.0.3 User Manual for Linux and Unix operating systems Your guide to protecting data with Attix5 Pro Server Edition. Copyright notice and proprietary information All rights reserved.
Security Development Tool for Microsoft Dynamics AX 2012 WHITEPAPER
Security Development Tool for Microsoft Dynamics AX 2012 WHITEPAPER Junction Solutions documentation 2012 All material contained in this documentation is proprietary and confidential to Junction Solutions,
STIDistrict SQL 2000 Database Management Plans
STIDistrict SQL 2000 Database Management Plans Overview STI recommends that users create SQL database maintenance plans to maintain the integrity of the STIDistrict database. Database maintenance plans
Amazon WorkMail. User Guide Version 1.0
Amazon WorkMail User Guide Amazon WorkMail: User Guide Copyright 2016 Amazon Web Services, Inc. and/or its affiliates. All rights reserved. Amazon's trademarks and trade dress may not be used in connection
RSA Security Analytics
RSA Security Analytics Event Source Log Configuration Guide RSA Authentication Manager and User Credential Manager Last Modified: Friday, March 13, 2015 Event Source Product Information: Vendor: RSA, The
Kaseya 2. User Guide. Version 6.1
Kaseya 2 Kaseya SQL Server Reporting Services (SSRS) Configuration User Guide Version 6.1 January 28, 2011 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and
Monitoring SQL Server with Microsoft Operations Manager 2005
Monitoring SQL Server with Microsoft Operations Manager 2005 Objectives After completing this lab, you will have had an opportunity to become familiar with several key SQL Management Pack features including:
Alfresco Online Collaboration Tool
Alfresco Online Collaboration Tool USER MANUAL BECOMING FAMILIAR WITH THE USER INTERFACE... 4 MY DASHBOARD... 4 MY PROFILE... 6 VIEWING YOUR FULL PROFILE... 6 EDITING YOUR PROFILE... 7 CHANGING YOUR PASSWORD...
Chapter 3 ADDRESS BOOK, CONTACTS, AND DISTRIBUTION LISTS
Chapter 3 ADDRESS BOOK, CONTACTS, AND DISTRIBUTION LISTS 03Archer.indd 71 8/4/05 9:13:59 AM Address Book 3.1 What Is the Address Book The Address Book in Outlook is actually a collection of address books
Installing Policy Patrol on a separate machine
Policy Patrol 3.0 technical documentation July 23, 2004 Installing Policy Patrol on a separate machine If you have Microsoft Exchange Server 2000 or 2003 it is recommended to install Policy Patrol on the
Managed Security Web Portal USER GUIDE
Managed Security Web Portal USER GUIDE CONTENTS 1.0 Introduction 4 2.0 Login 4 3.0 Portal Layout 4 3.1 Home Tab 5 3.2 Web Filtering Tab 5 3.3 SSL VPN Users Tab 6 4.0 Web Filtering Administration 7 4.1
4cast Client Specification and Installation
4cast Client Specification and Installation Version 2015.00 10 November 2014 Innovative Solutions for Education Management www.drakelane.co.uk System requirements The client requires Administrative rights
Outlook 2010 Desk Reference Guide
Outlook 2010 Desk Reference Guide Version 1.0 Developed by OR/WA IRM Please remember to print back-to-back. July 12, 2011 Microsoft Outlook 2010 This document has been developed by OR/WA IRM staff to provide
EM L05 Managing ios and Android Mobile Devices with Symantec Mobile Management Hands-On Lab
EM L05 Managing ios and Android Mobile Devices with Symantec Mobile Management Hands-On Lab Description The Symantec Mobile Management platform continues to expand it s offering with new support for native
Database Administration Guide
Database Administration Guide 013008 2008 Blackbaud, Inc. This publication, or any part thereof, may not be reproduced or transmitted in any form or by any means, electronic, or mechanical, including photocopying,
Access It! Universal Web Client Integration
Page 1 of 6 Last Updated: Friday, November 16, 2012 Access It! Universal Web Client Integration Overview This document outlines the steps needed to setup the Access It! Universal Web Client. The following
Richmond SupportDesk Web Reports Module For Richmond SupportDesk v6.72. User Guide
Richmond SupportDesk Web Reports Module For Richmond SupportDesk v6.72 User Guide Contents 1 Introduction... 4 2 Requirements... 5 3 Important Note for Customers Upgrading... 5 4 Installing the Web Reports
Integrating LANGuardian with Active Directory
Integrating LANGuardian with Active Directory 01 February 2012 This document describes how to integrate LANGuardian with Microsoft Windows Server and Active Directory. Overview With the optional Identity
Virtual Data Centre. User Guide
Virtual Data Centre User Guide 2 P age Table of Contents Getting Started with vcloud Director... 8 1. Understanding vcloud Director... 8 2. Log In to the Web Console... 9 3. Using vcloud Director... 10
econtrol 3.5 for Active Directory & Exchange Administrator Guide
econtrol 3.5 for Active Directory & Exchange Administrator Guide This Guide Welcome to the econtrol 3.5 for Active Directory and Exchange Administrator Guide. This guide is for system administrators and
Endnote Web: Beginners Guide to Using Endnote Web and the Cite While You Write Function
1 Endnote Web: Beginners Guide to Using Endnote Web and the Cite While You Write Function 1 Endnote Web User Guide Version 3.4 Created: June 2012 Author: Jessica Eustace-Cook 1 Table of Contents 1. About
WEST LIVENOTE ADMINISTRATION WEST CASE NOTEBOOK/WEST LIVENOTE
WEST LIVENOTE ADMINISTRATION WEST CASE NOTEBOOK/WEST LIVENOTE JULY 2009 WEST LIVENOTE ADMINISTRATION USER GUIDE WEST CASE NOTEBOOK/WEST LIVENOTE JULY 2009 West Customer Service West LiveNote Administration
Chapter 3 Application Monitors
Chapter 3 Application Monitors AppMetrics utilizes application monitors to organize data collection and analysis per application server. An application monitor is defined on the AppMetrics manager computer
Acronis Backup & Recovery 11
Acronis Backup & Recovery 11 Quick Start Guide Applies to the following editions: Advanced Server Virtual Edition Advanced Server SBS Edition Advanced Workstation Server for Linux Server for Windows Workstation
Trend Micro KASEYA INTEGRATION GUIDE
Trend Micro KASEYA INTEGRATION GUIDE INTRODUCTION Trend Micro Worry-Free Business Security Services is a server-free security solution that provides protection anytime and anywhere for your business data.
Video Administration Backup and Restore Procedures
CHAPTER 12 Video Administration Backup and Restore Procedures This chapter provides procedures for backing up and restoring the Video Administration database and configuration files. See the following
Configuring Controller 8.2 to use Active Directory authentication
Proven Practice Configuring Controller 8.2 to use Active Directory authentication Product(s): Controller 8.2 Area of Interest: Infrastructure Configuring Controller 8.2 to use Active Directory authentication
User Management Guide
AlienVault Unified Security Management (USM) 4.x-5.x User Management Guide USM v4.x-5.x User Management Guide, rev 1 Copyright 2015 AlienVault, Inc. All rights reserved. The AlienVault Logo, AlienVault,
User's Guide. ControlPoint. Change Manager (Advanced Copy) SharePoint Migration. v. 4.0
User's Guide ControlPoint Change Manager (Advanced Copy) SharePoint Migration v. 4.0 Last Updated 7 August 2013 i Contents Preface 3 What's New in Version 4.0... 3 Components... 3 The ControlPoint Central
Test Note Phone Manager Deployment Windows Group Policy Sever 2003 and XP SPII Clients
Test Note Phone Manager Deployment Windows Group Policy Sever 2003 and XP SPII Clients Note: I have only tested these procedures on Server 2003 SP1 (DC) and XP SPII client, in a controlled lab environment,
Welcome to the QuickStart Guide
QuickStart Guide Welcome to the QuickStart Guide This QuickStart Guide provides the information you need to install and start using Express Software Manager. For more comprehensive help on using Express
Changing Your Cameleon Server IP
1.1 Overview Technical Note Cameleon requires that you have a static IP address defined for the server PC the Cameleon server application runs on. Even if the server PC has a static IP address, you may
Using SSH Secure Shell Client for FTP
Using SSH Secure Shell Client for FTP The SSH Secure Shell for Workstations Windows client application features this secure file transfer protocol that s easy to use. Access the SSH Secure FTP by double-clicking
LANDesk Management Suite 9. Best Practices for Agent Configuration and Deployment (BKM)
LANDesk Management Suite 9 Best Practices for Agent Configuration and Deployment (BKM) Revision 1.00 Don White Dec 10, 2009 Copyright 2002-2009 Avocent Corporation. All rights reserved. Avocent, LANDesk,
Distribution List Manager User s Manual
Distribution List Manager User s Manual Welcome... 2 Configuring the Add-in... 3 Settings Tab... 3 Advanced Tab... 4 Troubleshooting... 5 Distribution List Manager Copyright 2008 Sperry Software Inc. P
