UserLock advanced documentation
|
|
- Allyson Georgina Maxwell
- 8 years ago
- Views:
Transcription
1 UserLock advanced documentation 1. Agent deployment with msi package or with the UserLock deployment module The UserLock deployment module doesn t deploy the msi package. It just transfers the agent file (250 KB for a 32 bits computer) and register it on the remote computer but the agent is not registered as an application (in Add/Remove programs). So if you want to uninstall it you need to do it either from the UserLock console or by hand (see In addition, the msi package registers the agent as an application in Add/Remove programs. So typically if you install the agent with the msi package and you uninstall it with the UserLock console the agent will be unregistered and will no longer be loaded at the next reboot but you will still see the UserLock agent entry in Add/Remove programs because the UserLock deployment module doesn t uninstall the msi package. So if you want a clean uninstallation you should rather uninstall the msi package from add remove program. This can also be done silently with the following command line: MsiExec.exe /x{effb3e74-ff2d-40dc c a49} /qn How does the automatic deployment mode act with computers for which the agent was installed by using another way (either with the msi package or prebuilt in the computer)? UserLock is also able to recognize an agent that was not deployed by its deployment module. So if the automatic mode is started the agent will not be installed again except if the server has a newer version. In this case the server will automatically upgrade the agent to this new version. Can the UserLock server upgrade an agent that has been installed with the msi package? Yes this is possible. However the agent version indicated in Add/remove programs will not be updated but the agent version indicated in the console will be accurate. 2. Bandwidth consideration about the computer polling done by the UserLock deployment module The UserLock deployment module only checks computers one by one. During the first pass after service startup UserLock waits 100 ms between each computers. In further passes UserLock waits half a second between each computer. In consequence, with a big network the UserLock deployment module will not take more bandwidth but will rather use more time to check all computers. If the automatic mode is not started a computer check will take 3 KB in both way and you can expect 15 KB/s during the first pass and 5 KB/s in further passes. If the automatic deployment mode is started a 250 KB file will be transferred to any workstation without the agent. So in the worst case UserLock would use 2.5 MB/s of bandwidth during the first pass or 500 KB in further passes. These values will never be reached because the network time response slow down the process, because there is usually some workstations that are powered off and because the agent may already be installed on many workstations. To approach the worst situation you need to restart the UserLock service and immediately enable the automatic mode and the agent should not be already deployed on any workstation. So in order to use as little bandwidth as possible the automatic mode should be started when the UserLock
2 service is already started since a while and when the agent is already deployed through another way on most workstations. Doing so, the used bandwidth will be negligible. 3. UserLock SQL database and session database How to configure the connection to SQL server with custom settings If you need some specific connection settings with your SQL server (e.g. change the port number) you can t use the simplified database wizard provided with UserLock. You will need to configure your connection with the standard ODBC wizard. Figure 1 Select ODBC wizard in the database wizard Figure 2 Select Machine data Source and click on New
3 Figure 3 Select System Data Source Figure 4 Select the SQL server driver
4 Figure 5 Select the name of the data source and the name of the SQL server Figure 6 Click on client configuration
5 Figure 7 Unselect Dynamically determine the port and enter the correct port number Figure 8 Select the UserLock database as default database The data source is now created and you can click OK until you come back in the UserLock server properties with the updated connection string. Then click Apply and click on create table to create the UserLock table in the database. Role of the SQL database The SQL server database is only intended to keep the logon history and is never queried by the UserLock server. Without SQL database a UserLock would still be able to maintain the protection.
6 So where sessions displayed in the UserLock console comes from? What we call the session database is kept in memory and saved each minute in a file named userlock.cfg located in the UserLock installation folder. So each time an agent notifies a logon event to the UserLock server the session database is updated in memory and after maximum one minute saved on the disk. If for any reason the service needs to be restarted the session database persists and is reloaded in memory through the userlock.cfg file. The session database is an image of all currently opened sessions and is updated in real time. UserLock will query the session database in memory in order to know if a user is allowed to logon. So there is no SQL query in order to know if a user already has a session open. This is done through fast memory accesses. 4. Permissions requirements Rights needed by the UserLock Service account 1- The UserLock service account needs administrative rights on the local server for the first execution. Later you can remove administrative rights without any major losses in functionality. You just will not be able to install the agent locally from the console or logoff the local session from the UserLock console. If the UserLock service account doesn t have administrative rights on the server you need to grant to him full access to the following locations. HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\ISDecisions\UserLock (x64 machines) HKEY_LOCAL_MACHINE\SOFTWARE\ISDecisions\UserLock (x86 machines) C:\Program Files (x86)\isdecisions\userlock (x64 machines) C:\Program Files\ISDecisions\UserLock (x86 machines) 2- To get all features working the UserLock service accounts needs administrative rights on all computers to protect. This is not a need but without it the following features will not work: UserLock will not be able to deploy the agent and you will need to use another way to do it. The agent status will be updated in degraded mode (uninstall status not updated) The recovery of lost logon events will be done in degraded mode Agent communication settings will not be updated on clients if a backup server is added or if one of the UserLock services is moved to a different physical server. You will not be able to remotely close sessions from the console or web console The option allowing users to logoff their previous session will not work Unable to remotely reboot the workstation from the console 3- The same rules apply for the backup server but in addition if the service account of the backup server is not administrator of the primary server you need add it in the UserLock administration permissions (with full permissions) in order to allow the synchronization to work between both servers. Rights needed by the client computer account The agent runs on the client as the localsystem account. In order to be able to communicate with the server without any problem the localsystem account should be identified on the UserLock server by its domain computer account (MACHINENAME$). This is normally the case in an AD environment. If for any reason the localsystem account cannot be authenticated as its AD computer account the agent will downgrade in user communication mode. He will communicate with the server in behalf of the user only when a user open/lock/unlock/close a session. In this mode some features will not work. The agent will not be able to update its status on the server after a restart of the workstation, unexpected shutdowns will not be notified to the UserLock server to clean ghost sessions and unsent session events (after network failure) will not be sent to the server. So if all agents are in downgraded communication mode the UserLock session database correction process will entirely rely on the UserLock server computer polling in order to recover lost session events from workstations. How is the session database reflected on the UserLock console?
7 The console sends a command to the UserLock server to get the list of all opened sessions and display them. In order to update the view the administrator need to click on refresh. There is currently no automatic refresh of the user session view on the console by polling the server. 5. Logoff technology The logoff of a session by UserLock is done by copying an executable on the remote computer through administrative share ADMIN$ (LogoffAgent.exe 140 KB) and the executable is then started in the user session in order logoff the session. 6. Synchronization between the backup server and the primary server When the primary server is running the UserLock backup server is never contacted by clients because the UserLock agent will always try to contact the primary server first and contact the backup server only if the primary server can t be contacted. So a backup server is designed for failover but not load balancing. When the primary server is online the backup server just maintains its session database up to date by synchronizing with the primary server. The synchronization is differential. This means that both servers synchronize all logon events that occurred since the last synchronization. If the backup server was just brought online the whole database session is not synchronized. Only new logon events will be synchronized. So there will be a difference between the session views on both servers. Both servers will display exactly the same sessions only after a while when sessions opened before the backup server was brought online will all be closed. 7. Workstations polling by the UserLock server The UserLock service poll a workstation just by checking some registry entries remotely. The agent creates a volatile registry key where specific information about the agent status is stored: The agent status The agent version Current sessions on the workstation Figure 9 Example of the volatile key created by the agent
8 The key allows the server to easily check if an agent is running, get the version of the agent, check if a session still exists. So the agent version displayed in the console should be accurate because it s the version number provided by the agent. If several agent version numbers are displayed in the console it would mean that the UserLock server was upgraded or the msi packaged agent doesn t match the agent on the server. The server will also get the content of the file c:\windows\system32\ulagent.log (through the ADMIN$ share) in order to retrieve all unsent logon events. If the agent server is working fine this file should be empty. 8. Agent server communication The agent contacts the server through named pipes (File and printer sharing TCP 445). The agent contacts the server just after a startup to send its status, and at each session event (logon/logoff/lock/unlock) to get approval and update the session database on the server. If for any reason some session events could not be sent in real time the agent will try each minute to send them again to the server until it succeeds. This is not a polling and doesn t take much bandwidth because while the connection fails no data is transferred and once the connection succeed the agent stops trying to contact the server as there will be no longer unsent events to notify. The agent also uses the ICMP protocol (ping) to check if the server is available. If the server doesn t answer to the ping the agent will try to contact another server (e.g. the backup server). 9. Performance and load balancing There is currently no load balancing feature in UserLock. If a network is too big to be protected by a single server the network need to be split in several protected zones (OUs or domains) and these zones need to be protected separately with different primary servers. Protecting a network with clients with a single server requires a dedicated server dual core 3 GHz 2 GB memory. Also read the following page in particular about the disk space requirements for the SQL server: Be also aware that clients on a single server is the most that has already be done.
for Networks Installation Guide for the application on the server July 2014 (GUIDE 2) Lucid Rapid Version 6.05-N and later
for Networks Installation Guide for the application on the server July 2014 (GUIDE 2) Lucid Rapid Version 6.05-N and later Copyright 2014, Lucid Innovations Limited. All Rights Reserved Lucid Research
More informationfor Networks Installation Guide for the application on the server August 2014 (GUIDE 2) Lucid Exact Version 1.7-N and later
for Networks Installation Guide for the application on the server August 2014 (GUIDE 2) Lucid Exact Version 1.7-N and later Copyright 2014, Lucid Innovations Limited. All Rights Reserved Lucid Research
More informationInstallation Instruction STATISTICA Enterprise Server
Installation Instruction STATISTICA Enterprise Server Notes: ❶ The installation of STATISTICA Enterprise Server entails two parts: a) a server installation, and b) workstation installations on each of
More informationSysPatrol - Server Security Monitor
SysPatrol Server Security Monitor User Manual Version 2.2 Sep 2013 www.flexense.com www.syspatrol.com 1 Product Overview SysPatrol is a server security monitoring solution allowing one to monitor one or
More informationInstallation Notes for Outpost Network Security (ONS) version 3.2
Outpost Network Security Installation Notes version 3.2 Page 1 Installation Notes for Outpost Network Security (ONS) version 3.2 Contents Installation Notes for Outpost Network Security (ONS) version 3.2...
More informationInstallation Instruction STATISTICA Enterprise Small Business
Installation Instruction STATISTICA Enterprise Small Business Notes: ❶ The installation of STATISTICA Enterprise Small Business entails two parts: a) a server installation, and b) workstation installations
More informationMetalogix SharePoint Backup. Advanced Installation Guide. Publication Date: August 24, 2015
Metalogix SharePoint Backup Publication Date: August 24, 2015 All Rights Reserved. This software is protected by copyright law and international treaties. Unauthorized reproduction or distribution of this
More informationHow To Create An Easybelle History Database On A Microsoft Powerbook 2.5.2 (Windows)
Introduction EASYLABEL 6 has several new features for saving the history of label formats. This history can include information about when label formats were edited and printed. In order to save this history,
More informationWhatsUp Gold v16.1 Installation and Configuration Guide
WhatsUp Gold v16.1 Installation and Configuration Guide Contents Installing and Configuring Ipswitch WhatsUp Gold v16.1 using WhatsUp Setup Installing WhatsUp Gold using WhatsUp Setup... 1 Security guidelines
More informationSTATISTICA VERSION 12 STATISTICA ENTERPRISE SMALL BUSINESS INSTALLATION INSTRUCTIONS
STATISTICA VERSION 12 STATISTICA ENTERPRISE SMALL BUSINESS INSTALLATION INSTRUCTIONS Notes 1. The installation of STATISTICA Enterprise Small Business entails two parts: a) a server installation, and b)
More informationWhatsUp Gold v16.2 Installation and Configuration Guide
WhatsUp Gold v16.2 Installation and Configuration Guide Contents Installing and Configuring Ipswitch WhatsUp Gold v16.2 using WhatsUp Setup Installing WhatsUp Gold using WhatsUp Setup... 1 Security guidelines
More information4cast Client Specification and Installation
4cast Client Specification and Installation Version 2015.00 10 November 2014 Innovative Solutions for Education Management www.drakelane.co.uk System requirements The client requires Administrative rights
More informationBefore deploying SiteAudit it is recommended to review the information below. This will ensure efficient installation and operation of SiteAudit.
SiteAudit Knowledge Base Deployment Check List June 2012 In This Article: Platform Requirements Windows Settings Discovery Configuration Before deploying SiteAudit it is recommended to review the information
More informationWhatsUp Gold v16.3 Installation and Configuration Guide
WhatsUp Gold v16.3 Installation and Configuration Guide Contents Installing and Configuring WhatsUp Gold using WhatsUp Setup Installation Overview... 1 Overview... 1 Security considerations... 2 Standard
More informationConfiguring the Windows XP SP2/Vista Firewall for UserLock
Configuring the Windows XP SP2/Vista Firewall for UserLock Due to the modification of the Firewall s activation setting, that occurs when Service Pack 2 is deployed on a XP workstation, all incoming network
More informationPearl Echo Installation Checklist
Pearl Echo Installation Checklist Use this checklist to enter critical installation and setup information that will be required to install Pearl Echo in your network. For detailed deployment instructions
More informationTable of Contents. FleetSoft Installation Guide
FleetSoft Installation Guide Table of Contents FleetSoft Installation Guide... 1 Minimum System Requirements... 2 Installation Notes... 3 Frequently Asked Questions... 4 Deployment Overview... 6 Automating
More informationTROUBLESHOOTING GUIDE
TROUBLESHOOTING GUIDE (When using SQL Server 2008 R2) Third edition, (3 Dec 2013) This manual applies to these networked products: Lucid CoPS, Lucid Rapid, LASS 8-11, LASS 11-15 LADS, LADS Plus, Lucid
More informationfor Networks Installation Guide for the application on a server September 2015 (GUIDE 2) Memory Booster version 1.3-N and later
for Networks Installation Guide for the application on a server September 2015 (GUIDE 2) Memory Booster version 1.3-N and later Copyright 2015, Lucid Innovations Limited. All Rights Reserved Lucid Research
More informationGetting Started with. Ascent Capture Internet Server 5. 10300260-000 Revision A
Ascent Capture Internet Server 5 Getting Started with Ascent Capture Internet Server 5 10300260-000 Revision A Copyright Copyright 2001 Kofax Image Products. All Rights Reserved. Printed in USA. The information
More information4cast Server Specification and Installation
4cast Server Specification and Installation Version 2015.00 10 November 2014 Innovative Solutions for Education Management www.drakelane.co.uk System requirements Item Minimum Recommended Operating system
More informationInstalling and Trouble-Shooting SmartSystems
Installing and Trouble-Shooting SmartSystems Requirements: Processor: 2 GHz is recommended for optimum performance Memory/RAM: 2GB is required Disk space: 60MB is required for SmartSystems Server Operating
More informationTANDBERG MANAGEMENT SUITE 10.0
TANDBERG MANAGEMENT SUITE 10.0 Installation Manual Getting Started D12786 Rev.16 This document is not to be reproduced in whole or in part without permission in writing from: Contents INTRODUCTION 3 REQUIREMENTS
More informationNETASQ SSO Agent Installation and deployment
NETASQ SSO Agent Installation and deployment Document version: 1.3 Reference: naentno_sso_agent Page 1 / 20 Copyright NETASQ 2013 General information 3 Principle 3 Requirements 3 Active Directory user
More informationEnterprise Remote Control 5.6 Manual
Enterprise Remote Control 5.6 Manual Solutions for Network Administrators Copyright 2015, IntelliAdmin, LLC Revision 3/26/2015 http://www.intelliadmin.com Page 1 Table of Contents What is Enterprise Remote
More informationOneStop Reporting 3.7 Installation Guide. Updated: 2013-01-31
OneStop Reporting 3.7 Installation Guide Updated: 2013-01-31 Copyright OneStop Reporting AS www.onestopreporting.com Table of Contents System Requirements... 1 Obtaining the Software... 2 Obtaining Your
More informationUpgrading to advanced editions of Acronis Backup & Recovery 10. Technical white paper
Upgrading to advanced editions of Acronis Backup & Recovery 10 Technical white paper Table of contents 1 Introduction...3 2 Choosing the way to upgrade...3 2.1 Gradual upgrade... 3 2.2 Importing backup
More informationBackup Exec Private Cloud Services. Planning and Deployment Guide
Backup Exec Private Cloud Services Planning and Deployment Guide Chapter 1 Introducing Backup Exec Private Cloud Services This chapter includes the following topics: About Backup Exec Private Cloud Services
More informationNetworking Best Practices Guide. Version 6.5
Networking Best Practices Guide Version 6.5 Summer 2010 Copyright: 2010, CCH, a Wolters Kluwer business. All rights reserved. Material in this publication may not be reproduced or transmitted in any form
More informationSymantec Endpoint Encryption Full Disk
Symantec Endpoint Encryption Full Disk Installation Guide Version 7.0 Information in this document is subject to change without notice. No part of this document may be reproduced or transmitted in any
More informationOut n About! for Outlook Electronic In/Out Status Board. Administrators Guide. Version 3.x
Out n About! for Outlook Electronic In/Out Status Board Administrators Guide Version 3.x Contents Introduction... 1 Welcome... 1 Administration... 1 System Design... 1 Installation... 3 System Requirements...
More informationMatisse Installation Guide for MS Windows
Matisse Installation Guide for MS Windows July 2013 Matisse Installation Guide for MS Windows Copyright 2013 Matisse Software Inc. All Rights Reserved. This manual and the software described in it are
More informationLegal Notes. Regarding Trademarks. 2013 KYOCERA Document Solutions Inc.
Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held liable for any problems arising from
More informationSophos for Microsoft SharePoint startup guide
Sophos for Microsoft SharePoint startup guide Product version: 2.0 Document date: March 2011 Contents 1 About this guide...3 2 About Sophos for Microsoft SharePoint...3 3 System requirements...3 4 Planning
More informationInstalling GFI FAXmaker
Installing GFI FAXmaker System Requirements Before you install GFI FAXmaker, please ensure that the following requirements are met. GFI FAXmaker FAX Server: A Windows 2000, 2003, 2008 server or Windows
More informationMoving the TRITON Reporting Databases
Moving the TRITON Reporting Databases Topic 50530 Web, Data, and Email Security Versions 7.7.x, 7.8.x Updated 06-Nov-2013 If you need to move your Microsoft SQL Server database to a new location (directory,
More informationSTATISTICA VERSION 9 STATISTICA ENTERPRISE INSTALLATION INSTRUCTIONS FOR USE WITH TERMINAL SERVER
Notes: STATISTICA VERSION 9 STATISTICA ENTERPRISE INSTALLATION INSTRUCTIONS FOR USE WITH TERMINAL SERVER 1. These instructions focus on installation on Windows Terminal Server (WTS), but are applicable
More informationSOP085 - HELLER OVEN SOFTWARE INSTALLATION PROCEDURE. For version 6.2.x.x
SOP085 - HELLER OVEN SOFTWARE INSTALLATION PROCEDURE For version 6.2.x.x DATE REV ECN - DESCRIPTION OF CHANGE Initials 02/20/2014 INT ECN 140003-001 TP For version 6.2.x.x Rev. INT Page 1 of 16 Basic PC
More informationVERITAS Backup Exec TM 10.0 for Windows Servers
VERITAS Backup Exec TM 10.0 for Windows Servers Quick Installation Guide N134418 July 2004 Disclaimer The information contained in this publication is subject to change without notice. VERITAS Software
More informationMAPILab Reports for Hardware and Software Inventory Installation Guide. Document version 1.0
MAPILab Reports for Hardware and Software Inventory Installation Guide Document version 1.0 MAPILab Ltd., January 2010 Table of Contents Introduction... 3 1. Product architecture and general explanations...
More informationThis document details the procedure for installing Layer8 software agents and reporting dashboards.
Quick Start Guide This document details the procedure for installing Layer8 software agents and reporting dashboards. Deployment to data analysis takes approximately 15 minutes. If you wish to deploy via
More informationSage Intelligence Financial Reporting for Sage ERP X3 Version 6.5 Installation Guide
Sage Intelligence Financial Reporting for Sage ERP X3 Version 6.5 Installation Guide Table of Contents TABLE OF CONTENTS... 3 1.0 INTRODUCTION... 1 1.1 HOW TO USE THIS GUIDE... 1 1.2 TOPIC SUMMARY...
More informationInstallation Guide. Live Maps 7.4 for System Center 2012
Installation Guide Live Maps 7.4 for System Center 2012 1 Introduction... 4 1.1 1.2 About This Guide... 4 Supported Products... 4 1.3 1.4 Related Documents... 4 Understanding Live Maps... 4 1.5 Upgrade
More informationUser Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream
User Manual Onsight Management Suite Version 5.1 Another Innovation by Librestream Doc #: 400075-06 May 2012 Information in this document is subject to change without notice. Reproduction in any manner
More informationInstallation & Configuration Guide
Installation & Configuration Guide Bluebeam Studio Enterprise ( Software ) 2014 Bluebeam Software, Inc. All Rights Reserved. Patents Pending in the U.S. and/or other countries. Bluebeam and Revu are trademarks
More informationIntegration Guide. Microsoft Active Directory Rights Management Services (AD RMS) Microsoft Windows Server 2008
Integration Guide Microsoft Active Directory Rights Management Services (AD RMS) Microsoft Windows Server 2008 Integration Guide: Microsoft Active Directory Rights Management Services (AD RMS) Imprint
More informationEXPRESSCLUSTER X for Windows Quick Start Guide for Microsoft SQL Server 2014. Version 1
EXPRESSCLUSTER X for Windows Quick Start Guide for Microsoft SQL Server 2014 Version 1 NEC EXPRESSCLUSTER X 3.x for Windows SQL Server 2014 Quick Start Guide Document Number ECX-MSSQL2014-QSG, Version
More informationSnow Inventory. Installing and Evaluating
Snow Inventory Installing and Evaluating Snow Software AB 2002 Table of Contents Introduction...3 1. Evaluate Requirements...3 2. Download Software...3 3. Obtain License Key...4 4. Install Snow Inventory
More informationInstallation & Maintenance Guide
The instruction booklet is also included on the CD in Word and Acrobat formats, which may be easier to print. (If you want to install Acrobat Reader run d:\acroread\setup.exe (where d:\ is the identifier
More informationTable of Contents. CHAPTER 1 About This Guide... 9. CHAPTER 2 Introduction... 11. CHAPTER 3 Database Backup and Restoration... 15
Table of Contents CHAPTER 1 About This Guide......................... 9 The Installation Guides....................................... 10 CHAPTER 2 Introduction............................ 11 Required
More informationHow To Upgrade A Websense Log Server On A Windows 7.6 On A Powerbook (Windows) On A Thumbdrive Or Ipad (Windows 7.5) On An Ubuntu 7.3.2 (Windows 8) Or Windows
Websense v7.6 Install or Upgrade Checklist Greetings from Websense Technical Support. Most Websense upgrades complete successfully, and from my years of troubleshooting, I have learned a number of steps
More informationDriveLock Quick Start Guide
Be secure in less than 4 hours CenterTools Software GmbH 2012 Copyright Information in this document, including URL and other Internet Web site references, is subject to change without notice. Unless otherwise
More informationInstalling GFI MailSecurity
Installing GFI MailSecurity Introduction This chapter explains how to install and configure GFI MailSecurity. You can install GFI MailSecurity directly on your mail server or you can choose to install
More informationManageEngine IT360. Professional Edition Installation Guide. [ims-eval@manageengine.com]
ManageEngine IT360 (Division of ZOHO Corporation) ) www.manageengine.com/it360 ManageEngine IT360 Professional Edition Installation Guide [ims-eval@manageengine.com] [This document is a guideline for installing
More informationOracle Enterprise Single Sign-on Logon Manager. Installation and Setup Guide Release 11.1.1.2.0 E15720-02
Oracle Enterprise Single Sign-on Logon Manager Installation and Setup Guide Release 11.1.1.2.0 E15720-02 November 2010 Oracle Enterprise Single Sign-on Logon Manager, Installation and Setup Guide, Release
More informationCloud Services ADM. Agent Deployment Guide
Cloud Services ADM Agent Deployment Guide 10/15/2014 CONTENTS System Requirements... 1 Hardware Requirements... 1 Installation... 2 SQL Connection... 4 AD Mgmt Agent... 5 MMC... 7 Service... 8 License
More informationMatisse Installation Guide for MS Windows. 10th Edition
Matisse Installation Guide for MS Windows 10th Edition April 2004 Matisse Installation Guide for MS Windows Copyright 1992 2004 Matisse Software Inc. All Rights Reserved. Matisse Software Inc. 433 Airport
More informationActive Directory Management. Agent Deployment Guide
Active Directory Management Agent Deployment Guide Document Revision Date: April 26, 2013 Active Directory Management Deployment Guide i Contents System Requirements... 1 Hardware Requirements... 2 Agent
More informationW H I T E P A P E R : T E C H N I C A L. Understanding and Configuring Symantec Endpoint Protection Group Update Providers
W H I T E P A P E R : T E C H N I C A L Understanding and Configuring Symantec Endpoint Protection Group Update Providers Martial Richard, Technical Field Enablement Manager Table of Contents Content Introduction...
More informationDiamond II v2.3 Service Pack 4 Installation Manual
Diamond II v2.3 Service Pack 4 Installation Manual P/N 460987001B ISS 26APR11 Copyright Disclaimer Trademarks and patents Intended use Software license agreement FCC compliance Certification and compliance
More informationInstalling and Configuring WhatsUp Gold
Installing and Configuring WhatsUp Gold This guide provides information about installing and configuring WhatsUp Gold v14.2, including instructions on how to run the WhatsUp web interface through an Internet
More informationFor Splunk Universal Forwarder and Splunk Cloud
Quick Start Guide; For Splunk Universal Forwarder and Splunk Cloud This document details the procedure for manually installing Layer8 software agents, and forwarding data to an existing Splunk Enterprise
More informationNet Protector Admin Console
Net Protector Admin Console USER MANUAL www.indiaantivirus.com -1. Introduction Admin Console is a Centralized Anti-Virus Control and Management. It helps the administrators of small and large office networks
More informationEventSentry Overview. Part I Introduction 1 Part II Setting up SQL 2008 R2 Express 2. Part III Setting up IIS 9. Part IV Installing EventSentry 11
Contents I EventSentry Overview Part I Introduction 1 Part II Setting up SQL 2008 R2 Express 2 1 Downloads... 2 2 Installation... 3 3 Configuration... 7 Part III Setting up IIS 9 1 Installation... 9 Part
More informationReconfiguring VMware vsphere Update Manager
Reconfiguring VMware vsphere Update Manager vsphere Update Manager 6.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a
More informationRemote Desktop Reporter Agent Deployment Guide
Remote Desktop Reporter Agent Deployment Guide Table of Contents Overview... 2 Agent Components... 2 Agent Security... 2 Windows Firewall Considerations... 3 Installation Procedure and Configuration Parameters...
More informationCTI Installation Manual Version 1.0
CTI Installation Manual Version 1.0 Document History June 2012 Initial Release Table of Contents General Description... 4 1 st Party CTI... 5 Requirements... 5 Configuring the SL Series PBX... 6 Installing
More informationWhatsUp Event Archiver v10 and v10.1 Quick Setup Guide
WhatsUp Event Archiver v10 and v10.1 Quick Setup Guide Contents WhatsUp Event Archiver Quick Setup Guide WhatsUp Event Archiver Quick Setup Guide... 2 Installation Requirements... 3 Manually Creating Firewall
More informationms-help://ms.technet.2005mar.1033/security/tnoffline/security/smbiz/winxp/fwgrppol...
Page 1 of 16 Security How to Configure Windows Firewall in a Small Business Environment using Group Policy Introduction This document explains how to configure the features of Windows Firewall on computers
More informationUpgrading Client Security and Policy Manager in 4 easy steps
Page 1 of 13 F-Secure White Paper Upgrading Client Security and Policy Manager in 4 easy steps Purpose This white paper describes how to easily upgrade your existing environment running Client Security
More informationGUARD1 PLUS SE Administrator's Manual
GUARD1 PLUS SE Administrator's Manual Version 4.4 30700 Bainbridge Road Solon, Ohio 44139 Phone 216-595-0890 Fax 216-595-0991 info@guard1.com www.guard1.com i 2010 TimeKeeping Systems, Inc. GUARD1 PLUS
More informationHow To Deploy Lync 2010 Client Using SCCM 2012 R2
prajwaldesai.com http://prajwaldesai.com/how-to-deploy-lync-2010-client-using-sccm-2012-r2/ How To Deploy Lync 2010 Client Using SCCM 2012 R2 Prajwal Desai In this post we will see how to deploy Lync 2010
More informationDeploying System Center 2012 R2 Configuration Manager
Deploying System Center 2012 R2 Configuration Manager This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED, OR STATUTORY, AS TO THE INFORMATION IN THIS DOCUMENT.
More informationAradial Installation Guide
Aradial Technologies Ltd. Information in this document is subject to change without notice. Companies, names, and data used in examples herein are fictitious unless otherwise noted. No part of this document
More informationTROUBLESHOOTING INFORMATION
TROUBLESHOOTING INFORMATION VinNOW Support does not support Microsoft products to include SQL Server,.NET Framework, and also cannot assist with Windows User issues, Network or VPN issues. If installing
More informationSTART YOUR INVENTORY WITH SCANFRE
START YOUR INVENTORY WITH SCANFRE April 2014 LANDPARK SCANFREE «Quickly estimate your data processing systems before considering their evolution. Landpark Scanfree, solution for your IT asset tracking
More informationPowerMapper/SortSite Desktop Deployment Guide v2.11. 1. Introduction
PowerMapper/SortSite Desktop Deployment Guide v2.11 1. Introduction... 1 2. Architecture... 2 3. Independent Certification... 2 4. Setup.exe Command Line... 2 5. Registry Settings... 3 6. Deployment using
More informationMIGRATING TO AVALANCHE 5.0 WITH MS SQL SERVER
MIGRATING TO AVALANCHE 5.0 WITH MS SQL SERVER This document provides instructions for migrating to Avalanche 5.0 from an installation of Avalanche MC 4.6 or newer using MS SQL Server 2005. You can continue
More informationTN 024 - Installing PV4E 6.0 under Windows Server 2008 (R2) (3264 Bit) and Remote DB Support
TN 024 - Installing PV4E 6.0 under Windows Server 2008 (R2) (3264 Bit) and Remote DB Support Issue Date: 28.07.2013 Revision Date: 28.07.2013 Product (configuration) CenterMind PV4E PV4E 6.0 PV4E 6.0 SP1
More informationQUANTIFY INSTALLATION GUIDE
QUANTIFY INSTALLATION GUIDE Thank you for putting your trust in Avontus! This guide reviews the process of installing Quantify software. For Quantify system requirement information, please refer to the
More informationFreshservice Discovery Probe User Guide
Freshservice Discovery Probe User Guide 1. What is Freshservice Discovery Probe? 1.1 What details does Probe fetch? 1.2 How does Probe fetch the information? 2. What are the minimum system requirements
More informationSTATISTICA VERSION 10 STATISTICA ENTERPRISE SERVER INSTALLATION INSTRUCTIONS
Notes: STATISTICA VERSION 10 STATISTICA ENTERPRISE SERVER INSTALLATION INSTRUCTIONS 1. The installation of the STATISTICA Enterprise Server entails two parts: a) a server installation, and b) workstation
More informationApplication Server Installation
Application Server Installation Guide ARGUS Enterprise 11.0 11/25/2015 ARGUS Software An Altus Group Company Application Server Installation ARGUS Enterprise Version 11.0 11/25/2015 Published by: ARGUS
More informationInstallation Instructions Release Version 15.0 January 30 th, 2011
Release Version 15.0 January 30 th, 2011 ARGUS Software: ARGUS Valuation - DCF The contents of this document are considered proprietary by ARGUS Software, the information enclosed and any portion thereof
More informationLANDPARK NETWORK IP Landpark, comprehensive IT Asset Tracking and ITIL Help Desk solutions October 2016
LANDPARK NETWORK IP Landpark, comprehensive IT Asset Tracking and ITIL Help Desk solutions October 2016 LANDPARK NETWORK IP ALLOWS YOU TO EASILY INVENTORY YOUR PC THROUGH THE NETWORK Landpark NetworkIP
More informationEmbarcadero Performance Center 2.7 Installation Guide
Embarcadero Performance Center 2.7 Installation Guide Copyright 1994-2009 Embarcadero Technologies, Inc. Embarcadero Technologies, Inc. 100 California Street, 12th Floor San Francisco, CA 94111 U.S.A.
More informationFUSION Installation Guide
FUSION Installation Guide Version 1.0 Page 1 of 74 Content 1.0 Introduction... 3 2.0 FUSION Server Software Installation... 3 3.0 FUSION Client Software Installation... 10 4.0 FUSION NIM Software Installation...
More informationOneStop Reporting OSR Portal 4.6 Installation Guide
OneStop Reporting OSR Portal 4.6 Installation Guide Doc. Version 1.0 Updated: 11-Jan-16 Copyright OneStop Reporting AS Contents Introduction... 1 For companies already using OneStop Reporting... 1 System
More informationHELP DOCUMENTATION E-SSOM DEPLOYMENT GUIDE
HELP DOCUMENTATION E-SSOM DEPLOYMENT GUIDE Copyright 1998-2013 Tools4ever B.V. All rights reserved. No part of the contents of this user guide may be reproduced or transmitted in any form or by any means
More informationEkran System Help File
Ekran System Help File Table of Contents About... 9 What s New... 10 System Requirements... 11 Updating Ekran to version 4.1... 13 Program Structure... 14 Getting Started... 15 Deployment Process... 15
More information026-1010 Rev 7 06-OCT-2011. Site Manager Installation Guide
026-1010 Rev 7 06-OCT-2011 Site Manager Installation Guide Retail Solutions 3240 Town Point Drive NW, Suite 100 Kennesaw, GA 30144, USA Phone: 770-425-2724 Fax: 770-425-9319 Table of Contents 1 SERVER
More informationAttix5 Pro Storage Platform
Attix5 Pro Storage Platform V6.0 User Manual Cover for Microsoft Windows Your guide to configuring the Attix5 Pro Storage Platform. SERVER EDITION V6.0 for MICROSOFT WINDOWS Copyright Notice and Proprietary
More informationCentreWare for Microsoft Operations Manager. User Guide
CentreWare for Microsoft Operations Manager User Guide Copyright 2006 by Xerox Corporation. All rights reserved. Copyright protection claimed includes all forms and matters of copyright material and information
More informationMailStore Outlook Add-in Deployment
MailStore Outlook Add-in Deployment A MailStore Server installation deploys the MailStore Outlook Add-in as a Windows Installer package (MSI) that can be installed on client machines using software distribution.
More informationPortions of this product were created using LEADTOOLS 1991-2009 LEAD Technologies, Inc. ALL RIGHTS RESERVED.
Installation Guide Lenel OnGuard 2009 Installation Guide, product version 6.3. This guide is item number DOC-110, revision 1.038, May 2009 Copyright 1992-2009 Lenel Systems International, Inc. Information
More information1. Technical requirements 2. Installing Microsoft SQL Server 2005 3. Configuring the server settings
Microsoft SQL Server 2005 Installation guide and configuration settings on Microsoft Windows 2003/2008 server ( March 2009 ) This guide explains the different steps for installing and configuring Microsoft
More informationDeploy Auto Shutdown Manager via Windows Group Policy
Deploy Auto Shutdown Manager via Windows Group Policy This tutorial will enable you to automatically deploy Auto Shutdown Manager to multiple computers using a Group Policy Object. 1. Preparation... 2
More informationTrusted Stackware series. Rev. 1.0.2. D.O.I-Net Co., Ltd. Document No.:TST-10-002E
TruMonitor Client Setup Guide Rev. 1.0.2 D.O.I-Net Co., Ltd. Document No.:TST-10-002E Disclaimers 1. D.O.I-Net Co., Ltd. shall not take responsibility for any direct and indirect damage caused by the descriptions
More informationNetWrix USB Blocker. Version 3.6 Administrator Guide
NetWrix USB Blocker Version 3.6 Administrator Guide Table of Contents 1. Introduction...3 1.1. What is NetWrix USB Blocker?...3 1.2. Product Architecture...3 2. Licensing...4 3. Operation Guide...5 3.1.
More informationNetIQ Advanced Authentication Framework. FIDO U2F Authentication Provider Installation Guide. Version 5.1.0
NetIQ Advanced Authentication Framework FIDO U2F Authentication Provider Installation Guide Version 5.1.0 Table of Contents 1 Table of Contents 2 Introduction 3 About This Document 3 System Requirements
More information