Ecora Enterprise Auditor Instructional Whitepaper. Who Made Change

Size: px
Start display at page:

Download "Ecora Enterprise Auditor Instructional Whitepaper. Who Made Change"

Transcription

1 Ecora Enterprise Auditor Instructional Whitepaper Who Made Change

2 Ecora Enterprise Auditor Who Made Change Instructional Whitepaper Introduction... 3 Purpose... 3 Step 1 - Enabling audit in Windows... 4 Event Types... 5 Audit account logon events... 5 Audit account management... 5 Audit directory service access... 5 Audit logon events... 5 Audit object access... 5 Audit policy change... 6 Audit privilege use... 6 Audit process tracking... 6 Audit system events... 6 Step 2 - Tuning security event log (optional) Step 3 Select WMI browser data collection options in Ecora Auditor Step 3 Select WMI browser data collection options in Ecora Auditor Step 4 Fact-Finding Reports for Who Made Change Appendix A: Common Auditing Event Codes Ecora Software Corp Propriety Information 2

3 Ecora Enterprise Auditor Who Made Change Introduction Today s regulatory and business requirements are placing increasing pressure on organizations around the world to provide detailed information about IT infrastructure. Ecora has received numerous requests asking how to identify who made a specific change a.k.a. who made change reports. This is important when preparing for a detailed audit such as those dictated by Sarbanes-Oxley or similar regulatory laws. Companies are looking closely at who has access, how access is controlled, and the who, what, when, and where of unauthorized access. In many cases, tracking behavior is driven by CEOs and CFOs right into the laps of IT Management. Fortunately, Ecora s Enterprise Auditor places a powerful tool at your disposal to meet these demands. Auditor comes with hundreds of predefined reports that provide documentation about all aspects of your infrastructures operating systems, databases, applications, and network devices. In addition, you can easily create custom reports for specific areas of interest. One strength of Ecora s product is in configuration and change management to identify and manage change at multiple levels within your enterprise. This paper will help you identify the what and where of changes in your environment. Purpose This whitepaper defines the process of collecting and reporting who made change for both Active Directory and Windows objects. Object changes are collected in the Windows security event log when auditing is enabled. Active Directory changes can be collected from domain controllers in a 2000/2003 Active Directory domain, and all other changes can be collected from the local computer being audited. Tracking who made change with Ecora Enterprise Auditor is a four step process. In Windows: 1. Enable auditing for security events. 2. Tune Windows security event log (optional). In Ecora Auditor software: 3. Select WMI browser data collection options. 4. Run standard FFR security reports or customize report definitions based on your criteria. Ecora Software Corp Propriety Information 3

4 Step 1 - Enabling auditing in Windows This step is essential to collect the proper information to determine who made change. This information is collected in the Windows security event logs and is easily accessible to Ecora s Enterprise Auditor for Windows. The first step is to turn on auditing. If you want domain-level auditing, perform the following steps on a Domain Controller. If you want local auditing of a member server, perform the following steps on the member server. To enable auditing 1. Go to Administrative Tools and open Local Security Policy Settings. 2. Expand Local Policies and select Audit Policy. Ecora Software Corp Propriety Information 4

5 Event Types Different types of events can be audited for change and the type of auditing you enable depends on the information you want to track. The different types of events include: Audit account logon events Used for each instance of a user logging on or logging off a computer when this computer is used to validate the account. If auditing is successful for account logon events on a domain controller, an entry is logged for each user who is validated against that domain controller, even though the user is actually logging on to a workstation that is joined to the domain. Note that "account logon events" are generated where the account lives. Audit account management Used for account management on a computer, such as when a user or group is created, changed, or deleted; user is renamed, disabled, or enabled; password is set or changed. Audit directory service access Used when a user accesses an Active Directory object that has its own system access control list (SACL). The audit directory service access policy does not apply to workstations and servers where it has no meaning. Note that you can set a SACL on an Active Directory object using the Security tab in that object's Properties dialog box. This policy is the same as Audit object access, except that it applies only to Active Directory objects and not to file system and registry objects. Audit logon events Used for each instance of a user logging on, logging off, or making a network connection to this computer. Note that "logon events" are generated where the logon attempt occurs. Audit object access Used in the event when users access objects such as: a file, folder, registry key, printer, etc. The object must have its own system access control list (SACL) specified (users/groups need to be specified for the Ecora Software Corp Propriety Information 5

6 object you want to track). Note that you can set a SACL on an object using the Security tab in that object's Properties dialog box. Audit policy change Used for any incidence of a change to user rights assignment policies, audit policies, or trust policies. Audit privilege use Used for each instance of a user exercising a user right. Audit process tracking Used to provide detailed tracking information for events such as program activation, process exit, handle duplication, and indirect object access. Audit system events Used when a user restarts or shuts down the computer or when an event occurs that affects either the system security or the security log such as clearing the log. 3. Once you have decided the type of information you want to track, double-click on the appropriate item(s) and select Success and/or Failure. 4. Once you have made all your choices, click OK and close the Local Security Policy screen. Ecora Software Corp Propriety Information 6

7 Auditing Windows and Active Directory objects As mentioned above, Windows objects (such as file, folders, registry keys, etc.) and Active Directory objects (such as domains, organization units, sites, etc.) can be tracked for changes only if the object has its system access control list (SACL) specified for the particular users/groups that you want to track. The SACL can be modified using the Security tab in that object's Properties dialog box. Auditing Windows Directories For example, to track changes for a directory, you would: 1. Using Windows Explorer, right-click on a folder (in this example C:\WINNT) and select Properties... NOTE: Screen shots are for example only. There are slight differences between 2000, 2003, and XP. Ecora Software Corp Propriety Information 7

8 2. Click on the Security tab. 3. Click on the Advanced button. Ecora Software Corp Propriety Information 8

9 4. Click on the Auditing tab. 5. You can now add, view, or modify users and groups that you want tracked for this object. Once users and or groups have been selected, you can specify what item to track by enabling the successful and/or failed checkboxes. Ecora Software Corp Propriety Information 9

10 6. Click OK to return to Access Control Settings. 7. Verify that the proper users, groups, and access rights have been selected. 8. Click on Apply, then OK, and close all properties screens. Ecora Software Corp Propriety Information 10

11 Auditing Windows Registry To track changes for any registry key, you would: 1. Click Start Run. 2. Type in regedt32 and press enter. 3. Expand the registry until you locate a key you want to audit. Ecora Software Corp Propriety Information 11

12 4. Highlight the registry key you want audited 5. On the Registry Editor menu, click Security then Permissions Click on the Advanced button. Ecora Software Corp Propriety Information 12

13 7. Click on the Auditing tab. 8. You can now add, view, or modify users and groups that you want tracked for this object. Once users and or groups have been selected, you can specify what item to track by enabling the successful and/or failed checkboxes. Ecora Software Corp Propriety Information 13

14 9. Click OK to return to Access Control Settings. 10. Verify that the proper users, groups, and access rights have been selected. 11. Click on Apply, then OK, and close all dialog boxes. Ecora Software Corp Propriety Information 14

15 Step 2 - Tuning security event log (optional) The Windows security event log can be used to capture and document events that could have security implications, such as unauthorized changes, object access, and attempted logons. Depending upon your individual requirements, such as disk space or time interval you may want to tune the security event log parameters to meet your needs. Set the properties of the security event log to match items you are trying to track, such as time intervals, as well as physical limitations, such as hard disk space. 1. From the desktop, click on Start Programs Administrative Tools Event Viewer 2. Right-click Security Log and click on Properties. 3. Allocate long enough time intervals and maximum log sizes to collect accurate data. 4. Verify the settings. Click Apply, then OK and close all dialog boxes. Ecora Software Corp Propriety Information 15

16 Step 3 Select WMI browser data collection options in Ecora Auditor Prior to reporting any change information, you need to specifically collect the information from the Windows security event logs. Specify the collection parameters using the data collection screens in Ecora Enterprise Auditor for Windows. 1. Start the Windows data collection process and you will see the data collection options dialog box. 2. Click on the WMI Browser tab. Ecora Software Corp Propriety Information 16

17 3. In the Device name box, type in a computer name with WMI enabled and click Connect next to the Device name box. 4. Make sure that Namespace contains root\cimv2 and click Connect next to the Namespace box. Ecora Software Corp Propriety Information 17

18 5. In the Class name list, scroll down and double-click Win32_NTLogEvent. Double clicking will display all property names (in the Property name pane). 6. At the bottom of the Category column, click on the Filter button. 7. Make sure Collect events from security log is checked and the correct number of days are selected (default is 7 days). The other settings pertain to different collection options and can be checked or unchecked based on your requirements. 8. Click OK. You will be returned to Data collection options dialog box. 9. Click Next and select an auto discovery method for finding systems. Select the appropriate systems and the data will be collected. 10. Once the data has been collected, you are now ready to report who made change. Ecora Software Corp Propriety Information 18

19 Step 4 Fact-Finding Reports for Who Made Change Ecora Enterprise Auditor includes standard out of the box Fact-Finding Reports that contain event codes and filters for who made change. You can create new reports or customize any FFR report to meet your specific needs. Standard Fact-Finding Reports 1. Click on the Fact-Finding button from Ecora Enterprise Auditor main interface. 2. Expand the database tree to locate Security Reports, and click on Event Log Analysis. Several reports exist for overall security log events. These reports can be used as is or they can be copied to create templates for customization. Customized Fact Finding Reports There are two ways to customize reports. You can use any existing report as a template: 1. From Ecora Auditor s main interface, choose Edit Fact-Finding Report Definitions. 2. Highlight the report to use as a template, then click Copy. The second way is to create a report from scratch. Ecora Software Corp Propriety Information 19

20 Sample Reports Four sample reports are created below to show the flexibility of the type of information that can be tracked for changes. The four samples are: Add users to the Local (or Domain) Administrators Group Changed Audit Policies Clearing Audit Logs Security for an Active Directory Organization Unit Add Users to the Local Administrators Group 1. From Ecora Auditor s main interface, choose Edit Fact-Finding Report Definitions. 2. Click New. Ecora Software Corp Propriety Information 20

21 3. In the left pane, expand the tree to locate Servers Custom WMI OS Event Log Win32NTLogEvent. 4. Select (by either drag and drop or double clicking) the following attributes (from the Available Settings box) in this order Domain Computer, EventCode, TimeGenerated, User, and Message. 5. Click Edit next to Default table in the lower section. This is where you can get very creative. You can sort and set criteria. For example, you can specify the report for only a single computer, group of computers, or all computers. You can report on specific Event codes and by specific users. You can even produce a report based on a particular text string in the message column. Ecora Software Corp Propriety Information 21

22 6. The report that shows which users were added and by whom involves Event Code 636 (Security Enabled Local Group Member Added) and the message column is modified to look for Administrators group. The report can be easily modified for the Domain Administrators group by changing the event code to 632 and the message text to Domain Administrators. 7. After saving the report definition and running the report, you will see results similar to the following sample data. This report shows that AJones was added to the Builtin\Administrators group by the user swlight at 8:42am on October 15th. Ecora Software Corp Propriety Information 22

23 Changed Audit Policies 1. From Ecora Auditor s main interface, choose Edit Fact-Finding Report Definitions. 2. Click New. Ecora Software Corp Propriety Information 23

24 3. In the left pane, expand to tree to locate Servers Custom WMI OS Event Log Win32NTLogEvent. 4. Select (by either drag and drop or double clicking) the following attributes (from the Available Settings box) in this order Domain Computer, EventCode, TimeGenerated, CategoryString, User, and Message. 5. Click Edit next to Default table in the lower section. This is where you can get very creative. You can sort and set criteria. For example, you can specify the report for only a single computer, group of computers, or all computers. You can report on specific Event codes and by specific users. You can even produce a report based on a particular text string in the message column. Ecora Software Corp Propriety Information 24

25 6. The report that shows Audit Policy changes involve Event Code 612 (Audit Policy Change). You can hide columns in a report by deleting the value in the Output Column. In this report, the Event Code column will be hidden (by deleting the 2 ); however, criteria can still be set for it. 7. After saving the report definition and running the report, you will see results similar to the following sample data. This report shows that both Success and Failure auditing for Account Management was turned off. Note that Account Management has (+ +) before it (auditing was enabled for both success and failure) in the first box, but (- -) in the second box (auditing was disabled for both success and failure). Ecora Software Corp Propriety Information 25

26 Clearing Audit Logs 1. From Ecora Auditor s main interface, choose Edit Fact-Finding Report Definitions. 2. Click New. Ecora Software Corp Propriety Information 26

27 3. In the left pane, expand the tree to locate Servers Custom WMI OS Event Log Win32NTLogEvent. 4. Select (by either drag and drop or double clicking) the following attributes (from the Available Settings box) in this order Domain Computer, EventCode, TimeGenerated, CategoryString, User Message. 5. Click Edit next to Default table in the lower section. This is where you can get very creative. You can sort and set criteria. For example, you can specify the report for only a single computer, group of computers, or all computers. You can report on specific Event codes and by specific users. You can even produce a report based on a particular text string in the message column. Ecora Software Corp Propriety Information 27

28 6. The report that shows cleared Audit Logs involve Event Code 517 (Audit log was cleared). You can hide columns in a report by deleting the value in the Output Column. In this report, the Event Code column will be hidden (by deleting the 2 ); however, criteria can still be set for it. 7. After saving the report definition and running the report, you will see results similar to the following sample data. This report shows that the audit log was cleared by the user swlight at 5:08pm on October 14th. Ecora Software Corp Propriety Information 28

29 Security for an Active Directory Organization Unit 1. From Ecora Auditor s main interface, choose Edit Fact-Finding Report Definitions. 2. Click New. Ecora Software Corp Propriety Information 29

30 3. In the left pane, expand the tree to locate Servers Custom WMI OS Event Log Win32NTLogEvent. 4. Select (by either drag and drop or double clicking) the following attributes (from the Available Settings box) in this order Domain Computer, EventCode, TimeGenerated, CategoryString, User, and Message. 5. Click Edit next to Default table in the lower section. This is where you can get very creative. You can sort and set criteria. For example, you can specify the report for only a single computer, group of computers, or all computers. You can report on specific Event codes and by specific users. You can even produce a report based on a particular text string in the message column. Ecora Software Corp Propriety Information 30

31 6. The report that shows access to Active Directory objects involves Event Code 565 (Directory Service Access - Object Open). You can hide columns in a report by deleting the value in the Output Column. In this report, the Event Code column will be hidden (by deleting the 2 ); however, criteria can still be set for it. 7. After saving the report definition and running the report, you will see results similar to the following sample data. Starting at the bottom of the report, it shows: a. The creation of an OU called OU-1A by the user swlight b. The creation of a user called Aroce Jones in OU-1A by the user swlight c. OU write permission given to Aroce Jones by the user swlight d. OU delete permission given to Aroce Jone by the user swlight. Ecora Software Corp Propriety Information 31

32 Appendix A: Common 2000 and 2003 Auditing Event Codes Category Description Event Code Account Management User Account Created 624 Account Management User Account Changed 642 Account Management User Account Deleted 630 Account Management User Account Disabled 629 Account Management Change Password 627 Account Management User Account Password set 628 Account Management Security Enabled Local Group created 635 Account Management Security Enabled Local Group deleted 638 Account Management Security Enabled Local Group changed 639 Account Management Security Enabled Local Group Member added 636 Account Management Security Enabled Local Group Member removed 637 Account Management Security Enabled Global Group Member added 632 Account Management Security Enabled Global Group Member removed 633 Account Management Security Enabled Universal Group Member added 660 Account Management Security Enabled Universal Group Member removed 661 Account Management User account locked out 644 Account Management Group Type changed 668 Logon Event Successful logon 528 Logon Event Logon failure Unknown user or bad password 529 Logon Event Logon failure Logon time restriction violation 530 Logon Event Logon failure Account currently disabled 531 Logon Event User account expired 532 Logon Event User not allowed to logon on this computer 533 Logon Event Password Expired 535 Object Access Object Access Attempt 567 Object Access Object Open 560 Object Access Object Deleted 564 Object Access Handle Closed 562 Policy Change Policy Changed 612 Policy Change Trusted Domain added 610 Policy Change Trusted Domain removed 611 Policy Change IPSEC Policy agent started 613 Policy Change IPSEC Policy agent disabled 614 Policy Change Kerberos Policy changed 617 Policy Change Encrypted Data recovery policy changed 618 System Events Computer Shutdown/Restarted 513 System Events Previous shutdown was clean 6006 System Events Restart was unexpected 6008 System Events Restart due to blue screen 1001 System Events Audit log was cleared 517 More information about Windows security events codes can be found in Microsoft s Knowledge base articles: and Please review: Ecora Software Corp Propriety Information 32

Advanced Event Viewer Manual

Advanced Event Viewer Manual Advanced Event Viewer Manual Document version: 2.2944.01 Download Advanced Event Viewer at: http://www.advancedeventviewer.com Page 1 Introduction Advanced Event Viewer is an award winning application

More information

Password Manager Windows Desktop Client

Password Manager Windows Desktop Client Password Manager Windows Desktop Client EmpowerID provides an extension that allows organizations to plug into Password Manager to customize the Windows logon experience beyond that supplied by the standard

More information

Objectives. At the end of this chapter students should be able to:

Objectives. At the end of this chapter students should be able to: NTFS PERMISSIONS AND SECURITY SETTING.1 Introduction to NTFS Permissions.1.1 File Permissions and Folder Permission.2 Assigning NTFS Permissions and Special Permission.2.1 Planning NTFS Permissions.2.2

More information

Integrating LANGuardian with Active Directory

Integrating LANGuardian with Active Directory Integrating LANGuardian with Active Directory 01 February 2012 This document describes how to integrate LANGuardian with Microsoft Windows Server and Active Directory. Overview With the optional Identity

More information

CONFIGURING TARGET ACTIVE DIRECTORY DOMAIN FOR AUDIT BY NETWRIX AUDITOR

CONFIGURING TARGET ACTIVE DIRECTORY DOMAIN FOR AUDIT BY NETWRIX AUDITOR CONFIGURING TARGET ACTIVE DIRECTORY DOMAIN FOR AUDIT BY NETWRIX AUDITOR TECHNICAL ARTICLE Product Version: 5.0 July 2013. Legal Notice The information in this publication is furnished for information use

More information

Find the Who, What, Where and When of Your Active Directory

Find the Who, What, Where and When of Your Active Directory Find the Who, What, Where and When of Your Active Directory Avril Salter 1. 8 0 0. 8 1 3. 6 4 1 5 w w w. s c r i p t l o g i c. c o m / s m b I T 2012 ScriptLogic Corporation ALL RIGHTS RESERVED. ScriptLogic,

More information

Windows 2000/XP DSS Auditing Written by: Darren Bennett - CISSP Originally Written 08/04/04 Last Updated 08/07/04

Windows 2000/XP DSS Auditing Written by: Darren Bennett - CISSP Originally Written 08/04/04 Last Updated 08/07/04 Windows 2000/XP DSS Auditing Written by: Darren Bennett - CISSP Originally Written 08/04/04 Last Updated 08/07/04 Intro: The NISPOM Chapter 8 establishes requirements for auditing and securing information

More information

Secrets of Event Viewer for Active Directory Security Auditing Lepide Software

Secrets of Event Viewer for Active Directory Security Auditing Lepide Software Secrets of Event Viewer for Active Directory Security Auditing Windows Event Viewer doesn t need any introduction to the IT Administrators. However, some of its hidden secrets, especially those related

More information

Installing Windows Server Update Services (WSUS) on Windows Server 2012 R2 Essentials

Installing Windows Server Update Services (WSUS) on Windows Server 2012 R2 Essentials Installing Windows Server Update Services (WSUS) on Windows Server 2012 R2 Essentials With Windows Server 2012 R2 Essentials in your business, it is important to centrally manage your workstations to ensure

More information

Server Manager Performance Monitor. Server Manager Diagnostics Page. . Information. . Audit Success. . Audit Failure

Server Manager Performance Monitor. Server Manager Diagnostics Page. . Information. . Audit Success. . Audit Failure Server Manager Diagnostics Page 653. Information. Audit Success. Audit Failure The view shows the total number of events in the last hour, 24 hours, 7 days, and the total. Each of these nodes can be expanded

More information

Advanced Audit Policy Configurations for LT Auditor+ Reference Guide

Advanced Audit Policy Configurations for LT Auditor+ Reference Guide Advanced Audit Policy Configurations for LT Auditor+ Reference Guide Contents WINDOWS AUDIT POLICIES REQUIRED FOR LT AUDITOR+....3 ACTIVE DIRECTORY...3 Audit Policy for the Domain...3 Advanced Auditing

More information

Legal Notes. Regarding Trademarks. 2012 KYOCERA Document Solutions Inc.

Legal Notes. Regarding Trademarks. 2012 KYOCERA Document Solutions Inc. Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held liable for any problems arising from

More information

RoomWizard Synchronization Software Manual Installation Instructions

RoomWizard Synchronization Software Manual Installation Instructions 2 RoomWizard Synchronization Software Manual Installation Instructions Table of Contents Exchange Server Configuration... 4 RoomWizard Synchronization Software Installation and Configuration... 5 System

More information

Staying Organized with the Outlook Journal

Staying Organized with the Outlook Journal CHAPTER Staying Organized with the Outlook Journal In this chapter Using Outlook s Journal 362 Working with the Journal Folder 364 Setting Up Automatic Email Journaling 367 Using Journal s Other Tracking

More information

Changing Passwords in Cisco Unity 8.x

Changing Passwords in Cisco Unity 8.x CHAPTER 9 Changing Passwords in Cisco Unity 8.x This chapter contains the following sections: Changing Passwords for the Cisco Unity 8.x Service Accounts (Without Failover), page 9-1 Changing Passwords

More information

2. Using Notepad, create a file called c:\demote.txt containing the following information:

2. Using Notepad, create a file called c:\demote.txt containing the following information: Unit 4 Additional Projects Configuring the Local Computer Policy You need to prepare your test lab for your upcoming experiments. First, remove a child domain that you have configured. Then, configure

More information

Use the below instructions to configure your wireless settings to connect to the secure wireless network using Microsoft Windows Vista/7.

Use the below instructions to configure your wireless settings to connect to the secure wireless network using Microsoft Windows Vista/7. Use the below instructions to configure your wireless settings to connect to the secure wireless network using Microsoft Windows Vista/7. 1. Click the Windows Start button, then Control Panel How-To-WCC-Secure-Windows-7-11/4/2010-4:09

More information

Windows Firewall Configuration with Group Policy for SyAM System Client Installation

Windows Firewall Configuration with Group Policy for SyAM System Client Installation with Group Policy for SyAM System Client Installation SyAM System Client can be deployed to systems on your network using SyAM Management Utilities. If Windows Firewall is enabled on target systems, it

More information

Chapter. Managing Group Policy MICROSOFT EXAM OBJECTIVES COVERED IN THIS CHAPTER:

Chapter. Managing Group Policy MICROSOFT EXAM OBJECTIVES COVERED IN THIS CHAPTER: Chapter 10 Managing Group Policy MICROSOFT EXAM OBJECTIVES COVERED IN THIS CHAPTER: Implement and troubleshoot Group Policy. Create a Group Policy object (GPO). Link an existing GPO. Delegate administrative

More information

FuseMail- Exchange ControlPanel Admin Guide Feb.27-14 V1.0. Exchange ControlPanel Administration Guide

FuseMail- Exchange ControlPanel Admin Guide Feb.27-14 V1.0. Exchange ControlPanel Administration Guide Exchange ControlPanel Administration Guide Table of Contents Top Level Portal Administration... 4 Signing In to Control Panel... 4 Restoring Account Password... 5 Change Account Details... 7 Viewing Account

More information

Tool Tip. SyAM Management Utilities and Non-Admin Domain Users

Tool Tip. SyAM Management Utilities and Non-Admin Domain Users SyAM Management Utilities and Non-Admin Domain Users Some features of SyAM Management Utilities, including Client Deployment and Third Party Software Deployment, require authentication credentials with

More information

enicq 5 System Administrator s Guide

enicq 5 System Administrator s Guide Vermont Oxford Network enicq 5 Documentation enicq 5 System Administrator s Guide Release 2.0 Published November 2014 2014 Vermont Oxford Network. All Rights Reserved. enicq 5 System Administrator s Guide

More information

Active Directory Management. User Interface Guide

Active Directory Management. User Interface Guide Active Directory Management User Interface Guide Document Revision Date: April 15, 2013 Active Directory Management User Interface Guide i Contents Launching the Hosted Exchange Tab - Active Directory

More information

Networking Lab - Vista Public Network Sharing

Networking Lab - Vista Public Network Sharing Networking Lab - Vista Public Network Sharing After completing the lab activity, you will be able to: Explain the differences between Windows XP and Windows Vista network sharing. Explain the purpose of

More information

NETWRIX EVENT LOG MANAGER

NETWRIX EVENT LOG MANAGER NETWRIX EVENT LOG MANAGER USER GUIDE Product Version: 4.0 July/2012. Legal Notice The information in this publication is furnished for information use only, and does not constitute a commitment from NetWrix

More information

Active Directory Change Notifier Quick Start Guide

Active Directory Change Notifier Quick Start Guide Active Directory Change Notifier Quick Start Guide Software version 3.0 Mar 2014 Copyright 2014 CionSystems Inc., All Rights Reserved Page 1 2014 CionSystems Inc. ALL RIGHTS RESERVED. This guide may not

More information

Global Image Management System For epad-vision. User Manual Version 1.10

Global Image Management System For epad-vision. User Manual Version 1.10 Global Image Management System For epad-vision User Manual Version 1.10 May 27, 2015 Global Image Management System www.epadlink.com 1 Contents 1. Introduction 3 2. Initial Setup Requirements 3 3. GIMS-Server

More information

Sophos Enterprise Console Help. Product version: 5.1 Document date: June 2012

Sophos Enterprise Console Help. Product version: 5.1 Document date: June 2012 Sophos Enterprise Console Help Product version: 5.1 Document date: June 2012 Contents 1 About Enterprise Console...3 2 Guide to the Enterprise Console interface...4 3 Getting started with Sophos Enterprise

More information

How to monitor AD security with MOM

How to monitor AD security with MOM How to monitor AD security with MOM A article about monitor Active Directory security with Microsoft Operations Manager 2005 Anders Bengtsson, MCSE http://www.momresources.org November 2006 (1) Table of

More information

Novell ZENworks Asset Management 7.5

Novell ZENworks Asset Management 7.5 Novell ZENworks Asset Management 7.5 w w w. n o v e l l. c o m October 2006 USING THE WEB CONSOLE Table Of Contents Getting Started with ZENworks Asset Management Web Console... 1 How to Get Started...

More information

Virtual Office Remote Installation Guide

Virtual Office Remote Installation Guide Virtual Office Remote Installation Guide Table of Contents VIRTUAL OFFICE REMOTE INSTALLATION GUIDE... 3 UNIVERSAL PRINTER CONFIGURATION INSTRUCTIONS... 12 CHANGING DEFAULT PRINTERS ON LOCAL SYSTEM...

More information

Enterprise Reporting Advanced Web Intelligence Training. Enterprise Reporting Services

Enterprise Reporting Advanced Web Intelligence Training. Enterprise Reporting Services Enterprise Reporting Advanced Web Intelligence Training Enterprise Reporting Services Table of Contents Chapter Page 1 Overview 4 2 Web Intelligence Access 8 3 BI Launch Pad Navigation 12 4 Nested Query

More information

EventTracker: Support to Non English Systems

EventTracker: Support to Non English Systems EventTracker: Support to Non English Systems Publication Date: April 25, 2012 EventTracker 8815 Centre Park Drive Columbia MD 21045 www.eventtracker.com Introduction This document has been prepared to

More information

Group Policy 21/05/2013

Group Policy 21/05/2013 Group Policy Group Policy is not a new technology for Active Directory, but it has grown and improved with every iteration of the operating system and service pack since it was first introduced in Windows

More information

BounceBack User Guide

BounceBack User Guide Table Of Contents 1. Table of Contents... 2 2. 1-0 Introduction... 3 2.1 1-0: Introduction... 4 2.2 1-1: BounceBack Software Overview... 6 3. 2-0 Navigating the BounceBack Control Center... 9 3.1 2-0:

More information

Lab 18: Access Control/Audit

Lab 18: Access Control/Audit CompTIA Security+ Lab Series Lab 18: Access Control/Audit CompTIA Security+ Domain 5 - Access Control and Identity Management Objective 2.3: Explain the fundamental concepts and best practices related

More information

Working with SQL Server Integration Services

Working with SQL Server Integration Services SQL Server Integration Services (SSIS) is a set of tools that let you transfer data to and from SQL Server 2005. In this lab, you ll work with the SQL Server Business Intelligence Development Studio to

More information

Step One. Step Two. Step Three USING EXPORTED DATA IN MICROSOFT ACCESS (LAST REVISED: 12/10/2013)

Step One. Step Two. Step Three USING EXPORTED DATA IN MICROSOFT ACCESS (LAST REVISED: 12/10/2013) USING EXPORTED DATA IN MICROSOFT ACCESS (LAST REVISED: 12/10/2013) This guide was created to allow agencies to set up the e-data Tech Support project s Microsoft Access template. The steps below have been

More information

Nexxis User Management

Nexxis User Management User Manual Version 5.0 Nexxis User Management Nexxis User Management v5.0 User Manual Copyright 2011 Labtronics Inc. Printed in Canada. Windows is a registered trademark of Microsoft Corporation. Microsoft

More information

Enabling Backups for Windows and MAC OS X

Enabling Backups for Windows and MAC OS X Enabling Backups for Windows and MAC OS X TM Trademarks and Copyrights Copyright Storix, Inc. 1999-2005 Storix is a registered trademark of Storix, Inc. SBAdmin is a trademark of Storix, Inc in the USA

More information

NetWrix Server Configuration Monitor

NetWrix Server Configuration Monitor NetWrix Server Configuration Monitor Version 2.2 Quick Start Guide Contents NetWrix Server Configuration Monitor Quick Start Guide 1. INTRODUCTION... 3 1.1 KEY FEATURES... 3 1.2 LICENSING... 4 1.3 HOW

More information

Create, Link, or Edit a GPO with Active Directory Users and Computers

Create, Link, or Edit a GPO with Active Directory Users and Computers How to Edit Local Computer Policy Settings To edit the local computer policy settings, you must be a local computer administrator or a member of the Domain Admins or Enterprise Admins groups. 1. Add the

More information

Windows Operating Systems. Basic Security

Windows Operating Systems. Basic Security Windows Operating Systems Basic Security Objectives Explain Windows Operating System (OS) common configurations Recognize OS related threats Apply major steps in securing the OS Windows Operating System

More information

Erado Archiving & Setup Instruction Microsoft Exchange 2007 Push Journaling

Erado Archiving & Setup Instruction Microsoft Exchange 2007 Push Journaling Erado Archiving & Setup Instruction Microsoft Exchange 2007 Push Journaling This document covers the following Microsoft Exchange Server Editions Microsoft Exchange Enterprise Edition 2007 Microsoft Exchange

More information

LepideAuditor Suite for File Server. Installation and Configuration Guide

LepideAuditor Suite for File Server. Installation and Configuration Guide LepideAuditor Suite for File Server Installation and Configuration Guide Table of Contents 1. Introduction... 4 2. Requirements and Prerequisites... 4 2.1 Basic System Requirements... 4 2.2 Supported Servers

More information

Analyst 1.6 Software. Laboratory Director s Guide

Analyst 1.6 Software. Laboratory Director s Guide Analyst 1.6 Software Laboratory Director s Guide Release Date: August 2011 This document is provided to customers who have purchased AB SCIEX equipment to use in the operation of such AB SCIEX equipment.

More information

NETWRIX USER ACTIVITY VIDEO REPORTER

NETWRIX USER ACTIVITY VIDEO REPORTER NETWRIX USER ACTIVITY VIDEO REPORTER ADMINISTRATOR S GUIDE Product Version: 1.0 January 2013. Legal Notice The information in this publication is furnished for information use only, and does not constitute

More information

Differences between Computer and User Templates

Differences between Computer and User Templates Configuring NetSupport School & Manager using Active Directory Overview This document explains how NetSupport School and Manager both integrate with Microsoft s Active Directory structure enabling you

More information

Xcalibur. Foundation. Administrator Guide. Software Version 3.0

Xcalibur. Foundation. Administrator Guide. Software Version 3.0 Xcalibur Foundation Administrator Guide Software Version 3.0 XCALI-97520 Revision A May 2013 2013 Thermo Fisher Scientific Inc. All rights reserved. LCquan, Watson LIMS, and Web Access are trademarks,

More information

Windows Firewall must be enabled on each host to allow Remote Administration. This option is not enabled by default

Windows Firewall must be enabled on each host to allow Remote Administration. This option is not enabled by default SiteAudit Knowledge Base Local Printer Discovery August 2011 In This Article: Windows Firewall Settings COM Configuration SiteAudit provides discovery and management of printers attached to Windows hosts

More information

16.4.3 Lab: Data Backup and Recovery in Windows XP

16.4.3 Lab: Data Backup and Recovery in Windows XP 16.4.3 Lab: Data Backup and Recovery in Windows XP Introduction Print and complete this lab. In this lab, you will back up data. You will also perform a recovery of the data. Recommended Equipment The

More information

12 SPS DATABASE ADMINISTRATION

12 SPS DATABASE ADMINISTRATION Chapter 12 SPS DATABASE ADMINISTRATION Table of Contents Chapter 12... 1 SPS DATABASE ADMINISTRATION... 1 Table of Contents... 1 12-1 Manually dumping a database... 1 12-2 Logging in to Sybase Central

More information

Integrating Trend Micro OfficeScan 10 EventTracker v7.x

Integrating Trend Micro OfficeScan 10 EventTracker v7.x Integrating Trend Micro OfficeScan 10 EventTracker v7.x Publication Date: August 26, 2015 EventTracker 8815 Centre Park Drive Columbia MD 21045 www.eventtracker.com Abstract This guide will help you in

More information

Sophos Enterprise Console Help

Sophos Enterprise Console Help Sophos Enterprise Console Help Product version: 5.2.1, 5.2.2 Document date: September 2014 Contents 1 About Enterprise Console...6 2 Guide to the Enterprise Console interface...7 2.1 User interface layout...7

More information

Cloud Services ADM. User Interface Guide

Cloud Services ADM. User Interface Guide Cloud Services ADM User Interface Guide 10/15/2014 CONTENTS Launching the Hosted Exchange Tab - Active Directory Users and Computers... 1 User Properties... 2 Exchange Properties... 3 Creating a New User...

More information

Security Explorer 9.5. User Guide

Security Explorer 9.5. User Guide 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license or nondisclosure agreement.

More information

Most of your tasks in Windows XP will involve working with information

Most of your tasks in Windows XP will involve working with information OFFICE 1 File Management Files and Folders Most of your tasks in Windows XP will involve working with information stored on your computer. This material briefly explains how information is stored in Windows

More information

TestElite - Troubleshooting

TestElite - Troubleshooting TestElite - Troubleshooting Revision Sheet 1.0 Balázs Mayer 2014 TestElite. All Rights Reserved. Troubleshooting This document is a collection of the frequented asked questions (FAQ) for solving the general,

More information

Contents. Supported Platforms. Event Viewer. User Identification Using the Domain Controller Security Log. SonicOS

Contents. Supported Platforms. Event Viewer. User Identification Using the Domain Controller Security Log. SonicOS SonicOS User Identification Using the Domain Controller Security Log Contents Supported Platforms... 1 Event Viewer... 1 Configuring Group Policy to Enable Logon Audit... 2 Events in Security Log... 4

More information

Security Guidelines for MapInfo Discovery 1.1

Security Guidelines for MapInfo Discovery 1.1 Security Guidelines for MapInfo Discovery 1.1 This paper provides guidelines and detailed instructions for improving the security of your Mapinfo Discovery deployment. In this document: Overview.........................................

More information

Knowledge Base Articles

Knowledge Base Articles Knowledge Base Articles 2005 Jalasoft Corp. All rights reserved. TITLE: How to configure and use the Jalasoft Xian Syslog Server. REVISION: Revision : B001-SLR01 Date : 11/30/05 DESCRIPTION: Jalasoft has

More information

Administration Guide. . All right reserved. For more information about Specops Inventory and other Specops products, visit www.specopssoft.

Administration Guide. . All right reserved. For more information about Specops Inventory and other Specops products, visit www.specopssoft. . All right reserved. For more information about Specops Inventory and other Specops products, visit www.specopssoft.com Copyright and Trademarks Specops Inventory is a trademark owned by Specops Software.

More information

How To Configure CU*BASE Encryption

How To Configure CU*BASE Encryption How To Configure CU*BASE Encryption Configuring encryption on an existing CU*BASE installation INTRODUCTION This booklet was created to assist CU*Answers clients with the configuration of encrypted CU*BASE

More information

STATISTICA VERSION 9 STATISTICA ENTERPRISE INSTALLATION INSTRUCTIONS FOR USE WITH TERMINAL SERVER

STATISTICA VERSION 9 STATISTICA ENTERPRISE INSTALLATION INSTRUCTIONS FOR USE WITH TERMINAL SERVER Notes: STATISTICA VERSION 9 STATISTICA ENTERPRISE INSTALLATION INSTRUCTIONS FOR USE WITH TERMINAL SERVER 1. These instructions focus on installation on Windows Terminal Server (WTS), but are applicable

More information

Network Event Viewer now supports real-time monitoring enabling system administrators to be notified immediately when critical events are logged.

Network Event Viewer now supports real-time monitoring enabling system administrators to be notified immediately when critical events are logged. About Network Event Viewer is a network wide event log monitoring, consolidation, auditing and reporting tool enabling System Administrators to satisfy Sarbanes-Oxley auditing requirements while proactively

More information

Deployment of Keepit for Windows

Deployment of Keepit for Windows Deployment of Keepit for Windows Keepit A/S October 13, 2010 1 Introduction When deploying Keepit in larger setups with many desktops and servers, installing Keepit individually on each computer is cumbersome

More information

How to Configure Windows 8.1 to run ereports on IE11

How to Configure Windows 8.1 to run ereports on IE11 How to Configure Windows 8.1 to run ereports on IE11 Description: Windows 8.1 ships with IE10, but can be updated to IE11. There is a special mode in IE11 called Enterprise Mode that can be used to emulate

More information

Thin Client Manager. Table of Contents. 1-10ZiG Manager. 2 - Thin Client Management. 3 - Remote client configurations. 1 of 16

Thin Client Manager. Table of Contents. 1-10ZiG Manager. 2 - Thin Client Management. 3 - Remote client configurations. 1 of 16 1 of 16 Thin Client Manager Table of Contents 1-10ZiG Manager 1.1 - Configuring and Managing the Server 1.1.1 - Server Settings 1.1.2 - Starting and Stopping the Server 1.2 - Configuring and Starting the

More information

Getting Started with Vision 6

Getting Started with Vision 6 Getting Started with Vision 6 Version 6.9 Notice Copyright 1981-2009 Netop Business Solutions A/S. All Rights Reserved. Portions used under license from third parties. Please send any comments to: Netop

More information

Installation Guide. . All right reserved. For more information about Specops Deploy and other Specops products, visit www.specopssoft.

Installation Guide. . All right reserved. For more information about Specops Deploy and other Specops products, visit www.specopssoft. . All right reserved. For more information about Specops Deploy and other Specops products, visit www.specopssoft.com Copyright and Trademarks Specops Deploy is a trademark owned by Specops Software. All

More information

Using Group Policies to Install AutoCAD. CMMU 5405 Nate Bartley 9/22/2005

Using Group Policies to Install AutoCAD. CMMU 5405 Nate Bartley 9/22/2005 Using Group Policies to Install AutoCAD CMMU 5405 Nate Bartley 9/22/2005 Before we get started This manual provides a step-by-step process for creating a Group Policy that will install AutoCAD to a Windows

More information

Creating and Issuing the Workstation Authentication Certificate Template on the Certification Authority

Creating and Issuing the Workstation Authentication Certificate Template on the Certification Authority In this post we will see the steps for deploying the client certificate for windows computers. This post is a part of Deploy PKI Certificates for SCCM 2012 R2 Step by Step Guide. In the previous post we

More information

How to setup a VPN on Windows XP in Safari.

How to setup a VPN on Windows XP in Safari. How to setup a VPN on Windows XP in Safari. If you want to configure a VPN connection from a Windows XP client computer you only need what comes with the Operating System itself, it's all built right in.

More information

3 Setting up Databases on a Microsoft SQL 7.0 Server

3 Setting up Databases on a Microsoft SQL 7.0 Server 3 Setting up Databases on a Microsoft SQL 7.0 Server Overview of the Installation Process To set up GoldMine properly, you must follow a sequence of steps to install GoldMine s program files, and the other

More information

Table of Contents WELCOME TO ADAUDIT PLUS... 3. Release Notes... 4 Contact ZOHO Corp... 5 ADAUDIT PLUS TERMINOLOGIES... 7 GETTING STARTED...

Table of Contents WELCOME TO ADAUDIT PLUS... 3. Release Notes... 4 Contact ZOHO Corp... 5 ADAUDIT PLUS TERMINOLOGIES... 7 GETTING STARTED... Table of Contents WELCOME TO ADAUDIT PLUS... 3 Release Notes... 4 Contact ZOHO Corp.... 5 ADAUDIT PLUS TERMINOLOGIES... 7 GETTING STARTED... 8 System Requirements... 9 Installing ADAudit Plus... 10 Working

More information

ThinManager and Active Directory

ThinManager and Active Directory ThinManager and Active Directory Use the F1 button on any page of a ThinManager wizard to launch Help for that page. Visit http://www.thinmanager.com/kb/index.php/special:allpages for a list of Knowledge

More information

How to Connect to Berkeley College Virtual Lab Using Windows

How to Connect to Berkeley College Virtual Lab Using Windows How to Connect to Berkeley College Virtual Lab Using Windows Minimum Requirements Create and Save a Remote Desktop Services Connection Connecting to a Remote Desktop Services session Copy Files between

More information

NETWRIX EVENT LOG MANAGER

NETWRIX EVENT LOG MANAGER NETWRIX EVENT LOG MANAGER ADMINISTRATOR S GUIDE Product Version: 4.0 July/2012. Legal Notice The information in this publication is furnished for information use only, and does not constitute a commitment

More information

DC Agent Troubleshooting

DC Agent Troubleshooting DC Agent Troubleshooting Topic 50320 DC Agent Troubleshooting Web Security Solutions v7.7.x, 7.8.x 27-Mar-2013 This collection includes the following articles to help you troubleshoot DC Agent installation

More information

NETWRIX EVENT LOG MANAGER

NETWRIX EVENT LOG MANAGER NETWRIX EVENT LOG MANAGER QUICK-START GUIDE FOR THE ENTERPRISE EDITION Product Version: 4.0 July/2012. Legal Notice The information in this publication is furnished for information use only, and does not

More information

How To Create A Powerpoint Intelligence Report In A Pivot Table In A Powerpoints.Com

How To Create A Powerpoint Intelligence Report In A Pivot Table In A Powerpoints.Com Sage 500 ERP Intelligence Reporting Getting Started Guide 27.11.2012 Table of Contents 1.0 Getting started 3 2.0 Managing your reports 10 3.0 Defining report properties 18 4.0 Creating a simple PivotTable

More information

Contents 1. Introduction 2. Security Considerations 3. Installation 4. Configuration 5. Uninstallation 6. Automated Bulk Enrollment 7.

Contents 1. Introduction 2. Security Considerations 3. Installation 4. Configuration 5. Uninstallation 6. Automated Bulk Enrollment 7. Contents 1. Introduction 2. Security Considerations 3. Installation 4. Configuration 5. Uninstallation 6. Automated Bulk Enrollment 7. Troubleshooting Introduction Adaxes Self-Service Client provides secure

More information

GP REPORTS VIEWER USER GUIDE

GP REPORTS VIEWER USER GUIDE GP Reports Viewer Dynamics GP Reporting Made Easy GP REPORTS VIEWER USER GUIDE For Dynamics GP Version 2015 (Build 5) Dynamics GP Version 2013 (Build 14) Dynamics GP Version 2010 (Build 65) Last updated

More information

84-01-31 Windows NT Server Operating System Security Features Carol A. Siegel Payoff

84-01-31 Windows NT Server Operating System Security Features Carol A. Siegel Payoff 84-01-31 Windows NT Server Operating System Security Features Carol A. Siegel Payoff This article is designed to provide security administrators with a security checklist for going live with Windows NT.

More information

File Management Utility User Guide

File Management Utility User Guide File Management Utility User Guide Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held

More information

PLANNING AND DESIGNING GROUP POLICY, PART 1

PLANNING AND DESIGNING GROUP POLICY, PART 1 84-02-06 DATA SECURITY MANAGEMENT PLANNING AND DESIGNING GROUP POLICY, PART 1 Melissa Yon INSIDE What Is Group Policy?; Software Settings; Windows Settings; Administrative Templates; Requirements for Group

More information

1. Set Daylight Savings Time... 3. 2. Create Migrator Account... 3. 3. Assign Migrator Account to Administrator group... 4

1. Set Daylight Savings Time... 3. 2. Create Migrator Account... 3. 3. Assign Migrator Account to Administrator group... 4 1. Set Daylight Savings Time... 3 a. Have client log into Novell/Local Machine with Administrator Account...3 b. Access Adjust Date/Time...3 c. Make sure the time zone is set to Central Time...3 2. Create

More information

TrueEdit Remote Connection Brief

TrueEdit Remote Connection Brief MicroPress Server Configuration Guide for Remote Applications Date Issued: February 3, 2009 Document Number: 45082597 TrueEdit Remote Connection Brief Background TrueEdit Remote (TER) is actually the same

More information

10.3.1.6 Lab - Data Backup and Recovery in Windows XP

10.3.1.6 Lab - Data Backup and Recovery in Windows XP 5.0 10.3.1.6 Lab - Data Backup and Recovery in Windows XP Introduction Print and complete this lab. In this lab, you will back up data. You will also perform a recovery of the data. Recommended Equipment

More information

HELP DOCUMENTATION E-SSOM DEPLOYMENT GUIDE

HELP DOCUMENTATION E-SSOM DEPLOYMENT GUIDE HELP DOCUMENTATION E-SSOM DEPLOYMENT GUIDE Copyright 1998-2013 Tools4ever B.V. All rights reserved. No part of the contents of this user guide may be reproduced or transmitted in any form or by any means

More information

Erado Archiving & Setup Instruction Microsoft Exchange 2010 Push Journaling

Erado Archiving & Setup Instruction Microsoft Exchange 2010 Push Journaling Erado Archiving & Setup Instruction Microsoft Exchange 2010 Push Journaling Contents: Step 1: Create Mail Contact Step 2: Create a Local Journal Mailbox Step 3: Create an SMTP send connector Step 4: Create

More information

Lepide Software. LepideAuditor for File Server [CONFIGURATION GUIDE] This guide informs How to configure settings for first time usage of the software

Lepide Software. LepideAuditor for File Server [CONFIGURATION GUIDE] This guide informs How to configure settings for first time usage of the software Lepide Software LepideAuditor for File Server [CONFIGURATION GUIDE] This guide informs How to configure settings for first time usage of the software Lepide Software Private Limited, All Rights Reserved

More information

IBM Security QRadar SIEM Version 7.1.0 MR1. Administration Guide

IBM Security QRadar SIEM Version 7.1.0 MR1. Administration Guide IBM Security QRadar SIEM Version 7..0 MR Administration Guide Note: Before using this information and the product that it supports, read the information in Notices and Trademarks on page 07. Copyright

More information

Foxit Enterprise Reader GPO User Guide

Foxit Enterprise Reader GPO User Guide 1 Copyright 2013 Foxit Corporation. All Rights Reserved. No part of this document can be reproduced, transferred, distributed or stored in any format without the prior written permission of Foxit. Anti-Grain

More information

Your Question. Net Report Answer

Your Question. Net Report Answer Your Question Article: 00120 Question: How to Configure External Authentication for Net Report Web Portal Net Report Answer Introduction Security devices can be used to control access to network resources.

More information

IHS USER SECURITY AUDIT

IHS USER SECURITY AUDIT RESOURCE AND PATIENT MANAGEMENT SYSTEM IHS USER SECURITY AUDIT (BUSA) Version 1.0 Office of Information Technology Division of Information Technology Albuquerque, New Mexico Table of Contents 1.0 Release

More information

Application Note 8: TrendView Recorders DCOM Settings and Firewall Plus DCOM Settings for Trendview Historian Server

Application Note 8: TrendView Recorders DCOM Settings and Firewall Plus DCOM Settings for Trendview Historian Server Application Note 8: TrendView Recorders DCOM Settings and Firewall Plus DCOM Settings for Trendview Historian Server DCOM Configuration Introduction This document is intended to provide a check-list of

More information

Video Administration Backup and Restore Procedures

Video Administration Backup and Restore Procedures CHAPTER 12 Video Administration Backup and Restore Procedures This chapter provides procedures for backing up and restoring the Video Administration database and configuration files. See the following

More information

Troubleshooting Guide

Troubleshooting Guide Enable WMI after applying SP2 for XP Company web site: Support email: support@ Support telephone: +44 20 3287-7651 +1 646 233-1163 2 This tutorial will guide you on enabling WMI after applying Service

More information

STATISTICA VERSION 10 STATISTICA ENTERPRISE SERVER INSTALLATION INSTRUCTIONS

STATISTICA VERSION 10 STATISTICA ENTERPRISE SERVER INSTALLATION INSTRUCTIONS Notes: STATISTICA VERSION 10 STATISTICA ENTERPRISE SERVER INSTALLATION INSTRUCTIONS 1. The installation of the STATISTICA Enterprise Server entails two parts: a) a server installation, and b) workstation

More information