1 Setup process for a secure workstation This is a work in progress. Version - 5/15/08 Billions of people use computers running Microsoft software. Microsoft has therefore made a quite understandable decision to set up its products so as to operate smoothly right out of the box for the majority of people. Many computer users don t know a great deal about the inner workings of computers and operating systems, nor do they need to. However, there are a few things that should be done to secure Microsoft Windows prior to putting into use. This guide is designed to let the average computer user make a home PC or personal laptop much more protected against penetration by a hacker. I have tried to make these instructions fairly comprehensive, but there is room for improvement in anything. If you have any suggestions, clarifications or corrections, please contact me at: A few notes before we begin: Where you see (RC) it indicates that you should Right Click the indicated item vs. left clicking as usual. [#] The number in square brackets indicates the number of minutes this step took me in my trial. Your experience may differ. I do usually not give specific instruction steps for clicking Apply, Save or OK. These steps are implied by the instructions. One last thing: Remember one immutable law of security. Physical access trumps almost any technical protections you may put in place. If you have a laptop, never leave it unattended. If it is stolen, a hacker will have unlimited time to break through your security. Buy and use a locking cable. Install a strong encryption package. None of the below will protect your system or data if a technically-minded thief has possession of your computer. If you think you are safe, consider this: That being said, let s protect your machine from other types of attacks. All the steps below, including the clean install of Windows XP, took less than 4 hours. On with the process
2 1. If possible start with a Clean install of Windows XP SP2. I do not recommend using any earlier version. This version fixed many significant security issues. [~70 minutes] Go to Device Manager. Two of the ways to do this are: (Start > My Computer (RC) > Properties, Hardware Tab, Device Manager Button) Note: Some systems may say View System Information instead Properties above and make sure all your devices are working properly. Anything with a yellow exclamation point should be fixed. Consult your documentation or contact support if you need help to resolve these.
3 2. Customize Start Menu to add System Administrative Tools.  To get to Customize Start Menu, Right click Start > Properties If your PC does not have Start > Properties, go to Start > Control Panel. Switch to Classic view using the link on the left panel and then select Taskbar and Start Menu If you prefer the Category View of Control Panel, Taskbar and Start Menu is under the Appearance and Themes category Go to Advanced tab Configure Start Menu Items to taste and add System Administrative Tools to your menu as shown: 3. Create a non-administrator user account for normal use.  Start > Control Panel > User Accounts Enter the user name you desire and press Next Set to Limited Account and Click Create
4 Click on the new account Add a strong password. See for tips. 4. Go to Computer Management  Two ways to get to it: Click Start > My Computer (RC) > Manage Click Start > All Programs > Administrative Tools > Computer Management Secure the user accounts: Delete all unnecessary accounts (support, HelpAssistant, etc ) by right clicking each in turn and selecting Delete
5 The Guest account cannot be deleted, but it should already be disabled. (This is shown by the red x over the account.) Leave this account disabled. Set a strong password on all active accounts (including Administrator). For tips on how to select a strong password see: Click Disk Management in the left pane (green arrow) and verify that all disk partitions are formatted with NTFS (indicated by red arrow)
6 If the disk is not NTFS and you have the option of converting it, you should do so. NTFS has many more security options than any of the FAT versions. Note: Although the chance of corruption or data loss during the conversion is minimal, it is recommended that you perform a backup of the data on the volume that you want to convert before you start the conversion. To convert an existing FAT or FAT32 volume to NTFS, follow these steps: 1. Click Start > All Programs > Accessories > Command Prompt 2. At the command prompt, type the following, where drive letter is the drive that you want to convert: convert drive letter: /fs:ntfs For example, type the following command to convert drive E to NTFS: convert e: /fs:ntfs Note: If the operating system is on the drive that you are converting, you will be prompted to schedule the task when you restart the computer because the conversion cannot be completed while the operating system is running. When you are prompted, click YES 3. When you receive the following message at the command prompt, type the volume label of the drive that you are converting, and then press ENTER: The type of the file system is FAT. Enter the current volume label for drive drive letter 4. When the conversion to NTFS is complete, you receive the following message at the command prompt: Conversion complete 5. Quit the command prompt. 5. Set a screen saver and set the system to require a password upon resume.  Right Click anywhere on the desktop and select Properties Select the Screen Saver tab. Select your preferred Screen Saver. Be sure to check On resume, password protect as shown 6. Open your My Documents folder, then select Tools and Folder Options 
7 Under Hidden files and folders, set Show hidden files and folders for the time being (you can set this one back to hide after we are done) Scroll to the bottom and uncheck Use simple file sharing (this one you will want to keep this way) 7. Review and modify file permissions on your hard drives.  Open My Computer. Right click on your main hard drive and select Properties On the Sharing tab, remove the default share by clicking Do not share this folder
8 On the Security tab, remove the Everyone group from file permissions by selecting it and pressing the delete key. Repeat this for any other hard drives that might be connected to your computer More permission setting advice can be found here, but this may be more detail than most users need to worry about 8. Secure and optimize the network adapters.  There are a number of conceptual details involved in the following that I will not explain in detail, but the main point of these steps is to allow you to have networking between computers inside your home using a different protocol than the one used by your computer to communicate with the internet. These steps dramatically improve the security of your system in several ways. Details may be had be reviewing the references below.
9 Install NetBEUI (This is a protocol that will be used to allow file and print sharing on your local network without exposing your files to the internet by using TCP/IP) Insert the Windows XP CD-ROM into the CD-ROM drive. Navigate to the Valueadd\MSFT\Net\NetBEUI folder. Copy NBF.SYS to the %SYSTEMROOT%\System32\Drivers directory. Copy NETNBF.INF to the %SYSTEMROOT%\Inf hidden directory. Click Start > Control Panel and double-click Network Connections Right-click the adapter where NetBEUI is to be added (Local Area Connection) then click Properties On General tab, click Install Click Protocol then click Add Select NetBEUI Protocol from the list and then click OK
10 Restart computer if prompted. NetBEUI should be installed and functional Select Internet Protocol (TCP/IP) and click Properties On the General tab, click Advanced On the WINS tab, click the Add button and enter the address , click Disable NetBIOS over TCP/IP, and uncheck Enable LMHOST lookup as shown (This will have to be done for each connection with TCP/IP installed) Close out of all those windows so that you are back in Start > Control Panel > Network Connections, click the Advanced menu (to the right of Tools in the button bar) and select the Advanced Settings option
11 In the top window, set the order of connections. You should put the connection you use most at the top. For example start with LAN, then Wireless, then others. In the bottom window, uncheck Internet Protocol (TCP/IP) infile and Printer Sharing and Client for Microsoft Networks these two functions should be bound to NetBEUI only. (The below only shows one connection, but you will need to set these bindings for all connections listed in the top window.) Configure Windows Firewall.  Turn the firewall on and check the don't allow exceptions option (unless there is a good reason to have an exception)
12 Turn on the firewall log in the Advanced tab Security Logging Settings button 9. Change workgroup name if desired.  Click Start > My Computer (RC) > Properties, Computer Name Tab, Change Button (green arrow)
13 Change the computer and workgroup name to meet your needs (red arrows) 10. NOTE For computers on your local workgroup to properly communicate, they will all need to be set up to: Have the same workgroup name Have different computer names Be setup with NetBEUI as shown in the steps above 11. Disable Bluetooth if it is not being used.  12. Disable Wireless if it is not being used.  Note: The steps in this document will help protect your PC from attack as wireless connectivity is currently not a secure technology. It is possible to break WEP encryption (the wireless encryption still used by most wireless access points if any is used at all) in less than 15 minutes using a tool that is freely available online. So, while wireless access is incredibly useful, it is not secure. Just something of which to be aware. 13. Connect your computer to your network via the network cable or wireless adapter.  14. Install a reputable Anti-Virus package like McAfee or Panda.  15. Update your Anti-Virus package.  16. Install Internet Explorer 7.  (Requires reboot) 17. Secure Internet Explorer. 
14 Go to Internet Options Go to the Privacy tab and set cookie security to High. Once you have done this, you will need to explicitly add any site that you want to have cookies. This requires a little extra work on you part, but it will virtually eliminate the incredible proliferation of cookies that infect most computers and dramatically compromise your privacy. There are a relatively low number of sites that absolutely require cookies.
15 Go to the Security Tab and set to High for the Internet zone as shown. On the same tab, click the trusted Sites (green checkmark). Click the Sites button (red arrow) On the resulting screen, uncheck Require https (at the bottom) and then enter the following URLs as shown above. These will be required to run Windows update in the next step. update.microsoft.com *.update.microsoft.com download.windowsupdate.com windowsupdate.microsoft.com 18. Run Windows Update.  Click Start > All Programs > Windows Update You will be taken to the windows update website. Run the Express update. The first run will require a reboot. You will need to run the Windows Update again after the reboot. And perhaps a third time if some of the updates fail.
16 19. Set advanced security on your processor if available (http://www.grc.com/securable.htm) 20. Install ZoneAlarm.  ZoneAlarm is a free bi-directional firewall that is consistently one of the best reviewed and secure personal firewalls on the market Install any utilities that you may wish. [variable] Some of my favorites are: Eraser - TrueCrypt - WinRAR - CurrPorts Install & Configure an alternative browser if desired. (Firefox, Opera, etc.)  23. Configure Local Security Policies.  Click Start > All Programs > Administrative Tools > Local Security Policies In the Account Policies > Password Policy section, set: Minimum password length - 10 Password must meet complexity requirements - Enable Store password in reversible encryption - Disable Set Account Lockout Policy Duration 60 minutes Threshold 5 attempts Reset lockout counter 60 min
17 Set Local Policies > Audit Policy as shown Under Security Options do the following. Accounts: Guest account Disable Accounts: Rename administrator account Rename this to something else. I chose HighLevel Accounts: Rename guest account Rename this to something else. I chose DoNotUse Domain member: Require strong (Windows 2000 or later) session key Enabled Interactive logon: Do not display last user name Enabled Interactive logon: Do not require CTRL+ALT+DEL Disabled Set a logon message if desired (Like This computer is the property of company X. Authorized use only. etc ) 1. Interactive logon: Message text for users attempting to log on 2. Interactive logon: Message title for users attempting to log on Microsoft network client: Send unencrypted password to third-party SMB servers Disabled Network access: Allow anonymous SID/Name translation Disabled Network access: Do not allow anonymous enumeration of SAM accounts Enabled Network access: Do not allow anonymous enumeration of SAM accounts and shares Enabled Network access: Do not allow storage of credentials or.net Passports for network authentication Enabled Network access: Let Everyone permissions apply to anonymous users Enabled These next three settings should have all their entries removed to prevent Null Session attacks: 1. Network access: Named Pipes that can be accessed anonymously 2. Network access: Remotely accessible registry path
18 3. Network access: Shares that can be accessed anonymously These are the default values for the above three keys. I am including them here in case you need them for future reference: o Named Pipes COMNAP,COMNODE,SQL\QUERY,SPOOLSS,LLSRPC,browser o Remotely accessible registry path System\CurrentControlSet\Control\ProductOptions,System\CurrentControlSet\Control\Print\Printers,System\CurrentControlSe t\control\server Applications,System\CurrentControlSet\Services\Eventlog,Software\Microsoft\OLAP Server,Software\Microsoft\Windows NT\CurrentVersion,System\CurrentControlSet\Control\ContentIndex,System\CurrentControlSet\Control\Terminal Server,System\CurrentControlSet\Control\Terminal Server\UserConfig,System\CurrentControlSet\Control\Terminal Server\DefaultUserConfiguration o Shares that can be accessed anonymously COMCFG,DFS$ Network access: Sharing and security model for local accounts Classic Network security: Do not store LAN Manager hash value on next password change Enabled Network security: LAN Manager authentication level Send NTLMv2 response only\refuse LM & NTLM Network security: Minimum session security for NTLM SSP based (including secure RPC) clients Check Require NTLMv2 and Require 128-bit encryption Network security: Minimum session security for NTLM SSP based (including secure RPC) servers Check Require NTLMv2 and Require 128-bit encryption Recovery console: Allow automatic administrative logon Disabled In User Rights Assignment, set the following. You will sometimes be removing groups (like Everyone ) and adding others (like SYSTEM ). Access this computer from the network Administrators (remove everyone and other groups) Bypass traverse checking Administrators, SERVICE, power users, users Deny access to this computer from the network ANONYMOUS LOGON Deny logon locally Guest Deny logon through terminal services Everyone Log on as a batch job <remove all> Log on as a service <remove all> Log on locally <remove Guest> 24. Registry Changes.  Open Notepad Paste the following text into Notepad Windows Registry Editor Version 5.00 [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\lanmanserver\parameters] "AutoShareServer"=dword: "AutoShareWks"=dword: "enablesecuritysignature"=dword: "requiresecuritysignature"=dword: "Lmannounce"=dword: [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\lanmanworkstation\parameters] "AutoShareServer"=dword: "AutoShareWks"=dword: "enableplaintextpassword"=dword: "enablesecuritysignature"=dword: "requiresecuritysignature"=dword:
19 Save the file as SecuritySettings.reg Run SecuritySettings.reg by double clicking it and confirming. This file sets a few security items that were not done by the settings above. It removes default administrative shares and requires security signatures 25. Shutdown and disable Services that are not required.  Start Services manager in one of two ways: Click Start > All Programs > Administrative Tools > Services Click Start > Settings > Control Panel > Services To stop a service: Select the service you want to modify (green arrow) Click the Stop button (red arrow) To set a service to Manual or Disable it: Double click the service you want to modify Stop the service (there are a few that will not stop until you reboot) Select Disabled or Manual under Startup Type Click Apply and OK Go through the Services manager and set the following services like this:
20 Alerter This service is only needed for sending administrative alerts. Used to notify admins when a server is in trouble. Set to Manual or Disable on a home PC. Application Layer Gateway Provides support for 3rd party plug-ins for Internet Connection Sharing/Internet Connection Firewall. Required if using Internet Connection Sharing/Internet Connection Firewall to connect to the internet. Automatic if using ICS, Disabled if not. Clipbook This service is a relic of NT3.x. Used to support Clipbook Viewer which allows remote viewing of the clipbook. Default for workstation is manual. Ensure it is set to manual or disabled. Com + System Disable. Computer Browser The browser service is used to maintain the list of PCs you see in Network Neighborhood. This is normally a server function. A home user can set this to Manual. Distributed Link Tracking Client Distributed Link Tracking Client sends notifications of files moving between NTFS volumes in a network domain. Disable on a home computer. Distributed Transaction Coordinator Coordinates transactions that are distributed across two or more databases, message queues, file systems, or other transaction-protected resource managers. Manual. DNS Client Resolves and caches Domain Name System (DNS) names. This is normally provided by your ISP. Disable and if you have name resolution problems, return it to Automatic. Error Reporting Disable. Fax Service Set to Manual if you don't need fax services. Indexing Fastfind functionality. Improves text searches. For day to day performance, disable it. Internet Connection Sharing If you are want to share an Internet connection for your home network, then set this to Automatic. If not, leave this set to Manual. MSFTPSVC FTP Service. Disable this if you see it and are not running an FTP server. Messenger This service can be used to send messages. You have for that now Disable. Net Logon Supports pass-through authentication of account logon events for computers in a domain. Logging onto a domain? Leave it. Otherwise set it to Manual. Network DDE Supports network transport of DDE (Dynamic Data Exchange) connections. Such connectivity is mostly a relic from the NT 3.x days. QoS RSVP Provides network signaling and local traffic control setup functionality for QoS-aware programs and control applets. A home user can set this to Manual. Remote Access Connection Manager Only needed if you are configuring a new network connection. Keep Disabled normally. Remote Desktop Help Session Manager Manages and controls Remote Assistance. If this service is stopped, Remote Assistance will be unavailable. Remote Registry Allows remote registry manipulation. A home user can set this to Manual. Routing and Remote Access Offers routing services to businesses in local area and wide area network environments. A home user can set this to Manual. RPC Manual. Runas Enables starting processes under alternate credentials. A home user can set this to Manual. Secondary Logon Manual. Security Accounts Manager Stores security information for local user accounts. A home user can set this to Manual unless you are using Local Security Policy Editor. Server Disable this service unless you are sharing files on your hard drive or your printer. Hackers will get nowhere if you do. Simple Mail Transport Protocol (SMTP) Not available on Windows XP Home. Not installed by default on Windows XP Pro. Transports across the network. Disable if you see it. SSDP Part of UpnP. Disable. TCP/IP NetBIOS Helper Provides support for name resolution via a lookup of the LMHosts file. If you are not using LMHOSTS name resolution, you can set it to Manual.
21 Telephony Provides Telephony API (TAPI) support for programs that control telephony devices and IP based voice connections on the local computer and, through the LAN, on servers that are also running the service. Normally set to Manual on workstations. Leave it on Manual. Telnet Allows a remote user to log on to the system and run programs using the command line. Disable! Terminal Services Disable unless you need it. Universal Plug and Play Device Host Provides support to host Universal Plug and Play devices. Disable unless installing new hardware. WebClient Provides HTTP services for applications on the Windows platform. Required if you are running a web server. Most common entry point for hackers! Disable it. Workstation Creates and maintains client network connections to remote servers. If this service is stopped, these connections will be unavailable. If this service is disabled, any services that explicitly depend on it will fail to start. Set this to Manual. May normally be left stopped. Reactivating Services If you want to run certain functions of Windows, you will have to turn some services back on: Enable local workgroup networking Workstation (set to auto) to be visible on local network Server (set to auto) to see others on local network Computer Browser (set to auto) If you install software that needs telephony, like Skype, you may need to re-enable Telephony and perhaps Remote Access Connection Manager. Test this by trying the software first and then enabling first one then the other. Others? 26. Disable Dump File Creation A dump file can be a useful troubleshooting tool when either the system or application crashes and causes the infamous "Blue Screen of Death". However, they also can provide a hacker with potentially sensitive information such as application passwords. You can disable the dump file by going to the My Computer (RC) > Properties, Advanced Tab > Startup and Recovery > Settings Change the options for Write Debugging Information" (bottom 1/3 of the page) to None.
22 If you need to troubleshoot unexplained crashes at a later date, you can re-enable this option until the issue is resolved but be sure to disable it again later and delete any stored dump files 27. Run GRC security tests.  UnPlug n Pray Shoot the Messager Leak Test MouseTrap SocketLock 28. Set up software restriction policies.  Click Start > My Computer (RC) > Manage Click Software Restriction Policies, click Action, click Create New Policy Double click on Enforcement and set it to All software files (vs not on libraries) Double click on Trusted Publishers and set it to Local computer administrators 29. Set up a share folder if desired If you want to share files with other computers on your home network you will need to set up a shared folder. Create a new folder for this purpose, then right click on it and click Properties. On the Sharing tab, click Share this folder. Provide the name of the share ( Share below). I recommend that you limit the number of computers that can connect to your computer to a realistic number for you network. I put 2 in the example below. Once that is set, click the Permissions button. On the Permissions for Share screen, remove the Everyone group and replace it with Authenticated Users. Finally, add the ANONYMOUS LOGON group and set all permissions for it to Deny as shown.
23 30. Install and run Microsoft Baseline Security Analyzer.  https://www.microsoft.com/technet/security/tools/mbsahome.mspx Take action on the results This step is incomplete: If the program won t download the update automatically, download it from and then place it in C:\Documents and Settings\<username>\Local Settings\Application Data\Microsoft\MBSA\2.1\Cache 31. Test your security.  Run GRC Sheilds-Up! found at If available, scan your system with a vulnerability scanner such as Nessus, ISS or NexPose 32. Change your boot sequence and set bios passwords.  Refer to your system documentation for instructions on how to do this Change the boot sequence to start with your hard drive For the slightly more paranoid, you can set the bios password so that the computer cannot be even started without entering a password. This will require you to enter two passwords to start up your system (bios and windows) and is normally not required. 33. Post Config Clean-up If desired, you may hide your Hidden files again. Open your My Documents folder, then select Tools and Folder Options Under Hidden files and folders, set Do not show hidden files and folders
24 To reset security if something gets fouled up (Reference - To reset Security Policies secedit /configure/cfg C:\WINDOWS\repair\secsetup.inf /areas securitypolicy /db secsetup.sdb /verbose To reset Services secedit /configure/cfg C:\WINDOWS\repair\secsetup.inf /areas services /db secsetup.sdb /verbose To reset User Rights secedit /configure/cfg C:\WINDOWS\repair\secsetup.inf /areas user_rights /db secsetup.sdb /verbose To reset All secedit /configure/cfg C:\WINDOWS\repair\secsetup.inf /db secsetup.sdb /verbose References General Services Registry Local Security Settings Networking & Folder and File Permissions
Windows Vista Securing & Safe Computing PROTECTING YOUR PERSONAL COMPUTER FROM MALICIOUS THREATS Pre-Setup Notes As of August 12, 2009, all of the following procedures to secure the Windows Vista operating
WINDOWS 7 RC build:7100 Securing & Safe Computing PROTECTING YOUR PERSONAL COMPUTER FROM MALICIOUS THREATS Pre-Setup Notes As of August 12, 2009, all of the following procedures to secure the Windows 7
WHITE PAPER SECURITY BEST PRACTICES FOR CISCO PERSONAL ASSISTANT (1.4X) INTRODUCTION This document covers the recommended best practices for hardening a Cisco Personal Assistant 1.4(x) server. The term
Windows Server 2003 default services To view a description for a particular service, hover the mouse pointer over the service in the Name column. The descriptions included here are based on Microsoft documentation.
Account Policies Enforce password history 24 Maximum Password Age - 42 days Minimum Password Age 2 days Minimum password length - 8 characters Password Complexity - Enable Store Password using Reversible
Step-by-Step Guide to Securing Windows XP Professional with Service Pack 2 in Small and Medium Businesses 2004 Microsoft Corporation. All rights reserved. This document is for informational purposes only.
Web 3 Security Options Comparison Windows Server 2003 provides a number of Security Options that can be applied within the scope of managing a GPO. Most are the same as those available in Windows 2000.
Securing Your Windows Laptop Arindam Mandal (email@example.com) Paladion Networks (http://www.paladion.net) May 2004 Now-a-days laptops are part of our life. We carry laptops almost everywhere
Activity 1: Scanning with Windows Defender 1. Click on Start > All Programs > Windows Defender 2. Click on the arrow next to Scan 3. Choose Custom Scan Page 1 4. Choose Scan selected drives and folders
Windows Operating Systems Basic Security Objectives Explain Windows Operating System (OS) common configurations Recognize OS related threats Apply major steps in securing the OS Windows Operating System
Agency Pre Migration Tasks This document is to be provided to the agency and will be reviewed during the Migration Technical Kickoff meeting between the ICS Technical Team and the agency. Network: Required
DC Agent Troubleshooting Topic 50320 DC Agent Troubleshooting Web Security Solutions v7.7.x, 7.8.x 27-Mar-2013 This collection includes the following articles to help you troubleshoot DC Agent installation
1. Set Daylight Savings Time... 3 a. Have client log into Novell/Local Machine with Administrator Account...3 b. Access Adjust Date/Time...3 c. Make sure the time zone is set to Central Time...3 2. Create
Page 1 Walton Centre Access and Authentication (network) Document History Date Version Author Changes 01/10/04 1.0 A Cobain L Wyatt 31/03/05 1.1 L Wyatt Update to procedure Page 2 Table of Contents Section
Citrix Access Gateway Plug-in for Windows User Guide Access Gateway 9.2, Enterprise Edition Copyright and Trademark Notice Use of the product documented in this guide is subject to your prior acceptance
: Managing, Maintaining, and Troubleshooting, 5e Chapter 3 Installing Windows Objectives How to plan a Windows installation How to install Windows Vista How to install Windows XP How to install Windows
Page 1 of 5 The license associated with the Belarc Advisor product allows for free personal use only. Use on multiple computers in a corporate, educational, military or government installation is prohibited.
Operating System File and Printer Sharing with Microsoft Windows Microsoft Corporation Published: November 2003 Abstract File and printer sharing in Microsoft Windows allows you to share the contents of
TANDBERG MANAGEMENT SUITE 10.0 Installation Manual Getting Started D12786 Rev.16 This document is not to be reproduced in whole or in part without permission in writing from: Contents INTRODUCTION 3 REQUIREMENTS
Movie Cube User s Guide to Wireless Function Table of Contents 1. WLAN USB Adapter Connection...3 2. Wireless Setup...4 2.1 Infrastructure (AP)...5 2.2 Peer to Peer (Ad Hoc)...7 2.3 Settings for PC...8
CHARON-VAX application note AN-33 Required Windows Standard Services Author: Software Resources International Date: 16-Jan-2006 Software Resources International (SRI) recommends the use of the host operating
2X SecureRemoteDesktop Version 1.1 Website: www.2x.com Email: firstname.lastname@example.org Information in this document is subject to change without notice. Companies, names, and data used in examples herein are fictitious
WINDOWS 7 & HOMEGROUP SHARING WITH WINDOWS XP, WINDOWS VISTA & OTHER OPERATING SYSTEMS Abstract The purpose of this white paper is to explain how your computers that are running previous versions of Windows
1-bay NAS User Guide INDEX Index... 1 Log in... 2 Basic - Quick Setup... 3 Wizard... 3 Add User... 6 Add Group... 7 Add Share... 9 Control Panel... 11 Control Panel - User and groups... 12 Group Management...
Requirements:! A computer dedicated to FTP server only! Linksys router! TCP/IP internet connection Steps: Getting Started Configure Static IP on the FTP Server Computer: Setting Up Your FTP Server 1. This
About Microsoft Windows Server 003 Windows Server 003 (WinK3) requires extensive provisioning to meet both industry best practices and regulatory compliance. By default the Windows Server operating system
This document was grafted together from various Web and other sources by Thomas Jerry Scott for use in his Web and other Security courses. Jerry hopes you find this information helpful in your quest to
Windows Domain Network Configuration Guide Windows Domain Network Configuration Guide for CCC Pathways Copyright 2008 by CCC Information Services Inc. All rights reserved. No part of this publication may
NTFS PERMISSIONS AND SECURITY SETTING.1 Introduction to NTFS Permissions.1.1 File Permissions and Folder Permission.2 Assigning NTFS Permissions and Special Permission.2.1 Planning NTFS Permissions.2.2
MCSE TestPrep: Windows NT Server 4, Second Edition - CH 3 - Managing Resources Page 1 of 36 [Figures are not included in this sample chapter] MCSE TestPrep: Windows NT Server 4, Second Edition - 3 - Managing
Setup and Configuration Guide for Pathways Mobile Estimating Setup and Configuration Guide for Pathways Mobile Estimating Copyright 2008 by CCC Information Services Inc. All rights reserved. No part of
Network Setup Instructions This document provides technical details for setting up the Elite Salon & Spa Management program in a network environment. If you have any questions, please contact our Technical
Hosting Users Guide 2011 eofficemgr technology support for small business Celebrating a decade of providing innovative cloud computing services to small business. Table of Contents Overview... 3 Configure
Passwordstate Installation Instructions This document and the information controlled therein is the property of Click Studios. It must not be reproduced in whole/part, or otherwise disclosed, without prior
OPC Server Machine Configuration General Information For remote OPC Server operation, server must be running under Windows XP Pro, Windows Server 2003, Windows Vista (Business & Ultimate), Windows 7 (Professional
Operating System Troubleshooting File and Printer Sharing in Microsoft Windows XP Microsoft Corporation Published: November 2003 Updated: August 2004 Abstract File and printer sharing for Microsoft Windows
Symantec PGP Whole Disk Encryption Hands-On Lab V 3.7 Description This hands-on lab session covers the hard drive encryption technologies from PGP. Students will administer a typical Whole Disk Encryption
McAfee.com Personal Firewall 1 Table of Contents Table of Contents...2 Installing Personal Firewall...3 Configuring Personal Firewall and Completing the Installation...3 Configuring Personal Firewall...
Tufts VPN Client User Guide for Windows Introduction The Tufts Virtual Private Network (VPN) implementation is a service that is provided to the faculty and staff of Tufts University to enable secure access
StruxureWare Power Monitoring 7.0.1 Installation Guide 7EN02-0308-01 07/2012 Contents Safety information 5 Introduction 7 Summary of topics in this guide 7 Supported operating systems and SQL Server editions
Preface p. xvii Introduction p. 1 Approach to the Book p. 2 At Least Three Ways to Do It p. 2 Where to Find the Tools p. 3 Running Tools with Alternate Credentials p. 3 A Brief Word on Windows Scripting
Senior Systems Cloud Services In this guide... Senior Systems Cloud Services 1 Cloud Services User Guide 2 Working In Your Cloud Environment 3 Cloud Profile Management Tool 6 How To Save Files 8 How To
Password Manager Windows Desktop Client EmpowerID provides an extension that allows organizations to plug into Password Manager to customize the Windows logon experience beyond that supplied by the standard
MicroPress Server Configuration Guide for Remote Applications Date Issued: February 3, 2009 Document Number: 45082597 TrueEdit Remote Connection Brief Background TrueEdit Remote (TER) is actually the same
Quick Scan Features Setup Guide XE3024EN0-2 This guide includes instructions for: Scan to E-mail Setup on page 1 Scan to Mailbox Setup on page 6 Network Scanning Setup on page 9 Scan to PC Setup on page
Question Number (ID) : 1 (wmpmsp_mngnwi-121) You are an administrator for an organization that provides Internet connectivity to users from the corporate network. Several users complain that they cannot
Core Protection for Virtual Machines 1 Comprehensive Threat Protection for Virtual Environments. Installation Guide e Endpoint Security Trend Micro Incorporated reserves the right to make changes to this
Introduction EASYLABEL 6 has several new features for saving the history of label formats. This history can include information about when label formats were edited and printed. In order to save this history,
Windows XP Presentation By Bill Ball Windows XP is built on the foundation that was used for Windows NT and Windows 2000. Anyone will tell you that NT and 2000 is more stable than other versions of Windows.
Desktop Surveillance Help Table of Contents About... 9 What s New... 10 System Requirements... 11 Updating from Desktop Surveillance 2.6 to Desktop Surveillance 3.2... 13 Program Structure... 14 Getting
VPN Hello and welcome. In the VPN section we will cover the steps for enabling the VPN feature on the Allworx server and how to set up a VPN connection to the Allworx System from your PC. Page 1 VPN The
Getting Started Symantec Client Security About Security Security provides scalable, cross-platform firewall, intrusion prevention, and antivirus protection for workstations and antivirus protection for
Jetico Central Manager Administrator Guide Introduction Deployment, updating and control of client software can be a time consuming and expensive task for companies and organizations because of the number
Course: WIN310 Student Lab Setup Guide Microsoft Windows Server 2003 Network Infrastructure (70-291) ISBN: 0-470-06887-6 STUDENT COMPUTER SETUP Hardware Requirements All hardware must be on the Microsoft
Using Logon Agent for Transparent User Identification Websense Logon Agent (also called Authentication Server) identifies users in real time, as they log on to domains. Logon Agent works with the Websense
QBalance.com We make QuickBooks work for you CPA Call Toll-Free: (800) 216-0763 Congratulations! You are using the best accounting software available! But: you may be one of the 75% of all QuickBooks installations
Sophos Enterprise Console Help Product version: 5.1 Document date: June 2012 Contents 1 About Enterprise Console...3 2 Guide to the Enterprise Console interface...4 3 Getting started with Sophos Enterprise
Network Sharing Ver.3.0. * Firmware How to set-up Folder Sharing in Windows 7 This instruction is for Window 7 Ultimate. 1. [Start] [Control Panel] - [View network status and tasks in Network and Internet].
WatchGuard Mobile User VPN Guide Mobile User VPN establishes a secure connection between an unsecured remote host and a protected network over an unsecured network using Internet Protocol Security (IPSec).
TROUBLESHOOTING INFORMATION VinNOW Support does not support Microsoft products to include SQL Server,.NET Framework, and also cannot assist with Windows User issues, Network or VPN issues. If installing
FileMaker Server 13 Getting Started Guide 2007 2013 FileMaker, Inc. All Rights Reserved. FileMaker, Inc. 5201 Patrick Henry Drive Santa Clara, California 95054 FileMaker and Bento are trademarks of FileMaker,
High Availability for Internet Information Server Using Double-Take 4.x High Availability for Internet Information Server Using Double-Take 4.x published December 2002 NSI and Double-Take are registered
GP Reports Viewer Dynamics GP Reporting Made Easy GP REPORTS VIEWER USER GUIDE For Dynamics GP Version 2015 (Build 5) Dynamics GP Version 2013 (Build 14) Dynamics GP Version 2010 (Build 65) Last updated
Airtel PC Secure Trouble Shooting Guide Table of Contents Questions before installing the software Q: What is required from my PC to be able to use the Airtel PC Secure? Q: Which operating systems does
Network Connect Installation and Usage Guide I. Installing the Network Connect Client..2 II. Launching Network Connect from the Desktop.. 9 III. Launching Network Connect Pre-Windows Login 11 IV. Installing
WEBCONNECT INSTALLATION GUIDE Version 1.96 Copyright 1981-2015 Netop Business Solutions A/S. All Rights Reserved. Portions used under license from third parties. Please send any comments to: Netop Business
WatchGuard SSL v3.2 Release Notes Supported Devices SSL 100 and 560 WatchGuard SSL OS Build 355419 Revision Date January 28, 2013 Introduction WatchGuard is pleased to announce the release of WatchGuard
Quick Install Guide 1. Installation Overview Thank you for selecting Bitdefender Business Solutions to protect your business. This document enables you to quickly get started with the installation of Bitdefender
FortKnox Personal Firewall User Manual Document version 1.4 EN ( 15. 9. 2009 ) Copyright (c) 2007-2009 NETGATE Technologies s.r.o. All rights reserved. This product uses compression library zlib Copyright
User Manual Onsight Management Suite Version 5.1 Another Innovation by Librestream Doc #: 400075-06 May 2012 Information in this document is subject to change without notice. Reproduction in any manner
Metalogix SharePoint Backup Publication Date: August 24, 2015 All Rights Reserved. This software is protected by copyright law and international treaties. Unauthorized reproduction or distribution of this
How do I resolve issues with a Client not connecting to the Best Practice server instance? This FAQ is intended to answer common questions about resolving issues with a Best Practice client not connecting
Network Scanner Tool R3.1 User s Guide Version 3.0.04 Copyright 2000-2004 by Sharp Corporation. All rights reserved. Reproduction, adaptation or translation without prior written permission is prohibited,
Resolving H202 Errors (INTERNAL) Contents Scope and audience.......3 General H202 Error Information...... 3 System Recommendations....4 QuickBooks Multi User Mode - QuickBooks Over a Network......4 QuickBooks