Access 2003 Macro Security Levels, Sandbox Mode, and Digitally Signed Files

Size: px
Start display at page:

Download "Access 2003 Macro Security Levels, Sandbox Mode, and Digitally Signed Files"

Transcription

1 Access 2003 Macro Security Levels, Sandbox Mode, and Digitally Signed Files Tim Gordon Programming Plus (816) About dangerous code Dangerous code can consist of powerful commands that may exist in an Access file you open in its objects (such as queries, forms, reports, and macros), and also in its Microsoft Visual Basic for Applications (VBA) modules. You can prevent some potentially dangerous code from running by running Access in sandbox mode, which is strongly recommended. How the macro security level works Access features three different macro security levels that control what happens when you first try to open a database file, and what can then happen while you have that database open. These levels are High, Medium, and Low: At the High macro security level, Access prevents you from opening any file unless it is digitally signed. At the Medium macro security level, Access prompts you with a message when you first open a file. This message warns you that the file could contain code that might damage your computer or data, and gives you the choice of either opening the file or not. The file may or may not have a digital signature. If you decide not to open the file, you can choose to scan it for viruses, check with the originator of the file (that is, the person or company that created or changed it) to verify that it is safe, and then open it later. At the Low macro security level, Access allows you to open any database file without being prompted. It is strongly recommended that you never use the Low macro security level. The macro security level for each Microsoft Office program is independent of all other Office programs. So, for example, if you set the macro security level to Medium in Access and the macro security level is already set to High in Microsoft Word, the security level for Word won't change. Depending on your work environment, you will choose one of the three macro security levels for yourself. In Access, it is recommended that you choose High. If you need to work with unsigned files from other sources, you can use the Medium macro security level to do that; however, you should always examine such files and sources carefully before choosing to enable any macros, and change back to High when you no longer need to use the Medium level. If you use only your own files in Access, you should self sign your own files and use the High macro security level.

2 What to do if you don't see the Security command To change your macro security level in Access, you'll need to use the Security command (Tools menu, Macro submenu). However, this and other commands may have been made unavailable by your organization's Office administrator. Note You may want to check with your Office administrator before attempting this procedure. Certain commands, such as the ability to change macro security levels, may have been made unavailable as part of your organization's security policy. To make the Security command available 1. On the Tools menu, click Customize, and then click the Commands tab. 2. Click Rearrange Commands, click Menu Bar, and then in the Menu Bar box, click Tools Macro. 3. Under Controls, click the Add button. The Add Command dialog box appears. 4. In the Categories list, click Tools. 5. In the Commands list, click Security, and then click OK. The Security command now appears in the Controls list. 6. Use the Move Up and Move Down buttons to position the Security command where you want. 7. Click Close twice. Access sandbox mode For an additional layer of safety while working in Access, you can run the program in sandbox mode. What is sandbox mode? Simply put, running in sandbox mode helps ensure that any potentially dangerous commands that could be run from an Access expression will be blocked. Access is "playing safely in a sandbox," so to speak, and is not being allowed to hurt anything outside its domain. How sandbox mode protects your computer In Access, it's possible to run dangerous VBA code in expressions strings of instructions that Access can use to perform operations on your database. These expressions can include commands and properties that could delete files, change file attributes, start other programs, change Access settings, or change environment settings (for example, the PATH statement) on your computer. Running Access in sandbox mode helps prevent dangerous code from being run in expressions. Important Code in a module or macro cannot be disabled by sandbox mode. To prevent macros or VBA code from being run in Access or to safely remove such code from your database altogether, you can do one or both of the following: Remove the macros or the modules that contain the code, or disconnect the modules that contain code connected to the database objects. Take care to ensure that you don't inadvertently remove functionality from your forms, reports, and other database objects. Functions and properties that are blocked in sandbox mode and

3 How do you identify and fix functions and properties that are blocked in sandbox mode so that your database continues to function properly? If you have Microsoft Office Access 2003 Developer Extensions installed, you can use the Custom Startup Wizard to search for all the expressions that are blocked in sandbox mode. The Custom Startup Wizard helps you create new databases with custom startup options based on a development database, but it also provides an option to find the expressions that are blocked in sandbox mode. For more information on how to identify and fix unsafe expressions, see: Frequently asked questions about Access security warnings, Question 19 Access 2003 Developer Extensions are part of the new Visual Studio Tools for the Microsoft Office System software package. Visual Studio Tools for the Microsoft Office System Visual Studio Tools for the Microsoft Office System Version Upgrade $199 US Estimated Price $499 US The Jet 4.0 Service Pack 8 update To run Access in sandbox mode, you must first install the Service Pack 8 (SP8) update for Microsoft Jet 4.0 a program that Access uses behind the scenes for many of its operations, such as running queries and updates. At any time, go to Microsoft.com, click Windows Update in the left column, and then install all high-priority and critical Windows updates. Before you do this, you first may be able to determine if the Jet 4.0 SP8 update has already been installed on your computer by looking in the Add or Remove Programs section of Control Panel. If you have installed the Service Pack 2 (SP2) update for Windows XP, at the top of the Add or Remove Programs window, make sure that the Show updates check box is selected. If you find the Windows Hotfix KB or KB829558, the Jet 4.0 SP8 update has been installed. You should still install all critical and high-priority Windows updates, however. Important This update to the Jet engine is a vital part of security in Access and should be installed for every computer that runs Access. In fact, it's part of the Windows critical updates. Note In order to install the Jet 4.0 SP8 update, you must have Administrators permissions on your computer. See your Office administrator for more details. What happens if you enable sandbox mode without installing the latest Jet service pack? Under these circumstances, several Access features will not work properly. These features were not installed or are not enabled because the latest version of the Jet service pack is required for Access to be in sandbox mode, yet retain its full functionality. The following is a list of things that might not work properly if you enable sandbox mode before installing the latest Jet service pack: Wizards may not start. Switchboards created by using the Switchboard Manager won't function properly. You can't use the RunCode macro action to call a Visual Basic for Applications (VBA) procedure. Event handlers that call VBA procedures won't function. VBA procedures that are called from a property sheet or used in an SQL statement won't function. The following VBA functions won't work when called from a property sheet or used in an SQL statement: FormatCurrency FormatDateTime FormatNumber FormatPercent InStrB InStrRev MonthName Replace StrReverse WeekDayName

4 After you have installed the Jet update When you start Access for the first time after installing the Jet 4.0 SP8 update, and Access is set to either the Medium or High macro security level, you will see the message shown above. What does this message mean? Simple click Yes to block unsafe expressions and run Access in sandbox mode. Assuming that you are running Access at the High or Medium macro security level, you're all set and you should not see any more messages about sandbox mode, unless you change the macro security level and then explicitly choose to allow blocked expressions. If your macro security level is set to Low, you won't be prompted about blocking unsafe expressions when you start Access for the first time after installing the Jet update. Only when you change the macro security level to Medium or High will you see the message shown above. Change your macro security level to Medium or High, and then click Yes to block unsafe expressions. You've probably noticed that this message does not actually mention "sandbox mode" at all, but it is important to understand that choosing to block unsafe expressions is sandbox mode. By clicking Yes, you are choosing to block unsafe expressions and therefore to run Access in sandbox mode. To turn off sandbox mode which is strongly discouraged you would have to change the macro security level to Medium or High, and then click No when you are prompted whether you want to block unsafe expressions. About digital signatures and trusted publishers Digital signatures can be issued by a "certificate authority." A certificate authority is a third-party organization, such as Verisign, Inc., that issues certificates that are used to digitally sign files. You can also create digital certificates yourself for your own use, or for use within a small, closely trusted group. These are called "self-signed certificates."

5 When you explicitly trust a particular signer of files, you can add that person or company to your computer as a "trusted publisher" someone who is known by you or by your company to be reputable. Although an entity (such as a software company or a consultant) may have a digital certificate from a certificate authority, that certificate means nothing until you decide to do one of the following: Open the file (Medium macro security level). or Add the owner of that certificate to the list of trusted publishers on your computer (High or Medium macro security level). What it comes down to is this: Whether to trust the publisher is ultimately up to you. How digital signatures and the macro security level work together Access displays this warning message when you open a digitally signed file at the Medium macro security level. Access displays this security warning when you open an unsigned file at the High macro security level. There are two major factors to consider in whether to accept a digitally signed file: the macro security level setting in Access, and what actions you will take when you open the file. At the Medium macro security level, when you open a digitally signed file for the first time, either you can open that file right away (by clicking Open), or you can permanently add its signer to your list of trusted publishers. If you add its signer as a trusted publisher, Access will treat any other files with that same digital signature as coming from a trusted entity. At the High macro security level, things are buttoned down a bit more tightly. To be opened, any file must be digitally signed (no exceptions), and you must accept the digital signature and permanently add its signer to your list of trusted publishers. As with the Medium macro security level, any other files with that same digital signature will then be treated as coming from a trusted entity. In Access, unlike most other Office programs, it simply isn't possible to open a file that has no digital signature at its highest (High) macro security level. Conversely, at the highest macro security level (Very High) in Microsoft Excel and Word, you can open a file but all macros will be disabled. At the Medium macro security level (Word and Excel), you can choose to enable or disable macros while opening your file. In Access, there is no option to open a file and disable macros Access macros are fundamentally different in their nature from Word or Excel macros. You can verify the authenticity of a digital signature by inspecting its certificate through your Web browser.

6 The safer, the better In general, when you receive a digitally signed file from a trusted entity, you can feel reasonably confident the file is safe. This is primarily due to two things: To digitally sign a file, you must have what is known as the "private key" for the signature the private key allows you to add its unique signature to a file. Thus, if someone without the private key changes a signed file by making potentially dangerous changes, such as adding or altering code, macros, or expressions, the digital signature will become invalid and will be removed from the file. Caution At the Medium macro security level in Access, when you open a digitally signed file that has lost its signature, the standard security warning message for the Medium level will be displayed (see the picture above), as if the file had never been signed at all. Remember to exercise great care when you consider opening any file that's not signed. At the High macro security level, you simply won't be able to open the file because it no longer has a signature. Before you open a file that has lost its signature, you should exercise extreme caution: You can run a virus scan, notify the publisher that the signature for the file is no longer valid, or retrieve a backup version of the file. It's then up to you whether to open the file. If you do decide to open the file, you should examine all objects and VBA modules, macros, or expressions for any suspicious code. In summary, at the Medium and High macro security levels, when you open a file that has a digital signature from a trusted publisher, you won't be prompted with any security warnings. If you do see a warning, this indicates the file may have been changed by an unauthorized party or corrupted. It's often said that no one is an island. It is recommended that you operate at the High macro security level. If you need to work with unsigned files from other sources, you can use the Medium macro security level to do that; however, you should always examine such files and sources carefully before choosing to enable any macros, and change back to High when you no longer need to use the Medium macro security level. At the Medium macro security level, when you open a file with a signature that you have not yet added as a trusted publisher, the warning message from Access should cause you to think about which files you can trust. Do you feel completely secure? You shouldn t. That's because there's no such thing as absolute security. Nonetheless, using common sense, running antivirus software, choosing strong security options, and working with digitally signed files should greatly decrease the chance that you'll suffer from a catastrophic security breach. Quick Reference: Introduction to security Avoid viruses You need to develop and stick to a plan for keeping viruses out of your computer: Install and run antivirus software. Understand how your antivirus software works. Screen all suspicious-looking files save them before opening them, and scan them by using your antivirus software.

7 Know from whom you get your database files. Keep your antivirus software up to date. Set the macro security level that's right for you Avoid using the Low macro security level. It is recommended that you use the High macro security level. If you need to work with unsigned files from other sources, you can use the Medium security level to do that; however, you should always examine such files and sources carefully before choosing to enable any macros, and change back to High when you no longer need to use Medium. Depending on your macro security level setting, you may or may not be prompted with a security warning message when you open files. Using the High macro security level means that you can open only digitally signed files. Set the macro security level by pointing to Macro on the Tools menu, clicking Security, and then clicking an option on the Security Level tab. Can't find the Security command on the Macro submenu? Perform the procedure in the next section, "Make the Security command available on the Macro submenu." You can change the setting of the macro security level and have it take effect on any subsequent file that you open in Microsoft Access. Depending on whether Access is currently configured to block unsafe expressions (that is, whether it's in sandbox mode), you may be alerted that you need to exit and restart Access for the new security setting to take effect. Make the Security command available on the Macro submenu Note You may want to check with your Office administrator before attempting this procedure. Certain commands, such as the ability to change macro security levels, may have been made unavailable as part of your organization's security policy. 1. On the Tools menu, point to Macro, and then look for the Security command. If you see the Security command on the Macro submenu, you're all set. If you don't see the Security command on the Macro submenu, continue with this procedure. 2. On the Tools menu, click Customize, and then click the Commands tab. 3. Click Rearrange Commands, click Menu Bar, and then in the Menu Bar box, click Tools Macro. 4. Under Controls, click the Add button. The Add Command dialog box appears. 5. In the Categories list, click Tools. 6. In the Commands list, click Security, and then click OK. The Security command now appears in the Controls list. 7. Use the Move Up and Move Down buttons to position the Security command where you want. 8. Click Close twice. Understand and use digital certificates Check with your Office administrator on your company's policies about using digital signatures. Find out if your organization creates its own digital signatures. Are you allowed to self-sign your own files or the files for your workgroup? Check with your Office manager to find out which publishers you should trust. Just because a file is digitally signed doesn't mean it's safe. Verify the origin of your files yourself for trustworthiness, and scan them by using an antivirus program. Check a digital certificate Using Microsoft Internet Explorer 6.0 or later

8 1. In Internet Explorer, on the Tools menu, click Internet Options and then click the Content tab. 2. Next, click Certificates. If you can find your publisher in a list on the Intermediate Certification Authorities tab or Trusted Root Certification Authorities tab, that publisher has been validated by a certificate authority. If your publisher shows up only in a list on the Personal tab or Other People tab, the certificate is merely self-signed and you should question its origin. Using Netscape In Netscape, on the Edit menu, click Preferences. 2. In the Preferences dialog box, double-click Privacy & Security, and then click Certificates. 3. Click Manage Certificates. You may want to seriously question the credentials of your publisher if it appears anywhere but in the box on the Authorities tab. Set up digital certificate revocation checking Digital signatures expire or get revoked. It's a good practice every now and then to verify that a publisher's digital certificate has not been revoked by its certification authority. You can set up revocation checking in Internet Explorer 6.0 or later and in Netscape 7.1. Using Internet Explorer 6.0 or later 1. In Internet Explorer, on the Tools menu, click Internet Options, and then click the Advanced tab. 2. In the Settings list, scroll down to the Security section, and then select the Check for publisher's certificate revocation check box. Using Netscape In Netscape, on the Edit menu, click Preferences. 2. In the Preferences dialog box, double-click Privacy & Security, and then click Validation. Learn about certification authorities Certification authorities are independent commercial bodies that issue digital certificates. Create your own digital certificates When you run Access at the High macro security level, you can create a digital certificate for yourself so that files you create will be trusted. Macro security settings Here's a table to show how the various macro security settings work in Access. Macro security level If the origin of the file is a trusted publisher... And the file is digitally signed... Access will: High Yes Yes Open the file without prompting you. No Yes Inform you that the file is digitally signed. Access will allow you to open the file if you add its signer to your computer as a trusted publisher. No No Not allow you to open the file. Medium Yes Yes Open the file without prompting you. No Yes Inform you that the file is digitally signed, and give you the opportunity to open it or install its certificate. When you install the certificate, you can also add its signer as a trusted publisher.

9 No No Warn you that the file is not signed and that it could contain dangerous code, but allow you to open the file anyway. Low Yes or No Yes or No Allow you to open any file, whether it is digitally signed or not. Install the Microsoft Jet 4.0 Service Pack 8 update and run Access in sandbox mode Important You should install this Microsoft Windows update as soon as you can. If you have not installed the update and your macro security level is set to Low, any time you open a file in Microsoft Office Access 2003, you will be prompted to install the update. To install the update, go to Microsoft.com, click Windows Update, and then choose to install all high-priority and critical updates the Jet 4.0 Service Pack 8 (SP8) update may be available on its own or as part of any number of "rolup" updates. Any time you are prompted with a message asking if you want to block unsafe expressions, click Yes to run Access in sandbox mode. Not sure about warning messages? If you have completed the installation of the Jet 4.0 SP8 update and you are concerned about messages that mention sandbox mode or the update, keep the following in mind: If a message box asks if you want to block unsafe expressions, the Jet 4.0 SP8 update has been successfully installed, and you are ready to run Access in sandbox mode. You can safely ignore any message such as "Microsoft Jet 4.0 Service Pack 8 or later must be installed to block unsafe expressions without affecting common functionality" that message is purely informational and does not mean that you need to reinstall the Jet 4.0 SP8 update. Quick Reference: Sign your own macros for stronger security Summary of macro security levels Macro security level Trust all installed add-ins and templates check box Digitally signed From trusted sources Microsoft Excel, Microsoft PowerPoint, and Microsoft Word will: Very High Cleared Yes or No Yes or No Disable the add-in or macro. Remember: All macros, COM add-ins, and smart tag.dll files will be disabled. This may interfere with some processes in Microsoft Office. High Cleared Yes Yes Run the add-in or macro silently. Yes No Open the Security Warning dialog box so that you can choose to enable or disable macros. No n/a Disable add-ins or macros. Medium Cleared Yes Yes Run the add-in or macro silently. Yes No Open the Security Warning dialog box so that you can choose to enable or disable macros. No n/a Open the Security Warning dialog box so that you can choose to enable or disable macros. Low Cleared Yes or No Yes or No Run the add-in or macro silently. Very High, High, Medium, or Low Selected Yes or No Yes or No Run all add-ins silently. Macros will be run silently if they're in the User Templates folder, Workgroup Templates folder, or Startup folder. Other macros will be picked up according to the security

10 settings previously described. Note Microsoft Access does not have a Very High macro security level. Set the macro security level In Access, Excel, PowerPoint, and Word: 1. On the Tools menu, point to Macro, and then click Security. 2. In the Security dialog box, click the Security Level tab. Make sure that the macro security level is set to High; if it's not, consider changing it now. 3. Click OK. Install Digital Certificate for VBA projects (SelfCert.exe) 1. On the taskbar, click the Start button, and then click Control Panel. 2. Click Add or Remove Programs. (If you use Category View in Control Panel, you'll have to click Add or Remove Programs again.) 3. Make sure that Change or Remove Programs is selected on the left, and then scroll down t he page and click Microsoft Office Professional Edition Click the Change button. 4. In Microsoft Office 2003 Setup, make sure the Add or Remove Features is selected; then click Next. Select the Choose advanced customization of applications check box; then click Next. 5. Click the plus sign next to Office Shared Features, click the arrow next to Digital Certificate for VBA projects (SelfCert.exe), and then click Run from My Computer. 6. Click Update. When the installation is finished, click OK. Create a self-signed digital certificate 1. On the taskbar, click the Start button, point to All Programs, point to Microsoft Office, point to Microsoft Office Tools, and then click Digital Certificate for VBA Projects. 2. In the Create Digital Certificate dialog box, type a unique name in the Your certificate's name box, and then click OK. 3. You'll see a success message. Click OK. Sign a macro with a digital signature In Access, Excel, PowerPoint, and Word: 1. On the Tools menu, point to Macro, and then click Visual Basic Editor. 2. Open the module that contains your macro. Review your code. It's always a good idea to review your code before signing it. 3. In the Visual Basic Editor, on the Tools menu, click Digital Signature. 4. In the Digital Signature dialog box, click Choose, click the certificate you wish to use, and then click OK. 5. Click OK, and then, on the File menu, return to the program. Remember, you'll have to add the certificate to your list of trusted publishers the first time that you try to use it. This process will sign all the macros in the file. Digital certificates in a workgroup There is no way to share the private key of a self-signed certificate created by using the SelfCert.exe file, so other people in your workgroup will not be able to run or use your macros at the High macro security level. If you do want this functionality, you must create a certificate by using the MakeCert.exe file instead of the SelfCert.exe file. Warning Sharing macros even within a group of trusted work colleagues can still be a security risk. It's important to use the same security procedures in a network that you would use with external sources. Remember, networks share viruses too.

11 References: Introduction to security Sign your own macros for stronger security Security in Office Functions and properties that are blocked in sandbox mode and Frequently asked questions about Access security warnings Visual Studio Tools for the Microsoft Office System Anti-Virus Resources for Microsoft Office Let Office XP check for revoked certificates TechNet Security Create your own digital certificate Add a digital signature to a file or a VBA project Microsoft Windows Update Public/Private Key Pairs Certificate Creation Tool (Makecert.exe) US/CPTOOLS/HTML/CPGRFCERTIFICATECREATIONTOOLMAKECERTEXE.ASP MakeCert Using MakeCert URITY/USING_MAKECERT.ASP Microsoft Security Home Page

Instructions to operating forms created in MSWord and Excel

Instructions to operating forms created in MSWord and Excel Instructions to operating forms created in MSWord and Excel Forms created in MSWord and Excel can contain macros. In order for the form to work correctly, your MSWord/Excel security level must be set at

More information

SUMMARY Moderate-High: Requires Visual Basic For Applications (VBA) skills, network file services skills and interoperability skills.

SUMMARY Moderate-High: Requires Visual Basic For Applications (VBA) skills, network file services skills and interoperability skills. Author: Sanjay Sansanwal Title: Configuring FileCM Extensions for Word The information in this article applies to: o FileCM 2.6, 3.0, 3.5, 3.5.1, 3.5.2, 4.0, 4.2 o Microsoft Windows 2000 Professional,

More information

Microsoft Office 2000 and Security Against Macro Viruses

Microsoft Office 2000 and Security Against Macro Viruses Microsoft Office 2000 and Security Against Macro Viruses A White Paper by Darren Chi Symantec AntiVirus Research Center Symantec Corporation Microsoft Office 2000 and Security Against Macro Viruses 1 Contents

More information

Spector 360 Deployment Guide. Version 7.3 January 3, 2012

Spector 360 Deployment Guide. Version 7.3 January 3, 2012 Spector 360 Deployment Guide Version 7.3 January 3, 2012 Table of Contents Deploy to All Computers... 48 Step 1: Deploy the Servers... 5 Recorder Requirements... 52 Requirements... 5 Control Center Server

More information

How to connect to VUWiFi

How to connect to VUWiFi Wireless Registration Instructions Windows XP How to connect to VUWiFi 1. The first step in setting up your wireless card for VUWiFi is to open your Network Connections window. You can find this by going

More information

How to Configure Windows Firewall on a Single Computer

How to Configure Windows Firewall on a Single Computer Security How to Configure Windows Firewall on a Single Computer Introduction Windows Firewall is a new feature of Microsoft Windows XP Service Pack 2 (SP2) that is turned on by default. It monitors and

More information

TROUBLESHOOTING GUIDE

TROUBLESHOOTING GUIDE Lepide Software LepideAuditor Suite TROUBLESHOOTING GUIDE This document explains the troubleshooting of the common issues that may appear while using LepideAuditor Suite. Copyright LepideAuditor Suite,

More information

How to Install and use Windows XP Mode and Windows Virtual PC in Windows 7 for older 32 bit only Applications

How to Install and use Windows XP Mode and Windows Virtual PC in Windows 7 for older 32 bit only Applications How to Install and use Windows XP Mode and Windows Virtual PC in Windows 7 for older 32 bit only Applications Important Applies to Windows 7 Professional, Ultimate, Enterprise As of April 8, 2014, technical

More information

Sophos Anti-Virus for NetApp Storage Systems startup guide

Sophos Anti-Virus for NetApp Storage Systems startup guide Sophos Anti-Virus for NetApp Storage Systems startup guide Runs on Windows 2000 and later Product version: 1 Document date: April 2012 Contents 1 About this guide...3 2 About Sophos Anti-Virus for NetApp

More information

How To Create An Easybelle History Database On A Microsoft Powerbook 2.5.2 (Windows)

How To Create An Easybelle History Database On A Microsoft Powerbook 2.5.2 (Windows) Introduction EASYLABEL 6 has several new features for saving the history of label formats. This history can include information about when label formats were edited and printed. In order to save this history,

More information

Installing GFI MailSecurity

Installing GFI MailSecurity Installing GFI MailSecurity Introduction This chapter explains how to install and configure GFI MailSecurity. You can install GFI MailSecurity directly on your mail server or you can choose to install

More information

Step-by-Step Guide to Securing Windows XP Professional with Service Pack 2 in Small and Medium Businesses

Step-by-Step Guide to Securing Windows XP Professional with Service Pack 2 in Small and Medium Businesses Step-by-Step Guide to Securing Windows XP Professional with Service Pack 2 in Small and Medium Businesses 2004 Microsoft Corporation. All rights reserved. This document is for informational purposes only.

More information

Creating Digital Signatures

Creating Digital Signatures About Security You can secure a PDF using any of the following security methods: Add passwords and set security options to restrict opening, editing, and printing PDFs. Encrypt a document so that only

More information

ms-help://ms.technet.2005mar.1033/security/tnoffline/security/smbiz/winxp/fwgrppol...

ms-help://ms.technet.2005mar.1033/security/tnoffline/security/smbiz/winxp/fwgrppol... Page 1 of 16 Security How to Configure Windows Firewall in a Small Business Environment using Group Policy Introduction This document explains how to configure the features of Windows Firewall on computers

More information

Installing GFI MailSecurity

Installing GFI MailSecurity Installing GFI MailSecurity Introduction This chapter explains how to install and configure GFI MailSecurity. You can install GFI MailSecurity directly on your mail server or you can choose to install

More information

Setting Up SSL on IIS6 for MEGA Advisor

Setting Up SSL on IIS6 for MEGA Advisor Setting Up SSL on IIS6 for MEGA Advisor Revised: July 5, 2012 Created: February 1, 2008 Author: Melinda BODROGI CONTENTS Contents... 2 Principle... 3 Requirements... 4 Install the certification authority

More information

Setting up VPN and Remote Desktop for Home Use

Setting up VPN and Remote Desktop for Home Use Setting up VPN and Remote Desktop for Home Use Contents I. Prepare Your Work Computer... 1 II. Prepare Your Home Computer... 2 III. Run the VPN Client... 3 IV. Remote Connect to Your Work Computer... 4

More information

dobe Acrobat XI Pro Digital Signatures

dobe Acrobat XI Pro Digital Signatures dobe Acrobat XI Pro Digital Signatures Intermediate Adobe Acrobat XI Pro is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License. To view a copy of this

More information

Release Notes for Websense Email Security v7.2

Release Notes for Websense Email Security v7.2 Release Notes for Websense Email Security v7.2 Websense Email Security version 7.2 is a feature release that includes support for Windows Server 2008 as well as support for Microsoft SQL Server 2008. Version

More information

Team Foundation Server 2010, Visual Studio Ultimate 2010, Team Build 2010, & Lab Management Beta 2 Installation Guide

Team Foundation Server 2010, Visual Studio Ultimate 2010, Team Build 2010, & Lab Management Beta 2 Installation Guide Page 1 of 243 Team Foundation Server 2010, Visual Studio Ultimate 2010, Team Build 2010, & Lab Management Beta 2 Installation Guide (This is an alpha version of Benjamin Day Consulting, Inc. s installation

More information

Sophos Anti-Virus for NetApp Storage Systems user guide. Product version: 3.0

Sophos Anti-Virus for NetApp Storage Systems user guide. Product version: 3.0 Sophos Anti-Virus for NetApp Storage Systems user guide Product version: 3.0 Document date: May 2014 Contents 1 About this guide...3 2 About Sophos Anti-Virus for NetApp Storage Systems...4 3 System requirements...5

More information

Quickstart Guide. First Edition, Published September 2009. Remote Administrator / NOD32 Antivirus 4 Business Edition

Quickstart Guide. First Edition, Published September 2009. Remote Administrator / NOD32 Antivirus 4 Business Edition Quickstart Guide First Edition, Published September 2009 Remote Administrator / NOD32 Antivirus 4 Business Edition Contents Getting started...1 Software components...1 Section 1: Purchasing and downloading

More information

Upgrade Guide BES12. Version 12.1

Upgrade Guide BES12. Version 12.1 Upgrade Guide BES12 Version 12.1 Published: 2015-02-25 SWD-20150413111718083 Contents Supported upgrade environments...4 Upgrading from BES12 version 12.0 to BES12 version 12.1...5 Preupgrade tasks...5

More information

Search help. More on Office.com: images templates

Search help. More on Office.com: images templates Page 1 of 14 Access 2010 Home > Access 2010 Help and How-to > Getting started Search help More on Office.com: images templates Access 2010: database tasks Here are some basic database tasks that you can

More information

enicq 5 System Administrator s Guide

enicq 5 System Administrator s Guide Vermont Oxford Network enicq 5 Documentation enicq 5 System Administrator s Guide Release 2.0 Published November 2014 2014 Vermont Oxford Network. All Rights Reserved. enicq 5 System Administrator s Guide

More information

Juris Installation / Upgrade Guide

Juris Installation / Upgrade Guide Juris Installation / Upgrade Guide Version 2.7 2015 LexisNexis. All rights reserved. Copyright and Trademark LexisNexis, Lexis, and the Knowledge Burst logo are registered trademarks of Reed Elsevier Properties

More information

Migrating MSDE to Microsoft SQL 2008 R2 Express

Migrating MSDE to Microsoft SQL 2008 R2 Express How To Updated: 11/11/2011 2011 Shelby Systems, Inc. All Rights Reserved Other brand and product names are trademarks or registered trademarks of the respective holders. If you are still on MSDE 2000,

More information

Setting up VPN and Remote Desktop for Home Use

Setting up VPN and Remote Desktop for Home Use Setting up VPN and Remote Desktop for Home Use Contents I. Prepare Your Work Computer... 1 II. Prepare Your Home Computer... 2 III. Run the VPN Client... 3-4 IV. Remote Connect to Your Work Computer...

More information

Outlook 2007: Managing your mailbox

Outlook 2007: Managing your mailbox Outlook 2007: Managing your mailbox Find its size and trim it down Use Mailbox Cleanup On the Tools menu, click Mailbox Cleanup. You can do any of the following from this one location: View the size of

More information

How to move a SharePoint Server 2007 32-bit environment to a 64-bit environment on Windows Server 2008.

How to move a SharePoint Server 2007 32-bit environment to a 64-bit environment on Windows Server 2008. 1 How to move a SharePoint Server 2007 32-bit environment to a 64-bit environment on Windows Server 2008. By & Steve Smith, MVP SharePoint Server, MCT Penny Coventry, MVP SharePoint Server, MCT Combined

More information

TSM for Windows Installation Instructions: Download the latest TSM Client Using the following link:

TSM for Windows Installation Instructions: Download the latest TSM Client Using the following link: TSM for Windows Installation Instructions: Download the latest TSM Client Using the following link: ftp://ftp.software.ibm.com/storage/tivoli-storagemanagement/maintenance/client/v6r2/windows/x32/v623/

More information

avast! Endpoint Protection (Plus) and avast! Endpoint Protection Suite (Plus)

avast! Endpoint Protection (Plus) and avast! Endpoint Protection Suite (Plus) avast! Endpoint Protection (Plus) and avast! Endpoint Protection Suite (Plus) Installation Guide 1 2 Introduction to avast! Endpoint Protection The avast! Endpoint Protection range comprises 4 products

More information

Diamond II v2.3 Service Pack 4 Installation Manual

Diamond II v2.3 Service Pack 4 Installation Manual Diamond II v2.3 Service Pack 4 Installation Manual P/N 460987001B ISS 26APR11 Copyright Disclaimer Trademarks and patents Intended use Software license agreement FCC compliance Certification and compliance

More information

Outlook. Getting Started Outlook vs. Outlook Express Setting up a profile Outlook Today screen Navigation Pane

Outlook. Getting Started Outlook vs. Outlook Express Setting up a profile Outlook Today screen Navigation Pane Outlook Getting Started Outlook vs. Outlook Express Setting up a profile Outlook Today screen Navigation Pane Composing & Sending Email Reading & Sending Mail Messages Set message options Organizing Items

More information

Sage Intelligence Financial Reporting for Sage ERP X3 Version 6.5 Installation Guide

Sage Intelligence Financial Reporting for Sage ERP X3 Version 6.5 Installation Guide Sage Intelligence Financial Reporting for Sage ERP X3 Version 6.5 Installation Guide Table of Contents TABLE OF CONTENTS... 3 1.0 INTRODUCTION... 1 1.1 HOW TO USE THIS GUIDE... 1 1.2 TOPIC SUMMARY...

More information

Sophos for Microsoft SharePoint startup guide

Sophos for Microsoft SharePoint startup guide Sophos for Microsoft SharePoint startup guide Product version: 2.0 Document date: March 2011 Contents 1 About this guide...3 2 About Sophos for Microsoft SharePoint...3 3 System requirements...3 4 Planning

More information

Microsoft Office 365 Exchange Online Cloud

Microsoft Office 365 Exchange Online Cloud 5-9-2014 A.Bueter Set up an Exchange connection to your email in Outlook 2010 or Outlook 2013 Note: Outlook 2007 is not supported with Office 365/Exchange Online- only Outlook 2010 & 2013 will work. 1.

More information

Magaya Software Installation Guide

Magaya Software Installation Guide Magaya Software Installation Guide MAGAYA SOFTWARE INSTALLATION GUIDE INTRODUCTION Introduction This installation guide explains the system requirements for installing any Magaya software, the steps to

More information

StruxureWare Power Monitoring 7.0.1

StruxureWare Power Monitoring 7.0.1 StruxureWare Power Monitoring 7.0.1 Installation Guide 7EN02-0308-01 07/2012 Contents Safety information 5 Introduction 7 Summary of topics in this guide 7 Supported operating systems and SQL Server editions

More information

CSOS Certificate Support Guide. Version: 1.1 Published: October 1, 2006 Publisher: CSOS Certification Authority

CSOS Certificate Support Guide. Version: 1.1 Published: October 1, 2006 Publisher: CSOS Certification Authority Version: 1.1 Published: October 1, 2006 Publisher: CSOS Certification Authority Document Revision History Version # Revision Sections Summary of Changes Initials Date Affected 1.0 4/27/2006 All Version

More information

Team Foundation Server 2012 Installation Guide

Team Foundation Server 2012 Installation Guide Team Foundation Server 2012 Installation Guide Page 1 of 143 Team Foundation Server 2012 Installation Guide Benjamin Day [email protected] v1.0.0 November 15, 2012 Team Foundation Server 2012 Installation

More information

Guide for usage of digital signatures in Microsoft Office Documents

Guide for usage of digital signatures in Microsoft Office Documents Guide for usage of digital signatures in Microsoft Office Documents i. Digitally Signing a Microsoft Word Document in 2003: This section demonstrates digitally signing a Microsoft Word document. In order

More information

Sentinel Management Server

Sentinel Management Server Sentinel Management Server Installation, Reinstallation, and Upgrade Guide Server Sentinel 4.4.3 and Higher April 2007 . unisys imagine it. done. Sentinel Management Server Installation, Reinstallation,

More information

Spector 360 Deployment Guide. Version 7

Spector 360 Deployment Guide. Version 7 Spector 360 Deployment Guide Version 7 December 11, 2009 Table of Contents Deployment Guide...1 Spector 360 DeploymentGuide... 1 Installing Spector 360... 3 Installing Spector 360 Servers (Details)...

More information

Getting Started. Symantec Client Security. About Symantec Client Security. How to get started

Getting Started. Symantec Client Security. About Symantec Client Security. How to get started Getting Started Symantec Client Security About Security Security provides scalable, cross-platform firewall, intrusion prevention, and antivirus protection for workstations and antivirus protection for

More information

PROJECTIONS SUITE. Database Setup Utility (and Prerequisites) Installation and General Instructions. v0.9 draft prepared by David Weinstein

PROJECTIONS SUITE. Database Setup Utility (and Prerequisites) Installation and General Instructions. v0.9 draft prepared by David Weinstein PROJECTIONS SUITE Database Setup Utility (and Prerequisites) Installation and General Instructions v0.9 draft prepared by David Weinstein Introduction These are the instructions for installing, updating,

More information

Installing OneStop Reporting Products

Installing OneStop Reporting Products Installing OneStop Reporting Products Contents 1 Introduction 2 Product Overview 3 System Requirements 4 Deployment 5 Installation 6 Appendix 2010 OneStop Reporting http://www.onestopreporting.com [email protected]

More information

GP REPORTS VIEWER USER GUIDE

GP REPORTS VIEWER USER GUIDE GP Reports Viewer Dynamics GP Reporting Made Easy GP REPORTS VIEWER USER GUIDE For Dynamics GP Version 2015 (Build 5) Dynamics GP Version 2013 (Build 14) Dynamics GP Version 2010 (Build 65) Last updated

More information

PKI Contacts PKI for Fraunhofer Contacts

PKI Contacts PKI for Fraunhofer Contacts Fraunhofer Competence Center PKI PKI Contacts PKI for Fraunhofer Contacts User manual for communication partners of the Fraunhofer-Gesellschaft Author[s]: Uwe Bendisch, Maximilian Gottwald As at: 15.10.2013

More information

EntroWatch - Software Installation Troubleshooting Guide

EntroWatch - Software Installation Troubleshooting Guide EntroWatch - Software Installation Troubleshooting Guide ENTROWATCH SOFTWARE INSTALLATION TROUBLESHOOTING GUIDE INTRODUCTION This guide is intended for users who have attempted to install the EntroWatch

More information

eadvantage Certificate Enrollment Procedures

eadvantage Certificate Enrollment Procedures eadvantage Certificate Enrollment Procedures Purpose: Instructions for members to obtain a digital certificate which is a requirement to conduct financial transactions with the Federal Home Loan Bank of

More information

Maintaining the Content Server

Maintaining the Content Server CHAPTER 7 This chapter includes the following Content Server maintenance procedures: Backing Up the Content Server, page 7-1 Restoring Files, page 7-3 Upgrading the Content Server, page 7-5 Shutting Down

More information

Table of Contents. CHAPTER 1 About This Guide... 9. CHAPTER 2 Introduction... 11. CHAPTER 3 Database Backup and Restoration... 15

Table of Contents. CHAPTER 1 About This Guide... 9. CHAPTER 2 Introduction... 11. CHAPTER 3 Database Backup and Restoration... 15 Table of Contents CHAPTER 1 About This Guide......................... 9 The Installation Guides....................................... 10 CHAPTER 2 Introduction............................ 11 Required

More information

Important Notes for WinConnect Server ES Software Installation:

Important Notes for WinConnect Server ES Software Installation: Important Notes for WinConnect Server ES Software Installation: 1. Only Windows 8/8.1 Enterprise, Windows 8/8.1 Professional (32-bit & 64-bit) or Windows Server 2012 (64-bit) or Windows Server 2012 Foundation

More information

Using RPC over HTTP with Exchange Server 2003 SP1

Using RPC over HTTP with Exchange Server 2003 SP1 Using RPC over HTTP with Exchange Server 2003 SP1 Author: Bill Boswell Bill Boswell Consulting, Inc. www.billboswellconsulting.com [email protected] RCP over HTTP has a lot of moving parts

More information

SWCS 4.2 Client Configuration Users Guide Revision 49. 11/26/2012 Solatech, Inc.

SWCS 4.2 Client Configuration Users Guide Revision 49. 11/26/2012 Solatech, Inc. SWCS 4.2 Client Configuration Users Guide Revision 49 11/26/2012 Solatech, Inc. Contents Introduction... 4 Installation... 4 Running the Utility... 4 Company Database Tasks... 4 Verifying a Company...

More information

STATISTICA VERSION 12 STATISTICA ENTERPRISE SMALL BUSINESS INSTALLATION INSTRUCTIONS

STATISTICA VERSION 12 STATISTICA ENTERPRISE SMALL BUSINESS INSTALLATION INSTRUCTIONS STATISTICA VERSION 12 STATISTICA ENTERPRISE SMALL BUSINESS INSTALLATION INSTRUCTIONS Notes 1. The installation of STATISTICA Enterprise Small Business entails two parts: a) a server installation, and b)

More information

STATISTICA VERSION 9 STATISTICA ENTERPRISE INSTALLATION INSTRUCTIONS FOR USE WITH TERMINAL SERVER

STATISTICA VERSION 9 STATISTICA ENTERPRISE INSTALLATION INSTRUCTIONS FOR USE WITH TERMINAL SERVER Notes: STATISTICA VERSION 9 STATISTICA ENTERPRISE INSTALLATION INSTRUCTIONS FOR USE WITH TERMINAL SERVER 1. These instructions focus on installation on Windows Terminal Server (WTS), but are applicable

More information

ScanShell.Net Install Guide

ScanShell.Net Install Guide ScanShell.Net Install Guide Please install the software first - DO NOT PLUG IN THE SCANNER The scanner has been carefully packaged to avoid damage during transportation. Before operating the scanner, please

More information

MapInfo Professional 12.0 Licensing and Activation

MapInfo Professional 12.0 Licensing and Activation MapInfo Professional 12.0 Asia Pacific/Australia: Phone: +61 2 9437 6255 [email protected] [email protected] www.pitneybowes.com.au/software Canada: Phone: 1 800 268 3282 [email protected]

More information

SECURE EMAIL USER GUIDE OUTLOOK 2000

SECURE EMAIL USER GUIDE OUTLOOK 2000 WELLS FARGO AUTHENTICATION SERVICES DATED: MAY 2003 TABLE OF CONTENTS GENERAL INFORMATION... 1 INSTALLING THE WELLS FARGO ROOT CERTIFICATE CHAIN.. 2 INSTALLING THE CERTIFICATES INTO IE... 3 SETTING UP

More information

Basic Setup Guide. Remote Administrator 4 NOD32 Antivirus 4 Business Edition Smart Security 4 Business Edition

Basic Setup Guide. Remote Administrator 4 NOD32 Antivirus 4 Business Edition Smart Security 4 Business Edition Basic Setup Guide Remote Administrator 4 NOD32 Antivirus 4 Business Edition Smart Security 4 Business Edition Contents Getting started...1 Software components...1 Section 1: Purchasing and downloading

More information

Selected Windows XP Troubleshooting Guide

Selected Windows XP Troubleshooting Guide 1 Selected Windows XP Troubleshooting Guide To locate lost files: Compiled by: Jason M. Cohen Check these locations to locate lost files: The My Documents folder Click Start, and then click My Documents.

More information

Portions of this product were created using LEADTOOLS 1991-2009 LEAD Technologies, Inc. ALL RIGHTS RESERVED.

Portions of this product were created using LEADTOOLS 1991-2009 LEAD Technologies, Inc. ALL RIGHTS RESERVED. Installation Guide Lenel OnGuard 2009 Installation Guide, product version 6.3. This guide is item number DOC-110, revision 1.038, May 2009 Copyright 1992-2009 Lenel Systems International, Inc. Information

More information

Installing GFI FAXmaker

Installing GFI FAXmaker Installing GFI FAXmaker System Requirements Before you install GFI FAXmaker, please ensure that the following requirements are met. GFI FAXmaker FAX Server: A Windows 2000, 2003, 2008 server or Windows

More information

Xythos on Demand Quick Start Guide For Xythos Drive

Xythos on Demand Quick Start Guide For Xythos Drive Xythos on Demand Quick Start Guide For Xythos Drive What is Xythos on Demand? Xythos on Demand is not your ordinary online storage or file sharing web site. Instead, it is an enterprise-class document

More information

Upgrade Guide. McAfee Vulnerability Manager Microsoft Windows Server 2008 R2

Upgrade Guide. McAfee Vulnerability Manager Microsoft Windows Server 2008 R2 Upgrade Guide McAfee Vulnerability Manager Microsoft Windows Server 2008 R2 COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARKS McAfee, the McAfee logo, McAfee Active Protection,

More information

Instructions for Uploading and Sending Transcripts to the CollegeforTN.org Transcript Exchange Chancery SMS IMPORTANT NOTES:

Instructions for Uploading and Sending Transcripts to the CollegeforTN.org Transcript Exchange Chancery SMS IMPORTANT NOTES: Instructions for Uploading and Sending Transcripts to the CollegeforTN.org Transcript Exchange Chancery SMS IMPORTANT NOTES: START WITH STEP 1 ONLY IF YOU HAVE DOWNLOADED AND INSTALLED THE CHANCERY SMS

More information

Microsoft Access 2010 handout

Microsoft Access 2010 handout Microsoft Access 2010 handout Access 2010 is a relational database program you can use to create and manage large quantities of data. You can use Access to manage anything from a home inventory to a giant

More information

Live@edu User Guide. Please visit the Helpdesk website for more information: http://www.smu.edu.sg/iits/helpdesk_support/index.asp

Live@edu User Guide. Please visit the Helpdesk website for more information: http://www.smu.edu.sg/iits/helpdesk_support/index.asp IITS Main Office SINGAPORE MANAGEMENT UNIVERSITY Administration Building, Level 11 81, Victoria Street Singapore 188065 Phone: 65-6828 1930 Email: [email protected] Please visit the Helpdesk website for

More information

Microsoft Visual Studio Integration Guide

Microsoft Visual Studio Integration Guide Microsoft Visual Studio Integration Guide MKS provides a number of integrations for Integrated Development Environments (IDEs). IDE integrations allow you to access MKS Integrity s workflow and configuration

More information

Fig. 1 Relationship View of Northwind 2007.accdb

Fig. 1 Relationship View of Northwind 2007.accdb Lab 5 Working with MS Access Forms LAB 6 Summary 1. Creating Multiple-Table or Linked Forms 2. Calculating Totals and Using Expressions 3. Creating Pop-Up Forms, Custom Dialog Boxes, and Message Boxes

More information

Chapter 1 Downloading Images to Your Computer (Windows)

Chapter 1 Downloading Images to Your Computer (Windows) Software User Guide For the safe use of your camera, be sure to read the Safety Precautions thoroughly before use. Types of software installed on your computer varies depending on the method of installation

More information

Word 2010: Mail Merge to Email with Attachments

Word 2010: Mail Merge to Email with Attachments Word 2010: Mail Merge to Email with Attachments Table of Contents TO SEE THE SECTION FOR MACROS, YOU MUST TURN ON THE DEVELOPER TAB:... 2 SET REFERENCE IN VISUAL BASIC:... 2 CREATE THE MACRO TO USE WITHIN

More information

Adding Digital Signature and Encryption in Outlook

Adding Digital Signature and Encryption in Outlook Adding Digital Signature and Encryption in Outlook Using Outlook, the email messages can be signed and encrypted by a digital certificate. To digitally sign a message in Outlook some conditions must be

More information

Introduction 1-1 Installing FAS 500 Asset Accounting the First Time 2-1 Installing FAS 500 Asset Accounting: Upgrading from a Prior Version 3-1

Introduction 1-1 Installing FAS 500 Asset Accounting the First Time 2-1 Installing FAS 500 Asset Accounting: Upgrading from a Prior Version 3-1 Contents 1. Introduction 1-1 Supported Operating Environments................ 1-1 System Requirements............................. 1-2 Security Requirements........................ 1-3 Installing Server

More information

MAS 90. Installation and System Administrator's Guide 4WIN1010-02/04

MAS 90. Installation and System Administrator's Guide 4WIN1010-02/04 MAS 90 Installation and System Administrator's Guide 4WIN1010-02/04 Copyright 1998-2004 Best Software, Inc. All rights reserved. Rev 02 Contents Chapter 1 Introduction 1 How to Use This Manual 1 Graphic

More information

Windows 95, Windows 98, Windows NT 4.0, Windows 2000, or Windows XP. Pentium PC Minimum RAM: 16 MB RAM Windows 95, Windows 98;32 MB RAM Windows NT 4.

Windows 95, Windows 98, Windows NT 4.0, Windows 2000, or Windows XP. Pentium PC Minimum RAM: 16 MB RAM Windows 95, Windows 98;32 MB RAM Windows NT 4. Principia Network Installation Instructions Network Installation Requirements Windows 95, Windows 98, Windows NT 4.0, Windows 2000, or Windows XP Pentium PC Minimum RAM: 16 MB RAM Windows 95, Windows 98;32

More information

Introduction and Overview

Introduction and Overview Inmagic Content Server Workgroup 10.00 Microsoft SQL Server 2005 Express Edition Installation Notes Introduction and Overview These installation notes are intended for the following scenarios: 1) New installations

More information

MGC WebCommander Web Server Manager

MGC WebCommander Web Server Manager MGC WebCommander Web Server Manager Installation and Configuration Guide Version 8.0 Copyright 2006 Polycom, Inc. All Rights Reserved Catalog No. DOC2138B Version 8.0 Proprietary and Confidential The information

More information

Setting Up Database Security with Access 97

Setting Up Database Security with Access 97 Setting Up Database Security with Access 97 The most flexible and extensive method of securing a database is called user-level security. This form of security is similar to methods used in most network

More information

Contents. VPN Instructions. VPN Instructions... 1

Contents. VPN Instructions. VPN Instructions... 1 VPN Instructions Contents VPN Instructions... 1 Download & Install Check Point VPN Software... 2 Connect to FPUA by VPN... 6 Connect to Your Computer... 8 Determine Your Machine Type... 10 Identify 32-bit

More information

Lenovo Online Data Backup User Guide Version 1.8.14

Lenovo Online Data Backup User Guide Version 1.8.14 Lenovo Online Data Backup User Guide Version 1.8.14 Contents Chapter 1: Installing Lenovo Online Data Backup...5 Downloading the Lenovo Online Data Backup Client...5 Installing the Lenovo Online Data

More information

Certify your Software Integrity with thawte Code Signing Certificates

Certify your Software Integrity with thawte Code Signing Certificates Certify your Software Integrity with thawte Code Signing Certificates Sign your code and active content for secure online distribution... 1. Overview 2. Why a thawte Code Signing Certificate? 3. Who needs

More information

Configuring, Customizing, and Troubleshooting Outlook Express

Configuring, Customizing, and Troubleshooting Outlook Express 3 Configuring, Customizing, and Troubleshooting Outlook Express............................................... Terms you ll need to understand: Outlook Express Newsgroups Address book Email Preview pane

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,

More information

Using Jive for Outlook

Using Jive for Outlook Using Jive for Outlook TOC 2 Contents Using Jive for Outlook...3 Client System Requirements... 3 Getting Started with Jive for Outlook... 3 Jview and View as email...5 Viewing Social Information... 5 Finding

More information

XMap 7 Administration Guide. Last updated on 12/13/2009

XMap 7 Administration Guide. Last updated on 12/13/2009 XMap 7 Administration Guide Last updated on 12/13/2009 Contact DeLorme Professional Sales for support: 1-800-293-2389 Page 2 Table of Contents XMAP 7 ADMINISTRATION GUIDE... 1 INTRODUCTION... 5 DEPLOYING

More information

webkpi SaaS ETL Connector Installation & Configuration Guide

webkpi SaaS ETL Connector Installation & Configuration Guide webkpi SaaS ETL Connector Installation & Configuration Guide SaaS ETL Version 2.5.0.12 Version 1.6 September 2013 webkpi SaaS ETL Connector Version 2.5.0.12 V 1.6 Page 1 Table of Contents Table of Contents

More information

NovaBACKUP. Storage Server. NovaStor / May 2011

NovaBACKUP. Storage Server. NovaStor / May 2011 NovaBACKUP Storage Server NovaStor / May 2011 2011 NovaStor, all rights reserved. All trademarks are the property of their respective owners. Features and specifications are subject to change without notice.

More information

Installing the Driver of your Plotter- / Engraver

Installing the Driver of your Plotter- / Engraver Installing the Driver of your Plotter- / Engraver By installing your plotter / engraver software the driver for your device will be pre-installed. When the device is switched on after the software setup,

More information

ArcGIS 9. Installation Guide: Workgroup for Microsoft SQL Server Express

ArcGIS 9. Installation Guide: Workgroup for Microsoft SQL Server Express ArcGIS 9 Installation Guide: Workgroup for Microsoft SQL Server Express Copyright 2006 ESRI All Rights Reserved. Printed in the United States of America. The information contained in this document is the

More information

Installation Instruction STATISTICA Enterprise Small Business

Installation Instruction STATISTICA Enterprise Small Business Installation Instruction STATISTICA Enterprise Small Business Notes: ❶ The installation of STATISTICA Enterprise Small Business entails two parts: a) a server installation, and b) workstation installations

More information

13 Managing Devices. Your computer is an assembly of many components from different manufacturers. LESSON OBJECTIVES

13 Managing Devices. Your computer is an assembly of many components from different manufacturers. LESSON OBJECTIVES LESSON 13 Managing Devices OBJECTIVES After completing this lesson, you will be able to: 1. Open System Properties. 2. Use Device Manager. 3. Understand hardware profiles. 4. Set performance options. Estimated

More information

Guide to Setting up Docs2Manage using Cloud Services

Guide to Setting up Docs2Manage using Cloud Services COMvantage Solutions Presents: Version 3.x Cloud based Document Management Guide to Setting up Docs2Manage using Cloud Services Docs2Manage Support: Email: [email protected] Phone: +1.847.690.9900

More information

Using Microsoft Internet Explorer 6 (Windows 2000/ Windows XP/ Windows Server 2003)

Using Microsoft Internet Explorer 6 (Windows 2000/ Windows XP/ Windows Server 2003) Security Alert Dialog Box When installing the program with SSL selected, a Windows security alert dialog box may appear each time you open Internet Explorer. This section describes how to prevent the display

More information

Advanced Event Viewer Manual

Advanced Event Viewer Manual Advanced Event Viewer Manual Document version: 2.2944.01 Download Advanced Event Viewer at: http://www.advancedeventviewer.com Page 1 Introduction Advanced Event Viewer is an award winning application

More information

Installation Instruction STATISTICA. Concurrent Network License with Borrowing Domain Based Registration

Installation Instruction STATISTICA. Concurrent Network License with Borrowing Domain Based Registration Installation Instruction STATISTICA Concurrent Network License with Borrowing Domain Based Registration Notes: ❶ The installation of the Concurrent network version entails two parts: a) a server installation,

More information