For computers that are running Windows Server 2008 R2, Windows Server 2008, Windows Server 2003, Windows 2000, Windows XP, or Windows Vista

Size: px
Start display at page:

Download "For computers that are running Windows Server 2008 R2, Windows Server 2008, Windows Server 2003, Windows 2000, Windows XP, or Windows Vista"

Transcription

1 Article ID: Last Review: September 4, Revision: 11.0 Virus scanning recommendations for computers that are running Windows Server 2008 Windows Server 2008, Windows Server 2003, Windows 2000, Windows XP, or Windows Vista This article contains recommendations that may help you protect a computer that is running Windows Server 2 R2, Windows Server 2008, Windows Server 2003, Microsoft Windows 2000, Windows XP, or Windows Vista fro viruses. This article also contains information to help you minimize the effect of antivirus software on system a network performance. For computers that are running Windows Server 2008 R2, Windows Server 2008, Windows Server 2003, Windows 2000, Windows XP, or Windows Vista Do not scan the following files and folders. These files are not at risk of infection. If you scan these files, seriou performance problems may occur because of file locking. Where a specific set of files is identified by name, ex only those files instead of the whole folder. Sometimes, the whole folder must be excluded. Do not exclude an of these based on the file name extension. For example, do not exclude all files that have a.dit extension. Mic has no control over other files that may use the same extensions as the following files: Microsoft Windows Update or Automatic Update related files The Windows Update or Automatic Update database file. This file is located in the following folde %windir%\softwaredistribution\datastore Exclude the Datastore.edb file. The transaction log files. These files are located in the following folder: %windir%\softwaredistribution\datastore\logs Edb*.log Note The wildcard character indicates that there may be several files. Res1.log. The file is named Edbres00001.jrs for Windows Vista and Windows Server 2008 Res2.log. The file is named Edbres00002.jrs for Windows Vista and Windows Server 2008 Edb.chk Tmp.edb The following files in the %windir%\security path should be added to the exclusions list: *.edb *.sdb *.log *.chk Note If these files are not excluded, security databases are typically corrupted, and Grou Policy cannot be applied when you scan the folder. The wildcard character indicates that t may be several files. Specifically, you must exclude the following files: Edb.chk Edb.log *.log Security.sdb in the <drive>:\windows\security\database folder Group Policy related files Group Policy user registry information. These files are located in the following folder: %allusersprofile%\ Exclude the following file: NTUser.pol Group Policy client settings file. These files are located in the following folder: %Systemroot%\system32\GroupPolicy\ Exclude the following file: registry.pol For more information, click the following article numbers to view the articles in the Microsoft Knowledge

2 Base: ( ) On a Windows Server 2003-based computer, registry based policy settings are unexpectedly removed after a user logs on to the computer ( ) Some registry-based policy settings are lost and erro messages are logged in the Application log on a Windows XP-based computer or on a Windows Vista based computer For Windows Server 2008 R2, Windows Server 2008, Windows Server 2003, and Wind 2000 domain controllers Because domain controllers provide an important service to clients, the risk of disruption of their activities from malicious code from a virus must be minimized. Antivirus software is the generally accepted way to lessen the of virus infection. Install and configure antivirus software so that the risk to the domain controller is reduced a much as possible and so that performance is affected as little as possible. The following list contains recommendations to help you configure and install antivirus software on a Windows Server 2008 R2, Windows Server 2008, Windows Server 2003, or on a Windows 2000 domain controller: Warning We recommend that you apply the following specified configuration to a test configuration to make s that in your specific environment it does not introduce unexpected factors or compromise the stability of the system. The risk from too much scanning is that files are inappropriately flagged as having been changed. This results in too much replication in Active Directory. If testing verifies that replication is not affected by the follo recommendations, you can apply the antivirus software to the production environment. Note Specific recommendations from antivirus software vendors may supersede the recommendations in the article. Antivirus software must be installed on all domain controllers in the enterprise. Ideally, try to install suc software on all other server and client systems that have to interact with the domain controllers. It is optimal to catch the virus at the earliest point, such as at the firewall or at the client system where the is first introduced. This prevents the virus from ever reaching the infrastructure systems that the client depend on. Use a version of antivirus software that is designed to work with Active Directory domain controllers an that uses the correct Application Programming Interfaces (APIs) to access files on the server. Older ver of most vendor software inappropriately change file metadata as it is scanned. This causes the File Replication Service engine to recognize a file change and therefore schedule the file for replication. New versions prevent this problem. For more information, click the following article number to view the artic the Microsoft Knowledge Base: ( ) Antivirus, backup, and disk optimization programs that are compatible with the File Replication service Do not use a domain controller to browse the Web or to perform any other activities that may introduce malicious code. When you can, do not use the domain controller as a file sharing server. Virus scanning software must run against all files in those shares, and this can put an unsatisfactory load on the processor and the memory resources of the server Do not put Active Directory or FRS database and log files on NTFS file system compressed volumes. For more information, click the following article number to view the article in the Microsoft Knowledge B ( ) Issues with Jet Databases on compressed drives Do not scan the following files and folders. These files are not at risk of infection, and if you include the this may cause serious performance problems because of file locking. Where a specific set of files is identified by name, exclude only those files instead of the whole folder. Sometimes, the whole folder m be excluded. Do not exclude any of these based on the file-name extension. For example, do not exclud files that have a.dit extension. Microsoft has no control over other files that may use the same extensi those shown here. Important This section, method, or task contains steps that tell you how to modify the registry. Howe serious problems might occur if you modify the registry incorrectly. Therefore, make sure that you follo these steps carefully. For added protection, back up the registry before you modify it. Then, you can re the registry if a problem occurs. For more information about how to back up and restore the registry, c the following article number to view the article in the Microsoft Knowledge Base: ( ) How to back up and restore the registry in Windows Active Directory and Active Directory-related files: Main NTDS database files. The location of these files is specified in the following registry HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\NTDS\Parameters\DSA

3 Database File The default location is %windir%\ntds. Ntds.dit Ntds.pat Active Directory transaction log files. The location of these files is specified in the followin registry key: HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\NTDS\Parameters\Datab Log Files Path The default location is %windir%\ntds. EDB*.log (The wildcard character indicates that there may be several files.) Res1.log (The file is named Edbres00001.jrs for Windows Vista, Windows Server 2008 and Windows Server 2008 R2.) Res2.log (The file is named Edbres00001.jrs for Windows Vista, Windows Server 2008 and Windows Server 2008 R2.) Ntds.pat Note Windows Server 2003 no longer uses the Ntds.pat file. The NTDS Working folder that is specified in the following registry key: HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\NTDS\Parameters\DSA Working Directory Temp.edb Edb.chk SYSVOL files: The File Replication Service (FRS) Working folder that is specified in the following registry HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\NtFrs\Parameters\Work Directory FRS Working Dir\jet\sys\edb.chk FRS Working Dir\jet\ntfrs.jdb FRS Working Dir\jet\log\*.log The FRS Database Log files that are located in the following registry key: HKEY_LOCAL_MACHINE\system\currentcontrolset\services\NtFrs\Parameters\DB Log File Directory The default location is %windir%\ntfrs. FRS Working Dir\jet\log\*.log (if the registry key is not set) FRS Working Dir\jet\log\edbres00001.jrs (Windows Vista, Windows Server 2008, and Windows Server 2008 R2) FRS Working Dir\jet\log\edbres00002.jrs (Windows Vista, Windows Server 2008, and Windows Server 2008 R2) DB Log File Directory\log\*.log (if the registry key is set) The Staging folder that is specified in the following registry key and all the Staging folder folders: HKEY_LOCAL_MACHINE\system\currentcontrolset\services\NtFrs\Parameters\Replica Sets\GUID\Replica Set Stage The current location of the Staging folder and all its sub-folders is the file system reparse of the replica set staging folders. Staging defaults to the following location: %systemroot%\sysvol\staging areas The current location of the SYSVOL\SYSVOL folder and all its sub-folders is the file system reparse target of the replica set root. The SYSVOL\SYSVOL folder defaults to the followin location: %systemroot%\sysvol\sysvol The FRS Preinstall folder that is in the following location: Replica_root\DO_NOT_REMOVE_NtFrs_PreInstall_Directory The Preinstall folder is always open when FRS is running.

4 In summary, the targeted and excluded list of folders for a SYSVOL tree that is placed in its defa location would look similar to the following: 1. %systemroot%\sysvol Exclude 2. %systemroot%\sysvol\domain Scan 3. %systemroot%\sysvol\domain\do_not_remove_ntfrs_preinstall_directory Exclude 4. %systemroot%\sysvol\domain\policies Scan 5. %systemroot%\sysvol\domain\scripts Scan 6. %systemroot%\sysvol\staging Exclude 7. %systemroot%\sysvol\staging areas Exclude 8. %systemroot%\sysvol\sysvol Exclude If any one of these folder or files have been moved or placed in a different location, scan or excl the equivalent element. DFS The same resources that are excluded for a SYSVOL replica set must also be excluded when FRS used to replicate shares that are mapped to the DFS root and link targets on Windows Server 20 based, Windows Server 2003-based, or Windows 2000-based member computers or domain controllers. DHCP By default, DHCP files that should be excluded are present in the following folder on the server: %systemroot%\system32\dhcp Note You should exclude all files and subfolders that exist in this folder. The location of DHCP files can be changed. To determine the current location of the DHCP files o server, check the DatabasePath, DhcpLogFilePath, and BackupDatabasePath parameters u the following registry subkey: HKEY_LOCAL_MACHINE\System\CurrentControlSet\services\DHCPServer\Parameters For Windows Server 2008, Windows Server 2003, and Windows 2000 domain controlle DNS: You should exclude all files and subfolders that exist in the following folder: %systemroot%\system32\dns WINS: You should exclude all files and subfolders that exist in the following folder: %systemroot%\system32\wins APPLIES TO Windows Server 2008 Standard Windows Server 2008 Standard without Hyper-V Windows Server 2008 Enterprise Windows Server 2008 Enterprise without Hyper-V Windows Server 2008 Datacenter Windows Server 2008 Datacenter without Hyper-V Windows Server 2008 for Itanium-Based Systems Microsoft Windows Server 2003, Datacenter Edition (32-bit x86) Microsoft Windows Server 2003, Enterprise Edition (32-bit x86) Microsoft Windows Server 2003, Standard Edition (32-bit x86) Microsoft Windows XP Professional Microsoft Windows XP Home Edition Microsoft Windows XP Tablet PC Edition Microsoft Windows XP Media Center Edition 2005 Update Rollup 2 Microsoft Windows 2000 Advanced Server Microsoft Windows 2000 Professional Edition Microsoft Windows 2000 Datacenter Server Microsoft Windows 2000 Server

5 Windows Vista Business Windows Vista Business 64-bit Edition Windows Vista Enterprise Windows Vista Enterprise 64-bit Edition Windows Vista Home Basic Windows Vista Home Basic 64-bit Edition Windows Vista Home Premium Windows Vista Home Premium 64-bit Edition Windows Vista Ultimate Windows Server 2008 Foundation Windows Server 2008 R2 Datacenter Windows Server 2008 R2 Datacenter without Hyper-V Windows Server 2008 R2 Enterprise Windows Server 2008 R2 Enterprise without Hyper-V Windows Server 2008 R2 Standard Windows Server 2008 R2 Standard without Hyper-V Windows Web Server 2008 R2 Keywords: kbinfo kbprb KB Get Help Now Contact a support professional by , Online, or Phone Help and Support 2009 Micro

BitDefender Security for File Servers RECOMMENDED CONFIGURATION

BitDefender Security for File Servers RECOMMENDED CONFIGURATION BitDefender Security for File Servers RECOMMENDED CONFIGURATION Summary Computers running Windows Server 2003, Windows 2000 or Windows XP... 3 Computers Running Windows Server 2003 and Windows 2000 Domain

More information

BACKUP & RESTORE (FILE SYSTEM)

BACKUP & RESTORE (FILE SYSTEM) Table of Contents Table of Contents... 1 Perform a Backup (File System)... 1 What Gets Backed Up... 2 What Does Not Get Backed Up... 3 Perform a Restore... 4 Perform a Backup (File System) The following

More information

Directory Backup and Restore

Directory Backup and Restore Directory Backup and Restore Overview Active Directory is backed up as part of system state, a collection of system components that depend on each other. You must backup and restore system state components

More information

Implementing Microsoft File Exclusions in Trend Micro OfficeScan 8.0

Implementing Microsoft File Exclusions in Trend Micro OfficeScan 8.0 A Trend Micro TrendEdge Solution Advanced Technologies and Techniques to Enhance Your Product Implementing Microsoft File Exclusions in Trend Micro OfficeScan 8.0 Mike Canavan Senior Solutions Architect

More information

McAfee VirusScan Enterprise 8.8 Best Practices Guide

McAfee VirusScan Enterprise 8.8 Best Practices Guide Best Practices Guide COPYRIGHT Copyright 2010 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system, or translated into

More information

ms-help://ms.technet.2005mar.1033/enu_kbntrelease/ntrelease/308406.htm

ms-help://ms.technet.2005mar.1033/enu_kbntrelease/ntrelease/308406.htm Page 1 of 12 Knowledge Base FRS Event Log Error Codes PSS ID Number: 308406 Article Last Modified on 10/13/2004 The information in this article applies to: Microsoft Windows 2000 Server Microsoft Windows

More information

Default configuration for the Workstation service and the Server service

Default configuration for the Workstation service and the Server service Article ID: 887429 - Last Review: November 30, 2007 - Revision: 2.4 Overview of Message Block signing INTRODUCTION This article describes Message Block (SMB) signing. SMB signing is a security mechanism

More information

How to install Small Business Server 2003 in an existing Active

How to install Small Business Server 2003 in an existing Active Page 1 of 6 How to install Small Business Server 2003 in an existing Active Directory domain INTRODUCTION This article describes how to install a Microsoft Windows Small Business Server (SBS) 2003-based

More information

STATISTICA VERSION 9 STATISTICA ENTERPRISE INSTALLATION INSTRUCTIONS FOR USE WITH TERMINAL SERVER

STATISTICA VERSION 9 STATISTICA ENTERPRISE INSTALLATION INSTRUCTIONS FOR USE WITH TERMINAL SERVER Notes: STATISTICA VERSION 9 STATISTICA ENTERPRISE INSTALLATION INSTRUCTIONS FOR USE WITH TERMINAL SERVER 1. These instructions focus on installation on Windows Terminal Server (WTS), but are applicable

More information

Hands-On Microsoft Windows Server 2008

Hands-On Microsoft Windows Server 2008 Hands-On Microsoft Windows Server 2008 Chapter 10 Managing System Reliability and Availability Using and Configuring Event Viewer Event Viewer Houses the event logs that record information about all types

More information

Active Directory backup and restore with Acronis Backup & Recovery 10

Active Directory backup and restore with Acronis Backup & Recovery 10 Active Directory backup and restore with Acronis Backup & Recovery 10 Table of Contents 1. Introduction... 3 2. Backup and Recovery overview... 3 3. Active Directory backup... 3 4. Active Directory recovery...

More information

How to troubleshoot MS DTC firewall issues

How to troubleshoot MS DTC firewall issues Page 1 of 5 Article ID: 306843 - Last Review: October 29, 2007 - Revision: 5.3 How to troubleshoot MS DTC firewall issues Retired KB Content Disclaimer This article was previously published under Q306843

More information

Installing Active Directory

Installing Active Directory Installing Active Directory 119 Installing Active Directory Installing Active Directory is an easy and straightforward process as long as you planned adequately and made the necessary decisions beforehand.

More information

Features - Microsoft Data Protection Manager

Features - Microsoft Data Protection Manager Page 1 of 63 Features - Microsoft Data Protection Manager TABLE OF CONTENTS OVERVIEW SYSTEM REQUIREMENTS - MICROSOFT DATA PROTECTION MANAGER INSTALLATION Install the Microsoft Data Protection Manager BACKUP

More information

KB259302 - Windows 2000 DNS Event Messages 1 Through 1614

KB259302 - Windows 2000 DNS Event Messages 1 Through 1614 Page 1 of 6 Knowledge Base Windows 2000 DNS Event Messages 1 Through 1614 PSS ID Number: 259302 Article Last Modified on 10/29/2003 The information in this article applies to: Microsoft Windows 2000 Server

More information

Module 10: Maintaining Active Directory

Module 10: Maintaining Active Directory Module 10: Maintaining Active Directory Contents Overview 1 Lesson: Introduction to Maintaining Active Directory 2 Lesson: Moving and Defragmenting the Active Directory Database 6 Lesson: Backing Up Active

More information

1. Overview... 2 Documentation... 2 Licensing... 2 Operating system considerations... 2

1. Overview... 2 Documentation... 2 Licensing... 2 Operating system considerations... 2 User Guide BackupAssist User Guides explain how to create and modify backup jobs, create backups and perform restores. These steps are explained in more detail in a guide s respective whitepaper. Whitepapers

More information

Networking Best Practices Guide. Version 6.5

Networking Best Practices Guide. Version 6.5 Networking Best Practices Guide Version 6.5 Summer 2010 Copyright: 2010, CCH, a Wolters Kluwer business. All rights reserved. Material in this publication may not be reproduced or transmitted in any form

More information

A+ Guide to Software: Managing, Maintaining, and Troubleshooting, 5e. Chapter 3 Installing Windows

A+ Guide to Software: Managing, Maintaining, and Troubleshooting, 5e. Chapter 3 Installing Windows : Managing, Maintaining, and Troubleshooting, 5e Chapter 3 Installing Windows Objectives How to plan a Windows installation How to install Windows Vista How to install Windows XP How to install Windows

More information

The purpose of this document is to guide you through the installation and configuration of a new ShipGear installation.

The purpose of this document is to guide you through the installation and configuration of a new ShipGear installation. The purpose of this document is to guide you through the installation and configuration of a new ShipGear installation. Following is an overview of sections in this document: Section A Installing ShipGear

More information

Faculty Details. : Assistant Professor ( OG. ),Assistant Professor (OG) Course Details. : B. Tech. Batch : 2010-2014. : Information Technology

Faculty Details. : Assistant Professor ( OG. ),Assistant Professor (OG) Course Details. : B. Tech. Batch : 2010-2014. : Information Technology COURSE FILE (COURSE PLAN) Year : 2012-13 Sem: ODD Faculty Details Name of the Faculty : Mullai.P & Yaashuwanth.C Designation : Assistant Professor ( OG. ),Assistant Professor (OG) Department : Information

More information

Dwebs IIS Log Archiver Installation and Configuration Guide for Helm 4

Dwebs IIS Log Archiver Installation and Configuration Guide for Helm 4 Dwebs IIS Log Archiver Installation and Configuration Guide for Helm 4 Dwebs Ltd http://www.dwebs.ltd.uk January 2009 Doc: Helm 4.1.0.0 Mod Ver: 1.0.0.0 The names of actual companies and products mentioned

More information

Wharf T&T Cloud Backup Service User & Installation Guide

Wharf T&T Cloud Backup Service User & Installation Guide Wharf T&T Cloud Backup Service User & Installation Guide Version 1.6 Feb 2013 Table of contents BEFORE YOU INSTALL 3 Page Section 1. Installation of Client Software 5 Section 2. Account Activation 8 Section

More information

Acronis Backup & Recovery 11.5 Quick Start Guide

Acronis Backup & Recovery 11.5 Quick Start Guide Acronis Backup & Recovery 11.5 Quick Start Guide Applies to the following editions: Advanced Server for Windows Virtual Edition Advanced Server SBS Edition Advanced Workstation Server for Linux Server

More information

Module 10: Maintaining Active Directory

Module 10: Maintaining Active Directory Module 10: Maintaining Active Directory! Lesson: Backing Up Active Directory Topic: How to Back Up Active Directory! Lesson: Restoring Active Directory Topic: How to Perform a Primary Restore! Lesson:

More information

About Recovery Manager for Active

About Recovery Manager for Active Dell Recovery Manager for Active Directory 8.6.1 May 30, 2014 These release notes provide information about the Dell Recovery Manager for Active Directory release. About Resolved issues Known issues System

More information

Backup and Disaster Recovery Restoration Guide

Backup and Disaster Recovery Restoration Guide Backup and Disaster Recovery Restoration Guide Page 1 Table of Contents Table of Contents...2 Terms of Use...3 BDR...4 Creating Point-in-Time Restoration Volumes...4 Mounting a Restoration Volume...4 Dismounting

More information

Backup and Restore of CONFIGURATION Object on Windows 2008

Backup and Restore of CONFIGURATION Object on Windows 2008 Backup and Restore of CONFIGURATION Object on Windows 2008 Technical Whitepaper Contents Introduction... 3 CONFIGURATION Backup... 3 Windows configuration objects... 3 Active Directory... 4 DFS... 4 DHCP

More information

Dell Recovery Manager for Active Directory 8.6.3

Dell Recovery Manager for Active Directory 8.6.3 Dell Recovery Manager for Active Directory 8.6.3 May 15, 2015 These release notes provide information about the Dell Recovery Manager for Active Directory release. Resolved Issues Known Issues System Requirements

More information

Installation Instruction STATISTICA Enterprise Server

Installation Instruction STATISTICA Enterprise Server Installation Instruction STATISTICA Enterprise Server Notes: ❶ The installation of STATISTICA Enterprise Server entails two parts: a) a server installation, and b) workstation installations on each of

More information

Kaspersky Lab Scan Exclusions by Application

Kaspersky Lab Scan Exclusions by Application Kaspersky Lab Scan Exclusions by Application One of the first steps in the implementation of antivirus protection is creation of antivirus policies. On a product by product basis, software vendors generally

More information

ITA Mail Archive Setup Guide

ITA Mail Archive Setup Guide This version of ITA Mail Archive is optimized to archive emails on both Microsoft Exchange 2000 and 2003 and 2007 servers. It is highly recommended that ITA Mail Archive should run on a server other than

More information

Features - Workstation Backup Agent

Features - Workstation Backup Agent Page 1 of 70 Features - Workstation Backup Agent TABLE OF CONTENTS OVERVIEW SYSTEM REQUIREMENTS System Requirements - Workstation Backup Agent - Source System Requirements - Workstation Backup Agent -

More information

Image Assistant. User Guide. Image Assistant. Laplink Software, Inc. User Guide. The ONLY Way to Restore an Old Image to a New PC!

Image Assistant. User Guide. Image Assistant. Laplink Software, Inc. User Guide. The ONLY Way to Restore an Old Image to a New PC! 1 Image Assistant Laplink Software, Inc. Customer Service/Technical Support: Web: http://www.laplink.com/help E-mail: CustomerService@laplink.com Laplink Software, Inc. 14335 NE 24th Street, Suite 201

More information

Introduction: Using Windows Server 2008 How-To p. 1 How to Educate Yourself About Windows Server 2008 p. 2 How to Benefit from This Book p.

Introduction: Using Windows Server 2008 How-To p. 1 How to Educate Yourself About Windows Server 2008 p. 2 How to Benefit from This Book p. Introduction: Using Windows Server 2008 How-To p. 1 How to Educate Yourself About Windows Server 2008 p. 2 How to Benefit from This Book p. 2 How to Continue Expanding Your Knowledge p. 4 Perform the Installation

More information

Module 2: Implementing an Active Directory Forest and Domain Structure

Module 2: Implementing an Active Directory Forest and Domain Structure Contents Overview 1 Lesson: Creating a Forest and Domain Structure 2 Lesson: Examining Active Directory Integrated DNS 22 Lesson: Raising Forest and Domain Functional Levels 36 Lesson: Creating Trust Relationships

More information

9. Which is the command used to remove active directory from a domain controller? Answer: Dcpromo /forceremoval

9. Which is the command used to remove active directory from a domain controller? Answer: Dcpromo /forceremoval 1. What is Active Directory schema? Answer: The schema is the Active Directory component that defines all the objects and attributes that the directory service uses to store data. 2. What is global catalog

More information

Prerequisites Guide. Version 4.0, Rev. 1

Prerequisites Guide. Version 4.0, Rev. 1 Version 4.0, Rev. 1 Contents Software and Hardware Prerequisites Guide... 2 anterradatacenter Version selection... 2 Required Software Components... 2 Sage 300 Construction and Real Estate ODBC... 2 Pervasive

More information

1.0 Hardware Requirements:

1.0 Hardware Requirements: 01 - ServiceDesk Plus - Best Practices We appreciate you choosing ServiceDesk Plus for your organization to deliver world-class IT services. Before installing the product, take a few minutes to go through

More information

This article was previously published under Q216498 SUMMARY

This article was previously published under Q216498 SUMMARY Article ID: 216498 - Last Review: September 11, 2011 - Revision: 12.0 How to remove data in Active Directory after an unsuccessful domain controller demotion System Tip This article applies to a different

More information

Installation Instruction STATISTICA Enterprise Small Business

Installation Instruction STATISTICA Enterprise Small Business Installation Instruction STATISTICA Enterprise Small Business Notes: ❶ The installation of STATISTICA Enterprise Small Business entails two parts: a) a server installation, and b) workstation installations

More information

Pearl Echo Installation Checklist

Pearl Echo Installation Checklist Pearl Echo Installation Checklist Use this checklist to enter critical installation and setup information that will be required to install Pearl Echo in your network. For detailed deployment instructions

More information

How to Copy A SQL Database SQL Server Express (Making a History Company)

How to Copy A SQL Database SQL Server Express (Making a History Company) How to Copy A SQL Database SQL Server Express (Making a History Company) These instructions are written for use with SQL Server Express. Check with your Network Administrator if you are not sure if you

More information

Planning Domain Controller Capacity

Planning Domain Controller Capacity C H A P T E R 4 Planning Domain Controller Capacity Planning domain controller capacity helps you determine the appropriate number of domain controllers to place in each domain that is represented in a

More information

Windows Server 2003 Service Pack 1 (SP1) or later service packs Enhanced version of Ntdsutil.exe

Windows Server 2003 Service Pack 1 (SP1) or later service packs Enhanced version of Ntdsutil.exe Article ID: 216498 - Last Review: February 3, 2010 - Revision: 11.0 How to remove data in Active Directory after an unsuccessful domain controller demotion System Tip This article applies to a different

More information

Step-by-Step Guide to Securing Windows XP Professional with Service Pack 2 in Small and Medium Businesses

Step-by-Step Guide to Securing Windows XP Professional with Service Pack 2 in Small and Medium Businesses Step-by-Step Guide to Securing Windows XP Professional with Service Pack 2 in Small and Medium Businesses 2004 Microsoft Corporation. All rights reserved. This document is for informational purposes only.

More information

Active Directory backup and restore with Acronis Backup & Recovery 11. Technical white paper. o o. Applies to the following editions: Advanced Server

Active Directory backup and restore with Acronis Backup & Recovery 11. Technical white paper. o o. Applies to the following editions: Advanced Server Active Directory backup and restore with Acronis Backup & Recovery 11 Technical white paper Applies to the following editions: Advanced Server Virtual Edition o o o Advanced Server SBS Edition Advanced

More information

STATISTICA VERSION 12 STATISTICA ENTERPRISE SMALL BUSINESS INSTALLATION INSTRUCTIONS

STATISTICA VERSION 12 STATISTICA ENTERPRISE SMALL BUSINESS INSTALLATION INSTRUCTIONS STATISTICA VERSION 12 STATISTICA ENTERPRISE SMALL BUSINESS INSTALLATION INSTRUCTIONS Notes 1. The installation of STATISTICA Enterprise Small Business entails two parts: a) a server installation, and b)

More information

2014 Electrical Server Installation Guide

2014 Electrical Server Installation Guide 2014 Electrical Server Installation Guide TITLE: 2014 Electrical Server Installation Guide DATE: September 2013 SUBJECT: ABSTRACT: Installation guide for SolidWorks Electrical 2014 on the server Guide

More information

Network System Management. Creating an Active Directory Domain

Network System Management. Creating an Active Directory Domain Network System Management Creating an Active Directory Domain Objectives Identify the procedures involved in the promotion of a stand-alone Windows Server to an active directory services (ADS) domain controller

More information

Sophos Anti-Virus for NetApp Storage Systems startup guide. Runs on Windows 2000 and later

Sophos Anti-Virus for NetApp Storage Systems startup guide. Runs on Windows 2000 and later Sophos Anti-Virus for NetApp Storage Systems startup guide Runs on Windows 2000 and later Document date: July 2007 Contents About this guide...4 About Sophos Anti-Virus for NetApp Storage Systems...5

More information

Symantec Mail Security for Domino

Symantec Mail Security for Domino Getting Started Symantec Mail Security for Domino About Symantec Mail Security for Domino Symantec Mail Security for Domino is a complete, customizable, and scalable solution that scans Lotus Notes database

More information

AXIS 70U - Using Scan-to-File

AXIS 70U - Using Scan-to-File AXIS 70U - Using Scan-to-File Introduction This document describes the Scan-to-File feature in the AXIS 70U. The step-by-step instructions describe the process of configuring the AXIS 70U and an FTP server.

More information

FAQ. How does the new Big Bend Backup (powered by Keepit) work?

FAQ. How does the new Big Bend Backup (powered by Keepit) work? FAQ How does the new Big Bend Backup (powered by Keepit) work? Once you establish which of the folders on your hard drive you ll be backing up, you ll log into myaccount.bigbend.net and from your control

More information

User Guide. CTERA Agent. August 2011 Version 3.0

User Guide. CTERA Agent. August 2011 Version 3.0 User Guide CTERA Agent August 2011 Version 3.0 Copyright 2009-2011 CTERA Networks Ltd. All rights reserved. No part of this document may be reproduced in any form or by any means without written permission

More information

SoftDent Practice Management Software. Technician s Installation Guide

SoftDent Practice Management Software. Technician s Installation Guide SoftDent Practice Management Software Technician s Installation Guide Notice Carestream Dental LLC, 2014. No part of this publication may be reproduced, stored in a retrieval system, translated to another

More information

Dell Recovery Manager for Active Directory 8.6.0

Dell Recovery Manager for Active Directory 8.6.0 Dell Recovery Manager for Active Directory 8.6.0 April, 2014 These release notes provide information about the Recovery Manager for Active Directory release. About Recovery Manager for Active Directory

More information

Getting started. Symantec AntiVirus Corporate Edition. About Symantec AntiVirus. How to get started

Getting started. Symantec AntiVirus Corporate Edition. About Symantec AntiVirus. How to get started Getting started Corporate Edition Copyright 2005 Corporation. All rights reserved. Printed in the U.S.A. 03/05 PN: 10362873 and the logo are U.S. registered trademarks of Corporation. is a trademark of

More information

TABLE OF CONTENTS. Quick Start - Windows File System idataagent. Page 1 of 44 OVERVIEW SYSTEM REQUIREMENTS DEPLOYMENT

TABLE OF CONTENTS. Quick Start - Windows File System idataagent. Page 1 of 44 OVERVIEW SYSTEM REQUIREMENTS DEPLOYMENT Page 1 of 44 Quick Start - Windows File System idataagent TABLE OF CONTENTS OVERVIEW Introduction Key Features Simplified Data Management Point-In-Time Recovery System State SnapProtect Backup Office Communications

More information

Creating a Domain Tree

Creating a Domain Tree 156 Chapter 4 Installing and Managing Trees and Forests Using the Active Directory Installation Wizard, you can quickly and easily create new domains by promoting a Windows Server 2008 stand-alone server

More information

Symantec AntiVirus Corporate Edition Patch Update

Symantec AntiVirus Corporate Edition Patch Update Symantec AntiVirus Corporate Edition Patch Update Symantec AntiVirus Corporate Edition Update Documentation version 10.0.1.1007 Copyright 2005 Symantec Corporation. All rights reserved. Symantec, the Symantec

More information

Appendix B Lab Setup Guide

Appendix B Lab Setup Guide JWCL031_appB_467-475.indd Page 467 5/12/08 11:02:46 PM user-s158 Appendix B Lab Setup Guide The Windows Server 2008 Applications Infrastructure Configuration title of the Microsoft Official Academic Course

More information

TEMA Floating licence

TEMA Floating licence TEMA Floating licence 1. Install TEMA on the server with the configuration code labelled on the CD cover or received from Image Systems AB. When installing TEMA with a floating licence, the licence server

More information

Active Directory Infrastructure Design Document

Active Directory Infrastructure Design Document Active Directory Infrastructure Design Document Written By Sainath KEV Microsoft MVP Directory Services Microsoft Author TechNet Magazine, Microsoft Operations Framework Microsoft Speaker - Singapore Document

More information

Upgrading Client Security and Policy Manager in 4 easy steps

Upgrading Client Security and Policy Manager in 4 easy steps Page 1 of 13 F-Secure White Paper Upgrading Client Security and Policy Manager in 4 easy steps Purpose This white paper describes how to easily upgrade your existing environment running Client Security

More information

Zmanda Cloud Backup Frequently Asked Questions

Zmanda Cloud Backup Frequently Asked Questions Zmanda Cloud Backup Frequently Asked Questions Release 4.1 Zmanda, Inc Table of Contents Terminology... 4 What is Zmanda Cloud Backup?... 4 What is a backup set?... 4 What is amandabackup user?... 4 What

More information

Advanced Event Viewer Manual

Advanced Event Viewer Manual Advanced Event Viewer Manual Document version: 2.2944.01 Download Advanced Event Viewer at: http://www.advancedeventviewer.com Page 1 Introduction Advanced Event Viewer is an award winning application

More information

Use QNAP NAS for Backup

Use QNAP NAS for Backup Use QNAP NAS for Backup BACKUP EXEC 12.5 WITH QNAP NAS Copyright 2010. QNAP Systems, Inc. All Rights Reserved. V1.0 Document revision history: Date Version Changes Apr 2010 1.0 Initial release Note: Information

More information

Configuring Event Log Monitoring With Sentry-go Quick & Plus! monitors

Configuring Event Log Monitoring With Sentry-go Quick & Plus! monitors Configuring Event Log Monitoring With Sentry-go Quick & Plus! monitors 3Ds (UK) Limited, November, 2013 http://www.sentry-go.com Be Proactive, Not Reactive! Many server-based applications, as well as Windows

More information

Planning for Windows Server 2008 Servers

Planning for Windows Server 2008 Servers Planning for Windows Server 2008 Servers Course Number: 6430B Course Length: 3 Days Course Overview This 3-day course is intended for IT pros who are interested in the knowledge and skills necessary to

More information

CONSTRUCTION / SERVICE BILLING SYSTEM SPECIFICATIONS

CONSTRUCTION / SERVICE BILLING SYSTEM SPECIFICATIONS CONSTRUCTION / SERVICE BILLING SYSTEM SPECIFICATIONS Jonas Software, March 2013 Contents Introduction... 3 Hardware Specifications... 4 Recommended Server Hardware Specifications... 4 Recommended Workstation

More information

STATISTICA VERSION 10 STATISTICA ENTERPRISE SERVER INSTALLATION INSTRUCTIONS

STATISTICA VERSION 10 STATISTICA ENTERPRISE SERVER INSTALLATION INSTRUCTIONS Notes: STATISTICA VERSION 10 STATISTICA ENTERPRISE SERVER INSTALLATION INSTRUCTIONS 1. The installation of the STATISTICA Enterprise Server entails two parts: a) a server installation, and b) workstation

More information

Charter Business Desktop Security Administrator's Guide

Charter Business Desktop Security Administrator's Guide Charter Business Desktop Security Administrator's Guide Table of Contents Chapter 1: Introduction... 4 Chapter 2: Getting Started... 5 Creating a new user... 6 Recovering and changing your password...

More information

Migrating MSDE to Microsoft SQL 2008 R2 Express

Migrating MSDE to Microsoft SQL 2008 R2 Express How To Updated: 11/11/2011 2011 Shelby Systems, Inc. All Rights Reserved Other brand and product names are trademarks or registered trademarks of the respective holders. If you are still on MSDE 2000,

More information

Security Maintenance Practices. IT 4823 Information Security Administration. Patches, Fixes, and Revisions. Hardening Operating Systems

Security Maintenance Practices. IT 4823 Information Security Administration. Patches, Fixes, and Revisions. Hardening Operating Systems IT 4823 Information Security Administration Securing Operating Systems June 18 Security Maintenance Practices Basic proactive security can prevent many problems Maintenance involves creating a strategy

More information

ilaw Installation Procedure

ilaw Installation Procedure ilaw Installation Procedure This guide will provide a reference for a full installation of ilaw Case Management Software. Contents ilaw Overview How ilaw works Installing ilaw Server on a PC Installing

More information

Database Operations (Backup/Restore/Move/Manage) Technical Support Engineering Rosslare Security NA For more information please see www.axtraxng.

Database Operations (Backup/Restore/Move/Manage) Technical Support Engineering Rosslare Security NA For more information please see www.axtraxng. Database Operations (Backup/Restore/Move/Manage) Technical Support Engineering Rosslare Security NA For more information please see www.axtraxng.com Database management operations may be performed to insure

More information

Hyperoo 2 User Guide. Hyperoo 2 User Guide

Hyperoo 2 User Guide. Hyperoo 2 User Guide 1 Hyperoo 2 User Guide 1 2 Contents How Hyperoo Works... 3 Installing Hyperoo... 3 Hyperoo 2 Management Console... 4 The Hyperoo 2 Server... 5 Creating a Backup Array... 5 Array Security... 7 Previous

More information

Recovery Manager for Active Directory Forest Edition 8.6.4

Recovery Manager for Active Directory Forest Edition 8.6.4 Dell Recovery Manager for Active Directory Forest Edition 8.6.4 May 15, 2015 These release notes provide information about the Dell Recovery Manager for Active Directory Forest Edition release. About About

More information

SAS 9.3 Foundation for Microsoft Windows

SAS 9.3 Foundation for Microsoft Windows Software License Renewal Instructions SAS 9.3 Foundation for Microsoft Windows Note: In this document, references to Microsoft Windows or Windows include Microsoft Windows for x64. SAS software is licensed

More information

About Backing Up a Cisco Unity System

About Backing Up a Cisco Unity System CHAPTER 4 Introduction This chapter describes in general terms backing up a Cisco Unity system. When you back up a Cisco Unity server (and one or more Exchange servers) you need to consider the same issues

More information

Administration guide. Host software WinCCU Installation. Complete gas volume and energy data management

Administration guide. Host software WinCCU Installation. Complete gas volume and energy data management Administration guide Host software WinCCU Installation Complete gas volume and energy data management Contents 1 Introduction... 1 Safety first... 1 Warning... 1 Typographic conventions... 1 Product versioning...

More information

Acronis Backup & Recovery 11

Acronis Backup & Recovery 11 Acronis Backup & Recovery 11 Quick Start Guide Applies to the following editions: Advanced Server Virtual Edition Advanced Server SBS Edition Advanced Workstation Server for Linux Server for Windows Workstation

More information

SOS Suite Installation Guide

SOS Suite Installation Guide SOS Suite Installation Guide rev. 8/31/2010 Contents Overview Upgrading from SOS 2009 and Older Pre-Installation Recommendations Network Installations System Requirements Preparing for Installation Installing

More information

Network Setup Instructions

Network Setup Instructions Network Setup Instructions This document provides technical details for setting up the Elite Salon & Spa Management program in a network environment. If you have any questions, please contact our Technical

More information

How to speed up IDENTIKEY DNS lookup of the Windows Logon DAWL client on Windows 7?

How to speed up IDENTIKEY DNS lookup of the Windows Logon DAWL client on Windows 7? KB 150103 How to speed up IDENTIKEY DNS lookup of the Windows Logon DAWL client on Windows 7? Creation date: 27/05/2013 Last Review: 28/06/2013 Revision number: 2 Document type: How To Security status:

More information

http://downloadcenter.trendmicro.com/

http://downloadcenter.trendmicro.com/ Trend Micro Incorporated reserves the right to make changes to this document and to the product described herein without notice. Before installing and using the product, review the readme files, release

More information

SimaPro 7.3.3 database update instructions from SimaPro7.3.0 or older database versions

SimaPro 7.3.3 database update instructions from SimaPro7.3.0 or older database versions SimaPro 7.3.3 database update instructions from SimaPro7.3.0 or older database versions SimaPro 7 Technical Note 13, February 2012 Contents SIMAPRO 7.3.3 DATABASE UPDATE INSTRUCTIONS FROM SIMAPRO7.3.0

More information

Windows Server Update Services 3.0 SP2 Operations Guide

Windows Server Update Services 3.0 SP2 Operations Guide Windows Server Update Services 3.0 SP2 Operations Guide Microsoft Corporation Author: Anita Taylor Editor: Theresa Haynie Abstract This guide describes how to manage Windows Server Update Services 3.0

More information

App Orchestration Setup Checklist

App Orchestration Setup Checklist App Orchestration Setup Checklist This checklist is a convenient tool to help you plan and document your App Orchestration deployment. Use this checklist along with the Getting Started with Citrix App

More information

Recommended Solutions for Installing Symantec Endpoint Protection 12.1.x in Shared and PvD Virtual Machines

Recommended Solutions for Installing Symantec Endpoint Protection 12.1.x in Shared and PvD Virtual Machines Recommended Solutions for Installing Symantec Endpoint Protection 12.1.x in Shared and PvD Virtual Machines Applicability When Symantec Endpoint Protection (SEP 12.1.x is installed in a virtual machine

More information

Airtel PC Secure Trouble Shooting Guide

Airtel PC Secure Trouble Shooting Guide Airtel PC Secure Trouble Shooting Guide Table of Contents Questions before installing the software Q: What is required from my PC to be able to use the Airtel PC Secure? Q: Which operating systems does

More information

Getting started. Symantec AntiVirus Corporate Edition. About Symantec AntiVirus. How to get started

Getting started. Symantec AntiVirus Corporate Edition. About Symantec AntiVirus. How to get started Getting started Symantec AntiVirus Corporate Edition Copyright 2004 Symantec Corporation. All rights reserved. Printed in the U.S.A. 03/04 10223881 Symantec and the Symantec logo are U.S. registered trademarks

More information

Zen Internet. Online Data Backup. Zen Vault Express for Windows. Issue: 2.0.08

Zen Internet. Online Data Backup. Zen Vault Express for Windows. Issue: 2.0.08 Zen Internet Online Data Backup Zen Vault Express for Windows Issue: 2.0.08 Contents 1 Introduction... 3 1.1 System Requirements... 3 2 Installation... 5 2.1 The Setup WIzard... 5 3 The Backup Service...

More information

Sage 100 Standard ERP Version 2013 Supported Platform Matrix Created as of November 21, 2013

Sage 100 Standard ERP Version 2013 Supported Platform Matrix Created as of November 21, 2013 Sage 100 Standard ERP Version 2013 The information in this document applies to Sage 100 Standard ERP Version 2013 1. Detailed product update information and support policies can be found on the Sage Online

More information

NE-6416D Updating Your Windows Server 2003 Technology Skills to Windows Server 2008

NE-6416D Updating Your Windows Server 2003 Technology Skills to Windows Server 2008 NE-6416D Updating Your Windows 2003 Technology Skills to Windows Summary Duration Vendor Audience 5 Days Microsoft IT Professionals Published Level Technology 25 October 2011 200 Delivery Method Instructor-led

More information

TABLE OF CONTENTS. User Guide - Windows File System idataagent. Page 1 of 379 OVERVIEW SYSTEM REQUIREMENTS DEPLOYMENT

TABLE OF CONTENTS. User Guide - Windows File System idataagent. Page 1 of 379 OVERVIEW SYSTEM REQUIREMENTS DEPLOYMENT Page 1 of 379 User Guide - Windows File System idataagent TABLE OF CONTENTS OVERVIEW Introduction Key Features Simplified Data Management Point-In-Time Recovery System State SnapProtect Backup Office Communications

More information

Microsoft Security Essentials Installation and Configuration Guide

Microsoft Security Essentials Installation and Configuration Guide Microsoft Security Essentials Installation and Configuration Guide This installation guide is for users who are intending to download the software from Microsoft s web site. If you are not intending on

More information

Quick Start - Virtual Server idataagent (Microsoft/Hyper-V)

Quick Start - Virtual Server idataagent (Microsoft/Hyper-V) Page 1 of 19 Quick Start - Virtual Server idataagent (Microsoft/Hyper-V) TABLE OF CONTENTS OVERVIEW Introduction Key Features Complete Virtual Machine Protection Granular Recovery of Virtual Machine Data

More information

Getting started. Symantec AntiVirus Corporate Edition 8.1 for Workstations and Network Servers

Getting started. Symantec AntiVirus Corporate Edition 8.1 for Workstations and Network Servers Getting started Symantec AntiVirus Corporate Edition 8.1 for Workstations and Network Servers Copyright 2003 Symantec Corporation. All rights reserved. Printed in the U.S.A. 03/03 Symantec and the Symantec

More information