For computers that are running Windows Server 2008 R2, Windows Server 2008, Windows Server 2003, Windows 2000, Windows XP, or Windows Vista
|
|
- Edward Harvey
- 8 years ago
- Views:
Transcription
1 Article ID: Last Review: September 4, Revision: 11.0 Virus scanning recommendations for computers that are running Windows Server 2008 Windows Server 2008, Windows Server 2003, Windows 2000, Windows XP, or Windows Vista This article contains recommendations that may help you protect a computer that is running Windows Server 2 R2, Windows Server 2008, Windows Server 2003, Microsoft Windows 2000, Windows XP, or Windows Vista fro viruses. This article also contains information to help you minimize the effect of antivirus software on system a network performance. For computers that are running Windows Server 2008 R2, Windows Server 2008, Windows Server 2003, Windows 2000, Windows XP, or Windows Vista Do not scan the following files and folders. These files are not at risk of infection. If you scan these files, seriou performance problems may occur because of file locking. Where a specific set of files is identified by name, ex only those files instead of the whole folder. Sometimes, the whole folder must be excluded. Do not exclude an of these based on the file name extension. For example, do not exclude all files that have a.dit extension. Mic has no control over other files that may use the same extensions as the following files: Microsoft Windows Update or Automatic Update related files The Windows Update or Automatic Update database file. This file is located in the following folde %windir%\softwaredistribution\datastore Exclude the Datastore.edb file. The transaction log files. These files are located in the following folder: %windir%\softwaredistribution\datastore\logs Edb*.log Note The wildcard character indicates that there may be several files. Res1.log. The file is named Edbres00001.jrs for Windows Vista and Windows Server 2008 Res2.log. The file is named Edbres00002.jrs for Windows Vista and Windows Server 2008 Edb.chk Tmp.edb The following files in the %windir%\security path should be added to the exclusions list: *.edb *.sdb *.log *.chk Note If these files are not excluded, security databases are typically corrupted, and Grou Policy cannot be applied when you scan the folder. The wildcard character indicates that t may be several files. Specifically, you must exclude the following files: Edb.chk Edb.log *.log Security.sdb in the <drive>:\windows\security\database folder Group Policy related files Group Policy user registry information. These files are located in the following folder: %allusersprofile%\ Exclude the following file: NTUser.pol Group Policy client settings file. These files are located in the following folder: %Systemroot%\system32\GroupPolicy\ Exclude the following file: registry.pol For more information, click the following article numbers to view the articles in the Microsoft Knowledge
2 Base: ( ) On a Windows Server 2003-based computer, registry based policy settings are unexpectedly removed after a user logs on to the computer ( ) Some registry-based policy settings are lost and erro messages are logged in the Application log on a Windows XP-based computer or on a Windows Vista based computer For Windows Server 2008 R2, Windows Server 2008, Windows Server 2003, and Wind 2000 domain controllers Because domain controllers provide an important service to clients, the risk of disruption of their activities from malicious code from a virus must be minimized. Antivirus software is the generally accepted way to lessen the of virus infection. Install and configure antivirus software so that the risk to the domain controller is reduced a much as possible and so that performance is affected as little as possible. The following list contains recommendations to help you configure and install antivirus software on a Windows Server 2008 R2, Windows Server 2008, Windows Server 2003, or on a Windows 2000 domain controller: Warning We recommend that you apply the following specified configuration to a test configuration to make s that in your specific environment it does not introduce unexpected factors or compromise the stability of the system. The risk from too much scanning is that files are inappropriately flagged as having been changed. This results in too much replication in Active Directory. If testing verifies that replication is not affected by the follo recommendations, you can apply the antivirus software to the production environment. Note Specific recommendations from antivirus software vendors may supersede the recommendations in the article. Antivirus software must be installed on all domain controllers in the enterprise. Ideally, try to install suc software on all other server and client systems that have to interact with the domain controllers. It is optimal to catch the virus at the earliest point, such as at the firewall or at the client system where the is first introduced. This prevents the virus from ever reaching the infrastructure systems that the client depend on. Use a version of antivirus software that is designed to work with Active Directory domain controllers an that uses the correct Application Programming Interfaces (APIs) to access files on the server. Older ver of most vendor software inappropriately change file metadata as it is scanned. This causes the File Replication Service engine to recognize a file change and therefore schedule the file for replication. New versions prevent this problem. For more information, click the following article number to view the artic the Microsoft Knowledge Base: ( ) Antivirus, backup, and disk optimization programs that are compatible with the File Replication service Do not use a domain controller to browse the Web or to perform any other activities that may introduce malicious code. When you can, do not use the domain controller as a file sharing server. Virus scanning software must run against all files in those shares, and this can put an unsatisfactory load on the processor and the memory resources of the server Do not put Active Directory or FRS database and log files on NTFS file system compressed volumes. For more information, click the following article number to view the article in the Microsoft Knowledge B ( ) Issues with Jet Databases on compressed drives Do not scan the following files and folders. These files are not at risk of infection, and if you include the this may cause serious performance problems because of file locking. Where a specific set of files is identified by name, exclude only those files instead of the whole folder. Sometimes, the whole folder m be excluded. Do not exclude any of these based on the file-name extension. For example, do not exclud files that have a.dit extension. Microsoft has no control over other files that may use the same extensi those shown here. Important This section, method, or task contains steps that tell you how to modify the registry. Howe serious problems might occur if you modify the registry incorrectly. Therefore, make sure that you follo these steps carefully. For added protection, back up the registry before you modify it. Then, you can re the registry if a problem occurs. For more information about how to back up and restore the registry, c the following article number to view the article in the Microsoft Knowledge Base: ( ) How to back up and restore the registry in Windows Active Directory and Active Directory-related files: Main NTDS database files. The location of these files is specified in the following registry HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\NTDS\Parameters\DSA
3 Database File The default location is %windir%\ntds. Ntds.dit Ntds.pat Active Directory transaction log files. The location of these files is specified in the followin registry key: HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\NTDS\Parameters\Datab Log Files Path The default location is %windir%\ntds. EDB*.log (The wildcard character indicates that there may be several files.) Res1.log (The file is named Edbres00001.jrs for Windows Vista, Windows Server 2008 and Windows Server 2008 R2.) Res2.log (The file is named Edbres00001.jrs for Windows Vista, Windows Server 2008 and Windows Server 2008 R2.) Ntds.pat Note Windows Server 2003 no longer uses the Ntds.pat file. The NTDS Working folder that is specified in the following registry key: HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\NTDS\Parameters\DSA Working Directory Temp.edb Edb.chk SYSVOL files: The File Replication Service (FRS) Working folder that is specified in the following registry HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\NtFrs\Parameters\Work Directory FRS Working Dir\jet\sys\edb.chk FRS Working Dir\jet\ntfrs.jdb FRS Working Dir\jet\log\*.log The FRS Database Log files that are located in the following registry key: HKEY_LOCAL_MACHINE\system\currentcontrolset\services\NtFrs\Parameters\DB Log File Directory The default location is %windir%\ntfrs. FRS Working Dir\jet\log\*.log (if the registry key is not set) FRS Working Dir\jet\log\edbres00001.jrs (Windows Vista, Windows Server 2008, and Windows Server 2008 R2) FRS Working Dir\jet\log\edbres00002.jrs (Windows Vista, Windows Server 2008, and Windows Server 2008 R2) DB Log File Directory\log\*.log (if the registry key is set) The Staging folder that is specified in the following registry key and all the Staging folder folders: HKEY_LOCAL_MACHINE\system\currentcontrolset\services\NtFrs\Parameters\Replica Sets\GUID\Replica Set Stage The current location of the Staging folder and all its sub-folders is the file system reparse of the replica set staging folders. Staging defaults to the following location: %systemroot%\sysvol\staging areas The current location of the SYSVOL\SYSVOL folder and all its sub-folders is the file system reparse target of the replica set root. The SYSVOL\SYSVOL folder defaults to the followin location: %systemroot%\sysvol\sysvol The FRS Preinstall folder that is in the following location: Replica_root\DO_NOT_REMOVE_NtFrs_PreInstall_Directory The Preinstall folder is always open when FRS is running.
4 In summary, the targeted and excluded list of folders for a SYSVOL tree that is placed in its defa location would look similar to the following: 1. %systemroot%\sysvol Exclude 2. %systemroot%\sysvol\domain Scan 3. %systemroot%\sysvol\domain\do_not_remove_ntfrs_preinstall_directory Exclude 4. %systemroot%\sysvol\domain\policies Scan 5. %systemroot%\sysvol\domain\scripts Scan 6. %systemroot%\sysvol\staging Exclude 7. %systemroot%\sysvol\staging areas Exclude 8. %systemroot%\sysvol\sysvol Exclude If any one of these folder or files have been moved or placed in a different location, scan or excl the equivalent element. DFS The same resources that are excluded for a SYSVOL replica set must also be excluded when FRS used to replicate shares that are mapped to the DFS root and link targets on Windows Server 20 based, Windows Server 2003-based, or Windows 2000-based member computers or domain controllers. DHCP By default, DHCP files that should be excluded are present in the following folder on the server: %systemroot%\system32\dhcp Note You should exclude all files and subfolders that exist in this folder. The location of DHCP files can be changed. To determine the current location of the DHCP files o server, check the DatabasePath, DhcpLogFilePath, and BackupDatabasePath parameters u the following registry subkey: HKEY_LOCAL_MACHINE\System\CurrentControlSet\services\DHCPServer\Parameters For Windows Server 2008, Windows Server 2003, and Windows 2000 domain controlle DNS: You should exclude all files and subfolders that exist in the following folder: %systemroot%\system32\dns WINS: You should exclude all files and subfolders that exist in the following folder: %systemroot%\system32\wins APPLIES TO Windows Server 2008 Standard Windows Server 2008 Standard without Hyper-V Windows Server 2008 Enterprise Windows Server 2008 Enterprise without Hyper-V Windows Server 2008 Datacenter Windows Server 2008 Datacenter without Hyper-V Windows Server 2008 for Itanium-Based Systems Microsoft Windows Server 2003, Datacenter Edition (32-bit x86) Microsoft Windows Server 2003, Enterprise Edition (32-bit x86) Microsoft Windows Server 2003, Standard Edition (32-bit x86) Microsoft Windows XP Professional Microsoft Windows XP Home Edition Microsoft Windows XP Tablet PC Edition Microsoft Windows XP Media Center Edition 2005 Update Rollup 2 Microsoft Windows 2000 Advanced Server Microsoft Windows 2000 Professional Edition Microsoft Windows 2000 Datacenter Server Microsoft Windows 2000 Server
5 Windows Vista Business Windows Vista Business 64-bit Edition Windows Vista Enterprise Windows Vista Enterprise 64-bit Edition Windows Vista Home Basic Windows Vista Home Basic 64-bit Edition Windows Vista Home Premium Windows Vista Home Premium 64-bit Edition Windows Vista Ultimate Windows Server 2008 Foundation Windows Server 2008 R2 Datacenter Windows Server 2008 R2 Datacenter without Hyper-V Windows Server 2008 R2 Enterprise Windows Server 2008 R2 Enterprise without Hyper-V Windows Server 2008 R2 Standard Windows Server 2008 R2 Standard without Hyper-V Windows Web Server 2008 R2 Keywords: kbinfo kbprb KB Get Help Now Contact a support professional by , Online, or Phone Help and Support 2009 Micro
BitDefender Security for File Servers RECOMMENDED CONFIGURATION
BitDefender Security for File Servers RECOMMENDED CONFIGURATION Summary Computers running Windows Server 2003, Windows 2000 or Windows XP... 3 Computers Running Windows Server 2003 and Windows 2000 Domain
More informationBACKUP & RESTORE (FILE SYSTEM)
Table of Contents Table of Contents... 1 Perform a Backup (File System)... 1 What Gets Backed Up... 2 What Does Not Get Backed Up... 3 Perform a Restore... 4 Perform a Backup (File System) The following
More informationDirectory Backup and Restore
Directory Backup and Restore Overview Active Directory is backed up as part of system state, a collection of system components that depend on each other. You must backup and restore system state components
More informationImplementing Microsoft File Exclusions in Trend Micro OfficeScan 8.0
A Trend Micro TrendEdge Solution Advanced Technologies and Techniques to Enhance Your Product Implementing Microsoft File Exclusions in Trend Micro OfficeScan 8.0 Mike Canavan Senior Solutions Architect
More informationMcAfee VirusScan Enterprise 8.8 Best Practices Guide
Best Practices Guide COPYRIGHT Copyright 2010 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system, or translated into
More informationms-help://ms.technet.2005mar.1033/enu_kbntrelease/ntrelease/308406.htm
Page 1 of 12 Knowledge Base FRS Event Log Error Codes PSS ID Number: 308406 Article Last Modified on 10/13/2004 The information in this article applies to: Microsoft Windows 2000 Server Microsoft Windows
More informationDefault configuration for the Workstation service and the Server service
Article ID: 887429 - Last Review: November 30, 2007 - Revision: 2.4 Overview of Message Block signing INTRODUCTION This article describes Message Block (SMB) signing. SMB signing is a security mechanism
More informationHow to install Small Business Server 2003 in an existing Active
Page 1 of 6 How to install Small Business Server 2003 in an existing Active Directory domain INTRODUCTION This article describes how to install a Microsoft Windows Small Business Server (SBS) 2003-based
More informationSTATISTICA VERSION 9 STATISTICA ENTERPRISE INSTALLATION INSTRUCTIONS FOR USE WITH TERMINAL SERVER
Notes: STATISTICA VERSION 9 STATISTICA ENTERPRISE INSTALLATION INSTRUCTIONS FOR USE WITH TERMINAL SERVER 1. These instructions focus on installation on Windows Terminal Server (WTS), but are applicable
More informationHands-On Microsoft Windows Server 2008
Hands-On Microsoft Windows Server 2008 Chapter 10 Managing System Reliability and Availability Using and Configuring Event Viewer Event Viewer Houses the event logs that record information about all types
More informationActive Directory backup and restore with Acronis Backup & Recovery 10
Active Directory backup and restore with Acronis Backup & Recovery 10 Table of Contents 1. Introduction... 3 2. Backup and Recovery overview... 3 3. Active Directory backup... 3 4. Active Directory recovery...
More informationHow to troubleshoot MS DTC firewall issues
Page 1 of 5 Article ID: 306843 - Last Review: October 29, 2007 - Revision: 5.3 How to troubleshoot MS DTC firewall issues Retired KB Content Disclaimer This article was previously published under Q306843
More informationInstalling Active Directory
Installing Active Directory 119 Installing Active Directory Installing Active Directory is an easy and straightforward process as long as you planned adequately and made the necessary decisions beforehand.
More informationFeatures - Microsoft Data Protection Manager
Page 1 of 63 Features - Microsoft Data Protection Manager TABLE OF CONTENTS OVERVIEW SYSTEM REQUIREMENTS - MICROSOFT DATA PROTECTION MANAGER INSTALLATION Install the Microsoft Data Protection Manager BACKUP
More informationKB259302 - Windows 2000 DNS Event Messages 1 Through 1614
Page 1 of 6 Knowledge Base Windows 2000 DNS Event Messages 1 Through 1614 PSS ID Number: 259302 Article Last Modified on 10/29/2003 The information in this article applies to: Microsoft Windows 2000 Server
More informationModule 10: Maintaining Active Directory
Module 10: Maintaining Active Directory Contents Overview 1 Lesson: Introduction to Maintaining Active Directory 2 Lesson: Moving and Defragmenting the Active Directory Database 6 Lesson: Backing Up Active
More information1. Overview... 2 Documentation... 2 Licensing... 2 Operating system considerations... 2
User Guide BackupAssist User Guides explain how to create and modify backup jobs, create backups and perform restores. These steps are explained in more detail in a guide s respective whitepaper. Whitepapers
More informationNetworking Best Practices Guide. Version 6.5
Networking Best Practices Guide Version 6.5 Summer 2010 Copyright: 2010, CCH, a Wolters Kluwer business. All rights reserved. Material in this publication may not be reproduced or transmitted in any form
More informationA+ Guide to Software: Managing, Maintaining, and Troubleshooting, 5e. Chapter 3 Installing Windows
: Managing, Maintaining, and Troubleshooting, 5e Chapter 3 Installing Windows Objectives How to plan a Windows installation How to install Windows Vista How to install Windows XP How to install Windows
More informationThe purpose of this document is to guide you through the installation and configuration of a new ShipGear installation.
The purpose of this document is to guide you through the installation and configuration of a new ShipGear installation. Following is an overview of sections in this document: Section A Installing ShipGear
More informationFaculty Details. : Assistant Professor ( OG. ),Assistant Professor (OG) Course Details. : B. Tech. Batch : 2010-2014. : Information Technology
COURSE FILE (COURSE PLAN) Year : 2012-13 Sem: ODD Faculty Details Name of the Faculty : Mullai.P & Yaashuwanth.C Designation : Assistant Professor ( OG. ),Assistant Professor (OG) Department : Information
More informationDwebs IIS Log Archiver Installation and Configuration Guide for Helm 4
Dwebs IIS Log Archiver Installation and Configuration Guide for Helm 4 Dwebs Ltd http://www.dwebs.ltd.uk January 2009 Doc: Helm 4.1.0.0 Mod Ver: 1.0.0.0 The names of actual companies and products mentioned
More informationWharf T&T Cloud Backup Service User & Installation Guide
Wharf T&T Cloud Backup Service User & Installation Guide Version 1.6 Feb 2013 Table of contents BEFORE YOU INSTALL 3 Page Section 1. Installation of Client Software 5 Section 2. Account Activation 8 Section
More informationAcronis Backup & Recovery 11.5 Quick Start Guide
Acronis Backup & Recovery 11.5 Quick Start Guide Applies to the following editions: Advanced Server for Windows Virtual Edition Advanced Server SBS Edition Advanced Workstation Server for Linux Server
More informationModule 10: Maintaining Active Directory
Module 10: Maintaining Active Directory! Lesson: Backing Up Active Directory Topic: How to Back Up Active Directory! Lesson: Restoring Active Directory Topic: How to Perform a Primary Restore! Lesson:
More informationAbout Recovery Manager for Active
Dell Recovery Manager for Active Directory 8.6.1 May 30, 2014 These release notes provide information about the Dell Recovery Manager for Active Directory release. About Resolved issues Known issues System
More informationBackup and Disaster Recovery Restoration Guide
Backup and Disaster Recovery Restoration Guide Page 1 Table of Contents Table of Contents...2 Terms of Use...3 BDR...4 Creating Point-in-Time Restoration Volumes...4 Mounting a Restoration Volume...4 Dismounting
More informationBackup and Restore of CONFIGURATION Object on Windows 2008
Backup and Restore of CONFIGURATION Object on Windows 2008 Technical Whitepaper Contents Introduction... 3 CONFIGURATION Backup... 3 Windows configuration objects... 3 Active Directory... 4 DFS... 4 DHCP
More informationDell Recovery Manager for Active Directory 8.6.3
Dell Recovery Manager for Active Directory 8.6.3 May 15, 2015 These release notes provide information about the Dell Recovery Manager for Active Directory release. Resolved Issues Known Issues System Requirements
More informationInstallation Instruction STATISTICA Enterprise Server
Installation Instruction STATISTICA Enterprise Server Notes: ❶ The installation of STATISTICA Enterprise Server entails two parts: a) a server installation, and b) workstation installations on each of
More informationKaspersky Lab Scan Exclusions by Application
Kaspersky Lab Scan Exclusions by Application One of the first steps in the implementation of antivirus protection is creation of antivirus policies. On a product by product basis, software vendors generally
More informationITA Mail Archive Setup Guide
This version of ITA Mail Archive is optimized to archive emails on both Microsoft Exchange 2000 and 2003 and 2007 servers. It is highly recommended that ITA Mail Archive should run on a server other than
More informationFeatures - Workstation Backup Agent
Page 1 of 70 Features - Workstation Backup Agent TABLE OF CONTENTS OVERVIEW SYSTEM REQUIREMENTS System Requirements - Workstation Backup Agent - Source System Requirements - Workstation Backup Agent -
More informationImage Assistant. User Guide. Image Assistant. Laplink Software, Inc. User Guide. The ONLY Way to Restore an Old Image to a New PC!
1 Image Assistant Laplink Software, Inc. Customer Service/Technical Support: Web: http://www.laplink.com/help E-mail: CustomerService@laplink.com Laplink Software, Inc. 14335 NE 24th Street, Suite 201
More informationIntroduction: Using Windows Server 2008 How-To p. 1 How to Educate Yourself About Windows Server 2008 p. 2 How to Benefit from This Book p.
Introduction: Using Windows Server 2008 How-To p. 1 How to Educate Yourself About Windows Server 2008 p. 2 How to Benefit from This Book p. 2 How to Continue Expanding Your Knowledge p. 4 Perform the Installation
More informationModule 2: Implementing an Active Directory Forest and Domain Structure
Contents Overview 1 Lesson: Creating a Forest and Domain Structure 2 Lesson: Examining Active Directory Integrated DNS 22 Lesson: Raising Forest and Domain Functional Levels 36 Lesson: Creating Trust Relationships
More information9. Which is the command used to remove active directory from a domain controller? Answer: Dcpromo /forceremoval
1. What is Active Directory schema? Answer: The schema is the Active Directory component that defines all the objects and attributes that the directory service uses to store data. 2. What is global catalog
More informationPrerequisites Guide. Version 4.0, Rev. 1
Version 4.0, Rev. 1 Contents Software and Hardware Prerequisites Guide... 2 anterradatacenter Version selection... 2 Required Software Components... 2 Sage 300 Construction and Real Estate ODBC... 2 Pervasive
More information1.0 Hardware Requirements:
01 - ServiceDesk Plus - Best Practices We appreciate you choosing ServiceDesk Plus for your organization to deliver world-class IT services. Before installing the product, take a few minutes to go through
More informationThis article was previously published under Q216498 SUMMARY
Article ID: 216498 - Last Review: September 11, 2011 - Revision: 12.0 How to remove data in Active Directory after an unsuccessful domain controller demotion System Tip This article applies to a different
More informationInstallation Instruction STATISTICA Enterprise Small Business
Installation Instruction STATISTICA Enterprise Small Business Notes: ❶ The installation of STATISTICA Enterprise Small Business entails two parts: a) a server installation, and b) workstation installations
More informationPearl Echo Installation Checklist
Pearl Echo Installation Checklist Use this checklist to enter critical installation and setup information that will be required to install Pearl Echo in your network. For detailed deployment instructions
More informationHow to Copy A SQL Database SQL Server Express (Making a History Company)
How to Copy A SQL Database SQL Server Express (Making a History Company) These instructions are written for use with SQL Server Express. Check with your Network Administrator if you are not sure if you
More informationPlanning Domain Controller Capacity
C H A P T E R 4 Planning Domain Controller Capacity Planning domain controller capacity helps you determine the appropriate number of domain controllers to place in each domain that is represented in a
More informationWindows Server 2003 Service Pack 1 (SP1) or later service packs Enhanced version of Ntdsutil.exe
Article ID: 216498 - Last Review: February 3, 2010 - Revision: 11.0 How to remove data in Active Directory after an unsuccessful domain controller demotion System Tip This article applies to a different
More informationStep-by-Step Guide to Securing Windows XP Professional with Service Pack 2 in Small and Medium Businesses
Step-by-Step Guide to Securing Windows XP Professional with Service Pack 2 in Small and Medium Businesses 2004 Microsoft Corporation. All rights reserved. This document is for informational purposes only.
More informationActive Directory backup and restore with Acronis Backup & Recovery 11. Technical white paper. o o. Applies to the following editions: Advanced Server
Active Directory backup and restore with Acronis Backup & Recovery 11 Technical white paper Applies to the following editions: Advanced Server Virtual Edition o o o Advanced Server SBS Edition Advanced
More informationSTATISTICA VERSION 12 STATISTICA ENTERPRISE SMALL BUSINESS INSTALLATION INSTRUCTIONS
STATISTICA VERSION 12 STATISTICA ENTERPRISE SMALL BUSINESS INSTALLATION INSTRUCTIONS Notes 1. The installation of STATISTICA Enterprise Small Business entails two parts: a) a server installation, and b)
More information2014 Electrical Server Installation Guide
2014 Electrical Server Installation Guide TITLE: 2014 Electrical Server Installation Guide DATE: September 2013 SUBJECT: ABSTRACT: Installation guide for SolidWorks Electrical 2014 on the server Guide
More informationNetwork System Management. Creating an Active Directory Domain
Network System Management Creating an Active Directory Domain Objectives Identify the procedures involved in the promotion of a stand-alone Windows Server to an active directory services (ADS) domain controller
More informationSophos Anti-Virus for NetApp Storage Systems startup guide. Runs on Windows 2000 and later
Sophos Anti-Virus for NetApp Storage Systems startup guide Runs on Windows 2000 and later Document date: July 2007 Contents About this guide...4 About Sophos Anti-Virus for NetApp Storage Systems...5
More informationSymantec Mail Security for Domino
Getting Started Symantec Mail Security for Domino About Symantec Mail Security for Domino Symantec Mail Security for Domino is a complete, customizable, and scalable solution that scans Lotus Notes database
More informationAXIS 70U - Using Scan-to-File
AXIS 70U - Using Scan-to-File Introduction This document describes the Scan-to-File feature in the AXIS 70U. The step-by-step instructions describe the process of configuring the AXIS 70U and an FTP server.
More informationFAQ. How does the new Big Bend Backup (powered by Keepit) work?
FAQ How does the new Big Bend Backup (powered by Keepit) work? Once you establish which of the folders on your hard drive you ll be backing up, you ll log into myaccount.bigbend.net and from your control
More informationUser Guide. CTERA Agent. August 2011 Version 3.0
User Guide CTERA Agent August 2011 Version 3.0 Copyright 2009-2011 CTERA Networks Ltd. All rights reserved. No part of this document may be reproduced in any form or by any means without written permission
More informationSoftDent Practice Management Software. Technician s Installation Guide
SoftDent Practice Management Software Technician s Installation Guide Notice Carestream Dental LLC, 2014. No part of this publication may be reproduced, stored in a retrieval system, translated to another
More informationDell Recovery Manager for Active Directory 8.6.0
Dell Recovery Manager for Active Directory 8.6.0 April, 2014 These release notes provide information about the Recovery Manager for Active Directory release. About Recovery Manager for Active Directory
More informationGetting started. Symantec AntiVirus Corporate Edition. About Symantec AntiVirus. How to get started
Getting started Corporate Edition Copyright 2005 Corporation. All rights reserved. Printed in the U.S.A. 03/05 PN: 10362873 and the logo are U.S. registered trademarks of Corporation. is a trademark of
More informationTABLE OF CONTENTS. Quick Start - Windows File System idataagent. Page 1 of 44 OVERVIEW SYSTEM REQUIREMENTS DEPLOYMENT
Page 1 of 44 Quick Start - Windows File System idataagent TABLE OF CONTENTS OVERVIEW Introduction Key Features Simplified Data Management Point-In-Time Recovery System State SnapProtect Backup Office Communications
More informationCreating a Domain Tree
156 Chapter 4 Installing and Managing Trees and Forests Using the Active Directory Installation Wizard, you can quickly and easily create new domains by promoting a Windows Server 2008 stand-alone server
More informationSymantec AntiVirus Corporate Edition Patch Update
Symantec AntiVirus Corporate Edition Patch Update Symantec AntiVirus Corporate Edition Update Documentation version 10.0.1.1007 Copyright 2005 Symantec Corporation. All rights reserved. Symantec, the Symantec
More informationAppendix B Lab Setup Guide
JWCL031_appB_467-475.indd Page 467 5/12/08 11:02:46 PM user-s158 Appendix B Lab Setup Guide The Windows Server 2008 Applications Infrastructure Configuration title of the Microsoft Official Academic Course
More informationTEMA Floating licence
TEMA Floating licence 1. Install TEMA on the server with the configuration code labelled on the CD cover or received from Image Systems AB. When installing TEMA with a floating licence, the licence server
More informationActive Directory Infrastructure Design Document
Active Directory Infrastructure Design Document Written By Sainath KEV Microsoft MVP Directory Services Microsoft Author TechNet Magazine, Microsoft Operations Framework Microsoft Speaker - Singapore Document
More informationUpgrading Client Security and Policy Manager in 4 easy steps
Page 1 of 13 F-Secure White Paper Upgrading Client Security and Policy Manager in 4 easy steps Purpose This white paper describes how to easily upgrade your existing environment running Client Security
More informationZmanda Cloud Backup Frequently Asked Questions
Zmanda Cloud Backup Frequently Asked Questions Release 4.1 Zmanda, Inc Table of Contents Terminology... 4 What is Zmanda Cloud Backup?... 4 What is a backup set?... 4 What is amandabackup user?... 4 What
More informationAdvanced Event Viewer Manual
Advanced Event Viewer Manual Document version: 2.2944.01 Download Advanced Event Viewer at: http://www.advancedeventviewer.com Page 1 Introduction Advanced Event Viewer is an award winning application
More informationUse QNAP NAS for Backup
Use QNAP NAS for Backup BACKUP EXEC 12.5 WITH QNAP NAS Copyright 2010. QNAP Systems, Inc. All Rights Reserved. V1.0 Document revision history: Date Version Changes Apr 2010 1.0 Initial release Note: Information
More informationConfiguring Event Log Monitoring With Sentry-go Quick & Plus! monitors
Configuring Event Log Monitoring With Sentry-go Quick & Plus! monitors 3Ds (UK) Limited, November, 2013 http://www.sentry-go.com Be Proactive, Not Reactive! Many server-based applications, as well as Windows
More informationPlanning for Windows Server 2008 Servers
Planning for Windows Server 2008 Servers Course Number: 6430B Course Length: 3 Days Course Overview This 3-day course is intended for IT pros who are interested in the knowledge and skills necessary to
More informationCONSTRUCTION / SERVICE BILLING SYSTEM SPECIFICATIONS
CONSTRUCTION / SERVICE BILLING SYSTEM SPECIFICATIONS Jonas Software, March 2013 Contents Introduction... 3 Hardware Specifications... 4 Recommended Server Hardware Specifications... 4 Recommended Workstation
More informationSTATISTICA VERSION 10 STATISTICA ENTERPRISE SERVER INSTALLATION INSTRUCTIONS
Notes: STATISTICA VERSION 10 STATISTICA ENTERPRISE SERVER INSTALLATION INSTRUCTIONS 1. The installation of the STATISTICA Enterprise Server entails two parts: a) a server installation, and b) workstation
More informationCharter Business Desktop Security Administrator's Guide
Charter Business Desktop Security Administrator's Guide Table of Contents Chapter 1: Introduction... 4 Chapter 2: Getting Started... 5 Creating a new user... 6 Recovering and changing your password...
More informationMigrating MSDE to Microsoft SQL 2008 R2 Express
How To Updated: 11/11/2011 2011 Shelby Systems, Inc. All Rights Reserved Other brand and product names are trademarks or registered trademarks of the respective holders. If you are still on MSDE 2000,
More informationSecurity Maintenance Practices. IT 4823 Information Security Administration. Patches, Fixes, and Revisions. Hardening Operating Systems
IT 4823 Information Security Administration Securing Operating Systems June 18 Security Maintenance Practices Basic proactive security can prevent many problems Maintenance involves creating a strategy
More informationilaw Installation Procedure
ilaw Installation Procedure This guide will provide a reference for a full installation of ilaw Case Management Software. Contents ilaw Overview How ilaw works Installing ilaw Server on a PC Installing
More informationDatabase Operations (Backup/Restore/Move/Manage) Technical Support Engineering Rosslare Security NA For more information please see www.axtraxng.
Database Operations (Backup/Restore/Move/Manage) Technical Support Engineering Rosslare Security NA For more information please see www.axtraxng.com Database management operations may be performed to insure
More informationHyperoo 2 User Guide. Hyperoo 2 User Guide
1 Hyperoo 2 User Guide 1 2 Contents How Hyperoo Works... 3 Installing Hyperoo... 3 Hyperoo 2 Management Console... 4 The Hyperoo 2 Server... 5 Creating a Backup Array... 5 Array Security... 7 Previous
More informationRecovery Manager for Active Directory Forest Edition 8.6.4
Dell Recovery Manager for Active Directory Forest Edition 8.6.4 May 15, 2015 These release notes provide information about the Dell Recovery Manager for Active Directory Forest Edition release. About About
More informationSAS 9.3 Foundation for Microsoft Windows
Software License Renewal Instructions SAS 9.3 Foundation for Microsoft Windows Note: In this document, references to Microsoft Windows or Windows include Microsoft Windows for x64. SAS software is licensed
More informationAbout Backing Up a Cisco Unity System
CHAPTER 4 Introduction This chapter describes in general terms backing up a Cisco Unity system. When you back up a Cisco Unity server (and one or more Exchange servers) you need to consider the same issues
More informationAdministration guide. Host software WinCCU Installation. Complete gas volume and energy data management
Administration guide Host software WinCCU Installation Complete gas volume and energy data management Contents 1 Introduction... 1 Safety first... 1 Warning... 1 Typographic conventions... 1 Product versioning...
More informationAcronis Backup & Recovery 11
Acronis Backup & Recovery 11 Quick Start Guide Applies to the following editions: Advanced Server Virtual Edition Advanced Server SBS Edition Advanced Workstation Server for Linux Server for Windows Workstation
More informationSOS Suite Installation Guide
SOS Suite Installation Guide rev. 8/31/2010 Contents Overview Upgrading from SOS 2009 and Older Pre-Installation Recommendations Network Installations System Requirements Preparing for Installation Installing
More informationNetwork Setup Instructions
Network Setup Instructions This document provides technical details for setting up the Elite Salon & Spa Management program in a network environment. If you have any questions, please contact our Technical
More informationHow to speed up IDENTIKEY DNS lookup of the Windows Logon DAWL client on Windows 7?
KB 150103 How to speed up IDENTIKEY DNS lookup of the Windows Logon DAWL client on Windows 7? Creation date: 27/05/2013 Last Review: 28/06/2013 Revision number: 2 Document type: How To Security status:
More informationhttp://downloadcenter.trendmicro.com/
Trend Micro Incorporated reserves the right to make changes to this document and to the product described herein without notice. Before installing and using the product, review the readme files, release
More informationSimaPro 7.3.3 database update instructions from SimaPro7.3.0 or older database versions
SimaPro 7.3.3 database update instructions from SimaPro7.3.0 or older database versions SimaPro 7 Technical Note 13, February 2012 Contents SIMAPRO 7.3.3 DATABASE UPDATE INSTRUCTIONS FROM SIMAPRO7.3.0
More informationWindows Server Update Services 3.0 SP2 Operations Guide
Windows Server Update Services 3.0 SP2 Operations Guide Microsoft Corporation Author: Anita Taylor Editor: Theresa Haynie Abstract This guide describes how to manage Windows Server Update Services 3.0
More informationApp Orchestration Setup Checklist
App Orchestration Setup Checklist This checklist is a convenient tool to help you plan and document your App Orchestration deployment. Use this checklist along with the Getting Started with Citrix App
More informationRecommended Solutions for Installing Symantec Endpoint Protection 12.1.x in Shared and PvD Virtual Machines
Recommended Solutions for Installing Symantec Endpoint Protection 12.1.x in Shared and PvD Virtual Machines Applicability When Symantec Endpoint Protection (SEP 12.1.x is installed in a virtual machine
More informationAirtel PC Secure Trouble Shooting Guide
Airtel PC Secure Trouble Shooting Guide Table of Contents Questions before installing the software Q: What is required from my PC to be able to use the Airtel PC Secure? Q: Which operating systems does
More informationGetting started. Symantec AntiVirus Corporate Edition. About Symantec AntiVirus. How to get started
Getting started Symantec AntiVirus Corporate Edition Copyright 2004 Symantec Corporation. All rights reserved. Printed in the U.S.A. 03/04 10223881 Symantec and the Symantec logo are U.S. registered trademarks
More informationZen Internet. Online Data Backup. Zen Vault Express for Windows. Issue: 2.0.08
Zen Internet Online Data Backup Zen Vault Express for Windows Issue: 2.0.08 Contents 1 Introduction... 3 1.1 System Requirements... 3 2 Installation... 5 2.1 The Setup WIzard... 5 3 The Backup Service...
More informationSage 100 Standard ERP Version 2013 Supported Platform Matrix Created as of November 21, 2013
Sage 100 Standard ERP Version 2013 The information in this document applies to Sage 100 Standard ERP Version 2013 1. Detailed product update information and support policies can be found on the Sage Online
More informationNE-6416D Updating Your Windows Server 2003 Technology Skills to Windows Server 2008
NE-6416D Updating Your Windows 2003 Technology Skills to Windows Summary Duration Vendor Audience 5 Days Microsoft IT Professionals Published Level Technology 25 October 2011 200 Delivery Method Instructor-led
More informationTABLE OF CONTENTS. User Guide - Windows File System idataagent. Page 1 of 379 OVERVIEW SYSTEM REQUIREMENTS DEPLOYMENT
Page 1 of 379 User Guide - Windows File System idataagent TABLE OF CONTENTS OVERVIEW Introduction Key Features Simplified Data Management Point-In-Time Recovery System State SnapProtect Backup Office Communications
More informationMicrosoft Security Essentials Installation and Configuration Guide
Microsoft Security Essentials Installation and Configuration Guide This installation guide is for users who are intending to download the software from Microsoft s web site. If you are not intending on
More informationQuick Start - Virtual Server idataagent (Microsoft/Hyper-V)
Page 1 of 19 Quick Start - Virtual Server idataagent (Microsoft/Hyper-V) TABLE OF CONTENTS OVERVIEW Introduction Key Features Complete Virtual Machine Protection Granular Recovery of Virtual Machine Data
More informationGetting started. Symantec AntiVirus Corporate Edition 8.1 for Workstations and Network Servers
Getting started Symantec AntiVirus Corporate Edition 8.1 for Workstations and Network Servers Copyright 2003 Symantec Corporation. All rights reserved. Printed in the U.S.A. 03/03 Symantec and the Symantec
More information