Mercer County Community College
|
|
- Winifred Scott
- 8 years ago
- Views:
Transcription
1 Mercer County Community College Division of Business and Technology NET 250 COURSE DESCRIPTION: This course introduces students to basic NetWare network administration, including connecting to the network, login and file security, login scripts and printing. Text (s): Reference Division Booklist Prerequisites: NET101 & NET106 (295) or A+ Certification, & NET104 (283) or Network + Certification Credits: 3 Lecture Hours: 2 Studio/Lab Hours: 2 Food and Drink are strictly prohibited in classrooms as per Health and Safety Laws. Students may not bring in chemicals of any kind without the appropriate MSD sheets. Course Coordinator: Jeff Weichert Latest Review: Fall 2003
2 I. EVALUATION Final grades are determined by a weighted average of midterm and final examinations, quizzes, laboratory assignments, homework assignments, class participation, and attendance. Your final grade in the course will be based on the following: Class attendance and participation 10% Homework assignments 15% Laboratory assignments 15% Quizzes 20% Midterm examination 20% Final examination 20% 100% II. GENERAL OBJECTIVES 1. Students will be able to describe a NetWare network. 2. Students will be able to set up and manage NetWare Resources. 3. Students will be able to set up and manage network printing. 4. Students will be able to administer NetWare file systems and security. 5. Students will be able to install NetWare. 6. Students will learn about other NetWare topics, including login scripts, application management, and workstation management. 2
3 NET Course Outline Section 1: Introduction to NetWare and NDS A Network and its Components What NetWare Is The Responsibilities of a Network Administrator The Resources and Services You Administer Novell Directory Services, the Directory, and NDS Objects Composition of the Directory Types of Objects The NDS Tree Structure The Role of NDS The Benefits of NDS Using NetWare Administrator to Browse the NDS Tree Understanding the EMA Organization Viewing and Browsing the NDS Tree How the NDS Tree Affects Resource Access Object Name Attributes Understanding Context Object-Naming Rules Section 2: Using a Workstation Understanding Workstation Communication with the Network The Workstation Hardware and its Function The Workstation Software and its Function The Novell Client Software The Workstation Operating System Workstation Applications The Workstation Model: Dataflow Between Workstation Hardware and Software Installing the Novell Client Software Configuration Options for Novell Client and Windows The Login Procedure Login Concepts The Login Process Browsing Network Resources Viewing NDS Objects Additional Novell Client Browsing Features Installing and Configuring a Browser Browser Clients and Operating Systems Java and the Browser Installing the Netscape Navigator Browser 3
4 NET Section 3: Setting Up and Managing Network Access for Users The Function of a User Object Creating and Modifying User Accounts Using NetWare Administrator Creating a User Account The Template Object The Admin Object Modifying User Accounts Creating User Objects Using ConsoleOne Creating User Objects using UIMPORT Control File: Import Control Parameters Executing UIMPORT Types of Network Security Provided by NetWare Establishing Login Security User Account Restrictions Intruder Detection Authentication Section 4: Printing with Novell Distributed Print Services Network Printing with NDPS NDPS Components and their Functions The Printer Agent The NDPS Manager Gateways NDPS Broker NDPS Printer Types Public Access Printers Controlled Access Printers Configuring the Network for NDPS Creating and Loading an NDPS Manager Assigning Printer Agents to the NDPS Manager Configuring Workstations to Print to NDPS Printers Configuring NDS to Download Printer Drivers Manually Configuring a Workstation Managing NDPS Printing Managing Printer Access Managing Print Jobs 4
5 NET Section 5: Managing the File System Introduction Understanding the File System Components Understanding Basic File System Management Skills Managing the File System with the FILER and NetWare Administrator Utilities File Management Using NetWare Administrator File Management Using FILER Viewing File System Information Using NetWare Administrator and Windows Viewing Volume Information with NetWare Administrator Viewing Directory Information with NetWare Administrator Viewing File Information with NetWare Administrator Viewing File System Information in Windows Accessing the File System Mapping Network Drives with Windows Selecting Utilities for Managing the Directory Structure Selecting Utilities for Managing Files Copying Files Salvaging Deleted Files Purging Deleted Files Managing Volume Space View Volume Space Usage Information Listing Files by Access Date, Owner, and Size Restricting Space Usage Changing File or Directory Ownership Setting File Compression Block Sub-allocation Managing Data Migration Section 6: Managing File System Security How File System Security Works Directory and File Rights Trustees NDS Objects as Trustees Inheritance Blocking Inherited Rights Effective Rights Planning File System Rights Planning Rights from the Top Down Planning Trustee Assignments Based on Group Rights Planning File and Directory Attribute Security 5
6 NET Section 7: Creating and Managing Login Scripts The Types of Login Scripts and How They Interrelate Container Login Script Profile Login Script User Login Script Default Login Script Designing Login Script Systems Suggested Contents for Each Type of Login Script Using the MAP command in Login Scripts Mapping Drives to Volumes Mapping Drives to Directories Mapping Network Search Drives Mapping a Drive to a Directory Map Object Creating, Executing, and Debugging Login Scripts Login Script Commands and Identifier Variables Container Login Script Example Profile Login Script Example User Login Script Example Using the Login Utility to Edit Login Scripts Script Page Variables Window Section 8: Managing NDS Security NDS Security Similarities and Differences of File System and NDS Security Controlling Access to NDS Objects Object Trustees Object Rights Property Rights All Property Rights Versus Selected Property Rights Determining Rights Granted to NDS Objects Blocking Inherited Rights Making New Trustee Assignments Blocking Rights with an Inherited Rights Filter (IRF) Determining Effective Rights Rights Guidelines for Implementing NDS Security Troubleshooting NDS Security Using NetWare Administrator Users Who Have Unauthorized Access Users Who Can t Access a Resource 6
7 NET Section 9: Distributing and Managing Network Applications with Z.E.N. works The Benefits of Using Application Launcher Network Administrator Benefits User Benefits The Components of Application Launcher Application Launcher Snap-In SnAppShot Application Launcher Window Application Explorer Distributing Applications Using Application Launcher and SnAppShot Creating Application Objects Creating an Application Object Template with SnAppShot Associating Application Objects Making Application Launcher Window and Application Explorer Available Managing Applications with Application Launcher Setting Up an Application s Identification Setting Up and Application s Environment Filtering Applications Setting Up Distribution Schedules Setting Up Load Balancing and Fault Tolerance Section 10: Managing Workstations in an NDS Environment with Z.E.N. works Introduction to Z.E.N. works Z.E.N. works Policy Packages and Policies Types of Z.E.N. works Policy Package Objects Types of Z.E.N. works Policies NDS Design Considerations for Z.E.N. works Registering and Importing Workstations Methods of Registering Workstations Verifying Workstation Registration Importing Workstations The Z.E.N. works Maintenance Schedule Using Policies to Configure the Desktop Environment Customizing Desktop Applications Customizing the Windows User Interface Establishing and Using Remote control Access to Workstations Verify NDS Rights Requirements Verify the Client Requirements Establishing Remote Control Security Parameters Connecting to the Target Workstation Controlling the Target Workstation Ending a Remote control Session Setting Up and Using the Help Requester Application Verify Rights Requirements Verify Software Requirements Distributing Help Requester with Application Launcher Configuring the Help Desk Policy Using the Help Requester to Report Workstation Problems 7
8 NET Section 11: Managing Resources in a Multi-context Environment How the Tree Structure Affects Network Administration NDS Planning Guidelines Providing Access to Resources Setting the User s Current Context at Login Accessing an Object Regardless of Current Context Creating Shortcuts to Accessing and Managing Resources Creating an Alias to an Object Creating an Application or Directory Map Object for File System Resources in Another context Creating Group Objects with Global Membership Guidelines for Setting Up Resources in a Multi-context Environment Actions and Rights Needed to Grant Access Creating Login Scripts That Identify Resources in Other Contexts Section 12: Installing NetWare Understanding NetWare The NetWare Kernel The Server Console NetWare Loadable Modules Performing a Basic NetWare Server Installation Preparing for the Installation Running the Installation Program Providing Information for the Text Screens Completing the Installation Installing Novell Licensing Service Installing NLS on a NetWare Server Installing Licenses on a NetWare Server Managing NetWare User Licenses License Service Provider Object License Container Objects License Certificate Objects Assigning Licenses to Users Installing Additional Licenses 8
9 Classroom Conduct Statement It is the student s responsibility to attend all classes. If a student misses a class meeting for any reason, he/she is responsible for all content that is covered, for announcements made, and for acquiring any materials that may have been distributed in class. It is expected that students be on time for all classes. Students who walk into class after it has begun are expected to choose seats close to where they entered the room so that they do not disrupt the class meeting. Students are expected to follow ordinary rules of courtesy during the class sessions. Engaging in private, side conversations during class time is distracting to other students and to the instructor. Leaving class early without having informed the instructor prior to class is not appropriate. Unless there is an emergency, leaving class and returning while the class is in session is not acceptable behavior. Disruptive behavior of any type, including sharpening pencils during class while someone is speaking, is not appropriate. The college welcomes all students into an environment that creates a sense of community of pride and respect; we are here to work cooperatively and to learn together. Academic Integrity Statement A student who knowingly represents work of others as his/her own, uses or obtains unauthorized assistance in the execution of any academic work, or gives fraudulent assistance to another student is guilty of cheating. The penalty for violating the honor code is severe. (See Student Handbook.) Any student violating the honor code is subject to receive a failing grade for the course and will be reported to the Office of Student Affairs. If a student is unclear about whether a particular situation may constitute an honor code violation, the student should meet with the instructor to discuss the situation. It is permissible to assist classmates in general discussions of computing techniques; general advice and interaction are encouraged. Each person, however, must develop his or her own solutions to the assigned homework and laboratory exercises. Students may not "work together" on graded assignments. Such collaboration constitutes cheating, unless it is a group assignment. A student may not use or copy (by any means) another's work (or portions of it) and represent it as his/her own. 9
MERCER COUNTY COMMUNITY COLLEGE. Division of Business and Technology NET 240
MERCER COUNTY COMMUNITY COLLEGE Division of Business and Technology COURSE DESCRIPTION: Course Description: Students learn, in depth, the various network security principles, features, protocols, and implementations
More informationPrinter Properties Pro User Guide Page 1
Printer Properties Pro User Guide Page 1 Printer Properties Pro User Guide Page 2 Table of Contents Overview of Printer Properties Pro...3 Major Features and Benefits...3 Product Requirements...4 Install
More informationManaging and Maintaining a Microsoft Windows Server 2003 Environment
Managing and Maintaining a Microsoft Windows Server 2003 Environment Course 2273: Five days; Blended (classroom/e-learning) Introduction Elements of this syllabus are subject to change. This course combines
More informationAustralian Government self-audit Instructions
Australian Government self-audit Instructions INTRODUCTION This audit packet is intended for use by Australian Government customers as part of their annual Self Audit or an Assisted Self-Audit conducted
More informationPRINCIPLES OF MARKETING. 3 3 Lecture/Laboratory Hours
- COURSE OUTLINE MKT 101 Course Number PRINCIPLES OF MARKETING Course Title 3 3 Credits Lecture/Laboratory Hours Catalog description (from 2015-2016 course catalog) A study of the process of planning and
More informationLesson Plans Microsoft s Managing and Maintaining a Microsoft Windows Server 2003 Environment
Lesson Plans Microsoft s Managing and Maintaining a Microsoft Windows Server 2003 Environment (Exam 70-290) Table of Contents Table of Contents... 1 Course Overview... 2 Section 0-1: Introduction... 4
More informationDottsConnected SHAREPOINT 2010 ADMIN TRAINING. Exercise 1: Create Dedicated Service Accounts in Active Directory
DottsConnected SHAREPOINT 2010 ADMIN TRAINING Module 1 - Getting started with SharePoint 2010 This introductory module introduces students to the fundamental terminology and architecture of SharePoint
More informationAdministration Quick Start
www.novell.com/documentation Administration Quick Start ZENworks 11 Support Pack 3 February 2014 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of
More informationDeploying Remote Desktop Connection Broker with High Availability Step-by-Step Guide
Deploying Remote Desktop Connection Broker with High Availability Step-by-Step Guide Microsoft Corporation Published: May 2010 Abstract This guide describes the steps for configuring Remote Desktop Connection
More informationNew York City College of Technology Computer Systems Technology Department
New York City College of Technology Computer Systems Technology Department CST 3507/CS507: Advanced Single-LAN Concepts (3 credits, 2 class hours, 2 lab hours) Instructor: Office Phone: Office Hours: Virtual
More informationInstalling GroupWise Monitor
Installing GroupWise Monitor ZENWORKS The new GroupWise Monitor in the GroupWise 5.5 Enhancement Pack provides significant new functionality, including a browser-based interface, a separate server component,
More informationManaging Windows Environments with Group Policy
3 Riverchase Office Plaza Hoover, Alabama 35244 Phone: 205.989.4944 Fax: 855.317.2187 E-Mail: rwhitney@discoveritt.com Web: www.discoveritt.com Managing Windows Environments with Group Policy Course: MS50255C
More informationNE-2273B Managing and Maintaining a Microsoft Windows Server 2003 Environment
NE-2273B Managing and Maintaining a Microsoft Windows Server 2003 Environment Summary Duration Vendor Audience 5 Days Microsoft IT Professionals Published Level Technology 05 October 2005 200 Microsoft
More informationIntroduction to Networking, Network Administration, and NetWare 6.5
2 Introduction to Networking, Network Administration, and NetWare 6.5............................................... Terms you ll need to understand: Bindery NDS edirectory SAN NCS iscsi ifolder eguide
More informationWorkspot Configuration Guide for the Cisco Adaptive Security Appliance
Workspot Configuration Guide for the Cisco Adaptive Security Appliance Workspot, Inc. 1/27/2015 Cisco ASA and Workspot Overview The Cisco Adaptive Security Appliance (ASA) provides organizations with secure,
More informationMGSC 290 Computer Information Systems in Business SYLLABUS Spring 2008
INSTRUCTOR: MGSC 290 Computer Information Systems in Business SYLLABUS Spring 2008 Phil Marshall Office: BA 728 Phone: 803-777-2303 / On campus, you can dial 7-2303. E-mail: Website: Office Hours: Section
More informationACTIVE DIRECTORY DEPLOYMENT
ACTIVE DIRECTORY DEPLOYMENT CASAS Technical Support 800.255.1036 2009 Comprehensive Adult Student Assessment Systems. All rights reserved. Version 031809 CONTENTS 1. INTRODUCTION... 1 1.1 LAN PREREQUISITES...
More informationNovell Remote Manager Administration Guide
www.novell.com/documentation Novell Remote Manager Administration Guide Open Enterprise Server 11 SP2 January 2014 Legal Notices Novell, Inc., makes no representations or warranties with respect to the
More informationManaging and Maintaining a Windows Server 2003 Network Environment
Managing and maintaining a Windows Server 2003 Network Environment. AIM This course provides students with knowledge and skills needed to Manage and Maintain a Windows Server 2003 Network Environment.
More informationManaging Windows Environments with Group Policy 50255D; 5 Days, Instructor-led
Managing Windows Environments with Group Policy 50255D; 5 Days, Instructor-led Course Description In this course you will learn how to reduce costs and increase efficiencies in your network. You will discover
More informationAbila MIP. Installation User's Guide
This is a publication of Abila, Inc. Version 2014.x Copyright 2013 Abila, Inc. All rights reserved. Abila, the Abila logos, and the Abila product and service names mentioned herein are registered trademarks
More informationLearnKey's Windows Server 2003 Managing a Network Environment with Aaron Spurlock
LearnKey's Windows Server 2003 Managing a Network Environment with Aaron Spurlock Syllabus Course Description 5 Sessions - 15 Hours of Interactive Training The Windows Server 2003 Managing a Network Environment
More informationInstallation Instruction STATISTICA Enterprise Server
Installation Instruction STATISTICA Enterprise Server Notes: ❶ The installation of STATISTICA Enterprise Server entails two parts: a) a server installation, and b) workstation installations on each of
More informationMS 50255B: Managing Windows Environments with Group Policy (4 Days)
www.peaklearningllc.com MS 50255B: Managing Windows Environments with Group Policy (4 Days) Introduction In course you will learn how to reduce costs and increase efficiencies in your network. You will
More informationPreparing leaders by blending high-demand tech skills with soft skills. Directory Services. General Course Syllabus. Prerequisites: IT 463
Preparing leaders by blending high-demand tech skills with soft skills. IT 464 Directory Services General Course Syllabus 4 Credits Course Description This course teaches students through lectures, discussions,
More informationMigrating helpdesk to a new server
Migrating helpdesk to a new server Table of Contents 1. Helpdesk Migration... 2 Configure Virtual Web on IIS 6 Windows 2003 Server:... 2 Role Services required on IIS 7 Windows 2008 / 2012 Server:... 2
More informationMigration Strategies and Tools for the HP Print Server Appliance
white paper HP Print Server Appliance 4250 July 2003 Migration Strategies and Tools for the HP Print Server Appliance (Web Jetadmin version 7.2 and above; PSA Firmware version 2.4.x and above) Overview
More informationMS-50255: Managing, Maintaining, and Securing Your Networks Through Group Policy. Course Objectives. Required Exam(s) Price.
MS-50255: Managing, Maintaining, and Securing Your Networks Through Group Policy Discover how to consolidate the administration of an enterprise IT infrastructure with Group Policy. In this four-day instructor
More informationNovell ZENworks Asset Management
Novell ZENworks Asset Management Administrative Best Practices and Troubleshooting www.novell.com APRIL 19, 2005 2 GETTING THE MOST OUT OF NOVELL ZENWORKS ASSET MANAGEMENT The award-winning asset tracking
More informationInstalling Novell Client Software (Windows 95/98)
Installing Novell Client Software (Windows 95/98) Platform: Windows 95/98 Level of Difficulty: Intermediate The following procedure describes how to install the Novell Client software. This software allows
More informationSTATISTICA VERSION 10 STATISTICA ENTERPRISE SERVER INSTALLATION INSTRUCTIONS
Notes: STATISTICA VERSION 10 STATISTICA ENTERPRISE SERVER INSTALLATION INSTRUCTIONS 1. The installation of the STATISTICA Enterprise Server entails two parts: a) a server installation, and b) workstation
More informationAbila MIP. Installation Guide
This is a publication of Abila, Inc. Version 2015.x Copyright 2014 Abila, Inc. All rights reserved. Abila, the Abila logos, and the Abila product and service names mentioned herein are registered trademarks
More informationwww.novell.com/documentation Administration Guide Modular Authentication Services (NMAS) 3.3.4 April 2013
www.novell.com/documentation Administration Guide Modular Authentication Services (NMAS) 3.3.4 April 2013 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents
More information10215A Implementing and Managing Microsoft Server Virtualization
10215A Implementing and Managing Microsoft Server Virtualization About this Course This five-day course will provide you with the knowledge and skills to deploy and manage a server virtualization environment
More informationFileMaker Server 14. FileMaker Server Help
FileMaker Server 14 FileMaker Server Help 2007 2015 FileMaker, Inc. All Rights Reserved. FileMaker, Inc. 5201 Patrick Henry Drive Santa Clara, California 95054 FileMaker and FileMaker Go are trademarks
More informationHELP DOCUMENTATION E-SSOM INSTALLATION GUIDE
HELP DOCUMENTATION E-SSOM INSTALLATION GUIDE Copyright 1998-2013 Tools4ever B.V. All rights reserved. No part of the contents of this user guide may be reproduced or transmitted in any form or by any means
More informationOnDemand. Getting Started Guide
OnDemand Getting Started Guide Copyright Copyright 2009 ACS Technologies Group, Inc. All rights reserved. Reproduction of any part of this publication by mechanical or electronic means, including facsimile
More informationIntroduction to Business. Lecture/Laboratory Hours
COURSE OUTLINE BUS 101 Course Number Division of Business & Technology Division Introduction to Business Course Title 15 Weeks Length of Semester 3 3 Credits Catalog description: Lecture/Laboratory Hours
More informationTAC Vista. Vista FM. Installation Manual. TAC Pangaea WorkStation
TAC Vista TAC Pangaea WorkStation Vista FM Installation Manual TAC Vista Vista FM Installation Manual Copyright 2006-2010 Schneider Electric Buildings AB. All rights reserved. This document, as well as
More informationMULTIFUNCTIONAL DIGITAL SYSTEMS. Software Installation Guide
MULTIFUNCTIONAL DIGITAL SYSTEMS Software Installation Guide 2008-2010 TOSHIBA TEC CORPORATION All rights reserved Under the copyright laws, this manual cannot be reproduced in any form without prior written
More informationImplementing and Managing Microsoft Server Virtualization
Course 10215A: Implementing and Managing Microsoft Server Virtualization Course Details Course Outline Module 1: Evaluating and Planning for Virtualization Describe virtualization as it relates to server,
More informationNETW 193 Syllabus. MCSE Windows 2000 Directory Services Administration. Revised 31 May 2002 Professor Andrew H. Andersen, Jr.
NETW 193 Syllabus MCSE Windows 2000 Directory Services Administration Revised 31 May 2002 Professor Andrew H. Andersen, Jr. COURSE DESCRIPTION In this course, the student will learn to implement and administer
More informationWeb based training for field technicians can be arranged by calling 888-577-4919 These Documents are required for a successful install:
Software V NO. 1.7 Date 9/06 ROI Configuration Guide Before you begin: Note: It is important before beginning to review all installation documentation and to complete the ROI Network checklist for the
More informationCreate, Link, or Edit a GPO with Active Directory Users and Computers
How to Edit Local Computer Policy Settings To edit the local computer policy settings, you must be a local computer administrator or a member of the Domain Admins or Enterprise Admins groups. 1. Add the
More informationGetting Started Guide
Getting Started Guide Microsoft Corporation Published: December 2005 Table of Contents Getting Started Guide...1 Table of Contents...2 Get Started with Windows Server 2003 R2...4 Windows Storage Server
More informationNetworking Best Practices Guide. Version 6.5
Networking Best Practices Guide Version 6.5 Summer 2010 Copyright: 2010, CCH, a Wolters Kluwer business. All rights reserved. Material in this publication may not be reproduced or transmitted in any form
More informationUser's Manual. Intego Remote Management Console User's Manual Page 1
User's Manual Intego Remote Management Console User's Manual Page 1 Intego Remote Management Console for Macintosh 2007 Intego, Inc. All Rights Reserved Intego, Inc. www.intego.com This manual was written
More informationCHIPOLA COLLEGE COURSE SYLLABUS Chipola s website: www.chipola.edu
CHIPOLA COLLEGE COURSE SYLLABUS Chipola s website: www.chipola.edu COURSE TITLE: COURSE NUMBER: Windows Server Administration CTS 2391 COURSE DESCRIPTION (with prerequisites): This course introduces the
More informationNovell Storage ServicesTM File System Administration Guide for Linux
www.novell.com/documentation Novell Storage ServicesTM File System Administration Guide for Linux Open Enterprise Server 11 SP2 January 2014 Legal Notices Novell, Inc., makes no representations or warranties
More informationQuick Scan Features Setup Guide. Scan to E-mail Setup. See also: System Administration Guide: Contains details about E-mail setup.
Quick Scan Features Setup Guide XE3024EN0-2 This guide includes instructions for: Scan to E-mail Setup on page 1 Scan to Mailbox Setup on page 6 Network Scanning Setup on page 9 Scan to PC Setup on page
More informationSECURE MOBILE ACCESS MODULE USER GUIDE EFT 2013
SECURE MOBILE ACCESS MODULE USER GUIDE EFT 2013 GlobalSCAPE, Inc. (GSB) Address: 4500 Lockhill-Selma Road, Suite 150 San Antonio, TX (USA) 78249 Sales: (210) 308-8267 Sales (Toll Free): (800) 290-5054
More informationTable Of Contents. - Microsoft Windows - WINDOWS XP - IMPLEMENTING & SUPPORTING MICROSOFT WINDOWS XP PROFESSIONAL...10
Table Of Contents - - WINDOWS SERVER 2003 MAINTAINING AND MANAGING ENVIRONMENT...1 WINDOWS SERVER 2003 IMPLEMENTING, MANAGING & MAINTAINING...6 WINDOWS XP - IMPLEMENTING & SUPPORTING MICROSOFT WINDOWS
More informationMCSE. 50 Cragwood Rd, Suite 350 South Plainfield, NJ 07080. Victoria Commons, 613 Hope Rd Building #5, Eatontown, NJ 07724
COURSE SYLLABUS MCSE Planning and Maintaining a Microsoft Windows Server 2003 Network Infrastructure (Exam 70-293) Designing a Microsoft Windows Server 2003 Active Directory and Network Infrastructure
More informationPRiSM Security. Configuration and considerations
PRiSM Security Configuration and considerations Agenda Security overview Authentication Adding a User Security Groups Security Roles Asset Roles Security Overview Three Aspects of Security Authentication
More informationLesson Plans LabSim for Microsoft s Managing and Maintaining a Microsoft Windows Server 2003 Environment
Lesson Plans LabSim for Microsoft s Managing and Maintaining a Microsoft Windows Server 2003 Environment (Exam 70-290) Table of Contents Course Overview... 3 Section 0.1: Introduction... 5 Section 0.2:
More informationHELP DOCUMENTATION E-SSOM DEPLOYMENT GUIDE
HELP DOCUMENTATION E-SSOM DEPLOYMENT GUIDE Copyright 1998-2013 Tools4ever B.V. All rights reserved. No part of the contents of this user guide may be reproduced or transmitted in any form or by any means
More informationSouthwestern Michigan College School of Business Dowagiac, Michigan. Course Syllabus FALL SEMESTER 2012
Southwestern Michigan College School of Business Dowagiac, Michigan Course Syllabus FALL SEMESTER 2012 COURSE TITLE: Windows Networking I COURSE NO ISYS 281 SECTION NO.: 2091 CREDITS/CONTACTS: Credit Hours:
More informationSTART YOUR INVENTORY WITH SCANFRE
START YOUR INVENTORY WITH SCANFRE April 2014 LANDPARK SCANFREE «Quickly estimate your data processing systems before considering their evolution. Landpark Scanfree, solution for your IT asset tracking
More informationThis guide provides information to show how to create and manage Riva Dynamic Distribution List policies.
Riva Enterprise Edition Secure Distribution List Guide This Guide Welcome to Riva Managed Applications Dynamic Distribution Lists, a policy-driven method of creating dynamically populated GroupWise distribution
More informationEnterprise Vault. For Microsoft Exchange Server. Installing and Configuring Version 5.0
Enterprise Vault For Microsoft Exchange Server Installing and Configuring Version 5.0 March 2005 This publication and the software it describes are the intellectual property of kvault Software Ltd (KVS).
More informationWebSpy Vantage Ultimate 2.2 Web Module Administrators Guide
WebSpy Vantage Ultimate 2.2 Web Module Administrators Guide This document is intended to help you get started using WebSpy Vantage Ultimate and the Web Module. For more detailed information, please see
More informationProfessional SharePoint Server 2010 Administration
Professional SharePoint Server 2010 Administration Target Audience IT Professionals, Administrators Course Description This accelerated 4-day course has been designed to teach experienced IT Professionals
More informationInstallation and Configuration in Microsoft Dynamics NAV 5.0
Installation and Configuration in Microsoft Dynamics NAV 5.0 8870: Installation and Configuration in Microsoft Dynamics NAV 5.0 (2 Days) About this Course Elements of this syllabus are subject to change.this
More informationChapter. Managing Group Policy MICROSOFT EXAM OBJECTIVES COVERED IN THIS CHAPTER:
Chapter 10 Managing Group Policy MICROSOFT EXAM OBJECTIVES COVERED IN THIS CHAPTER: Implement and troubleshoot Group Policy. Create a Group Policy object (GPO). Link an existing GPO. Delegate administrative
More informationPropalms TSE Quickstart Guide
Propalms TSE Quickstart Guide TSE 7.0 Propalms Ltd. Published February 2013 Overview Note: This guide is based on installation on Windows Server 2012. However, it is also applicable if you are using a
More informationSafeWord Domain Login Agent Step-by-Step Guide
SafeWord Domain Login Agent Step-by-Step Guide Author Johan Loos Date January 2009 Version 1.0 Contact johan@accessdenied.be Table of Contents Table of Contents... 2 Why SafeWord Agent for Windows Domains?...
More informationAdministration: Users and Roles
Last Update: September 2011 Release 7.5 Administration: Users and Roles This lesson is specifically designed for administrators responsible for user security settings in the Astra Schedule system. Astra
More informationCourse 6425C: Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services
Course 6425C: Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services Length: 5 Days Published: June 02, 2011 Language(s): English Audience(s): IT Professionals Level: 200
More informationRSA Authentication Manager 8.1 Help Desk Administrator s Guide
RSA Authentication Manager 8.1 Help Desk Administrator s Guide Contact Information Go to the RSA corporate website for regional Customer Support telephone and fax numbers: www.emc.com/domains/rsa/index.htm
More informationThis policy applies to all instances of LANDesk client software installed on Creighton-owned hardware that are connected to JAYNet.
Page 1 of 5 PURPOSE This Standard supports Client Deployment Policy and provides the additional detail necessary to implement the policy. This standard ensures consistent function and delivery of the LANDesk
More informationSpectrum Technology Platform. Version 9.0. Administration Guide
Spectrum Technology Platform Version 9.0 Administration Guide Contents Chapter 1: Getting Started...7 Starting and Stopping the Server...8 Installing the Client Tools...8 Starting the Client Tools...9
More informationAdministrators Help Manual
Administrators Help Manual Lepide Active Directory Self Service Lepide Software Private Limited Page 1 Administrators Help Manual for Active Directory Self-Service Lepide Active Directory Self Service
More informationBergen Community College. Information Technology Course Syllabus
Course Title: INF-272 Network Security Using Group Policy Credits/Hours: 2 lectures, 2 labs, 3 credits Bergen Community College Information Technology Course Syllabus Prerequisite: INF-160 OR INF-170 OR
More informationMAS 90. Installation and System Administrator's Guide 4WIN1010-02/04
MAS 90 Installation and System Administrator's Guide 4WIN1010-02/04 Copyright 1998-2004 Best Software, Inc. All rights reserved. Rev 02 Contents Chapter 1 Introduction 1 How to Use This Manual 1 Graphic
More informationibaan ERP 5.2a Configuration Guide for ibaan ERP Windows Client
ibaan ERP 5.2a Configuration Guide for ibaan ERP Windows Client A publication of: Baan Development B.V. P.O.Box 143 3770 AC Barneveld The Netherlands Printed in the Netherlands Baan Development B.V. 2002.
More informationECAT SWE Exchange Customer Administration Tool Web Interface User Guide Version 6.7
ECAT SWE Exchange Customer Administration Tool SWE - Exchange Customer Administration Tool (ECAT) Table of Contents About this Guide... 3 Audience and Purpose... 3 What is in this Guide?... 3 CA.mail Website...
More informationXcalibur. Foundation. Administrator Guide. Software Version 3.0
Xcalibur Foundation Administrator Guide Software Version 3.0 XCALI-97520 Revision A May 2013 2013 Thermo Fisher Scientific Inc. All rights reserved. LCquan, Watson LIMS, and Web Access are trademarks,
More informationms-help://ms.technet.2005mar.1033/security/tnoffline/security/smbiz/winxp/fwgrppol...
Page 1 of 16 Security How to Configure Windows Firewall in a Small Business Environment using Group Policy Introduction This document explains how to configure the features of Windows Firewall on computers
More informationInstallation Manual Version 8.5 (w/sql Server 2005)
C ase Manag e m e n t by C l i e n t P rofiles Installation Manual Version 8.5 (w/sql Server 2005) T E C H N O L O G Y F O R T H E B U S I N E S S O F L A W Table of Contents - 2 - Table of Contents SERVER
More informationMS-10215: Implementing and Managing Microsoft Server Virtualization. Course Objectives. Required Exam(s) Price. Duration. Methods of Delivery
MS-10215: Implementing and Managing Microsoft Server Virtualization This five-day instructor led course will provide you with the knowledge and skills to deploy and manage a server virtualization environment
More informationIT 101 Introduction to Information Technology
Applied Information Technology Department Course Syllabus IT 101 Introduction to Information Technology Catalog Description Introduces students to the fundamental concepts in information technology (IT)
More informationCourse Name: Principles of Accounting I. INSTRUCTOR INFORMATION: Instructor: Mrs. Martha Brothers Office Location: C114
Course Name: Principles of Accounting I Course Number: BAN 213 (ACTS #2003) Academic Year: Fall 2014 Meeting Time & Place: 4:00 6:20 p.m. C110 M INSTRUCTOR INFORMATION: Instructor: Mrs. Martha Brothers
More informationQuick Start Guide. IT Management On-Demand
1 Quick Start Guide Quick Start Guide IT Management On-Demand Introduction... 2 Getting Started... 3 Planning Your Deployment... 5 Performing a Test Deployment... 6 Enterprise Deployment Options... 8 Remote
More informationMGSC 590 Information Systems Development Course Syllabus for Spring 2008
MGSC 590 Information Systems Development Course Syllabus for Spring 2008 Tue and Thu 2:00 p.m. - 3:15 p.m. Room 463, College of Business Administration http://dmsweb.moore.sc.edu/mgsc590/ Instructor: Dr.
More informationHow to use SURA in three simple steps:
How to use SURA in three simple steps: Most of SURA s functionality can be accessed through these three steps. 1) Download SURA to your computer Go to the SU Downloads page to obtain the SURA utility.
More informationCitrix and Terminal Services Guide SecureLogin 8.1
Citrix and Terminal Services Guide SecureLogin 8.1 September, 2015 www.netiq.com/documentation Legal Notice NetIQ Product Name is protected by United States Patent No(s): nnnnnnnn, nnnnnnnn, nnnnnnnn.
More information2.3 - Installing the moveon management module - SQL version
2.3 - Installing the moveon management module - SQL version The moveon management module consists of two elements: the moveon client and the moveon database. The moveon client contains all the program
More informationSymantec Backup Exec TM 11d for Windows Servers. Quick Installation Guide
Symantec Backup Exec TM 11d for Windows Servers Quick Installation Guide September 2006 Symantec Legal Notice Copyright 2006 Symantec Corporation. All rights reserved. Symantec, Backup Exec, and the Symantec
More informationMicrosoft Windows Storage Server 2003 R2
Microsoft Windows Storage Server 2003 R2 Getting Started Guide Abstract This guide documents the various features available in Microsoft Windows Storage Server 2003 R2. Rev 1. 2005 Microsoft Corporation.
More informationSpecops Command. Installation Guide
Specops Software. All right reserved. For more information about Specops Command and other Specops products, visit www.specopssoft.com Copyright and Trademarks Specops Command is a trademark owned by Specops
More informationNashville State Community College Business & Applied Arts Division Music Technology. Master Course Syllabus
Revised: 04/27/15 Nashville State Community College Business & Applied Arts Division Music Technology Master Course Syllabus This master course syllabus is meant simply as a guide and overview of the course.
More informationAdministration Guide. SecureLogin 8.0. October, 2013
Administration Guide SecureLogin 8.0 October, 2013 Legal Notice NetIQ Product Name is protected by United States Patent No(s): nnnnnnnn, nnnnnnnn, nnnnnnnn. THIS DOCUMENT AND THE SOFTWARE DESCRIBED IN
More informationIntroduction to Endpoint Security
Chapter Introduction to Endpoint Security 1 This chapter provides an overview of Endpoint Security features and concepts. Planning security policies is covered based on enterprise requirements and user
More informationIntroduction: Using Windows Server 2008 How-To p. 1 How to Educate Yourself About Windows Server 2008 p. 2 How to Benefit from This Book p.
Introduction: Using Windows Server 2008 How-To p. 1 How to Educate Yourself About Windows Server 2008 p. 2 How to Benefit from This Book p. 2 How to Continue Expanding Your Knowledge p. 4 Perform the Installation
More informationCentrify Identity Service and Mac - Online Training
C E N T R I F Y D A T A S H E E T M A R C H 2015 Centrify Identity Service and Mac - Online Training Overview This course is designed for administrators of the Centrify User Suite and mobile devices. At
More informationInstalling, Configuring, and Managing a Microsoft Active Directory
Installing, Configuring, and Managing a Microsoft Active Directory Course Outline Part 1: Configuring and Managing Active Directory Domain Services Installing Active Directory Domain Services Managing
More informationLepide Active Directory Self Service. Installation Guide. Lepide Active Directory Self Service Tool. Lepide Software Private Limited Page 1
Installation Guide Lepide Active Directory Self Service Tool Lepide Software Private Limited Page 1 Lepide Software Private Limited, All Rights Reserved This User Guide and documentation is copyright of
More informationPassword Management Guide
www.novell.com/documentation Management Guide Identity Manager 4.0.2 June 2012 Legal Notices Novell, Inc. makes no representations or warranties with respect to the contents or use of this documentation,
More informationRSA Authentication Manager 7.1 Basic Exercises
RSA Authentication Manager 7.1 Basic Exercises Contact Information Go to the RSA corporate web site for regional Customer Support telephone and fax numbers: www.rsa.com Trademarks RSA and the RSA logo
More informationFor Active Directory Installation Guide
For Active Directory Installation Guide Version 2.5.2 April 2010 Copyright 2010 Legal Notices makes no representations or warranties with respect to the contents or use of this documentation, and specifically
More information