Advanced Install & Configuration Guide
|
|
|
- Wilfred Cunningham
- 10 years ago
- Views:
Transcription
1 Advanced Install & Configuration Guide This document details advanced installation and configuration options for Layer8 software agents. Delivered as standard MSI packages, Layer8 deployment can be made via AD Group Policy, SCCM or other deployment tool. Version: 3.5
2 Contents 1. Introduction to Layer8 2. Layer8 Components 3. Hardware & Software Prerequisites 4. Installation & Removal 5. License Keys 6. Troubleshooting & Technical Support 7. Advanced CONFIG parameters About This Advanced Install Guide This guide provides information to automatically install Layer8 agents via Microsoft AD Group Policy. Deployment can also be made using any other tool which supports standard MSI packages. This guide also provides details to use Splunk reporting software which enables fast, immediate evaluation of Layer8 data via a wide range of supplied dashboards & reports. Additionally, Layer8 can be configured to simultaneously send data to virtually any reporting, BI, analytics, SIEM, Log manager, ITIL or other software or database which accepts a standard data input. Please contact us for details. NOTE: Splunk Enterprise For fast viewing of data, Layer8 utilizes Splunk Enterprise, a data analytics tool which is free for analyzing 500MB of data per day, sufficient for between Layer8 users. If you are already using Splunk Enterprise or Splunk Cloud edition and you wish to use Splunk s own Universal Forwarder, please consult the Quick Start Guide Using the Splunk Universal Forwarder. NOTE: Citrix XenApp / XenDesktop, Hyper-V, VMware Horizon, MS RDS. There are some additional configuration steps required when deploying Layer8 to virtualized desktop or virtualized applications. Please review the Layer8 Virtualization Installation Guide for additional information. Layer8 is certified Citrix Ready. Page 2
3 1. Introduction to Layer8 Layer8 from Logfiller measures the actual usage and User Experience of all virtual and physical Windows systems, generating data on logon delays, applications and web services, From Logon to Logoff and everything in between, Layer8 s patent pending technology provides unique insights that complement machine data sources. 2. Layer8 Components Layer8 generates data via an installed agent, a data forwarder service and web browser extensions installed on each physical or virtual Windows based endpoint / server. The following are included as standard MSI packages in the Layer8 installation download: a) Layer8 User Experience Meter Agent ( uxmtr ) b) Layer8 Forwarder Service ( dcac ) c) Layer8 Web Browser extensions for IE, Chrome and Firefox Both agents ( uxmtr and dcac ) are required for all installation endpoints. The web browser extensions are optional. 3. Hardware & Software Prerequisites Layer8 can be installed on any system which runs Windows XP and higher, 32-bit or 64-bit, physical or virtual, servers, workstations or laptops. Standalone and domain users are supported. Microsoft Windows XP/SP3, 2003/SP2, Vista, 2008, 2008R2, 2012, 2012 R2, 7, 8, 8.1+, 10 Microsoft Terminal Services / Microsoft Remote Desktop Services servers Virtualization platforms - Citrix XenApp, XenDesktop, VMware Horizon, HyperV RAM Usage 2MB to 6MB per installed user agent Processor usage negligible. Disk Space - average of 0.2MB to 1MB per day, per user (temporary) One or more Web Browsers e.g. Internet Explorer, Chrome or Firefox. For reporting: Splunk Enterprise, Splunk Cloud (or any other SIEM / Log Manager) Other than Windows, there are NO other software prerequisites i.e. there is no requirement for Java,.NET, Javascript etc. installed on any system Page 3
4 4. Installation & Removal The key steps for manually installing Layer8 agents are as follows: Download, install and configure Splunk Enterprise Install the Layer8 App for Splunk in Splunk Enterprise Prepare the Layer8 UNC share Enable Read Security Event Logs & Audit Logon Events Create the Group Policy Installation Objects Download, Install & Configure Splunk Enterprise Download Splunk Enterprise from and install it. Install the Layer8 App for Splunk into Splunk Click Apps Manage Apps Install App from file and select the Layer8 App for Splunk file from the Layer8 installation package Page 4
5 Prepare the Layer8 UNC Share Extract the Layer8 download software package to a network-accessible UNC share. MANDATORY STEP Edit the supplied config.ini file from the Layer8 installation folder and add the IP address of your Splunk server in both the DataOutput#1 and AlertOutput#1 sections. Enable Read Security Event Logs & Audit Logon Events Start Group Policy Management Editor and edit the Default Domain Policy 1. Computer Configuration Policies Windows Settings Security Settings Local Policies Security Options Disable Audit: Force audit policy subcategory settings Page 5
6 2. Computer Configuration Policies Windows Settings Security Settings Local Policies Audit Policy Enable Audit logon events for both Success and Failure 3. Computer Configuration Policies Windows Settings Security Settings Local Policies User Right Assignment Enable Manage auditing and security log Page 6
7 Define the User Groups needed for the deployment Page 7
8 Create the Group Policy Installation Objects Start Group Policy Management Editor and expand the Domain. Right-click on Group Policy Objects New, enter the name Layer8 Deployment OK. Leave Source Starter GPO as (none). In the left pane, right-click on your domain in the tree, click Link an Existing GPO and choose Layer8 Deployment from the list. In the left pane, under your domain, right-click on the newly created Layer8 Deployment Edit Computer Configuration Policies Software Settings. Right-click on Software Installation New Package and browse the UNC share name to the following MSI s: Layer8_Agent_Setup.msi Optionally: Layer8ExtensionForIESetup.msi Layer8ExtensionForChromeSetup.msi Layer8ExtensionForFFSetup.msi NOTE: When adding the packages, select Assigned as the Deployment Method, so that the software is installed automatically. After deployment, reboot the computers and start using it as normal. Start Internet Explorer, Chrome and Firefox enable / allow the Layer8 extension / add-on when prompted. Login to Splunk and analyze your collected data using the supplied for Splunk Dashboards & reports. Page 8
9 NOTE: You can check everything is installed and working by viewing the Layer8 Status Page available by clicking Start Program Files Logfiller Layer8 Status Page on a computer with Layer8 installed. Removing the Layer8 Agents Start Group Policy Management Editor and expand the Domain. In the left pane, under your domain, right-click Layer8 Deployment Edit Computer Configuration Policies Software Settings. Right-click on Software Installation All Tasks Remove and select a preferred removal method: Page 9
10 5. License Keys Trial and Permanent License Keys When you install Layer8 a trial license key is provided which allows data generation for 30 days. When you purchase Layer8 you will be provided with a License key in the form of a LICENSE.INI file. To publish the License key, simply copy the supplied file into the central deployment folder. For example, copy LICENSE.INI into; \\myserver\layer8\ On next restart, or policy refresh your client computers will pick up this new license key. Page 10
11 6. Troubleshooting & Technical Support Layer8 on Client Systems For troubleshooting missing / non-reported Layer8 data: Confirm that clients are sending data to the correct Splunk server IP address as specified in the Layer8 "config.ini" file and inspect the Logfiller Status Page on each client to see if the "Successful Data Upload" messages appear On the client computer, click Start Program Files Logfiller Layer8 Status Page or in any web browser, enter the URL This status page will provide details on the Layer8 agent configurations, data upload status, errors, licensing and more. If the Status Page is not available, open the Windows Event Viewer. Layer8 reports successful program startup, configuration, and any license or policy errors to the Application Log and/or the Logfiller Log. Page 11
12 For missing Logon Delay Times, verify the policies and group permissions from Section 4 are correctly configured. Check that anti-virus or other endpoint protection software (including Windows Defender or SmartScreen) has not disabled or blocked installation of the Layer8 agents. Visit for further KB s and other information. Splunk Enterprise Please consult the Splunk Answers KB's at for all issues relating to Splunk Enterprise The following troubleshooting steps to be of use: Check the firewall ports are open and allow clients to send data via the chosen protocol Confirm the Layer8 App for Splunk has been configured correctly to match the configuration settings of the Layer8 agents Click Settings Indexes and make sure the Logfiller index is listed and enabled. If it is not listed or enabled, contact your Splunk administer and confirm the Layer8 App is installed properly. Consider checking the file/directory permissions on the Splunk Enterprise server if the index is listed and enabled but no data appears to be indexed. Page 12
13 7. Advanced CONFIG Options Advanced Configuration of Layer8 on Client Systems There are a number of optional CONFIG.INI parameters that can be used to customize the deployment for your organization. Section / Parameter Type Description Example [dcacconfig] section Contains parameters specific to the Layer-8 data collection and forwarding service DebugOutput boolean Controls debug output to dbgview. -1 Default value: 0-1 = on 0 = off StatusReport boolean Controls the DCAC browser based status report at 0 Default value: -1-1 = enabled 0 = disabled DailyOpsLog boolean Controls debug output to a DailyOpsLog file. 0 Default value: 0-1 = on 0 = off DataFolderMaxSize integer The maximum size, in KB, the data folder is allowed to grow to. A value of zero does limit the size of the folder. RetryFolderMaxSize Integer The maximum size, in KB, the retry folder is allowed to grow to. A value of zero does limit the size of the folder AlertsFolderMaxSize integer The maximum size, in KB, the alerts folder is allowed to grow to. A value of zero does limit the size of the folder UploadInterval integer The default data upload interval in 15 Page 13
14 seconds. Default value = 15 [DataOutput#1] section The first data output configuration section (there must be at least one and there can be up to 99). DataCollectionScope string The MeterName that applies to this section, or All for all meters. Default value = All All WaitTimeMeter;LogonDela ymeter Valid values are (multiple values are separated by ; ): All DesktopAppMeter WaitTimeMeter LogonDelayMeter LogoffDelayMeter PageLoadMeter DialogueBoxMeter Default value: All Protocol string The protocol for the data upload. Valid options are: Default value: blank HTTP TCP FTP SYSLOG EVENTLOG LOCALFILE FILEAPPEND DataFormat string The data format for the data upload. Valid options are: Default value: NVP XML NVP CSV JSON XML-AllFields NVP-AllFields CSV-AllFields Page 14
15 JSON-AllFields Folder string Folder name (only applies for FTP and file based Protocols) Default value: blank MyData (Notes: + For the LocalFile or FileAppend creates a MyData folder under the default %programdata%layer8- Data folder + For the FTP Protocol send the data to the folder name on the FTP server Address string IP or DNS address of receiving computer. No default value. Default value: blank Port integer Target port on the receiving computer. L8ConfigServer or No default value. Username string The optional username for the FTP Protocol. MyUsername Default value: blank Password string The optional username for the FTP Protocol. MyPassword Default value: blank [AlertOutput#1] section The first Alert output configuration section (there must be at least one and there can be up to 99). AlertCollectionScope string The MeterName that applies to this section, or All for all meters. Valid values are (multiple values are separated by ; ): All WaitTimeMeter;LogonDela ymeter Default value: All All Alerts DialogueBoxMeter Page 15
16 Protocol string The protocol for the Alert upload. Valid options are: Default value: blank HTTP TCP FTP SYSLOG EVENTLOG LOCALFILE FILEAPPEND Folder string Folder name (only applies for FTP and file based Protocols). Default value: blank MyAlert (Notes: For the LocalFile or FileAppend creates a a MyAlert folder under the default %programalert%layer8- Alert folder For the FTP Protocol send the Alert to the folder name on the FTP server Note: re DataFormat. Alerts are formatted using string templates, see below Address string L8ConfigServer or Port intege r Target port on the receiving computer. Default value: 0 82 Username string The optional username for the FTP Protocol. MyUsername Default value: blank Password string The optional username for the FTP Protocol. MyPassword [uxmtrconfig] sectio n Default value: blank Contains parameters specific to the uxmtr data acquisition program Page 16
17 DebugOutput boole an Controls debug output to dbgview. Default value: 0-1 = on 0 = off 0 IncludeWindowTitle boole an When true window titles are included in the data and alert event. -1 Default value: -1-1 = on 0 = off. IncludeIPAddress Boole an When true IP address are included in the data and alert event. -1 Default value: = on 0 = off IncludeURL boole an When true URLS are included in the data and alert event. -1 Default value: = on 0 = off BrowserExes string The names of executables which identify browsers.to Layer8. NonBrowserExcludeExes string The names of executables to be ignored by Layer8. iexplore.exe; firefox.exe; chrome.exe; safari.exe Mydocreader.exe Default value: blank EnabledMetersForData string The names of the meters to enable for data collection. Default value: All EnabledMetersForAlerts string The names of the meters to enable for alert collection. Default value: All All WaitTimeMeter;LogonDela ymeter All Alerts [commonconfig] sectio The common configuration section used by all endpoint Page 17
18 n components DistServerAddress string The IP address or DNS name of the Layer8 distribution server, the server running the Layer8WebServer plus optional port no. Layer8-Dist-Server:82 or :102 Default value: blank ErrorEventLog boole an Controls error messages sent to the layer8-error log in the windows event log: -1 Default value: -1-1 = enabled 0 = disabled AnonymizeAllNames boole an Anonymize all names captured on the endpoint i.e. User, Domain and Computer. -1 Default value: = on 0 = off AnonymizeComputerNames boole an Anonymize computer names captured on the endpoint. -1 Default value: = on 0 = off AnonymizeDomainNames boole an Anonymize domain names captured on the endpoint. -1 Default value: = on 0 = off AnonymizeUserNames boole an Anonymize user names captured on the endpoint. -1 Default value: = on 0 = off LogonDelayTimeLowReadingC utoff The Logon Delay low reading cut-off 1 Page 18
19 Default value: 1. LogonDelayTimeHighReadingC utoff The Logon Delay high reading cut-off 300 Default value: 300. LogonDelayTimeAlertThreshol d The Logon Delay alert threshold in seconds for Logon Delays. 10 Default value: 10. LogonDelayTimeAlertTemplat e string The Logon Delay alert template in seconds for Logon Delays. Default value: See example column Alert=LogonDelayTooLon g AlertValue=%logondelay% AlertThreshold=%thresho ld% Unit=Seconds ComputerName="%comp utername%" LogonID="%logonid%" LogoffDelayTimeLowReadingC utoff The Logoff Delay low reading cut-off 1 Default value: 1. LogoffDelayTimeHighReading CutOff The Logoff Delay high reading cut-off 300 Default value: 300. LogoffDelayTimeAlertThreshol d The Logoff Delay alert threshold in seconds for Logoff Delays. 10 Default value: 10. LogoffDelayTimeAlertTemplat e string The Logoff Delay alert template in seconds for Logoff Delays. Default value: See example column Alert=LogoffDelayTooLon g AlertValue=%Logoffdelay % AlertThreshold=%thresho ld% Unit=Seconds ComputerName="%comp utername%" LogoffID="%Logonid%" AppActiveTimeTimeLowReadi ngcutoff The Active Time low reading cut-off 1 Page 19
20 Default value: 1 AppActiveTimeTimeHighReadi ngcutoff The Active Time high reading cut-off -1 Default value: -1. (-1 = no limit) AppActiveTimeTimeAlertThres hold The Active Time alert threshold in seconds for Active Times. -1 Default value: -1 AppActiveTimeTimeAlertTemp late string The Active Time alert template in seconds for Active Times. Default value: See example column Alert=ActiveTimeTooLong AlertValue=%ActiveTime% AlertThreshold=%thresho ld% Unit=Seconds ComputerName="%comp utername%" LogoffID="%Logonid%" AppWaitTimeTimeLowReading CutOff The Wait Time low reading cut-off 0.1 Default value: 0.1 AppWaitTimeTimeHighReadin gcutoff The Wait Time high reading cut-off 300 Default value: 300. (-1 = no limit) AppWaitTimeTimeAlertThresh old The Wait Time alert threshold in seconds for Wait Times. 10 Default value: 10. AppWaitTimeTimeAlertTempla te string The Wait Time alert template in seconds for Wait Times. Default value: See example column Alert=WaitTimeTooLong AlertValue=%WaitTime% AlertThreshold=%thresho ld% Unit=Seconds ComputerName="%comp utername%" LogoffID="%Logonid%" PageLoadTimeLowReadingCut Off The Page Load low reading cut-off 1 Default value: 1. PageLoadTimeHighReadingCu The Page Load high reading cut-off Page 20
21 toff Default value: 300. (-1 = no limit) PageLoadTimeAlertThreshold The Page Load alert threshold in seconds for Page Loads. 10 Default value: 10. PageLoadTimeAlertTemplate string The Page Load alert template in seconds for Page Loads. Default value: See example column Alert=PageLoadTooLong AlertValue=%PageLoad% AlertThreshold=%thresho ld% Unit=Seconds ComputerName="%comp utername%" LogoffID="%Logonid%" DialogueBoxTimeLowReading CutOff The Dialogue Box low reading cut-off 0 Default value: 0. DialogueBoxTimeHighReading CutOff The Dialogue Box high reading cut-off 0 Default value: 0. (-1 = no limit) DialogueBoxTimeAlertThresho ld The Dialogue Box alert threshold in seconds for Dialogue Boxes. 0 Default value: 0. DialogueBoxTimeAlertTemplat e string The Dialogue Box alert template in seconds for Dialogue Boxes. Default value: See example column Alert=DialogueBox WindowTitle="%windowtit le%" ExeName="%exename%" ComputerName="%comp utername%" WindowClass="%windowc lass%" LogonID="%logonid%" Data Transformation Layer8 V3.5 introduced the ability to transform window title and url field data at source by modifying entries in the [dcacconfig] section of the config.ini Page 21
22 Simple window title and url field text replacements can be made for each of the output formats (CSV, NVP, XML, JSON) in the form [original text] --> [replacement text] Non-printable characters can be represented in their equivalent unicode 2 digit hex numeric character code proceeded by the % character e.g. carriage return = %0D line feed = %0A etc For instance to replace the double quote character " with an escape sequence of \", for NVP formatted output, the dcac config entry will be NVPTransform=" --> \" Note: if a transform contains the % character followed by a number then hash but be represented in it unicode hex numeric form e.g. %20 (space) Examples of data transforms in a config.ini: ; DataTransformsEnabled=-1 enables the data transforms below DataTransformsEnabled=-1 ; The following replaces double quotes with two quotes in csv files for window title and url text CSVTransform#1=" --> '' ; The following replaces the upper case umlaut character with the text big umlaut, surrounded by spaces, in csv files for window title and url text CSVTransform#2=Ö --> %20big umlaut%20 ; The following replaces the lower case umlaut character with the text small umlaut, surrounded by spaces, in csv files for window title and url text CSVTransform#3=%C3%B6 --> %20small umlaut%20 ; The following replaces double quotes with two quotes in nvp files for window title and url text NVPTransform#1=" --> '' Page 22
This document details the procedure for installing Layer8 software agents and reporting dashboards.
Quick Start Guide This document details the procedure for installing Layer8 software agents and reporting dashboards. Deployment to data analysis takes approximately 15 minutes. If you wish to deploy via
For Splunk Universal Forwarder and Splunk Cloud
Quick Start Guide; For Splunk Universal Forwarder and Splunk Cloud This document details the procedure for manually installing Layer8 software agents, and forwarding data to an existing Splunk Enterprise
Installation and Deployment
Installation and Deployment Help Documentation This document was auto-created from web content and is subject to change at any time. Copyright (c) 2016 SmarterTools Inc. Installation and Deployment SmarterStats
How To Set Up Safetica Insight 9 (Safetica) For A Safetrica Management Service (Sms) For An Ipad Or Ipad (Smb) (Sbc) (For A Safetaica) (
SAFETICA INSIGHT INSTALLATION MANUAL SAFETICA INSIGHT INSTALLATION MANUAL for Safetica Insight version 6.1.2 Author: Safetica Technologies s.r.o. Safetica Insight was developed by Safetica Technologies
Deployment of Keepit for Windows
Deployment of Keepit for Windows Keepit A/S October 13, 2010 1 Introduction When deploying Keepit in larger setups with many desktops and servers, installing Keepit individually on each computer is cumbersome
User Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream
User Manual Onsight Management Suite Version 5.1 Another Innovation by Librestream Doc #: 400075-06 May 2012 Information in this document is subject to change without notice. Reproduction in any manner
Interworks. Interworks Cloud Platform Installation Guide
Interworks Interworks Cloud Platform Installation Guide Published: March, 2014 This document contains information proprietary to Interworks and its receipt or possession does not convey any rights to reproduce,
VMware Mirage Web Manager Guide
Mirage 5.1 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of this document,
HOW TO SILENTLY INSTALL CLOUD LINK REMOTELY WITHOUT SUPERVISION
HOW TO SILENTLY INSTALL CLOUD LINK REMOTELY WITHOUT SUPERVISION Version 1.1 / Last updated November 2012 INTRODUCTION The Cloud Link for Windows client software is packaged as an MSI (Microsoft Installer)
XenDesktop Implementation Guide
Consulting Solutions WHITE PAPER Citrix XenDesktop XenDesktop Implementation Guide Pooled Desktops (Local and Remote) www.citrix.com Contents Contents... 2 Overview... 4 Initial Architecture... 5 Installation
CYCLOPE let s talk productivity
Cyclope 6 Installation Guide CYCLOPE let s talk productivity Cyclope Employee Surveillance Solution is provided by Cyclope Series 2003-2014 1 P age Table of Contents 1. Cyclope Employee Surveillance Solution
Pearl Echo Installation Checklist
Pearl Echo Installation Checklist Use this checklist to enter critical installation and setup information that will be required to install Pearl Echo in your network. For detailed deployment instructions
NSi Mobile Installation Guide. Version 6.2
NSi Mobile Installation Guide Version 6.2 Revision History Version Date 1.0 October 2, 2012 2.0 September 18, 2013 2 CONTENTS TABLE OF CONTENTS PREFACE... 5 Purpose of this Document... 5 Version Compatibility...
Mirtrak 6 Powered by Cyclope
Mirtrak 6 Powered by Cyclope Installation Guide Mirtrak Activity Monitoring Solution v6 is powered by Cyclope Series 2003-2013 Info Technology Supply Ltd. 2 Hobbs House, Harrovian Business Village, Bessborough
Install SQL Server 2014 Express Edition
How To Install SQL Server 2014 Express Edition Updated: 2/4/2016 2016 Shelby Systems, Inc. All Rights Reserved Other brand and product names are trademarks or registered trademarks of the respective holders.
Kaseya Server Instal ation User Guide June 6, 2008
Kaseya Server Installation User Guide June 6, 2008 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private Sector IT organizations. Kaseya's
The SSL device also supports the 64-bit Internet Explorer with new ActiveX loaders for Assessment, Abolishment, and the Access Client.
WatchGuard SSL v3.2 Release Notes Supported Devices SSL 100 and 560 WatchGuard SSL OS Build 355419 Revision Date January 28, 2013 Introduction WatchGuard is pleased to announce the release of WatchGuard
Synchronizer Installation
Synchronizer Installation Synchronizer Installation Synchronizer Installation This document provides instructions for installing Synchronizer. Synchronizer performs all the administrative tasks for XenClient
Integrating LANGuardian with Active Directory
Integrating LANGuardian with Active Directory 01 February 2012 This document describes how to integrate LANGuardian with Microsoft Windows Server and Active Directory. Overview With the optional Identity
Egress Switch Client Deployment Guide V4.x
Egress Switch Client Deployment Guide V4.x www.egress.com 2007-2013 Egress Software Technologies Ltd Table of Contents System Requirements... 4 Deployment Process... 4 Computer & User Based Policy Application...
RemoteLab 2.0 Admin Guide
RemoteLab 2.0 Admin Guide Table of Contents RemoteLab 2.0 Admin Guide... 1 Getting Started with RemoteLab 2.0 (Server Configuration)... 2 System Requirements:... 2 Create your RemoteLab database:... 2
Configuration Guide. BES12 Cloud
Configuration Guide BES12 Cloud Published: 2016-04-08 SWD-20160408113328879 Contents About this guide... 6 Getting started... 7 Configuring BES12 for the first time...7 Administrator permissions you need
Citrix Access Gateway Plug-in for Windows User Guide
Citrix Access Gateway Plug-in for Windows User Guide Access Gateway 9.2, Enterprise Edition Copyright and Trademark Notice Use of the product documented in this guide is subject to your prior acceptance
Network Setup Instructions
Network Setup Instructions This document provides technical details for setting up the Elite Salon & Spa Management program in a network environment. If you have any questions, please contact our Technical
Setting Up a Unisphere Management Station for the VNX Series P/N 300-011-796 Revision A01 January 5, 2010
Setting Up a Unisphere Management Station for the VNX Series P/N 300-011-796 Revision A01 January 5, 2010 This document describes the different types of Unisphere management stations and tells how to install
MailStore Outlook Add-in Deployment
MailStore Outlook Add-in Deployment A MailStore Server installation deploys the MailStore Outlook Add-in as a Windows Installer package (MSI) that can be installed on client machines using software distribution.
RSA Authentication Manager 7.1 Basic Exercises
RSA Authentication Manager 7.1 Basic Exercises Contact Information Go to the RSA corporate web site for regional Customer Support telephone and fax numbers: www.rsa.com Trademarks RSA and the RSA logo
Sharp Remote Device Manager (SRDM) Server Software Setup Guide
Sharp Remote Device Manager (SRDM) Server Software Setup Guide This Guide explains how to install the software which is required in order to use Sharp Remote Device Manager (SRDM). SRDM is a web-based
Issue Tracking Anywhere Installation Guide
TM Issue Tracking Anywhere Installation Guide The leading developer of version control and issue tracking software Table of Contents Introduction...3 Installation Guide...3 Installation Prerequisites...3
Thinspace deskcloud. Quick Start Guide
Thinspace deskcloud Quick Start Guide Version 1.2 Published: SEP-2014 Updated: 16-SEP-2014 2014 Thinspace Technology Ltd. All rights reserved. The information contained in this document represents the
http://docs.trendmicro.com
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the product, please review the readme files,
Copyright. Disclaimer. Introduction 1. System Requirements... 3. Installing the software 4
Digital Signatures User Guide Revision 1.2 build 1, Document Revision 1.12 Published 31. Octover 2011 ii Contents Copyright Disclaimer iii iii Introduction 1 System Requirements... 3 Installing the software
Astaro Security Gateway V8. Remote Access via L2TP over IPSec Configuring ASG and Client
Astaro Security Gateway V8 Remote Access via L2TP over IPSec Configuring ASG and Client 1. Introduction This guide contains complementary information on the Administration Guide and the Online Help. If
XenApp 7.7 Deployment ISO. 5 th January 2016
5 th January 2016 Document Details Document Name Author DG Version 1.0 Date 5th January 2016 Status Released Document History Date Modification Details 5/01/2016 N/A First Release Contents 1. Introduction...
Using DC Agent for Transparent User Identification
Using DC Agent for Transparent User Identification Using DC Agent Web Security Solutions v7.7, 7.8 If your organization uses Microsoft Windows Active Directory, you can use Websense DC Agent to identify
ilaw Installation Procedure
ilaw Installation Procedure This guide will provide a reference for a full installation of ilaw Case Management Software. Contents ilaw Overview How ilaw works Installing ilaw Server on a PC Installing
Installation and Setup Guide
Installation and Setup Guide Contents 1. Introduction... 1 2. Before You Install... 3 3. Server Installation... 6 4. Configuring Print Audit Secure... 11 5. Licensing... 16 6. Printer Manager... 17 7.
Reference and Troubleshooting: FTP, IIS, and Firewall Information
APPENDIXC Reference and Troubleshooting: FTP, IIS, and Firewall Information Although Cisco VXC Manager automatically installs and configures everything you need for use with respect to FTP, IIS, and the
PC Power Down. MSI Deployment Guide
PC Power Down MSI Deployment Guide 1. Introduction 1.1. Outline The client software for PC Power Down can be pushed out across a network, saving the effort of individually visiting each computer to install
RealPresence Platform Director
RealPresence CloudAXIS Suite Administrators Guide Software 1.3.1 GETTING STARTED GUIDE Software 2.0 June 2015 3725-66012-001B RealPresence Platform Director Polycom, Inc. 1 RealPresence Platform Director
SevOne NMS Download Installation and Implementation Guide
SevOne NMS Download Installation and Implementation Guide 5.3.X 530 V0002 Contents 1. Get Started... 3 2. SevOne Download Installation... 6 3. Appliance Network Configuration... 9 4. Install License and
FlexSim LAN License Server
FlexSim LAN License Server Installation Instructions Rev. 20150318 Table of Contents Introduction... 2 Using lmtools... 2 1. Download the installation files... 3 2. Install the license server... 4 3. Connecting
Contents 1. Introduction 2. Security Considerations 3. Installation 4. Configuration 5. Uninstallation 6. Automated Bulk Enrollment 7.
Contents 1. Introduction 2. Security Considerations 3. Installation 4. Configuration 5. Uninstallation 6. Automated Bulk Enrollment 7. Troubleshooting Introduction Adaxes Self-Service Client provides secure
SMART Classroom Suite 2011
SMART Classroom Suite 2011 Windows operating systems System administrator s guide Trademark notice SMART Board, SMART Classroom Suite, SMART Notebook, SMART Response, SMART Sync, SMART Document Camera,
Manage Traps in a VDI Environment. Traps Administrator s Guide. Version 3.3. Copyright 2007-2015 Palo Alto Networks
Manage Traps in a VDI Environment Traps Administrator s Guide Version 3.3 Contact Information Corporate Headquarters: Palo Alto Networks 4401 Great America Parkway Santa Clara, CA 95054 www.paloaltonetworks.com/company/contact-us
Installation Guide. . All right reserved. For more information about Specops Deploy and other Specops products, visit www.specopssoft.
. All right reserved. For more information about Specops Deploy and other Specops products, visit www.specopssoft.com Copyright and Trademarks Specops Deploy is a trademark owned by Specops Software. All
XenClient Enterprise Synchronizer Installation Guide
XenClient Enterprise Synchronizer Installation Guide Version 5.1.0 March 26, 2014 Table of Contents About this Guide...3 Hardware, Software and Browser Requirements...3 BIOS Settings...4 Adding Hyper-V
INSTALL AND CONFIGURATION GUIDE. Atlas 5.1 for Microsoft Dynamics AX
INSTALL AND CONFIGURATION GUIDE Atlas 5.1 for Microsoft Dynamics AX COPYRIGHT NOTICE Copyright 2012, Globe Software Pty Ltd, All rights reserved. Trademarks Dynamics AX, IntelliMorph, and X++ have been
Jetico Central Manager. Administrator Guide
Jetico Central Manager Administrator Guide Introduction Deployment, updating and control of client software can be a time consuming and expensive task for companies and organizations because of the number
Contents Minimum Requirements... 2 Instructions... 2 Troubleshooting... 7
Emdeon Remote Desktop Services Contents Minimum Requirements... 2 Instructions... 2 Troubleshooting... 7 Minimum Requirements 1. A high-speed Internet connection. DSL or Cable Internet are recommended.
DC Agent Troubleshooting
DC Agent Troubleshooting Topic 50320 DC Agent Troubleshooting Web Security Solutions v7.7.x, 7.8.x 27-Mar-2013 This collection includes the following articles to help you troubleshoot DC Agent installation
Using Group Policies to Install AutoCAD. CMMU 5405 Nate Bartley 9/22/2005
Using Group Policies to Install AutoCAD CMMU 5405 Nate Bartley 9/22/2005 Before we get started This manual provides a step-by-step process for creating a Group Policy that will install AutoCAD to a Windows
GFI Product Manual. Web security, monitoring and Internet access control. Administrator Guide
GFI Product Manual Web security, monitoring and Internet access control Administrator Guide The information and content in this document is provided for informational purposes only and is provided "as
HOW TO CONNECT TO FTP.TARGETANALYSIS.COM USING FILEZILLA. Installation
HOW TO CONNECT TO FTP.TARGETANALYSIS.COM USING FILEZILLA Note: These instructions direct you to download a free secure FTP client called FileZilla. If you already use a secure client such as WS-FTP Pro
NovaBACKUP xsp Version 15.0 Upgrade Guide
NovaBACKUP xsp Version 15.0 Upgrade Guide NovaStor / November 2013 2013 NovaStor, all rights reserved. All trademarks are the property of their respective owners. Features and specifications are subject
4cast Client Specification and Installation
4cast Client Specification and Installation Version 2015.00 10 November 2014 Innovative Solutions for Education Management www.drakelane.co.uk System requirements The client requires Administrative rights
Contents. Before You Install... 3. Server Installation... 5. Configuring Print Audit Secure... 10
Installation Guide Contents Before You Install... 3 Server Installation... 5 Configuring Print Audit Secure... 10 Configuring Print Audit Secure to use with Print Audit 6... 15 Licensing Print Audit Secure...
AMS Suite: Machinery Health Manager
AMS Suite: Machinery Health Manager Version 5.61 Software Installation Guide User Guide MHM-97402, Rev 23 November 2014 Copyright 2014 by Emerson Process Management. All rights reserved. No part of this
NETWRIX WINDOWS SERVER CHANGE REPORTER
NETWRIX WINDOWS SERVER CHANGE REPORTER INSTALLATION AND CONFIGURATION GUIDE Product Version: 4.0 March 2013. Legal Notice The information in this publication is furnished for information use only, and
Enterprise Remote Control 5.6 Manual
Enterprise Remote Control 5.6 Manual Solutions for Network Administrators Copyright 2015, IntelliAdmin, LLC Revision 3/26/2015 http://www.intelliadmin.com Page 1 Table of Contents What is Enterprise Remote
4.0 SP1 (4.0.1.0) November 2014 702P03296. Xerox FreeFlow Core Installation Guide: Windows Server 2008 R2
4.0 SP1 (4.0.1.0) November 2014 702P03296 Installation Guide: Windows Server 2008 R2 2014 Xerox Corporation. All rights reserved. Xerox, Xerox and Design, FreeFlow, and VIPP are trademarks of Xerox Corporation
PHD Virtual Backup for Hyper-V
PHD Virtual Backup for Hyper-V version 7.0 Installation & Getting Started Guide Document Release Date: December 18, 2013 www.phdvirtual.com PHDVB v7 for Hyper-V Legal Notices PHD Virtual Backup for Hyper-V
ACTIVE DIRECTORY DEPLOYMENT
ACTIVE DIRECTORY DEPLOYMENT CASAS Technical Support 800.255.1036 2009 Comprehensive Adult Student Assessment Systems. All rights reserved. Version 031809 CONTENTS 1. INTRODUCTION... 1 1.1 LAN PREREQUISITES...
Veeam Backup Enterprise Manager. Version 7.0
Veeam Backup Enterprise Manager Version 7.0 User Guide August, 2013 2013 Veeam Software. All rights reserved. All trademarks are the property of their respective owners. No part of this publication may
Administration Guide. . All right reserved. For more information about Specops Deploy and other Specops products, visit www.specopssoft.
. All right reserved. For more information about Specops Deploy and other Specops products, visit www.specopssoft.com Copyright and Trademarks Specops Deploy is a trademark owned by Specops Software. All
Aspera Connect User Guide
Aspera Connect User Guide Windows XP/2003/Vista/2008/7 Browser: Firefox 2+, IE 6+ Version 2.3.1 Chapter 1 Chapter 2 Introduction Setting Up 2.1 Installation 2.2 Configure the Network Environment 2.3 Connect
Konica Minolta s Optimised Print Services (OPS)
Konica Minolta s Optimised Print Services (OPS) Document Collection Agent (DCA) Detailed Installation Guide V1.6 Page 1 of 43 Table of Contents Notes... 4 Requirements... 5 Network requirements... 5 System
vcenter Operations Management Pack for SAP HANA Installation and Configuration Guide
vcenter Operations Management Pack for SAP HANA Installation and Configuration Guide This document supports the version of each product listed and supports all subsequent versions until a new edition replaces
Avaya Video Conferencing Manager Deployment Guide
Avaya Video Conferencing Manager Deployment Guide August 2011 Avaya Video Conferencing Manager Deployment Guide 2 Avaya Video Conferencing Manager This guide is for network administrators who use Avaya
Table of Contents. OpenDrive Drive 2. Installation 4 Standard Installation Unattended Installation
User Guide for OpenDrive Application v1.6.0.4 for MS Windows Platform 20150430 April 2015 Table of Contents Installation 4 Standard Installation Unattended Installation Installation (cont.) 5 Unattended
WHITE PAPER Citrix Secure Gateway Startup Guide
WHITE PAPER Citrix Secure Gateway Startup Guide www.citrix.com Contents Introduction... 2 What you will need... 2 Preparing the environment for Secure Gateway... 2 Installing a CA using Windows Server
http://docs.trendmicro.com
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the product, please review the readme files,
SARANGSoft WinBackup Business v2.5 Client Installation Guide
SARANGSoft WinBackup Business v2.5 Client Installation Guide (November, 2015) WinBackup Business Client is a part of WinBackup Business application. It runs in the background on every client computer that
VMware vcenter Log Insight Getting Started Guide
VMware vcenter Log Insight Getting Started Guide vcenter Log Insight 1.5 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by
VMware Horizon Mirage Installation Guide
VMware Horizon Mirage Installation Guide Horizon Mirage 4.3 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition.
Product Manual. Administration and Configuration Manual
Product Manual Administration and Configuration Manual http://www.gfi.com [email protected] The information and content in this document is provided for informational purposes only and is provided "as is" with
Ekran System Help File
Ekran System Help File Table of Contents About... 9 What s New... 10 System Requirements... 11 Updating Ekran to version 4.1... 13 Program Structure... 14 Getting Started... 15 Deployment Process... 15
Installation Guide for Pulse on Windows Server 2008R2
MadCap Software Installation Guide for Pulse on Windows Server 2008R2 Pulse Copyright 2014 MadCap Software. All rights reserved. Information in this document is subject to change without notice. The software
Copyright 2012 Trend Micro Incorporated. All rights reserved.
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,
Using Remote Web Workplace Version 1.01
Using Remote Web Workplace Version 1.01 Remote web workplace allows you to access your Windows XP desktop through Small Business Server 2003 from a web browser. 1. Connect to the Internet in your remote
System Administration Training Guide. S100 Installation and Site Management
System Administration Training Guide S100 Installation and Site Management Table of contents System Requirements for Acumatica ERP 4.2... 5 Learning Objects:... 5 Web Browser... 5 Server Software... 5
Coillte IT has recently upgraded the Remote Access Solution to a new platform.
Overview Coillte IT has recently upgraded the Remote Access Solution to a new platform. This document explains how to gain access to the Coillte network using your home computer through the new Remote
How To Create An Easybelle History Database On A Microsoft Powerbook 2.5.2 (Windows)
Introduction EASYLABEL 6 has several new features for saving the history of label formats. This history can include information about when label formats were edited and printed. In order to save this history,
Setting up an MS SQL Server for IGSS
Setting up an MS SQL Server for IGSS Table of Contents Table of Contents...1 Introduction... 2 The Microsoft SQL Server database...2 Setting up an MS SQL Server...3 Installing the MS SQL Server software...3
TROUBLESHOOTING GUIDE
Lepide Software LepideAuditor Suite TROUBLESHOOTING GUIDE This document explains the troubleshooting of the common issues that may appear while using LepideAuditor Suite. Copyright LepideAuditor Suite,
7.x Upgrade Instructions. 2015 Software Pursuits, Inc.
7.x Upgrade Instructions 2015 Table of Contents INTRODUCTION...2 SYSTEM REQUIREMENTS FOR SURESYNC 7...2 CONSIDERATIONS BEFORE UPGRADING...3 TERMINOLOGY CHANGES... 4 Relation Renamed to Job... 4 SPIAgent
Installing and Configuring Login PI
Installing and Configuring Login PI Login PI Hands-on lab In this lab, you will configure Login PI to provide performance insights for a Windows Server 2012 R2 Remote Desktop Services installation. To
Server Installation, Administration and Integration Guide
Server Installation, Administration and Integration Guide Version 1.1 Last updated October 2015 2015 sitehelpdesk.com, all rights reserved TABLE OF CONTENTS 1 Introduction to WMI... 2 About Windows Management
enicq 5 System Administrator s Guide
Vermont Oxford Network enicq 5 Documentation enicq 5 System Administrator s Guide Release 2.0 Published November 2014 2014 Vermont Oxford Network. All Rights Reserved. enicq 5 System Administrator s Guide
NETWRIX EVENT LOG MANAGER
NETWRIX EVENT LOG MANAGER QUICK-START GUIDE FOR THE ENTERPRISE EDITION Product Version: 4.0 July/2012. Legal Notice The information in this publication is furnished for information use only, and does not
NovaBACKUP Central Management Console
NovaBACKUP Central Management Console User Manual NovaStor / November 2013 2013 NovaStor, all rights reserved. All trademarks are the property of their respective owners. Features and specifications are
isupplier PORTAL ACCESS SYSTEM REQUIREMENTS
TABLE OF CONTENTS Recommended Browsers for isupplier Portal Recommended Microsoft Internet Explorer Browser Settings (MSIE) Recommended Firefox Browser Settings Recommended Safari Browser Settings SYSTEM
Kaseya 2. Installation guide. Version 7.0. English
Kaseya 2 Kaseya Server Setup Installation guide Version 7.0 English September 4, 2014 Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept
Automating client deployment
Automating client deployment 1 Copyright Datacastle Corporation 2014. All rights reserved. Datacastle is a registered trademark of Datacastle Corporation. Microsoft Windows is either a registered trademark
Remote Connectivity to XV, XP and epro units running Visual Designer
Intro Remote connectivity is one of the major features of Visual Designer and our new operator interface hardware platforms running that software. The ability to monitor, troubleshoot, edit and administer
Storage Sync for Hyper-V. Installation Guide for Microsoft Hyper-V
Installation Guide for Microsoft Hyper-V Egnyte Inc. 1890 N. Shoreline Blvd. Mountain View, CA 94043, USA Phone: 877-7EGNYTE (877-734-6983) www.egnyte.com 2013 by Egnyte Inc. All rights reserved. Revised
StruxureWare Power Monitoring 7.0.1
StruxureWare Power Monitoring 7.0.1 Installation Guide 7EN02-0308-01 07/2012 Contents Safety information 5 Introduction 7 Summary of topics in this guide 7 Supported operating systems and SQL Server editions
Getting Started. Symantec Client Security. About Symantec Client Security. How to get started
Getting Started Symantec Client Security About Security Security provides scalable, cross-platform firewall, intrusion prevention, and antivirus protection for workstations and antivirus protection for
FTP, IIS, and Firewall Reference and Troubleshooting
FTP, IIS, and Firewall Reference and Troubleshooting Although Cisco VXC Manager automatically installs and configures everything you need for use with respect to FTP, IIS, and the Windows Firewall, the
Forcepoint Sidewinder, Virtual Appliance Evaluation for Desktop. Installation Guide 8.x. Revision A
Forcepoint Sidewinder, Virtual Appliance Evaluation for Desktop Installation Guide 8.x Revision A Table of contents 1 Overview...3 2 Verify system requirements...4 Virtualization requirements...4 Admin
