Advanced Install & Configuration Guide

Size: px
Start display at page:

Download "Advanced Install & Configuration Guide"

Transcription

1 Advanced Install & Configuration Guide This document details advanced installation and configuration options for Layer8 software agents. Delivered as standard MSI packages, Layer8 deployment can be made via AD Group Policy, SCCM or other deployment tool. Version: 3.5

2 Contents 1. Introduction to Layer8 2. Layer8 Components 3. Hardware & Software Prerequisites 4. Installation & Removal 5. License Keys 6. Troubleshooting & Technical Support 7. Advanced CONFIG parameters About This Advanced Install Guide This guide provides information to automatically install Layer8 agents via Microsoft AD Group Policy. Deployment can also be made using any other tool which supports standard MSI packages. This guide also provides details to use Splunk reporting software which enables fast, immediate evaluation of Layer8 data via a wide range of supplied dashboards & reports. Additionally, Layer8 can be configured to simultaneously send data to virtually any reporting, BI, analytics, SIEM, Log manager, ITIL or other software or database which accepts a standard data input. Please contact us for details. NOTE: Splunk Enterprise For fast viewing of data, Layer8 utilizes Splunk Enterprise, a data analytics tool which is free for analyzing 500MB of data per day, sufficient for between Layer8 users. If you are already using Splunk Enterprise or Splunk Cloud edition and you wish to use Splunk s own Universal Forwarder, please consult the Quick Start Guide Using the Splunk Universal Forwarder. NOTE: Citrix XenApp / XenDesktop, Hyper-V, VMware Horizon, MS RDS. There are some additional configuration steps required when deploying Layer8 to virtualized desktop or virtualized applications. Please review the Layer8 Virtualization Installation Guide for additional information. Layer8 is certified Citrix Ready. Page 2

3 1. Introduction to Layer8 Layer8 from Logfiller measures the actual usage and User Experience of all virtual and physical Windows systems, generating data on logon delays, applications and web services, From Logon to Logoff and everything in between, Layer8 s patent pending technology provides unique insights that complement machine data sources. 2. Layer8 Components Layer8 generates data via an installed agent, a data forwarder service and web browser extensions installed on each physical or virtual Windows based endpoint / server. The following are included as standard MSI packages in the Layer8 installation download: a) Layer8 User Experience Meter Agent ( uxmtr ) b) Layer8 Forwarder Service ( dcac ) c) Layer8 Web Browser extensions for IE, Chrome and Firefox Both agents ( uxmtr and dcac ) are required for all installation endpoints. The web browser extensions are optional. 3. Hardware & Software Prerequisites Layer8 can be installed on any system which runs Windows XP and higher, 32-bit or 64-bit, physical or virtual, servers, workstations or laptops. Standalone and domain users are supported. Microsoft Windows XP/SP3, 2003/SP2, Vista, 2008, 2008R2, 2012, 2012 R2, 7, 8, 8.1+, 10 Microsoft Terminal Services / Microsoft Remote Desktop Services servers Virtualization platforms - Citrix XenApp, XenDesktop, VMware Horizon, HyperV RAM Usage 2MB to 6MB per installed user agent Processor usage negligible. Disk Space - average of 0.2MB to 1MB per day, per user (temporary) One or more Web Browsers e.g. Internet Explorer, Chrome or Firefox. For reporting: Splunk Enterprise, Splunk Cloud (or any other SIEM / Log Manager) Other than Windows, there are NO other software prerequisites i.e. there is no requirement for Java,.NET, Javascript etc. installed on any system Page 3

4 4. Installation & Removal The key steps for manually installing Layer8 agents are as follows: Download, install and configure Splunk Enterprise Install the Layer8 App for Splunk in Splunk Enterprise Prepare the Layer8 UNC share Enable Read Security Event Logs & Audit Logon Events Create the Group Policy Installation Objects Download, Install & Configure Splunk Enterprise Download Splunk Enterprise from and install it. Install the Layer8 App for Splunk into Splunk Click Apps Manage Apps Install App from file and select the Layer8 App for Splunk file from the Layer8 installation package Page 4

5 Prepare the Layer8 UNC Share Extract the Layer8 download software package to a network-accessible UNC share. MANDATORY STEP Edit the supplied config.ini file from the Layer8 installation folder and add the IP address of your Splunk server in both the DataOutput#1 and AlertOutput#1 sections. Enable Read Security Event Logs & Audit Logon Events Start Group Policy Management Editor and edit the Default Domain Policy 1. Computer Configuration Policies Windows Settings Security Settings Local Policies Security Options Disable Audit: Force audit policy subcategory settings Page 5

6 2. Computer Configuration Policies Windows Settings Security Settings Local Policies Audit Policy Enable Audit logon events for both Success and Failure 3. Computer Configuration Policies Windows Settings Security Settings Local Policies User Right Assignment Enable Manage auditing and security log Page 6

7 Define the User Groups needed for the deployment Page 7

8 Create the Group Policy Installation Objects Start Group Policy Management Editor and expand the Domain. Right-click on Group Policy Objects New, enter the name Layer8 Deployment OK. Leave Source Starter GPO as (none). In the left pane, right-click on your domain in the tree, click Link an Existing GPO and choose Layer8 Deployment from the list. In the left pane, under your domain, right-click on the newly created Layer8 Deployment Edit Computer Configuration Policies Software Settings. Right-click on Software Installation New Package and browse the UNC share name to the following MSI s: Layer8_Agent_Setup.msi Optionally: Layer8ExtensionForIESetup.msi Layer8ExtensionForChromeSetup.msi Layer8ExtensionForFFSetup.msi NOTE: When adding the packages, select Assigned as the Deployment Method, so that the software is installed automatically. After deployment, reboot the computers and start using it as normal. Start Internet Explorer, Chrome and Firefox enable / allow the Layer8 extension / add-on when prompted. Login to Splunk and analyze your collected data using the supplied for Splunk Dashboards & reports. Page 8

9 NOTE: You can check everything is installed and working by viewing the Layer8 Status Page available by clicking Start Program Files Logfiller Layer8 Status Page on a computer with Layer8 installed. Removing the Layer8 Agents Start Group Policy Management Editor and expand the Domain. In the left pane, under your domain, right-click Layer8 Deployment Edit Computer Configuration Policies Software Settings. Right-click on Software Installation All Tasks Remove and select a preferred removal method: Page 9

10 5. License Keys Trial and Permanent License Keys When you install Layer8 a trial license key is provided which allows data generation for 30 days. When you purchase Layer8 you will be provided with a License key in the form of a LICENSE.INI file. To publish the License key, simply copy the supplied file into the central deployment folder. For example, copy LICENSE.INI into; \\myserver\layer8\ On next restart, or policy refresh your client computers will pick up this new license key. Page 10

11 6. Troubleshooting & Technical Support Layer8 on Client Systems For troubleshooting missing / non-reported Layer8 data: Confirm that clients are sending data to the correct Splunk server IP address as specified in the Layer8 "config.ini" file and inspect the Logfiller Status Page on each client to see if the "Successful Data Upload" messages appear On the client computer, click Start Program Files Logfiller Layer8 Status Page or in any web browser, enter the URL This status page will provide details on the Layer8 agent configurations, data upload status, errors, licensing and more. If the Status Page is not available, open the Windows Event Viewer. Layer8 reports successful program startup, configuration, and any license or policy errors to the Application Log and/or the Logfiller Log. Page 11

12 For missing Logon Delay Times, verify the policies and group permissions from Section 4 are correctly configured. Check that anti-virus or other endpoint protection software (including Windows Defender or SmartScreen) has not disabled or blocked installation of the Layer8 agents. Visit for further KB s and other information. Splunk Enterprise Please consult the Splunk Answers KB's at for all issues relating to Splunk Enterprise The following troubleshooting steps to be of use: Check the firewall ports are open and allow clients to send data via the chosen protocol Confirm the Layer8 App for Splunk has been configured correctly to match the configuration settings of the Layer8 agents Click Settings Indexes and make sure the Logfiller index is listed and enabled. If it is not listed or enabled, contact your Splunk administer and confirm the Layer8 App is installed properly. Consider checking the file/directory permissions on the Splunk Enterprise server if the index is listed and enabled but no data appears to be indexed. Page 12

13 7. Advanced CONFIG Options Advanced Configuration of Layer8 on Client Systems There are a number of optional CONFIG.INI parameters that can be used to customize the deployment for your organization. Section / Parameter Type Description Example [dcacconfig] section Contains parameters specific to the Layer-8 data collection and forwarding service DebugOutput boolean Controls debug output to dbgview. -1 Default value: 0-1 = on 0 = off StatusReport boolean Controls the DCAC browser based status report at 0 Default value: -1-1 = enabled 0 = disabled DailyOpsLog boolean Controls debug output to a DailyOpsLog file. 0 Default value: 0-1 = on 0 = off DataFolderMaxSize integer The maximum size, in KB, the data folder is allowed to grow to. A value of zero does limit the size of the folder. RetryFolderMaxSize Integer The maximum size, in KB, the retry folder is allowed to grow to. A value of zero does limit the size of the folder AlertsFolderMaxSize integer The maximum size, in KB, the alerts folder is allowed to grow to. A value of zero does limit the size of the folder UploadInterval integer The default data upload interval in 15 Page 13

14 seconds. Default value = 15 [DataOutput#1] section The first data output configuration section (there must be at least one and there can be up to 99). DataCollectionScope string The MeterName that applies to this section, or All for all meters. Default value = All All WaitTimeMeter;LogonDela ymeter Valid values are (multiple values are separated by ; ): All DesktopAppMeter WaitTimeMeter LogonDelayMeter LogoffDelayMeter PageLoadMeter DialogueBoxMeter Default value: All Protocol string The protocol for the data upload. Valid options are: Default value: blank HTTP TCP FTP SYSLOG EVENTLOG LOCALFILE FILEAPPEND DataFormat string The data format for the data upload. Valid options are: Default value: NVP XML NVP CSV JSON XML-AllFields NVP-AllFields CSV-AllFields Page 14

15 JSON-AllFields Folder string Folder name (only applies for FTP and file based Protocols) Default value: blank MyData (Notes: + For the LocalFile or FileAppend creates a MyData folder under the default %programdata%layer8- Data folder + For the FTP Protocol send the data to the folder name on the FTP server Address string IP or DNS address of receiving computer. No default value. Default value: blank Port integer Target port on the receiving computer. L8ConfigServer or No default value. Username string The optional username for the FTP Protocol. MyUsername Default value: blank Password string The optional username for the FTP Protocol. MyPassword Default value: blank [AlertOutput#1] section The first Alert output configuration section (there must be at least one and there can be up to 99). AlertCollectionScope string The MeterName that applies to this section, or All for all meters. Valid values are (multiple values are separated by ; ): All WaitTimeMeter;LogonDela ymeter Default value: All All Alerts DialogueBoxMeter Page 15

16 Protocol string The protocol for the Alert upload. Valid options are: Default value: blank HTTP TCP FTP SYSLOG EVENTLOG LOCALFILE FILEAPPEND Folder string Folder name (only applies for FTP and file based Protocols). Default value: blank MyAlert (Notes: For the LocalFile or FileAppend creates a a MyAlert folder under the default %programalert%layer8- Alert folder For the FTP Protocol send the Alert to the folder name on the FTP server Note: re DataFormat. Alerts are formatted using string templates, see below Address string L8ConfigServer or Port intege r Target port on the receiving computer. Default value: 0 82 Username string The optional username for the FTP Protocol. MyUsername Default value: blank Password string The optional username for the FTP Protocol. MyPassword [uxmtrconfig] sectio n Default value: blank Contains parameters specific to the uxmtr data acquisition program Page 16

17 DebugOutput boole an Controls debug output to dbgview. Default value: 0-1 = on 0 = off 0 IncludeWindowTitle boole an When true window titles are included in the data and alert event. -1 Default value: -1-1 = on 0 = off. IncludeIPAddress Boole an When true IP address are included in the data and alert event. -1 Default value: = on 0 = off IncludeURL boole an When true URLS are included in the data and alert event. -1 Default value: = on 0 = off BrowserExes string The names of executables which identify browsers.to Layer8. NonBrowserExcludeExes string The names of executables to be ignored by Layer8. iexplore.exe; firefox.exe; chrome.exe; safari.exe Mydocreader.exe Default value: blank EnabledMetersForData string The names of the meters to enable for data collection. Default value: All EnabledMetersForAlerts string The names of the meters to enable for alert collection. Default value: All All WaitTimeMeter;LogonDela ymeter All Alerts [commonconfig] sectio The common configuration section used by all endpoint Page 17

18 n components DistServerAddress string The IP address or DNS name of the Layer8 distribution server, the server running the Layer8WebServer plus optional port no. Layer8-Dist-Server:82 or :102 Default value: blank ErrorEventLog boole an Controls error messages sent to the layer8-error log in the windows event log: -1 Default value: -1-1 = enabled 0 = disabled AnonymizeAllNames boole an Anonymize all names captured on the endpoint i.e. User, Domain and Computer. -1 Default value: = on 0 = off AnonymizeComputerNames boole an Anonymize computer names captured on the endpoint. -1 Default value: = on 0 = off AnonymizeDomainNames boole an Anonymize domain names captured on the endpoint. -1 Default value: = on 0 = off AnonymizeUserNames boole an Anonymize user names captured on the endpoint. -1 Default value: = on 0 = off LogonDelayTimeLowReadingC utoff The Logon Delay low reading cut-off 1 Page 18

19 Default value: 1. LogonDelayTimeHighReadingC utoff The Logon Delay high reading cut-off 300 Default value: 300. LogonDelayTimeAlertThreshol d The Logon Delay alert threshold in seconds for Logon Delays. 10 Default value: 10. LogonDelayTimeAlertTemplat e string The Logon Delay alert template in seconds for Logon Delays. Default value: See example column Alert=LogonDelayTooLon g AlertValue=%logondelay% AlertThreshold=%thresho ld% Unit=Seconds ComputerName="%comp utername%" LogonID="%logonid%" LogoffDelayTimeLowReadingC utoff The Logoff Delay low reading cut-off 1 Default value: 1. LogoffDelayTimeHighReading CutOff The Logoff Delay high reading cut-off 300 Default value: 300. LogoffDelayTimeAlertThreshol d The Logoff Delay alert threshold in seconds for Logoff Delays. 10 Default value: 10. LogoffDelayTimeAlertTemplat e string The Logoff Delay alert template in seconds for Logoff Delays. Default value: See example column Alert=LogoffDelayTooLon g AlertValue=%Logoffdelay % AlertThreshold=%thresho ld% Unit=Seconds ComputerName="%comp utername%" LogoffID="%Logonid%" AppActiveTimeTimeLowReadi ngcutoff The Active Time low reading cut-off 1 Page 19

20 Default value: 1 AppActiveTimeTimeHighReadi ngcutoff The Active Time high reading cut-off -1 Default value: -1. (-1 = no limit) AppActiveTimeTimeAlertThres hold The Active Time alert threshold in seconds for Active Times. -1 Default value: -1 AppActiveTimeTimeAlertTemp late string The Active Time alert template in seconds for Active Times. Default value: See example column Alert=ActiveTimeTooLong AlertValue=%ActiveTime% AlertThreshold=%thresho ld% Unit=Seconds ComputerName="%comp utername%" LogoffID="%Logonid%" AppWaitTimeTimeLowReading CutOff The Wait Time low reading cut-off 0.1 Default value: 0.1 AppWaitTimeTimeHighReadin gcutoff The Wait Time high reading cut-off 300 Default value: 300. (-1 = no limit) AppWaitTimeTimeAlertThresh old The Wait Time alert threshold in seconds for Wait Times. 10 Default value: 10. AppWaitTimeTimeAlertTempla te string The Wait Time alert template in seconds for Wait Times. Default value: See example column Alert=WaitTimeTooLong AlertValue=%WaitTime% AlertThreshold=%thresho ld% Unit=Seconds ComputerName="%comp utername%" LogoffID="%Logonid%" PageLoadTimeLowReadingCut Off The Page Load low reading cut-off 1 Default value: 1. PageLoadTimeHighReadingCu The Page Load high reading cut-off Page 20

21 toff Default value: 300. (-1 = no limit) PageLoadTimeAlertThreshold The Page Load alert threshold in seconds for Page Loads. 10 Default value: 10. PageLoadTimeAlertTemplate string The Page Load alert template in seconds for Page Loads. Default value: See example column Alert=PageLoadTooLong AlertValue=%PageLoad% AlertThreshold=%thresho ld% Unit=Seconds ComputerName="%comp utername%" LogoffID="%Logonid%" DialogueBoxTimeLowReading CutOff The Dialogue Box low reading cut-off 0 Default value: 0. DialogueBoxTimeHighReading CutOff The Dialogue Box high reading cut-off 0 Default value: 0. (-1 = no limit) DialogueBoxTimeAlertThresho ld The Dialogue Box alert threshold in seconds for Dialogue Boxes. 0 Default value: 0. DialogueBoxTimeAlertTemplat e string The Dialogue Box alert template in seconds for Dialogue Boxes. Default value: See example column Alert=DialogueBox WindowTitle="%windowtit le%" ExeName="%exename%" ComputerName="%comp utername%" WindowClass="%windowc lass%" LogonID="%logonid%" Data Transformation Layer8 V3.5 introduced the ability to transform window title and url field data at source by modifying entries in the [dcacconfig] section of the config.ini Page 21

22 Simple window title and url field text replacements can be made for each of the output formats (CSV, NVP, XML, JSON) in the form [original text] --> [replacement text] Non-printable characters can be represented in their equivalent unicode 2 digit hex numeric character code proceeded by the % character e.g. carriage return = %0D line feed = %0A etc For instance to replace the double quote character " with an escape sequence of \", for NVP formatted output, the dcac config entry will be NVPTransform=" --> \" Note: if a transform contains the % character followed by a number then hash but be represented in it unicode hex numeric form e.g. %20 (space) Examples of data transforms in a config.ini: ; DataTransformsEnabled=-1 enables the data transforms below DataTransformsEnabled=-1 ; The following replaces double quotes with two quotes in csv files for window title and url text CSVTransform#1=" --> '' ; The following replaces the upper case umlaut character with the text big umlaut, surrounded by spaces, in csv files for window title and url text CSVTransform#2=Ö --> %20big umlaut%20 ; The following replaces the lower case umlaut character with the text small umlaut, surrounded by spaces, in csv files for window title and url text CSVTransform#3=%C3%B6 --> %20small umlaut%20 ; The following replaces double quotes with two quotes in nvp files for window title and url text NVPTransform#1=" --> '' Page 22

This document details the procedure for installing Layer8 software agents and reporting dashboards.

This document details the procedure for installing Layer8 software agents and reporting dashboards. Quick Start Guide This document details the procedure for installing Layer8 software agents and reporting dashboards. Deployment to data analysis takes approximately 15 minutes. If you wish to deploy via

More information

For Splunk Universal Forwarder and Splunk Cloud

For Splunk Universal Forwarder and Splunk Cloud Quick Start Guide; For Splunk Universal Forwarder and Splunk Cloud This document details the procedure for manually installing Layer8 software agents, and forwarding data to an existing Splunk Enterprise

More information

Installation and Deployment

Installation and Deployment Installation and Deployment Help Documentation This document was auto-created from web content and is subject to change at any time. Copyright (c) 2016 SmarterTools Inc. Installation and Deployment SmarterStats

More information

How To Set Up Safetica Insight 9 (Safetica) For A Safetrica Management Service (Sms) For An Ipad Or Ipad (Smb) (Sbc) (For A Safetaica) (

How To Set Up Safetica Insight 9 (Safetica) For A Safetrica Management Service (Sms) For An Ipad Or Ipad (Smb) (Sbc) (For A Safetaica) ( SAFETICA INSIGHT INSTALLATION MANUAL SAFETICA INSIGHT INSTALLATION MANUAL for Safetica Insight version 6.1.2 Author: Safetica Technologies s.r.o. Safetica Insight was developed by Safetica Technologies

More information

Deployment of Keepit for Windows

Deployment of Keepit for Windows Deployment of Keepit for Windows Keepit A/S October 13, 2010 1 Introduction When deploying Keepit in larger setups with many desktops and servers, installing Keepit individually on each computer is cumbersome

More information

User Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream

User Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream User Manual Onsight Management Suite Version 5.1 Another Innovation by Librestream Doc #: 400075-06 May 2012 Information in this document is subject to change without notice. Reproduction in any manner

More information

Interworks. Interworks Cloud Platform Installation Guide

Interworks. Interworks Cloud Platform Installation Guide Interworks Interworks Cloud Platform Installation Guide Published: March, 2014 This document contains information proprietary to Interworks and its receipt or possession does not convey any rights to reproduce,

More information

VMware Mirage Web Manager Guide

VMware Mirage Web Manager Guide Mirage 5.1 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of this document,

More information

HOW TO SILENTLY INSTALL CLOUD LINK REMOTELY WITHOUT SUPERVISION

HOW TO SILENTLY INSTALL CLOUD LINK REMOTELY WITHOUT SUPERVISION HOW TO SILENTLY INSTALL CLOUD LINK REMOTELY WITHOUT SUPERVISION Version 1.1 / Last updated November 2012 INTRODUCTION The Cloud Link for Windows client software is packaged as an MSI (Microsoft Installer)

More information

XenDesktop Implementation Guide

XenDesktop Implementation Guide Consulting Solutions WHITE PAPER Citrix XenDesktop XenDesktop Implementation Guide Pooled Desktops (Local and Remote) www.citrix.com Contents Contents... 2 Overview... 4 Initial Architecture... 5 Installation

More information

CYCLOPE let s talk productivity

CYCLOPE let s talk productivity Cyclope 6 Installation Guide CYCLOPE let s talk productivity Cyclope Employee Surveillance Solution is provided by Cyclope Series 2003-2014 1 P age Table of Contents 1. Cyclope Employee Surveillance Solution

More information

Pearl Echo Installation Checklist

Pearl Echo Installation Checklist Pearl Echo Installation Checklist Use this checklist to enter critical installation and setup information that will be required to install Pearl Echo in your network. For detailed deployment instructions

More information

NSi Mobile Installation Guide. Version 6.2

NSi Mobile Installation Guide. Version 6.2 NSi Mobile Installation Guide Version 6.2 Revision History Version Date 1.0 October 2, 2012 2.0 September 18, 2013 2 CONTENTS TABLE OF CONTENTS PREFACE... 5 Purpose of this Document... 5 Version Compatibility...

More information

Mirtrak 6 Powered by Cyclope

Mirtrak 6 Powered by Cyclope Mirtrak 6 Powered by Cyclope Installation Guide Mirtrak Activity Monitoring Solution v6 is powered by Cyclope Series 2003-2013 Info Technology Supply Ltd. 2 Hobbs House, Harrovian Business Village, Bessborough

More information

Install SQL Server 2014 Express Edition

Install SQL Server 2014 Express Edition How To Install SQL Server 2014 Express Edition Updated: 2/4/2016 2016 Shelby Systems, Inc. All Rights Reserved Other brand and product names are trademarks or registered trademarks of the respective holders.

More information

Kaseya Server Instal ation User Guide June 6, 2008

Kaseya Server Instal ation User Guide June 6, 2008 Kaseya Server Installation User Guide June 6, 2008 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private Sector IT organizations. Kaseya's

More information

The SSL device also supports the 64-bit Internet Explorer with new ActiveX loaders for Assessment, Abolishment, and the Access Client.

The SSL device also supports the 64-bit Internet Explorer with new ActiveX loaders for Assessment, Abolishment, and the Access Client. WatchGuard SSL v3.2 Release Notes Supported Devices SSL 100 and 560 WatchGuard SSL OS Build 355419 Revision Date January 28, 2013 Introduction WatchGuard is pleased to announce the release of WatchGuard

More information

Synchronizer Installation

Synchronizer Installation Synchronizer Installation Synchronizer Installation Synchronizer Installation This document provides instructions for installing Synchronizer. Synchronizer performs all the administrative tasks for XenClient

More information

Integrating LANGuardian with Active Directory

Integrating LANGuardian with Active Directory Integrating LANGuardian with Active Directory 01 February 2012 This document describes how to integrate LANGuardian with Microsoft Windows Server and Active Directory. Overview With the optional Identity

More information

Egress Switch Client Deployment Guide V4.x

Egress Switch Client Deployment Guide V4.x Egress Switch Client Deployment Guide V4.x www.egress.com 2007-2013 Egress Software Technologies Ltd Table of Contents System Requirements... 4 Deployment Process... 4 Computer & User Based Policy Application...

More information

RemoteLab 2.0 Admin Guide

RemoteLab 2.0 Admin Guide RemoteLab 2.0 Admin Guide Table of Contents RemoteLab 2.0 Admin Guide... 1 Getting Started with RemoteLab 2.0 (Server Configuration)... 2 System Requirements:... 2 Create your RemoteLab database:... 2

More information

Configuration Guide. BES12 Cloud

Configuration Guide. BES12 Cloud Configuration Guide BES12 Cloud Published: 2016-04-08 SWD-20160408113328879 Contents About this guide... 6 Getting started... 7 Configuring BES12 for the first time...7 Administrator permissions you need

More information

Citrix Access Gateway Plug-in for Windows User Guide

Citrix Access Gateway Plug-in for Windows User Guide Citrix Access Gateway Plug-in for Windows User Guide Access Gateway 9.2, Enterprise Edition Copyright and Trademark Notice Use of the product documented in this guide is subject to your prior acceptance

More information

Network Setup Instructions

Network Setup Instructions Network Setup Instructions This document provides technical details for setting up the Elite Salon & Spa Management program in a network environment. If you have any questions, please contact our Technical

More information

Setting Up a Unisphere Management Station for the VNX Series P/N 300-011-796 Revision A01 January 5, 2010

Setting Up a Unisphere Management Station for the VNX Series P/N 300-011-796 Revision A01 January 5, 2010 Setting Up a Unisphere Management Station for the VNX Series P/N 300-011-796 Revision A01 January 5, 2010 This document describes the different types of Unisphere management stations and tells how to install

More information

MailStore Outlook Add-in Deployment

MailStore Outlook Add-in Deployment MailStore Outlook Add-in Deployment A MailStore Server installation deploys the MailStore Outlook Add-in as a Windows Installer package (MSI) that can be installed on client machines using software distribution.

More information

RSA Authentication Manager 7.1 Basic Exercises

RSA Authentication Manager 7.1 Basic Exercises RSA Authentication Manager 7.1 Basic Exercises Contact Information Go to the RSA corporate web site for regional Customer Support telephone and fax numbers: www.rsa.com Trademarks RSA and the RSA logo

More information

Sharp Remote Device Manager (SRDM) Server Software Setup Guide

Sharp Remote Device Manager (SRDM) Server Software Setup Guide Sharp Remote Device Manager (SRDM) Server Software Setup Guide This Guide explains how to install the software which is required in order to use Sharp Remote Device Manager (SRDM). SRDM is a web-based

More information

Issue Tracking Anywhere Installation Guide

Issue Tracking Anywhere Installation Guide TM Issue Tracking Anywhere Installation Guide The leading developer of version control and issue tracking software Table of Contents Introduction...3 Installation Guide...3 Installation Prerequisites...3

More information

Thinspace deskcloud. Quick Start Guide

Thinspace deskcloud. Quick Start Guide Thinspace deskcloud Quick Start Guide Version 1.2 Published: SEP-2014 Updated: 16-SEP-2014 2014 Thinspace Technology Ltd. All rights reserved. The information contained in this document represents the

More information

http://docs.trendmicro.com

http://docs.trendmicro.com Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the product, please review the readme files,

More information

Copyright. Disclaimer. Introduction 1. System Requirements... 3. Installing the software 4

Copyright. Disclaimer. Introduction 1. System Requirements... 3. Installing the software 4 Digital Signatures User Guide Revision 1.2 build 1, Document Revision 1.12 Published 31. Octover 2011 ii Contents Copyright Disclaimer iii iii Introduction 1 System Requirements... 3 Installing the software

More information

Astaro Security Gateway V8. Remote Access via L2TP over IPSec Configuring ASG and Client

Astaro Security Gateway V8. Remote Access via L2TP over IPSec Configuring ASG and Client Astaro Security Gateway V8 Remote Access via L2TP over IPSec Configuring ASG and Client 1. Introduction This guide contains complementary information on the Administration Guide and the Online Help. If

More information

XenApp 7.7 Deployment ISO. 5 th January 2016

XenApp 7.7 Deployment ISO. 5 th January 2016 5 th January 2016 Document Details Document Name Author DG Version 1.0 Date 5th January 2016 Status Released Document History Date Modification Details 5/01/2016 N/A First Release Contents 1. Introduction...

More information

Using DC Agent for Transparent User Identification

Using DC Agent for Transparent User Identification Using DC Agent for Transparent User Identification Using DC Agent Web Security Solutions v7.7, 7.8 If your organization uses Microsoft Windows Active Directory, you can use Websense DC Agent to identify

More information

ilaw Installation Procedure

ilaw Installation Procedure ilaw Installation Procedure This guide will provide a reference for a full installation of ilaw Case Management Software. Contents ilaw Overview How ilaw works Installing ilaw Server on a PC Installing

More information

Installation and Setup Guide

Installation and Setup Guide Installation and Setup Guide Contents 1. Introduction... 1 2. Before You Install... 3 3. Server Installation... 6 4. Configuring Print Audit Secure... 11 5. Licensing... 16 6. Printer Manager... 17 7.

More information

Reference and Troubleshooting: FTP, IIS, and Firewall Information

Reference and Troubleshooting: FTP, IIS, and Firewall Information APPENDIXC Reference and Troubleshooting: FTP, IIS, and Firewall Information Although Cisco VXC Manager automatically installs and configures everything you need for use with respect to FTP, IIS, and the

More information

PC Power Down. MSI Deployment Guide

PC Power Down. MSI Deployment Guide PC Power Down MSI Deployment Guide 1. Introduction 1.1. Outline The client software for PC Power Down can be pushed out across a network, saving the effort of individually visiting each computer to install

More information

RealPresence Platform Director

RealPresence Platform Director RealPresence CloudAXIS Suite Administrators Guide Software 1.3.1 GETTING STARTED GUIDE Software 2.0 June 2015 3725-66012-001B RealPresence Platform Director Polycom, Inc. 1 RealPresence Platform Director

More information

SevOne NMS Download Installation and Implementation Guide

SevOne NMS Download Installation and Implementation Guide SevOne NMS Download Installation and Implementation Guide 5.3.X 530 V0002 Contents 1. Get Started... 3 2. SevOne Download Installation... 6 3. Appliance Network Configuration... 9 4. Install License and

More information

FlexSim LAN License Server

FlexSim LAN License Server FlexSim LAN License Server Installation Instructions Rev. 20150318 Table of Contents Introduction... 2 Using lmtools... 2 1. Download the installation files... 3 2. Install the license server... 4 3. Connecting

More information

Contents 1. Introduction 2. Security Considerations 3. Installation 4. Configuration 5. Uninstallation 6. Automated Bulk Enrollment 7.

Contents 1. Introduction 2. Security Considerations 3. Installation 4. Configuration 5. Uninstallation 6. Automated Bulk Enrollment 7. Contents 1. Introduction 2. Security Considerations 3. Installation 4. Configuration 5. Uninstallation 6. Automated Bulk Enrollment 7. Troubleshooting Introduction Adaxes Self-Service Client provides secure

More information

SMART Classroom Suite 2011

SMART Classroom Suite 2011 SMART Classroom Suite 2011 Windows operating systems System administrator s guide Trademark notice SMART Board, SMART Classroom Suite, SMART Notebook, SMART Response, SMART Sync, SMART Document Camera,

More information

Manage Traps in a VDI Environment. Traps Administrator s Guide. Version 3.3. Copyright 2007-2015 Palo Alto Networks

Manage Traps in a VDI Environment. Traps Administrator s Guide. Version 3.3. Copyright 2007-2015 Palo Alto Networks Manage Traps in a VDI Environment Traps Administrator s Guide Version 3.3 Contact Information Corporate Headquarters: Palo Alto Networks 4401 Great America Parkway Santa Clara, CA 95054 www.paloaltonetworks.com/company/contact-us

More information

Installation Guide. . All right reserved. For more information about Specops Deploy and other Specops products, visit www.specopssoft.

Installation Guide. . All right reserved. For more information about Specops Deploy and other Specops products, visit www.specopssoft. . All right reserved. For more information about Specops Deploy and other Specops products, visit www.specopssoft.com Copyright and Trademarks Specops Deploy is a trademark owned by Specops Software. All

More information

XenClient Enterprise Synchronizer Installation Guide

XenClient Enterprise Synchronizer Installation Guide XenClient Enterprise Synchronizer Installation Guide Version 5.1.0 March 26, 2014 Table of Contents About this Guide...3 Hardware, Software and Browser Requirements...3 BIOS Settings...4 Adding Hyper-V

More information

INSTALL AND CONFIGURATION GUIDE. Atlas 5.1 for Microsoft Dynamics AX

INSTALL AND CONFIGURATION GUIDE. Atlas 5.1 for Microsoft Dynamics AX INSTALL AND CONFIGURATION GUIDE Atlas 5.1 for Microsoft Dynamics AX COPYRIGHT NOTICE Copyright 2012, Globe Software Pty Ltd, All rights reserved. Trademarks Dynamics AX, IntelliMorph, and X++ have been

More information

Jetico Central Manager. Administrator Guide

Jetico Central Manager. Administrator Guide Jetico Central Manager Administrator Guide Introduction Deployment, updating and control of client software can be a time consuming and expensive task for companies and organizations because of the number

More information

Contents Minimum Requirements... 2 Instructions... 2 Troubleshooting... 7

Contents Minimum Requirements... 2 Instructions... 2 Troubleshooting... 7 Emdeon Remote Desktop Services Contents Minimum Requirements... 2 Instructions... 2 Troubleshooting... 7 Minimum Requirements 1. A high-speed Internet connection. DSL or Cable Internet are recommended.

More information

DC Agent Troubleshooting

DC Agent Troubleshooting DC Agent Troubleshooting Topic 50320 DC Agent Troubleshooting Web Security Solutions v7.7.x, 7.8.x 27-Mar-2013 This collection includes the following articles to help you troubleshoot DC Agent installation

More information

Using Group Policies to Install AutoCAD. CMMU 5405 Nate Bartley 9/22/2005

Using Group Policies to Install AutoCAD. CMMU 5405 Nate Bartley 9/22/2005 Using Group Policies to Install AutoCAD CMMU 5405 Nate Bartley 9/22/2005 Before we get started This manual provides a step-by-step process for creating a Group Policy that will install AutoCAD to a Windows

More information

GFI Product Manual. Web security, monitoring and Internet access control. Administrator Guide

GFI Product Manual. Web security, monitoring and Internet access control. Administrator Guide GFI Product Manual Web security, monitoring and Internet access control Administrator Guide The information and content in this document is provided for informational purposes only and is provided "as

More information

HOW TO CONNECT TO FTP.TARGETANALYSIS.COM USING FILEZILLA. Installation

HOW TO CONNECT TO FTP.TARGETANALYSIS.COM USING FILEZILLA. Installation HOW TO CONNECT TO FTP.TARGETANALYSIS.COM USING FILEZILLA Note: These instructions direct you to download a free secure FTP client called FileZilla. If you already use a secure client such as WS-FTP Pro

More information

NovaBACKUP xsp Version 15.0 Upgrade Guide

NovaBACKUP xsp Version 15.0 Upgrade Guide NovaBACKUP xsp Version 15.0 Upgrade Guide NovaStor / November 2013 2013 NovaStor, all rights reserved. All trademarks are the property of their respective owners. Features and specifications are subject

More information

4cast Client Specification and Installation

4cast Client Specification and Installation 4cast Client Specification and Installation Version 2015.00 10 November 2014 Innovative Solutions for Education Management www.drakelane.co.uk System requirements The client requires Administrative rights

More information

Contents. Before You Install... 3. Server Installation... 5. Configuring Print Audit Secure... 10

Contents. Before You Install... 3. Server Installation... 5. Configuring Print Audit Secure... 10 Installation Guide Contents Before You Install... 3 Server Installation... 5 Configuring Print Audit Secure... 10 Configuring Print Audit Secure to use with Print Audit 6... 15 Licensing Print Audit Secure...

More information

AMS Suite: Machinery Health Manager

AMS Suite: Machinery Health Manager AMS Suite: Machinery Health Manager Version 5.61 Software Installation Guide User Guide MHM-97402, Rev 23 November 2014 Copyright 2014 by Emerson Process Management. All rights reserved. No part of this

More information

NETWRIX WINDOWS SERVER CHANGE REPORTER

NETWRIX WINDOWS SERVER CHANGE REPORTER NETWRIX WINDOWS SERVER CHANGE REPORTER INSTALLATION AND CONFIGURATION GUIDE Product Version: 4.0 March 2013. Legal Notice The information in this publication is furnished for information use only, and

More information

Enterprise Remote Control 5.6 Manual

Enterprise Remote Control 5.6 Manual Enterprise Remote Control 5.6 Manual Solutions for Network Administrators Copyright 2015, IntelliAdmin, LLC Revision 3/26/2015 http://www.intelliadmin.com Page 1 Table of Contents What is Enterprise Remote

More information

4.0 SP1 (4.0.1.0) November 2014 702P03296. Xerox FreeFlow Core Installation Guide: Windows Server 2008 R2

4.0 SP1 (4.0.1.0) November 2014 702P03296. Xerox FreeFlow Core Installation Guide: Windows Server 2008 R2 4.0 SP1 (4.0.1.0) November 2014 702P03296 Installation Guide: Windows Server 2008 R2 2014 Xerox Corporation. All rights reserved. Xerox, Xerox and Design, FreeFlow, and VIPP are trademarks of Xerox Corporation

More information

PHD Virtual Backup for Hyper-V

PHD Virtual Backup for Hyper-V PHD Virtual Backup for Hyper-V version 7.0 Installation & Getting Started Guide Document Release Date: December 18, 2013 www.phdvirtual.com PHDVB v7 for Hyper-V Legal Notices PHD Virtual Backup for Hyper-V

More information

ACTIVE DIRECTORY DEPLOYMENT

ACTIVE DIRECTORY DEPLOYMENT ACTIVE DIRECTORY DEPLOYMENT CASAS Technical Support 800.255.1036 2009 Comprehensive Adult Student Assessment Systems. All rights reserved. Version 031809 CONTENTS 1. INTRODUCTION... 1 1.1 LAN PREREQUISITES...

More information

Veeam Backup Enterprise Manager. Version 7.0

Veeam Backup Enterprise Manager. Version 7.0 Veeam Backup Enterprise Manager Version 7.0 User Guide August, 2013 2013 Veeam Software. All rights reserved. All trademarks are the property of their respective owners. No part of this publication may

More information

Administration Guide. . All right reserved. For more information about Specops Deploy and other Specops products, visit www.specopssoft.

Administration Guide. . All right reserved. For more information about Specops Deploy and other Specops products, visit www.specopssoft. . All right reserved. For more information about Specops Deploy and other Specops products, visit www.specopssoft.com Copyright and Trademarks Specops Deploy is a trademark owned by Specops Software. All

More information

Aspera Connect User Guide

Aspera Connect User Guide Aspera Connect User Guide Windows XP/2003/Vista/2008/7 Browser: Firefox 2+, IE 6+ Version 2.3.1 Chapter 1 Chapter 2 Introduction Setting Up 2.1 Installation 2.2 Configure the Network Environment 2.3 Connect

More information

Konica Minolta s Optimised Print Services (OPS)

Konica Minolta s Optimised Print Services (OPS) Konica Minolta s Optimised Print Services (OPS) Document Collection Agent (DCA) Detailed Installation Guide V1.6 Page 1 of 43 Table of Contents Notes... 4 Requirements... 5 Network requirements... 5 System

More information

vcenter Operations Management Pack for SAP HANA Installation and Configuration Guide

vcenter Operations Management Pack for SAP HANA Installation and Configuration Guide vcenter Operations Management Pack for SAP HANA Installation and Configuration Guide This document supports the version of each product listed and supports all subsequent versions until a new edition replaces

More information

Avaya Video Conferencing Manager Deployment Guide

Avaya Video Conferencing Manager Deployment Guide Avaya Video Conferencing Manager Deployment Guide August 2011 Avaya Video Conferencing Manager Deployment Guide 2 Avaya Video Conferencing Manager This guide is for network administrators who use Avaya

More information

Table of Contents. OpenDrive Drive 2. Installation 4 Standard Installation Unattended Installation

Table of Contents. OpenDrive Drive 2. Installation 4 Standard Installation Unattended Installation User Guide for OpenDrive Application v1.6.0.4 for MS Windows Platform 20150430 April 2015 Table of Contents Installation 4 Standard Installation Unattended Installation Installation (cont.) 5 Unattended

More information

WHITE PAPER Citrix Secure Gateway Startup Guide

WHITE PAPER Citrix Secure Gateway Startup Guide WHITE PAPER Citrix Secure Gateway Startup Guide www.citrix.com Contents Introduction... 2 What you will need... 2 Preparing the environment for Secure Gateway... 2 Installing a CA using Windows Server

More information

http://docs.trendmicro.com

http://docs.trendmicro.com Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the product, please review the readme files,

More information

SARANGSoft WinBackup Business v2.5 Client Installation Guide

SARANGSoft WinBackup Business v2.5 Client Installation Guide SARANGSoft WinBackup Business v2.5 Client Installation Guide (November, 2015) WinBackup Business Client is a part of WinBackup Business application. It runs in the background on every client computer that

More information

VMware vcenter Log Insight Getting Started Guide

VMware vcenter Log Insight Getting Started Guide VMware vcenter Log Insight Getting Started Guide vcenter Log Insight 1.5 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by

More information

VMware Horizon Mirage Installation Guide

VMware Horizon Mirage Installation Guide VMware Horizon Mirage Installation Guide Horizon Mirage 4.3 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition.

More information

Product Manual. Administration and Configuration Manual

Product Manual. Administration and Configuration Manual Product Manual Administration and Configuration Manual http://www.gfi.com [email protected] The information and content in this document is provided for informational purposes only and is provided "as is" with

More information

Ekran System Help File

Ekran System Help File Ekran System Help File Table of Contents About... 9 What s New... 10 System Requirements... 11 Updating Ekran to version 4.1... 13 Program Structure... 14 Getting Started... 15 Deployment Process... 15

More information

Installation Guide for Pulse on Windows Server 2008R2

Installation Guide for Pulse on Windows Server 2008R2 MadCap Software Installation Guide for Pulse on Windows Server 2008R2 Pulse Copyright 2014 MadCap Software. All rights reserved. Information in this document is subject to change without notice. The software

More information

Copyright 2012 Trend Micro Incorporated. All rights reserved.

Copyright 2012 Trend Micro Incorporated. All rights reserved. Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,

More information

Using Remote Web Workplace Version 1.01

Using Remote Web Workplace Version 1.01 Using Remote Web Workplace Version 1.01 Remote web workplace allows you to access your Windows XP desktop through Small Business Server 2003 from a web browser. 1. Connect to the Internet in your remote

More information

System Administration Training Guide. S100 Installation and Site Management

System Administration Training Guide. S100 Installation and Site Management System Administration Training Guide S100 Installation and Site Management Table of contents System Requirements for Acumatica ERP 4.2... 5 Learning Objects:... 5 Web Browser... 5 Server Software... 5

More information

Coillte IT has recently upgraded the Remote Access Solution to a new platform.

Coillte IT has recently upgraded the Remote Access Solution to a new platform. Overview Coillte IT has recently upgraded the Remote Access Solution to a new platform. This document explains how to gain access to the Coillte network using your home computer through the new Remote

More information

How To Create An Easybelle History Database On A Microsoft Powerbook 2.5.2 (Windows)

How To Create An Easybelle History Database On A Microsoft Powerbook 2.5.2 (Windows) Introduction EASYLABEL 6 has several new features for saving the history of label formats. This history can include information about when label formats were edited and printed. In order to save this history,

More information

Setting up an MS SQL Server for IGSS

Setting up an MS SQL Server for IGSS Setting up an MS SQL Server for IGSS Table of Contents Table of Contents...1 Introduction... 2 The Microsoft SQL Server database...2 Setting up an MS SQL Server...3 Installing the MS SQL Server software...3

More information

TROUBLESHOOTING GUIDE

TROUBLESHOOTING GUIDE Lepide Software LepideAuditor Suite TROUBLESHOOTING GUIDE This document explains the troubleshooting of the common issues that may appear while using LepideAuditor Suite. Copyright LepideAuditor Suite,

More information

7.x Upgrade Instructions. 2015 Software Pursuits, Inc.

7.x Upgrade Instructions. 2015 Software Pursuits, Inc. 7.x Upgrade Instructions 2015 Table of Contents INTRODUCTION...2 SYSTEM REQUIREMENTS FOR SURESYNC 7...2 CONSIDERATIONS BEFORE UPGRADING...3 TERMINOLOGY CHANGES... 4 Relation Renamed to Job... 4 SPIAgent

More information

Installing and Configuring Login PI

Installing and Configuring Login PI Installing and Configuring Login PI Login PI Hands-on lab In this lab, you will configure Login PI to provide performance insights for a Windows Server 2012 R2 Remote Desktop Services installation. To

More information

Server Installation, Administration and Integration Guide

Server Installation, Administration and Integration Guide Server Installation, Administration and Integration Guide Version 1.1 Last updated October 2015 2015 sitehelpdesk.com, all rights reserved TABLE OF CONTENTS 1 Introduction to WMI... 2 About Windows Management

More information

enicq 5 System Administrator s Guide

enicq 5 System Administrator s Guide Vermont Oxford Network enicq 5 Documentation enicq 5 System Administrator s Guide Release 2.0 Published November 2014 2014 Vermont Oxford Network. All Rights Reserved. enicq 5 System Administrator s Guide

More information

NETWRIX EVENT LOG MANAGER

NETWRIX EVENT LOG MANAGER NETWRIX EVENT LOG MANAGER QUICK-START GUIDE FOR THE ENTERPRISE EDITION Product Version: 4.0 July/2012. Legal Notice The information in this publication is furnished for information use only, and does not

More information

NovaBACKUP Central Management Console

NovaBACKUP Central Management Console NovaBACKUP Central Management Console User Manual NovaStor / November 2013 2013 NovaStor, all rights reserved. All trademarks are the property of their respective owners. Features and specifications are

More information

isupplier PORTAL ACCESS SYSTEM REQUIREMENTS

isupplier PORTAL ACCESS SYSTEM REQUIREMENTS TABLE OF CONTENTS Recommended Browsers for isupplier Portal Recommended Microsoft Internet Explorer Browser Settings (MSIE) Recommended Firefox Browser Settings Recommended Safari Browser Settings SYSTEM

More information

Kaseya 2. Installation guide. Version 7.0. English

Kaseya 2. Installation guide. Version 7.0. English Kaseya 2 Kaseya Server Setup Installation guide Version 7.0 English September 4, 2014 Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept

More information

Automating client deployment

Automating client deployment Automating client deployment 1 Copyright Datacastle Corporation 2014. All rights reserved. Datacastle is a registered trademark of Datacastle Corporation. Microsoft Windows is either a registered trademark

More information

Remote Connectivity to XV, XP and epro units running Visual Designer

Remote Connectivity to XV, XP and epro units running Visual Designer Intro Remote connectivity is one of the major features of Visual Designer and our new operator interface hardware platforms running that software. The ability to monitor, troubleshoot, edit and administer

More information

Storage Sync for Hyper-V. Installation Guide for Microsoft Hyper-V

Storage Sync for Hyper-V. Installation Guide for Microsoft Hyper-V Installation Guide for Microsoft Hyper-V Egnyte Inc. 1890 N. Shoreline Blvd. Mountain View, CA 94043, USA Phone: 877-7EGNYTE (877-734-6983) www.egnyte.com 2013 by Egnyte Inc. All rights reserved. Revised

More information

StruxureWare Power Monitoring 7.0.1

StruxureWare Power Monitoring 7.0.1 StruxureWare Power Monitoring 7.0.1 Installation Guide 7EN02-0308-01 07/2012 Contents Safety information 5 Introduction 7 Summary of topics in this guide 7 Supported operating systems and SQL Server editions

More information

Getting Started. Symantec Client Security. About Symantec Client Security. How to get started

Getting Started. Symantec Client Security. About Symantec Client Security. How to get started Getting Started Symantec Client Security About Security Security provides scalable, cross-platform firewall, intrusion prevention, and antivirus protection for workstations and antivirus protection for

More information

FTP, IIS, and Firewall Reference and Troubleshooting

FTP, IIS, and Firewall Reference and Troubleshooting FTP, IIS, and Firewall Reference and Troubleshooting Although Cisco VXC Manager automatically installs and configures everything you need for use with respect to FTP, IIS, and the Windows Firewall, the

More information

Forcepoint Sidewinder, Virtual Appliance Evaluation for Desktop. Installation Guide 8.x. Revision A

Forcepoint Sidewinder, Virtual Appliance Evaluation for Desktop. Installation Guide 8.x. Revision A Forcepoint Sidewinder, Virtual Appliance Evaluation for Desktop Installation Guide 8.x Revision A Table of contents 1 Overview...3 2 Verify system requirements...4 Virtualization requirements...4 Admin

More information