University of Oregon Information Services. Likewise Enterprise 5.3 Administrator s Guide

Size: px
Start display at page:

Download "University of Oregon Information Services. Likewise Enterprise 5.3 Administrator s Guide"

Transcription

1 University of Oregon Information Services Likewise Enterprise 5.3 Administrator s Guide Last Updated: March 2011 V7.1

2 Contents 1 - Preface Definitions... 5 opt/likewise... 5 AD... 5 Domain... 5 DuckID... 5 GPO... 5 UNIX Attributes... 5 WGM Prerequisites Download the Likewise Enterprise media Prepare a Windows Admin workstation Prepare a Mac Admin workstation Administrative Tasks Install Likewise Enterprise on a Mac/Linux/Unix host Pre-create a Mac/Linux/Unix computer object in Active Directory Join a Mac 10.x computer to the domain using the GUI tools Join a Mac 10.x computer to the domain using the terminal Join a Linux computer to the domain using the shell Remove a Likewise Enterprise client from the domain Uninstall Likewise Enterprise\Open Upgrade from Likewise Open to Likewise Enterprise Check domain membership of a likewise installed system Check Likewise version Login to a Likewise Enterprise client with domain credentials Force a group policy refresh (i.e. GPUPDATE /force) Create a GPO for Likewise clients on a Windows Admin workstation Mark a GPO for editing on a Mac Admin workstation Edit a GPO with Workgroup Manager on a Mac Admin workstation Migrate a local user profile into a domain user profile Verify an object has UNIX attributes Mac Policy Examples Grant admin access to a user or group Enable Mac firewall Apply a Pre-logon warning message to a MacOS host... 15

3 5.4 - Show Hard Disks and Connected Servers on Desktop by default Universal File Vault settings Configure login options Configure Energy Saver options Universal Linux/Unix/Mac Policy Examples Allow cached logins Restrict login to a user or group Grant a domain group sudo access to a Linux host Deploy Sudoers file Set Default Login Shell to /bin/bash Target a specific non-windows platform Enable Loopback processing on a GPO Deploy a File... 20

4 1 - Preface This guide is intended for OU Admins in consolidated Active Directory domain at the University of Oregon and will cover aspects of non-windows computer administration through integration with Active Directory using Likewise Enterprise 5.3. Specifically, prerequisites, common administrative tasks, and example Mac/Linux/Unix policies are covered.

5 2 - Definitions /opt/likewise /opt/likewise refers to the folder path that the Likewise agent is installed by default. Likewise tools are generally found in /opt/likewise/bin/ AD AD refers to the consolidated ad.uoregon.edu Active Directory domain Domain Domain refers to an Active Directory domain in the uoregon.edu forest. DuckID DuckID refers to the user s UO username. This is used throughout the document as <duckid> and should be replaced with the actual username anywhere used. This document also uses adm-<duckid> to refer to an OU admin account. GPO GPO refers to an Active Directory Group Policy Object. UNIX Attributes 1. Refers to values for key RFC 2307 attributes on user and group objects. These attributes are a requirement on Users and Groups for use on a Likewise Enterprise client and in Likewise Enterprise policies. 2. Users: a. To login to a Likewise Enterprise client workstation or to be used in a Likewise Enterprise GPO, a user must have valid uid, uidnumber and gidnumber attributes. b. All managed user objects have these attributes mapped from the central campus LDAP service. c. Unmanaged accounts are generally unsupported beyond OU Admin accounts. OU Admin accounts have been populated with the required Unix Attributes. 3. Groups: a. To be used in a Likewise Enterprise GPO, a group must have a valid gidnumber UNIX attribute. b. All *.OU.ADMIN groups have been assigned values for gidnumber. c. Other groups may be provisioned on request by ing [email protected]. WGM WGM refers to Apple s Workgroup Manager. This can be downloaded at no cost from apple and is required to inject Apple MCX policies into Active Directory Group Policy Objects.

6 3 - Prerequisites Download the Likewise Enterprise media 1. Description: This section describes the steps to download the current release of Likewise Enterprise 5.3. a. In a web browser, open: b. This URL is the Likewise Enterprise Licensing, Support and Installers page that contains information on purchasing, receiving support, and downloading installation media. a. The Likewise Enterprise Licensing, Support and Installers site is only accessible to the UO Network. If accessing from off-campus, a VPN connection will be required Prepare a Windows Admin workstation 1. Description: This section details the steps required to setup your Windows XP/7 Admin workstation to manage Likewise Enterprise clients. Note that this only differs from configuring a standard AD Admin workstation by installing the Likewise Enterprise extensions. Likewise Enterprise simply extends the Active Directory User and Computers and Group Policy Management Console MMCs. a. Identify a Windows workstation currently joined to the AD domain to run the AD Administrative tools with the Likewise add-on. b. Install the Active Directory User & Computers Console: i. Windows XP: 1. Download adminpak.msi from Microsoft: a. ii. Windows 7 1. Download Remote Server Administration Tools for Windows 7 a. a005-4e344e43997d&displaylang=en 2. Enable Active Directory Users & Computers Console a. Open Control Panel b. Open Programs and Features c. Click Turn Windows Features on or off d. In the Windows Features window e. Expand Remote Server Administration Tools f. Expand Role Administration Tools g. Expand AD DS Tools h. Check Active Directory Administrative Center i. Check AD DS Snap-ins and Command-line Tools c. Install the Group Policy Management Console (gpmc.msc) i. Windows XP: 1. Download gpmc.msc from Microsoft: a. ii. Windows 7: a. a005-4e344e43997d&displaylang=en 2. Enable Group Policy Management Console a. Open Control Panel b. Open Programs and Features c. Click Turn Windows Features on or off

7 d. In the Windows Features window, browse to Remote Server Administration Tools then Feature Administration Tools e. Check Group Policy Management Tools d. Install the appropriate Likewise Console on your Windows Admin workstation i. Double-click one of the following: 1. SetupLikewise-<version>.exe - for 32bit hosts 2. SetupLikewise64-<version>.exe - for 64bit hosts ii. At the Welcome to Likewise Enterprise screen, select Only Basic Management Components. iii. Accept the license agreement. iv. Click Next v. Click Start vi. After installation finishes, click Next. vii. At the Installation Complete final page, uncheck Run Enterprise Console and click Finish. a. IMPORTANT: Likewise Enterprise installs two visible applications: i. Enterprise Console: This is not used in our environment. In essence this only links you to other tools and provides information on the current LWE installation status. ii. Likewise Cell Manager: This is not generally use in our environment as we are using the default Cell in Schema mode Prepare a Mac Admin workstation 1. Description: This section details the steps required to setup your Mac 10.6 Admin workstation to manage Likewise Enterprise clients with Workgroup Manager. a. Identify a Mac OS workstation to use as an Admin workstation with Apple Workgroup Manager. b. Follow the steps in section Join a Mac 10.x computer to the AD domain using the GUI tools c. Install the Mac Server admin tools from Apple. i. Server Admin Tools : d. Login with credentials: i. Username: ad\adm-<duckid> ii. Password: (Your adm-<duckid> password) a. If you are unable to login with you adm-<duckid> account, it may not have UNIX attributes. Follow the steps in Verify an object has UNIX attributes to confirm. If it does not, submit a ticket to [email protected] to have this enabled. b. IMPORTANT: Do not attempt to setup Workgroup Manager after installation. Unlike using WGM in an OpenDirectory environment, you will not configure WGM to connect directly to one of the directory servers. The proper steps are covered in more depth in section Edit a GPO with Workgroup Manager on a Mac Admin workstation.

8 4 - Administrative Tasks Install Likewise Enterprise on a Mac/Linux/Unix host 1. Description: This section details the process of installing Likewise Enterprise on a Mac/Linux/Unix host. a. Follow the steps in Download the Likewise Enterprise Media. b. Mac: i. Run the dmg image. For most modern Mac systems, this will be: 1. LikewiseEntDpy-5\agents\darwin\x86_64\dmg\LikewiseIdentityServiceEnterprise OSX10.6-universal.dmg ii. From the mounted DMG, double-click LikewiseIdentityServiceEnterprise OSX10.6- universal.mpkg iii. In the Install Likewise Identity Server *Enterprise window, click Continue. iv. Click Continue v. Click Continue, then click Agree vi. Select the installation location and click Continue vii. Click Install c. Linux/Unix: i. Insert the Likewise 5.3 installation media or mount a share containing the installation files and run install.sh 1. CIFS Share example: a. mkdir /mnt/likewise b. mount -t cifs //DEPT-SERVERNAME/SHARE /mnt/likewise -o username=ad\\<duckid> c. <Enter user password> d. sudo /mnt/likewise/install.sh 2. cdrom Example: a. sudo /mnt/cdrom/install.sh ii. Hit Enter to view License Agreement. iii. Continue hitting enter until Do you accept this license *y/n+ is shown. iv. Enter y, then hit Enter. v. If using a 64bit OS, enter 1, 2, or 3 at the 32-bit Compatibility Libraries prompt. Auto *1+ is default. vi. At the Setup is now ready to begin installing Likewise Identify prompt, select Y then hit Enter. a. Mac installation must use the DMG image from the GUI. Command-line installation will simply indicate the requirement to open the DMG Pre-create a Mac/Linux/Unix computer object in Active Directory 1. Description: This section details the steps to pre-create a computer object in Active Directory. This is an optional step when using Likewise Enterprise to join a computer to the domain, though the most common method. a. On the Windows Admin workstation, open the Active Directory Users & Computers mmc console i. Start > Run > dsa.msc, or b. Browse to your unit s Computers OU i. Ad.uoregon.edu \ Units \ <unit> \ Computer c. Right-click > New > Computer d. Enter a name of the computer object i. ex: ad.uoregon.edu\units\is\computers\sys\is-mac-2385fh3 a. IMPORTANT: The computer name must begin with your departments prefix (ex: is-mac-2385fh3) and be 15 characters or less.

9 4.3 - Join a Mac 10.x computer to the domain using the GUI tools 1. Description: This section details the process of domain joining a Mac computer to the domain with the GUI Likewise Enterprise application. a. Follow the steps in Install Likewise Enterprise on a Mac/Linux/Unix host. b. Follow the steps in Pre-create a Mac/Linux/Unix computer object in Active Directory to create the computer object. c. Configure the Mac to use this computer name i. From the GUI: 1. Apple Menu > System Preferences > Sharing > Computer Name 2. Enter the name from step b in the Computer Name field. ii. From the command line 1. Sudo scutil --set HostName dept-wks-name.ad.uoregon.edu d. Open Directory Utility. i. Mac OS 10.6.x: 1. Open System Preferences 2. Open Accounts 3. Click Login Options 4. Click Join to the right of Network Account Server 5. Click Open Directory Utility ii. Mac OS 10.5.x: 1. Open Applications 2. Open Utilities 3. Open Directory Utility e. Double-click Likewise - Active Directory to open the Likewise Domain Join app. i. This will require you to unlock Directory Utility page and enter admin credentials. f. Enter the following in the Likewise Domain Join app: i. Computer name: (confirm this matches name set in step 1) ii. Domain to join: ad.uoregon.edu iii. At Specify an Organizational Unit, leave as Computers container or existing iv. Click Join v. Enter your adm-<duckid> username\password. g. Restart the Mac system. h. Follow the steps in Login to a Likewise Enterprise client with domain credentials to test login. a. When joining the Mac computer to the domain, enter your adm-<duckid> username (not ad\adm-<duckid>). b. When logging into the computer with domain credentials, the username entered must be in the format ad\<duckid>. The ad\ prefix is required. c. The user used to login must have valid Unix Attributes. d. In step 2c, the GUI method of setting the computer name may not always work as expected. In this case, use scutil. e. The default computer name displayed in step g may not match the name you set in step b. This is because Likewise performs a reverse DNS lookup for the workstation s IP address. If a DNS record is found, Likewise will default to this DNS name. You may either fix the DNS entry or ignore the incorrect DNS entry and change the Computer Name field in the Likewise Domain Join app to the correct name. f. If the computer object for the Mac workstation has not been pre-created or was misspelled, the domain join operation will fail Join a Mac 10.x computer to the domain using the terminal 1. Description: This section details the steps to run the Likewise domain join command from the terminal after installation. a. Perform steps A through C from Join a Mac 10.x computer to the AD domain using the GUI tools b. Run the following from the terminal:

10 i. sudo /opt/likewise/bin/domainjoin-cli join ad.uoregon.edu adm-<duckid> c. Follow the steps in Login to a Likewise Enterprise client with domain credentials to test login. a. If the computer object has not been pre-created or does not match, the domain join operation will fail Join a Linux computer to the domain using the shell 1. Description: This section details the steps to install Likewise Enterprise on a supported host and join the domain. a. Follow the steps in Pre-create a Mac/Linux/Unix computer object in Active Directory to create the computer object. b. Configure an appropriate hostname that follows the AD domain naming conventions i. RedHat: 1. /etc/sysconfig/network 2. Enter the short name of the host (IS-RH-NAME) 3. Reboot the system c. sudo domainjoin-cli join ad.uoregon.edu adm-<duckid> d. Enter the adm-<duckid> user password when prompted. e. Reboot f. Follow the steps in Login to a Likewise Enterprise client with domain credentials to test login. a. If the computer object has not been pre-created or does not match, the domain join operation will fail Remove a Likewise Enterprise client from the domain 1. Description: This section details the steps to remove a domain-joined Likewise Enterprise client from the domain a. Login to the host with the local root / admin account. b. Leave the domain: i. sudo /opt/likewise/bin/domainjoin-cli leave (adm-<duckid>) a. The (adm-<duckid>) argument is optional. If you do not enter provide a username, the computer will simply drop from the domain. If you enter a username, you will be prompted for credentials. If the user has sufficient permissions to the computer object in AD, the object will be disabled as well Uninstall Likewise Enterprise\Open 1. Description: This section details the steps to uninstall Likewise Enterprise from a workstation/server. a. Check for domain-joined status by following the steps in Check domain membership of a Likewise Enterprise client. b. If the workstation/server is domain-joined, follow the steps in Remove a Likewise Enterprise client from the domain. c. Run the Likewise Uninstaller: i. Likewise Enterprise 5.3: 1. Mac OS: sudo /opt/likewise/bin/macuninstall.sh 2. Other Linux/Unix: sudo /opt/likewise/setup/lwise/uninstall ii. Likewise Open 6.0: 1. Mac OS: sudo /opt/likewise/bin/macuninstall.sh 2. Other Linux/Unix: sudo /opt/likewise/bin/uninstall.sh uninstall

11 a. IMPORTANT: The uninstall process is different on a Mac than on other Linux/Unix systems Upgrade from Likewise Open to Likewise Enterprise 1. Description: This section details the steps to upgrade an installation of Likewise Open, the free version of Likewise, to Likewise Enterprise. a. Login to the host with the local root / admin account. b. Follow the steps from Uninstall Likewise Enterprise\Open to remove the computer from the domain and uninstall Likewise Open. c. Follow the steps in Join a Linux Computer to the Domain using the Shell to install Likewise Enterprise and re-join the domain. a. In testing, a complete removal of the Likewise Open client prior to installation of Likewise Enterprise has been the most successful Check domain membership of a likewise installed system 1. Description: This section shows the command to get a host s current domain status. This can be useful when troubleshooting failed login attempts. a. Run the following command: /opt/likewise/bin/lw-get-current-domain 3. NOTES: a. Result indicating the system is domain-joined: Current Domain = AD.UOREGON.EDU b. Result indicating the system is not domain-joined: Failed communication with the LWNET Agent. Error code 136 (ERROR_NOT_JOINED) Check Likewise version 1. Description: This section shows the command to find the Likewise Enterprise/Open version of a host. a. cat /opt/likewise/data/version 3. NOTES: a. Example output: VERSION=5.3.0 BUILD=7827 REVISION= Login to a Likewise Enterprise client with domain credentials 1. Description: This section provides the steps to login to a Likewise Enterprise client from the console and ssh. a. Console login: i. Username: AD\<duckid> ii. Password: <duckid password> b. SSH: i. Username: AD\\<duckid> ii. Password: <duckid password> 3. NOTES:

12 a. If unable to login to a host through a service with AD\<duckid> (other than direct console login), try entering AD\\<duckid> Force a group policy refresh (i.e. GPUPDATE /force) 1. Description: This section shows the command to force a Likewise Enterprise client to update it s set of Group Policies. This is similar to the Windows command gpupdate /force a. Confirm Likewise Enterprise is installed by navigating to the Likewise installation directory (/opt/likewise). b. From the terminal, run the following command: sudo /opt/likewise /bin/gporefresh a. You must run this command with sudo privilege or as root or it will fail with the error This program requires superuser privileges Error: Access Denied b. Group Policy will automatically refresh at the default interval of 30 minutes unless otherwise set by GPO. c. Restarting a computer while plugged into the network will also prompt a GPO refresh on startup Create a GPO for Likewise clients on a Windows Admin workstation 1. Description: This section details the steps to create a GPO from the Windows Admin workstation as well as where to look for Likewise-specific policies. a. Follow the steps in Windows Admin workstation to prepare your Windows Admin workstation. b. Open Group Policy Management Console i. Start Menu > Run > gpmc.msc ii. Or, Start > Administrative Tools > Group Policy Management c. Create a GPO for your unit and attach to the OU required. d. Name the GPO to include your department prefix, the user/comp target, and the purpose. i. E.g. IS-COMP-Linux_Sudoer_Access e. Edit the GPO. f. Expand Computer Configuration or User Configuration. g. Expand Policies. h. You will now see a new section named Unix and Linux Settings. a. All Likewise settings are stored under Unix and Linux Settings Mark a GPO for editing on a Mac Admin workstation 1. Description: This section details the steps to mark an Active Directory GPO for management by a Mac admin workstation with Workgroup Manager. Workgroup Manager can only see GPOs that have been marked in this manner and can only embed User and/or Computer policies if the appropriate switch is set on the User and/or Computer policy side of the GPO. a. Follow the steps in Create a GPO for Likewise clients on a Windows Admin workstation b. Right-click > Edit c. Expand Computer Configuration or User Configuration d. Expand Unix and Linux Policies e. Expand Mac Settings f. Click Workgroup Manager Settings g. Double-click Enable Workgroup Manager to configure settings for computers. h. Check the box Define this policy setting. a. Workgroup Manager on the Admin Mac workstation is only able to see policies when the Enable Workgroup Manager. Option is selected from either the Computer Configuration or User Configuration node. b. Workgroup manager can only inject Computer policies into the GPO when the Computer Configuration option is enabled. Similarly, User policies may only be injected when the User Configuration option is enabled.

13 c. Once you have published a Mac policy to this GPO, the XML values of the policy will appear in the box Current file content Edit a GPO with Workgroup Manager on a Mac Admin workstation 1. Description: This section provides the basic steps to edit a GPO with Workgroup manager. This assumes the policy has been properly tagged for editing per section Mark a GPO for editing on a Mac Admin workstation. a. Follow the steps in Mark a GPO for editing on a Mac Admin workstation to enable a GPO for policy injection. b. Open Workgroup Manager. i. Applications \ Server \ Workgroup Manager ii. Ignore initial popup window Workgroup Manager Connect c. Click the Server drop down, then View Directories. d. Click OK at the local configuration database warning prompt. e. Click on the left top where it says Viewing local directory: /Local/Default, this will popup several options. Select Other from this list. f. Select Likewise irectory > Select AD.UOREGON.EDU. You will see a list of Mac enabled policies in the 3rd column. g. Select the policy you wish to edit and click OK. h. At the top right, there should be a small picture of a lock. This may show as locked. Click this lock to authenticate against this policy. i. Enter ad\adm-<username> with the appropriate password. If successful, the lock will change to a picture of an opened lock. a. There are 4 icons on the top left of the Workgroup Manager window. These correspond to Users, User Groups, Computers and Computer Groups. The group icons are the only that are used for Likewise (Users and Computers). b. Depending on the purpose of the policy, click either the Users or Computers icon. You should see an entry show up for Group of Users/Computers managed by GPO. These groups are used by likewise to apply the GPO settings to any computer in the OU that the GPO is attached to Migrate a local user profile into a domain user profile 1. Description: This section details the steps to migrate an existing local user profile on a Mac workstation or server into a domain user profile. This can simplify the transition of a user into a domain account. a. Follow the steps in Join a Mac 10.x computer to the AD domain using the GUI tools b. Once joined, re-open Directory Utility. c. Mac OS 10.6.x: i. Open System Preferences ii. Open Accounts iii. Click Login Options iv. Click Join to the right of Network Account Server v. Click Open Directory Utility d. Mac OS 10.5.x: i. Open Applications ii. Open Utilities iii. Open Directory Utility e. Double-click Likewise - Active Directory to open the Likewise Domain Join app. i. This will require you to unlock Directory Utility page and enter admin credentials. f. Click Migrate g. In the Source - Local Account section, click the dropdown list and find the local user account. h. Enter the DOMAIN\USERNAME of the user from the domain you wish to have this profile. (ex: ad\jdoe) i. Click the button shaped like a check mark. j. Select Copy Profile. k. Click Migrate. l. At the Likewise Migrate User Profile popup, click Yes.

14 a. This process will take up to several minutes to complete as the local user profile is copied to a new profile for the domain user. b. The log file for this migration can be found at /tmp/lw-migrate.<source_account_username>.log c. IMPORTANT: Make sure enough disk space is available on the OS drive to allow the copy operation to complete successfully. The Migration wizard does not report on a failure of this type Verify an object has UNIX attributes 1. Description: This section details the steps to check a user or group object for valid UNIX attributes. a. From the Windows admin workstation, open the Active Directory Users and Computers console. b. Browse to the user or group object in your OU. i. Ex: AD\IS\Groups\IS.ALLUSERS c. Right-click > Properties d. Select the Likewise Settings tab e. Check the Cells section. If the (Default) box is selected, the object should have UNIX attributes specified in the fields beneath. a. Managed users should have UNIX attributes automatically populated from the central LDAP service. b. Unmanaged users will not have UNIX attributes assigned with the exception of OU Admin accounts. c. Groups will not have UNIX attributes by default, except for *.OU.ADMIN groups. Others may be requested by sending a request to [email protected].

15 5 - Mac Policy Examples Grant admin access to a user or group 1. Description: This section details the steps to allow specified users or groups Administrator access to a Mac workstation or server. Without this policy, all domain users are only standard users. a. Follow the steps in Create/Edit GPOs for Likewise clients on a Windows Admin workstation b. Right-click > Edit c. Expand Computer Configuration d. Expand Unix and Linux Policies e. Expand Mac Settings f. Click DS Plugin Settings g. Double-click Allow administration by i. Add the group you would like to grant local admin access. h. Double-click Allow admins group local entries > Select True. a. *IMPORTANT*: The groups and users selected must have UNIX attributes to function. If you are intending to use a group that does not currently have UNIX attributes, contact Systems via the [email protected] RT queue to have this setup Enable Mac firewall 1. Description: This section details the steps to enable and configure the Mac firewall. a. Follow the steps in Create a GPO for Likewise clients on a Windows Admin workstation b. Right-click > Edit c. Expand Computer Configuration d. Expand Unix and Linux Policies e. Expand Mac Settings f. Expand Mac System Preferences g. Click Firewall h. Double-click Use firewall protection i. Check Define this policy settings j. Select Enabled k. (Optional) Enable firewall logging i. Double-click Turn on firewall logging ii. Check Define this policy settings iii. Select Enabled l. (Optional) Block UDP traffic i. Double-click Block UDP traffic usage ii. Check Define this policy settings iii. Select Enabled m. (Optional) Enable firewall stealth mode i. Double-click Use firewall stealth mode ii. Check Define this policy settings iii. Select Enabled n. Click Apply Now. o. Any Mac in the OU that the GPO is attached will now receive these settings on next gpupdate. N/A Apply a Pre-logon warning message to a MacOS host

16 1. Description: This section details the steps to apply a pre-logon warning message to users of a workstation or server. A common warning would display Authorized use only along with any laws, regulation, and warnings about acceptable use as required. This is a recommended practice for both Windows and Mac hosts. a. Follow the steps in Using Workgroup Manager to edit tagged GPOs from your Mac Admin workstations. b. Select Group of Computers managed by GPO. c. At the top of the Workgroup Manager window, click Preferences. This will show you all of the Computer-related settings you may set in this policy by category. d. Select Login e. Select the Window tab. f. Choose Always at the top of the new Login settings window. g. Enter any text into the Message: field. h. Click Apply Now. i. Any Mac in the OU that the GPO is attached will now receive these settings on next gpupdate. N/A Show Hard Disks and Connected Servers on Desktop by default 1. Description: This section details the steps to force a Mac workstation or server to show network, external and local drives on the user s desktop. a. Follow the steps in Using Workgroup Manager to edit tagged GPOs from your Mac Admin workstations. b. Select Group of Computers managed by GPO. c. At the top of the Workgroup Manager window, click Preferences. This will show you all of the Computer-related settings you may set in this policy by category. d. Select Finder. e. Select the Preferences tab. f. Check Hard Disks, External Drives, CDs, DVDs, and ipods, and Connected Servers under Show these items on the Desktop. g. Click Apply Now. h. Any Mac in the OU that the GPO is attached will now receive this pre-logon message. N/A Universal File Vault settings 1. Description: This section provides an example usage of the Likewise file deployment mechanism to control FileVault settings across manages Mac workstations. This should be done with extreme caution and testing. a. On a Mac workstation without FileVault setup, setup the master FileVault password you intend to use on every system. b. Follow the steps in Deploy a File to a Mac workstation to deploy: i. /Library/Keychains/FileVaultMaster.cer ii. /Library/Keychains/FileVaultMaster.keychain c. Match the ACL settings on each file in the GPO to those set on the Mac. d. Uncheck Delete when policy is removed, or these files will be removed from the system if it removed from scope of the policy. a. Be sure to read the following article for more information on this strategy: FileVaultintheEnterprisePart1/index.html Configure login options 1. Description: This section details the steps to configure login options, such as Automatic login, Fast User Switching, Guest account, and screensaver timeouts.

17 a. Follow the steps in Edit a GPO with Workgroup Manager on the Mac Admin workstation. b. Select Group of Computers managed by GPO. c. At the top of the Workgroup Manager window, click Preferences. This will show you all of the Computer-related settings you may set in this policy by category. d. Select Login. e. Select the Options tab. f. Uncheck Enable automatic login. g. Uncheck Enable Fast User Switching. h. Uncheck Enable Guest Account. i. Check Start screen saver after XX minutes. j. Enter a number of minutes to start screen saver. k. Click the button to the right of Use module at path: l. Browse to the desired screensaver (/System/Library/Screen Savers/*.saver m. Click Apply Now. n. Any Mac in the OU that the GPO is attached will now receive these settings. a. Mac MCX policies are not as granular as many Windows GPO settings. In this example, you must decide what settings you want to use for *all* options in the Login\Options configuration section as all will be enforced. You cannot decide to set any as undefined as you would in a GPO (allowing local override) Configure Energy Saver options 1. Description: This section details the steps to apply managed Energy Saver options to Mac workstations. This is typically used to force workstation to sleep and disable displays after a fixed amount of time. a. Follow the steps in Edit a GPO with Workgroup Manager on the Mac Admin workstation. b. Select Group of Computers managed by GPO. c. At the top of the Workgroup Manager window, click Preferences. This will show you all of the Computer-related settings you may set in this policy by category. d. Select Energy Saver. e. Select Manage: Always f. Select Sleep from the Settings dropdown list. g. Select a time for Put the computer to sleep when it is inactive for: h. Select a time for Put the display(s) to sleep when the computer is inactive for: i. Check/Uncheck Put the hard disk(s) to sleep when possible. j. Select Options from the Settings dropdown list. k. Uncheck Wake when modem detects a ring l. Check Wake for Ethernet network administrator access m. Check/Uncheck Allow power button to sleep the computer n. Check/Uncheck Restart automatically after a power failure o. Click Apply Now. p. Any Mac in the OU that the GPO is attached will now receive these settings. N/A

18 6 - Universal Linux/Unix/Mac Policy Examples Allow cached logins 1. Description: This section details the steps to enable cached logins. Cached logins allows a user to login to a host even when it is offline, as long as a successful login event has occurred previously. This is common to set on workstations and laptops. a. Follow the steps in Create a GPO for Likewise clients on a Windows Admin workstation b. Expand Computer Configuration c. Expand Unix and Linux Policies d. Expand Likewise Settings e. Select Logon f. Double-click Allow cached logons (cached_login) g. Check Define this Policy Settings. h. Select Authorization and Identification i. Double-click Allow offline logon support j. Check Define this Policy Settings. k. Select Enable a. For this policy to be effective, a user must successfully logon at least one time after this policy is applied to the host Restrict login to a user or group 4. Description: This section details the steps to restrict login to a workstation or server. Example of this usage would be to to only allow staff from a particular department to login to a workstation, or deny login to a server system by anyone other than an admin group/user. 5. Steps: a. Follow the steps in Create a GPO for Likewise clients on a Windows Admin workstation b. Right-click > Edit c. Expand Computer Configuration d. Expand Unix and Linux Policies e. Expand Likewise Settings f. Select Logon g. Double-click Allow logon rights h. Check Define this Policy Settings. i. Click the button resembling a pencil. j. Find the group you would like to grant local logon rights. k. (Optional): Enter a message to be displayed when logon is denied. l. Double-click Denied logon rights message Properties. m. Check Define this Policy Settings. n. Edit text in the Logon error message box as required. The default text may work for your purposes. 6. Notes: a. You may select multiple groups to grant logon rights. These must be entered in a comma separated list, though this is done automatically when searching and selecting a group. b. *IMPORTANT*: The groups and users selected must have UNIX attributes to function. If you are intending to use a group that does not currently have UNIX attributes, contact Systems via the [email protected] RT queue to have this setup Grant a domain group sudo access to a Linux host 1. Description: This section details the steps to allow a domain group or user sudo privileges on a Linux host. These steps allow any member of the group specified to perform admin operations. a. Follow the steps in Join a Linux computer to the domain using the shell. b. Edit the sudoers file on the Linux system

19 i. sudo nano /etc/sudoers c. Look for the entry: root ALL=(ALL) ALL or root ALL=ALL d. Directly beneath this, enter the following: %AD\\GROUPNAME ALL=(ALL) ALL e. Reboot the system f. Login with a domain user that is a member of the group you added to the sudoers file. g. Confirm sudo access by running an elevated command a. GROUPNAME must be replaced with a valid domain group. All members of this group will be granted sudo access to the Linux host. b. The group selected must have valid UNIX attributes Deploy Sudoers file 1. Description: This section details the steps to deploy a working sudoers file to Linux hosts in order to standardize your sudoers user list across managed servers. You may also create multiple GPO with different sudoers files as necessary. a. Follow the steps in section Grant a domain group sudo access to a Linux host b. Copy the sudoers file from this host to a network location. (e.g. \\fileserver\share\sudoers) c. Follow the steps in Create a GPO for Likewise clients on a Windows Admin workstation d. Right-click > Edit e. Expand Computer Configuration f. Expand Unix and Linux Policies g. Expand Security Settings h. Select SUDO command i. Double-click Define Sudoers file j. Check Define this Policy Settings. k. Click Import l. Browse to the network location (e.g. \\fileserver\share\sudoers) and select the file. m. Confirm the information imported into the Current file content is correct. n. Click OK. a. The sudoers file should be prepared for each class of host and thoroughly tested before mass deployment to protect against version or platform specific settings Set Default Login Shell to /bin/bash 1. Description: This section details the steps required to set the default login shell on a Linux/Unix/Mac host. This is commonly used to set the default shell to /bin/bash as many platforms will default to /bin/sh. a. Follow the steps in Create a GPO for Likewise clients on a Windows Admin workstation b. Right-click > Edit c. Expand Computer Configuration d. Expand Unix and Linux Policies e. Expand Likewise Settings f. Select Authorization and Identification' g. Double-click Login shell template h. Check Define this policy setting i. In the Shell: field, enter /bin/bash j. Click OK. a. This policy should be put in place *before* a user logs in. If a user has already logged in and has another shell set, you may need to restart the host

20 6.5 - Target a specific non-windows platform 1. Description: This section details the steps to target a specific Linux/Unix/Mac platform. This is used to assign policies to only a particular platform, such as Mac OS or Redhat. In conjunction with OU structure, this can be used to define GPO assignment at a granular level. a. Follow the steps in Create a GPO for Likewise clients on a Windows Admin workstation b. Expand Computer Configuration c. Expand Unix and Linux Policies d. Select Target Platform Filter e. Double-click Target platforms f. Check Define this policy setting g. Select Select from the List h. Check all platforms to which this policy should apply. i. Click OK. a. N/A Enable Loopback processing on a GPO 1. Description: This section details the steps required to enable Loopback processing. This feature allows User GPO settings to be attached to Computer GPOs. Settings then merge into or replace the policy settings normally assigned by User GPOs. This is common when creating policies for kiosk stations where an admin intends to override and user GPO settings. Additionally, this is a common method to assign User GPOs in the campus Active Directory environment due to the architecture and IDM integration. a. Follow the steps in Create a GPO for Likewise clients on a Windows Admin workstation b. Expand Computer Configuration c. Expand Unix and Linux Policies d. Expand Likewise Settings e. Click Group Policy Agent f. Double-click User policy loopback processing mode g. Check Define this Policy Setting h. Select Replace or Merge as required. a. Standard loopback processing set for Windows workstations will not work on non-windows workstations. You must enable loopback processing for Likewise clients through the Unix and Linux Settings node. b. Merge is the most common setting for loopback processing in our environment. This enables any GPOs assigned to the workstation that contain user-specific settings to overwrite any conflicting settings, but leave others. c. Replace is typically used with kiosk systems that require the user-specific settings to be completely ignored. This setting overwrites and conflicts, but also removes any other settings set by any user GPOs Deploy a File 1. Description: This section details the steps to deploy a file to managed Linux/Unix/Mac hosts. This is targeted at the deployment of small configuration files for applications and should not be used for large file deployment. a. Follow the steps in Create a GPO for Likewise clients on a Windows Admin workstation b. Expand Computer Configuration c. Expand Unix and Linux Policies d. Expand File System Settings e. Select Files, Directories and Links f. Double-click Create Directories, Install Files, Configure Links g. Check the Define this policy setting box h. Click Add i. Select File

21 j. Browse to the file location k. Enter the patch the file should be deployed to. l. Set file ACL values (read/write/execute for User/Group/Other) m. Select an AD User/Group if desired n. Check/Uncheck Delete when policy is removed as necessary o. Click OK a. IMPORTANT: This file deployment method is intended for small files. Do not deploy large files using this method as this can directly impact the performance of Active Directory. b. Deployed files are stored inside the GPO and distributed to clients from there. Unlike a GPO Preferences policy for Windows, the UNC path (e.g. \\server\shared\file.ext) is not used Set AD domain as default for user logon 1. Description: This section details the steps to automatically set Likewise-enabled computers to automatically prepend the default domain (AD) to users for logon. a. Follow the steps in Create a GPO for Likewise clients on a Windows Admin workstation b. Expand Computer Configuration c. Expand Unix and Linux Policies d. Expand Likewise Settings e. Select Authorization and Identification f. Double-click Lsassd: Prepend default domain name for AD users and groups g. Check the Define this policy setting box h. Click Select Enabled i. Click OK a. After the next policy refresh, users will be able to logon to a machine affected by this policy with only their DuckID username. Adding AD\ will no longer required.

ACTIVE DIRECTORY DEPLOYMENT

ACTIVE DIRECTORY DEPLOYMENT ACTIVE DIRECTORY DEPLOYMENT CASAS Technical Support 800.255.1036 2009 Comprehensive Adult Student Assessment Systems. All rights reserved. Version 031809 CONTENTS 1. INTRODUCTION... 1 1.1 LAN PREREQUISITES...

More information

2. Using Notepad, create a file called c:\demote.txt containing the following information:

2. Using Notepad, create a file called c:\demote.txt containing the following information: Unit 4 Additional Projects Configuring the Local Computer Policy You need to prepare your test lab for your upcoming experiments. First, remove a child domain that you have configured. Then, configure

More information

Centralized Mac Home Directories On Windows Servers: Using Windows To Serve The Mac

Centralized Mac Home Directories On Windows Servers: Using Windows To Serve The Mac Making it easy to deploy, integrate and manage Macs, iphones and ipads in a Windows environment. Centralized Mac Home Directories On Windows Servers: Using Windows To Serve The Mac 2011 ENTERPRISE DEVICE

More information

NetIQ Advanced Authentication Framework. FIDO U2F Authentication Provider Installation Guide. Version 5.1.0

NetIQ Advanced Authentication Framework. FIDO U2F Authentication Provider Installation Guide. Version 5.1.0 NetIQ Advanced Authentication Framework FIDO U2F Authentication Provider Installation Guide Version 5.1.0 Table of Contents 1 Table of Contents 2 Introduction 3 About This Document 3 System Requirements

More information

IBM WebSphere Application Server Version 7.0

IBM WebSphere Application Server Version 7.0 IBM WebSphere Application Server Version 7.0 Centralized Installation Manager for IBM WebSphere Application Server Network Deployment Version 7.0 Note: Before using this information, be sure to read the

More information

TECHNICAL DOCUMENTATION SPECOPS DEPLOY / APP 4.7 DOCUMENTATION

TECHNICAL DOCUMENTATION SPECOPS DEPLOY / APP 4.7 DOCUMENTATION TECHNICAL DOCUMENTATION SPECOPS DEPLOY / APP 4.7 DOCUMENTATION Contents 1. Getting Started... 4 1.1 Specops Deploy Supported Configurations... 4 2. Specops Deploy and Active Directory...5 3. Specops Deploy

More information

WhatsUp Gold v16.1 Installation and Configuration Guide

WhatsUp Gold v16.1 Installation and Configuration Guide WhatsUp Gold v16.1 Installation and Configuration Guide Contents Installing and Configuring Ipswitch WhatsUp Gold v16.1 using WhatsUp Setup Installing WhatsUp Gold using WhatsUp Setup... 1 Security guidelines

More information

User Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream

User Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream User Manual Onsight Management Suite Version 5.1 Another Innovation by Librestream Doc #: 400075-06 May 2012 Information in this document is subject to change without notice. Reproduction in any manner

More information

WhatsUp Gold v16.3 Installation and Configuration Guide

WhatsUp Gold v16.3 Installation and Configuration Guide WhatsUp Gold v16.3 Installation and Configuration Guide Contents Installing and Configuring WhatsUp Gold using WhatsUp Setup Installation Overview... 1 Overview... 1 Security considerations... 2 Standard

More information

STATISTICA VERSION 9 STATISTICA ENTERPRISE INSTALLATION INSTRUCTIONS FOR USE WITH TERMINAL SERVER

STATISTICA VERSION 9 STATISTICA ENTERPRISE INSTALLATION INSTRUCTIONS FOR USE WITH TERMINAL SERVER Notes: STATISTICA VERSION 9 STATISTICA ENTERPRISE INSTALLATION INSTRUCTIONS FOR USE WITH TERMINAL SERVER 1. These instructions focus on installation on Windows Terminal Server (WTS), but are applicable

More information

Configure thin client settings locally

Configure thin client settings locally This chapter contains information to help you set up your thin client hardware, look and feel, and system settings using the Control Center. Tip While it is not recommended to use dialog boxes for configuring

More information

Tool Tip. SyAM Management Utilities and Non-Admin Domain Users

Tool Tip. SyAM Management Utilities and Non-Admin Domain Users SyAM Management Utilities and Non-Admin Domain Users Some features of SyAM Management Utilities, including Client Deployment and Third Party Software Deployment, require authentication credentials with

More information

Test Note Phone Manager Deployment Windows Group Policy Sever 2003 and XP SPII Clients

Test Note Phone Manager Deployment Windows Group Policy Sever 2003 and XP SPII Clients Test Note Phone Manager Deployment Windows Group Policy Sever 2003 and XP SPII Clients Note: I have only tested these procedures on Server 2003 SP1 (DC) and XP SPII client, in a controlled lab environment,

More information

NSi Mobile Installation Guide. Version 6.2

NSi Mobile Installation Guide. Version 6.2 NSi Mobile Installation Guide Version 6.2 Revision History Version Date 1.0 October 2, 2012 2.0 September 18, 2013 2 CONTENTS TABLE OF CONTENTS PREFACE... 5 Purpose of this Document... 5 Version Compatibility...

More information

NetIQ Advanced Authentication Framework - Administrative Tools. Installation Guide. Version 5.1.0

NetIQ Advanced Authentication Framework - Administrative Tools. Installation Guide. Version 5.1.0 NetIQ Advanced Authentication Framework - Administrative Tools Installation Guide Version 5.1.0 Table of Contents 1 Table of Contents 2 Introduction 3 About This Document 3 NetIQ Advanced Authentication

More information

XenClient Enterprise Synchronizer Installation Guide

XenClient Enterprise Synchronizer Installation Guide XenClient Enterprise Synchronizer Installation Guide Version 5.1.0 March 26, 2014 Table of Contents About this Guide...3 Hardware, Software and Browser Requirements...3 BIOS Settings...4 Adding Hyper-V

More information

Aspera Connect User Guide

Aspera Connect User Guide Aspera Connect User Guide Windows XP/2003/Vista/2008/7 Browser: Firefox 2+, IE 6+ Version 2.3.1 Chapter 1 Chapter 2 Introduction Setting Up 2.1 Installation 2.2 Configure the Network Environment 2.3 Connect

More information

Integrating Mac OS X 10.6 with Active Directory. 1 April 2010

Integrating Mac OS X 10.6 with Active Directory. 1 April 2010 Integrating Mac OS X 10.6 with Active Directory 1 April 2010 Introduction Apple Macintosh Computers running Mac OS X 10.6 can be integrated with the Boston University Active Directory to allow use of Active

More information

Synchronizer Installation

Synchronizer Installation Synchronizer Installation Synchronizer Installation Synchronizer Installation This document provides instructions for installing Synchronizer. Synchronizer performs all the administrative tasks for XenClient

More information

LepideAuditor Suite for File Server. Installation and Configuration Guide

LepideAuditor Suite for File Server. Installation and Configuration Guide LepideAuditor Suite for File Server Installation and Configuration Guide Table of Contents 1. Introduction... 4 2. Requirements and Prerequisites... 4 2.1 Basic System Requirements... 4 2.2 Supported Servers

More information

Installing Management Applications on VNX for File

Installing Management Applications on VNX for File EMC VNX Series Release 8.1 Installing Management Applications on VNX for File P/N 300-015-111 Rev 01 EMC Corporation Corporate Headquarters: Hopkinton, MA 01748-9103 1-508-435-1000 www.emc.com Copyright

More information

RMM/MDM. Quick Reference Guide

RMM/MDM. Quick Reference Guide RMM/MDM Quick Reference Guide Contents Getting Started...3 Probe and Agent Management...3 Installing a Windows Probe...3 Installing an Agent...5 Windows Agents...5 Updating Monitoring Software - Manually...5

More information

WhatsUp Gold v16.2 Installation and Configuration Guide

WhatsUp Gold v16.2 Installation and Configuration Guide WhatsUp Gold v16.2 Installation and Configuration Guide Contents Installing and Configuring Ipswitch WhatsUp Gold v16.2 using WhatsUp Setup Installing WhatsUp Gold using WhatsUp Setup... 1 Security guidelines

More information

Create, Link, or Edit a GPO with Active Directory Users and Computers

Create, Link, or Edit a GPO with Active Directory Users and Computers How to Edit Local Computer Policy Settings To edit the local computer policy settings, you must be a local computer administrator or a member of the Domain Admins or Enterprise Admins groups. 1. Add the

More information

XenDesktop Implementation Guide

XenDesktop Implementation Guide Consulting Solutions WHITE PAPER Citrix XenDesktop XenDesktop Implementation Guide Pooled Desktops (Local and Remote) www.citrix.com Contents Contents... 2 Overview... 4 Initial Architecture... 5 Installation

More information

Installing and Configuring vcloud Connector

Installing and Configuring vcloud Connector Installing and Configuring vcloud Connector vcloud Connector 2.7.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new

More information

Privilege Guard 3.0 Administration Guide

Privilege Guard 3.0 Administration Guide 1 Privilege Guard 3.0 Administration Guide 2 Copyright Notice The information contained in this document ( the Material ) is believed to be accurate at the time of printing, but no representation or warranty

More information

Setting Up SSL on IIS6 for MEGA Advisor

Setting Up SSL on IIS6 for MEGA Advisor Setting Up SSL on IIS6 for MEGA Advisor Revised: July 5, 2012 Created: February 1, 2008 Author: Melinda BODROGI CONTENTS Contents... 2 Principle... 3 Requirements... 4 Install the certification authority

More information

ILTA HANDS ON Securing Windows 7

ILTA HANDS ON Securing Windows 7 Securing Windows 7 8/23/2011 Table of Contents About this lab... 3 About the Laboratory Environment... 4 Lab 1: Restricting Users... 5 Exercise 1. Verify the default rights of users... 5 Exercise 2. Adding

More information

STATISTICA VERSION 10 STATISTICA ENTERPRISE SERVER INSTALLATION INSTRUCTIONS

STATISTICA VERSION 10 STATISTICA ENTERPRISE SERVER INSTALLATION INSTRUCTIONS Notes: STATISTICA VERSION 10 STATISTICA ENTERPRISE SERVER INSTALLATION INSTRUCTIONS 1. The installation of the STATISTICA Enterprise Server entails two parts: a) a server installation, and b) workstation

More information

Chapter. Managing Group Policy MICROSOFT EXAM OBJECTIVES COVERED IN THIS CHAPTER:

Chapter. Managing Group Policy MICROSOFT EXAM OBJECTIVES COVERED IN THIS CHAPTER: Chapter 10 Managing Group Policy MICROSOFT EXAM OBJECTIVES COVERED IN THIS CHAPTER: Implement and troubleshoot Group Policy. Create a Group Policy object (GPO). Link an existing GPO. Delegate administrative

More information

DriveLock Quick Start Guide

DriveLock Quick Start Guide Be secure in less than 4 hours CenterTools Software GmbH 2012 Copyright Information in this document, including URL and other Internet Web site references, is subject to change without notice. Unless otherwise

More information

Kaseya 2. Installation guide. Version 7.0. English

Kaseya 2. Installation guide. Version 7.0. English Kaseya 2 Kaseya Server Setup Installation guide Version 7.0 English September 4, 2014 Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept

More information

File and Printer Sharing with Microsoft Windows

File and Printer Sharing with Microsoft Windows Operating System File and Printer Sharing with Microsoft Windows Microsoft Corporation Published: November 2003 Abstract File and printer sharing in Microsoft Windows allows you to share the contents of

More information

Aventail Connect Client with Smart Tunneling

Aventail Connect Client with Smart Tunneling Aventail Connect Client with Smart Tunneling User s Guide Windows v8.7.0 1996-2006 Aventail Corporation. All rights reserved. Aventail, Aventail Cache Control, Aventail Connect, Aventail Connect Mobile,

More information

Windows Clients and GoPrint Print Queues

Windows Clients and GoPrint Print Queues Windows Clients and GoPrint Print Queues Overview The following tasks demonstrate how to configure shared network printers on Windows client machines in a Windows Active Directory Domain and Workgroup

More information

User Guide. Version R91. English

User Guide. Version R91. English AuthAnvil User Guide Version R91 English August 25, 2015 Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept EULATOS as updated from

More information

INSTALL AND CONFIGURATION GUIDE. Atlas 5.1 for Microsoft Dynamics AX

INSTALL AND CONFIGURATION GUIDE. Atlas 5.1 for Microsoft Dynamics AX INSTALL AND CONFIGURATION GUIDE Atlas 5.1 for Microsoft Dynamics AX COPYRIGHT NOTICE Copyright 2012, Globe Software Pty Ltd, All rights reserved. Trademarks Dynamics AX, IntelliMorph, and X++ have been

More information

DeviceLock Management via Group Policy

DeviceLock Management via Group Policy User Manual DeviceLock Management via Group Policy SmartLine Inc 1 Contents Using this Manual...3 1. General Information...4 1.1 Overview...4 1.2 Applying Group Policy...5 1.3 Standard GPO Inheritance

More information

Network Connect Installation and Usage Guide

Network Connect Installation and Usage Guide Network Connect Installation and Usage Guide I. Installing the Network Connect Client..2 II. Launching Network Connect from the Desktop.. 9 III. Launching Network Connect Pre-Windows Login 11 IV. Installing

More information

Instructions for Adding a MacOS 10.4.x Server to ASURITE for File Sharing. Installation Section

Instructions for Adding a MacOS 10.4.x Server to ASURITE for File Sharing. Installation Section Instructions for Adding a MacOS 10.4.x Server to ASURITE for File Sharing Installation Section Purpose: We are setting up a server in ASU s specific environment. Power on the Server Insert the CD Hold

More information

Installation Notes for Outpost Network Security (ONS) version 3.2

Installation Notes for Outpost Network Security (ONS) version 3.2 Outpost Network Security Installation Notes version 3.2 Page 1 Installation Notes for Outpost Network Security (ONS) version 3.2 Contents Installation Notes for Outpost Network Security (ONS) version 3.2...

More information

Installation Instruction STATISTICA Enterprise Server

Installation Instruction STATISTICA Enterprise Server Installation Instruction STATISTICA Enterprise Server Notes: ❶ The installation of STATISTICA Enterprise Server entails two parts: a) a server installation, and b) workstation installations on each of

More information

Dell SupportAssist Version 2.0 for Dell OpenManage Essentials Quick Start Guide

Dell SupportAssist Version 2.0 for Dell OpenManage Essentials Quick Start Guide Dell SupportAssist Version 2.0 for Dell OpenManage Essentials Quick Start Guide Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your computer.

More information

Installation Guide: Delta Module Manager Launcher

Installation Guide: Delta Module Manager Launcher Installation Guide: Delta Module Manager Launcher Overview... 2 Delta Module Manager Launcher... 2 Pre-Installation Considerations... 3 Hardware Requirements... 3 Software Requirements... 3 Virtualisation...

More information

ILTA 2013 - HAND 6B. Upgrading and Deploying. Windows Server 2012. In the Legal Environment

ILTA 2013 - HAND 6B. Upgrading and Deploying. Windows Server 2012. In the Legal Environment ILTA 2013 - HAND 6B Upgrading and Deploying Windows Server 2012 In the Legal Environment Table of Contents Purpose of This Lab... 3 Lab Environment... 3 Presenter... 3 Exercise 1 Add Roles and Features...

More information

Alpha High Level Description

Alpha High Level Description Alpha High Level Description Alpha is a Windows Domain Controller (DC) and Domain Name System (DNS) Server. Because Alpha was the first DC in the aia.class domain, it is also (by default) the Windows global

More information

1. Installation Overview

1. Installation Overview Quick Install Guide 1. Installation Overview Thank you for selecting Bitdefender Business Solutions to protect your business. This document enables you to quickly get started with the installation of Bitdefender

More information

STATISTICA VERSION 12 STATISTICA ENTERPRISE SMALL BUSINESS INSTALLATION INSTRUCTIONS

STATISTICA VERSION 12 STATISTICA ENTERPRISE SMALL BUSINESS INSTALLATION INSTRUCTIONS STATISTICA VERSION 12 STATISTICA ENTERPRISE SMALL BUSINESS INSTALLATION INSTRUCTIONS Notes 1. The installation of STATISTICA Enterprise Small Business entails two parts: a) a server installation, and b)

More information

Freshservice Discovery Probe User Guide

Freshservice Discovery Probe User Guide Freshservice Discovery Probe User Guide 1. What is Freshservice Discovery Probe? 1.1 What details does Probe fetch? 1.2 How does Probe fetch the information? 2. What are the minimum system requirements

More information

Technology Services Group Procedures. IH Anywhere guide. 0 P a g e

Technology Services Group Procedures. IH Anywhere guide. 0 P a g e VDI Pilot Technology Services Group Procedures IH Anywhere guide 0 P a g e Installation Disable Apple Security Table of Contents IH Anywhere for Apple OSX (MAC)... 2 1. Installation... 2 Disable Apple

More information

Getting Started. Symantec Client Security. About Symantec Client Security. How to get started

Getting Started. Symantec Client Security. About Symantec Client Security. How to get started Getting Started Symantec Client Security About Security Security provides scalable, cross-platform firewall, intrusion prevention, and antivirus protection for workstations and antivirus protection for

More information

NetSpective Logon Agent Guide for NetAuditor

NetSpective Logon Agent Guide for NetAuditor NetSpective Logon Agent Guide for NetAuditor The NetSpective Logon Agent The NetSpective Logon Agent is a simple application that runs on client machines on your network to inform NetSpective (and/or NetAuditor)

More information

HOW TO SILENTLY INSTALL CLOUD LINK REMOTELY WITHOUT SUPERVISION

HOW TO SILENTLY INSTALL CLOUD LINK REMOTELY WITHOUT SUPERVISION HOW TO SILENTLY INSTALL CLOUD LINK REMOTELY WITHOUT SUPERVISION Version 1.1 / Last updated November 2012 INTRODUCTION The Cloud Link for Windows client software is packaged as an MSI (Microsoft Installer)

More information

Administration Guide. . All right reserved. For more information about Specops Deploy and other Specops products, visit www.specopssoft.

Administration Guide. . All right reserved. For more information about Specops Deploy and other Specops products, visit www.specopssoft. . All right reserved. For more information about Specops Deploy and other Specops products, visit www.specopssoft.com Copyright and Trademarks Specops Deploy is a trademark owned by Specops Software. All

More information

Quick Start Guide for VMware and Windows 7

Quick Start Guide for VMware and Windows 7 PROPALMS VDI Version 2.1 Quick Start Guide for VMware and Windows 7 Rev. 1.1 Published: JULY-2011 1999-2011 Propalms Ltd. All rights reserved. The information contained in this document represents the

More information

The SSL device also supports the 64-bit Internet Explorer with new ActiveX loaders for Assessment, Abolishment, and the Access Client.

The SSL device also supports the 64-bit Internet Explorer with new ActiveX loaders for Assessment, Abolishment, and the Access Client. WatchGuard SSL v3.2 Release Notes Supported Devices SSL 100 and 560 WatchGuard SSL OS Build 355419 Revision Date January 28, 2013 Introduction WatchGuard is pleased to announce the release of WatchGuard

More information

Password Manager Windows Desktop Client

Password Manager Windows Desktop Client Password Manager Windows Desktop Client EmpowerID provides an extension that allows organizations to plug into Password Manager to customize the Windows logon experience beyond that supplied by the standard

More information

Cisco TelePresence Management Suite Extension for Microsoft Exchange

Cisco TelePresence Management Suite Extension for Microsoft Exchange Cisco TelePresence Management Suite Extension for Microsoft Exchange Installation Guide D14846.01 June 2011 Software version 2.3 Contents Introduction 5 End user guidance 5 Server requirements 6 Exchange

More information

DigitalPersona Pro Server for Active Directory v4.x Quick Start Installation Guide

DigitalPersona Pro Server for Active Directory v4.x Quick Start Installation Guide DigitalPersona Pro Server for Active Directory v4.x Quick Start Installation Guide 1 of 7 DigitalPersona Pro Server for Active Directory v4.x Quick Start Installation Guide Process Overview Step Description

More information

Joining a workstation to the TAMU IT Domain and Profile Migration

Joining a workstation to the TAMU IT Domain and Profile Migration Joining a workstation to the TAMU IT Domain and Profile Migration Contents Migration Prerequisites... 1 Firewalls... 1 Run As and Other Alternate Credentialing Methods... 2 File and Print Sharing Is Disabled...

More information

FileMaker Server 8. Administrator s Guide

FileMaker Server 8. Administrator s Guide FileMaker Server 8 Administrator s Guide 1994-2005 FileMaker, Inc. All Rights Reserved. FileMaker, Inc. 5201 Patrick Henry Drive Santa Clara, California 95054 FileMaker is a trademark of FileMaker, Inc.,

More information

Using DC Agent for Transparent User Identification

Using DC Agent for Transparent User Identification Using DC Agent for Transparent User Identification Using DC Agent Web Security Solutions v7.7, 7.8 If your organization uses Microsoft Windows Active Directory, you can use Websense DC Agent to identify

More information

Installation Instruction STATISTICA Enterprise Small Business

Installation Instruction STATISTICA Enterprise Small Business Installation Instruction STATISTICA Enterprise Small Business Notes: ❶ The installation of STATISTICA Enterprise Small Business entails two parts: a) a server installation, and b) workstation installations

More information

Virtual CD v10. Network Management Server Manual. H+H Software GmbH

Virtual CD v10. Network Management Server Manual. H+H Software GmbH Virtual CD v10 Network Management Server Manual H+H Software GmbH Table of Contents Table of Contents Introduction 1 Legal Notices... 2 What Virtual CD NMS can do for you... 3 New Features in Virtual

More information

How To Use Senior Systems Cloud Services

How To Use Senior Systems Cloud Services Senior Systems Cloud Services In this guide... Senior Systems Cloud Services 1 Cloud Services User Guide 2 Working In Your Cloud Environment 3 Cloud Profile Management Tool 6 How To Save Files 8 How To

More information

Instructions for Adding a MacOS 10.4.x Client to ASURITE

Instructions for Adding a MacOS 10.4.x Client to ASURITE Instructions for Adding a MacOS 10.4.x Client to ASURITE Before beginning, it would be prudent not to have an account with the same username and password as your Active Directory account. For DHCP Workstations:

More information

Colligo Contributor File Manager 4.6. User Guide

Colligo Contributor File Manager 4.6. User Guide Colligo Contributor File Manager 4.6 User Guide Contents Colligo Contributor File Manager Introduction... 2 Benefits... 2 Features... 2 Platforms Supported... 2 Installing and Activating Contributor File

More information

DESLock+ Basic Setup Guide Version 1.20, rev: June 9th 2014

DESLock+ Basic Setup Guide Version 1.20, rev: June 9th 2014 DESLock+ Basic Setup Guide Version 1.20, rev: June 9th 2014 Contents Overview... 2 System requirements:... 2 Before installing... 3 Download and installation... 3 Configure DESLock+ Enterprise Server...

More information

Installation Guide. Novell Storage Manager 3.1.1 for Active Directory. Novell Storage Manager 3.1.1 for Active Directory Installation Guide

Installation Guide. Novell Storage Manager 3.1.1 for Active Directory. Novell Storage Manager 3.1.1 for Active Directory Installation Guide Novell Storage Manager 3.1.1 for Active Directory Installation Guide www.novell.com/documentation Installation Guide Novell Storage Manager 3.1.1 for Active Directory October 17, 2013 Legal Notices Condrey

More information

ContentWatch Auto Deployment Tool

ContentWatch Auto Deployment Tool ContentWatch Auto Deployment Tool ContentWatch gives administrators the ability to easily distribute ContentProtect (or say our products) over any network. With our Unattended Installer you can install

More information

4cast Client Specification and Installation

4cast Client Specification and Installation 4cast Client Specification and Installation Version 2015.00 10 November 2014 Innovative Solutions for Education Management www.drakelane.co.uk System requirements The client requires Administrative rights

More information

Integrating idrac7 With Microsoft Active Directory

Integrating idrac7 With Microsoft Active Directory Integrating idrac7 With Microsoft Active Directory Whitepaper Author: Jim Slaughter This document is for informational purposes only and may contain typographical errors and technical inaccuracies. The

More information

Getting Started with Vision 6

Getting Started with Vision 6 Getting Started with Vision 6 Version 6.9 Notice Copyright 1981-2009 Netop Business Solutions A/S. All Rights Reserved. Portions used under license from third parties. Please send any comments to: Netop

More information

Using Logon Agent for Transparent User Identification

Using Logon Agent for Transparent User Identification Using Logon Agent for Transparent User Identification Websense Logon Agent (also called Authentication Server) identifies users in real time, as they log on to domains. Logon Agent works with the Websense

More information

Password Reset Server Installation Guide Windows 8 / 8.1 Windows Server 2012 / R2

Password Reset Server Installation Guide Windows 8 / 8.1 Windows Server 2012 / R2 Password Reset Server Installation Guide Windows 8 / 8.1 Windows Server 2012 / R2 Last revised: November 12, 2014 Table of Contents Table of Contents... 2 I. Introduction... 4 A. ASP.NET Website... 4 B.

More information

NETASQ SSO Agent Installation and deployment

NETASQ SSO Agent Installation and deployment NETASQ SSO Agent Installation and deployment Document version: 1.3 Reference: naentno_sso_agent Page 1 / 20 Copyright NETASQ 2013 General information 3 Principle 3 Requirements 3 Active Directory user

More information

Configuring the Active Directory Plug-in

Configuring the Active Directory Plug-in Wazza s QuickStart Configuring the Active Directory Plug-in Mac OS X 10.3.4 Background Using the Mac OS X 10.3.x built-in Active Directory (AD) plug-in, Mac users can authenticate with a Windows Active

More information

Active Directory Software Deployment

Active Directory Software Deployment APPLICATION N0TE ST-0128 March 24, 2006 Product: Active Directory / PCM Deployment System version: ShoreTel 6 Active Directory Software Deployment Courtesy of: Dylan Moser with LANtelligence Inc. This

More information

Deploying BitDefender Client Security and BitDefender Windows Server Solutions

Deploying BitDefender Client Security and BitDefender Windows Server Solutions Deploying BitDefender Client Security and BitDefender Windows Server Solutions Quick Install Guide Copyright 2011 BitDefender 1. Installation Overview Thank you for selecting BitDefender Business Solutions

More information

EMC Celerra Network Server

EMC Celerra Network Server EMC Celerra Network Server Release 5.6.47 Using Windows Administrative Tools with Celerra P/N 300-004-139 REV A02 EMC Corporation Corporate Headquarters: Hopkintons, MA 01748-9103 1-508-435-1000 www.emc.com

More information

CTERA Agent for Windows

CTERA Agent for Windows User Guide CTERA Agent for Windows May 2012 Version 3.1 Copyright 2009-2012 CTERA Networks Ltd. All rights reserved. No part of this document may be reproduced in any form or by any means without written

More information

Administration GUIDE. SharePoint Server idataagent. Published On: 11/19/2013 V10 Service Pack 4A Page 1 of 201

Administration GUIDE. SharePoint Server idataagent. Published On: 11/19/2013 V10 Service Pack 4A Page 1 of 201 Administration GUIDE SharePoint Server idataagent Published On: 11/19/2013 V10 Service Pack 4A Page 1 of 201 Getting Started - SharePoint Server idataagent Overview Deployment Configuration Decision Table

More information

PLANNING AND DESIGNING GROUP POLICY, PART 1

PLANNING AND DESIGNING GROUP POLICY, PART 1 84-02-06 DATA SECURITY MANAGEMENT PLANNING AND DESIGNING GROUP POLICY, PART 1 Melissa Yon INSIDE What Is Group Policy?; Software Settings; Windows Settings; Administrative Templates; Requirements for Group

More information

HELP DOCUMENTATION E-SSOM DEPLOYMENT GUIDE

HELP DOCUMENTATION E-SSOM DEPLOYMENT GUIDE HELP DOCUMENTATION E-SSOM DEPLOYMENT GUIDE Copyright 1998-2013 Tools4ever B.V. All rights reserved. No part of the contents of this user guide may be reproduced or transmitted in any form or by any means

More information

Dell UPS Local Node Manager USER'S GUIDE EXTENSION FOR MICROSOFT VIRTUAL ARCHITECTURES Dellups.com

Dell UPS Local Node Manager USER'S GUIDE EXTENSION FOR MICROSOFT VIRTUAL ARCHITECTURES Dellups.com CHAPTER: Introduction Microsoft virtual architecture: Hyper-V 6.0 Manager Hyper-V Server (R1 & R2) Hyper-V Manager Hyper-V Server R1, Dell UPS Local Node Manager R2 Main Operating System: 2008Enterprise

More information

Agency Pre Migration Tasks

Agency Pre Migration Tasks Agency Pre Migration Tasks This document is to be provided to the agency and will be reviewed during the Migration Technical Kickoff meeting between the ICS Technical Team and the agency. Network: Required

More information

Online Backup Client User Manual Mac OS

Online Backup Client User Manual Mac OS Online Backup Client User Manual Mac OS 1. Product Information Product: Online Backup Client for Mac OS X Version: 4.1.7 1.1 System Requirements Operating System Mac OS X Leopard (10.5.0 and higher) (PPC

More information

Online Backup Client User Manual Mac OS

Online Backup Client User Manual Mac OS Online Backup Client User Manual Mac OS 1. Product Information Product: Online Backup Client for Mac OS X Version: 4.1.7 1.1 System Requirements Operating System Mac OS X Leopard (10.5.0 and higher) (PPC

More information

Quick Start Guide for Parallels Virtuozzo

Quick Start Guide for Parallels Virtuozzo PROPALMS VDI Version 2.1 Quick Start Guide for Parallels Virtuozzo Rev. 1.1 Published: JULY-2011 1999-2011 Propalms Ltd. All rights reserved. The information contained in this document represents the current

More information

Universal Management Service 2015

Universal Management Service 2015 Universal Management Service 2015 UMS 2015 Help All rights reserved. No parts of this work may be reproduced in any form or by any means - graphic, electronic, or mechanical, including photocopying, recording,

More information

Sharpdesk V3.5. Push Installation Guide for system administrator Version 3.5.01

Sharpdesk V3.5. Push Installation Guide for system administrator Version 3.5.01 Sharpdesk V3.5 Push Installation Guide for system administrator Version 3.5.01 Copyright 2000-2015 by SHARP CORPORATION. All rights reserved. Reproduction, adaptation or translation without prior written

More information

NetWrix Password Manager. Quick Start Guide

NetWrix Password Manager. Quick Start Guide NetWrix Password Manager Quick Start Guide Contents Overview... 3 Setup... 3 Deploying the Core Components... 3 System Requirements... 3 Installation... 4 Windows Server 2008 Notes... 4 Upgrade Path...

More information

1. Set Daylight Savings Time... 3. 2. Create Migrator Account... 3. 3. Assign Migrator Account to Administrator group... 4

1. Set Daylight Savings Time... 3. 2. Create Migrator Account... 3. 3. Assign Migrator Account to Administrator group... 4 1. Set Daylight Savings Time... 3 a. Have client log into Novell/Local Machine with Administrator Account...3 b. Access Adjust Date/Time...3 c. Make sure the time zone is set to Central Time...3 2. Create

More information

Installation Guide. . All right reserved. For more information about Specops Deploy and other Specops products, visit www.specopssoft.

Installation Guide. . All right reserved. For more information about Specops Deploy and other Specops products, visit www.specopssoft. . All right reserved. For more information about Specops Deploy and other Specops products, visit www.specopssoft.com Copyright and Trademarks Specops Deploy is a trademark owned by Specops Software. All

More information

Buffalo Technology: Migrating your data to Windows Storage Server 2012 R2

Buffalo Technology: Migrating your data to Windows Storage Server 2012 R2 Buffalo Technology: Migrating your data to Windows Storage Server 2012 R2 1 Buffalo Technology: Migrating your data to Windows Storage Server 2012 R2 Contents Chapter 1 Data migration method:... 3 Chapter

More information

Online Backup Client User Manual

Online Backup Client User Manual For Mac OS X Software version 4.1.7 Version 2.2 Disclaimer This document is compiled with the greatest possible care. However, errors might have been introduced caused by human mistakes or by other means.

More information

Outpost Network Security

Outpost Network Security Administrator Guide Reference Outpost Network Security Office Firewall Software from Agnitum Abstract This document provides information on deploying Outpost Network Security in a corporate network. It

More information

Installation Guide. Research Computing Team V1.9 RESTRICTED

Installation Guide. Research Computing Team V1.9 RESTRICTED Installation Guide Research Computing Team V1.9 RESTRICTED Document History This document relates to the BEAR DataShare service which is based on the product Power Folder, version 10.3.232 ( some screenshots

More information

Pcounter CGI Utilities Installation and Configuration For Pcounter for Windows version 2.55 and above

Pcounter CGI Utilities Installation and Configuration For Pcounter for Windows version 2.55 and above Pcounter CGI Utilities Installation and Configuration For Pcounter for Windows version 2.55 and above About this document The core Pcounter application contains a number of CGI extension applications which

More information