AD Certificate Distribution

Size: px
Start display at page:

Download "AD Certificate Distribution"

Transcription

1 Technical Brief AD Certificate Distribution Contents Introduction 2 Preparation 2 Server Actions 4 Active Directory Actions 5 Appendix A: Scripts zip 10

2 INTRODUCTION M86-Security provides a solution for the distribution of the Secure Web Service Hybrid (SWSH) Agent and Certificates (p12) via the organizations Active Directory Group Policy Objects (GPO). The proposed solution is a silent installation and distribution of digital certificates as a unique identifier for end-users of the M86 Secure Web Service Hybrid cloud solution. This document provides information regarding any issues associated with the installation and implementation of the stages performed during the proposed digital certification solution. Agent Installation To install the Agent, an administrator must log into the station. This is required as the agent must be installed with administrator privileges. Certificate Management Upon Secure Web Service Hybrid cloud user login to the domain, on a station in which an agent is already installed, the user will receive the unique key and certificate via the domain s GPO. It should be noted that this solution will be applied at the user s login (not when unlocked) and when the policy is refreshed (based on the set defaults of the organization). The Solution will test whether the certificate is needed, and if so, the certificate will be installed for the user. The procedures outlined below are the steps necessary to accomplish the aforementioned tasks PREPARATION 1. Download and install any file archive manager, such as WinRar ( 2. Define a dedicated file folder in the system where cloud user certificates are to be placed (for example: CertsDir). 3. Extract the cloud user certificates, as downloaded from the Policy Server GUI, into CertsDir.Ensure the certificate name format is as follows: <username>.p12 4. Extract the files found in attached to this document (Appendix A: Scripts zip) to the CertsDir 5. From the extracted files, Run the Change Permissions.bat file (The file should be run under Administrator privileges). NOTE: The.bat file changes the permissions on the certificates (.p12) files and allows each user to access only the certificate file that belongs uniquely to that user.

3 6. Edit the script variables according to the enterprise-specific environment: a. Right-click the file Install.vbs and select Edit. b. In the selected text, change the values for the following: i. SERVER The server from which the cloud users obtain their certificates. NOTE: The server pertains to the Domain Controller IP/name and not the Policy Server name. ii. PASSWORD The cloud user s certificate password as defined in the Policy Server GUI during initial policy server configurations. c. Save the file and exit. d. Right-click the file InstallAgent.vbs and select Edit e. In the selected text, change the values for the following: i. SERVER The server from which the cloud users obtain their certificates. NOTE: The server pertains to the Domain Controller IP/name and not the Policy Server name. ii. INSTALLER The Secure Web Service Agent installer file name. The installer is downloaded from the Poicy Server GUI. f. Save the file and exit.

4 SERVER ACTIONS 1. Create a folder titled "CertificatesDist". This folder can be created anywhere in the file system of the operating system. 2. Right-click the "CertificatesDist" folder and select Sharing and Security. 3. Enable the Share this folder radio button and set the share name as CertificatesDist. 4. Move all the files previously created in steps 1 through 6 in the Preparation section above, as well as the certificate files, to the "CertificatesDist" folder.

5 ACTIVE DIRECTORY ACTIONS 1. Open the Active Directory Users and Computers Management Screen. 2. Navigate to the Start menu, select Run. 3. Enter line: dsa.msc and click OK. The Active Directory Users and Computers screen will open: 4. In the left tree pane, select the Domain, right-click and choose properties.

6 5. In the Domain Properties window, in the Group Policy tab, create the required Group Policy Object: a. Click New. b. Change the name of the Group Policy Object as required. For example: Certificates-Distribution. c. Click Edit. d. In the open Group Policy Object Editor window, navigate to Windows Settings. e. Select Scripts (Logon /Logoff) and double-click Logon. f. Click Add.

7 g. Under Script Name, register the full path of the share folder where the script Install.vbs is saved, and click OK. The path should be, for example, \\<SERVERNAME>\CertificatesDist\install.vbs WARNING! Do not choose the path via Browse! Enter the path manually.

8

9 h. Click Add once more. i. Under Script Name, enter the full path of the share folder where the script InstallAgent.vbs is saved and click OK. WARNING! Do not choose the path via Browse! Enter the path manually. j. In the windows Logon Properties click OK. k. Close the Group Policy Object Editor window. 6. In the Properties window (Domain), click Close. 7. Close Active Directory Users and Computers. 8. Click Start, select Run, and enter gpupdate /force in the text box. 9. Click OK.

10 APPENDIX A: SCRIPTS ZIP ABOUT M86 SECURITY M86 Security is a global provider of Web and messaging security products, delivering comprehensive protection to more than 20,000 customers and over 16 million users worldwide. Asom malware and spam; protect their sensitive information; and maintain employee productivity. The company is based in Orange, California with international headquarters in London and offices worldwide. For more information about M86 Security, please visit

Tool Tip. SyAM Management Utilities and Non-Admin Domain Users

Tool Tip. SyAM Management Utilities and Non-Admin Domain Users SyAM Management Utilities and Non-Admin Domain Users Some features of SyAM Management Utilities, including Client Deployment and Third Party Software Deployment, require authentication credentials with

More information

HOW TO SILENTLY INSTALL CLOUD LINK REMOTELY WITHOUT SUPERVISION

HOW TO SILENTLY INSTALL CLOUD LINK REMOTELY WITHOUT SUPERVISION HOW TO SILENTLY INSTALL CLOUD LINK REMOTELY WITHOUT SUPERVISION Version 1.1 / Last updated November 2012 INTRODUCTION The Cloud Link for Windows client software is packaged as an MSI (Microsoft Installer)

More information

Create, Link, or Edit a GPO with Active Directory Users and Computers

Create, Link, or Edit a GPO with Active Directory Users and Computers How to Edit Local Computer Policy Settings To edit the local computer policy settings, you must be a local computer administrator or a member of the Domain Admins or Enterprise Admins groups. 1. Add the

More information

Windows Clients and GoPrint Print Queues

Windows Clients and GoPrint Print Queues Windows Clients and GoPrint Print Queues Overview The following tasks demonstrate how to configure shared network printers on Windows client machines in a Windows Active Directory Domain and Workgroup

More information

HELP DOCUMENTATION E-SSOM DEPLOYMENT GUIDE

HELP DOCUMENTATION E-SSOM DEPLOYMENT GUIDE HELP DOCUMENTATION E-SSOM DEPLOYMENT GUIDE Copyright 1998-2013 Tools4ever B.V. All rights reserved. No part of the contents of this user guide may be reproduced or transmitted in any form or by any means

More information

TSM for Windows Installation Instructions: Download the latest TSM Client Using the following link:

TSM for Windows Installation Instructions: Download the latest TSM Client Using the following link: TSM for Windows Installation Instructions: Download the latest TSM Client Using the following link: ftp://ftp.software.ibm.com/storage/tivoli-storagemanagement/maintenance/client/v6r2/windows/x32/v623/

More information

ContentWatch Auto Deployment Tool

ContentWatch Auto Deployment Tool ContentWatch Auto Deployment Tool ContentWatch gives administrators the ability to easily distribute ContentProtect (or say our products) over any network. With our Unattended Installer you can install

More information

ACTIVE DIRECTORY DEPLOYMENT

ACTIVE DIRECTORY DEPLOYMENT ACTIVE DIRECTORY DEPLOYMENT CASAS Technical Support 800.255.1036 2009 Comprehensive Adult Student Assessment Systems. All rights reserved. Version 031809 CONTENTS 1. INTRODUCTION... 1 1.1 LAN PREREQUISITES...

More information

Installation Logon Recording Basis. By AD Logon Name AD Logon Name(recommended) By Windows Logon Name IP Address

Installation Logon Recording Basis. By AD Logon Name AD Logon Name(recommended) By Windows Logon Name IP Address Internet Recorder Binding User Names to AD Server & Recording Skype Text Conversation Path: Recording Analysis > Setting Terminologies: AD Server (User Name Logon Name Binding) The AD logon names can be

More information

4cast Client Specification and Installation

4cast Client Specification and Installation 4cast Client Specification and Installation Version 2015.00 10 November 2014 Innovative Solutions for Education Management www.drakelane.co.uk System requirements The client requires Administrative rights

More information

Using Group Policies to Install AutoCAD. CMMU 5405 Nate Bartley 9/22/2005

Using Group Policies to Install AutoCAD. CMMU 5405 Nate Bartley 9/22/2005 Using Group Policies to Install AutoCAD CMMU 5405 Nate Bartley 9/22/2005 Before we get started This manual provides a step-by-step process for creating a Group Policy that will install AutoCAD to a Windows

More information

SARANGSoft WinBackup Business v2.5 Client Installation Guide

SARANGSoft WinBackup Business v2.5 Client Installation Guide SARANGSoft WinBackup Business v2.5 Client Installation Guide (November, 2015) WinBackup Business Client is a part of WinBackup Business application. It runs in the background on every client computer that

More information

ENABLE LOGON/LOGOFF AUDITING

ENABLE LOGON/LOGOFF AUDITING Lepide Software LepideAuditor Suite ENABLE LOGON/LOGOFF AUDITING This document explains the steps required to enable the auditing of logon and logoff events for a domain. Table of Contents 1. Introduction...

More information

Specops Command. Installation Guide

Specops Command. Installation Guide Specops Software. All right reserved. For more information about Specops Command and other Specops products, visit www.specopssoft.com Copyright and Trademarks Specops Command is a trademark owned by Specops

More information

How to Give Admin Rights to Students on the ADGRM Domain

How to Give Admin Rights to Students on the ADGRM Domain How to Give Admin Rights to Students on the ADGRM Domain Contents Active Directory User and Computer... 2 Directory Tree Navigation... 3 The Computer folder... 3 The People Folder... 4 Creating a User

More information

Contents 1. Introduction 2. Security Considerations 3. Installation 4. Configuration 5. Uninstallation 6. Automated Bulk Enrollment 7.

Contents 1. Introduction 2. Security Considerations 3. Installation 4. Configuration 5. Uninstallation 6. Automated Bulk Enrollment 7. Contents 1. Introduction 2. Security Considerations 3. Installation 4. Configuration 5. Uninstallation 6. Automated Bulk Enrollment 7. Troubleshooting Introduction Adaxes Self-Service Client provides secure

More information

USING STUFFIT DELUXE THE STUFFIT START PAGE CREATING ARCHIVES (COMPRESSED FILES)

USING STUFFIT DELUXE THE STUFFIT START PAGE CREATING ARCHIVES (COMPRESSED FILES) USING STUFFIT DELUXE StuffIt Deluxe provides many ways for you to create zipped file or archives. The benefit of using the New Archive Wizard is that it provides a way to access some of the more powerful

More information

ArcGIS Business Analyst Premium* ~ Help Guide ~ Revised October 3, 2012

ArcGIS Business Analyst Premium* ~ Help Guide ~ Revised October 3, 2012 ArcGIS Business Analyst Premium* ~ Help Guide ~ Revised October 3, 2012 ArcGIS Business Analyst Premium is an Esri software package that combines GIS analysis and visualization with data to provide a better

More information

Secrets of Event Viewer for Active Directory Security Auditing Lepide Software

Secrets of Event Viewer for Active Directory Security Auditing Lepide Software Secrets of Event Viewer for Active Directory Security Auditing Windows Event Viewer doesn t need any introduction to the IT Administrators. However, some of its hidden secrets, especially those related

More information

Deployment of Keepit for Windows

Deployment of Keepit for Windows Deployment of Keepit for Windows Keepit A/S October 13, 2010 1 Introduction When deploying Keepit in larger setups with many desktops and servers, installing Keepit individually on each computer is cumbersome

More information

Virtual Office Remote Installation Guide

Virtual Office Remote Installation Guide Virtual Office Remote Installation Guide Table of Contents VIRTUAL OFFICE REMOTE INSTALLATION GUIDE... 3 UNIVERSAL PRINTER CONFIGURATION INSTRUCTIONS... 12 CHANGING DEFAULT PRINTERS ON LOCAL SYSTEM...

More information

Test Note Phone Manager Deployment Windows Group Policy Sever 2003 and XP SPII Clients

Test Note Phone Manager Deployment Windows Group Policy Sever 2003 and XP SPII Clients Test Note Phone Manager Deployment Windows Group Policy Sever 2003 and XP SPII Clients Note: I have only tested these procedures on Server 2003 SP1 (DC) and XP SPII client, in a controlled lab environment,

More information

How to add your Weebly website to a TotalCloud hosted Server

How to add your Weebly website to a TotalCloud hosted Server How to add your Weebly website to a TotalCloud hosted Server Creating your Weebly website: 1.) Go to weebly.com and create a free account. 2.) Build and design your personal website using the Weebly features.

More information

Lab A: Deploying and Managing Software by Using Group Policy Answer Key

Lab A: Deploying and Managing Software by Using Group Policy Answer Key Lab A: Deploying and Managing Software by Using Group Policy Answer Key Exercise 1 Assigning Software This Answer Key provides the detailed steps for completing Lab A: Deploying and Managing Software by

More information

DigitalPersona Pro Server for Active Directory v4.x Quick Start Installation Guide

DigitalPersona Pro Server for Active Directory v4.x Quick Start Installation Guide DigitalPersona Pro Server for Active Directory v4.x Quick Start Installation Guide 1 of 7 DigitalPersona Pro Server for Active Directory v4.x Quick Start Installation Guide Process Overview Step Description

More information

PRODUCT WHITE PAPER LABEL ARCHIVE. Adding and Configuring Active Directory Users in LABEL ARCHIVE

PRODUCT WHITE PAPER LABEL ARCHIVE. Adding and Configuring Active Directory Users in LABEL ARCHIVE PRODUCT WHITE PAPER LABEL ARCHIVE Adding and Configuring Active Directory Users in LABEL ARCHIVE TEKLYNX International March 19, 2010 Introduction Now more than ever, businesses large and small alike are

More information

Sharpdesk V3.5. Push Installation Guide for system administrator Version 3.5.01

Sharpdesk V3.5. Push Installation Guide for system administrator Version 3.5.01 Sharpdesk V3.5 Push Installation Guide for system administrator Version 3.5.01 Copyright 2000-2015 by SHARP CORPORATION. All rights reserved. Reproduction, adaptation or translation without prior written

More information

How to Connect to Berkeley College Virtual Lab Using Windows

How to Connect to Berkeley College Virtual Lab Using Windows How to Connect to Berkeley College Virtual Lab Using Windows Minimum Requirements Create and Save a Remote Desktop Services Connection Connecting to a Remote Desktop Services session Copy Files between

More information

System Area Management Software Tool Tip: Agent Deployment utilizing. the silent installation with Active Directory

System Area Management Software Tool Tip: Agent Deployment utilizing. the silent installation with Active Directory System Area Management Software Tool Tip: Agent Deployment utilizing the silent installation with Active Directory Table of Contents Introduction... 3 Prerequisites... 3 Windows 2003 Server... 3 Using

More information

eadvantage Certificate Enrollment Procedures

eadvantage Certificate Enrollment Procedures eadvantage Certificate Enrollment Procedures Purpose: Instructions for members to obtain a digital certificate which is a requirement to conduct financial transactions with the Federal Home Loan Bank of

More information

Automatic Network Deployment

Automatic Network Deployment White paper Automatic Network Deployment Easy way to manage add-in deployment February 2012 Version 1.3 Standss (South Pacific) Limited Contents Introduction... 3 Getting Started... 3 Installing MSI Package

More information

Endpoint Client Installation using Group Policy (Logon Script):

Endpoint Client Installation using Group Policy (Logon Script): Endpoint Client Installation using Group Policy (Logon Script): Table of Contents Introduction... 2 Creating a Batch File... 2 Logon Script Permissions... 3 Assigning the Logon Script to User(s)... 3 Domain

More information

Windows 7 Hula POS Server Installation Guide

Windows 7 Hula POS Server Installation Guide Windows 7 Hula POS Server Installation Guide Step-by-step instructions for installing the Hula POS Server on a PC running Microsoft Windows 7 1 Table of Contents Introduction... 3 Getting Started... 3

More information

Distributing EmailSMS v2.0

Distributing EmailSMS v2.0 Distributing EmailSMS v2.0 1) Requirements Windows 2000/XP and Outlook 2000, 2002 or 2003, Microsoft.NET Framework v 2).NET Framework V 1 Rollout Microsoft.NET Framework v1 needed to run EmailSMS v2.0.

More information

SpamTitan Outlook Addin V2.0

SpamTitan Outlook Addin V2.0 SpamTitan Outlook Addin V2.0 The SpamTitan Outlook Addin v2.0 allows users to do a varity of spam filtering management from the outlook client, including Report Spam and Ham messages to the SpamTitan Bayesian

More information

Using Internet or Windows Explorer to Upload Your Site

Using Internet or Windows Explorer to Upload Your Site Using Internet or Windows Explorer to Upload Your Site This article briefly describes what an FTP client is and how to use Internet Explorer or Windows Explorer to upload your Web site to your hosting

More information

Secure Agent Quick Start for Windows

Secure Agent Quick Start for Windows Secure Agent Quick Start for Windows 1993-2015 Informatica Corporation. No part of this document may be reproduced or transmitted in any form, by any means (electronic, photocopying, recording or otherwise)

More information

Avatier Identity Management Suite

Avatier Identity Management Suite Avatier Identity Management Suite Migrating AIMS Configuration and Audit Log Data To Microsoft SQL Server Version 9 2603 Camino Ramon Suite 110 San Ramon, CA 94583 Phone: 800-609-8610 925-217-5170 FAX:

More information

ELR (Educational Lending Right) School Library Survey Matching Program for Amlib Installation and User Guide

ELR (Educational Lending Right) School Library Survey Matching Program for Amlib Installation and User Guide ELR (Educational Lending Right) School Library Survey Matching Program for Amlib Installation and User Guide 2013 OCLC (UK) Ltd ALL RIGHTS RESERVED. Permission is granted to electronically copy and to

More information

MailStore Outlook Add-in Deployment

MailStore Outlook Add-in Deployment MailStore Outlook Add-in Deployment A MailStore Server installation deploys the MailStore Outlook Add-in as a Windows Installer package (MSI) that can be installed on client machines using software distribution.

More information

MANAGING OUTLOOK PERSONAL DATA FILES

MANAGING OUTLOOK PERSONAL DATA FILES MANAGING OUTLOOK PERSONAL DATA FILES 21 March 2009, Version 1.1 CONTENTS This document covers the following topics: Background Automatically Associating Old Data Files with Current Outlook Profile Manually

More information

How To Install Outlook Addin On A 32 Bit Computer

How To Install Outlook Addin On A 32 Bit Computer Deployment Guide - Outlook Add-In www.exclaimer.com Contents About This Guide... 3 System Requirements... 4 Software... 4 Installation Files... 5 Deployment Preparation... 6 Installing the Add-In Manually...

More information

Video Administration Backup and Restore Procedures

Video Administration Backup and Restore Procedures CHAPTER 12 Video Administration Backup and Restore Procedures This chapter provides procedures for backing up and restoring the Video Administration database and configuration files. See the following

More information

Advanced Audit Policy Configurations for LT Auditor+ Reference Guide

Advanced Audit Policy Configurations for LT Auditor+ Reference Guide Advanced Audit Policy Configurations for LT Auditor+ Reference Guide Contents WINDOWS AUDIT POLICIES REQUIRED FOR LT AUDITOR+....3 ACTIVE DIRECTORY...3 Audit Policy for the Domain...3 Advanced Auditing

More information

ECA IIS Instructions. January 2005

ECA IIS Instructions. January 2005 ECA IIS Instructions January 2005 THIS PAGE INTENTIONALLY BLANK ECA IIS Instructions ii July 22, 2005 Table of Contents 1. Install Certificate in IIS 5.0... 1 2. Obtain and Install the ECA Root Certificate

More information

https://weboffice.edu.pe.ca/

https://weboffice.edu.pe.ca/ NETSTORAGE MANUAL INTRODUCTION Virtual Office will provide you with access to NetStorage, a simple and convenient way to access your network drives through a Web browser. You can access the files on your

More information

Adding a User to Active Directory in Windows Server 2012

Adding a User to Active Directory in Windows Server 2012 Adding a User to Active Directory in Windows Server 2012 June 19, 2013 Copyright 2013 by World Class CAD, LLC. All Rights Reserved. Setup Security Policies To add a new user on a Domain Controller on the

More information

Installation Guide. . All right reserved. For more information about Specops Inventory and other Specops products, visit www.specopssoft.

Installation Guide. . All right reserved. For more information about Specops Inventory and other Specops products, visit www.specopssoft. . All right reserved. For more information about Specops Inventory and other Specops products, visit www.specopssoft.com Copyright and Trademarks Specops Inventory is a trademark owned by Specops Software.

More information

Millennium Drive. Installation Guide

Millennium Drive. Installation Guide Millennium Drive Installation Guide This is a publication of Abila, Inc. Version 2015.1 2015 Abila, Inc. and its affiliated entities. All rights reserved. Abila, the Abila logos, and the Abila product

More information

Pcounter for Windows

Pcounter for Windows Pcounter for Windows Pcounter Client and Printer Distribution Guide Copyright 2014 A.N.D. Technologies 4104 24 th Street #627 San Francisco, CA 94114 USA E-Mail: support@pcounter.com Web: http://www.pcounter.com

More information

Exclaimer Signature Manager 2.0 User Manual

Exclaimer Signature Manager 2.0 User Manual Exclaimer Exclaimer UK +44 (0) 1252 531 422 USA 1-888-450-9631 info@exclaimer.com Contents GETTING STARTED... 10 Signature Manager Overview... 11 How does it Work?... 11 But That's Not All...... 12 And

More information

LT Auditor+ 2013. Windows Assessment SP1 Installation & Configuration Guide

LT Auditor+ 2013. Windows Assessment SP1 Installation & Configuration Guide LT Auditor+ 2013 Windows Assessment SP1 Installation & Configuration Guide Table of Contents CHAPTER 1- OVERVIEW... 3 CHAPTER 2 - INSTALL LT AUDITOR+ WINDOWS ASSESSMENT SP1 COMPONENTS... 4 System Requirements...

More information

Entrust Managed Services PKI. Configuring secure LDAP with Domain Controller digital certificates

Entrust Managed Services PKI. Configuring secure LDAP with Domain Controller digital certificates Entrust Managed Services Entrust Managed Services PKI Configuring secure LDAP with Domain Controller digital certificates Document issue: 1.0 Date of issue: October 2009 Copyright 2009 Entrust. All rights

More information

Secure Web Service - Hybrid. Policy Server Setup. Release 9.2.5 Manual Version 1.01

Secure Web Service - Hybrid. Policy Server Setup. Release 9.2.5 Manual Version 1.01 Secure Web Service - Hybrid Policy Server Setup Release 9.2.5 Manual Version 1.01 M86 SECURITY WEB SERVICE HYBRID QUICK START USER GUIDE 2010 M86 Security All rights reserved. 828 W. Taft Ave., Orange,

More information

Promap V4 ActiveX MSI File

Promap V4 ActiveX MSI File Promap V4 ActiveX MSI File Contents What is an MSI File? Promap V4 MSI Main Advantage Installation via Group Policy (Windows Server 2000) Installation via Group Policy (Windows Server 2003) What is an

More information

OUTLOOK ADDIN V1.5 ABOUT THE ADDIN

OUTLOOK ADDIN V1.5 ABOUT THE ADDIN OUTLOOK ADDIN V1.5 ABOUT THE ADDIN The SpamTitan Outlook Addin v1.5 allows reporting of SPAM and HAM messages to the SpamTitan appliance, these messages are then examined by the SpamTitan Bayesian filter

More information

Setting up Sharp MX-Color Imagers for Inbound Fax Routing to Email or Network Folder

Setting up Sharp MX-Color Imagers for Inbound Fax Routing to Email or Network Folder Setting up Sharp MX-Color Imagers for Inbound Fax Routing to Email or Network Folder MX-2300, MX-2600, MX-2700, MX-3100, MX-3501, MX-4501, MX-5500, MX-6200, MX-6201, MX-7000, MX-7001, *MX-M850, *MX-M950,

More information

Integrating LANGuardian with Active Directory

Integrating LANGuardian with Active Directory Integrating LANGuardian with Active Directory 01 February 2012 This document describes how to integrate LANGuardian with Microsoft Windows Server and Active Directory. Overview With the optional Identity

More information

Introduction. Before you begin. Installing efax from our CD-ROM. Installing efax after downloading from the internet

Introduction. Before you begin. Installing efax from our CD-ROM. Installing efax after downloading from the internet Introduction Before you begin Before you begin installing efax, please check the following: You have received confirmation that your application for the efax service has been processed. The confirmation

More information

Microsoft Dynamics CRM Clients

Microsoft Dynamics CRM Clients Microsoft Dynamics CRM Clients A user can work with Microsoft Dynamics CRM in two ways: By accessing the Microsoft Dynamics CRM application using Microsoft Internet Explorer, Google Chrome, FireFox, and

More information

Frequently Asked Questions

Frequently Asked Questions Frequently Asked Questions What is Xythos? Xythos is a secure web-based file storage system that allows you to place files in a central location so they can be accessed via the internet. You can upload,

More information

Password Policy Enforcer

Password Policy Enforcer Password Policy Enforcer Evaluator s Guide V7.6 Copyright 1998-2013 ANIXIS. All rights reserved. ANIXIS, ANIXIS Password Reset, Password Policy Enforcer, PPE/Web, Password Policy Client, Password Policy

More information

Guide to deploy MyUSBOnly via Windows Logon Script Revision 1.1. Menu

Guide to deploy MyUSBOnly via Windows Logon Script Revision 1.1. Menu Menu INTRODUCTION...2 HOW DO I DEPLOY MYUSBONLY ON ALL OF MY COMPUTERS...3 ADMIN KIT...4 HOW TO SETUP A LOGON SCRIPTS...5 Why would I choose one method over another?...5 Can I use both methods to assign

More information

Exclaimer Signature Manager 2.0 User Manual

Exclaimer Signature Manager 2.0 User Manual Exclaimer Exclaimer UK +44 (0) 1252 531 422 USA 1-888-450-9631 info@exclaimer.com Contents GETTING STARTED... 10 Signature Manager Overview... 11 How Does it Work?... 11 But That's Not All...... 12 And

More information

SonicWALL CDP 5.0 Microsoft Exchange InfoStore Backup and Restore

SonicWALL CDP 5.0 Microsoft Exchange InfoStore Backup and Restore SonicWALL CDP 5.0 Microsoft Exchange InfoStore Backup and Restore Document Scope This solutions document describes how to configure and use the Microsoft Exchange InfoStore Backup and Restore feature in

More information

ACS EPF Download Manager Technical Guide. Table of Contents

ACS EPF Download Manager Technical Guide. Table of Contents Table of Contents Introduction... 3 Administration... 3 Disclaimer... 3 System Requirements... 3 Software Download... 3 Software Installation... 4 Preparing for the Installation... 4 Unzip the Software

More information

Pearl Echo Installation Checklist

Pearl Echo Installation Checklist Pearl Echo Installation Checklist Use this checklist to enter critical installation and setup information that will be required to install Pearl Echo in your network. For detailed deployment instructions

More information

Install FileZilla Client. Connecting to an FTP server

Install FileZilla Client. Connecting to an FTP server Install FileZilla Client Secure FTP is Middle Georgia State College s supported sftp client for accessing your Web folder on Webdav howeve you may use FileZilla or other FTP clients so long as they support

More information

Migrating MSDE to Microsoft SQL 2008 R2 Express

Migrating MSDE to Microsoft SQL 2008 R2 Express How To Updated: 11/11/2011 2011 Shelby Systems, Inc. All Rights Reserved Other brand and product names are trademarks or registered trademarks of the respective holders. If you are still on MSDE 2000,

More information

Windows Firewall Configuration with Group Policy for SyAM System Client Installation

Windows Firewall Configuration with Group Policy for SyAM System Client Installation with Group Policy for SyAM System Client Installation SyAM System Client can be deployed to systems on your network using SyAM Management Utilities. If Windows Firewall is enabled on target systems, it

More information

Download/Install IDENTD

Download/Install IDENTD Download/Install IDENTD IDENTD is the small software program that must be installed on each user s computer if multiple filters are to be used in ComSifter. The program may be installed and executed locally

More information

SSL Intercept Mode. Certificate Installation Guide. Revision 1.0.0. Warning and Disclaimer

SSL Intercept Mode. Certificate Installation Guide. Revision 1.0.0. Warning and Disclaimer SSL Intercept Mode Certificate Installation Guide Revision 1.0.0 Warning and Disclaimer This document is designed to provide information about the configuration of CensorNet Professional. Every effort

More information

Interact for Microsoft Office

Interact for Microsoft Office Interact for Microsoft Office Installation and Setup Guide Perceptive Content Version: 7.0.x Written by: Product Knowledge, R&D Date: October 2014 2014 Perceptive Software. All rights reserved Perceptive

More information

Installing the ASP.NET VETtrak APIs onto IIS 5 or 6

Installing the ASP.NET VETtrak APIs onto IIS 5 or 6 Installing the ASP.NET VETtrak APIs onto IIS 5 or 6 2 Installing the ASP.NET VETtrak APIs onto IIS 5 or 6 3... 3 IIS 5 or 6 1 Step 1- Install/Check 6 Set Up and Configure VETtrak ASP.NET API 2 Step 2 -...

More information

About This Guide... 4. Signature Manager Outlook Edition Overview... 5

About This Guide... 4. Signature Manager Outlook Edition Overview... 5 Contents About This Guide... 4 Signature Manager Outlook Edition Overview... 5 How does it work?... 5 But That's Not All...... 6 And There's More...... 6 Licensing... 7 Licensing Information... 7 System

More information

Global Image Management System For epad-vision. User Manual Version 1.10

Global Image Management System For epad-vision. User Manual Version 1.10 Global Image Management System For epad-vision User Manual Version 1.10 May 27, 2015 Global Image Management System www.epadlink.com 1 Contents 1. Introduction 3 2. Initial Setup Requirements 3 3. GIMS-Server

More information

Wavecrest Certificate

Wavecrest Certificate Wavecrest InstallationGuide Wavecrest Certificate www.wavecrest.net Copyright Copyright 1996-2015, Wavecrest Computing, Inc. All rights reserved. Use of this product and this manual is subject to license.

More information

Active Directory Management. User Interface Guide

Active Directory Management. User Interface Guide Active Directory Management User Interface Guide Document Revision Date: April 15, 2013 Active Directory Management User Interface Guide i Contents Launching the Hosted Exchange Tab - Active Directory

More information

INSTALLATION INSTRUCTIONS FOR UKSSOGATEWAY

INSTALLATION INSTRUCTIONS FOR UKSSOGATEWAY INSTALLATION INSTRUCTIONS FOR UKSSOGATEWAY 1) Install the UKSSOGateway application on the desktop: The UKSSOGateway application passes information from the myuk portal to launch the FESClient. The FESClient

More information

CONFIGURING TARGET ACTIVE DIRECTORY DOMAIN FOR AUDIT BY NETWRIX AUDITOR

CONFIGURING TARGET ACTIVE DIRECTORY DOMAIN FOR AUDIT BY NETWRIX AUDITOR CONFIGURING TARGET ACTIVE DIRECTORY DOMAIN FOR AUDIT BY NETWRIX AUDITOR TECHNICAL ARTICLE Product Version: 5.0 July 2013. Legal Notice The information in this publication is furnished for information use

More information

Section 1: Preface... 1. Introduction... 1 Users... 1 Assumptions... 2 Other Resources... 2 Conventions... 2 Icons... 2 Text... 2

Section 1: Preface... 1. Introduction... 1 Users... 1 Assumptions... 2 Other Resources... 2 Conventions... 2 Icons... 2 Text... 2 Table of Contents Section 1: Preface........................................... 1 Introduction............................................................. 1 Users...................................................................

More information

Active Directory Software Deployment

Active Directory Software Deployment APPLICATION N0TE ST-0128 March 24, 2006 Product: Active Directory / PCM Deployment System version: ShoreTel 6 Active Directory Software Deployment Courtesy of: Dylan Moser with LANtelligence Inc. This

More information

Password Manager Windows Desktop Client

Password Manager Windows Desktop Client Password Manager Windows Desktop Client EmpowerID provides an extension that allows organizations to plug into Password Manager to customize the Windows logon experience beyond that supplied by the standard

More information

Setup non-admin user to query Domain Controller event log for Windows2003

Setup non-admin user to query Domain Controller event log for Windows2003 Setup non-admin user to query Domain Controller event log for Windows2003 INTRODUCTION In Userfw AD integration solution, SRX queries the Domain Controller event log to get the user-to-ip mapping. The

More information

QUANTIFY INSTALLATION GUIDE

QUANTIFY INSTALLATION GUIDE QUANTIFY INSTALLATION GUIDE Thank you for putting your trust in Avontus! This guide reviews the process of installing Quantify software. For Quantify system requirement information, please refer to the

More information

NearPoint email Archive and Retrieval System

NearPoint email Archive and Retrieval System NearPoint email Archive and Retrieval System Welcome to our email archive system, NearPoint from Mimosa. With this RPS Archive system keep in mind, you will still be using Outlook as you always have. Here

More information

Using SSH Secure Shell Client for FTP

Using SSH Secure Shell Client for FTP Using SSH Secure Shell Client for FTP The SSH Secure Shell for Workstations Windows client application features this secure file transfer protocol that s easy to use. Access the SSH Secure FTP by double-clicking

More information

IIS, FTP Server and Windows

IIS, FTP Server and Windows IIS, FTP Server and Windows The Objective: To setup, configure and test FTP server. Requirement: Any version of the Windows 2000 Server. FTP Windows s component. Internet Information Services, IIS. Steps:

More information

Configuring a Custom Load Evaluator Use the XenApp1 virtual machine, logged on as the XenApp\administrator user for this task.

Configuring a Custom Load Evaluator Use the XenApp1 virtual machine, logged on as the XenApp\administrator user for this task. Lab 8 User name: Administrator Password: Password1 Contents Exercise 8-1: Assigning a Custom Load Evaluator... 1 Scenario... 1 Configuring a Custom Load Evaluator... 1 Assigning a Load Evaluator to a Server...

More information

Changing Passwords in Cisco Unity 8.x

Changing Passwords in Cisco Unity 8.x CHAPTER 9 Changing Passwords in Cisco Unity 8.x This chapter contains the following sections: Changing Passwords for the Cisco Unity 8.x Service Accounts (Without Failover), page 9-1 Changing Passwords

More information

Domain Controller Failover When Using Active Directory

Domain Controller Failover When Using Active Directory Domain Controller Failover When Using Active Directory Domain Controller Failover When Using Active Directory published January 2002 NSI and Double-Take are registered trademarks of Network Specialists,

More information

Copyright Texthelp Limited All rights reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval

Copyright Texthelp Limited All rights reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval Copyright Texthelp Limited All rights reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system, or translated into any language, in any form, by any

More information

Differences between Computer and User Templates

Differences between Computer and User Templates Configuring NetSupport School & Manager using Active Directory Overview This document explains how NetSupport School and Manager both integrate with Microsoft s Active Directory structure enabling you

More information

OUTLOOK WEB APP (OWA): MAIL

OUTLOOK WEB APP (OWA): MAIL Office 365 Navigation Pane: Navigating in Office 365 Click the App Launcher and then choose the application (i.e. Outlook, Calendar, People, etc.). To modify your personal account settings, click the Logon

More information

Avatier Identity Management Suite

Avatier Identity Management Suite Avatier Identity Management Suite Integrating Exchange 2010 With Identity Enforcer Version 9 2603 Camino Ramon Suite 110 San Ramon, CA 94583 Phone: 800-609-8610 925-217-5170 FAX: 925-217-0853 Email: support@avatier.com

More information

NetSpective Logon Agent Guide for NetAuditor

NetSpective Logon Agent Guide for NetAuditor NetSpective Logon Agent Guide for NetAuditor The NetSpective Logon Agent The NetSpective Logon Agent is a simple application that runs on client machines on your network to inform NetSpective (and/or NetAuditor)

More information

Configuring browser settings (Internet Explorer and Google Chrome) for Bug Club via a Group Policy

Configuring browser settings (Internet Explorer and Google Chrome) for Bug Club via a Group Policy Overview: All of the quotation marks in here are being used to actually quote a phrase or value. Don't actually use them in any names during any of the stages as you may break something. The basic requirements

More information

Lab 18: Access Control/Audit

Lab 18: Access Control/Audit CompTIA Security+ Lab Series Lab 18: Access Control/Audit CompTIA Security+ Domain 5 - Access Control and Identity Management Objective 2.3: Explain the fundamental concepts and best practices related

More information

Instructions for Configuring a SAS Metadata Server for Use with JMP Clinical

Instructions for Configuring a SAS Metadata Server for Use with JMP Clinical Instructions for Configuring a SAS Metadata Server for Use with JMP Clinical These instructions describe the process for configuring a SAS Metadata server to work with JMP Clinical. Before You Configure

More information

DeviceLock Management via Group Policy

DeviceLock Management via Group Policy User Manual DeviceLock Management via Group Policy SmartLine Inc 1 Contents Using this Manual...3 1. General Information...4 1.1 Overview...4 1.2 Applying Group Policy...5 1.3 Standard GPO Inheritance

More information