SMART Active Directory Migrator. Desired End State and Project Prerequisites

Size: px
Start display at page:

Download "SMART Active Directory Migrator. Desired End State and Project Prerequisites"

Transcription

1 SMART Active Directory Migrator Desired End State and Project Prerequisites uthor Title

2 Table of Contents Introduction... 3 Purpose... 3 About SMART Active Directory Migrator... 3 Components of SMART AD Migrator... 4 Defining the Desired End-State... 4 Domain Structure... 4 Organizational Units Structure... 5 Duplicate Accounts... 5 Migration Cutover Process... 5 Interaction with External Domains... 5 Policies and Standards... 5 Domain Controllers - Data Migration Options... 5 Source Domain Account Dependencies... 5 SMART AD Migrator Project Prerequisites... 6 Requirements Prior to AD Migrator Installation... 6 Post AD Migrator Installation... 7 Known Installation Issues... 8 Post Active Directory Migration Tasks Prerequisites: Post Migration Issues and Resolutions Other Known issues to check and confirm: Appendix 1 Group Policy to Disable Windows Firewall About Binary Tree

3 Introduction Purpose The purpose of this document is to provide the prerequisites that must be in place prior to starting an Active Directory migration project along with some post installation steps. About SMART Active Directory Migrator Whether your company is performing an Active Directory Migration as a result of an acquisition, merger, or divestiture, or simply as part of rebuilding an existing Active Directory structure to meet technical or organizational needs, SMART Active Directory Migrator dramatically reduces risks, complexity, time, and costs associated with such significant corporate infrastructure changes. SMART Active Directory Migrator is: A project-based comprehensive solution to seamlessly migrate all Active Directory objects, settings and properties Provides complete control of the migration, ensuring security and reliability of the project Provides complete migration of all relevant objects and properties, even those not accessible by conventional means; Active Directory objects are migrated even if the source and target servers are not connected The following Active Directory components are migrated: o OUs, domain users, passwords, user properties, extended Active Directory properties, Terminal Server settings, security groups, distribution groups, group properties and members, contacts, workstations and servers; o Processing of Access Control Lists is comprehensive and includes owners and auditing, as well as permissions; o Comprehensive migration including NTFS, security, shares, local users, profiles, passwords and local groups; Allows you to restructure your Active Directory during business hours with no adverse affect on user productivity: End-users can continue working, totally unaware of the migration project; Administrators can perform all migration-related tasks during business hours, reducing the administrator's workload; Maintains transparent interoperability during the migration; Environments are continuously synchronized to ensure integrity of data; Users have access to all network resources regardless of the migration status. Able to reverse each step in the migration process; This guarantees that the system can be restored to its original status after any step safely and reliably; Can be used for any migration scenario, from consolidation to a complete restructuring of Active Directory; Can be customized to meet unique requirements of any organization; 3

4 Key Features and Functions Complete Migration No downtime or interruptions Full coexistence Total safety and reversibility Flexible migration Highly customizable Can migrate with or without SID history Components of SMART AD Migrator The following main components of SMART Active Directory Migrator are installed: SMART Active Directory Reporter SMART Active Directory Migrator SMART Active Directory Password Copy Note: SMART Windows Server Migrator is a separate product. Defining the Desired End-State It is important to understand the desired end-state of an Active Directory migration as well as prepare the domain migration team to understand all the challenges that need to be considered prior to beginning the migration process. The following information should be gathered: SOURCE Domain NetBIOS Name: SOURCE Domain DNS Name: TARGET Domain NetBIOS Name: TARGET Domain DNS Name: Domain Structure Is this migration a: Migration to an empty new Active Directory domain? Migration to an existing Active Directory domain? Partial Source Domain migration to an empty new Active Directory domain? Partial Source Domain migration to an existing Active Directory domain? Multiple source domains to an empty new Active Directory domain? Multiple source domains to an existing Active Directory domain? Will all source objects be migrated to the same target domain? 4

5 Organizational Units Structure Will the source Organizational Units (OUs) be migrated to the root domain? Will the source Organizational Units (OUs) be migrated to a sub OU in the target domain? Will the objects be migrated to the same OU in the target domain? Duplicate Accounts Will duplicate user accounts be merged with the same existing samaccounts? Will duplicate user accounts be renamed in the source domain with a prefix? Will duplicate user accounts be renamed in the source domain with a suffix? Will duplicate user accounts be renamed in the source domain individually? Will duplicate groups be merged with the same existing samaccounts? Will duplicate groups be renamed in the source domain with a prefix? Will duplicate groups be renamed in the source domain with a suffix? Will duplicate groups be renamed in the source domain individually? Migration Cutover Process Will this be a onetime only cutover to the target domain? Will this be an incremental cutover to the target domain? Interaction with External Domains Will domain objects need to be remapped in domains besides the source and target domains? Will servers need to be remapped in domains besides the source and target domains? Will computer objects be migrated to the same domain as accounts? Policies and Standards Will passwords be migrated to the target accounts? Will logon scripts be moved to the target domains? Are logon scripts referenced in user properties? Are logon scripts referenced in group policies? Will group policies be migrated to the target domain? Domain Controllers - Data Migration Options Do the source domain controllers contain shares or data? Will shares or data on domain controllers need to be migrated? Source Domain Account Dependencies Is an Exchange migration part of this project? Are there SQL servers in the source domain? Is SharePoint part of the source domain migration? Are there any IN-HOUSE applications that rely on domain accounts in this migration? 5

6 SMART AD Migrator Project Prerequisites Before beginning an Active Directory migration, a number of mandatory requirements are needed to be in place in order to complete the migration successfully. These requirements are standards to meet both the requirements for Microsoft Windows migration and the Binary Tree SMART Active Directory Migrator. Throughout this document, the terms source domain and target domain mean the domain from which the objects are being migrated from and the destination domain (Target) being where the objects are being migrated to. Requirements Prior to AD Migrator Installation Windows Trust Requirements Establish a two way trust relationship between the source domain and target domain Verify the trust relationship To verify, check that you are able to list accounts from each domain in each domain Add the source domain s Domain Admins group to the target domain s Administrators group Add the target domain s Domain Admins group to the source domain s Administrators group Windows Password Migration Requirements In the target domain check and verify that the domain Password Policy is equal to or less restrictive then the source domain s password policy. In both the source domain and target domain, enable Account Management Audit for success and failure at both the domain level and the domain controller level. You must reboot the PDC emulator for the policy to take effect. Verify that Account Auditing is working in each domain. Create a test user and delete the users. Check that each event has been recorded in the security logs. In the source domain create a domain local group with the NetBIOS name of the domain followed by three dollar signs with no members. Example DOMANNAME$$$ In the target domain create a domain local group with the NetBIOS name of the domain followed by three dollar signs with no members. Example DOMANNAME$$$ In the source domain and the target domain verify or add the Everyone group as a member of the Pre- Windows 2000 Compatible Access group. NetBIOS Naming Resolution Requirements Install a WINS server on the target domain PDC Emulator (still required for Windows 2008 domains) In the TCP/IP Advanced Network Card Properties of the source and target domain controllers, add the IP Address of the target domain controller under the WINS server tab. Enable NetBIOS over IP for both the source and target domain s PDC Emulator Verify that all domain controllers both source and target have Enable lmhost Lookup enabled Open Firewall Ports between the source and target servers and primary domain controllers 389 LDAP 53 DNS Netbios 6

7 DNS Naming Resolution Requirements In the TC/IP DNS advanced settings of both the source and target domain controllers, verify that the DNS server of both domains are entered with the first entry as the domain name that the domain controller belongs to. Append the domain suffix list to include the DNS name of both domains with the first entry as the domain name that the domain controller belongs to. Enter the domain name for the DNS suffix for this connection Check Register this connection s addresses in DNS Group Policy Requirements Create a Domain Group Policy to disable Windows Firewall in both the source and target domain. (See appendix 1) Verify IP Filtering is disabled for both the source and target domain controllers in the Advanced TCP\IP Options Setting to Permit All For Windows 2008 domain controllers, disable User Account Control (UAC) Logon to the migration computer in the target domain as a member of the target domain s Domain Admins group and install AD Migrator. Workstation Virus Scanning Software Exclude l18.exe, remap2.exe and copypwd.dll for both 32 and 64 bit versions Remote Registry Remote Registry connectivity must be enabled on workstations and servers to be migrated Post AD Migrator Installation Once AD Migrator is installed, updated to the latest build and the domain migration options have been set, verify that all the pre-migration internal checks have a green check mark beside each prerequisite. Verify Clonepr.dll is located in the C:\Windows directory of the target domain Controller. If not, then copy drive:\binarytree\btadmigrator\admigrator\clonepr.dll to the C:\Windows\System32 directory of the target domain Controller. Register Clonepr.dll on the target domain controller. Run Regsvr32 C:\Windows\System32\Clonepr.dll this is required for both sidhistory and computer migration. 7

8 Known Installation Issues Windows 64 bit Domain Controller (PDC Emulator) In order for the account password copy to process accounts involving Windows 2003, 2008, 2008 R2 64bit or 2012 domain controls acting as the PDC emulator in either the source or target domains, the following registry entries must be in place: Check and verify the registry entries in HKEY_LOCAL_MACHINE System\CurrentControlSet\Lsa. The Entries should match the screen capture above. Pay special attention to the Security Packages Reg_Multi_SZ list it must be exactly as shown. Remove any additional packages and reboot the server for the changes to take effect. The BINARYTREE SMART Scheduling service is not running This is a common issue at the first installation. To remedy, connect to the domain controller(s) that displays the error, start the services MMC and navigate to the BinaryTree Schedule service or FSTScheduler. Click on the logon option. Reenter the service account name and password and click Apply. If the service is running, stop and restart the service. Unable to verify PDC Emulator of the source or target domain This issue will arise when the target domain controller is unable to resolve NetBIOS Names. Launch the BinaryTree SMART LMHCreator to create an lmhosts file. Add the IP Address and name of the source domain controller, add the IP address and the name of the target domain controller, add the IP Address of the source domain controller and the source domain name and add the IP Address of the target domain controller and the target domain name. Save the new lmhosts file. Register the lmhosts file to cache and verify the cache table that all 4 entries are in cache. 8

9 Administrator Account Password Containing Special Characters A known LDAP issue exists if the first character of the Administrator s password begins with a special character. This issue will prevent migrating computers from the source domain to the target domain because LDAP translation will drop the first character of the password, the password will become incorrect and the operation will fail. To remedy this issue change the password of the source or target domain s Administrator s password so that the password begins with an alpha-numeric character. Anti-Virus Software False Trojan Quarantine Most Anti-virus software will trap the 32 bit version of copypwd.dll as a Trojan. Copypwd.dll is required to extract and set password hashes and is required to copy passwords. Disable or allow copypwd.dll to not to be quarantined on the BINARYTREE SMART console, Source and Target PDC Emulators. Console location - drive:\binarytree\btadmigrator\admigrator and drive:\windows\ PDC Emulator location - drive:\ BinaryTree\BTADMigrator \ADMigrator\ADM\ and drive:\windows\ 9

10 Post Active Directory Migration Tasks Prerequisites: Help desk personnel must have administrative rights to migrated user accounts, groups and workstations. A network share has been created for the ADUMMTA tools folder Help desk personnel have access to the shared ADUMMTA folder. Help desk personnel have the SID of both the source and target domains for reference. Post Migration Issues and Resolutions. User password is incorrect or user must change password at next logon Verify that the user password property user must change password at next logon does not contain a check mark. By a default domain policy the user must change password at next logon may be enforced when the user account password is copied from the source domain. Unselect this option. Can the user now logon? If the user still cannot logon with their password ask the migration team to recopy the user s password. User is unable to access network shares that they were able to access with their source accounts Check the server share permission and the folder NTFS permission contain 2 sets of permissions source\domain and target\domain groups and accounts. If they correctly match then check the user s group membership and compare the source group memberships with the target group memberships. If the share and NTFS permissions do not contain an identical set of source and target domain accounts the server must be reacled (Remap). Ask the migration team to ReACL the server with the access issues. Once the migrated user logs into the new domain the user receives a new blank default profile In order to trouble shoot profile issues the help desk person must be aware of both the SID of the source domain and the SID of the target domain. Check to see if there is a folder on the workstation C:\ADUMMTA. o If the folder does not exist, the workstation was not remapped. This may occur frequently with laptop users who may have been away during the migration process. o If the C:\ADUMMTA folder exists then check to see if there is a file called LxxReport.txt exists. If the file or folder does not exist then the workstation was not remapped. 10

11 To correct a failed profile Log into the workstation as an administrator. Delete the newly created profile. o In Windows XP Navigate to C:\Documents and Settings folder and find the user account with.xxx extension. (userid.new) Delete this folder and all sub folders and files folders and files. o For Windows 7 or Vista Navigate to the C:\USERS folder and find the user account with.xxx extension. (userid.new) Delete this folder and all sub folders and files folders and files. Next run regedit.exe, from the start button, run Regedit.exe. Navigate to: HKEY_LOCAL_MACHINE Software\Microsoft\Windows NT\Current Version\Profilelist Delete all subkeys that contain the Target Domain SID On 64 bit windows computers you must perform this at HKEY_LOCAL_MACHINE Software\Wow6432Node\Microsoft\Windows NT\Current Version\Profilelist as well. Navigate to C:\ADUMMTA and double click Lxx.exe where xx is a number from 15 or higher if there are multiples use the highest number. Wait about 3 minutes for the remap process to stop running. If C:\ADUMMTA does not exist, copy the ADUMMTA folder to the C: drive of the workstation. Logoff the workstation ask the user to log back into the target domain. Other Known issues to check and confirm: Did the user get all their mapped drives? If not, then check logon scripts. Can the user access their ? If not, then check with the Exchange team. Can the user access SQL? If not, then check with the Database team. Can the user access in house apps? If not, then check with the appropriate team. Can the user print? If not, then check printer permissions and printer. Does the user have access to their home drive? If not, then check permissions and account properties. Is the user s desktop layout the same as before? If not, then the workstation needs to be remapped. 11

12 Appendix 1 Group Policy to Disable Windows Firewall Create a new Group Policy object, and give the object a descriptive name (for example, ITS-Turn off Windows Firewall). Select the newly created group policy. Right-click on the newly created policy and select Edit. Expand the Computer Configuration folder, then the Administrative Templates folder. Expand the Network folder, then the Network Connections folder, then the Windows Firewall folder. Select the Standard Profile folder. Double-click the Windows Firewall: Protect all network connections option. Select Disabled, and then click OK. Select the Domain Profile folder. Double-click the Windows Firewall: Protect all network connections option. Select Disabled, and then click OK. Close the Group Policy dialog box. In the Security Filter section, click Add. Search for the objects that this group policy will be applied to, then click OK. Close the Group Policy editor. 12

13 About Binary Tree Binary Tree is a leading provider of software for migrating enterprise messaging users and applications to onpremises and cloud-based versions of the Microsoft platform. Since 1993, Binary Tree and its business partners have helped over 6,000 customers around the world to migrate more than 25 million users. Binary Tree s suite of software provides solutions for migrating from Exchange 2003/2007 and Lotus Notes to on-premises and online versions of Exchange and SharePoint. Binary Tree is represented by business partners worldwide who provide specialized services and a proven methodology for guiding customers through complex transitions. Binary Tree is a Microsoft Gold ISV Partner, an IBM Premier Business Partner, and is Microsoft s preferred vendor for migrating to Microsoft Office 365. Binary Tree is headquartered in the New York metropolitan area with international offices in London, Paris, Stockholm, Singapore, and Sydney. For more information, please visit us online at Binary Tree Social Media Resources Facebook Twitter LinkedIn YouTube Copyright 2013, Binary Tree, Inc. All rights reserved. Binary Tree, the Binary Tree logo, and any references to Binary Tree s CMT software products, are trademarks of Binary Tree, Inc. All other trademarks are the trademarks or registered trademarks of their respective rights holders. 13

Active Directory Domain Migration Checklist ADUM Active Directory Migrator

Active Directory Domain Migration Checklist ADUM Active Directory Migrator Active Directory Domain Migration Checklist ADUM Active Directory Migrator Before beginning an Active Directory migration, a number of mandatory requirements are needed to be in place in order to complete

More information

Windows Server Migration Checklist ManageRED Resemble

Windows Server Migration Checklist ManageRED Resemble Windows Server Migration Checklist ManageRED Resemble Before beginning any server migration, a number of mandatory requirements are required in order to complete the migration successfully. These requirements

More information

SMART Considerations for Active Directory Migration. A Strategic View and Best Practices for Migrating the Corporate Directory

SMART Considerations for Active Directory Migration. A Strategic View and Best Practices for Migrating the Corporate Directory SMART Considerations for Active Directory Migration A Strategic View and Best Practices for Migrating the Corporate Directory Table of Contents Introduction: The Strategic View of Active Directory Migrations...

More information

Network Setup Instructions

Network Setup Instructions Network Setup Instructions This document provides technical details for setting up the Elite Salon & Spa Management program in a network environment. If you have any questions, please contact our Technical

More information

SMART Directory Sync 4.3.0.1. Known Limitations

SMART Directory Sync 4.3.0.1. Known Limitations SMART Directory Sync 4.3.0.1 Known Limitations September 2015 Table of Contents Known Limitations 4.3.0.1... 3 AD to AD... 3 AD to AD Group Sync... 3 AD to AD User Sync... 3 AD to Domino... 3 AD to Domino

More information

CMT for Notes. Installation Guide

CMT for Notes. Installation Guide CMT for Notes Installation Guide October 2014 Table of Contents CMT for Notes Install Instructions... 3 Environment for an Exchange Server-to-Server Migration... 3 Operating System and Software Requirements

More information

CMT Self-Service Archive Migrator 1.2.5.3. Release Notes

CMT Self-Service Archive Migrator 1.2.5.3. Release Notes CMT Self-Service Archive Migrator 1.2.5.3 Release Notes September 2015 Table of Contents What s New in Version 1.2.5.3... 3 Release Notes 1.2.5.3... 3 Previous Updates... 3 About Binary Tree... 5 CMT SELF-SERVICE

More information

a) Network connection problems (check these for existing installations)

a) Network connection problems (check these for existing installations) How do I resolve issues with a Client not connecting to the Best Practice server instance? This FAQ is intended to answer common questions about resolving issues with a Best Practice client not connecting

More information

DriveLock Quick Start Guide

DriveLock Quick Start Guide Be secure in less than 4 hours CenterTools Software GmbH 2012 Copyright Information in this document, including URL and other Internet Web site references, is subject to change without notice. Unless otherwise

More information

Using Logon Agent for Transparent User Identification

Using Logon Agent for Transparent User Identification Using Logon Agent for Transparent User Identification Websense Logon Agent (also called Authentication Server) identifies users in real time, as they log on to domains. Logon Agent works with the Websense

More information

Agency Pre Migration Tasks

Agency Pre Migration Tasks Agency Pre Migration Tasks This document is to be provided to the agency and will be reviewed during the Migration Technical Kickoff meeting between the ICS Technical Team and the agency. Network: Required

More information

ADMT v3.1 Guide: Migrating and Restructuring Active Directory Domains

ADMT v3.1 Guide: Migrating and Restructuring Active Directory Domains ADMT v3.1 Guide: Migrating and Restructuring Active Directory Domains Microsoft Corporation Published: July 2008 Authors: Moon Majumdar, Brad Mahugh Editors: Jim Becker, Fran Tooke Abstract This guide

More information

VMware Mirage Web Manager Guide

VMware Mirage Web Manager Guide Mirage 5.1 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of this document,

More information

NETWRIX ACCOUNT LOCKOUT EXAMINER

NETWRIX ACCOUNT LOCKOUT EXAMINER NETWRIX ACCOUNT LOCKOUT EXAMINER ADMINISTRATOR S GUIDE Product Version: 4.1 July 2014. Legal Notice The information in this publication is furnished for information use only, and does not constitute a

More information

(Installation through ADSelfService Plus web portal and Manual Installation)

(Installation through ADSelfService Plus web portal and Manual Installation) ADSelfService Plus Client Software Installation Guide (Installation through ADSelfService Plus web portal and Manual Installation) 1 Table of Contents Introduction:... 3 ADSelfService Plus Client software:...

More information

Networking Best Practices Guide. Version 6.5

Networking Best Practices Guide. Version 6.5 Networking Best Practices Guide Version 6.5 Summer 2010 Copyright: 2010, CCH, a Wolters Kluwer business. All rights reserved. Material in this publication may not be reproduced or transmitted in any form

More information

Abila MIP. Installation User's Guide

Abila MIP. Installation User's Guide This is a publication of Abila, Inc. Version 2014.x Copyright 2013 Abila, Inc. All rights reserved. Abila, the Abila logos, and the Abila product and service names mentioned herein are registered trademarks

More information

Kaseya 2. User Guide. Version R8. English

Kaseya 2. User Guide. Version R8. English Kaseya 2 Discovery User Guide Version R8 English September 19, 2014 Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept EULATOS as

More information

Restructuring Active Directory Domains Within a Forest

Restructuring Active Directory Domains Within a Forest C H A P T E R 1 2 Restructuring Active Directory Domains Within a Forest Restructuring Active Directory directory service domains within a forest with the goal of reducing the number of domains allows

More information

How to monitor AD security with MOM

How to monitor AD security with MOM How to monitor AD security with MOM A article about monitor Active Directory security with Microsoft Operations Manager 2005 Anders Bengtsson, MCSE http://www.momresources.org November 2006 (1) Table of

More information

CMT Self-Service Archive Migrator 1.2. Comprehensive User Guide

CMT Self-Service Archive Migrator 1.2. Comprehensive User Guide CMT Self-Service Archive Migrator 1.2 Comprehensive User Guide January 2015 Contents Section 1. Overview... 3 Section 2. End User Workstation Requirements... 3 Section 3. Self-Service Archive Migration

More information

Alpha High Level Description

Alpha High Level Description Alpha High Level Description Alpha is a Windows Domain Controller (DC) and Domain Name System (DNS) Server. Because Alpha was the first DC in the aia.class domain, it is also (by default) the Windows global

More information

Introduction. Versions Used Windows Server 2003

Introduction. Versions Used Windows Server 2003 Training Installing Active Directory Introduction As SonicWALL s products and firmware keeps getting more features that are based on integration with Active Directory, e.g., Active Directory Connector

More information

Citrix Access Gateway Plug-in for Windows User Guide

Citrix Access Gateway Plug-in for Windows User Guide Citrix Access Gateway Plug-in for Windows User Guide Access Gateway 9.2, Enterprise Edition Copyright and Trademark Notice Use of the product documented in this guide is subject to your prior acceptance

More information

Joining. Domain. Windows XP Pro

Joining. Domain. Windows XP Pro Joining a Domain in Windows XP Pro Table of Content HOW DO I CHANGE A COMPUTER'S DESCRIPTION, NAME, OR JOIN A DOMAIN IN WINDOWS XP PRO?... 1 TO ADD A COMPUTER DESCRIPTION... 1 TO CHANGE A COMPUTER NAME...

More information

NetWrix USB Blocker. Version 3.6 Administrator Guide

NetWrix USB Blocker. Version 3.6 Administrator Guide NetWrix USB Blocker Version 3.6 Administrator Guide Table of Contents 1. Introduction...3 1.1. What is NetWrix USB Blocker?...3 1.2. Product Architecture...3 2. Licensing...4 3. Operation Guide...5 3.1.

More information

LepideAuditor Suite for File Server. Installation and Configuration Guide

LepideAuditor Suite for File Server. Installation and Configuration Guide LepideAuditor Suite for File Server Installation and Configuration Guide Table of Contents 1. Introduction... 4 2. Requirements and Prerequisites... 4 2.1 Basic System Requirements... 4 2.2 Supported Servers

More information

EventTracker: Support to Non English Systems

EventTracker: Support to Non English Systems EventTracker: Support to Non English Systems Publication Date: April 25, 2012 EventTracker 8815 Centre Park Drive Columbia MD 21045 www.eventtracker.com Introduction This document has been prepared to

More information

LAB 1: Installing Active Directory Federation Services

LAB 1: Installing Active Directory Federation Services LAB 1: Installing Active Directory Federation Services Contents Lab: Installing and Configuring Active Directory Federation Services... 2 Exercise 1: installing and configuring Active Directory Federation

More information

Sophos Enterprise Console server to server migration guide. Product version: 5.1 Document date: June 2012

Sophos Enterprise Console server to server migration guide. Product version: 5.1 Document date: June 2012 Sophos Enterprise Console server to server migration guide Product : 5.1 Document date: June 2012 Contents 1 About this guide...3 2 Terminology...4 3 Assumptions...5 4 Prerequisite...6 5 What are the key

More information

Sophos for Microsoft SharePoint startup guide

Sophos for Microsoft SharePoint startup guide Sophos for Microsoft SharePoint startup guide Product version: 2.0 Document date: March 2011 Contents 1 About this guide...3 2 About Sophos for Microsoft SharePoint...3 3 System requirements...3 4 Planning

More information

Kaseya Server Instal ation User Guide June 6, 2008

Kaseya Server Instal ation User Guide June 6, 2008 Kaseya Server Installation User Guide June 6, 2008 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private Sector IT organizations. Kaseya's

More information

WhatsUp Event Analyst v10.x Quick Setup Guide

WhatsUp Event Analyst v10.x Quick Setup Guide WhatsUp Event Analyst v10.x Quick Setup Guide Contents WhatsUp Event Analyst Quick Setup Guide WhatsUp Event Analyst Quick Setup Guide... 2 Installation Requirements... 3 Before You Begin... 4 Microsoft

More information

Objectives. At the end of this chapter students should be able to:

Objectives. At the end of this chapter students should be able to: NTFS PERMISSIONS AND SECURITY SETTING.1 Introduction to NTFS Permissions.1.1 File Permissions and Folder Permission.2 Assigning NTFS Permissions and Special Permission.2.1 Planning NTFS Permissions.2.2

More information

Using DC Agent for Transparent User Identification

Using DC Agent for Transparent User Identification Using DC Agent for Transparent User Identification Using DC Agent Web Security Solutions v7.7, 7.8 If your organization uses Microsoft Windows Active Directory, you can use Websense DC Agent to identify

More information

HOTPin Integration Guide: DirectAccess

HOTPin Integration Guide: DirectAccess 1 HOTPin Integration Guide: DirectAccess Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is provided 'as is'; Celestix assumes no responsibility

More information

Abila MIP. Installation Guide

Abila MIP. Installation Guide This is a publication of Abila, Inc. Version 2015.x Copyright 2014 Abila, Inc. All rights reserved. Abila, the Abila logos, and the Abila product and service names mentioned herein are registered trademarks

More information

Sophos Enterprise Console server to server migration guide. Product version: 5.2

Sophos Enterprise Console server to server migration guide. Product version: 5.2 Sophos Enterprise Console server to server migration guide Product : 5.2 Document date: December 2014 Contents 1 About this guide...3 2 Terminology...4 3 Assumptions...5 4 Prerequisite...6 5 What are the

More information

TECHNICAL SUPPORT GUIDE

TECHNICAL SUPPORT GUIDE TECHNICAL SUPPORT GUIDE INTRODUCTION This document has been developed to provide a guideline for assisting our clients and their technicians with a standard Console Gateway Live configuration. IS THIS

More information

Outpost Network Security

Outpost Network Security Administrator Guide Reference Outpost Network Security Office Firewall Software from Agnitum Abstract This document provides information on deploying Outpost Network Security in a corporate network. It

More information

Kaseya 2. User Guide. Version 1.1

Kaseya 2. User Guide. Version 1.1 Kaseya 2 Directory Services User Guide Version 1.1 September 10, 2011 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private Sector IT organizations.

More information

Administration GUIDE. SharePoint Server idataagent. Published On: 11/19/2013 V10 Service Pack 4A Page 1 of 201

Administration GUIDE. SharePoint Server idataagent. Published On: 11/19/2013 V10 Service Pack 4A Page 1 of 201 Administration GUIDE SharePoint Server idataagent Published On: 11/19/2013 V10 Service Pack 4A Page 1 of 201 Getting Started - SharePoint Server idataagent Overview Deployment Configuration Decision Table

More information

HELP DOCUMENTATION E-SSOM DEPLOYMENT GUIDE

HELP DOCUMENTATION E-SSOM DEPLOYMENT GUIDE HELP DOCUMENTATION E-SSOM DEPLOYMENT GUIDE Copyright 1998-2013 Tools4ever B.V. All rights reserved. No part of the contents of this user guide may be reproduced or transmitted in any form or by any means

More information

Step-by-Step Guide to Securing Windows XP Professional with Service Pack 2 in Small and Medium Businesses

Step-by-Step Guide to Securing Windows XP Professional with Service Pack 2 in Small and Medium Businesses Step-by-Step Guide to Securing Windows XP Professional with Service Pack 2 in Small and Medium Businesses 2004 Microsoft Corporation. All rights reserved. This document is for informational purposes only.

More information

Chapter. Managing Group Policy MICROSOFT EXAM OBJECTIVES COVERED IN THIS CHAPTER:

Chapter. Managing Group Policy MICROSOFT EXAM OBJECTIVES COVERED IN THIS CHAPTER: Chapter 10 Managing Group Policy MICROSOFT EXAM OBJECTIVES COVERED IN THIS CHAPTER: Implement and troubleshoot Group Policy. Create a Group Policy object (GPO). Link an existing GPO. Delegate administrative

More information

webkpi SaaS ETL Connector Installation & Configuration Guide

webkpi SaaS ETL Connector Installation & Configuration Guide webkpi SaaS ETL Connector Installation & Configuration Guide SaaS ETL Version 2.5.0.12 Version 1.6 September 2013 webkpi SaaS ETL Connector Version 2.5.0.12 V 1.6 Page 1 Table of Contents Table of Contents

More information

K7 Business Lite User Manual

K7 Business Lite User Manual K7 Business Lite User Manual About the Admin Console The Admin Console is a centralized web-based management console. The web console is accessible through any modern web browser from any computer on the

More information

Privilege Guard 3.0 Administration Guide

Privilege Guard 3.0 Administration Guide 1 Privilege Guard 3.0 Administration Guide 2 Copyright Notice The information contained in this document ( the Material ) is believed to be accurate at the time of printing, but no representation or warranty

More information

NETWRIX WINDOWS SERVER CHANGE REPORTER

NETWRIX WINDOWS SERVER CHANGE REPORTER NETWRIX WINDOWS SERVER CHANGE REPORTER INSTALLATION AND CONFIGURATION GUIDE Product Version: 4.0 March 2013. Legal Notice The information in this publication is furnished for information use only, and

More information

Metalogix SharePoint Backup. Advanced Installation Guide. Publication Date: August 24, 2015

Metalogix SharePoint Backup. Advanced Installation Guide. Publication Date: August 24, 2015 Metalogix SharePoint Backup Publication Date: August 24, 2015 All Rights Reserved. This software is protected by copyright law and international treaties. Unauthorized reproduction or distribution of this

More information

E2E Complete 4.1. Installation and Configuration Guide

E2E Complete 4.1. Installation and Configuration Guide E2E Complete 4.1 Installation and Configuration Guide APRIL 2016 Table of Contents Table of Contents... 2 Section 1. Introduction... 3 1.1 Purpose... 3 1.2 Audience... 3 1.3 About E2E Complete... 3 1.4

More information

QUANTIFY INSTALLATION GUIDE

QUANTIFY INSTALLATION GUIDE QUANTIFY INSTALLATION GUIDE Thank you for putting your trust in Avontus! This guide reviews the process of installing Quantify software. For Quantify system requirement information, please refer to the

More information

How To Install And Configure Windows Server 2003 On A Student Computer

How To Install And Configure Windows Server 2003 On A Student Computer Course: WIN310 Student Lab Setup Guide Microsoft Windows Server 2003 Network Infrastructure (70-291) ISBN: 0-470-06887-6 STUDENT COMPUTER SETUP Hardware Requirements All hardware must be on the Microsoft

More information

MCSE TestPrep: Windows NT Server 4, Second Edition - 3 - Managing Resources

MCSE TestPrep: Windows NT Server 4, Second Edition - 3 - Managing Resources MCSE TestPrep: Windows NT Server 4, Second Edition - CH 3 - Managing Resources Page 1 of 36 [Figures are not included in this sample chapter] MCSE TestPrep: Windows NT Server 4, Second Edition - 3 - Managing

More information

Enabling Kerberos SSO in IBM Cognos Express on Windows Server 2008

Enabling Kerberos SSO in IBM Cognos Express on Windows Server 2008 Enabling Kerberos SSO in IBM Cognos Express on Windows Server 2008 Nature of Document: Guideline Product(s): IBM Cognos Express Area of Interest: Infrastructure 2 Copyright and Trademarks Licensed Materials

More information

NetWrix USB Blocker Version 3.6 Quick Start Guide

NetWrix USB Blocker Version 3.6 Quick Start Guide NetWrix USB Blocker Version 3.6 Quick Start Guide Table of Contents 1. Introduction...3 1.1. What is NetWrix USB Blocker?...3 1.2. Product Architecture...3 2. Licensing...4 3. Getting Started...5 3.1.

More information

CLEO NED Active Directory Integration. Version 1.2.0

CLEO NED Active Directory Integration. Version 1.2.0 CLEO NED Active Directory Integration Version 1.2.0 CLEO NED Active Directory Integration Manual v1.2.0 Copyright c 2010 Lancaster University Network Services Limited. All rights reserved. Microsoft, Windows,

More information

Sophos Cloud Migration Tool Help. Product version: 1.0

Sophos Cloud Migration Tool Help. Product version: 1.0 Sophos Cloud Migration Tool Help Product version: 1.0 Document date: June 2015 Contents 1 About the Sophos Cloud Migration Tool...4 2 How does Sophos Cloud differ from on-premise management?...5 3 How

More information

AD RMS Step-by-Step Guide

AD RMS Step-by-Step Guide AD RMS Step-by-Step Guide Microsoft Corporation Published: March 2008 Author: Brian Lich Editor: Carolyn Eller Abstract This step-by-step guide provides instructions for setting up a test environment to

More information

User Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream

User Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream User Manual Onsight Management Suite Version 5.1 Another Innovation by Librestream Doc #: 400075-06 May 2012 Information in this document is subject to change without notice. Reproduction in any manner

More information

Quick Start Guide for Parallels Virtuozzo

Quick Start Guide for Parallels Virtuozzo PROPALMS VDI Version 2.1 Quick Start Guide for Parallels Virtuozzo Rev. 1.1 Published: JULY-2011 1999-2011 Propalms Ltd. All rights reserved. The information contained in this document represents the current

More information

SELF SERVICE RESET PASSWORD MANAGEMENT GPO DISTRIBUTION GUIDE

SELF SERVICE RESET PASSWORD MANAGEMENT GPO DISTRIBUTION GUIDE SELF SERVICE RESET PASSWORD MANAGEMENT GPO DISTRIBUTION GUIDE Copyright 1998-2015 Tools4ever B.V. All rights reserved. No part of the contents of this user guide may be reproduced or transmitted in any

More information

LDAP Implementation AP561x KVM Switches. All content in this presentation is protected 2008 American Power Conversion Corporation

LDAP Implementation AP561x KVM Switches. All content in this presentation is protected 2008 American Power Conversion Corporation LDAP Implementation AP561x KVM Switches All content in this presentation is protected 2008 American Power Conversion Corporation LDAP Implementation Does not require LDAP Schema to be touched! Uses existing

More information

DC Agent Troubleshooting

DC Agent Troubleshooting DC Agent Troubleshooting Topic 50320 DC Agent Troubleshooting Web Security Solutions v7.7.x, 7.8.x 27-Mar-2013 This collection includes the following articles to help you troubleshoot DC Agent installation

More information

CMT for Exchange 3.7. Requirements

CMT for Exchange 3.7. Requirements CMT for Exchange 3.7 Requirements May 2016 Table of Contents Section 1. Introduction... 3 Section 2. Migration Control Center and Workstation Requirements... 4 Section 3. Onsite System Administrator...

More information

Networking Lab - Vista Public Network Sharing

Networking Lab - Vista Public Network Sharing Networking Lab - Vista Public Network Sharing After completing the lab activity, you will be able to: Explain the differences between Windows XP and Windows Vista network sharing. Explain the purpose of

More information

Migrating MSDE to Microsoft SQL 2008 R2 Express

Migrating MSDE to Microsoft SQL 2008 R2 Express How To Updated: 11/11/2011 2011 Shelby Systems, Inc. All Rights Reserved Other brand and product names are trademarks or registered trademarks of the respective holders. If you are still on MSDE 2000,

More information

WatchGuard Mobile User VPN Guide

WatchGuard Mobile User VPN Guide WatchGuard Mobile User VPN Guide Mobile User VPN establishes a secure connection between an unsecured remote host and a protected network over an unsecured network using Internet Protocol Security (IPSec).

More information

Quick Start Guide for VMware and Windows 7

Quick Start Guide for VMware and Windows 7 PROPALMS VDI Version 2.1 Quick Start Guide for VMware and Windows 7 Rev. 1.1 Published: JULY-2011 1999-2011 Propalms Ltd. All rights reserved. The information contained in this document represents the

More information

Using Microsoft Active Directory (AD) with HA3969U in Windows Server

Using Microsoft Active Directory (AD) with HA3969U in Windows Server Using Microsoft Active Directory (AD) with HA3969U in Windows Server Application Note Abstract This application note describes how to use Microsoft Active Directory (AD) service with HA3969U systems in

More information

How To Take Advantage Of Active Directory Support In Groupwise 2014

How To Take Advantage Of Active Directory Support In Groupwise 2014 White Paper Collaboration Taking Advantage of Active Directory Support in GroupWise 2014 Flexibility and interoperability have always been hallmarks for Novell. That s why it should be no surprise that

More information

SQL 2014 Configuration Guide

SQL 2014 Configuration Guide SQL 2014 Configuration Guide 2015 ImproMed, LLC. All rights reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system, or translated into any language

More information

Installation Guide. . All right reserved. For more information about Specops Deploy and other Specops products, visit www.specopssoft.

Installation Guide. . All right reserved. For more information about Specops Deploy and other Specops products, visit www.specopssoft. . All right reserved. For more information about Specops Deploy and other Specops products, visit www.specopssoft.com Copyright and Trademarks Specops Deploy is a trademark owned by Specops Software. All

More information

Step By Step Guide: Demonstrate DirectAccess in a Test Lab

Step By Step Guide: Demonstrate DirectAccess in a Test Lab Step By Step Guide: Demonstrate DirectAccess in a Test Lab Microsoft Corporation Published: May 2009 Updated: October 2009 Abstract DirectAccess is a new feature in the Windows 7 and Windows Server 2008

More information

Installing Windows Rights Management Services with Service Pack 2 Step-by- Step Guide

Installing Windows Rights Management Services with Service Pack 2 Step-by- Step Guide Installing Windows Rights Management Services with Service Pack 2 Step-by- Step Guide Microsoft Corporation Published: October 2006 Author: Brian Lich Editor: Carolyn Eller Abstract This step-by-step guide

More information

Windows 7, Enterprise Desktop Support Technician

Windows 7, Enterprise Desktop Support Technician Course 50331D: Windows 7, Enterprise Desktop Support Technician Page 1 of 11 Windows 7, Enterprise Desktop Support Technician Course 50331D: 4 days; Instructor-Led Introduction This four-day instructor-ledcourse

More information

PaperPort PSP Server 3 SERVER ADMINISTRATOR S GUIDE

PaperPort PSP Server 3 SERVER ADMINISTRATOR S GUIDE PaperPort PSP Server 3 SERVER ADMINISTRATOR S GUIDE 1. Third party licenses and notices 5 2. Welcome 6 3. Installation requirements 7 3.1. System requirements 7 3.2. Installing prerequisites 7 3.3. Pre-installation

More information

ADMT v3 Migration Guide

ADMT v3 Migration Guide ADMT v3 Migration Guide Microsoft Corporation Published: November 2006 Abstract This guide explains how to use the Active Directory Migration Tool version 3 (ADMT v3) to restructure your operating environment.

More information

Symantec AntiVirus Corporate Edition Patch Update

Symantec AntiVirus Corporate Edition Patch Update Symantec AntiVirus Corporate Edition Patch Update Symantec AntiVirus Corporate Edition Update Documentation version 10.0.1.1007 Copyright 2005 Symantec Corporation. All rights reserved. Symantec, the Symantec

More information

Using Exclaimer Signature Manager with Office 365

Using Exclaimer Signature Manager with Office 365 Using Exclaimer Signature Manager with Office 365 www.exclaimer.com How does Signature Manager Work? Signature Manager takes an email signature template and fills it out for a specific individual using

More information

ilaw Installation Procedure

ilaw Installation Procedure ilaw Installation Procedure This guide will provide a reference for a full installation of ilaw Case Management Software. Contents ilaw Overview How ilaw works Installing ilaw Server on a PC Installing

More information

Table of Contents. Introduction...9. Installation...17. Program Tour...31. The Program Components...10 Main Program Features...11

Table of Contents. Introduction...9. Installation...17. Program Tour...31. The Program Components...10 Main Program Features...11 2011 AdRem Software, Inc. This document is written by AdRem Software and represents the views and opinions of AdRem Software regarding its content, as of the date the document was issued. The information

More information

1. Set Daylight Savings Time... 3. 2. Create Migrator Account... 3. 3. Assign Migrator Account to Administrator group... 4

1. Set Daylight Savings Time... 3. 2. Create Migrator Account... 3. 3. Assign Migrator Account to Administrator group... 4 1. Set Daylight Savings Time... 3 a. Have client log into Novell/Local Machine with Administrator Account...3 b. Access Adjust Date/Time...3 c. Make sure the time zone is set to Central Time...3 2. Create

More information

CA ARCserve Backup for Windows

CA ARCserve Backup for Windows CA ARCserve Backup for Windows Agent for Microsoft SharePoint Server Guide r15 This documentation and any related computer software help programs (hereinafter referred to as the "Documentation") are for

More information

Step-by-Step Guide for Microsoft Advanced Group Policy Management 4.0

Step-by-Step Guide for Microsoft Advanced Group Policy Management 4.0 Step-by-Step Guide for Microsoft Advanced Group Policy Management 4.0 Microsoft Corporation Published: September 2009 Abstract This step-by-step guide describes a sample scenario for installing Microsoft

More information

Guide to deploy MyUSBOnly via Windows Logon Script Revision 1.1. Menu

Guide to deploy MyUSBOnly via Windows Logon Script Revision 1.1. Menu Menu INTRODUCTION...2 HOW DO I DEPLOY MYUSBONLY ON ALL OF MY COMPUTERS...3 ADMIN KIT...4 HOW TO SETUP A LOGON SCRIPTS...5 Why would I choose one method over another?...5 Can I use both methods to assign

More information

For Active Directory Installation Guide

For Active Directory Installation Guide For Active Directory Installation Guide Version 2.5.2 April 2010 Copyright 2010 Legal Notices makes no representations or warranties with respect to the contents or use of this documentation, and specifically

More information

SPECOPS DEPLOY / OS 4.6 DOCUMENTATION

SPECOPS DEPLOY / OS 4.6 DOCUMENTATION Technical documentation: SPECOPS DEPLOY / OS 4.6 DOCUMENTATION By Shay Byrne, Product Manager 1 Getting Started... 4 1.1 Specops Deploy / OS Supported Configurations...4 1.2 Specops Deploy and Active Directory...

More information

WebSpy Vantage Ultimate 2.2 Web Module Administrators Guide

WebSpy Vantage Ultimate 2.2 Web Module Administrators Guide WebSpy Vantage Ultimate 2.2 Web Module Administrators Guide This document is intended to help you get started using WebSpy Vantage Ultimate and the Web Module. For more detailed information, please see

More information

PartnerConnect software. Installation guide

PartnerConnect software. Installation guide PartnerConnect software Installation guide 2012 Welch Allyn. All rights are reserved. To support the intended use of the product described in this publication, the purchaser of the product is permitted

More information

Advanced Event Viewer Manual

Advanced Event Viewer Manual Advanced Event Viewer Manual Document version: 2.2944.01 Download Advanced Event Viewer at: http://www.advancedeventviewer.com Page 1 Introduction Advanced Event Viewer is an award winning application

More information

InventoryControl for use with QuoteWerks Quick Start Guide

InventoryControl for use with QuoteWerks Quick Start Guide InventoryControl for use with QuoteWerks Quick Start Guide Copyright 2013 Wasp Barcode Technologies 1400 10 th St. Plano, TX 75074 All Rights Reserved STATEMENTS IN THIS DOCUMENT REGARDING THIRD PARTY

More information

Setup Instructions for Firm-Hosted Client Access

Setup Instructions for Firm-Hosted Client Access ACCOUNTING CS Setup Instructions for Firm-Hosted Client Access version 2015.x.x TL 29086 (05/12/15) Copyright Information Text copyright 2009-2015 by Thomson Reuters. All rights reserved. Video display

More information

Configuration Guide. SafeNet Authentication Service. SAS Agent for Microsoft Internet Information Services (IIS)

Configuration Guide. SafeNet Authentication Service. SAS Agent for Microsoft Internet Information Services (IIS) SafeNet Authentication Service Configuration Guide Technical Manual Template Release 1.0, PN: 000-000000-000, Rev. A, March 2013, Copyright 2013 SafeNet, Inc. All rights reserved. 1 Document Information

More information

Installation Instruction STATISTICA Enterprise Server

Installation Instruction STATISTICA Enterprise Server Installation Instruction STATISTICA Enterprise Server Notes: ❶ The installation of STATISTICA Enterprise Server entails two parts: a) a server installation, and b) workstation installations on each of

More information

Password Policy Enforcer

Password Policy Enforcer Password Policy Enforcer Evaluator s Guide V7.6 Copyright 1998-2013 ANIXIS. All rights reserved. ANIXIS, ANIXIS Password Reset, Password Policy Enforcer, PPE/Web, Password Policy Client, Password Policy

More information

Active Directory Integration

Active Directory Integration Active Directory Integration Last updated March 2016 Contents Introduction:... 2 Administration configuration set up:... 2 Configuring for a single OU import... 3 User Importing... 3 Active Directory and

More information

Release Notes for Websense Email Security v7.2

Release Notes for Websense Email Security v7.2 Release Notes for Websense Email Security v7.2 Websense Email Security version 7.2 is a feature release that includes support for Windows Server 2008 as well as support for Microsoft SQL Server 2008. Version

More information

Active Directory Integration Guide

Active Directory Integration Guide Chancery SMS Version 5.4 or Higher Active Directory Integration Guide Revised September 2005 CSL - 12458 The Chancery SMS Documentation Team: Joanna Denford, Linda MacShane, Sarah Hewson, Karin Jensen,

More information

Automating client deployment

Automating client deployment Automating client deployment 1 Copyright Datacastle Corporation 2014. All rights reserved. Datacastle is a registered trademark of Datacastle Corporation. Microsoft Windows is either a registered trademark

More information