LANDesk Management Suite 9.0. Getting started with Patch Manager
|
|
|
- Brent Preston
- 10 years ago
- Views:
Transcription
1 LANDesk Management Suite 9.0 Getting started with Patch Manager
2 DOWNLOAD PATCH CONTENT TO THE CORE SERVER
3 INTRODUCTION This document is intended to assist LANDesk Management Suite administrators with implementing Security and Patch Manager in their environment for LANDesk Management Suite 9.0. SCOPE This document covers the steps necessary to get started using Patch Manager to patch clients. It also contains a quick reference guide for experienced LANDesk administrators that just need a reminder of the steps required for patching clients. ASSUMPTIONS This document is written with the expectation that the LANDesk Core Server has been installed and activated and the workstations have the LANDesk agent installed. There are other documents that discuss these topics and are not addressed in this document.
4 QUICK REFERENCE This section contains the steps required to set up Patch Manager to patch clients. It is intended to be used by experienced LANDesk administrators as a reference and does not go into detail on the process. The details will be covered later in this document. Following are the steps required to set up Patch Manager: 1. Download patch content to the Core Server through the Download Updates window which is accessed through the Patch and compliance tool in the LANDesk Management Console. 2. Make sure that all of the vulnerabilities that the clients need to be scanned for are in the Scan folder in the Patch and compliance tool. Only vulnerabilities in the Scan folder will be scanned for on the clients when the Security Scan is executed. 3. Check the Scan and Repair settings assigned to the clients to verify the options have been set correctly for detection. This can be done in the Agent Configuration under Security and Compliance Patch and Compliance Scan or in the Patch and Compliance window by clicking the Configure settings toolbar icon and select the Scan and repair settings item from the dropdown list. 4. Run a Security Scan on all clients to detect what patches they need. 5. Create and run a repair task to install the patches on the clients. Do not rely solely on the repair task status to determine the success of patching. Continue with the remaining steps to fully determine the success of patching. Note: Only patches that have been detected by a Security Scan on a client can be patched with a repair task. Trying to install a patch on a client that has not been detected will result in the patch failing to install with the message NO_PATCHES_AVAILABLE. 6. Reboot the clients after the patches have installed if any of the patches require a reboot. If a patch requires a reboot it is not completely installed until the client is rebooted. Failure to reboot the client will result in the patch still being detected as not being installed. 7. Run a Security Scan on all of the clients. 8. Check the Security and Patch information for a specific client to see what patches are still needed or check the affected computers list for a specific vulnerability to determine which computers still need the patch.
5 DOWNLOAD PATCH CONTENT TO THE CORE SERVER The following section contains steps Configure the Download Updates window Login to the Management Suite Console. From the Console, click Tools Security and Compliance Patch and Compliance. Click the Download Updates toolbar icon. This allows you to select what content to download. Core server licensing will determine what content is available in the Download Updates window. The following figure displays all content that can be downloaded with the full LANDesk Security Suite license.
6 Select the required Definition types and Languages for the environment. Microsoft Windows Vulnerabilities are the most commonly downloaded vulnerability type. Microsoft Windows Vulnerabilities contain the patches for the Windows Operating Systems as well as the patches for common applications for the Windows Operating System such as Adobe Reader, ITUNES and Microsoft Office. Do not check the box for Put new definitions in Unassigned group so that all of the definitions are downloaded to the Scan folder.
7 Proxy Settings If the company uses a proxy server then the information should be entered on the Proxy Settings tab to allow the content to be downloaded. The vulnerabilities (detection logic) are downloaded from the LANDesk websites. The patches for the vulnerabilities are downloaded from the vendor's website. For example, Microsoft patches are downloaded from Microsoft's websites. Ensure the proxy will allow the Core Server to access the appropriate website to get the patch. Changing the Patch Location It is recommended that the download location for patches be left at the default settings. If there is limited space on the drive that the Core Server is installed on, the patch location should be moved. Click the Patch Location tab if the location needs to be moved
8 If the patch location is changed, the new location must be setup with the same web settings and folder permissions as the default location. If a UNC path is used for the client access, add the Domain Computers group to the new share with Read access. Scheduling the download When all settings have been set, click Apply. Then click the Schedule download button.
9 Click OK. Selecting this button will create a scheduled task to update the content that is currently selected. Setting a scheduled task to run nightly will make sure that the content being scanned for is the most current and up to date. If changes are made to what needs to be downloaded a new Scheduled task will need to be created. More than one task can be created but they must be scheduled to run at different times because only one download (VAMINER.EXE) can run at a time.
10 Set the appropriate schedule for the download task to run and click Save. VERIFY VULNERABILITIES ARE IN THE SCAN FOLDER After the Patch Content has downloaded, check the SCAN folder in the Patch and Compliance tool to make sure all appropriate vulnerabilities are in there. Any old or unwanted vulnerabilities can be dragged to the Do Not Scan folder.
11 SCAN AND REPAIR SETTINGS FOR DETECTION (AGENT BEHAVIOR) Before starting to scan for vulnerabilities it is necessary to ensure that the scan configuration is set correctly. Depending on what is licensed there can be as many as nine different types of vulnerabilities to scan. From the Scan and Repair Settings window, select the types that you want to be scanned. When a scan is initiated on a managed node an agent behavior needs to be selected so that the scanner knows what to scan. If there is no agent behavior selected then the scanner will scan for the default three types: Vulnerabilities, LANDesk Updates and Custom Vulnerabilities. The Scan and Repair Settings window can be accessed two ways. From the Patch and Compliance window, click the Configure settings toolbar icon and select the Scan and repair settings item from the drop-down list. When configuring an agent configuration click the Security and Compliance Patch and compliance scan tree item and click the Configure button. Double-click the Scan and Repair setting assigned to the client in the agent configuration.
12 The Scan and Repair Settings window has eight pages: General, Scan, Repair, MSI, Reboot, Network, Pilot and Spyware. Only the General, Scan and Pilot pages affect the detection. General settings page Most of the settings on the General settings page are self explanatory such as Show progress dialog and Allow user to cancel scan. The only option that may need to be changed is CPU utilization when scanning. Adjust the setting to the desired level. Moving the slider bar toward the Low side will reduce the impact on performance of the Security Scan on the client but will also increase the amount of time it takes for the scan to finish. Conversely, moving the slider bar towards the High side will increase the impact on performance of the Security Scan on the client but will also reduce the time it takes for the scan to finish. If the Security Scan is scheduled to run during non-business hours, it would be best to move the slider bar all the way to the High side so the scan can finish as fast as possible. Make any changes required on the General page and then click Scan options.
13 Scan options page Scan options page controls what vulnerabilities are scanned for on the clients. Make sure that Vulnerabilities, Antivirus updates and LANDesk updates types are selected as a minimum. The Antivirus updates option when checked will detect and return information about the antivirus software installed on the client if it is one of the more common antivirus applications (McAfee, Symantec, LANDesk AV, etc.). The Enable autofix checkbox will only make a difference if vulnerabilities have had autofix enabled in the Patch and Compliance window. Check the Autofix column to see if there is a Yes for any of the vulnerabilities in the Scan folder. Only vulnerabilities in the Scan folder that have a Yes in the Autofix column will be automatically installed. Uncheck the Enable autofix box to prevent any patches from being automatically installed on clients.
14 Pilot configuration page Make sure that the Periodically scan and repair definitions in the following group is unchecked. Click Save when all Scan and Repair settings have been adjusted. When a Security Scan is run on the clients, any changes made to the Scan and Repair settings will automatically be downloaded to the client. RUN A SECURITY SCAN (VULSCAN.EXE) ON ALL CLIENTS A patch cannot be applied to a computer unless the vulnerability associated with that patch has first been detected on that computer. There are three different ways to run a Security Scan on a computer to detect vulnerabilities. The first two ways are configured from the Agent Configuration tool in the LANDesk Console and should have been configured before deploying the LANDesk agent. The first two methods will not be covered in this document. The security scan should be run on managed nodes at least once a day. 1. When a user logins. 2. Setting a frequency to be run by the client s local scheduler service. By default, the Security Scan is set to run once a day in the agent configuration. 3. Create a Security Scan task.
15 Create a Security Scan Task In the Patch and Compliance window, click the Create a task icon in the toolbar and select Security Scan from the drop-down list. The Create security scan task window appears. Click to place a checkmark in the Create a scheduled task checkbox. Select the Scan and repair settings from the drop-list that was created or modified in the previous section of this document. Click OK to create the task which will create the task in the Scheduled Tasks window.
16 Drag computers from All Devices in the Console and drop them on the Security Scan task (Patch and Compliance Scan) in the Scheduled tasks window. Drag all computers that the Security scan needs to be run on to the task.
17 Right-click the Security Scan task (Patch and Compliance Scan) in the Scheduled tasks window and click Start now to immediately run the Security Scan task. Or, select Properties to schedule a time for the Security Scan to run. It is recommended to run the Security Scan task during non-business hours because the Security Scan will impact the performance of the computer. CREATE AND RUN A REPAIR TASK After the Security Scan completes on the clients, it is time to create a repair task to remediate the detected vulnerabilities. Open the Patch and Compliance window in the LANDesk Console.
18 Right-click My custom groups in the Patch and Compliance window under Groups Custom groups and select the New Group option. Enter a name for the new group.
19 Click on the Detected folder under All Types which will display a list of all of the vulnerabilities that have been detected as needing to be installed on at least one computer that the Security Scan was run on earlier. Click on any of the vulnerabilities in the detected folder and then hit CTRL + a which should select all of the vulnerabilities in the detected folder.
20 The lower left corner of the Patch and Compliance window will show the number of vulnerabilities in the detected folder. Drag and drop all of the vulnerabilities from the detected folder to the custom group (MyPatchGroup) created previously. If this message window comes up, click Yes.
21 Click the custom patch group (MyPatchGroup) and verify that all of the patches were added to the group. The number of vulnerabilities in the group should be equal to or greater than the number on the detected folder because of dependencies and prerequisites that were automatically added. Look through the vulnerabilities in the patch group and remove any vulnerabilities that you do not want installed on any computers in your environment. Right-click the custom group and select the Repair option.
22 If this Repair Information message box comes up, click Yes. Click the Configure button to open the Configure scan and repair settings window.
23 Click the New button to create a new scan and repair setting for the repair task. On the General settings page, enter a name for this scan and repair setting to be used with the repair task. Adjust the slider bar for CPU utilization when scanning if necessary. Moving the bar towards High will increase the amount of CPU VULSCAN.EXE is allowed to use. Change any other settings as necessary for the environment. Click Repair options to switch to the repair options page.
24 Make sure that the Reboot is already pending box is checked. Adjust other settings as required for the environment. Click MSI information to switch to the MSI information page.
25 If the original location for the Microsoft Office install files is no longer accessible by the client, enter the UNC path to the Office install files and a username and password that can access them. If you are not sure whether the client can access the original location, leave this page blank and try it. If the Office patches fail, fill in this page and try it again. Click Reboot options to switch to the reboot options page.
26 Select the appropriate options on the reboot options page to meet the requirements for the environment. Click Save. Make sure the new Scan and Repair setting is highlighted and then click Use selected.
27 Verify that the correct scan and repair setting is shown in the Scan and repair settings box. Then click the Patches tab.
28 Click on any of the patches in the list and hit CTRL+a which should highlight all of the patches in the list.
29 Right-click any of the patches and select the Download Patch option. The Downloading Patches window will appear.
30 Wait for all of the patches to download and click Close when it is done. Then click the General tab. Any patches that are already downloaded will be verified and skipped if the file matches the current vulnerability otherwise the patch will be redownloaded.
31 It is recommended to use Repair as a scheduled task (push) so that the patching time can be controlled. For laptops (mobile users), the Repair as policy (pull) is the recommended method for patching the remote device. This is the most effective method since the policy can run when the device connects to the network. Select the Don't add any computers option because the patches should be tested on a few computers first to make sure there are no major problems with the patches. Click OK which will create the repair task and switch to the Scheduled Tasks window with the repair task highlighted.
32 Drag a few devices that can be used for testing from the All Devices list and drop them on the repair task in the Scheduled Tasks window. These will be the computers used to test the patch deployment process.
33 After the test computers have been added to the repair task, right-click the repair task and click Start now to immediately patch the computers, or select the Properties option to set a start time for the task. It is best to patch computers during non-business hours because of the performance impact to the computer while patches are being installed. Wait for the patch repair task to complete and then continue with the next section. REBOOT THE CLIENTS Reboot the clients if any of the patches in the repair task requires a reboot. Until the client is rebooted, the patch is not completely installed and will still be detected on the clients. This can be done with the reboot task available in the Patch and Compliance window. Open the Patch and Compliance tool.
34 Select the Reboot option from the Create a task drop-down list. The Create reboot task window appears. Click to place a checkmark in the Create a scheduled task checkbox. Click the Configure button to create a Scan and repair setting for the reboot task.
35 Click the New button. On the General settings page, enter a name for this Scan and Repair setting. Click Reboot options to switch to the reboot options page.
36 Select the Always reboot option. Select other options as required for this environment. Click Save. Verify the correct scan and repair setting is highlighted and click Use selected.
37 Verify the required scan and repair setting shows in the Scan and repair settings box. Click OK which will create the reboot task and switch to the Scheduled Tasks window with the reboot task highlighted. Drag the computers which need to be rebooted from All devices and drop them on the reboot task.
38 Right-click the reboot task and select the Start now option to immediately start the task or select Properties to set a start time for the task. Wait for the computers to restart before continuing with the next section. RUN A SECURITY SCAN ON THE CLIENTS THAT WERE PATCHED Follow the instructions in the section titled "RUN A SECURITY SCAN (VULSCAN.EXE) ON ALL CLIENTS" to run a Security Scan on the computers that were patched. CHECK SECURITY AND PATCH INFORMATION FOR PATCHED COMPUTERS Check the Security and Patch information for the patched clients to see what patches are still needed.
39 Right-click a patched computer under All devices in the console and select the Security and Patch Information option.
40 All Detected will show all patches that the computer still needs. Repeat the steps in this document until all patches have been installed on the computers. CONCLUSION The steps outlined in this document provide the user with the basic information required to get started with Patch Manager in a LANDesk Management Suite 9.0 environment. ABOUT LANDESK SOFTWARE The foundation for LANDesk s leading IT management solutions was laid more than 20 years ago. And LANDesk has been growing and innovating the systems, security, service and process management spaces ever since. Our singular focus and our commitment to understanding customers real business needs and to delivering easy-to-use solutions for those needs are just a few of the reasons we continue to grow and expand. LANDesk pioneered the desktop management category back in That same year, IDC named LANDesk the category leader. And LANDesk has continued to lead the systems configuration space: pioneering virtual IT technology in 1999, revolutionizing large-packet distribution with LANDesk Targeted Multicast technology and LANDesk Peer Download technology in 2001, and delivering secure systems management over the Internet and hardware-independent network access control capabilities with LANDesk Management Gateway and LANDesk Trusted Access Technology in In 2006, LANDesk added process management technologies to its product line and began integrating the systems, security and process management markets. LANDesk also extended into the consolidated service desk market with LANDesk Service Desk, and was acquired by Avocent to operate as an independent division. Today, LANDesk continues to lead the convergence of the systems, security, process and service management markets. And our executives, engineers and other professionals work tirelessly to deliver leading solutions to markets around the globe.
LANDesk Patch and Compliance. Common Troubleshooting steps for Vulnerability Remediation.
LANDesk Patch and Compliance Common Troubleshooting steps for Vulnerability Remediation. Contents Introduction... 3 Scope... 3 Assumptions... 3 Logs used in Troubleshooting... 4 Vulscan Switches... 4 The
LANDesk Patch Manager. Strategic and Tactical Implementation Guide
LANDesk Patch Manager Strategic and Tactical Implementation Guide Contents Using this Guide... 4 Quick Start... 4 Technical High-Level Overview... 5 Discovering your environment... 5 Using Inventory...
LANDesk Management Suite 9. Best Practices for Agent Configuration and Deployment (BKM)
LANDesk Management Suite 9 Best Practices for Agent Configuration and Deployment (BKM) Revision 1.00 Don White Dec 10, 2009 Copyright 2002-2009 Avocent Corporation. All rights reserved. Avocent, LANDesk,
LANDesk Management Suite 8, v8.1 Creating Custom Vulnerabilities
LANDesk Management Suite 8, v8.1 Creating Custom Vulnerabilities Revision 1.0 Rex Moffitt May 26, 2004 Information in this document is provided in connection with LANDesk Software products. No license,
4cast Client Specification and Installation
4cast Client Specification and Installation Version 2015.00 10 November 2014 Innovative Solutions for Education Management www.drakelane.co.uk System requirements The client requires Administrative rights
AV Management Dashboard
LabTech AV Management Dashboard AV MANAGEMENT DASHBOARD... 1 Overview... 1 Requirements... 1 Dashboard Overview... 2 Clients/Groups... 2 Offline AV Agents... 3 Threats... 3 AV Product... 4 Sync Agent Data
Using Remote Web Workplace Version 1.01
Using Remote Web Workplace Version 1.01 Remote web workplace allows you to access your Windows XP desktop through Small Business Server 2003 from a web browser. 1. Connect to the Internet in your remote
SSL VPN Setup for Windows
SSL VPN Setup for Windows SSL VPN allows you to connect from off campus to access campus resources such as Outlook email client, file sharing and remote desktop. These instructions will guide you through
Configuring WPA2 for Windows XP
Configuring WPA2 for Windows XP Requirements for wireless using WPA2 on Windows XP with Service Pack 2 Your wireless card must support 802.1x, AES, and WPA2. Windows XP with service pack 2, it is recommended
Snow Inventory. Installing and Evaluating
Snow Inventory Installing and Evaluating Snow Software AB 2002 Table of Contents Introduction...3 1. Evaluate Requirements...3 2. Download Software...3 3. Obtain License Key...4 4. Install Snow Inventory
How To Sync Between Quickbooks And Act
QSalesData User Guide Note: In addition to this User Guide, we have an extensive Online Video Library that you can access from our website: www.qsalesdata.com/onlinevideos Updated: 11/14/2014 Installing
LogMeIn Network Console Version 8 Getting Started Guide
LogMeIn Network Console Version 8 Getting Started Guide April 2007 1. About the Network Console... 2 2. User Interface...2 3. Quick Start... 2 4. Network & Subnet Scans...3 5. Quick Connect...3 6. Operations...
Installing TestNav Mac with Apple Remote Desktop
Installing TestNav Mac with Apple Remote Desktop 1 2 3 Getting TestNav Installation from Servicedesk 1.1 Connect to Servicedesk 4 1.2 Download Package to Desktop 7 Installing TestNav 2.1 Add Computers
Instructions for Connecting to PACS outside of a Regional Facility
Instructions for Connecting to PACS outside of a Regional Facility For support, please contact the ehealth Saskatchewan Helpdesk at 1-888-316-7446 Recommended options provide optimal performance 1 The
Sophos Anti-Virus for NetApp Storage Systems startup guide
Sophos Anti-Virus for NetApp Storage Systems startup guide Runs on Windows 2000 and later Product version: 1 Document date: April 2012 Contents 1 About this guide...3 2 About Sophos Anti-Virus for NetApp
BitDefender Security for Exchange
Quick Start Guide Copyright 2011 BitDefender 1. About This Guide This guide will help you install and get started with BitDefender Security for Exchange. For detailed instructions, please refer to the
How to Configure Outlook 2010 E-mail Client for Exchange
LAUSD IT Help Desk How to Configure Outlook 2010 E-mail Client for Exchange (03/04/2012) LAUSD IT Help Desk 333 S. Beaudry Ave. 9 th Floor Phone 213.241.5200 Table of Contents Configure Outlook 2010 for
Setting up Sharp MX-Color Imagers for Inbound Fax Routing to Email or Network Folder
Setting up Sharp MX-Color Imagers for Inbound Fax Routing to Email or Network Folder MX-2300, MX-2600, MX-2700, MX-3100, MX-3501, MX-4501, MX-5500, MX-6200, MX-6201, MX-7000, MX-7001, *MX-M850, *MX-M950,
Lenovo Online Data Backup User Guide Version 1.8.14
Lenovo Online Data Backup User Guide Version 1.8.14 Contents Chapter 1: Installing Lenovo Online Data Backup...5 Downloading the Lenovo Online Data Backup Client...5 Installing the Lenovo Online Data
CONNECT-TO-CHOP USER GUIDE
CONNECT-TO-CHOP USER GUIDE VERSION V8 Table of Contents 1 Overview... 3 2 Requirements... 3 2.1 Security... 3 2.2 Computer... 3 2.3 Application... 3 2.3.1 Web Browser... 3 2.3.2 Prerequisites... 3 3 Logon...
BSDI Advanced Fitness & Wellness Software
BSDI Advanced Fitness & Wellness Software 6 Kellie Ct. Califon, NJ 07830 http://www.bsdi.cc SOFTWARE BACKUP/RESTORE INSTRUCTION SHEET This document will outline the steps necessary to take configure the
SQLBackupAndFTP User Instructions (Rev 0.3) 9/14/10
SQLBackupAndFTP User Instructions (Rev 0.3) 9/14/10 SQLBackupAndFTP Installation Website: www.sqlbackupandftp.com Download the installation executable from: http://downloads.minntech.com/medivators Advantage
How to connect to VUWiFi
Wireless Registration Instructions Windows XP How to connect to VUWiFi 1. The first step in setting up your wireless card for VUWiFi is to open your Network Connections window. You can find this by going
Server Installation: ServerTools
Server Installation: ServerTools ServerTools Page 1 Table of Contents To Install ServerTools...3 Backup and Restore...6 Purpose...6 Background...6 Requirements...6 Creating a Backup Schedule using the
XStream Remote Control: Configuring DCOM Connectivity
XStream Remote Control: Configuring DCOM Connectivity APPLICATION BRIEF March 2009 Summary The application running the graphical user interface of LeCroy Windows-based oscilloscopes is a COM Automation
MyNetFone Virtual Fax. Virtual Fax Installation
Table of Contents MyNetFone Virtual Fax MyNetFone Virtual Fax Installation... 1 Changing the SIP endpoint details for the fax driver... 11 Uninstalling Virtual Fax... 13 Virtual Fax Installation Follow
Installing Windows Server Update Services (WSUS) on Windows Server 2012 R2 Essentials
Installing Windows Server Update Services (WSUS) on Windows Server 2012 R2 Essentials With Windows Server 2012 R2 Essentials in your business, it is important to centrally manage your workstations to ensure
TAMUS Terminal Server Setup BPP SQL/Alva
We have a new method of connecting to the databases that does not involve using the Texas A&M campus VPN. The new way of gaining access is via Remote Desktop software to a terminal server running here
Patch Management Hands-On Exercises. Patch Management Hands-on Exercise
Patch Management Hands-On Exercises Patch Management Hands-on Exercise 192 Chapter 5 Patch Management Hands-On Exercises Background Story You have been hired as the lead IT Administrator at the Florida
Tutorial. Patch Management
Tutorial Patch Management 2011 DeskCenter Solutions AG Table of Contents 1. Introduction...3 2. Software deployer...4 2.1 Preparing the software deployer...4 2.2 Configuring software deployers...4 3. Central
Linko Software Express Edition Typical Installation Guide
Linko Software Express Edition Typical Installation Guide Install Database Service Components and Database...1 Install Workstation Components...4 Install DB Administration Tool...6 Office 2003 Security
1. Set Daylight Savings Time... 3. 2. Create Migrator Account... 3. 3. Assign Migrator Account to Administrator group... 4
1. Set Daylight Savings Time... 3 a. Have client log into Novell/Local Machine with Administrator Account...3 b. Access Adjust Date/Time...3 c. Make sure the time zone is set to Central Time...3 2. Create
Sophos Anti-Virus for NetApp Storage Systems startup guide. Runs on Windows 2000 and later
Sophos Anti-Virus for NetApp Storage Systems startup guide Runs on Windows 2000 and later Document date: July 2007 Contents About this guide...4 About Sophos Anti-Virus for NetApp Storage Systems...5
HP Client Automation Standard Fast Track guide
HP Client Automation Standard Fast Track guide Background Client Automation Version This document is designed to be used as a fast track guide to installing and configuring Hewlett Packard Client Automation
User Guide. Version 3.2. Copyright 2002-2009 Snow Software AB. All rights reserved.
Version 3.2 User Guide Copyright 2002-2009 Snow Software AB. All rights reserved. This manual and computer program is protected by copyright law and international treaties. Unauthorized reproduction or
Connecting to Delta College Exchange services off-campus
Connecting to Delta College Exchange services off-campus The following instructions are provided to document the client configuration used to connect to Microsoft Exchange services at Delta College from
Distributing EmailSMS v2.0
Distributing EmailSMS v2.0 1) Requirements Windows 2000/XP and Outlook 2000, 2002 or 2003, Microsoft.NET Framework v 2).NET Framework V 1 Rollout Microsoft.NET Framework v1 needed to run EmailSMS v2.0.
Remote Desktop Services
Remote Desktop Services AMERICAN INSTITUTES FOR RESEARCH AIR REMOTE DESKTOP SERVICES (RDS) GUIDE Overview Welcome to AIR Remote Desktop Services! AIR Remote Desktop Services can be accessed from a Windows
Remote Access: Citrix Client Setup
Introduction: The following documentation is intended to assist first time or active users with installation of the Citrix ICA connection software required to access the MSVU Remote Access system desktop
AT&T Internet Security Suite - powered by McAfee. Installation Guide (for Clean Machine with No Anti-Virus Installed)
AT&T Internet Security Suite - powered by McAfee Installation Guide (for Clean Machine with No Anti-Virus Installed) Contents 2 Contents Introduction 3 Chapters 1. Start Download Manager...4 2. Select
Citrix Remote Access Portal U s e r M a n u a l
Citrix Remote Access Portal U s e r M a n u a l 1 P a g e Table of Contents Table of Contents... 2 Introduction... 3 1. What is Citrix and how does it work?... 4 2. PC Setup/Internet Explorer - Connecting
Virtual Office Remote Installation Guide
Virtual Office Remote Installation Guide Table of Contents VIRTUAL OFFICE REMOTE INSTALLATION GUIDE... 3 UNIVERSAL PRINTER CONFIGURATION INSTRUCTIONS... 12 CHANGING DEFAULT PRINTERS ON LOCAL SYSTEM...
How To Upgrade Your Microsoft SQL Server for Accounting CS Version 2012.1
How To Upgrade Your Microsoft SQL Server for Version 2012.1 The first step is to gather important information about your existing configuration. Identify The Database Server and SQL Server Version The
Deployment of Keepit for Windows
Deployment of Keepit for Windows Keepit A/S October 13, 2010 1 Introduction When deploying Keepit in larger setups with many desktops and servers, installing Keepit individually on each computer is cumbersome
Sophos Anti-Virus for NetApp Storage Systems user guide. Product version: 3.0
Sophos Anti-Virus for NetApp Storage Systems user guide Product version: 3.0 Document date: May 2014 Contents 1 About this guide...3 2 About Sophos Anti-Virus for NetApp Storage Systems...4 3 System requirements...5
Laptop Backup - User Guide (Windows)
Laptop Backup - User Guide (Windows) Page 1 of 14 Page 2 of 14 Laptop Backup - User Guide - (Windows) TABLE OF CONTENTS INSTALLATION MONITOR RESTORE ADVANCED OPTIONS Adding Backup Content Filtering Contents
Sophos Enterprise Console Help. Product version: 5.1 Document date: June 2012
Sophos Enterprise Console Help Product version: 5.1 Document date: June 2012 Contents 1 About Enterprise Console...3 2 Guide to the Enterprise Console interface...4 3 Getting started with Sophos Enterprise
How To Use Senior Systems Cloud Services
Senior Systems Cloud Services In this guide... Senior Systems Cloud Services 1 Cloud Services User Guide 2 Working In Your Cloud Environment 3 Cloud Profile Management Tool 6 How To Save Files 8 How To
Contents. VPN Instructions. VPN Instructions... 1
VPN Instructions Contents VPN Instructions... 1 Download & Install Check Point VPN Software... 2 Connect to FPUA by VPN... 6 Connect to Your Computer... 8 Determine Your Machine Type... 10 Identify 32-bit
How to remotely access your Virtual Desktop from outside the college using VMware View Client. How to guide
How to remotely access your Virtual Desktop from outside the college using VMware View Client How to guide Author: ICT Services Version: 1.0 Date: November 2015 Contents What is the VMware View Client?...
MAPPING THE WEBDRIVE REFERENCE GUIDE
MAPPING THE WEBDRIVE REFERENCE GUIDE INTRODUCTION The university WebDrive is a dedicated drive to host all university web content. For help with mapping the WebDrive, please read the instructions below
Remote E-mail Access with Outlook 2003 Using RPC over HTTPS
Remote E-mail Access with Outlook 2003 Using RPC over HTTPS Information Services now offers full remote access to your Exchange e-mail, calendar, contacts, etc. via the Outlook client without having to
Nexio Connectus with Nexio G-Scribe
Nexio Connectus with Nexio G-Scribe 2.1.2 3/20/2014 Edition: A 2.1.2 Publication Information 2014 Imagine Communications. Proprietary and Confidential. Imagine Communications considers this document and
ILTA HANDS ON Securing Windows 7
Securing Windows 7 8/23/2011 Table of Contents About this lab... 3 About the Laboratory Environment... 4 Lab 1: Restricting Users... 5 Exercise 1. Verify the default rights of users... 5 Exercise 2. Adding
Setting up Remote Desktop
Setting up Remote Desktop Terminology: Host PC the computer you want to access remotely; the destination Client PC the computer you are actually using to access another PC; the source IP Address the numerical
Cyber Security: Software Security and Hard Drive Encryption
Links in this document have been set for a desktop computer with the resolution set to 1920 x 1080 pixels. Cyber Security: Software Security and Hard Drive Encryption 301-1497, Rev A September 2012 Copyright
LepideAuditor Suite for File Server. Installation and Configuration Guide
LepideAuditor Suite for File Server Installation and Configuration Guide Table of Contents 1. Introduction... 4 2. Requirements and Prerequisites... 4 2.1 Basic System Requirements... 4 2.2 Supported Servers
WA2192 Introduction to Big Data and NoSQL. Classroom Setup Guide. Web Age Solutions Inc. Copyright Web Age Solutions Inc. 1
WA2192 Introduction to Big Data and NoSQL Classroom Setup Guide Web Age Solutions Inc. Copyright Web Age Solutions Inc. 1 Table of Contents Part 1 - Minimum Hardware Requirements...3 Part 2 - Minimum Software
Deploying Windows Streaming Media Servers NLB Cluster and metasan
Deploying Windows Streaming Media Servers NLB Cluster and metasan Introduction...................................................... 2 Objectives.......................................................
SQL Server Setup for Assistant/Pro applications Compliance Information Systems
SQL Server Setup for Assistant/Pro applications Compliance Information Systems The following document covers the process of setting up the SQL Server databases for the Assistant/PRO software products form
QUANTIFY INSTALLATION GUIDE
QUANTIFY INSTALLATION GUIDE Thank you for putting your trust in Avontus! This guide reviews the process of installing Quantify software. For Quantify system requirement information, please refer to the
Outlook Integration for Client Profiles for Windows
C ase Manag e m e n t by C l i e n t P rofiles Outlook Integration for Client Profiles for Windows T E C H N O L O G Y F O R T H E B U S I N E S S O F L A W Table of Contents 2 Table of Contents Overview...
Mondopad v1.6. Quick Start 009-1489-00
Mondopad v1.6 Quick Start 009-1489-00 Contents Hardware Setup... 3 Windows Setup & Registration Process... 3 Microsoft Windows Setup... 3 Register the Mondopad Software... 4 Microsoft Office Activation...
...1 CITRIX REMOTE ACCESS WINDOWS 7...1 TABLE OF CONTENTS...1 ADDING CITRIX.AKERMAN.COM AS A TRUSTED SITE TO INTERNET EXPLORER 8.0...
TABLE OF CONTENTS...1 CITRIX REMOTE ACCESS WINDOWS 7...1 TABLE OF CONTENTS...1 ADDING CITRIX.AKERMAN.COM AS A TRUSTED SITE TO INTERNET EXPLORER 8.0...2 INSTALLING THE ENDPOINT ANALYSIS...4 LOGGING OFF
Web File Management with SSH Secure Shell 3.2.3
Web File Management with SSH Secure Shell 3.2.3 June 2003 Information Technologies Copyright 2003 University of Delaware. Permission to copy without fee all or part of this material is granted provided
Undergraduate Academic Affairs \ Student Affairs IT Services. VPN and Remote Desktop Access from a Windows 7 PC
Undergraduate Academic Affairs \ Student Affairs IT Services VPN and Remote Desktop Access from a Windows 7 PC Last edited: 4 December 2015 Contents Inform IT Staff... 1 Things to Note... 1 Setting Up
Check current version of Remote Desktop Connection for Mac.. Page 2. Remove Old Version Remote Desktop Connection..Page 8
CONTENTS SECTION 1 Check current version of Remote Desktop Connection for Mac.. Page 2 SECTION 2 Remove Old Version Remote Desktop Connection..Page 8 SECTION 3 Download and Install Remote Desktop Connection
Outlook Profile Setup Guide Exchange 2010 Quick Start and Detailed Instructions
HOSTING Administrator Control Panel / Quick Reference Guide Page 1 of 9 Outlook Profile Setup Guide Exchange 2010 Quick Start and Detailed Instructions Exchange 2010 Outlook Profile Setup Page 2 of 9 Exchange
FTP Over SSL (FTPS) Core FTP LE. Installing Core FTP LE"
FTP Over SSL (FTPS) Gordon State College has setup FTP Over SSL (also known as FTPS ) to allow students, faculty, and staff to access resources from our Servers from off-campus using an encrypted connection.
How to Setup SQL Server Replication
Introduction This document describes a scenario how to setup the Transactional SQL Server Replication. Before we proceed for Replication setup you can read brief note about Understanding of Replication
K7 Business Lite User Manual
K7 Business Lite User Manual About the Admin Console The Admin Console is a centralized web-based management console. The web console is accessible through any modern web browser from any computer on the
Portions of this product were created using LEADTOOLS 1991-2009 LEAD Technologies, Inc. ALL RIGHTS RESERVED.
Installation Guide Lenel OnGuard 2009 Installation Guide, product version 6.3. This guide is item number DOC-110, revision 1.038, May 2009 Copyright 1992-2009 Lenel Systems International, Inc. Information
Table of Contents. CHAPTER 1 About This Guide... 9. CHAPTER 2 Introduction... 11. CHAPTER 3 Database Backup and Restoration... 15
Table of Contents CHAPTER 1 About This Guide......................... 9 The Installation Guides....................................... 10 CHAPTER 2 Introduction............................ 11 Required
Citrix : Remediation - MAC
Citrix : Remediation - MAC Key Points: 1. 2. 3. 4. 5. 6. 7. Understanding End Point Scan Analysis Supported anti-virus and firewall products Configuring AVAST/SOPHOS and the Mac OS X Firewall Installing
LRDC Computing Services
LRDC Computing Services Remote Access to the LRDC Fileservers Windows XP* April 5, 2005 *While these instructions have been created for and tested on a Windows XP computer, they may also work for your
Quick Install Guide. Lumension Endpoint Management and Security Suite 7.1
Quick Install Guide Lumension Endpoint Management and Security Suite 7.1 Lumension Endpoint Management and Security Suite - 2 - Notices Version Information Lumension Endpoint Management and Security Suite
Symantec AntiVirus Corporate Edition Patch Update
Symantec AntiVirus Corporate Edition Patch Update Symantec AntiVirus Corporate Edition Update Documentation version 10.0.1.1007 Copyright 2005 Symantec Corporation. All rights reserved. Symantec, the Symantec
Email Client Configuration Guide
Email Client Configuration Guide Table of Contents Email Configuration...3 Email settings...3 IMAP...3 POP...3 SMTP...3 Process Overview...5 Account set up wizards...5 Anatomy of an email address...5 Why
HOW TO INSTALL FS USB TRANSCRIPTION SOFTWARE (OFFICE ADMIN MEDICAL)
Go to itstartshere.nbcc.ca to watch a video on how to do this. HOW TO INSTALL FS USB TRANSCRIPTION SOFTWARE (OFFICE ADMIN MEDICAL) These steps MUST be performed while at the college. Cannot be done from
Archive Add-in Administrator Guide
Archive Add-in Administrator Guide RESTRICTION ON USE, PUBLICATION, OR DISCLOSURE OF PROPRIETARY INFORMATION Copyright 2011 McAfee, Inc. This document contains information that is proprietary and confidential
Detecting and Removing Spyware From Your Home Computer
Detecting and Removing Spyware From Your Home Computer Preamble: Spyware are programs that silently monitor and report on computing activities via the Internet. Companies use Spyware to target users with
Global VPN Client Getting Started Guide
Global VPN Client Getting Started Guide 1 Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your system. CAUTION: A CAUTION indicates potential
HWS Virtual Private Network Configuration and Setup Mac OS X 12/19/2006
The VPN connection supports mainly access to the HWS network drives, not streaming audio/video or downloading large amounts of data. Contents Before Connecting via VPN Before setting up a Virtual Private
Installation and Program Essentials
CS PROFESSIONAL SUITE ACCOUNTING PRODUCTS Installation and Program Essentials version 2015.x.x TL 28970 3/26/2015 Copyright Information Text copyright 1998 2015 by Thomson Reuters. All rights reserved.
Technical Reference: Deploying the SofTrack MSI Installer
Technical Reference: Page 1 of 20 Table of Contents Overview...3 Prerequisites...3 Component Descriptions...3 Deploying the MSI...3 Script Method...3 Defining Public Properties... 4 Public Property Tables...
Charter Business Desktop Security Administrator's Guide
Charter Business Desktop Security Administrator's Guide Table of Contents Chapter 1: Introduction... 4 Chapter 2: Getting Started... 5 Creating a new user... 6 Recovering and changing your password...
LANDESK Service Desk. Desktop Manager
LANDESK Service Desk Desktop Manager LANDESK SERVICE DESK DESKTOP MANAGER GUIDE This document contains information, which is the confidential information and/or proprietary property of LANDESK Software,
Reporting works by connecting reporting tools directly to the database and retrieving stored information from the database.
Print Audit 6 - Step by Step Walkthrough IMPORTANT: READ THIS BEFORE PERFORMING A PRINT AUDIT 6 INSTALLATION Print Audit 6 is a desktop application that you must install on every computer where you want
3 Setting up Databases on a Microsoft SQL 7.0 Server
3 Setting up Databases on a Microsoft SQL 7.0 Server Overview of the Installation Process To set up GoldMine properly, you must follow a sequence of steps to install GoldMine s program files, and the other
KANTECH SCHEDULED EVENTS INSTALLATION MANUAL
KANTECH SCHEDULED EVENTS INSTALLATION MANUAL Before you begin you will need to have downloaded the software and received your license from the Multi Tech Reps webstore. You may also need your Windows installation
RMM/MDM. Quick Reference Guide
RMM/MDM Quick Reference Guide Contents Getting Started...3 Probe and Agent Management...3 Installing a Windows Probe...3 Installing an Agent...5 Windows Agents...5 Updating Monitoring Software - Manually...5
Moxa Device Manager 2.0 User s Guide
First Edition, March 2009 www.moxa.com/product 2009 Moxa Inc. All rights reserved. Reproduction without permission is prohibited. Moxa Device Manager 2.0 User Guide The software described in this manual
Introduction. Before you begin. Installing efax from our CD-ROM. Installing efax after downloading from the internet
Introduction Before you begin Before you begin installing efax, please check the following: You have received confirmation that your application for the efax service has been processed. The confirmation
Patch Management Table of Contents:
Table of Contents: Manage Machines Manage Updates Patch Policy Configure Patch Parameters 153 Chapter 5 - Sadjadi et al. Introduction As new operating system and software updates are released in an ever
Security Practices Essentials. Viruses McAfee Virus Software Critical Windows Updates Network Settings. Spyware Adaware Spybot Windows Defender
Security Practices Essentials Viruses McAfee Virus Software Critical Windows Updates Network Settings Spyware Adaware Spybot Windows Defender Security Practices Essentials: All computer passwords should
Mesa DMS. Once you access the Mesa Document Management link, you will see the following Mesa DMS - Microsoft Internet Explorer" window:
Mesa DMS Installing MesaDMS Once you access the Mesa Document Management link, you will see the following Mesa DMS - Microsoft Internet Explorer" window: IF you don't have the JAVA JRE installed, please
Deep Freeze and Microsoft System Center Configuration Manager 2012 Integration
1 Deep Freeze and Microsoft System Center Configuration Manager 2012 Integration Technical Paper Last modified: May 2015 Web: www.faronics.com Email: [email protected] Phone: 800-943-6422 or 604-637-3333
KB-365CP Certiport Level One (L1) Technical Support
KB-365CP Certiport Level One (L1) Technical Support OVERVIEW Level One (L1) Certiport Technical Support includes: Resolving Error 31 (ITS Engine - Office 2010) and Error 47 (Summit Engine - Office 2007)
