1 Introduction to Microsoft Enterprise Desktop Virtualization (MED-V) Terminology Key Capabilities... 4

Save this PDF as:
Size: px
Start display at page:

Download "1 Introduction to Microsoft Enterprise Desktop Virtualization (MED-V)... 3 1.1 Terminology... 4 1.2 Key Capabilities... 4"

Transcription

1 MED-V v1

2 Contents 1 Introduction to Microsoft Enterprise Desktop Virtualization (MED-V) Terminology Key Capabilities High-level Architecture System Requirements for MED-V v Virtual Image Overview Managing a virtual machine The MED-V Client Authentication and Policy Enforcement Virtual Machine Operation Virtual Image Encryption Offline Mode Published Applications and Menus Single Desktop User Experience Web Browser Redirection Printing File Transfer Copy and Paste Control MED-V Client Deployment Client Deployment and Image Delivery Methods Customized, First-time Setup MED-V Image Delivery and Update MED-V Trim Transfer Technology MED-V Management Server Workspace Policy Events Database and the MED-V Dashboard MED-V Enterprise Architecture Scalability and Multi-Locations High Availability... 19

3 1 Introduction to Microsoft Enterprise Desktop Virtualization (MED-V) Microsoft Enterprise Desktop Virtualization (MED-V), a core component of the Microsoft Desktop Optimization Pack (MDOP)for Software Assurance, enables deployment and management of Microsoft virtual PC Windows desktops to enable key enterprise scenarios. Primarily, MED-V helps enterprises upgrade to the latest version of Windows even when some applications are not yet functional or supported. MED-V builds on top of Virtual PC to run two operating systems on one device, adding virtual image delivery, policy-based provisioning, and centralized management. With MED-V, you can easily create, deliver and manage corporate Virtual PC images on any Windows -based desktop. Enable legacy applications and accelerate upgrades to new operating systems Incompatibility of applications with newer versions of Microsoft Windows can delay enterprise operating system (OS) upgrades. Testing and migrating applications can be time-consuming, and meanwhile users are unable to take advantage of the new capabilities and enhancements offered by the new OS. By delivering applications in a Virtual PC that runs a previous version of the OS (e.g., Windows XP or Windows 2000), MED-V removes the barriers to OS upgrades), MED-V removes the barriers to operating system upgrades and allows administrators to complete testing and to deal with incompatible applications after the upgrade. From the user s perspective, these applications are accessible from the standard desktop Start menu and appear side-by-side with native applications so there is minimal change to the user experience. 3

4 1.1 Terminology Host The operating system instance installed on the end-user s physical device. Virtual PC / Machine An additional instance of an operating system running concurrently with the host on the same physical device using virtualization software (such as, Microsoft Virtual PC). Guest The operating system installed on a virtual machine. Virtual image A file that represents the file system of a virtual machine and can be delivered to multiple endpoints independent of their hardware or software. 1.2 Key Capabilities MED-V adds the following additional layers to Microsoft Virtual PC to enable enterprise deployment of desktop virtualization: Virtual images repository and delivery MED-V provides the following mechanisms for simplifying the process of creating, testing, delivering, and maintaining virtual images from a central location: Administrator console for virtual image creation and testing. Centralized virtual images repository for image storage, versioning, and delivery based on Microsoft IIS web servers. A client component (standard MSI installation) that automatically retrieves virtual images from the centralized repository. Auto-installation package for self-deployment of the client component and the virtual images via removable media (such as DVD) or from a website. An efficient, bandwidth-conserving, Trim Transfer mechanism for delivering and updating virtual images over the network. Support for image delivery through standard enterprise content distribution systems. Centralized management and monitoring MED-V helps administrators manage the entire lifecycle of virtual machines deployed on desktops throughout the enterprise. The centralized management and monitoring capabilities MED-V provides include: A central management server that controls all deployed virtual machines. Integration with Microsoft Active Directory Domain Services to enable provisioning of virtual images based on group membership or user identity. User authentication prior to accessing the virtual image (whether the host is online or offline). 4

5 A mechanism for automating the first-time setup of virtual machines at the endpoint, including assignment of a unique computer name, performing initial network setup, and joining the virtual machine to a corporate domain. Support for deployment throughout a heterogeneous environment, adjusting memory allocation for the virtual PC according to the available RAM of the endpoint, and changing network settings according to the local network. A central database of client activity and events facilitating monitoring and remote troubleshooting. Usage policy and data transfer control MED-V client enforces the following user or group usage policies, access permissions to virtual images, and data transfer permissions: Virtual image protection that prevents unauthorized execution. A configurable expiration for the virtual image or a time limit for offline use (to force the user to reauthorize before continuing to work offline). The ability to allow or block data transfer between the virtual machine and the endpoint, via copy and paste, file transfer, or printing. Web browser redirection of administrator-defined domains (such as the corporate intranet or sites that require an older version of the browser) from the endpoint browser, to a browser within the virtual machine. Seamless end-user experience The following can be configured in MED-V to provide a seamless experience, making users unaware of the virtual machines running in the background. It reduces the training required for deploying virtualization to non-technical users: Invisible virtual machine A simplified work process for operating virtual machines through a user-friendly tray menu. The user is not required to learn the principles of virtualization or view an additional desktop as is usually required when running a virtual PC. Published applications Applications installed on the virtual machine are available through the standard desktop Start menu. These applications run in Virtual PC, but are seamlessly integrated into the user desktop and appear side-by-side with native applications. Power user mode Technical users and administrators can view the virtual machine loading processes and desktop if required. 5

6 2 High-level Architecture The MED-V solution comprises the following elements: Administrator-defined virtual machine Encapsulates a full desktop environment, including an operating system, applications and optional management and security tools. Image repository Stores all virtual images on a standard IIS server and enables virtual images version management, client-authenticated image retrieval, and efficient download (of a new image or updates) via Trim Transfer technology. Management server Associates virtual images from the image repository along with administrator usage policies to Active Directory users or groups. The Management Server also aggregates clients' events, and stores them in an external database (Microsoft SQL Server ) for monitoring and reporting purposes. Management console Enables administrators to control the management server and the image repository. 6

7 End-user client 1. Virtual image life-cycle Authentication, image retrieval, enforcement of usage policies. 2. Virtual machine session management Start, stop, lock the virtual machine. 3. Single desktop experience Applications installed in the virtual machine seamlessly available through the standard desktop Start menu and integrated with other applications on the user desktop. All communication between the client and the servers (management server and image repository) is carried on top of a standard HTTP or HTTPs channel. 2.1 System Requirements for MED-V v1 Management Server Operating system: Windows Server 2008 Standard/Enterprise Edition x86 & 64-bit Recommended hardware: Dual Processor (2.8 GHz), 4GB RAM Active-directory : Management server should be joined to a domain Scale: The setup above was tested with 5000 concurrent active clients. Other setups can scale to support larger number of users. Additional Server Components Image repository: Web server(s) based on Microsoft IIS Reporting database (optional): Microsoft SQL Server 2005 SP2 Enterprise Edition SP2 or Microsoft SQL Server 2008 Express/Standard/Enterprise editions Client Operating system: o Windows Vista SP1 (Enterprise, Home Basic, Home Premium, Business, Ultimate) 32-bit (2GB RAM Recommended) o Windows XP SP2 or SP3 (Professional, Home) 32bit (1GB RAM Recommended) Languages: The user interface is only available in English. Support is available for a localized Western-European operating system. Virtual PC: Microsoft Virtual PC 2007 SP1 with KB (or newer) is required Note: MED-V v1 is supported on managed desktops only. It is recommended to install the end user client within IT-managed desktop environments on desktops that are members of a Microsoft Active Directory Domain. Guest Operating System Windows XP SP2 or SP3 32bit Windows 2000 SP4 32bit 7

8 3 Virtual Image Overview The following describes the typical process of creating, deploying, and utilizing a MED-V virtual image: Create a virtual image within Microsoft Virtual PC. Define a MED-V workspace. Create a list of applications installed in the virtual image, which are to be made available to end users through their standard desktop Start menu. Define Web sites that should be viewed inside or outside the virtual machine browser and that are redirected to the appropriate location by MED-V client. Provision the MED-V workspace to Active Directory users and groups. Set usage policy (such as expiration, permission to work offline) and data transfer permissions (such as file transfer, copy andpaste, and printing) to the various users and groups. Test the Image through the MED-V management console, and load it to the MED-V Image Repository. Deploy the MED-V client via one of the following methods: Enterprise software distribution tools The MED-V client and Virtual PC software can be deployed as standard Windows Installer files. Self-install package Deliver a MED-V installation package, which includes MED-V client installation and Virtual PC software using one of the following: o o A self-service Website. Removeable media for example, CD, DVD). The installation process is automated, silent and easy for end users.. 8

9 Deliver the virtual image: Over the network After the MED-V Client is installed, the virtual image can be retrieved over the network using standard HTTP or HTTPs tunnel. Trim Transfer technology will accelerate download speed and reduce required bandwidth, as described in a following section. Using enterprise distribution mechanisms Administrators may choose to deliver packaged virtual PC images (created by the MED-V management console) by using existing systems. The MED-V Client will look for the package in a pre-defined path, and extract the image. Via removable media (for example, DVD) When delivering removable media to the end user, it is possible to add the virtual image to the self-install package. As part of the installation, the virtual image is copied to the local drive. End-users start working Users authenticate against the MED-V management server and they are ready to work within the virtual machine. After the first online authentication, offline work is also supported, if permitted by the administrator. Manage and update the MED-V workspace The management console enables administrators to easily update usage policies, provision MED-V workspaces to additional users, deprovision existing users, and update the virtual images. All updates are automatically distributed to relevant users when they work online. Monitoring clients The MED-V management console presents an updated report of all the users. It provides detailed information on all client events, and when an error occurs, it can help the administrator understand the source of the problem remotely and instruct the user on how to solve it. The MED-V diagnostic tool runs automatically when client installation fails, and can be executed manually in other cases of malfunction. The report can assist Microsoft support in understanding the cause of the problem and recommending the administrator on how to fix it. 9

10 3.1 Managing a virtual machine After the first version of a virtual image is deployed, it becomes a desktop operating system that requires corporate IT management. This includes delivering new applications, patching, updating security definitions and policies, and more. Administrators can choose one of the following two methods of virtual machine management: Domain-managed virtual machine Manage virtual machines just like physical corporate devices. MED-V provides a first-time customization process for every deployed virtual image, where the administrator can choose to join the virtual machine to an Active Directory domain. This way, administrators can patch, update, deliver applications, and apply policies using existing tools. Self-cleaning (revertible) virtual machine MED-V offers a unique method for managing an easy to support virtual desktop environment. It takes advantage of hardware independence enabled by virtualization, and maintains the exact same image across multiple endpoints. All user changes to applications or the OS are discarded once the virtual PC session ends, and the virtual machine reverts to the original image, as packaged and delivered by the administrator. This can significantly simplify management, support, and troubleshooting for virtual machines. Updates, patches, new applications, and settings changes are applied to the master virtual image, tested by the administrator, and uploaded as a new version of the virtual image to the MED-V image repository. The new version is delivered to all endpoints using Trim Transfer technology, removing the need to update each endpoint separately. This method is applicable only where no user data or settings need to be kept in the virtual image (for instance, when all user data and settings are stored on a network location). Also when using the revertible method, the virtual machine should not be part of an Active Directory domain. 10

11 4 The MED-V Client 4.1 Authentication and Policy Enforcement The MED-V client requires authentication to ensure that only authorized users access the MED-V virtual images. This verification is performed against the management server, which queries Active Directory for user and group information. Therefore, the management server must be part of the domain to which the user is trying to authenticate. MED-V leverages Active Directory security policies. When an account is disabled or locked in Active Directory (for instance, if the user typed a wrong password three times), the user is not allowed to tart the MED-V workspace. In addition, if the password is about to expire, the user is offered to change the password before completing the MED-V authentication. Once the authentication process is complete, the MED-V client queries the MED-V management server for the most recent policies and settings. This action ensures that the endpoint is using the most updated MED-V workspaces and allows administrators to control and monitor active users, as described in following sections. The domain credentials used for authenticating the MED-V client are also used to login to the Windows instance inside the virtual machine, so that the user is not required to type the domain credentials twice. The user may choose to save the credentials for future sessions of the same user, so that they are automatically used by MED-V client the next time the user attempts to start a MED-V workspace. Note that the user is required to authenticate by the MED-V client, even if the host and the guest operating system use the same credentials. When the virtual machine is running in a MED-V session, it is locked after a predefined idle time or when the physical device enters hibernation or sleep mode. The authenticated user is required to type his password to unlock the virtual machine and continue working. MED-V v1 only supports authentication based on Active Directory domain credentials (username and password). Future releases may include two-factor authentication (such as smart card certificates). 4.2 Virtual Machine Operation MED-V uses Microsoft Virtual PC to run a virtual machine locally on the endpoint. The MED-V client controls all aspects of virtual machine management, including retrieving or updating a virtual image, customizing the virtual machine for the specific user or device, initiating, suspending or terminating a virtual machine session, and monitoring the virtualization engine for malfunctions (watchdog). End users remain unaware that a virtual machine is running in the background. The MED-V client can be configured to take a snapshot of the virtual machine (similar to a laptop sleep mode) at the end of each work session or when the user logs off the host workstation. This reduces the time required for re-initiating the virtual machine. When a virtual machine is suspended, and a different, authorized user attempts to use it, the virtual machine shuts down first (pending user confirmation). The existing session is lost, similar to Windows behavior when an authorized user attempts to access a locked device. 11

12 4.3 Virtual Image Encryption Virtual images are encrypted by the management console when packaged for distribution (over the network or media) to protect the virtual image from unauthorized use (such as, unauthenticated users, on users not complying with the administrator-defined usage policies). For each image, encryption keys are generated on the server and are securely transferred to clients authorized to work with the specific image. The virtual images remain encrypted on the endpoint local drive, and decryption is completed on the fly when the virtual machine is running. Any new data is saved encrypted. 4.4 Offline Mode If users are authorized to work with the virtual machine offline, the policy files and encryption keys are cached locally after a first successful online authentication. If there are multiple authentication failures, further attempts will be delayed (similar to Windows login). Additionally, if the user account is disabled, locked, expired in Active Directory, or if the account password has changed, MED-V client deletes the locally cached credentials when connecting to the management server. Offline work permissions may be limited by the administrator to a predefined period of time, after which the user must reconnect to the management server and re-authenticate. This ensures users are kept up to date with the most recent policy and permissions, and enforces expiration and de-provisioning settings on end users. 12

13 4.5 Published Applications and Menus Single Desktop User Experience Administrators may publish applications or submenus installed on the virtual machine, making them available to end users through the host Start menu. The applications launch from the Start menu or desktop shortcuts and appear side-by-side with native applications on the user desktop, optionally differentiated by a colored frame. The virtual machine desktop is not visible, simplifying user experience and avoiding changes to user workflows. The single desktop mode simplifies training and work processes and is therefore recommended for most users. However, administrators can set the virtual machine to work in a full desktop mode, when advanced users prefer to view the whole virtual machine. In this mode users have to manually toggle between their physical desktop and the virtual machine desktop. 4.6 Web Browser Redirection For Web applications, administrators can define a set of Websites (based on allow or deny lists of domain suffixes or IP prefixes) to be launched in a browser running on the virtual machine. Corporate Websites or incompatible Web applications can start in the virtual machine, while all other sites still work in the host browser normally. The MED-V client manages the browser redirection automatically, providing a seamless browsing experience for the end user. 13

14 4.7 Printing When a MED-V policy allows printing from MED-V workspace applications (in the guest operating system) to locally installed printers, no driver needs to be installed for locally attached or network printers inside the virtual machine. 4.8 File Transfer Files can be transferred between the virtual machine and the endpoint or vice versa, according to administrator-defined permissions. File transfers are subject to centrally defined filters that allow inbound and outbound transfer of specific file types and may be pending on anti-virus scanning upon their destination. 4.9 Copy and Paste Control Copy and paste operations between a MED-V workspace and native applications can be allowed or denied based on administrator policies. All copy and paste operations inside the virtual machine (between guest applications), and between endpoint host applications, are always allowed; the MED-V Client does not interfere with existing copy and paste behavior. 14

15 5 MED-V Client Deployment 5.1 Client Deployment and Image Delivery Methods MED-V can be deployed in the following ways: Software distribution system The MED-V client installation is based on a standard Windows.msi package. Therefore, when deploying MED-V, administrators can use any existing software distribution system. The MED-V.msi package does not include Virtual PC software that should separately be deployed to all endpoints. When installing MED_V through a distribution system, administrators may choose to let the MED-V client retrieve the virtual image from the image repository according to the user policy, or deliver the virtual image package using other methods to a pre-defined location, so that MED-V client will use it and not download it from the repository. "MED-V deployment package Administrators can provide end users with an installation package that includes the MED-V client, Microsoft Virtual PC, and optionally, the virtual image. The process requires almost no user interference, and automatically installs everything required for MED-V operation on the local drive. The package can be delivered on a removable media (such as CD or DVD), or downloaded from a self-service Web server by the end-user. 5.2 Customized, First-time Setup MED-V allows administrators to customize every deployment of a virtual image. This procedure can include allocating a unique computer name for the virtual image (according to user name, endpoint parameters, or a random ID) so that, for instance, administrators can assign the virtual machine an identifier that is based on the host computer name, and therefore easily identify this virtual machine in software management systems. Other customizations include Sysprep to allocate a unique SID for the virtual machine, joining the virtual machine to the corporate Active Directory domain, or running an administrator script. The MED-V Client handles first time setup automatically and transparently for the end user, including repeating failed steps or the whole process, and reporting back to the management server in case troubleshooting is required. 15

16 6 MED-V Image Delivery and Update The MED-V images repository contains all available virtual machine images. The MED-V management console provides an easy way to create, manage, update or delete images from the MED-V images repository. Whenever administrators provision a new virtual machine or update an existing one, the MED-V management server detects the change in the image repository and notifies MED-V clients on their next policy query, referring them to the most recent virtual machine from the respective images repository. Delivery is implemented using MED-V Trim Transfer technology over the network. Alternatively, virtual machines can be delivered via removable media (such as DVDs) or by other preferred methods of network delivery. The images repository is based on Microsoft IIS Web servers. Therefore when using Trim Transfer delivery, organizations may leverage standard Web scalability and high availability infrastructure. To improve download performance, organizations can create images repository replicas at branch offices or remote geographic locations. Administrators can choose whether the download is done over a standard HTTP or HTTPs session. 16

17 6.1 MED-V Trim Transfer Technology The MED-V advanced Trim Transfer de-duplication technology accelerates the download of initial and updated virtual machine images over the LAN or WAN, thereby reducing the network bandwidth needed to transport a MED-V workspace virtual machine to multiple end users. This technology uses existing local data to build the virtual machine image, leveraging the fact that in many cases, much of the virtual machine (for example, system and application files) already exists on the end user's disk. For example, if a virtual machine containing Windows XP is delivered to a client running a local copy of Windows XP, MED-V will automatically remove the redundant Windows XP elements from the transfer. To ensure a valid and functional workspace, the MED-V client cryptographically verifies the integrity of local data before it is utilized, guaranteeing that the local blocks of data are absolutely bitby-bit identical to those in the desired virtual machine image. Blocks that do not match are not used. The process is bandwidth-efficient and transparent, and transfers run in the background, utilizing unused network and CPU resources. When updating to a new image version (for example, when administrators want to distribute a new application or patch), only the elements that have changed ("deltas") are downloaded, and not the entire virtual machine, significantly reducing the required network bandwidth and delivery time. 17

18 7 MED-V Management Server The MED-V management server stores and manages all MED-V configurations including user policies. It can be installed on top of Microsoft Windows Server (see system requirements). All server functionality can be controlled from the MED-V management console, which is a standalone client application. All MED-V Clients connect to the MED-V management server, authenticate and retrieve the most updated policy. All sessions (from MED-V clients or management consoles) are carried over HTTP or HTTPS (according to server configuration). 7.1 Workspace Policy Using the MED-V management console, administrators can create a new policy or change existing policies stored on the MED-V management server. Any change is automatically detected and updated by all online clients. Offline clients are updated once they connect. All policies are signed by a private key, generated upon server installation; the MED-V client verifies the authenticity and integrity of every policy it retrieves using a public key it retrieves in its first communication with the server. 7.2 Events Database and the MED-V Dashboard The MED-V management server aggregates events from all MED-V clients. The events include system notifications and MED-V workspace monitoring (Workspace started, stop, failed to start due to lack of memory, etc). All events are stored in an external Microsoft SQL Server (see system requirements) that can be installed on the same server or separately. The MED-V management console provides a report generator that filters events according to date and users. In addition, a dashboard status report enables monitoring of all installed clients including machine name, user name, offline and online indication, client version, image name, image version, etc. The client status enables administrators to monitor virtual image downloads or update progress in real time. 18

19 8 MED-V Enterprise Architecture 8.1 Scalability and Multi-Locations A typical MED-V management server can support thousands of users, depending on its hardware. The client-server communication is lightweight. Clients are normally configured to poll the server for a policy every 15 minutes and for image updates every 4 hours. If the policy polling time is increased, the server should be able to increase its scale. The only client-server heavy-duty operation occurs when a new image is available, and multiple clients retrieve hundreds of megabytes from the images repository. Since the images repository is a standard Microsoft IIS Web server, it is possible to scale the image delivery based on IIS capabilities. To improve the download rate, optimize bandwidth efficiently, and further balance the load, the image delivery servers can be placed in multiple geographic locations. DNS resolution can be used to direct the MED-V client to the best available location. Alternatively, a separate distribution mechanism can be used to deliver the virtual images to the endpoints. The MED-V client looks for the image in a pre-defined location, and removes the need for image download and MED-V image delivery Web infrastructure. 8.2 High Availability The MED-V client operates independently of MED-V servers. If the management server is malfunctioning or has stopped responding, all clients already running a MED-V workspace may continue working. New attempts to start a MED-V workspace will run in offline mode. Only online authentication, policy changes, and image updates are unavailable, and client events are aggregated at the client side until the server is available again. However, to ensure fast recovery of a server failure, MED-V supports a failover structure, where two identical management servers are placed behind a third-party high-availability cluster: one is active, the other is passive. Once the active server fails, the cluster automatically shifts to the passive server. In this setup, all server resources -- policy files, settings, virtual machine images, and reports database are separated from the management servers to an external highly available, clustered file system. 19

20 This is a preliminary document and may be changed substantially prior to final commercial release of the software described herein. The information contained in this document represents the current view of Microsoft Corporation on the issues discussed as of the date of publication. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information presented after the date of publication. This White Paper is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS DOCUMENT. Complying with all applicable copyright laws is the responsibility of the user. Without limiting the rights under copyright, no part of this document may be reproduced, stored in or introduced into a retrieval system, or transmitted in any form or by any means (electronic, mechanical, photocopying, recording, or otherwise), or for any purpose, without the express written permission of Microsoft Corporation. Microsoft may have patents, patent applications, trademarks, copyrights, or other intellectual property rights covering subject matter in this document. Except as expressly provided in any written license agreement from Microsoft, the furnishing of this document does not give you any license to these patents, trademarks, copyrights, or other intellectual property Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista, Active Directory, Microsoft SQL Server are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries. The names of actual companies and products mentioned herein may be the trademarks of their respective owners. 20

Kaseya IT Automation Framework

Kaseya IT Automation Framework Kaseya Kaseya IT Automation Framework An Integrated solution designed for reducing complexity while increasing productivity for IT Professionals and Managed Service Providers. The powerful, web-based automation

More information

Deploying Microsoft Enterprise Desktop Virtualization

Deploying Microsoft Enterprise Desktop Virtualization Chapter 16 Deploying Microsoft Enterprise Desktop Virtualization In the previous chapter we reviewed deploying Microsoft VDI, a server-hosted desktop virtualization solution. In this chapter we will review

More information

SAFETICA INSIGHT INSTALLATION MANUAL

SAFETICA INSIGHT INSTALLATION MANUAL SAFETICA INSIGHT INSTALLATION MANUAL SAFETICA INSIGHT INSTALLATION MANUAL for Safetica Insight version 6.1.2 Author: Safetica Technologies s.r.o. Safetica Insight was developed by Safetica Technologies

More information

Windows Server 2012 2,500-user pooled VDI deployment guide

Windows Server 2012 2,500-user pooled VDI deployment guide Windows Server 2012 2,500-user pooled VDI deployment guide Microsoft Corporation Published: August 2013 Abstract Microsoft Virtual Desktop Infrastructure (VDI) is a centralized desktop delivery solution

More information

DameWare Server. Administrator Guide

DameWare Server. Administrator Guide DameWare Server Administrator Guide About DameWare Contact Information Team Contact Information Sales 1.866.270.1449 General Support Technical Support Customer Service User Forums http://www.dameware.com/customers.aspx

More information

Technical Overview of Terminal Services

Technical Overview of Terminal Services Technical Overview of Terminal Services Microsoft Corporation Updated: January 2005 Abstract Windows Server 2003 includes the Terminal Services features of Windows 2000, the client and protocol enhancements

More information

ALTIRIS Software Delivery Solution for Windows 6.1 SP3 Product Guide

ALTIRIS Software Delivery Solution for Windows 6.1 SP3 Product Guide ALTIRIS Software Delivery Solution for Windows 6.1 SP3 Product Guide Notice Altiris Software Delivery Solution for Windows 6.1 SP3 Product Guide 2007 Altiris, Inc. All rights reserved. Document Date: February

More information

www.novell.com/documentation Server Installation ZENworks Mobile Management 2.7.x August 2013

www.novell.com/documentation Server Installation ZENworks Mobile Management 2.7.x August 2013 www.novell.com/documentation Server Installation ZENworks Mobile Management 2.7.x August 2013 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of this

More information

PC-Duo Web Console Installation Guide

PC-Duo Web Console Installation Guide PC-Duo Web Console Installation Guide Release 12.1 August 2012 Vector Networks, Inc. 541 Tenth Street, Unit 123 Atlanta, GA 30318 (800) 330-5035 http://www.vector-networks.com Copyright 2012 Vector Networks

More information

Citrix EdgeSight Administrator s Guide. Citrix EdgeSight for Endpoints 5.3 Citrix EdgeSight for XenApp 5.3

Citrix EdgeSight Administrator s Guide. Citrix EdgeSight for Endpoints 5.3 Citrix EdgeSight for XenApp 5.3 Citrix EdgeSight Administrator s Guide Citrix EdgeSight for Endpoints 5.3 Citrix EdgeSight for enapp 5.3 Copyright and Trademark Notice Use of the product documented in this guide is subject to your prior

More information

Installation Guide for Pulse on Windows Server 2008R2

Installation Guide for Pulse on Windows Server 2008R2 MadCap Software Installation Guide for Pulse on Windows Server 2008R2 Pulse Copyright 2014 MadCap Software. All rights reserved. Information in this document is subject to change without notice. The software

More information

VMware Horizon Mirage Installation Guide

VMware Horizon Mirage Installation Guide VMware Horizon Mirage Installation Guide Horizon Mirage 4.3 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition.

More information

Virtualization and Windows 7

Virtualization and Windows 7 9 Chapter Virtualization and Windows 7 Information in this Chapter Windows XP Mode Many Forms of Virtualization Summary Windows Virtual PC is an optional component of Windows 7 Professional, Enterprise,

More information

http://docs.trendmicro.com

http://docs.trendmicro.com Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the product, please review the readme files,

More information

Kaseya Server Instal ation User Guide June 6, 2008

Kaseya Server Instal ation User Guide June 6, 2008 Kaseya Server Installation User Guide June 6, 2008 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private Sector IT organizations. Kaseya's

More information

Pearl Echo Installation Checklist

Pearl Echo Installation Checklist Pearl Echo Installation Checklist Use this checklist to enter critical installation and setup information that will be required to install Pearl Echo in your network. For detailed deployment instructions

More information

Management Center. Installation and Upgrade Guide. Version 8 FR4

Management Center. Installation and Upgrade Guide. Version 8 FR4 Management Center Installation and Upgrade Guide Version 8 FR4 APPSENSE MANAGEMENT CENTER INSTALLATION AND UPGRADE GUIDE ii AppSense Limited, 2012 All rights reserved. part of this document may be produced

More information

Polycom CMA System Upgrade Guide

Polycom CMA System Upgrade Guide Polycom CMA System Upgrade Guide 5.0 May 2010 3725-77606-001C Trademark Information Polycom, the Polycom Triangles logo, and the names and marks associated with Polycom s products are trademarks and/or

More information

HYPERION SYSTEM 9 N-TIER INSTALLATION GUIDE MASTER DATA MANAGEMENT RELEASE 9.2

HYPERION SYSTEM 9 N-TIER INSTALLATION GUIDE MASTER DATA MANAGEMENT RELEASE 9.2 HYPERION SYSTEM 9 MASTER DATA MANAGEMENT RELEASE 9.2 N-TIER INSTALLATION GUIDE P/N: DM90192000 Copyright 2005-2006 Hyperion Solutions Corporation. All rights reserved. Hyperion, the Hyperion logo, and

More information

NTP Software File Auditor for Windows Edition

NTP Software File Auditor for Windows Edition NTP Software File Auditor for Windows Edition An NTP Software Installation Guide Abstract This guide provides a short introduction to installation and initial configuration of NTP Software File Auditor

More information

Windows Small Business Server 2003 Upgrade Best Practices

Windows Small Business Server 2003 Upgrade Best Practices Windows Small Business Server 2003 Upgrade Best Practices Microsoft Corporation Published: May 2005 Version: 1 Abstract To ensure a successful upgrade from the Microsoft Windows Small Business Server 2003

More information

Release Notes. Cloud Attached Storage 2.5.32

Release Notes. Cloud Attached Storage 2.5.32 Release Notes Cloud Attached Storage 2.5.32 January 2011 Copyright 2009-2011 CTERA Networks Ltd. All rights reserved. No part of this document may be reproduced in any form or by any means without written

More information

Metalogix SharePoint Backup. Advanced Installation Guide. Publication Date: August 24, 2015

Metalogix SharePoint Backup. Advanced Installation Guide. Publication Date: August 24, 2015 Metalogix SharePoint Backup Publication Date: August 24, 2015 All Rights Reserved. This software is protected by copyright law and international treaties. Unauthorized reproduction or distribution of this

More information

Installation Guide for Pulse on Windows Server 2012

Installation Guide for Pulse on Windows Server 2012 MadCap Software Installation Guide for Pulse on Windows Server 2012 Pulse Copyright 2014 MadCap Software. All rights reserved. Information in this document is subject to change without notice. The software

More information

Online Transaction Processing in SQL Server 2008

Online Transaction Processing in SQL Server 2008 Online Transaction Processing in SQL Server 2008 White Paper Published: August 2007 Updated: July 2008 Summary: Microsoft SQL Server 2008 provides a database platform that is optimized for today s applications,

More information

VMware/Hyper-V Backup Plug-in User Guide

VMware/Hyper-V Backup Plug-in User Guide VMware/Hyper-V Backup Plug-in User Guide COPYRIGHT No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, photocopying,

More information

http://docs.trendmicro.com

http://docs.trendmicro.com Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the product, please review the readme files,

More information

Quick Start Guide for VMware and Windows 7

Quick Start Guide for VMware and Windows 7 PROPALMS VDI Version 2.1 Quick Start Guide for VMware and Windows 7 Rev. 1.1 Published: JULY-2011 1999-2011 Propalms Ltd. All rights reserved. The information contained in this document represents the

More information

Best Practices & Deployment SurfControl Mobile Filter v 5.0.2.60

Best Practices & Deployment SurfControl Mobile Filter v 5.0.2.60 Best Practices & Deployment SurfControl Mobile Filter v 5.0.2.60 rev2.1, January 2006 Pre-Installation Guide Notice 2006 SurfControl. All rights reserved. SurfControl, SurfControl E-mail Filter, SurfControl

More information

Quick Install Guide. Lumension Endpoint Management and Security Suite 7.1

Quick Install Guide. Lumension Endpoint Management and Security Suite 7.1 Quick Install Guide Lumension Endpoint Management and Security Suite 7.1 Lumension Endpoint Management and Security Suite - 2 - Notices Version Information Lumension Endpoint Management and Security Suite

More information

Table of Contents. FleetSoft Installation Guide

Table of Contents. FleetSoft Installation Guide FleetSoft Installation Guide Table of Contents FleetSoft Installation Guide... 1 Minimum System Requirements... 2 Installation Notes... 3 Frequently Asked Questions... 4 Deployment Overview... 6 Automating

More information

M86 Web Filter USER GUIDE for M86 Mobile Security Client. Software Version: 5.0.00 Document Version: 02.01.12

M86 Web Filter USER GUIDE for M86 Mobile Security Client. Software Version: 5.0.00 Document Version: 02.01.12 M86 Web Filter USER GUIDE for M86 Mobile Security Client Software Version: 5.0.00 Document Version: 02.01.12 M86 WEB FILTER USER GUIDE FOR M86 MOBILE SECURITY CLIENT 2012 M86 Security All rights reserved.

More information

Omniquad Exchange Archiving

Omniquad Exchange Archiving Omniquad Exchange Archiving Deployment and Administrator Guide Manual version 3.1.2 Revision Date: 20 May 2013 Copyright 2012 Omniquad Ltd. All rights reserved. Omniquad Ltd Crown House 72 Hammersmith

More information

How to Test Out Backup & Replication 6.5 for Hyper-V

How to Test Out Backup & Replication 6.5 for Hyper-V How to Test Out Backup & Replication 6.5 for Hyper-V Mike Resseler May, 2013 2013 Veeam Software. All rights reserved. All trademarks are the property of their respective owners. No part of this publication

More information

Virtual Application Management with Microsoft Application Virtualization 4.6 and System Center 2012 Configuration Manager

Virtual Application Management with Microsoft Application Virtualization 4.6 and System Center 2012 Configuration Manager Virtual Application Management with Microsoft Application Virtualization 4.6 and System Center 2012 Configuration Manager This whitepaper describes the virtual application management capabilities provided

More information

RSA Authentication Agent 7.2 for Microsoft Windows Installation and Administration Guide

RSA Authentication Agent 7.2 for Microsoft Windows Installation and Administration Guide RSA Authentication Agent 7.2 for Microsoft Windows Installation and Administration Guide Contact Information Go to the RSA corporate web site for regional Customer Support telephone and fax numbers: www.rsa.com

More information

Installation Guide. Novell Storage Manager 3.1.1 for Active Directory. Novell Storage Manager 3.1.1 for Active Directory Installation Guide

Installation Guide. Novell Storage Manager 3.1.1 for Active Directory. Novell Storage Manager 3.1.1 for Active Directory Installation Guide Novell Storage Manager 3.1.1 for Active Directory Installation Guide www.novell.com/documentation Installation Guide Novell Storage Manager 3.1.1 for Active Directory October 17, 2013 Legal Notices Condrey

More information

RSA Authentication Manager 7.1 Basic Exercises

RSA Authentication Manager 7.1 Basic Exercises RSA Authentication Manager 7.1 Basic Exercises Contact Information Go to the RSA corporate web site for regional Customer Support telephone and fax numbers: www.rsa.com Trademarks RSA and the RSA logo

More information

Novell ZENworks Asset Management 7.5

Novell ZENworks Asset Management 7.5 Novell ZENworks Asset Management 7.5 w w w. n o v e l l. c o m October 2006 INSTALLATION GUIDE Table Of Contents 1. Installation Overview... 1 If you are upgrading... 1 Installation Choices... 1 ZENworks

More information

Endpoint Virtualization. Workspace Management: Simplify IT Organizations. Data Sheet Symantec TM Workspace Streaming 6.1

Endpoint Virtualization. Workspace Management: Simplify IT Organizations. Data Sheet Symantec TM Workspace Streaming 6.1 Data Sheet Symantec TM Workspace Streaming 6.1 Workspace Management: Simplify IT Organizations Overview As IT organizations today face the reality of managing an increasingly complex mix of desktops, laptops,

More information

Netwrix Auditor for Active Directory

Netwrix Auditor for Active Directory Netwrix Auditor for Active Directory Quick-Start Guide Version: 7.1 10/26/2015 Legal Notice The information in this publication is furnished for information use only, and does not constitute a commitment

More information

Interworks. Interworks Cloud Platform Installation Guide

Interworks. Interworks Cloud Platform Installation Guide Interworks Interworks Cloud Platform Installation Guide Published: March, 2014 This document contains information proprietary to Interworks and its receipt or possession does not convey any rights to reproduce,

More information

LANDesk White Paper. LANDesk Management Suite for Lenovo Secure Managed Client

LANDesk White Paper. LANDesk Management Suite for Lenovo Secure Managed Client LANDesk White Paper LANDesk Management Suite for Lenovo Secure Managed Client Introduction The Lenovo Secure Managed Client (SMC) leverages the speed of modern networks and the reliability of RAID-enabled

More information

Nexio Connectus with Nexio G-Scribe

Nexio Connectus with Nexio G-Scribe Nexio Connectus with Nexio G-Scribe 2.1.2 3/20/2014 Edition: A 2.1.2 Publication Information 2014 Imagine Communications. Proprietary and Confidential. Imagine Communications considers this document and

More information

Backup Exec System Recovery Management Solution 2010 FAQ

Backup Exec System Recovery Management Solution 2010 FAQ Backup Exec System Recovery Management Solution 2010 FAQ Contents Overview... 1 Supported Backup Exec System Recovery Versions and Configurations... 6 Backup Exec System Recovery Management Solution Installation

More information

safend a w a v e s y s t e m s c o m p a n y

safend a w a v e s y s t e m s c o m p a n y safend a w a v e s y s t e m s c o m p a n y SAFEND Data Protection Suite Installation Guide Version 3.4.5 Important Notice This guide is delivered subject to the following conditions and restrictions:

More information

Table of Contents. Introduction...9. Installation...17. Program Tour...31. The Program Components...10 Main Program Features...11

Table of Contents. Introduction...9. Installation...17. Program Tour...31. The Program Components...10 Main Program Features...11 2011 AdRem Software, Inc. This document is written by AdRem Software and represents the views and opinions of AdRem Software regarding its content, as of the date the document was issued. The information

More information

2X SecureRemoteDesktop. Version 1.1

2X SecureRemoteDesktop. Version 1.1 2X SecureRemoteDesktop Version 1.1 Website: www.2x.com Email: info@2x.com Information in this document is subject to change without notice. Companies, names, and data used in examples herein are fictitious

More information

Netwrix Auditor for Windows Server

Netwrix Auditor for Windows Server Netwrix Auditor for Windows Server Quick-Start Guide Version: 7.0 7/7/2015 Legal Notice The information in this publication is furnished for information use only, and does not constitute a commitment from

More information

WhatsUp Gold v16.3 Installation and Configuration Guide

WhatsUp Gold v16.3 Installation and Configuration Guide WhatsUp Gold v16.3 Installation and Configuration Guide Contents Installing and Configuring WhatsUp Gold using WhatsUp Setup Installation Overview... 1 Overview... 1 Security considerations... 2 Standard

More information

Server Consolidation with SQL Server 2008

Server Consolidation with SQL Server 2008 Server Consolidation with SQL Server 2008 White Paper Published: August 2007 Updated: July 2008 Summary: Microsoft SQL Server 2008 supports multiple options for server consolidation, providing organizations

More information

Microsoft SQL Server 2008 R2 Enterprise Edition and Microsoft SharePoint Server 2010

Microsoft SQL Server 2008 R2 Enterprise Edition and Microsoft SharePoint Server 2010 Microsoft SQL Server 2008 R2 Enterprise Edition and Microsoft SharePoint Server 2010 Better Together Writer: Bill Baer, Technical Product Manager, SharePoint Product Group Technical Reviewers: Steve Peschka,

More information

FEATURE COMPARISON BETWEEN WINDOWS SERVER UPDATE SERVICES AND SHAVLIK HFNETCHKPRO

FEATURE COMPARISON BETWEEN WINDOWS SERVER UPDATE SERVICES AND SHAVLIK HFNETCHKPRO FEATURE COMPARISON BETWEEN WINDOWS SERVER UPDATE SERVICES AND SHAVLIK HFNETCHKPRO Copyright 2005 Shavlik Technologies. All rights reserved. No part of this document may be reproduced or retransmitted in

More information

Administration Quick Start

Administration Quick Start www.novell.com/documentation Administration Quick Start ZENworks 11 Support Pack 3 February 2014 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of

More information

Installation Instructions Release Version 15.0 January 30 th, 2011

Installation Instructions Release Version 15.0 January 30 th, 2011 Release Version 15.0 January 30 th, 2011 ARGUS Software: ARGUS Valuation - DCF The contents of this document are considered proprietary by ARGUS Software, the information enclosed and any portion thereof

More information

User Guide. Version R91. English

User Guide. Version R91. English AuthAnvil User Guide Version R91 English August 25, 2015 Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept EULATOS as updated from

More information

efolder BDR for Veeam Cloud Connection Guide

efolder BDR for Veeam Cloud Connection Guide efolder BDR for Veeam Cloud Connection Guide Setup Connect Preload Data uh6 efolder BDR Guide for Veeam Page 1 of 36 INTRODUCTION Thank you for choosing the efolder Cloud for Veeam. Using the efolder Cloud

More information

Troubleshooting File and Printer Sharing in Microsoft Windows XP

Troubleshooting File and Printer Sharing in Microsoft Windows XP Operating System Troubleshooting File and Printer Sharing in Microsoft Windows XP Microsoft Corporation Published: November 2003 Updated: August 2004 Abstract File and printer sharing for Microsoft Windows

More information

Veeam Backup Enterprise Manager. Version 7.0

Veeam Backup Enterprise Manager. Version 7.0 Veeam Backup Enterprise Manager Version 7.0 User Guide August, 2013 2013 Veeam Software. All rights reserved. All trademarks are the property of their respective owners. No part of this publication may

More information

AD Self-Service Suite for Active Directory

AD Self-Service Suite for Active Directory The Dot Net Factory AD Self-Service Suite for Active Directory Version 3.6 The Dot Net Factory, LLC. 2005-2011. All rights reserved. This guide contains proprietary information, which is protected by copyright.

More information

NETWRIX IDENTITY MANAGEMENT SUITE

NETWRIX IDENTITY MANAGEMENT SUITE NETWRIX IDENTITY MANAGEMENT SUITE FEATURES AND REQUIREMENTS Product Version: 3.3 February 2013. Legal Notice The information in this publication is furnished for information use only, and does not constitute

More information

Spector 360 Deployment Guide. Version 7.3 January 3, 2012

Spector 360 Deployment Guide. Version 7.3 January 3, 2012 Spector 360 Deployment Guide Version 7.3 January 3, 2012 Table of Contents Deploy to All Computers... 48 Step 1: Deploy the Servers... 5 Recorder Requirements... 52 Requirements... 5 Control Center Server

More information

www.novell.com/documentation Installation Guide Novell Storage Manager 4.1 for Active Directory September 10, 2015

www.novell.com/documentation Installation Guide Novell Storage Manager 4.1 for Active Directory September 10, 2015 www.novell.com/documentation Installation Guide Novell Storage Manager 4.1 for Active Directory September 10, 2015 Legal Notices Condrey Corporation makes no representations or warranties with respect

More information

AVG 8.5 Anti-Virus Network Edition

AVG 8.5 Anti-Virus Network Edition AVG 8.5 Anti-Virus Network Edition User Manual Document revision 85.2 (23. 4. 2009) Copyright AVG Technologies CZ, s.r.o. All rights reserved. All other trademarks are the property of their respective

More information

Citrix MetaFrame Presentation Server 3.0 and Microsoft Windows Server 2003 Value Add Feature Guide

Citrix MetaFrame Presentation Server 3.0 and Microsoft Windows Server 2003 Value Add Feature Guide Citrix MetaFrame Presentation Server 3.0 and Microsoft Windows Server 2003 Value Add Feature Guide Advanced Functionality Basic Functionality Feature MANAGEMENT Microsoft Management Console Enhanced Connection

More information

Quick Start Guide for Parallels Virtuozzo

Quick Start Guide for Parallels Virtuozzo PROPALMS VDI Version 2.1 Quick Start Guide for Parallels Virtuozzo Rev. 1.1 Published: JULY-2011 1999-2011 Propalms Ltd. All rights reserved. The information contained in this document represents the current

More information

Installing Windows Rights Management Services with Service Pack 2 Step-by- Step Guide

Installing Windows Rights Management Services with Service Pack 2 Step-by- Step Guide Installing Windows Rights Management Services with Service Pack 2 Step-by- Step Guide Microsoft Corporation Published: October 2006 Author: Brian Lich Editor: Carolyn Eller Abstract This step-by-step guide

More information

Veeam Cloud Connect. Version 8.0. Administrator Guide

Veeam Cloud Connect. Version 8.0. Administrator Guide Veeam Cloud Connect Version 8.0 Administrator Guide April, 2015 2015 Veeam Software. All rights reserved. All trademarks are the property of their respective owners. No part of this publication may be

More information

Prepared for: The American Association of State Highway and Transportation Officials. Julian Soh Microsoft Corporation. Julian.Soh@microsoft.

Prepared for: The American Association of State Highway and Transportation Officials. Julian Soh Microsoft Corporation. Julian.Soh@microsoft. Prepared for: The American Association of State Highway and Transportation Officials Julian Soh Microsoft Corporation Julian.Soh@microsoft.com This is a directional view into Windows investments for businesses

More information

Citrix EdgeSight for Load Testing Installation Guide. Citrix EdgeSight for Load Testing 3.8

Citrix EdgeSight for Load Testing Installation Guide. Citrix EdgeSight for Load Testing 3.8 Citrix EdgeSight for Load Testing Installation Guide Citrix EdgeSight for Load Testing 3.8 Copyright Use of the product documented in this guide is subject to your prior acceptance of the End User License

More information

Media Exchange really puts the power in the hands of our creative users, enabling them to collaborate globally regardless of location and file size.

Media Exchange really puts the power in the hands of our creative users, enabling them to collaborate globally regardless of location and file size. Media Exchange really puts the power in the hands of our creative users, enabling them to collaborate globally regardless of location and file size. Content Sharing Made Easy Media Exchange (MX) is a browser-based

More information

Server Installation Guide ZENworks Patch Management 6.4 SP2

Server Installation Guide ZENworks Patch Management 6.4 SP2 Server Installation Guide ZENworks Patch Management 6.4 SP2 02_016N 6.4SP2 Server Installation Guide - 2 - Notices Version Information ZENworks Patch Management Server Installation Guide - ZENworks Patch

More information

GFI Product Manual. Web security, monitoring and Internet access control. Administrator Guide

GFI Product Manual. Web security, monitoring and Internet access control. Administrator Guide GFI Product Manual Web security, monitoring and Internet access control Administrator Guide The information and content in this document is provided for informational purposes only and is provided "as

More information

Backup and Recovery FAQs

Backup and Recovery FAQs May 2013 Page 1 This document answers frequently asked questions regarding the Emerson system Backup and Recovery application. www.deltav.com May 2013 Page 2 Table of Contents Introduction... 6 General

More information

Remote Application Server Version 14. Last updated: 25-02-15

Remote Application Server Version 14. Last updated: 25-02-15 Remote Application Server Version 14 Last updated: 25-02-15 Information in this document is subject to change without notice. Companies, names, and data used in examples herein are fictitious unless otherwise

More information

Remote Access Clients for Windows

Remote Access Clients for Windows Remote Access Clients for Windows E80.60 Release Notes 3 December 2014 Classification: [Protected] 2014 Check Point Software Technologies Ltd. All rights reserved. This product and related documentation

More information

Symantec Workspace Streaming 6.1

Symantec Workspace Streaming 6.1 Workspace Management: Simplify IT Organizations Data Sheet: Endpoint Virtualization Overview As IT organizations today face the reality of managing an increasingly complex mix of desktops, laptops, and

More information

System Planning, Deployment, and Best Practices Guide

System Planning, Deployment, and Best Practices Guide www.novell.com/documentation System Planning, Deployment, and Best Practices Guide ZENworks Application Virtualization 9.0 February 22, 2012 Legal Notices Novell, Inc., makes no representations or warranties

More information

VMware vcenter Update Manager Administration Guide

VMware vcenter Update Manager Administration Guide VMware vcenter Update Manager Administration Guide vcenter Update Manager 4.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced

More information

Education Software Installer 2011

Education Software Installer 2011 Education Software Installer 2011 Windows operating systems System administrator s guide Trademark notice SMART Notebook, SMART Document Camera, SMART Response, SMART Sync, SMART Classroom Suite, Senteo,

More information

092413 2013 Blackbaud, Inc. This publication, or any part thereof, may not be reproduced or transmitted in any form or by any means, electronic, or

092413 2013 Blackbaud, Inc. This publication, or any part thereof, may not be reproduced or transmitted in any form or by any means, electronic, or 7.93 Update Guide 092413 2013 Blackbaud, Inc. This publication, or any part thereof, may not be reproduced or transmitted in any form or by any means, electronic, or mechanical, including photocopying,

More information

Version 3.8. Installation Guide

Version 3.8. Installation Guide Version 3.8 Installation Guide Copyright 2007 Jetro Platforms, Ltd. All rights reserved. This document is being furnished by Jetro Platforms for information purposes only to licensed users of the Jetro

More information

Networking Best Practices Guide. Version 6.5

Networking Best Practices Guide. Version 6.5 Networking Best Practices Guide Version 6.5 Summer 2010 Copyright: 2010, CCH, a Wolters Kluwer business. All rights reserved. Material in this publication may not be reproduced or transmitted in any form

More information

WhatsUp Gold v16.2 Installation and Configuration Guide

WhatsUp Gold v16.2 Installation and Configuration Guide WhatsUp Gold v16.2 Installation and Configuration Guide Contents Installing and Configuring Ipswitch WhatsUp Gold v16.2 using WhatsUp Setup Installing WhatsUp Gold using WhatsUp Setup... 1 Security guidelines

More information

formerly Help Desk Authority 9.1.3 Upgrade Guide

formerly Help Desk Authority 9.1.3 Upgrade Guide formerly Help Desk Authority 9.1.3 Upgrade Guide 2 Contacting Quest Software Email: Mail: Web site: info@quest.com Quest Software, Inc. World Headquarters 5 Polaris Way Aliso Viejo, CA 92656 USA www.quest.com

More information

File Auditor for NAS, Net App Edition

File Auditor for NAS, Net App Edition File Auditor for NAS, Net App Edition Installation Guide Revision 1.2 - July 2015 This guide provides a short introduction to the installation and initial configuration of NTP Software File Auditor for

More information

Microsoft and Citrix: Joint Virtual Desktop Infrastructure (VDI) Offering

Microsoft and Citrix: Joint Virtual Desktop Infrastructure (VDI) Offering Microsoft and Citrix: Joint Virtual Desktop Infrastructure (VDI) Offering Architectural Guidance July 2009 The information contained in this document represents the current view of Microsoft Corporation

More information

File and Printer Sharing with Microsoft Windows

File and Printer Sharing with Microsoft Windows Operating System File and Printer Sharing with Microsoft Windows Microsoft Corporation Published: November 2003 Abstract File and printer sharing in Microsoft Windows allows you to share the contents of

More information

MBAM Self-Help Portals

MBAM Self-Help Portals MBAM Self-Help Portals Authoring a self-help portal workflow for BitLocker Recovery Using Microsoft BitLocker Administration and Monitoring (MBAM) Technical White Paper Published: September 2011 Priyaa

More information

Microsoft Windows Server System White Paper

Microsoft Windows Server System White Paper Introduction to Network Access Protection Microsoft Corporation Published: June 2004, Updated: May 2006 Abstract Network Access Protection, a platform for Microsoft Windows Server "Longhorn" (now in beta

More information

Administrators Help Manual

Administrators Help Manual Administrators Help Manual Lepide Active Directory Self Service Lepide Software Private Limited Page 1 Administrators Help Manual for Active Directory Self-Service Lepide Active Directory Self Service

More information

Getting Started. Symantec Client Security. About Symantec Client Security. How to get started

Getting Started. Symantec Client Security. About Symantec Client Security. How to get started Getting Started Symantec Client Security About Security Security provides scalable, cross-platform firewall, intrusion prevention, and antivirus protection for workstations and antivirus protection for

More information

Hyper-V Protection. User guide

Hyper-V Protection. User guide Hyper-V Protection User guide Contents 1. Hyper-V overview... 2 Documentation... 2 Licensing... 2 Hyper-V requirements... 2 2. Hyper-V protection features... 3 Windows 2012 R1/R2 Hyper-V support... 3 Custom

More information

Server Software Installation Guide

Server Software Installation Guide Server Software Installation Guide This guide provides information on...... The architecture model for GO!Enterprise MDM system setup... Hardware and supporting software requirements for GO!Enterprise

More information

Delphi+ System Requirements

Delphi+ System Requirements Delphi+ System Requirements Revision 1.1 Newmarket International, Inc. October 24, 2013 Delphi+ System Requirements Users Up to 15 Up to 25 Up to 50 Up to 90 Up to 200 Over 200 Minimum 2008 Server Hardware

More information

MOC 10324A: Implementing and Managing Microsoft Desktop Virtualization

MOC 10324A: Implementing and Managing Microsoft Desktop Virtualization MOC 10324A: Implementing and Managing Microsoft Desktop Virtualization Course Overview This course provides students with the knowledge and skills to implement and manage desktop virtualization solutions.

More information

Xcalibur Global Version 1.2 Installation Guide Document Version 3.0

Xcalibur Global Version 1.2 Installation Guide Document Version 3.0 Xcalibur Global Version 1.2 Installation Guide Document Version 3.0 December 2010 COPYRIGHT NOTICE TRADEMARKS 2010 Chip PC Inc., Chip PC (Israel) Ltd., Chip PC (UK) Ltd., Chip PC GmbH All rights reserved.

More information

Step-by-Step Guide to Setup Instant Messaging (IM) Workspace Datasheet

Step-by-Step Guide to Setup Instant Messaging (IM) Workspace Datasheet Step-by-Step Guide to Setup Instant Messaging (IM) Workspace Datasheet CONTENTS Installation System requirements SQL Server setup Setting up user accounts Authentication mode Account options Import from

More information

This Deployment Guide is intended for administrators in charge of planning, implementing and

This Deployment Guide is intended for administrators in charge of planning, implementing and YOUR AUTOMATED EMPLOYEE Foxtrot Deployment Guide Enterprise Edition Introduction This Deployment Guide is intended for administrators in charge of planning, implementing and maintaining the deployment

More information

Deploying System Center 2012 R2 Configuration Manager

Deploying System Center 2012 R2 Configuration Manager Deploying System Center 2012 R2 Configuration Manager This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED, OR STATUTORY, AS TO THE INFORMATION IN THIS DOCUMENT.

More information