Secondly, if your device is running a Microsoft Windows or Macintosh OS X operating system you will also need to:
|
|
|
- Shana Dennis
- 10 years ago
- Views:
Transcription
1 What is Safe Connect and why is it being used? Safe Connect is part of TAMUK's effort to help keep computers on its network as free as possible from viruses, spyware, and operating system security holes. Machines protected in this way generally perform much better and require much less downtime due to damage caused by malicious software. Also, the Safe Connect Policy Key can help to ensure that the average user has the fastest possible browsing experience while connected to the TAMUK network. It does this by ensuring that communication from malicious software does not flood TAMUK s internet connection, resulting in slower connections for legitimate users or by restricting certain applications that would otherwise consume an unfairly large share of the total available bandwidth, again resulting in a slower connection for the majority of users. Safe Connect will require users to authenticate with a username and password before allowing them to access the Texas A&M University Kingsville wireless network. When you authenticate, the system records which network address you were assigned and how long you used it. Your username and password are your keys to the network; don't share them with anyone. You are responsible for all acts performed using your account, including copyright violations. If you are concerned that someone may be able to use your account, change your password immediately. What do I need to do? First and foremost, you must know your TAMUK userid (such as KUABC000 ) and password. Your password should be kept secret. Do not write it down and do not share it with anyone. Secondly, if your device is running a Microsoft Windows or Macintosh OS X operating system you will also need to: have an updated anti-virus application, have updated system patches for Microsoft Operating Systems have the Safe Connect policy key installed and running It is critical that you have only one anti-virus program installed on your computer. Having multiple antivirus programs installed may result in false readings and prevent you from accessing network services. How do I get and install the Safe Connect Policy Key? If your computer is NOT running Microsoft Windows or Macintosh OS X then you do NOT need to download and install the policy key application. On Microsoft Windows Open a web browser. You will be prompted to download the policy key application. When prompted to either run or save the file, click the "Run" button. After the installer downloads it will run. Follow the prompts presented by the installer to proceed through the installation process. You can expect to click an "Install" button to start the installation process and a "Finish" button when the installation has completed successfully. The PolicyKey.exe application will be running as a background process and will start automatically each time you start up your computer.
2 On Macintosh OS X (10.6 & above) Open a web browser. You will be prompted to download the application. Save the Policy Key software to the desktop. If the install process does not begin automatically, double click the ZIP file that was downloaded and the installer should be placed on the desktop. Double click the installer PKG file to begin the installation process. Click "Continue" to advance. On the next screen of the installer, click "Install" to continue. You may be asked to provide your Mac OS X administrator username and password to continue. Once the installation is complete you should get the following "Install Succeeded" message. Click "Close" to finish the installation. On Linux and Other WiFi Compatible Devices Linux machines, iphones, and ipod Touches do not yet have a Safe Connect policy key, but will still be required to authenticate. Nintendo Wii, Microsoft XBox, and Sony PS3 systems should be automatically recognized by Safe Connect and will not be required to authenticate. If your device can connect to WiFi and you are still having difficulty connecting, please contact the itech Help Desk (x4357) for assistance. Do I have to use the Safe Connect Policy Key? Yes. All Microsoft Windows PCs and Macintosh computers are required to use the Safe Connect Policy Key to help ensure a safe computing environment for all users. You can uninstall Safe Connect Policy Key at any time; however within minutes you will then be unable to access the Internet through the campus network. You will be required to reinstall the Policy Key as if you are a new user to gain Internet access. How often do I have to authenticate? Safe Connect requires re-authentication once every 7 days or when the IP address on your computer changes, whichever comes first. On mobile devices and computers that do not have the Policy Key installed (e.g., Linux, iphone), authentication is only required once as long as you use your device on JavNET, JavNET2 or JavNET3 regularly. A period of inactivity over several days will require reauthentication. Are guests required to install the Safe Connect Policy Key? Yes, guests are also required to install the Safe Connect Policy Key in order to obtain network access. Once installed, the Policy Key is clearly listed in Add/Remove Programs (on Windows) and in the Applications folder (on a Macintosh) and can be easily uninstalled when guests leave the TAMUK campus. Guests must also have an Active Directory account created for them by itech Support Services. How do I know the Safe Connect Policy Key is running? On Windows machines, you can right-click any blank space on the task bar at the bottom of your screen and select the option Task Manager. When the Windows Task Manager appears, click the Processes tab and then click on the "Show processes from all users" button in the lower left. Look for the processes SCClient.exe and "scmanager.sys," as both should be present. Mac OS users can open the Activity Monitor located in the Utilities folder. From the Activity Monitor, look for the processes "SafeConnect" and "scmanagerd," both should be present. If you have only recently installed the Macintosh Policy Key, both processes may be called SafeConnect.
3 If these small applications are uninstalled or disabled, the system will disallow network access until the end user re-authenticates and reinstalls SafeConnect, to ensure proper network safeguards are being made at all times. What are the things Safe Connect checks for? The Safe Connect Policy Key continuously validates that your system meets minimum security requirements as per the University s acceptable use policy. Authentication: Required once every 7 days or whenever the IP address on your computer or mobile device changes, whichever comes first. Policy Key: If using Windows or Mac and you do not have policy key installed, you will not be able to access the wireless network. Windows Operating System Updates: Windows update patches are required and you are advised to set the automatic updates to ON for your Windows based devices. Anti-Virus Software Installed and Running: If anti-virus software is not detected as being installed, then you will be quarantined until you install an AV package. Anti-Virus Software Up-to-Date: If anti-virus software is out-of-date, then you will be quarantined until you update the virus definitions for your AV Software. Peer-to-Peer Software - If P2P software is detected running on your device, then you will be quarantined until you remove the P2P Software from your device. Texas A&M Kingsville does provide students and faculty with a free version of McAffee Antivirus software which can be downloaded from our website located at: Which anti-virus software can I use? Safe Connect recognizes many anti-virus programs including: Authentium Avast AV AVG AVG for MAC AVGuard Avira for MAC BitDefender ClamXAV for MAC Comodo Comodo for MAC EZ Antivirus ESET for MAC Faronics F-Secure Fortinet GData iantivirus for MAC Immunet Intego VirusBarrier Kaspersky
4 LanDesk LightSpeed LoLo MacKeeper for MAC McAfee McAfee 45 McAfee NA Microsoft OneCare Microsoft Security Essentials NOD32 Norton for Macintosh Panda Panda for MAC PC Tools Secure IT Sophos Sophos for MAC SpySweeper AV Symantec Personal Symantec Enterprise TrendMicro TrendMicro for MAC Vipre Antivirus Webroot ZoneAlarm AV What if my system is not up-to-date? If your system has been determined not to be up-to-date, a web browser will open and you will be warned of non-compliance. If you require assistance in updating your computer, please call the Help Desk at x4357 or take your device to itech Help Desk in the Library Commons where you will be assisted. What about my privacy? Your privacy is important to us. The Safe Connect Policy Key checks only for the following: DNS Server settings DHCP Settings MAC and IP Address of default gateway IP Address Windows Update settings Whether or not (and which) anti-virus solution is installed Whether or not anti-virus definitions are up-to-date Whether or not an anti-virus program is running Whether or not a P2P file sharing application is running
5 The policy key software application can be easily removed when one departs. This application is not an intrusive one. It can't look at content on a user's computer. Its only purpose is to check for the processes we have configured it to look for such as current anti-virus software and current Microsoft updates, plus known P2P file-sharing programs. Why are P2P file sharing applications monitored? Texas A&M is required to ensure compliance with various federal and state laws in regard to downloads and uploads of copyrighted material. Therefore, computers connected to the Texas A&M University networks are continuously monitored to see whether P2P file sharing applications are installed and/or running. Can you see everything on my computer? No. The Safe Connect software cannot take a snapshot of an entire system and cannot identify all the programs, files or folders on a given computer. How do I uninstall the Safe Connect Policy Key? On Macintosh o Open the Applications folder and locate "SafeConnect.app". Right-click (or Control- Click) on the SafeConnect.app and select "Show Package Contents." Open up the Contents folder, and you'll see the "SCUninstall.app". Run this uninstaller. On Windows XP o Open the Control Panel and choose Add and Remove Programs. Find SafeConnect in the list and choose Uninstall. On Windows 7 o Open the Control Panel and choose Uninstall under the Programs Find SafeConnect in the list and choose Uninstall. Known Issues with Safe Connect I am unable to install the Policy Key on Mac OS X The Safe Connect Policy Key cannot be installed on computers running OS X or below as this platform is no longer supported by Apple. I am unable to install the Policy Key on Windows XP The Safe Connect Policy Key cannot be installed on computers running Win XP as this platform is no longer supported by Microsoft. I can browse for a some time and then I asked to asked to authenticate later. Safe Connect may not catch your computer or mobile device immediately after turning it on. Rather, it may catch your computer or device and ask for authentication after some traffic has passed across the network. If you find yourself unable to continue browsing or using other web services on your mobile device, simply open a browser and authenticate.
6 Troubleshooting Policy Key Problems The date and time MUST be correct on your computer. Many issues can be resolved by making sure that both are correct and stay correct. Windows 7 Problems On Windows 7, User Account Control (UAC) may have prevented the Policy Key from installing correctly. Either or both of these steps may be necessary to install the Policy Key with elevated privileges: Uninstall and Reinstall as Administrator o Open the folder "C:\Program Files\SafeConnect" or "C:\Program Files(x86)\Safeconnect." o Right-click on "uninstall.exe" and choose "Run as Administrator." o Then right-click on the Policy Key installer, "ServiceInstaller.exe", and choose "Run as Administrator." o If this doesn't work, try the steps below. Uninstall and Reinstall with UAC turned off. o o Turn off UAC 1. Click the Start button. 2. Type "UAC" in the search box and hit [Enter]. 3. Move the slider all the way to the bottom. 4. Reboot the computer. Uninstall and reinstall the Policy Key in the usual way. o Re-enable UAC as above, moving the slider back to the previous position. The UAC control panel can also be found by going to Control Panels > UserAccounts > Change User Account Control Settings. The Default setting is one notch lower than Always Notify. Is the Policy Key running? Press Control-Alt-Delete and start the Task Manager Click on the "Processes" tab. Check the box "Show processes from all users" at the bottom left. Click on the "Image Name" column heading to sort. Look for "SCClient.exe" and "scmanager.sys" - Both should be present. A personal firewall is blocking the Policy Key If the policy key is running (see above), a personal firewall may be interfering with it. You may have a firewall installed as part of your antivirus application, particularly likely if it's a "Total Internet Security Suite," or you may have the built-in Windows firewall enabled. Some firewalls will block the Policy Key without notifying you. If you are notified, choose "Allow" for both "SCClient.exe" and "scmanager.sys." We do not recommend you disable the firewall. Instead, add the Policy Key to the firewall's exception list. Both "SCClient.exe" and "scmanager.sys" should be allowed to communicate on all ports. Some firewall programs may also require that the IP addresses and be added as trusted hosts.
7 Here are instructions for the built-in Windows Firewall. Other firewalls will have different steps, but the idea is the same. Open the Windows Firewall Control Panel. Click on "Allow a program or feature through Windows Firewall" If one or both of the Policy Key files above are missing from the list, click on the "Change Settings" button. Next click on the "Allow another program..." button. o Again, if the Policy Key files don't appear in the list, click the "Browse" button. o Navigate to either the "C:\Program Files\SafeConnect" or "C:\Program Files(x86) SafeConnect" folders, as appropriate. o Select the "SCClient.exe" file and click "Open." o Click the Add button. Repeat the "Allow another program" procedure for "scmanager.sys" Click the Public checkboxes for each of these programs, too (Home/Work should already be checked). Click OK to save your changes. Once you've done the above steps, restart your computer. This typically will only come up when the Policy Key is first installed. But the Policy Key periodically updates itself to a newer version, and sometimes a firewall will block the Policy Key again. It's worth checking your firewall settings if you continue being prompted to reinstall the Policy Key. If no personal firewall is found, or if the above steps do not work, it's possible that remnants of a formerly installed security suite are still running, but hidden from view. If your computer has ever had a Symantec (Norton), Trend Micro, or McAfee product installed on it, there is a chance some bits are left behind, even if it no longer shows up in Add and Remove Programs. For assistance in removing these remnants and installing the Policy Key, please contact the itech Help Desk (x4357). An Antivirus application is blocking the Policy Key Have you installed more than one antivirus application? Multiple antivirus programs compete for system resources, slowing your system down, and interfering with each other. We highly recommend you remove all but one antivirus application from your computer. Use the Add and Remove Programs control panel to see what applications may be removed. Look for those from McAfee, Symantec or Norton, or Trend Micro. Sometimes Symantec or another antivirus application can be installed on a trial basis when installing the Acrobat Reader, or Java, and it's easy to miss that "extra gift" when you're updating applications. Check your remaining antivirus program's Quarantine folder for Policy Key files, or the Policy Key installer. Look for "scmanager.sys," "SCClient.exe," scmanager.dll," "SCClient.dll," "SCUpdate.sys," or "ServiceInstaller.exe." If any of these are found in your quarantine, add them to the antivirus allow list and restart your computer. The Policy Key isn't set to run at startup Press Control-Alt-Delete and open the Windows Task Manager. Click on the Processes tab. If you don't see SCClient.exe listed in the running processes, it may not be starting up with Windows.
8 Click on "Start > All Programs > Startup" and look for SafeConnect, with a red, white, and black shield icon. If you don't see it, here's how you add it: Click on start > All Programs. Right click on Startup, and choose Open All Users. If this option is not available, choose Open. Open the Policy Key s install folder. On most Windows machines, look for \Program Files\SafeConnect. On 64 bit Operating Systems, look for \Program Files (x86)\safeconnect. Right click on SCClient.exe and choose Create Shortcut. Drag the new file Shortcut to SCClient.exe to the Startup folder you just opened. Then close the Startup folder. You can test the new configuration by logging off of Windows and logging in again. After you log in, look for SCClient.exe in the Task Manager. How can the Policy Key get left out of the Startup folder? It's possible that an anti-spyware application may have removed the shortcut after the Policy Key was first installed. If so, the next time you run an anti-spyware scan, you should be able to choose not to have the SCClient shortcut removed. Mac OS X is Repeatedly Asking for Policy Key Installation You need a local password to properly install the Policy Key You won't be able to install the Policy Key on a Mac without administrator privileges. When launching the Safe Connect installer, you will be prompted for the username and password of an administrator's account. Even this account can fail to install the Policy Key if it has no password. Set a password for the account and try installing the Policy Key again. Intego VirusBarrier interfering with Safe Connect? VirusBarrier is an incredibly comprehensive security application for the Macintosh. Unfortunately, that also makes it a bit complex. We've identified two ways in which VirusBarrier can interfere with Safe Connect You must configure VirusBarrier after you install it. You need to tell VirusBarrier that Safe Connect is a trusted host. When VirusBarrier is downloaded and first installed, you've only done half the task. Click on the "castle" icon on the menu bar over by the clock. Slide your mouse down over "VirusBarrier X6" and a menu will appear. Select "Open VirusBarrier X6" at the bottom of this menu. Once VirusBarrier opens up, it will ask you several questions on how you want the program to operate on your computer. Follow this process through to the end, and VirusBarrier will be configured and ready to run. We suggest at least one additional step: While you have VirusBarrier open, click on the "Antivandal" button. Click on the "Blocked Addresses" tab and look for or in the 'Intruder' list. If you find either of these addresses, right-click on that address and choose "Switch to Trusted Addresses" list instead. These addresses are used by the SafeConnect system, and if you block them, you can't authenticate. Then, let's make sure both these addresses are in the Trusted Hosts list.
9 Click on the "Trusted Addresses" tab. click on the plus sign in the lower left. o In the Trusted Addresses Editor box that appears, o Enter the address in the Host: box o Duration will default to 'infinity' and Permanent, which is good. o Add a note that this is the SafeConnect box. o Click OK. Do the same for , if you haven't done so already. Are all the pieces of the Policy Key installed correctly? From the Finder, open Applications, and look for SafeConnect. If SafeConnect is missing, look for PolicyKey.If SafeConnect is present, right-click (or Control-click) on it and choose "Show Package Contents." Then open the Contents and MacOS folders. Inside MacOS, please note which of the following files are present: sc.dat scclient scmanagerd uninstall.sh Is the Policy Key running? Next, open Finder > Applications > Utilities > Activity Monitor and choose "Show All Processes" at the top right. You should see two processes named SafeConnect and scmanagerd.
10 If SafeConnect is not present in the Activity Monitor, see below. If scmanagerd is not present, continue with "Is the scmanagerd daemon registered? below. Is the Policy Key set to run at startup? Click on the Apple Menu and choose System Preferences In the System Preferences panel, under "System", click on "Accounts" In the Accounts panel, click on your username to select it, then choose "Login Items" Under "Login Items," "SafeConnect(All Users)" should be present. If it is not present, Click on the Lock to make changes Click on the plus button below the Login Items (not the one below the user list). This will open the file browser. Choose "Application"s from the left panel, and then click on "SafeConnect" in the middle panel.
11 Click on the Add button from the bottom to add. this will bring you back to "Login Items" to verify that SafeConnect is listed. Check the box labeled "Hide" next to "SafeConnect(All Users)." That should do it! Is the scmanagerd daemon registered? Open up a Terminal session and type the following: ls /Library/LaunchDaemons/ This will display the contents of that folder. Look for a file titled "Safe.Connect.plist." If this file is not present, the "scmanagerd" daemon will not run at startup. Try uninstalling and reinstalling the Policy Key once again. If you have further difficulties with the Policy Key, or you feel you need help with these steps, please call the itech Help Desk at 4357 or take your device to the itech Help Desk in the Library Commons for assistance.
Citrix : Remediation - MAC
Citrix : Remediation - MAC Key Points: 1. 2. 3. 4. 5. 6. 7. Understanding End Point Scan Analysis Supported anti-virus and firewall products Configuring AVAST/SOPHOS and the Mac OS X Firewall Installing
Airtel PC Secure Trouble Shooting Guide
Airtel PC Secure Trouble Shooting Guide Table of Contents Questions before installing the software Q: What is required from my PC to be able to use the Airtel PC Secure? Q: Which operating systems does
Remote Access Using The New York Eye & Ear Infirmary of Mount Sinai Secure Web VPN
Remote Access Using The New York Eye & Ear Infirmary of Mount Sinai Secure Web VPN OVERVIEW The New York Eye & Ear Infirmary of Mount Sinai Remote Access (VPN) home page allows remote access to the Infirmary
Follow the instructions below for first-time users only
Whittier Law School Law Library Cisco NAC Agent Wireless Installation Guide For Microsoft Windows In order to access the wireless network on campus, Microsoft Windows laptop users must go through the Cisco
Network Connect Installation and Usage Guide
Network Connect Installation and Usage Guide I. Installing the Network Connect Client..2 II. Launching Network Connect from the Desktop.. 9 III. Launching Network Connect Pre-Windows Login 11 IV. Installing
Security Practices Essentials. Viruses McAfee Virus Software Critical Windows Updates Network Settings. Spyware Adaware Spybot Windows Defender
Security Practices Essentials Viruses McAfee Virus Software Critical Windows Updates Network Settings Spyware Adaware Spybot Windows Defender Security Practices Essentials: All computer passwords should
REMOTELY ACCESS YOUR FILES WITH THE FLAGLER FILECONNECT SYSTEM
REMOTELY ACCESS YOUR FILES WITH THE FLAGLER FILECONNECT SYSTEM This document explains the various ways to connect to your network files and group share data. In addition, staff and full-time faculty are
on-hand viewer on iphone / ipod touch manual installation and configuration of an FTP server for Mac OS X to transfer data to on-hand viewer application on iphone / ipod touch table of contents 1. Introduction
SSL VPN Service. Once you have installed the AnyConnect Secure Mobility Client, this document is available by clicking on the Help icon on the client.
Contents Introduction... 2 Prepare Work PC for Remote Desktop... 4 Add VPN url as a Trusted Site in Internet Explorer... 5 VPN Client Installation... 5 Starting the VPN Application... 6 Connect to Work
Installation Instructions
Avira Secure Backup Installation Instructions Trademarks and Copyright Trademarks Windows is a registered trademark of the Microsoft Corporation in the United States and other countries. All other brand
Aspera Connect User Guide
Aspera Connect User Guide Windows XP/2003/Vista/2008/7 Browser: Firefox 2+, IE 6+ Version 2.3.1 Chapter 1 Chapter 2 Introduction Setting Up 2.1 Installation 2.2 Configure the Network Environment 2.3 Connect
Remote Access - Mac OS X
Remote Access - Mac OS X Overview Sections: Page: Security Precautions to Consider When Connecting Remotely 2 1. Check for Operating System updates 2 2. Install Sophos antivirus 2 3. Check for updates
Technology Services Group Procedures. IH Anywhere guide. 0 P a g e
VDI Pilot Technology Services Group Procedures IH Anywhere guide 0 P a g e Installation Disable Apple Security Table of Contents IH Anywhere for Apple OSX (MAC)... 2 1. Installation... 2 Disable Apple
Additionally, you can run LiveUpdate manually to check for the latest definitions directly from Symantec:
Image not found https://it.ucsf.edu/sites/it.ucsf.edu/themes/custom/it_new/logo.png it.ucsf.edu Published on it.ucsf.edu (https://it.ucsf.edu) Home > SEP for Windows: FAQ SEP for Windows: FAQ vgalvan on
If you are experiencing difficulty joining a session, determine which scenario is applicable to you and follow the recommended guidelines.
Join Help If you are experiencing difficulty joining a session, determine which scenario is applicable to you and follow the recommended guidelines. I can't join a session. If you're having trouble joining
General Questions... 1. Requesting Access... 2. Client Support... 3. Downloading Issues... 4. Installation Issues... 4. Connectivity Issues...
Contents General Questions... 1 Requesting Access... 2 Client Support... 3 Downloading Issues... 4 Installation Issues... 4 Connectivity Issues... 5 Performance Issues... 7 Application Issues... 8 General
The ECU Wireless system uses a captive portal authentication system. There are three steps to configure your computer for wireless access:
ECU WIRELESS SETUP The ECU Wireless system uses a captive portal authentication system. There are three steps to configure your computer for wireless access: 1. Install a wireless network card into your
Fully supported Antivirus software (Managed Antivirus)
You are here: Antivirus > Managed Antivirus Vendors Fully supported Antivirus software (Managed Antivirus) Antivirus (AV) vendors often release software updates. We hard-code the update into our RMM agent
ODOT UAG Tips/Troubleshooting Guide
ODOT UAG Tips/Troubleshooting Guide These helpful tips are provided by ODOT Computer Support to help those using a non-odot PC and running into issues with connecting the UAG/VPN. This is a best-effort
Microsoft Security Essentials Installation and Configuration Guide
Microsoft Security Essentials Installation and Configuration Guide This installation guide is for users who are intending to download the software from Microsoft s web site. If you are not intending on
Sophos Endpoint Security and Control standalone startup guide
Sophos Endpoint Security and Control standalone startup guide Sophos Endpoint Security and Control version 9 Sophos Anti-Virus for Mac OS X, version 7 Document date: October 2009 Contents 1 Before you
How To Use Senior Systems Cloud Services
Senior Systems Cloud Services In this guide... Senior Systems Cloud Services 1 Cloud Services User Guide 2 Working In Your Cloud Environment 3 Cloud Profile Management Tool 6 How To Save Files 8 How To
User Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream
User Manual Onsight Management Suite Version 5.1 Another Innovation by Librestream Doc #: 400075-06 May 2012 Information in this document is subject to change without notice. Reproduction in any manner
Pearl Echo Installation Checklist
Pearl Echo Installation Checklist Use this checklist to enter critical installation and setup information that will be required to install Pearl Echo in your network. For detailed deployment instructions
This manual will help you connect your Microsoft Windows XP, Vista, or 7, or Apple OS X computer to the University of Maryland campus data network.
This manual will help you connect your Microsoft Windows XP, Vista, or 7, or Apple OS X computer to the University of Maryland campus data network. Prerequisites for Network Registration: 1. In order to
Common SofTest Troubleshooting Techniques
Black Screen and Internet Restoration (Windows) On the rare occasion that SofTest Windows experiences an abnormality either during or immediately following an exam, it may not be capable of automatically
Mercy s Remote Access Instructions
Mercy s Remote Access Instructions ~~~~~~~~~~~~~~ Section A Windows 2000 / XP ~~~~~~~~~~~~~~ I. Install Meditech............................... A1 II. Install VPN Client............................. A3
Use this guide if you are no longer able to scan to Sharpdesk. Begin with section 1 (easiest) and complete all sections only if necessary.
Use this guide if you are no longer able to scan to Sharpdesk Instructions: Begin with section 1 (easiest) and complete all sections only if necessary. 1 Section 1 Complete pages 3-5. Scan to the desired
Remote Access Enhancements
Remote Access Enhancements Citrix/Epic Set-up Instructions Provided By: Akron Children s IT Department Date: 7/11/2012 Version: v6 2012 Children s Hospital Medical Center of Akron Table of Contents 1.
Networking in the Colleges
Networking in the Colleges A Guide For Internal & Intensive School Students Contents Appropriate Use and Your Obligations... 1 Virus Protection... 2 Minimum Computer Requirements... 2 Registering Your
Senomix Timesheets for Mac OS X
for Mac OS X Self-Installed Server Installation Guide v5.1 2015 Senomix Software Inc. www.senomix.com Table of Contents 1.0 - Introduction... 1 2.0 - System Overview... 2 3.0 - Timesheets Server Installation
Cyber Security: Software Security and Hard Drive Encryption
Links in this document have been set for a desktop computer with the resolution set to 1920 x 1080 pixels. Cyber Security: Software Security and Hard Drive Encryption 301-1497, Rev A September 2012 Copyright
Sophos Enterprise Console Help. Product version: 5.1 Document date: June 2012
Sophos Enterprise Console Help Product version: 5.1 Document date: June 2012 Contents 1 About Enterprise Console...3 2 Guide to the Enterprise Console interface...4 3 Getting started with Sophos Enterprise
User's Manual. Intego Remote Management Console User's Manual Page 1
User's Manual Intego Remote Management Console User's Manual Page 1 Intego Remote Management Console for Macintosh 2007 Intego, Inc. All Rights Reserved Intego, Inc. www.intego.com This manual was written
Setting up VPN and Remote Desktop for Home Use
Setting up VPN and Remote Desktop for Home Use Contents I. Prepare Your Work Computer... 1 II. Prepare Your Home Computer... 2 III. Run the VPN Client... 3-4 IV. Remote Connect to Your Work Computer...
How to Install Windows 7 software
Connecting Windows 7 to the network This document outlines the procedure for setting up Windows 7 to use the College and University network. It assumes that the computer is set up and working correctly
Internet. User guide
Internet User guide 2014-2015 1 TM Contents 1 2 3 4 5 6 7 8 9 10 11 Setting up your Internet Connecting Ethernet setup Wireless setup Registering Adding a device that has a Web browser Adding a device
Using Spy Sweeper for Windows Author: Jocelyn Kasamoto
WIN1048 February 2009 Using Spy Sweeper for Windows Author: Jocelyn Kasamoto Introduction 1 System Requirements 2 Installation Instructions 2 Post Installation Tasks 3 Running Spy Sweeper 3 Subscription
Hallpass Instructions for Connecting to Mac with a Mac
Hallpass Instructions for Connecting to Mac with a Mac The following instructions explain how to enable screen sharing with your Macintosh computer using another Macintosh computer. Note: You must leave
Troubleshooting Sprint Mobile Broadband USB Modem by Novatel Wireless TM (Ovation TM U727)
Troubleshooting Sprint Mobile Broadband USB Modem by Novatel Wireless TM (Ovation TM U727) If you are unable to resolve your issue using the Troubleshooting steps below, please contact Sprint Customer
XF Extracellular Flux Analyzer. Installation and Troubleshooting Guide
Installation and Troubleshooting Guide February 24, 2014 2 TABLE OF CONTENTS XF Client System and File Requirements 4 Frequently Asked Questions. 4 Installation.. 5 Installing XF Software.. 5 Resolving
User's Manual. Intego VirusBarrier Server 2 / VirusBarrier Mail Gateway 2 User's Manual Page 1
User's Manual Intego VirusBarrier Server 2 / VirusBarrier Mail Gateway 2 User's Manual Page 1 VirusBarrier Server 2 and VirusBarrier Mail Gateway 2 for Macintosh 2008 Intego. All Rights Reserved Intego
Xythos on Demand Quick Start Guide For Xythos Drive
Xythos on Demand Quick Start Guide For Xythos Drive What is Xythos on Demand? Xythos on Demand is not your ordinary online storage or file sharing web site. Instead, it is an enterprise-class document
Citrix Client Install Instructions
Citrix Client Install Instructions If you are using Citrix remotely, Information Technology Services recommends updating Citrix client to the newest version available online. You must be an administrator
Mapping ITS s File Server Folder to Mosaic Windows to Publish a Website
Mapping ITS s File Server Folder to Mosaic Windows to Publish a Website April 16 2012 The following instructions are to show you how to map your Home drive using ITS s Network in order to publish a website
Contents. Hardware Configuration... 27 Uninstalling Shortcuts Black...29
Contents Getting Started...1 Check your Computer meets the Minimum Requirements... 1 Ensure your Computer is Running in Normal Sized Fonts... 7 Ensure your Regional Settings are Correct... 9 Reboot your
AkrutoSync 4.0 User Guide
AKRUTO AkrutoSync 4.0 User Guide Welcome Thank you for choosing AkrutoSync. AkrutoSync can synchronize your Contacts, Calendar and Tasks between Outlook on your computer and your Windows Phone. AkrutoSync
Quickstart Guide. First Edition, Published September 2009. Remote Administrator / NOD32 Antivirus 4 Business Edition
Quickstart Guide First Edition, Published September 2009 Remote Administrator / NOD32 Antivirus 4 Business Edition Contents Getting started...1 Software components...1 Section 1: Purchasing and downloading
Student Desktop@ Home
Student Desktop@ Home Full Off Campus Access to your Programs and Files Full Access to the University from Home You can access the University from any computer with an internet connection. This system
Setting up VPN and Remote Desktop for Home Use
Setting up VPN and Remote Desktop for Home Use Contents I. Prepare Your Work Computer... 1 II. Prepare Your Home Computer... 2 III. Run the VPN Client... 3 IV. Remote Connect to Your Work Computer... 4
WINDOWS 7 & HOMEGROUP
WINDOWS 7 & HOMEGROUP SHARING WITH WINDOWS XP, WINDOWS VISTA & OTHER OPERATING SYSTEMS Abstract The purpose of this white paper is to explain how your computers that are running previous versions of Windows
Table of Contents. Rebit 5 Help
Rebit 5 Help i Rebit 5 Help Table of Contents Getting Started... 1 Making the First Recovery Point... 1 Don't Forget to Create a Recovery Media... 1 Changing Backup Settings... 1 What Does Rebit 5 Do?...
Windows Server 2003 x64 with Symantec AntiVirus 10 Corporate Edition
NC State University 1 of 5 Windows Server 2003 x64 with Symantec AntiVirus 10 Corporate Edition home download free antivirus now windows server 2003 x64 with symantec antivirus 10 corporate edition CAUTION:
Lenovo Online Data Backup User Guide Version 1.8.14
Lenovo Online Data Backup User Guide Version 1.8.14 Contents Chapter 1: Installing Lenovo Online Data Backup...5 Downloading the Lenovo Online Data Backup Client...5 Installing the Lenovo Online Data
Spector 360 Deployment Guide. Version 7.3 January 3, 2012
Spector 360 Deployment Guide Version 7.3 January 3, 2012 Table of Contents Deploy to All Computers... 48 Step 1: Deploy the Servers... 5 Recorder Requirements... 52 Requirements... 5 Control Center Server
How to Connect to UAB s Wireless Networks
How to Connect to UAB s Wireless Networks Sections: Page: Checking Windows XP for Service Pack 3 3 Configuring Windows XP SP3 to Connect to uabwifi-nac: Part I 5 Configuring Windows Vista to Connect to
Symantec AntiVirus Corporate Edition Patch Update
Symantec AntiVirus Corporate Edition Patch Update Symantec AntiVirus Corporate Edition Update Documentation version 10.0.1.1007 Copyright 2005 Symantec Corporation. All rights reserved. Symantec, the Symantec
Sophos Anti-Virus for Mac OS X network startup guide. For networked Macs running Mac OS X
Sophos Anti-Virus for Mac OS X network startup guide For networked Macs running Mac OS X Product version: 7.0 Document date: May 2009 Contents 1 About this guide...3 2 System requirements...4 3 Protecting
MiraCosta College now offers two ways to access your student virtual desktop.
MiraCosta College now offers two ways to access your student virtual desktop. We now feature the new VMware Horizon View HTML access option available from https://view.miracosta.edu. MiraCosta recommends
Charter Business Desktop Security Administrator's Guide
Charter Business Desktop Security Administrator's Guide Table of Contents Chapter 1: Introduction... 4 Chapter 2: Getting Started... 5 Creating a new user... 6 Recovering and changing your password...
Vodafone Text Centre User Guide for Microsoft Outlook
Vodafone Text Centre User Guide for Microsoft Outlook 1 Contents Introduction 1 System requirements 2 Installation 3 The installation guide 3 First use 5 Send a message 8 Select recipient 8 Enter the message
Remote Access User Instructions
Remote Access User Instructions NOTE. Accessing the network remotely requires the installation of a digital certificate on your PC. If you are using a CEOM laptop, a Digital Certificate will be already
Student ANGEL FAQs. General Issues: System Requirements:
Student ANGEL FAQs General Issues: What is ANGEL? How do I log in? What is my username and password? How do I activate my account? I forgot my C number/password, what do I do? I registered after the first
Guide to Using the AK240 MQS Streaming Server. (Macintosh OS X Lion 10.7+ only)
Guide to Using the AK240 MQS Streaming Server (Macintosh OS X Lion 10.7+ only) Installing & Running the MQS Streaming Server: The AK240 can access music files stored on computer on the same network. 1.
Version 5 - July 2015 IT Services Page 2
Version 5 - July 2015 IT Services Page 2 Contents 1. Introduction 4 2. Initial connection 5 3. Network Registration 6 4. Network registration: Scanning your computer (network remediation) 8 5. System check
Safe internet for business use: Getting Started Guide
Safe internet for business use: Getting Started Guide Table of Contents 1. Preface 1 2. Before You Install 2 2.1 Disabling Firewalls 2 2.2 About Accelerators 3 3. About Profiles 4 4. Installation and Initial
IT user guide. Campus WiFi eduroam. September 2015. www.kent.ac.uk/itservices Information Services
IT user guide Campus WiFi eduroam September 2015 www.kent.ac.uk/itservices Information Services Before you get online Hello eduroam! You can pick up the University WiFi service eduroam in all indoor spaces
Disabling Microsoft SharePoint in order to install the OneDrive for Business Client
Disabling Microsoft SharePoint in order to install the OneDrive for Business Client If you try to setup and sync your OneDrive online documents with the client software and Microsoft SharePoint opens,
Remote VPN: Remote access for personal devices
Remote VPN: Remote access for personal devices Documentation Team. March 2013. About Remote VPN Remote VPN 1 provides staff and students with secure, authenticated remote access to personal and shared
1. Open the preferences screen by opening the Mail menu and selecting Preferences...
Using TLS encryption with OS X Mail This guide assumes that you have already created an account in Mail. If you have not, you can use the new account wizard. The new account wizard is in the Accounts window
Galveston College Wireless Network Users Setup Guide Version 1.0
Galveston College Wireless Network Users Setup Guide Version 1.0 TABLE OF CONTENT 1 DOCUMENT CONTROL RECORD... 3 2 ISSUE AND AMENDMENT RECORD... 3 3 GENERAL... 3 3.1 INTRODUCTION...3 3.2 OBJECTIVE... 3
Vodafone PC Backup User Guide Version 1.16
Vodafone PC Backup User Guide Version 1.16 Contents Preface: Preface...v Chapter 1: Overview...7 Chapter 2: Installing Vodafone PC Backup...9 Downloading the Vodafone PC Backup Client...9 Installing the
IIS, FTP Server and Windows
IIS, FTP Server and Windows The Objective: To setup, configure and test FTP server. Requirement: Any version of the Windows 2000 Server. FTP Windows s component. Internet Information Services, IIS. Steps:
HP MediaSmart Server Software Upgrade from v.1 to v.3
HP MediaSmart Server Software Upgrade from v.1 to v.3 Table of Contents Upgrade Your Server Software to HP MediaSmart Server v.3 2 Before You Begin 3 What's New... 3 Features That Will Change... 4 Prepare
Overview... 2. Using the Secure Desktop Agent... 4. Troubleshooting... 10
Overview... 2 Installing... 2 Step 1: Download... 2 Step 2: Install... 2 Step 3: Sign In... 3 Step 4: That's It!... 3 Minimum System Requirements:... 3 Using the Secure Desktop Agent... 4 Accessing & Login
SATO Network Interface Card Configuration Instructions
SATO Network Interface Card Configuration Instructions Table of Contents 1. Reset of wired/wireless interface card... 3 2. Installing the All-In-One Utility (recommended)... 4 3. Configuring wired/wireless
Working Together - Your Apple Mac and Microsoft Windows
Contains information about complex concepts and /or requires technical knowledge to get the most out of the article. Aimed at the more experienced / ambitious ICT manager or accidental techie. Working
RAPID BROADBAND INSTALLATION RAPID BROADBAND SUPPORT CONTACT DETAILS. [email protected] AND TROUBLESHOOTING GUIDE. Email: Tel: 076 6708787
RAPID BROADBAND INSTALLATION AND TROUBLESHOOTING GUIDE RAPID BROADBAND SUPPORT CONTACT DETAILS Email: [email protected] Tel: 076 6708787 January 2008 1 INTERNET CONNECTION TROUBLESHOOTING GUIDE
HWS Virtual Private Network Configuration and Setup Mac OS X 12/19/2006
The VPN connection supports mainly access to the HWS network drives, not streaming audio/video or downloading large amounts of data. Contents Before Connecting via VPN Before setting up a Virtual Private
How to use SURA in three simple steps:
How to use SURA in three simple steps: Most of SURA s functionality can be accessed through these three steps. 1) Download SURA to your computer Go to the SU Downloads page to obtain the SURA utility.
FAQ. How does the new Big Bend Backup (powered by Keepit) work?
FAQ How does the new Big Bend Backup (powered by Keepit) work? Once you establish which of the folders on your hard drive you ll be backing up, you ll log into myaccount.bigbend.net and from your control
Microsoft Windows Installation and Troubleshooting Guide
Remote Access Services Microsoft Windows - Installation and Troubleshooting Guide Version 2.1 February 19, 2013 1 P age TABLE OF CONTENTS 1 MICROSOFT WINDOWS XP INSTALLATION PROCEDURES... 3 2 MICROSOFT
From a Finder window choose Applications (shown circled in red) and then double click the Tether icon (shown circled in green).
From a Finder window choose Applications (shown circled in red) and then double click the Tether icon (shown circled in green). You will be presented with a dialog box asking for you to enter an ad-hoc
Sophos Enterprise Console Help
Sophos Enterprise Console Help Product version: 5.2.1, 5.2.2 Document date: September 2014 Contents 1 About Enterprise Console...6 2 Guide to the Enterprise Console interface...7 2.1 User interface layout...7
Connecting to the Staff Desktop Service
Connecting to the Staff Desktop Service Access your programs and files just like you were in the office Get Setup The first step to use our Remote Connection service is to check that you have the free
Sophos Anti-Virus for NetApp Storage Systems startup guide
Sophos Anti-Virus for NetApp Storage Systems startup guide Runs on Windows 2000 and later Product version: 1 Document date: April 2012 Contents 1 About this guide...3 2 About Sophos Anti-Virus for NetApp
Windows XP with Symantec AntiVirus 10 Corporate Edition
NC State University 1 of 7 Windows XP with Symantec AntiVirus 10 Corporate Edition home download free antivirus now windows xp with symantec antivirus 10 corporate edition Install SAV10 on Windows XP only
Important Notes for WinConnect Server VS Software Installation:
Important Notes for WinConnect Server VS Software Installation: 1. Only Windows Vista Business, Windows Vista Ultimate, Windows 7 Professional, Windows 7 Ultimate, Windows Server 2008 (32-bit & 64-bit),
Cleaning your Windows 7, Windows XP and Macintosh OSX Computers
Cleaning your Windows 7, Windows XP and Macintosh OSX Computers A cleaning of your computer can help your computer run faster and make you more efficient. We have listed some tools and how to use these
Virtual Office Remote Installation Guide
Virtual Office Remote Installation Guide Table of Contents VIRTUAL OFFICE REMOTE INSTALLATION GUIDE... 3 UNIVERSAL PRINTER CONFIGURATION INSTRUCTIONS... 12 CHANGING DEFAULT PRINTERS ON LOCAL SYSTEM...
1. Installation Overview
Quick Install Guide 1. Installation Overview Thank you for selecting Bitdefender Business Solutions to protect your business. This document enables you to quickly get started with the installation of Bitdefender
Intel Unite Solution. Standalone User Guide
Intel Unite Solution Standalone User Guide Legal Disclaimers & Copyrights All information provided here is subject to change without notice. Contact your Intel representative to obtain the latest Intel
How to set up popular firewalls to work with Web CEO
How to set up popular firewalls to work with Web CEO Contents How to set up popular firewalls to work with Web CEO... 1 Setting up Agnitum Outpost Firewall 2.5... 2 Setting up Black ICE 3... 6 Setting
Kaseya 2. Installation guide. Version 7.0. English
Kaseya 2 Kaseya Server Setup Installation guide Version 7.0 English September 4, 2014 Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept
ThinPoint Quick Start Guide
ThinPoint Quick Start Guide 2 ThinPoint Quick Start Guide Table of Contents Part 1 Introduction 3 Part 2 ThinPoint Windows Host Installation 3 1 Compatibility... list 3 2 Pre-requisites... 3 3 Installation...
Steltronic Focus. Main Desk Internet connection
Steltronic Focus Main Desk Steltronic S.p.A. Via Artigianale 34, 25082 Botticino Sera Brescia - Italy Tel: +39 030 2190811 fax: +39 030 2190798 Service: + 39 030 2190830 http: www.steltronic.com Service:
Protected PDF Common Installation Issues
Protected PDF Common Installation Issues July 14, 2011 Version 1.1 TABLE OF CONTENTS Basic Instructions for Readers ------------------------------------------------------------------------- 2 Common Questions
Remote Access Portal (RAP) Installation and User Guide
Remote Access Portal (RAP) Installation and User Guide W:\data02\Helpdesk\Procedures\RAP\RAP Installation Guide 2015.doc Page 1 of 12 1. Introduction 3 2. Support 3 3. Technical Requirements 4 4. First
Setting Up Your Personally- Owned Computer
Setting Up Your Personally- Owned Computer for use with the Kwansei Gakuin University Computer Network On-Campus Wireless LAN Connection for Mac OS X 10.9 (Mavericks) Manual for Mac OS X 10.9 2015.3 Organization
