White Paper. Deploying EUM. SurfControl Web Filter for MS Windows. rev. 1.1, January Enterprise Threat Protection

Size: px
Start display at page:

Download "White Paper. Deploying EUM. SurfControl Web Filter for MS Windows. rev. 1.1, January 2005. Enterprise Threat Protection"

Transcription

1 White Paper Deploying EUM SurfControl Web Filter for MS Windows rev. 1.1, January 2005 Enterprise Threat Protection

2 ..... ACKNOWLEDGEMENTS SurfControl wishes to acknowledge the following people for their contributions to this white paper: Role Technical Contributor Technical Contributor Technical Contributor Editor Author Name Denise Hendsbee Sr. Technical Support Engineer Doug Braemer, Technical Support Engineer Keith Chomentowski, Sr. Systems Engineer Karen Hepner, Technical Writer Shawn Titus, Technical Training Manager NOTICE 2004 SurfControl. All rights reserved. SurfControl, SurfControl Filter, SurfControl Web Filter, Virtual Control Agent, Anti-Spam Agent, Anti-Virus Agent, Virtual Learning Agent, Virtual Image Agent, and the LexiMatch logos are registered trademarks and trademarks of SurfControl plc. All other trademarks are properties of their respective owners. No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise, without the prior permission of the copyright owner.

3 User name resolution..... USER NAME RESOLUTION Web Filter for MS Windows (Web Filter) can monitor users by IP address, workstation name, or user name. The only data available to Web Filter is the information included in the ethernet packet. For example, an HTTP request does not include a user name, but does include the requestor s IP address. In order to resolve the IP address to a user name, Web Filter must access additional network resources. You can always monitor internet access by IP address. However, even if you have static IP addresses for all computers in your network, you ll only be able to identify the machine, not the user. And if your network uses DHCP, you won t be able to easily identify the machine. Web Filter derives workstation names by querying a DNS/WINS server with the requesting IP address, which returns the workstation name. While this is usually 100% effective, the workstation name only identifies the machine where the request originated, not the user who originated the request. Therefore, user name resolution can be a necessity for effectively monitoring internet access. In order for Web Filter to effectively monitor internet access, the web filter must have a reliable method of resolving user names. Without user names, you will have to monitor internet access based on workstation names or IP addresses. User authentication plays a key role in performing reliable user name resolution. Your network infrastructure is the determining factor in deciding which method of user authentication and user name resolution Web Filter can use. This document provides the details necessary to effectively manage user name resolution for Web Filter. Web Filter is not an authentication service. However, the Web Filter interacts with a variety of network authentication services and can use the resolved user names for reporting and monitoring Internet access. Web Filter is a network protocol analyzer and is, therefore, a passive network resource (see Figure 1). Web Filter blocks Internet access through packet spoofing, thereby remaining passive. Since Web Filter is passive, it cannot actively allow or deny network access to a user or ask a user for their credentials. The user communicates directly with the caching device or firewall, not the Web Filter server. Figure 1 Web Filter using pass-by technology rev 1.1 SurfControl Web Filter for MS Windows EUM Deployment White Paper 1

4 ..... Architecture Web Filter includes a free user name resolution utility called EUM (Enterprise User Monitor). EUM interacts with Windows domain controllers (EUM) and Novell environments (NetwareEUM). SurfControl recommends using EUM or Netware EUM for user name resolution. ARCHITECTURE When a user logs onto the network, a domain controller authenticates the user. The EUM UA (User Agent) on the domain controller passes user data (IP address, domain\username, time, and date) to the EUM Handler on the Web Filter server. Figure 2 shows the EUM architecture. Figure 2 EUM architecture Warning: Failure to install EUM onto all domain controllers or NDS servers can compromise the accuracy of user name resolution. If a domain controller is authenticating users, but not passing that data to Web Filter, Internet activity may be stored under the wrong user name. EUM relies on logon data to determine which user is working from which IP address. In short, when a user logs onto the network, their domain name, user name, and workstation name is passed to the authenticating domain controller. Once authenticated, the UA passes the IP address and domain\username to the EUM handler on the Web Filter server. Web Filter caches the data by IP address, which allows Web Filter to track Internet activity by user name, even if the user is simultaneously logged onto multiple computers. Figure 3 shows the basic process used to obtain user data. 2 EUM Deployment White Paper SurfControl Web Filter for MS Windows rev 1.1

5 Architecture..... Figure 3 Data flow rev 1.1 SurfControl Web Filter for MS Windows EUM Deployment White Paper 3

6 ..... Architecture CACHING EUM creates multiple caches: one on each domain controller and one on each Web Filter server. Each domain controller builds a cache containing data for the users it has authenticated. The Web Filter server then builds a master cache that includes all the data from each domain controller. Figure 4 shows EUM caching Figure 4 EUM caching 4 EUM Deployment White Paper SurfControl Web Filter for MS Windows rev 1.1

7 Architecture..... If deniseh accesses the internet from two computers, Web Filter can still accurately identify the user as the requester (see Figure 5) Figure 5 EUM caching: single user, multiple computers If your network requires multiple Web Filter collectors, each collector maintains a master cache of data (see Figure 6) Figure 6 EUM caching in a multiple collector environment rev 1.1 SurfControl Web Filter for MS Windows EUM Deployment White Paper 5

8 ..... Windows EUM Caching on the domain controller The EUM UA on the domain controller or NDS server is responsible for managing a cache for each user the domain controller authenticates. Caching on the Web Filter server The EUM User Handler is responsible for managing a master data cache of all authenticated users within the network. When you stop the Web Filter service, the cache is deleted. The UA continues to write new data to its cache. When you restart the Web Filter service, the UA delivers this cache of user data to the Web Filter server and normal data delivery resumes. Depending on cache size and number of ignored users, there may be a slight delay before the UA can deliver all cached data to the Web Filter server. During this time, Web Filter records and monitors Internet traffic by workstation name or IP address. WINDOWS EUM By accessing Windows NT security auditing data and by integrating with Windows 2000 authentication to resolve user names, EUM gives Web Filter the ability to monitor users by user name in a routed environment. EUM provides Web Filter with continuous, accurate reporting of logon activity. For example, when jsmith attempts to access Web Filter sees jsmith s IP address in the HTTP request. EUM provides the missing link by mapping the IP address to data received the domain controllers regarding jsmith s identity. THE SCUA.INI FILE Web Filter requires an initialization file (scua.ini) on each domain controller. This file contains the following data: [surfcontrol_services] #this list identifies the Web Filter =61695 #collectors by IP address and the port =61695 #used to communicate with Web Filter = = = =61695 [ignored_users] domain\username=1 domain\username2=1 domain\username3=1 #This list identifies the domain #account logon events that UA should #ignore when caching data. This list #does not allow wildcards. \=1 #You must manually add this entry to #the file. This entry indicates that UA #should ignore anonymous logon events. Note: After making changes to the scua.ini file, you must: For NT domain controllers: restart the SurfControl User Agent service. For 2000 domain controllers: you must reboot the domain controller. 6 EUM Deployment White Paper SurfControl Web Filter for MS Windows rev 1.1

9 Windows EUM..... When you auto-install EUM, only one Web Filter server is entered in the scua.ini file. In a multi-collector network, you must manually edit the file and add the additional collectors. POST-INSTALLATION After installation, you must enable user name resolution and check for established connections. Enable user name resolution Once EUM is installed on the domain controller, you must enable EUM User Name Resolution. To enable, double-click the icon in the system tray and launch the SurfControl Web Filter Service Settings dialog. Click the Advanced tab to configure user name resolution. In the User Name Resolution area, select the Enterprise User Monitoring radio button. Apply the changes and click OK. Check for established connections After EUM is installed and enabled, you should check to make sure that there are established connections between Web Filter and the domain controller. From the command line, run the following command: netstat -an find When connections are established, you should see all domain controllers listed with the following format: TCP : :0 LISTENING TCP : :1046 ESTABLISHED TCP : :1059 ESTABLISHED EUM ON NT DOMAIN CONTROLLERS Web Filter installs the EUM agent onto NT domain controllers as a service (SurfControl User Agent service, which uses the ScUserAgent executable). During EUM installation, Web Filter configures NT domain controllers to record Successful Logons to the Security event log (event 528). If you make changes to this audit policy and disable event 528 logs (Successful Logon), EUM will no longer function properly. Confirm that event 528 logs are enabled by performing the following: 1 From the Web Filter server, Start Programs Administrative Tools User Manager for Domains. 2 From the menu, select Policies Audit. Confirm that Audit these Events is checked. 3 Ensure the security logs are set to overwrite as needed. Do not manually clear the security logs. Before installation The automated installation is performed from the Web Filter server. Therefore, prior to installing the EUM UA onto an NT domain controller, ensure the trust relationships are set up for multiple domain environments (in this case, Web Filter is Trusted, all other domains are Trusting). The trust relationships are only required for installation and are not required for EUM to function properly. rev 1.1 SurfControl Web Filter for MS Windows EUM Deployment White Paper 7

10 ..... Windows EUM UA activity The UA service collects information about user logons and passes this data to one or more Web Filter servers (as defined in the scua.ini file). Each UA monitors the Security event log for logon events (generated as people log into the domain). Event log entries map a user to a particular workstation, but only by the workstation name (e.g. jsmith). Therefore, the UA must perform a lookup to find the source IP address. If you stop the UA service on a Windows NT domain controller, the cache is deleted. Web Filter continues to use the locally cached user data for monitoring and reporting purposes. When you restart the UA service, the UA resumes user data delivery to Web Filter and builds a new cache. EUM ON WINDOWS 2000 DOMAIN CONTROLLERS The EUM agent installs onto Windows 2000 domain controllers as a dll (ScSubAuth.dll). When EUM is installed onto a Windows 2000 domain controller, Web Filter uses Microsoft s Sub-Authentication feature to resolve user names. After installing EUM onto a Windows 2000 domain controller, you must reboot the domain controller. Microsoft s Sub-Authentication process The Windows 2000 Operating system uses a Local System Authority (LSA) to authenticate user logons. You can customize standard Windows authentication by using an authentication package. An authentication package is a DLL that s loaded from configuration data stored in the registry. Authentication packages perform security operations and create a login sessions. There are two standard authentication packages included with Windows 2000: MSV1_0 - used for local logons (the winlogon process) and is available on both Windows NT and Kerberos - used for network account logons and is only available on Windows Both authentication packages support subauthentication packages for customizing (replacing or supplementing) standard logon authentication provided by Kerberos or MSV1_0. EUM DLL Web Filter includes an EUM subauthentication package that supplements the standard Windows 2000 authentication on a domain controller. The EUM DLL always runs on the domain controller and works in both mixed and native mode. Every time a user logs in, the authentication package calls the EUM subauthentication DLL. EUM checks the scua.ini file to determine if Web Filter monitors the user. If so, the EUM subauthentication DLL notifies Web Filter of the user name and associated IP address. Post-installation After installation, reboot the domain controller. When the domain controller receives a login request, the EUM DLL is automatically loaded. 8 EUM Deployment White Paper SurfControl Web Filter for MS Windows rev 1.1

11 Windows EUM..... INSTALLING EUM Install EUM from the Web Filter server. During installation, Web Filter installs the EUM UA onto each domain controller. Before installing EUM, confirm the following: The Web Filter server must have a static IP address. The installer must be logged into the Web Filter server as a user with domain administration rights. In order for a successful automated installation, Web Filter must be able to see the domains that require EUM. Make sure the Web Filter is located in the appropriate domain. In a two-way trusted environment, the Web Filter server can be located in any domain. If a one-way model is in use, the Web Filter server should be located in the master domain (this allows Web Filter to see all other domains). For Windows NT domain controllers, make sure the security logs of all domain controllers are set to overwrite events as needed. By default, EUM uses port to communicate with the Web Filter server. SurfControl recommends installing EUM when there are few or no users on the network or when a forced logoff can be scheduled. Note: Ignoring valid user accounts can result in mis-identification of users. During installation, you ll be prompted to identify specific user accounts that the UA should ignore; you should only use the ignore option for accounts similar to SMS. rev 1.1 SurfControl Web Filter for MS Windows EUM Deployment White Paper 9

12 ..... Windows EUM Procedure 1: Installing EUM Step Action 1 Make sure that the Web Filter server has a static IP address. 2 Make sure you have administrative privileges on all domain controllers where the User Agent will be installed. 3 Make sure the Web Filter server is located in the correct domain. 4 Make sure the firewall or router allows traffic through the provisioned port (default is 61695). 5 For Windows NT domain controllers, make sure the security logs of the domain controllers are set to overwrite events, as needed. 6 Try to perform this procedure when there are few or no users on the network, or when a forced logoff can be scheduled. This ensure the fastest, most accurate detection of users. Begin Installation 7 From the Start menu, launch EUM installation (Start Programs SurfControl Web Filter Enterprise User Monitoring Install Enterprise User Monitoring). SurfControl Enterprise User Monitoring Installation screen 8 Click the Next button to start the installation. Hostname screen 9 Enter the IP address of the Web Filter server. Note: SurfControl recommends entering the IP address instead of the hostname. 10 Enter the port the User Agent and Web Filter service should use to communicate (default is 61695). 11 Click Next to continue. Domain List screen 12 Select the domains you want to receive user data from. 13 Click Next to continue. (Sheet 1 of 2) 10 EUM Deployment White Paper SurfControl Web Filter for MS Windows rev 1.1

13 Windows EUM..... Procedure 1: Installing EUM Step Action Ignore User Accounts screen 14 Select the user accounts whose logon/logoffs do not need to be reported to Web Filter (ie, SMS accounts). 15 Click Next to continue. Ignore User Accounts screen 16 Select the domain controllers whose user s logon/logoff activity Web Filter needs to monitor (this identifies the domain controllers where the UA will be installed). Note: Failure to install EUM on all domain controllers can compromise the accuracy of user name resolution. If a domain controller is authenticating users, but not passing that data to Web Filter, user activity may be recorded under another user name. 17 Click Next to continue. 18 If you installed EUM on a Windows 2000 domain controller, you must reboot the domain controller; SurfControl recommends performing a manual reboot. Enable EUM User Name Resolution 19 Once EUM is installed on the domain controller, you must enable EUM User Name Resolution. 20 Double-click the icon in the system tray and launch the SurfControl Web Filter Service Settings dialog. 21 Click the Advanced tab to configure user name resolution. 22 In the User Name Resolution area, select the Enterprise User Monitoring radio button. Apply the changes and click OK. Check for Established Connections 23 From the command line, run the following command: > netstat -an find When connections are established, you should see ALL domain controllers listed in the following format: TCP : :0 LISTENING TCP : :1046 ESTABLISHED TCP : :1059 ESTABLISHED 25 You have successfully installed Enterprise User Monitoring. (Sheet 2 of 2) rev 1.1 SurfControl Web Filter for MS Windows EUM Deployment White Paper 11

14 ..... NetwareEUM NETWAREEUM SurfControl also provides the ability to monitor users by their Novell Netware user name. The Novell version of EUM is called NetwareEUM. NetwareEUM works in the same way as EUM. Web Filter installs a User Agent onto each Novell NDS Tree Server. Before installing NetwareEUM, confirm the following: Before installing Web Filter, install Netware s Client 32 (as Preferred TCP/IP Protocol) onto the server. Web Filter prompts for the name of the Netware Tree during installation. If you were not prompted, Web Filter will not see Netware users. The network must be using Novell 5 or 6 over IP; Web Filter does not support Novell 4.x. If you need to resolve Novell4.x users, authenticate all users on an Windows NT/2000 domain controller and use EUM to resolve the user names. The Web Filter server must have a static IP address. By default, NetwareEUM uses port to communicate with the Web Filter server. SurfControl recommends installing NetwareEUM when there are few or no users on the network or when a forced logoff can be scheduled. In order for Web Filter to receive accurate information, users must authenticate using TCP/IP and not IPx. POST-INSTALLATION After installation, you must enable user name resolution and check for established connections. Enable user name resolution Once EUM is installed on the Novell NDS Tree server, you must enable EUM User Name Resolution. To enable, double-click the icon in the system tray and launch the SurfControl Web Filter Service Settings dialog. Click the Advanced tab to configure user name resolution. In the User Name Resolution area, select the Enterprise User Monitoring radio button. Apply the changes and click OK. Check for established connections After EUM is installed and enabled, you should check to make sure that there are established connections between Web Filter and the NDS server. From the command line, run the following command: netstat -an find When connections are established, you should see all NDS servers listed with the following format: TCP : :0 LISTENING TCP : :1046 ESTABLISHED TCP : :1059 ESTABLISHED 12 EUM Deployment White Paper SurfControl Web Filter for MS Windows rev 1.1

15 NetwareEUM..... THE SCUA.INI FILE Web Filter requires an initialization file (scua.ini) on each domain controller. The NetwareEUM file differs from the EUM file. Here is an example: After making changes to the scua.ini file, you must unload and reload the NLM. [surfcontrol_services] #This list identifies the Web Filter =61696 #collectors by IP address and the port =61696 #used to communicate with Web Filter =61696 # =61696 #This is a commonly used list. [allowed_users] user1=admin.nw_5_1_surf user2=tester.acct.nw_5_1_surf [ignored_users] user1=zenworks.nw_5_1_surf [ignored_usernames_containing] string1=admin string2=host [ignored_usernames_ending_with] string1=nw_6_surf [ignored_usernames_beginning_with] string1=zenworks [nw_eum_agent] logging=1 #This list identifies explicitly allowed #users. Use the following format: #unique_user_key= #fully_qualified_username_in_the_nds_tree #This list identifies the domain #account logon events that NLM should #ignore when caching data. This list #does not allow wildcards. Ensure you include #Zenworks ids. #Use this list to ignore user names that #contain one of the specified strings. Each #string must be unique. #This is a commonly used list. #Use this list to ignore user names that #end with one of the specified strings. #Use this list to ignore user names that #begin with one of the specified strings. #Set the logging level here: #0 Disable logging #1 Important events like start, stop, connection stat #2 User logon events, ignored users #3 Combining effect of 1and 2 # #This is a commonly used list. rev 1.1 SurfControl Web Filter for MS Windows EUM Deployment White Paper 13

16 ..... NetwareEUM Procedure 2: Install NLM Step Action 1 Ensure Novell Client 32 was installed on the Web Filter server prior to Web Filter installation. 2 From Web Filter server, log on to the Novell server with administrative rights. 3 Go to the SYS volume and create a directory (for example, nweum) Note: When creating the directory, use DOS8.3 naming conventions. 4 Under this directory, copy the files nweum.nlm and scua.ini from the Web Filter server to the Novell server. 5 From the Netware Server console, load the NLM by typing: Load sys:\nweum\nweum.nlm and pressing enter Note: The system will not allow you to load the NLM if a copy is already running. Procedure 3: Automatically loading NLM Step Action 1 To automatically load the NLM every time the server is rebooted edit the sys:\system\autoexec.ncf file. 2 You can edit this file using any text editor from the workstation or from the Netware Server by typing: Load edit sys:\system\autoexec.ncf 3 Add the following line at the end of the file: load sys:\nweum\nweum.nlm 4 Save the file. Procedure 4: Unloading NLM Step Action 1 From the Netware Server console, type: unload nweum.nlm 14 EUM Deployment White Paper SurfControl Web Filter for MS Windows rev 1.1

17 NetwareEUM..... Procedure 5: Editing the Initialization file Step Action 1 If you plan to add additional Web Filter servers to your network, you ll need to edit the initialization file. NLM reads the initialization file (scua.ini) at startup; therefore, you must unload NLM before any new settings take affect. 2 Unload the NLM 3 Add the new servers to the surfcontrol_services section of the scua.ini file. The format of each entry in this section is: Note: 4 Reload the NLM. Hostname_or_IP_Address=Port number The default port number is because is used by Windows EUM. Procedure 6: Post-installation steps Step Action Enable EUM User Name Resolution 1 Once EUM is installed on the domain controller, you must enable EUM User Name Resolution. 2 Double-click the icon in the system tray and launch the SurfControl Web Filter Service Settings dialog. 3 Click the Advanced tab to configure user name resolution. 4 In the User Name Resolution area, select the Enterprise User Monitoring radio button. Apply the changes and click OK. Check for Established Connections 5 From the command line, run the following command: > netstat -an find When connections are established, you should see ALL domain controllers listed in the following format: TCP : :0 LISTENING TCP : :1046 ESTABLISHED TCP : :1059 ESTABLISHED rev 1.1 SurfControl Web Filter for MS Windows EUM Deployment White Paper 15

18 ..... Acronyms Logging The log file surflog.txt is created in the same directory as that which holds scua.ini and nweum.nlm. The logging settings are shown in Table 1. Table 1 Logging Value Detail logged 0 N logging 1 Important events - Startup, Shutdown, Errors, connections with Web Filter installations, Connection failure, Disconnects, etc. 2 Login events 3 Cumulative effect of setting the logging level to 1 as well as 2 Setting NLM to ignore certain users NetwareEUM informs Web Filter of Netware servers logging into other Netware servers, as well as informing Web Filter of user logging data. These events are written to the log file when the logging level is set to 2. This means that the size of the cache increases at both the Netware server and the Web Filter server. Therefore, SurfControl recommends that you include all Netware Server objects in the Ignored User list. Enter users you want NetwareEUM to ignore into the Ignored User list of the scua.ini file (C:\Program Files\Surfcontrol\Web Filter\Netware\scua.ini). Use the following format: user1=tester.accounting.nw_5_1_surf user2=admin.nw_5_1_surf ACRONYMS The following table defines the acronyms used in this document: Acronym EUM NDS NetwareEUM NLM SMS UA Definition Enterprise User Monitoring (for Windows) Netware Directory Service Enterprise User Monitoring (for Novell) Netware Loadable Module System Management Server User Agent 16 EUM Deployment White Paper SurfControl Web Filter for MS Windows rev 1.1

Version 5.5. SurfControl Web Filter Starter Guide

Version 5.5. SurfControl Web Filter Starter Guide Version 5.5 SurfControl Web Filter Starter Guide Notices NOTICES 1996 2008, Websense Inc. All rights reserved. 10240 Sorrento Valley Rd., San Diego, CA 92121, USA Published January 2008 This document may

More information

User Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream

User Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream User Manual Onsight Management Suite Version 5.1 Another Innovation by Librestream Doc #: 400075-06 May 2012 Information in this document is subject to change without notice. Reproduction in any manner

More information

pcanywhere Advanced Configuration Guide

pcanywhere Advanced Configuration Guide Introduction The pcanywhere Solution Advanced Configuration Guide is provided to assist customers with advanced features once they have the Symantec Management Platform with pcanywhere Solution installed.

More information

DC Agent Troubleshooting

DC Agent Troubleshooting DC Agent Troubleshooting Topic 50320 DC Agent Troubleshooting Web Security Solutions v7.7.x, 7.8.x 27-Mar-2013 This collection includes the following articles to help you troubleshoot DC Agent installation

More information

Integrating LANGuardian with Active Directory

Integrating LANGuardian with Active Directory Integrating LANGuardian with Active Directory 01 February 2012 This document describes how to integrate LANGuardian with Microsoft Windows Server and Active Directory. Overview With the optional Identity

More information

Using Logon Agent for Transparent User Identification

Using Logon Agent for Transparent User Identification Using Logon Agent for Transparent User Identification Websense Logon Agent (also called Authentication Server) identifies users in real time, as they log on to domains. Logon Agent works with the Websense

More information

Installation Notes for Outpost Network Security (ONS) version 3.2

Installation Notes for Outpost Network Security (ONS) version 3.2 Outpost Network Security Installation Notes version 3.2 Page 1 Installation Notes for Outpost Network Security (ONS) version 3.2 Contents Installation Notes for Outpost Network Security (ONS) version 3.2...

More information

Configuring IBM Cognos Controller 8 to use Single Sign- On

Configuring IBM Cognos Controller 8 to use Single Sign- On Guideline Configuring IBM Cognos Controller 8 to use Single Sign- On Product(s): IBM Cognos Controller 8.2 Area of Interest: Security Configuring IBM Cognos Controller 8 to use Single Sign-On 2 Copyright

More information

Sophos for Microsoft SharePoint startup guide

Sophos for Microsoft SharePoint startup guide Sophos for Microsoft SharePoint startup guide Product version: 2.0 Document date: March 2011 Contents 1 About this guide...3 2 About Sophos for Microsoft SharePoint...3 3 System requirements...3 4 Planning

More information

Best Practices & Deployment SurfControl Mobile Filter v 5.0.2.60

Best Practices & Deployment SurfControl Mobile Filter v 5.0.2.60 Best Practices & Deployment SurfControl Mobile Filter v 5.0.2.60 rev2.1, January 2006 Pre-Installation Guide Notice 2006 SurfControl. All rights reserved. SurfControl, SurfControl E-mail Filter, SurfControl

More information

enicq 5 System Administrator s Guide

enicq 5 System Administrator s Guide Vermont Oxford Network enicq 5 Documentation enicq 5 System Administrator s Guide Release 2.0 Published November 2014 2014 Vermont Oxford Network. All Rights Reserved. enicq 5 System Administrator s Guide

More information

Web Filter. SurfControl Web Filter 5.0 Installation Guide. www.surfcontrol.com. The World s #1 Web & E-mail Filtering Company

Web Filter. SurfControl Web Filter 5.0 Installation Guide. www.surfcontrol.com. The World s #1 Web & E-mail Filtering Company Web Filter SurfControl Web Filter 5.0 Installation Guide www.surfcontrol.com The World s #1 Web & E-mail Filtering Company NOTICES NOTICES Copyright 2005 SurfControl plc. All rights reserved. No part

More information

Using DC Agent for Transparent User Identification

Using DC Agent for Transparent User Identification Using DC Agent for Transparent User Identification Using DC Agent Web Security Solutions v7.7, 7.8 If your organization uses Microsoft Windows Active Directory, you can use Websense DC Agent to identify

More information

How To - Implement Clientless Single Sign On Authentication in Single Active Directory Domain Controller Environment

How To - Implement Clientless Single Sign On Authentication in Single Active Directory Domain Controller Environment How To - Implement Clientless Single Sign On Authentication in Single Active Directory Domain Controller Environment How To - Implement Clientless Single Sign On Authentication with Active Directory Applicable

More information

CentreWare Internet Services Setup and User Guide. Version 2.0

CentreWare Internet Services Setup and User Guide. Version 2.0 CentreWare Internet Services Setup and User Guide Version 2.0 Xerox Corporation Copyright 1999 by Xerox Corporation. All rights reserved. XEROX, The Document Company, the digital X logo, CentreWare, and

More information

NETASQ SSO Agent Installation and deployment

NETASQ SSO Agent Installation and deployment NETASQ SSO Agent Installation and deployment Document version: 1.3 Reference: naentno_sso_agent Page 1 / 20 Copyright NETASQ 2013 General information 3 Principle 3 Requirements 3 Active Directory user

More information

Using RADIUS Agent for Transparent User Identification

Using RADIUS Agent for Transparent User Identification Using RADIUS Agent for Transparent User Identification Using RADIUS Agent Web Security Solutions Version 7.7, 7.8 Websense RADIUS Agent works together with the RADIUS server and RADIUS clients in your

More information

How To - Implement Clientless Single Sign On Authentication with Active Directory

How To - Implement Clientless Single Sign On Authentication with Active Directory How To Implement Clientless Single Sign On in Single Active Directory Domain Controller Environment How To - Implement Clientless Single Sign On Authentication with Active Directory Applicable Version:

More information

2X ApplicationServer & LoadBalancer Manual

2X ApplicationServer & LoadBalancer Manual 2X ApplicationServer & LoadBalancer Manual 2X ApplicationServer & LoadBalancer Contents 1 URL: www.2x.com E-mail: info@2x.com Information in this document is subject to change without notice. Companies,

More information

For Active Directory Installation Guide

For Active Directory Installation Guide For Active Directory Installation Guide Version 2.5.2 April 2010 Copyright 2010 Legal Notices makes no representations or warranties with respect to the contents or use of this documentation, and specifically

More information

StarWind iscsi SAN & NAS: Configuring HA Storage for Hyper-V October 2012

StarWind iscsi SAN & NAS: Configuring HA Storage for Hyper-V October 2012 StarWind iscsi SAN & NAS: Configuring HA Storage for Hyper-V October 2012 TRADEMARKS StarWind, StarWind Software and the StarWind and the StarWind Software logos are trademarks of StarWind Software which

More information

Agent Configuration Guide

Agent Configuration Guide SafeNet Authentication Service Agent Configuration Guide SAS Agent for Microsoft Internet Information Services (IIS) Technical Manual Template Release 1.0, PN: 000-000000-000, Rev. A, March 2013, Copyright

More information

XyLoc Security Server w/ AD Integration (XSS-AD 5.x.x) Administrator's Guide

XyLoc Security Server w/ AD Integration (XSS-AD 5.x.x) Administrator's Guide XyLoc Security Server w/ AD Integration (XSS-AD 5.x.x) Administrator's Guide Contacting Ensure Technologies Email: support@ensuretech.com Phone: (734) 547-1600 Home Office: Ensure Technologies 135 S Prospect

More information

Sophos Anti-Virus for NetApp Storage Systems startup guide

Sophos Anti-Virus for NetApp Storage Systems startup guide Sophos Anti-Virus for NetApp Storage Systems startup guide Runs on Windows 2000 and later Product version: 1 Document date: April 2012 Contents 1 About this guide...3 2 About Sophos Anti-Virus for NetApp

More information

StarWind iscsi SAN Software: Challenge-Handshake Authentication Protocol (CHAP) for Authentication of Users

StarWind iscsi SAN Software: Challenge-Handshake Authentication Protocol (CHAP) for Authentication of Users StarWind iscsi SAN Software: Challenge-Handshake Authentication Protocol (CHAP) for Authentication of Users www.starwindsoftware.com Copyright 2008-2011. All rights reserved. COPYRIGHT Copyright 2008-2011.

More information

Transparent Identification of Users

Transparent Identification of Users Transparent Identification of Users Websense Web Security Solutions v7.5, v7.6 Transparent Identification of Users 1996 2011, Websense, Inc. All rights reserved. 10240 Sorrento Valley Rd., San Diego, CA

More information

How To Manage Storage With Novell Storage Manager 3.X For Active Directory

How To Manage Storage With Novell Storage Manager 3.X For Active Directory www.novell.com/documentation Installation Guide Novell Storage Manager 4.1 for Active Directory September 10, 2015 Legal Notices Condrey Corporation makes no representations or warranties with respect

More information

WhatsUp Event Alarm v10.x Listener Console User Guide

WhatsUp Event Alarm v10.x Listener Console User Guide WhatsUp Event Alarm v10.x Listener Console User Guide Contents WhatsUp Event Alarm Listener Console Overview Firewall Considerations... 6 Using the WhatsUp Event Alarm Listener Console... 7 Event Alarm

More information

Configuring Security Features of Session Recording

Configuring Security Features of Session Recording Configuring Security Features of Session Recording Summary This article provides information about the security features of Citrix Session Recording and outlines the process of configuring Session Recording

More information

Configuration Guide. SafeNet Authentication Service. SAS Agent for Microsoft Internet Information Services (IIS)

Configuration Guide. SafeNet Authentication Service. SAS Agent for Microsoft Internet Information Services (IIS) SafeNet Authentication Service Configuration Guide Technical Manual Template Release 1.0, PN: 000-000000-000, Rev. A, March 2013, Copyright 2013 SafeNet, Inc. All rights reserved. 1 Document Information

More information

LANDESK Service Desk. Desktop Manager

LANDESK Service Desk. Desktop Manager LANDESK Service Desk Desktop Manager LANDESK SERVICE DESK DESKTOP MANAGER GUIDE This document contains information, which is the confidential information and/or proprietary property of LANDESK Software,

More information

How to Configure Terminal Services for Pro-Watch in Remote Administration Mode (Windows 2000)

How to Configure Terminal Services for Pro-Watch in Remote Administration Mode (Windows 2000) How to Configure Terminal Services for Pro-Watch in Remote Administration Mode (Windows 2000) This instruction guide describes how to configure Terminal Services in Windows 2000 Server for Remote Administration

More information

Outpost Network Security

Outpost Network Security Administrator Guide Reference Outpost Network Security Office Firewall Software from Agnitum Abstract This document provides information on deploying Outpost Network Security in a corporate network. It

More information

StarWind iscsi SAN & NAS: Configuring HA Shared Storage for Scale- Out File Servers in Windows Server 2012 January 2013

StarWind iscsi SAN & NAS: Configuring HA Shared Storage for Scale- Out File Servers in Windows Server 2012 January 2013 StarWind iscsi SAN & NAS: Configuring HA Shared Storage for Scale- Out File Servers in Windows Server 2012 January 2013 TRADEMARKS StarWind, StarWind Software and the StarWind and the StarWind Software

More information

HP Device Manager 4.6

HP Device Manager 4.6 Technical white paper HP Device Manager 4.6 Installation and Update Guide Table of contents Overview... 3 HPDM Server preparation... 3 FTP server configuration... 3 Windows Firewall settings... 3 Firewall

More information

Dell SupportAssist Version 2.0 for Dell OpenManage Essentials Quick Start Guide

Dell SupportAssist Version 2.0 for Dell OpenManage Essentials Quick Start Guide Dell SupportAssist Version 2.0 for Dell OpenManage Essentials Quick Start Guide Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your computer.

More information

Network Scanner Tool R3.1. User s Guide Version 3.0.04

Network Scanner Tool R3.1. User s Guide Version 3.0.04 Network Scanner Tool R3.1 User s Guide Version 3.0.04 Copyright 2000-2004 by Sharp Corporation. All rights reserved. Reproduction, adaptation or translation without prior written permission is prohibited,

More information

StarWind iscsi SAN & NAS: Configuring HA File Server on Windows Server 2012 for SMB NAS January 2013

StarWind iscsi SAN & NAS: Configuring HA File Server on Windows Server 2012 for SMB NAS January 2013 StarWind iscsi SAN & NAS: Configuring HA File Server on Windows Server 2012 for SMB NAS January 2013 TRADEMARKS StarWind, StarWind Software and the StarWind and the StarWind Software logos are trademarks

More information

Kepware Technologies Remote OPC DA Quick Start Guide (DCOM)

Kepware Technologies Remote OPC DA Quick Start Guide (DCOM) Kepware Technologies Remote OPC DA Quick Start Guide (DCOM) March, 2013 Ref. 03.10 Kepware Technologies Table of Contents 1. Overview... 1 1.1 What is DCOM?... 1 1.2 What is OPCEnum?... 1 2. Users and

More information

Setup and Configuration Guide for Pathways Mobile Estimating

Setup and Configuration Guide for Pathways Mobile Estimating Setup and Configuration Guide for Pathways Mobile Estimating Setup and Configuration Guide for Pathways Mobile Estimating Copyright 2008 by CCC Information Services Inc. All rights reserved. No part of

More information

Getting started. Symantec AntiVirus Corporate Edition 8.1 for Workstations and Network Servers

Getting started. Symantec AntiVirus Corporate Edition 8.1 for Workstations and Network Servers Getting started Symantec AntiVirus Corporate Edition 8.1 for Workstations and Network Servers Copyright 2003 Symantec Corporation. All rights reserved. Printed in the U.S.A. 03/03 Symantec and the Symantec

More information

Deploying Windows Streaming Media Servers NLB Cluster and metasan

Deploying Windows Streaming Media Servers NLB Cluster and metasan Deploying Windows Streaming Media Servers NLB Cluster and metasan Introduction...................................................... 2 Objectives.......................................................

More information

2X ApplicationServer & LoadBalancer Manual

2X ApplicationServer & LoadBalancer Manual 2X ApplicationServer & LoadBalancer Manual 2X ApplicationServer & LoadBalancer Contents 1 URL: www.2x.com E-mail: info@2x.com Information in this document is subject to change without notice. Companies,

More information

User Source and Authentication Reference

User Source and Authentication Reference User Source and Authentication Reference ZENworks 11 www.novell.com/documentation Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of this documentation,

More information

Nexio Connectus with Nexio G-Scribe

Nexio Connectus with Nexio G-Scribe Nexio Connectus with Nexio G-Scribe 2.1.2 3/20/2014 Edition: A 2.1.2 Publication Information 2014 Imagine Communications. Proprietary and Confidential. Imagine Communications considers this document and

More information

Getting Started. Symantec Client Security. About Symantec Client Security. How to get started

Getting Started. Symantec Client Security. About Symantec Client Security. How to get started Getting Started Symantec Client Security About Security Security provides scalable, cross-platform firewall, intrusion prevention, and antivirus protection for workstations and antivirus protection for

More information

RSA Security Analytics

RSA Security Analytics RSA Security Analytics Event Source Log Configuration Guide Microsoft Windows using Eventing Collection Last Modified: Thursday, July 30, 2015 Event Source Product Information: Vendor: Microsoft Event

More information

REQUIREMENTS AND INSTALLATION OF THE NEFSIS DEDICATED SERVER

REQUIREMENTS AND INSTALLATION OF THE NEFSIS DEDICATED SERVER NEFSIS TRAINING SERIES Nefsis Dedicated Server version 5.1.0.XXX Requirements and Implementation Guide (Rev 4-10209) REQUIREMENTS AND INSTALLATION OF THE NEFSIS DEDICATED SERVER Nefsis Training Series

More information

Step-by-Step Guide to Setup Instant Messaging (IM) Workspace Datasheet

Step-by-Step Guide to Setup Instant Messaging (IM) Workspace Datasheet Step-by-Step Guide to Setup Instant Messaging (IM) Workspace Datasheet CONTENTS Installation System requirements SQL Server setup Setting up user accounts Authentication mode Account options Import from

More information

Device LinkUP + Desktop LP Guide RDP

Device LinkUP + Desktop LP Guide RDP Device LinkUP + Desktop LP Guide RDP Version 2.1 January 2016 Copyright 2015 iwebgate. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval

More information

NetSpective Logon Agent Guide for NetAuditor

NetSpective Logon Agent Guide for NetAuditor NetSpective Logon Agent Guide for NetAuditor The NetSpective Logon Agent The NetSpective Logon Agent is a simple application that runs on client machines on your network to inform NetSpective (and/or NetAuditor)

More information

Virtual Web Appliance Setup Guide

Virtual Web Appliance Setup Guide Virtual Web Appliance Setup Guide 2 Sophos Installing a Virtual Appliance Installing a Virtual Appliance This guide describes the procedures for installing a Virtual Web Appliance. If you are installing

More information

Remote Console Installation & Setup Guide. November 2009

Remote Console Installation & Setup Guide. November 2009 Remote Console Installation & Setup Guide November 2009 Legal Information All rights reserved. No part of this document shall be reproduced or transmitted by any means or otherwise, without written permission

More information

Installation Guide Supplement

Installation Guide Supplement Installation Guide Supplement for use with Microsoft ISA Server and Forefront TMG Websense Web Security Websense Web Filter v7.5 1996 2010, Websense Inc. All rights reserved. 10240 Sorrento Valley Rd.,

More information

Astaro Security Gateway V8. Remote Access via L2TP over IPSec Configuring ASG and Client

Astaro Security Gateway V8. Remote Access via L2TP over IPSec Configuring ASG and Client Astaro Security Gateway V8 Remote Access via L2TP over IPSec Configuring ASG and Client 1. Introduction This guide contains complementary information on the Administration Guide and the Online Help. If

More information

EMC Celerra Network Server

EMC Celerra Network Server EMC Celerra Network Server Release 5.6.47 Using Windows Administrative Tools with Celerra P/N 300-004-139 REV A02 EMC Corporation Corporate Headquarters: Hopkintons, MA 01748-9103 1-508-435-1000 www.emc.com

More information

Configuring SonicWALL TSA on Citrix and Terminal Services Servers

Configuring SonicWALL TSA on Citrix and Terminal Services Servers Configuring on Citrix and Terminal Services Servers Document Scope This solutions document describes how to install, configure, and use the SonicWALL Terminal Services Agent (TSA) on a multi-user server,

More information

Microsoft Dynamics GP. Workflow Installation Guide Release 10.0

Microsoft Dynamics GP. Workflow Installation Guide Release 10.0 Microsoft Dynamics GP Workflow Installation Guide Release 10.0 Copyright Copyright 2008 Microsoft Corporation. All rights reserved. Complying with all applicable copyright laws is the responsibility of

More information

Download/Install IDENTD

Download/Install IDENTD Download/Install IDENTD IDENTD is the small software program that must be installed on each user s computer if multiple filters are to be used in ComSifter. The program may be installed and executed locally

More information

Virtual Managment Appliance Setup Guide

Virtual Managment Appliance Setup Guide Virtual Managment Appliance Setup Guide 2 Sophos Installing a Virtual Appliance Installing a Virtual Appliance As an alternative to the hardware-based version of the Sophos Web Appliance, you can deploy

More information

nappliance misa Server 2006 Standard Edition Users Guide For use with misa Appliances 2006 nappliance Networks, Inc.

nappliance misa Server 2006 Standard Edition Users Guide For use with misa Appliances 2006 nappliance Networks, Inc. nappliance misa Server 2006 Standard Edition Users Guide For use with misa Appliances The information contained in this document represents the current view of Microsoft Corporation on the issues discussed

More information

Step-by-Step Configuration

Step-by-Step Configuration Step-by-Step Configuration Kerio Technologies Kerio Technologies. All Rights Reserved. Printing Date: August 15, 2007 This guide provides detailed description on configuration of the local network which

More information

How to Secure a Groove Manager Web Site

How to Secure a Groove Manager Web Site How to Secure a Groove Manager Web Site Information in this document, including URL and other Internet Web site references, is subject to change without notice. Unless otherwise noted, the companies, organizations,

More information

Quick Start Guide for VMware and Windows 7

Quick Start Guide for VMware and Windows 7 PROPALMS VDI Version 2.1 Quick Start Guide for VMware and Windows 7 Rev. 1.1 Published: JULY-2011 1999-2011 Propalms Ltd. All rights reserved. The information contained in this document represents the

More information

BlackShield ID Agent for Terminal Services Web and Remote Desktop Web

BlackShield ID Agent for Terminal Services Web and Remote Desktop Web Agent for Terminal Services Web and Remote Desktop Web 2010 CRYPTOCard Corp. All rights reserved. http:// www.cryptocard.com Copyright Copyright 2010, CRYPTOCard All Rights Reserved. No part of this publication

More information

WhatsUp Gold v16.2 Installation and Configuration Guide

WhatsUp Gold v16.2 Installation and Configuration Guide WhatsUp Gold v16.2 Installation and Configuration Guide Contents Installing and Configuring Ipswitch WhatsUp Gold v16.2 using WhatsUp Setup Installing WhatsUp Gold using WhatsUp Setup... 1 Security guidelines

More information

Kaseya Server Instal ation User Guide June 6, 2008

Kaseya Server Instal ation User Guide June 6, 2008 Kaseya Server Installation User Guide June 6, 2008 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private Sector IT organizations. Kaseya's

More information

Application Note. ShoreTel 9: Active Directory Integration. Integration checklist. AN-10233 June 2009

Application Note. ShoreTel 9: Active Directory Integration. Integration checklist. AN-10233 June 2009 Application Note AN-10233 June 2009 ShoreTel 9: Active Directory Integration This application note outlines the configuration required to prepare a customer s Microsoft Active Directory environment for

More information

WhatsUp Gold v16.3 Installation and Configuration Guide

WhatsUp Gold v16.3 Installation and Configuration Guide WhatsUp Gold v16.3 Installation and Configuration Guide Contents Installing and Configuring WhatsUp Gold using WhatsUp Setup Installation Overview... 1 Overview... 1 Security considerations... 2 Standard

More information

Administration Guide. Novell Storage Manager 3.1.1 for Active Directory. Novell Storage Manager 3.1.1 for Active Directory Administration Guide

Administration Guide. Novell Storage Manager 3.1.1 for Active Directory. Novell Storage Manager 3.1.1 for Active Directory Administration Guide Novell Storage Manager 3.1.1 for Active Directory Administration Guide www.novell.com/documentation Administration Guide Novell Storage Manager 3.1.1 for Active Directory October 17, 2013 Legal Notices

More information

Simple Scan to Email Setup Guide

Simple Scan to Email Setup Guide Simple Scan to Email Setup Guide Document Centre 555/545/535 Dc04cc0336 Scan to Email Scanning to email from a Xerox DC 555/545/535 requires the support of external email services on a network. These services

More information

Integrated Citrix Servers

Integrated Citrix Servers Installation Guide Supplement for use with Integrated Citrix Servers Websense Web Security Websense Web Filter v7.5 1996-2010, Websense, Inc. 10240 Sorrento Valley Rd., San Diego, CA 92121, USA All rights

More information

Networking Best Practices Guide. Version 6.5

Networking Best Practices Guide. Version 6.5 Networking Best Practices Guide Version 6.5 Summer 2010 Copyright: 2010, CCH, a Wolters Kluwer business. All rights reserved. Material in this publication may not be reproduced or transmitted in any form

More information

Step-By-Step Guide to Deploying Lync Server 2010 Enterprise Edition

Step-By-Step Guide to Deploying Lync Server 2010 Enterprise Edition Step-By-Step Guide to Deploying Lync Server 2010 Enterprise Edition The installation of Lync Server 2010 is a fairly task-intensive process. In this article, I will walk you through each of the tasks,

More information

Microsoft Dynamics GP Release

Microsoft Dynamics GP Release Microsoft Dynamics GP Release Workflow Installation and Upgrade Guide February 17, 2011 Copyright Copyright 2011 Microsoft. All rights reserved. Limitation of liability This document is provided as-is.

More information

intertrax Suite resource MGR Web

intertrax Suite resource MGR Web intertrax Suite resource MGR Web Resource Management Installation Guide Version 4 2012 Copyright 2003-2012 by Salamander Technologies, Inc. Protected by US Patents 5,573,278; 5,596,652; 5,793,882; 6,761,312;

More information

Allworx OfficeSafe Operations Guide Release 6.0

Allworx OfficeSafe Operations Guide Release 6.0 Allworx OfficeSafe Operations Guide Release 6.0 No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, photocopy,

More information

StarWind iscsi SAN Software: Using an existing SAN for configuring High Availability storage with Windows Server 2003 and 2008

StarWind iscsi SAN Software: Using an existing SAN for configuring High Availability storage with Windows Server 2003 and 2008 StarWind iscsi SAN Software: Using an existing SAN for configuring High Availability storage with Windows Server 2003 and 2008 www.starwindsoftware.com Copyright 2008-2011. All rights reserved. COPYRIGHT

More information

BlackShield ID Agent for Remote Web Workplace

BlackShield ID Agent for Remote Web Workplace Agent for Remote Web Workplace 2010 CRYPTOCard Corp. All rights reserved. http:// www.cryptocard.com Copyright Copyright 2010, CRYPTOCard All Rights Reserved. No part of this publication may be reproduced,

More information

StarWind iscsi SAN Software: Configuring High Availability Storage for VMware vsphere and ESX Server

StarWind iscsi SAN Software: Configuring High Availability Storage for VMware vsphere and ESX Server StarWind iscsi SAN Software: Configuring High Availability Storage for VMware vsphere and ESX Server www.starwindsoftware.com Copyright 2008-2011. All rights reserved. COPYRIGHT Copyright 2008-2011. All

More information

High Availability Setup Guide

High Availability Setup Guide High Availability Setup Guide Version: 9.0 Released: March 2015 Companion Guides: The UniPrint Infinity Administrator s Guide, Cluster Guide and Mobile Setup Guide can be found online for your convenience

More information

StarWind iscsi SAN Software: Tape Drives Using StarWind and Symantec Backup Exec

StarWind iscsi SAN Software: Tape Drives Using StarWind and Symantec Backup Exec StarWind iscsi SAN Software: Tape Drives Using StarWind and Symantec Backup Exec www.starwindsoftware.com Copyright 2008-2011. All rights reserved. COPYRIGHT Copyright 2008-2011. All rights reserved. No

More information

OPC and DCOM: 5 things you need to know Author: Randy Kondor, B.Sc. in Computer Engineering

OPC and DCOM: 5 things you need to know Author: Randy Kondor, B.Sc. in Computer Engineering OPC and DCOM: 5 things you need to know Author: Randy Kondor, B.Sc. in Computer Engineering OPC technology relies on Microsoft's COM and DCOM to exchange data between automation hardware and software;

More information

Use Enterprise SSO as the Credential Server for Protected Sites

Use Enterprise SSO as the Credential Server for Protected Sites Webthority HOW TO Use Enterprise SSO as the Credential Server for Protected Sites This document describes how to integrate Webthority with Enterprise SSO version 8.0.2 or 8.0.3. Webthority can be configured

More information

Getting started. Symantec AntiVirus Corporate Edition. About Symantec AntiVirus. How to get started

Getting started. Symantec AntiVirus Corporate Edition. About Symantec AntiVirus. How to get started Getting started Symantec AntiVirus Corporate Edition Copyright 2004 Symantec Corporation. All rights reserved. Printed in the U.S.A. 03/04 10223881 Symantec and the Symantec logo are U.S. registered trademarks

More information

Citrix Access Gateway Plug-in for Windows User Guide

Citrix Access Gateway Plug-in for Windows User Guide Citrix Access Gateway Plug-in for Windows User Guide Access Gateway 9.2, Enterprise Edition Copyright and Trademark Notice Use of the product documented in this guide is subject to your prior acceptance

More information

The SSL device also supports the 64-bit Internet Explorer with new ActiveX loaders for Assessment, Abolishment, and the Access Client.

The SSL device also supports the 64-bit Internet Explorer with new ActiveX loaders for Assessment, Abolishment, and the Access Client. WatchGuard SSL v3.2 Release Notes Supported Devices SSL 100 and 560 WatchGuard SSL OS Build 355419 Revision Date January 28, 2013 Introduction WatchGuard is pleased to announce the release of WatchGuard

More information

Using LDAP Authentication in a PowerCenter Domain

Using LDAP Authentication in a PowerCenter Domain Using LDAP Authentication in a PowerCenter Domain 2008 Informatica Corporation Overview LDAP user accounts can access PowerCenter applications. To provide LDAP user accounts access to the PowerCenter applications,

More information

DCOM settings for computer-to-computer communication between OPC servers and OPC clients

DCOM settings for computer-to-computer communication between OPC servers and OPC clients DCOM settings for computer-to-computer communication between OPC servers and OPC clients 1. Introduction Under OPC DA, the "dcomcnfg" service program is used for computer-to-computer communication between

More information

LPR for Windows 95/98/Me/2000/XP TCP/IP Printing User s Guide. Rev. 03 (November, 2001)

LPR for Windows 95/98/Me/2000/XP TCP/IP Printing User s Guide. Rev. 03 (November, 2001) LPR for Windows 95/98/Me/2000/XP TCP/IP Printing User s Guide Rev. 03 (November, 2001) Copyright Statement Trademarks Copyright 1997 No part of this publication may be reproduced in any form or by any

More information

Remote Management System

Remote Management System RMS Copyright and Distribution Notice November 2009 Copyright 2009 ARTROMICK International, Inc. ALL RIGHTS RESERVED. Published 2009. Printed in the United States of America WARNING: ANY UNAUTHORIZED

More information

2X ApplicationServer & LoadBalancer & VirtualDesktopServer Manual

2X ApplicationServer & LoadBalancer & VirtualDesktopServer Manual 2X ApplicationServer & LoadBalancer & VirtualDesktopServer Manual 2X VirtualDesktopServer Contents 1 2X VirtualDesktopServer Contents 2 URL: www.2x.com E-mail: info@2x.com Information in this document

More information

Microsoft SQL Server 2008 R2 (64-bit) Standard Edition Installation Guide

Microsoft SQL Server 2008 R2 (64-bit) Standard Edition Installation Guide Microsoft SQL Server 2008 R2 (64-bit) Standard Edition Installation Guide Notices 2011 XMPie Inc. All rights reserved. U.S. Patents 6948115, 7406194, 7548338, 7757169 and pending patents. JP Patent 4406364B

More information

ibaan ERP 5.2a Configuration Guide for ibaan ERP Windows Client

ibaan ERP 5.2a Configuration Guide for ibaan ERP Windows Client ibaan ERP 5.2a Configuration Guide for ibaan ERP Windows Client A publication of: Baan Development B.V. P.O.Box 143 3770 AC Barneveld The Netherlands Printed in the Netherlands Baan Development B.V. 2002.

More information

523 Non-ThinManager Components

523 Non-ThinManager Components 28 Non-ThinManager Components Microsoft Terminal Servers play an important role in the ThinManager system. It is recommended that you become familiar with the documentation provided by Microsoft about

More information

Copyright. Disclaimer. Introduction 1. System Requirements... 3. Installing the software 4

Copyright. Disclaimer. Introduction 1. System Requirements... 3. Installing the software 4 Digital Signatures User Guide Revision 1.2 build 1, Document Revision 1.12 Published 31. Octover 2011 ii Contents Copyright Disclaimer iii iii Introduction 1 System Requirements... 3 Installing the software

More information

VRC 7900/8900 Avalanche Enabler User s Manual

VRC 7900/8900 Avalanche Enabler User s Manual VRC 7900/8900 Avalanche Enabler User s Manual WLE-VRC-20030702-02 Revised 7/2/03 ii Copyright 2003 by Wavelink Corporation All rights reserved. Wavelink Corporation 6985 South Union Park Avenue, Suite

More information

Deep Freeze Enterprise - Advanced Maintenance & Autologon

Deep Freeze Enterprise - Advanced Maintenance & Autologon Deep Freeze Enterprise - Advanced Maintenance & Autologon TECHNICAL WHITEPAPER Last modified: June 25, 2009 Faronics Toll Free Tel: 800-943-6422 Toll Free Fax: 800-943-6488 International Tel: +1 604-637-3333

More information

Setting Up a Unisphere Management Station for the VNX Series P/N 300-011-796 Revision A01 January 5, 2010

Setting Up a Unisphere Management Station for the VNX Series P/N 300-011-796 Revision A01 January 5, 2010 Setting Up a Unisphere Management Station for the VNX Series P/N 300-011-796 Revision A01 January 5, 2010 This document describes the different types of Unisphere management stations and tells how to install

More information

Portions of this product were created using LEADTOOLS 1991-2009 LEAD Technologies, Inc. ALL RIGHTS RESERVED.

Portions of this product were created using LEADTOOLS 1991-2009 LEAD Technologies, Inc. ALL RIGHTS RESERVED. Installation Guide Lenel OnGuard 2009 Installation Guide, product version 6.3. This guide is item number DOC-110, revision 1.038, May 2009 Copyright 1992-2009 Lenel Systems International, Inc. Information

More information