AD Policy Working Group April 15th, Engineering Building II 3pm 4:30pm
|
|
|
- Richard Foster
- 9 years ago
- Views:
Transcription
1 AD Policy Working Group April 15th, Engineering Building II 3pm 4:30pm Voting Members: Donna Barrett, Cha rles Cline, Dan Green, Julie Tilley, Dan Evans, Daniel Henninger, Tom Farwig, Joshua Gira, Daniel Sink Ex Officio Members: Jeremy Brown, Michael Underwood, Gene Morse, Rob Blanke Guests: Billy Beaudoin, Debbie Carraway, Matt Pollard, Ken Taitingfong Business handled outside of meetings: SCCM Site Server OS Upgrade I wanted to confirm that the Policy committee approved the upgrade of the OS on the Site Server for Wednesday March 9th. If you look at your calendar Patch Tuesday is March 8th. If the Site Server upgrade is to happen it will disrupt the patching schedule, and we cannot guarantee patches will be deployed on time to any of the patching groups. Pushed by Committee vote to March 16th to avoid patching conflict. ===== Agenda: Quicktime for Windows [Michael Underwood] Apple has announced that they re not supporting QuickTime for Windows anymore and not to expect more patches. Two vulnerability in the wild have been found. S&C wants the app removed from across campus. How to handle? Julie: Would be a problem for us as we have apps that require it. Ex: Simulation lab for animal anatomy skills. Billy: Announce a future removal (90 day) and see who wants to request an exception from S&C? (based on the campus patching policy) If OIT S&C is going to allow exceptions, we ll need to create a DN group for whatever script / process we ll use to remove the software.
2 [This process wasn t nailed down during the meeting and would likely need to be run by AD Tech. However, as the removal is being proposed for a few months from now, we have time to nail down the specifics.] Committee: S&C [Dan Sink] needs to make a Sysnews post announcing that S&C requires the removal. Once this is announced, AD Policy can send a 2nd followup to this which will note the specifics for machines within the AD. SCCM Core team Update/Discussion [Gene Morse] We want to discuss upgrading SCCM to v1602, upgrade of client, and changing the way the client is maintained/upgraded. Currently behind on the client pushed out to the machines. Want to make the upgrade of the client a part of the standard operations want to reduce the amount of pre approval form the committees (as the upgrades will be happening every 3 months or so now) and change the installation of the client from VB to GPO. Billy: Add SCCM upgrades to the autoapproval list (which we ve never finalized). Plan to move forward on your timeline, pick a date, and inform the comms. Give them a chance to object, but if nothing heard, move forward. Julie: Do you always test on wolftest first? Yes. What will be the time between WolfTest and WolfTech installation? Normally about a week just checking to make sure nothing blows up during the upgrade itself. Committee: SCCM core team will test and then select a date for the server and client upgrades. They will announce these dates and give the committees at least 1 week notice. Should no objections be raised regarding the dates, they should proceed. Client installation change from vbs > GPO they re not clear on how this would work Committee: Yes, but not sure we, as the Policy Comm, really care about the specifics of this technological question make sure whatever you switch to works, and have the AD Tech comm sign off on it. Update on Special Configurations OU [Jeremy] I have finished configuring the Special Configurations OU and LAPS build out. The "Special Configurations" OU is now deployed throughout the NCSU OU and nested appropriately. I have moved groups that should be in there over and began changing the the names. I do not intend on changing the names of the SUP groups till after the late patches get deployed. There may be other groups that were missed. If you find other groups that need to be moved please let me know. I also added a folder to SCCM and moved collections into a "Special Configurations Collection" as well. That way the two environments mirror as best they can.
3 The intent for this OU is to hold all the unique things for devices that would not be software that a user would interact with. Other things that I expect to move into this OU would be the NIST compliance settings filtered on the upcoming GPO or possibly moving Tripwire and Identity Finder into this OU as well. Special Configurations was discussed in 2013: mibhgdbpmxpipgml ZfRat6zLgkiSyiy6HnLMV4/edit May need to fix ADToolkit to show these Dan Green requested that an error report be submitted to wolftech [email protected] with details. Update on LAPS [Jeremy Brown] LAPS (Local Admin Password Slayer) is ready for deployment, I believe. There are two collections. Once is filtered on a NCSU SC Microsoft LAPS OptOut group. The other is filtered on the NCSU collection while excluding any devices in the NCSU SC Microsoft LAPS OptOut group. The plan is to deploy the software to the latter collection. The software requires two reboots for full effect. The first reboot completes the installation of the agent and registration of the.dll's. The second reboot is when the password of the builtin administrator account is changed. You can see the password on the computer object under the ms Mcs AdmPwd attribute. The LAPS policy GPO (NCSU SC Microsoft LAPS) is currently setting the password to: Complexity: Enabled Length: 16 Age: 90 days This is an opt out feature. If you don t opt out, you ll be in. AD Tech has already reviewed and approved the deployment. Who will be able to look at computer X s LAP? Anyone in its OU Admin s group (or if you delegate that attribute to another group). When will it go live? Can go now. When will it be announced? Announce on Monday (April 18th) that we ll be turning it on the afternoon May 2nd. Where s the docs on it? Jeremy will add a page to the activedirectory.ncsu.edu to explain the service. Where has it been tested? Multiple computers managed by Jeremy Brown and M. Underwood. Committee: Go forth and implement w/ caveats above. Windows 10 domain defaults [Tom Farwig] Noticing on a couple of Windows 10 machines that the last user logged in is displaying on the login screen where it did not under previous versions of Windows. The policy setting for this is: Computer Configuration > Windows Settings > Security Settings > Local Policies > Security Options: Interactive logon: do not display last user name.
4 I have found that our current Win 10 baseline GPO, "Windows 10 Computer (SCM, v1511)" does not have this set like the previous baselines. Looking at it closer, it only has one item in the Interactive logon section that is set: the behaviour of smart card removal (set to lock workstation). The following settings are in the "Win8.1 Computer Policy" baseline GPO: Interactive logon: Do not display last user name Enabled Interactive logon: Do not require CTRL+ALT+DEL Disabled Interactive logon: Number of previous logons to cache (in case domain controller is not available) 4 logons Interactive logon: Prompt user to change password before expiration 14 days Interactive logon: Require Domain Controller authentication to unlock workstation Disabled None of these are overridden in the Win 8.1 Default Domain policy. I would like to request that at least the "Do not display last user name" setting be added to the "WolfTech Default Domain Policy Win 10.0" since it is apparently no longer being set in the baseline. I believe the others may also be desirable but don't necessarily know the impact they would have on a Win 10 device some of them may have or if any are obsolete under Win 10. I only looked in the interactive login section for differences, I believe there may also be others. From what I could find there was only a Win 10 Computer baseline, and no longer different configs like the Enterprise Computer baseline that we have used in the past where a lot of the above settings came from originally. I suspect this may be why there is a difference. Julie Tilley (3/24/16): I d like to see it set to: Interactive logon: do not display last user name as well. We can still override at our own OUs if we need/want to. Derek Ballard (3/24/16): Updated the "Interactive logon: Do not display last user name" to "Enabled" in the "WolfTech Default Domain Policy Win 10.0" policy, since this appears to be a no brainer FERPA thingy. If someone disagrees, please let me know and i'll change it back. Not making any other changes until further discussions and decisions made. Dustin Duckwell (3/24/16): I would like to also recommend that the 'Show first sign in animation' be disabled as well. Committee: Endorses the change that Derek already made. For consistency and future NIST compliance, we d ask that these be all added back to the Win10 policy the only exception is the last Req DC auth to unlock we feel that the AD Tech comm needs to reinvestigate this as we recall some issues. Dustin is encouraged to set Show first sign in animation at his OU. New Chair Elections [Dan Green] Dan is stepping down as the chair of the AD Policy Committee and as a member of the committee. While the women wept and the men beat their chests, it was acknowledged that it was time.
5 As a part of this process, the committee voted to clarify some rules regarding the chair and the membership of the committee: Does the chair need to be an existing member of the committee. Yes. Chair Terms voted to be 2yrs; no limit on how many terms a chair could serve for. Clarify the rules so the chair isn t separate but accounts for one of the CITD members which isn t currently clear on the website. [Dan G: website updated 4/18 to clarify this] Josh will present these at the ITSAC CAS for blessing. Dan Evans volunteered, Josh Gira nominated both accepted. Committee discussed and voted Josh Gira was named the new chair. Stuff on the horizon (things not quite ready to be discussed) DirectAccess Demonstration [M. Underwood] Security Standard for Sensitive Data and Systems [ Jessie Henninger ] 0vYyk/edit#heading=h.ik9joinausi Rescheduling for 2016 as Jessie left S&C.
How to monitor AD security with MOM
How to monitor AD security with MOM A article about monitor Active Directory security with Microsoft Operations Manager 2005 Anders Bengtsson, MCSE http://www.momresources.org November 2006 (1) Table of
Tool Tip. SyAM Management Utilities and Non-Admin Domain Users
SyAM Management Utilities and Non-Admin Domain Users Some features of SyAM Management Utilities, including Client Deployment and Third Party Software Deployment, require authentication credentials with
Creating Organizational Units, Accounts, and Groups. Active Directory Users and Computers (ADUC) 21/05/2013
Creating Organizational Units, Accounts, and Groups Tom Brett Active Directory Users and Computers (ADUC) Active Directory Users and Computers (ADUC) After installing AD DS, the next task is to create
WolfTech Active Directory: SCCM 101
WolfTech Active Directory: SCCM 101 July 28th, 2011 2-5pm Daniels 201 August 5th, 2011 2-5pm Daniels 201 http://activedirectory.ncsu.edu/ What is going to covered? What is SCCM Roles Console Client Inventory
WolfTech Active Directory: OU Administration
WolfTech Active Directory: OU Administration August 4th, 2011 2-5pm Daniels 201 http://activedirectory.ncsu.edu What we are going to cover... Info for those who are new to AD Basic Units of AD: Users,
Active Directory Integration
January 11, 2011 Author: Audience: SWAT Team Evaluator Product: Cymphonix Network Composer EX Series, XLi OS version 9 Active Directory Integration The following steps will guide you through the process
How to configure Mac OS X Server
How to configure Mac OS X Server By Rob Buckley In the previous article in this series, we showed you how to secure a Mac using the functions built into its operating system, OS X. See photo story here
What we are going to cover...
Introduction to WolfTech Active Directory 6 October 2011 10am-12pm Daniels 201 http://activedirectory.ncsu.edu What we are going to cover... What AD is and isn't The WolfTech implementation of AD Management
OV Operations for Windows 7.x
OV Operations for Windows 7.x Common questions about OV Operations for Windows Security Setup, Users and groups Whitepaper V.1.01 August 6, 2003 New: Updated for OV Operations for Windows 7.20 Troubleshoot
Group Policy Objects: What are They and How Can They Help Your Firm?
Group Policy Objects: What are They and How Can They Help Your Firm? By Sharon Nelson and John Simek 2011 Sensei Enterprises, Inc. The obvious first question: What is a Group Policy Object? Basically,
Windows Clients and GoPrint Print Queues
Windows Clients and GoPrint Print Queues Overview The following tasks demonstrate how to configure shared network printers on Windows client machines in a Windows Active Directory Domain and Workgroup
ADSelfService Plus Client Software Installation Guide
ADSelfService Plus Client Software Installation Guide ( I n s t a l l a t io n t h r o u g h A DS e l f S e r v ic e P l u s w e b p o r t a l a n d M a n u a l I n s t a l l a t io n ) 1 Table of Contents
SchoolBooking LDAP Integration Guide
SchoolBooking LDAP Integration Guide Before you start This guide has been written to help you configure SchoolBooking to connect to your LDAP server. Please treat this document as a reference guide, your
ILTA HANDS ON Securing Windows 7
Securing Windows 7 8/23/2011 Table of Contents About this lab... 3 About the Laboratory Environment... 4 Lab 1: Restricting Users... 5 Exercise 1. Verify the default rights of users... 5 Exercise 2. Adding
SchoolBooking SSO Integration Guide
SchoolBooking SSO Integration Guide Before you start This guide has been written to help you configure SchoolBooking to operate with SSO (Single Sign on) Please treat this document as a reference guide,
Chapter. Managing Group Policy MICROSOFT EXAM OBJECTIVES COVERED IN THIS CHAPTER:
Chapter 10 Managing Group Policy MICROSOFT EXAM OBJECTIVES COVERED IN THIS CHAPTER: Implement and troubleshoot Group Policy. Create a Group Policy object (GPO). Link an existing GPO. Delegate administrative
User Management Tool 1.5
User Management Tool 1.5 2014-12-08 23:32:23 UTC 2014 Citrix Systems, Inc. All rights reserved. Terms of Use Trademarks Privacy Statement Contents User Management Tool 1.5... 3 ShareFile User Management
Group Policy 21/05/2013
Group Policy Group Policy is not a new technology for Active Directory, but it has grown and improved with every iteration of the operating system and service pack since it was first introduced in Windows
IT Resources at NCSU. ISE s 2 minute guide to NCSU s IT resources. www.ise.ncsu.edu
IT Resources at NCSU ISE s 2 minute guide to NCSU s IT resources Support @ NCSU ISEHELP ([email protected]) ISE s IT Group (Justin and Robert) ITECS ([email protected]) College of Engineering IT OIT ([email protected])
Introduction to Active Directory. December 10th, 2008 1-3pm Daniels 407
Introduction to Active Directory December 10th, 2008 1-3pm Daniels 407 What we are going to cover... The basics of Active Directory What AD is What AD isn't Tools Management Concepts Additional Services
(Installation through ADSelfService Plus web portal and Manual Installation)
ADSelfService Plus Client Software Installation Guide (Installation through ADSelfService Plus web portal and Manual Installation) 1 Table of Contents Introduction:... 3 ADSelfService Plus Client software:...
User Guide. Version R91. English
AuthAnvil User Guide Version R91 English August 25, 2015 Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept EULATOS as updated from
Portland State University Office of Information Technologies Active Directory Standards and Guidelines for Campus Administrators
Portland State University Office of Information Technologies Active Directory Standards and Guidelines for Campus Administrators Introduced with Windows 2000 Server, Active Directory (AD) is Microsoft
Session 17 Windows 7 Professional DNS & Active Directory(Part 2)
Session 17 Windows 7 Professional DNS & Active Directory(Part 2) Fall 2011 ITE153 Operating Systems 1 Session 17 Windows 7 Professional Operating in Microsoft Networks Fall 2011 ITE153 Operating Systems
HOW TO SILENTLY INSTALL CLOUD LINK REMOTELY WITHOUT SUPERVISION
HOW TO SILENTLY INSTALL CLOUD LINK REMOTELY WITHOUT SUPERVISION Version 1.1 / Last updated November 2012 INTRODUCTION The Cloud Link for Windows client software is packaged as an MSI (Microsoft Installer)
PC Power Down. MSI Deployment Guide
PC Power Down MSI Deployment Guide 1. Introduction 1.1. Outline The client software for PC Power Down can be pushed out across a network, saving the effort of individually visiting each computer to install
PLANNING AND DESIGNING GROUP POLICY, PART 1
84-02-06 DATA SECURITY MANAGEMENT PLANNING AND DESIGNING GROUP POLICY, PART 1 Melissa Yon INSIDE What Is Group Policy?; Software Settings; Windows Settings; Administrative Templates; Requirements for Group
System Center Configuration Manager Overview
System Center Configuration Manager Overview This document provides some background information on the Microsoft Systems Center Configuration Manager (SCCM) system, which has been selected for use as an
Admin Report Kit for Active Directory
Admin Report Kit for Active Directory Reporting tool for Microsoft Active Directory Enterprise Product Overview Admin Report Kit for Active Directory (ARKAD) is a powerful reporting solution for the Microsoft
WolfTech Active Directory: SCCM 101
WolfTech Active Directory: SCCM 101 July 28th, 2011 2-5pm Daniels 201 August 5th, 2011 2-5pm Daniels 201 http://activedirectory.ncsu.edu/ What we are going to cover... The Console The Client Concepts Inventory
Full disk encryption with Sophos Safeguard Enterprise With Two-Factor authentication of Users Using SecurAccess by SecurEnvoy
Full disk encryption with Sophos Safeguard Enterprise With Two-Factor authentication of Users Using SecurAccess by SecurEnvoy Contact information SecurEnvoy www.securenvoy.com 0845 2600010 1210 Parkview
Restructuring Active Directory Domains Within a Forest
C H A P T E R 1 2 Restructuring Active Directory Domains Within a Forest Restructuring Active Directory directory service domains within a forest with the goal of reducing the number of domains allows
Northwestern University Dell Kace Patch Management
Northwestern University Dell Kace Patch Management Desktop Patch Management Best Practices Table of Contents: 1. Audience 2. Definition 3. Patch Approaches 4. Guidelines for Review, Test, and Deploy 5.
Exchange ActiveSync Configurations for GroupWise
Exchange ActiveSync Configurations Introduction ISD's Exchange ActiveSync server allows mobile device users to fetch email, contacts and appointments from GroupWise. Some devices don't require any new
Websense Support Webinar: Questions and Answers
Websense Support Webinar: Questions and Answers Configuring Websense Web Security v7 with Your Directory Service Can updating to Native Mode from Active Directory (AD) Mixed Mode affect transparent user
OPS Data Quick Start Guide
OPS Data Quick Start Guide OPS Data Features Guide Revision: October, 2014 Technical Support (24/7) - (334) 705-1605 http://www.opelikapower.com Quick Start Guide OPS Data: Beginning today, you have access
RMM/MDM. Quick Reference Guide
RMM/MDM Quick Reference Guide Contents Getting Started...3 Probe and Agent Management...3 Installing a Windows Probe...3 Installing an Agent...5 Windows Agents...5 Updating Monitoring Software - Manually...5
How To Set Up A Macintosh With A Cds And Cds On A Pc Or Macbook With A Domain Name On A Macbook (For A Pc) For A Domain Account (For An Ipad) For Free
Setting Up a Macintosh For Use In The Medical Center The purpose of this document is to provide some assistance and direction to the users of Macintosh computers in The Medical Center network environment.
INTRODUCTION: SQL SERVER ACCESS / LOGIN ACCOUNT INFO:
INTRODUCTION: You can extract data (i.e. the total cost report) directly from the Truck Tracker SQL Server database by using a 3 rd party data tools such as Excel or Crystal Reports. Basically any software
MS-50255: Managing, Maintaining, and Securing Your Networks Through Group Policy. Course Objectives. Required Exam(s) Price.
MS-50255: Managing, Maintaining, and Securing Your Networks Through Group Policy Discover how to consolidate the administration of an enterprise IT infrastructure with Group Policy. In this four-day instructor
Table of Contents Introduction... 2 Azure ADSync Requirements/Prerequisites:... 2 Software Requirements... 2 Hardware Requirements...
Table of Contents Introduction... 2 Azure ADSync Requirements/Prerequisites:... 2 Software Requirements... 2 Hardware Requirements... 2 Service Accounts for Azure AD Sync Tool... 3 On Premises Service
Security and Rights Delegations for the Password Reset PRO Master Service Applies to software versions 2.x.x and 3.x.x
Security and Rights Delegations for the Password Reset PRO Master Service Applies to software versions 2.x.x and 3.x.x Password Reset PRO Master Service Delegated rights required for running the Password
Test Note Phone Manager Deployment Windows Group Policy Sever 2003 and XP SPII Clients
Test Note Phone Manager Deployment Windows Group Policy Sever 2003 and XP SPII Clients Note: I have only tested these procedures on Server 2003 SP1 (DC) and XP SPII client, in a controlled lab environment,
NetIQ. How to guides: AppManager v7.04 Initial Setup for a trial. Haf Saba Attachmate NetIQ. Prepared by. Haf Saba. Senior Technical Consultant
How to guides: AppManager v7.04 Initial Setup for a trial By NetIQ Prepared by Haf Saba Senior Technical Consultant Asia Pacific 1 Executive Summary This document will walk you through an initial setup
Georgia Tech Active Directory Policy
Georgia Tech Active Directory Policy Policy No: None Rev 1.1 Last Revised: April 18, 2005 Effective Date: 02/27/2004 Last Review Date: April 2005 Next Review Date: April 2006 Status Draft Under Review
Audit account logon events
Audit account logon events Description This security setting determines whether to audit each instance of a user logging on to or logging off from another computer in which this computer is used to validate
Mapping Network Shares
CAS Computing Mapping Network Shares Contents: Mapping Network Shares in Windows 7..1 Mapping Network Shares in Mac OS X (10.5+). 4 Access to Shares and Student Access FAQ..7 CAS Computing Services, (518)
SafeWord Domain Login Agent Step-by-Step Guide
SafeWord Domain Login Agent Step-by-Step Guide Author Johan Loos Date January 2009 Version 1.0 Contact [email protected] Table of Contents Table of Contents... 2 Why SafeWord Agent for Windows Domains?...
Active Directory. Users & Computers. Group Policies
Active Directory Users & Computers Policies Users & Computers domains domain trusted domains, trusting domains subdomains tree of domains forest of trees s s in Active Directory are directory objects that
Automating client deployment
Automating client deployment 1 Copyright Datacastle Corporation 2014. All rights reserved. Datacastle is a registered trademark of Datacastle Corporation. Microsoft Windows is either a registered trademark
Citrix Single Sign-On Self-Service Password Reset
Citrix Single Sign-On Self-Service Password Reset Citrix Single Sign-On (SSO) Self-Service tools enable you to take control when you forget your password. Using the three security questions you established
Working Together - Your Apple Mac and Microsoft Windows
Contains information about complex concepts and /or requires technical knowledge to get the most out of the article. Aimed at the more experienced / ambitious ICT manager or accidental techie. Working
2. Using Notepad, create a file called c:\demote.txt containing the following information:
Unit 4 Additional Projects Configuring the Local Computer Policy You need to prepare your test lab for your upcoming experiments. First, remove a child domain that you have configured. Then, configure
Joining a workstation to the TAMU IT Domain and Profile Migration
Joining a workstation to the TAMU IT Domain and Profile Migration Contents Migration Prerequisites... 1 Firewalls... 1 Run As and Other Alternate Credentialing Methods... 2 File and Print Sharing Is Disabled...
Chapter 1 Scenario 1: Acme Corporation
Chapter 1 Scenario 1: Acme Corporation In This Chapter Description of the Customer Environment page 18 Introduction to Deploying Pointsec PC page 20 Prepare for Deployment page 21 Install Pointsec PC page
Role Based Access Control for Industrial Automation and Control Systems
Role Based Access Control for Industrial Automation and Control Systems Johan B. Nye ExxonMobil Research and Engineering Co. Kevin P. Staggs Honeywell ACS Advanced Technology Labs 27 October 2010 abstract
NetSpective Logon Agent Guide for NetAuditor
NetSpective Logon Agent Guide for NetAuditor The NetSpective Logon Agent The NetSpective Logon Agent is a simple application that runs on client machines on your network to inform NetSpective (and/or NetAuditor)
Quick Start Guide: NotifyLink for Symbian Series 60, 3 rd Edition
Quick Start Guide: NotifyLink for Symbian Series 60, 3 rd Edition Service Requirements Your device will require one of the following: Cellular connection supporting data transmission through your mobile
Embarcadero Performance Center 2.7 Installation Guide
Embarcadero Performance Center 2.7 Installation Guide Copyright 1994-2009 Embarcadero Technologies, Inc. Embarcadero Technologies, Inc. 100 California Street, 12th Floor San Francisco, CA 94111 U.S.A.
Active Directory Integration Guide
Chancery SMS Version 5.4 or Higher Active Directory Integration Guide Revised September 2005 CSL - 12458 The Chancery SMS Documentation Team: Joanna Denford, Linda MacShane, Sarah Hewson, Karin Jensen,
NetIQ Advanced Authentication Framework. Maintenance Guide. Version 5.1.0
NetIQ Advanced Authentication Framework Maintenance Guide Version 5.1.0 Table of Contents 1 Table of Contents 2 Introduction 3 About This Document 3 Purposes of Maintenance 3 Difficulties of Maintenance
SecurEnvoy Windows Login Agent
SecurEnvoy Windows Login Agent Including support for SecurPassword SecurEnvoy Ltd 1210 Parkview, Arlington Business Park, Theale, Reading. RG7 4TY Tel: 0845 2600010 Fax: 0845 260014 www.securenvoy.com
Instructions for Adding a MacOS 10.4.x Server to ASURITE for File Sharing. Installation Section
Instructions for Adding a MacOS 10.4.x Server to ASURITE for File Sharing Installation Section Purpose: We are setting up a server in ASU s specific environment. Power on the Server Insert the CD Hold
NODE4 SERVICE DESK SYSTEM
NODE4 SERVICE DESK SYSTEM KNOWLEDGE BASE ARTICLE INTERNAL USE ONLY NODE4 LIMITED 24/04/2015 ADD A POP, IMAP OR OFFICE 365 ACCOUNT TO OUTLOOK USING CUSTOM SETTINGS If you re setting up Outlook for the first
Password Manager Windows Desktop Client
Password Manager Windows Desktop Client EmpowerID provides an extension that allows organizations to plug into Password Manager to customize the Windows logon experience beyond that supplied by the standard
Implementing Endpoint Protection in System Center 2012 R2 Configuration Manager
Implementing Endpoint Protection in System Center 2012 R2 Configuration Manager Implementing Endpoint Protection in System Center 2012 R2 Configuration Manager This document is for informational purposes
TECHNICIAN PROCEDURES
TECHNICIAN PROCEDURES INTRODUCTION The Information Technology technician team provides a range of IT services to all departments and computer classrooms at Jacksonville University. This includes the following:
Using Logon Agent for Transparent User Identification
Using Logon Agent for Transparent User Identification Websense Logon Agent (also called Authentication Server) identifies users in real time, as they log on to domains. Logon Agent works with the Websense
MailStore Outlook Add-in Deployment
MailStore Outlook Add-in Deployment A MailStore Server installation deploys the MailStore Outlook Add-in as a Windows Installer package (MSI) that can be installed on client machines using software distribution.
How To Build An Intranet In Sensesnet.Com
Sense/Net 6 Evaluation Guide How to build a simple list-based Intranet? Contents 1 Basic principles... 4 1.1 Workspaces... 4 1.2 Lists... 4 1.3 Check-out/Check-in... 5 1.4 Version control... 5 1.5 Simple
SCCM 2012. How to guide deploying SCCM Client, setting up SUP and SCEP. Hans Chr. Andersen
SCCM 2012 How to guide deploying SCCM Client, setting up SUP and SCEP Hans Chr. Andersen Contents What is Configuration Manager?... 2 Deploying SCCM Client... 3 Client push Installation... 3 SUP Installation...
How To - Implement Single Sign On Authentication with Active Directory
How To - Implement Single Sign On Authentication with Active Directory Applicable to English version of Windows This article describes how to implement single sign on authentication with Active Directory
Team Foundation Server 2013 Installation Guide
Team Foundation Server 2013 Installation Guide Page 1 of 164 Team Foundation Server 2013 Installation Guide Benjamin Day [email protected] v1.1.0 May 28, 2014 Team Foundation Server 2013 Installation Guide
Deep Freeze Enterprise - Patch Management
Deep Freeze Enterprise - Patch Management TECHNICAL WHITEPAPER Last modified: June 26, 2009 Faronics Toll Free Tel: 800-943-6422 Toll Free Fax: 800-943-6488 International Tel: +1 604-637-3333 International
TECHNICAL DOCUMENTATION SPECOPS DEPLOY / APP 4.7 DOCUMENTATION
TECHNICAL DOCUMENTATION SPECOPS DEPLOY / APP 4.7 DOCUMENTATION Contents 1. Getting Started... 4 1.1 Specops Deploy Supported Configurations... 4 2. Specops Deploy and Active Directory...5 3. Specops Deploy
RES ONE Automation 2015 Task Overview
RES ONE Automation 2015 Task Overview Task Overview RES ONE Automation 2015 Configuration Tasks The library Configuration contains Tasks that relate to the configuration of a computer, such as applying
EVault Software. Course 361 Protecting Linux and UNIX with EVault
EVault Software Course 361 Protecting Linux and UNIX with EVault Table of Contents Objectives... 3 Scenario... 3 Estimated Time to Complete This Lab... 3 Requirements for This Lab... 3 Computers Used in
Create, Link, or Edit a GPO with Active Directory Users and Computers
How to Edit Local Computer Policy Settings To edit the local computer policy settings, you must be a local computer administrator or a member of the Domain Admins or Enterprise Admins groups. 1. Add the
NetWrix USB Blocker. Version 3.6 Administrator Guide
NetWrix USB Blocker Version 3.6 Administrator Guide Table of Contents 1. Introduction...3 1.1. What is NetWrix USB Blocker?...3 1.2. Product Architecture...3 2. Licensing...4 3. Operation Guide...5 3.1.
Snow Inventory. Installing and Evaluating
Snow Inventory Installing and Evaluating Snow Software AB 2002 Table of Contents Introduction...3 1. Evaluate Requirements...3 2. Download Software...3 3. Obtain License Key...4 4. Install Snow Inventory
OFFICE OF KNOWLEDGE, INFORMATION, AND DATA SERVICES (KIDS) DIVISION OF ENTERPRISE DATA
OFFICE OF KNOWLEDGE, INFORMATION, AND DATA SERVICES (KIDS) DIVISION OF ENTERPRISE DATA Technical Guide Active Directory/Infinite Campus Integration in the KETS Environment Version 1.3 February 24, 2015
MCTS Guide to Microsoft Windows 7. Chapter 13 Enterprise Computing
MCTS Guide to Microsoft Windows 7 Chapter 13 Enterprise Computing Objectives Understand Active Directory Use Group Policy to control Windows 7 Control device installation with Group Policy settings Plan
Management Utilities Configuration for UAC Environments
Management Utilities Configuration for UAC Environments For optimal use of SyAM Management Utilities, Windows client machines should be configured with User Account Control disabled or set to the least
Configuration Guide BES12. Version 12.3
Configuration Guide BES12 Version 12.3 Published: 2016-01-19 SWD-20160119132230232 Contents About this guide... 7 Getting started... 8 Configuring BES12 for the first time...8 Configuration tasks for managing
Lesson Plans LabSim for Microsoft s Implementing a Server 2003 Active Directory Infrastructure
Lesson Plans LabSim for Microsoft s Implementing a Server 2003 Active Directory Infrastructure (Exam 70-294) Table of Contents Course Overview... 2 Section 1.1: Introduction to Active Directory... 3 Section
Deployment of Keepit for Windows
Deployment of Keepit for Windows Keepit A/S October 13, 2010 1 Introduction When deploying Keepit in larger setups with many desktops and servers, installing Keepit individually on each computer is cumbersome
5 Group Policy Management Capabilities You re Missing
5 Group Policy Management Capabilities You re Missing Don Jones 1. 8 0 0. 8 1 3. 6 4 1 5 w w w. s c r i p t l o g i c. c o m / s m b I T 2011 ScriptLogic Corporation ALL RIGHTS RESERVED. ScriptLogic, the
MS 6419 Configuring, Managing and Maintaining Windows Server 2008-based Servers
MS 6419 Configuring, Managing and Maintaining Windows Server 2008-based Servers Description: Days: 5 Prerequisites: This five-day instructor-led course provides students with the knowledge and skills that
WSUS (Windows Server Update Services) Benefits
WSUS (Windows Server Update Services) Benefits Adrian George VLAD, Tiberiu Nicolae STANESCU PETROLEUM and GAS University of Ploiesti, Romania, Department of Computer Science Keywords: WSUS server, infrastructure,
ILTA 2013 - HAND 6B. Upgrading and Deploying. Windows Server 2012. In the Legal Environment
ILTA 2013 - HAND 6B Upgrading and Deploying Windows Server 2012 In the Legal Environment Table of Contents Purpose of This Lab... 3 Lab Environment... 3 Presenter... 3 Exercise 1 Add Roles and Features...
Desktop Web Access Single Sign-On Configuration Guide
Waypoint Global Suite Single Sign-On relies on establishing a relationship between a Windows network user identity and a Suite user (Windows Authentication). This is accomplished by assigning to each of
MOC 6419: Configuring, Managing, and Maintaining Windows Server 2008
1 of 6 1/6/2010 3:23 PM MOC 6419: Configuring, Managing, and Maintaining Windows Server 2008 This five-day instructor-led course combines five days worth of instructor-led training content from the Network
IT Information Packet
IT Information Packet Welcome to the University of Mount Olive! Beginning college is an exciting time where you will be experiencing many new things in a short amount of time. We understand that technology
Using DC Agent for Transparent User Identification
Using DC Agent for Transparent User Identification Using DC Agent Web Security Solutions v7.7, 7.8 If your organization uses Microsoft Windows Active Directory, you can use Websense DC Agent to identify
Case Closed Installation and Setup
1 Case Closed Installation and Setup Contents Installation Overview...2 Microsoft SQL Server Installation...3 Case Closed Software Installation...5 Register OCX for Printing...6 External Programs...7 Automatic
Integrating Mac OS X 10.6 with Active Directory. 1 April 2010
Integrating Mac OS X 10.6 with Active Directory 1 April 2010 Introduction Apple Macintosh Computers running Mac OS X 10.6 can be integrated with the Boston University Active Directory to allow use of Active
