Application Compatibility Best Practices for Remote Desktop Services
|
|
|
- Jordan Junior Harmon
- 9 years ago
- Views:
Transcription
1 Application Compatibility Best Practices for Remote Desktop Services Introduction Remote Desktop Services in Windows Server 2008 R2 allows Windows Server to be accessed by multiple users concurrently to provide application and data hosting services by using Microsoft s presentation virtualization technology. While most 32- bit and 64- bit applications run as is on a Remote Desktop Session Host (RD Session Host) server, some do not perform as expected because of the special characteristics of the remote environment (that is, applications may be accessed concurrently by many users). The Remote Desktop Services application compatibility effort aims to make it easier for developers to create software that runs reliably on the Remote Desktop Services platform. Centralized deployment of an application by using Remote Desktop Services has many advantages over traditional deployment, including a lower cost of ownership. However, be aware of the special demands of this platform so that you can design and deploy your applications more effectively. For more information about the Remote Desktop Services platform, visit the Remote Desktop Services Product Evaluation site (Microsoft.com) and the Remote Desktop Services TechCenter (TechNet). Overview of application compatibility issues in Remote Desktop Services This document highlights some of the common application compatibility issues with Remote Desktop Services. For more information about the best practices for developing applications for Remote Desktop Services, see the Remote Desktop Services Programming Guidelines (MSDN). Application installation Most applications are designed for a single user client system which causes problems when installing them on an Remote Desktop Session Host (RD Session Host) server. Usually the installation does not create files and registry entries in a place that can be read by other user accounts who are logging on to the computer. Concurrent usage of applications Files, registry entries, pipes, IP addresses, and ports are used concurrently by multiple instances of applications when installed on an RD Session Host server. If an application is not designed to take care of such concurrent access/modification scenarios, it might face compatibility issues. Concurrent modification of these resources leads to data corruption and other unexpected behavior.
2 User data privacy in a multi- user environment Having your application in a multi- user environment makes it vulnerable to privacy breaches and unexpected sharing of data and user preferences. Performance Virtual desktops or sessions running on an RD Session Host server work over networks where multiple users may log on to a computer running Windows Server. When network bandwidth or hardware is a constraint, performance may become a bottleneck for applications. Remote devices in a Remote Desktop Services environment While an RD Session Host server redirects the Clipboard, printers, and drives to allow seamless integration from the client to the server, several features and devices might not be available over a remote session. Ensuring application readiness for Remote Desktop Services To develop applications that will run reliably on an RD Session Host server, you should give careful consideration to these application compatibility issues. Each of these potential trouble spots is discussed below along with mitigations and solutions. The mitigations and solutions incorporate best practices for use on an RD Session Host server. Many of these apply to the Fast User Switching environment as well, and should help improve the quality and reliability of your application. Application installation: Issues During installation, applications create various registry entries, folders, and files. Usually, the application files are created in the Program files folder and the registry entries are created in the HKEY_LOCAL_MACHINE and HKEY_CURRENT_USER hives. User data files and application shortcuts are created within the User Profile folder (%userprofile%) and ProgramData folder. Most application installations are designed for a single- user client system, which could cause problems when installing an application on an RD Session Host server. We can broadly divide the installation into two parts: 1. System- specific: Copying files, libraries, and other dependencies that are common to all users of that application 2. User- specific: Creating data files, registry entries, and shortcuts for a particular user Most of the problems specific to Remote Desktop Services occur because of user- specific deployment: Writing to the installing user s file and registry stores: o Any registry entries made in the HKEY_CURRENT_USER registry hive at installation are available only to the user installing the software. When another user tries to use that application, these registry entries are not available to that user.
3 o Similarly, any data files created within the installing user s profile would not be available when the application is executed by another user. Writing to common and system- wide registries and file stores: Any data files or registry entries created in common locations can be accessed by all users and are potentially vulnerable to concurrent access and modification; this can corrupt the data, lead to breach of user privacy, and other unexpected behavior. o Similarly, shortcuts and other resources would also not be available for other users if they are created just for the installing user. o Files and registry entries stored in locations that need privileged access can cause problems when they are used by a non- administrative user. Application installation: Mitigations and solutions While user- specific files and registry entries must be created in the user s hive, the application should not do this at the time of installation because these files and registries will consequently be available only to the installing user. The application should do this after installation. Application installation can be broken into two parts: 1. Installation activities: The application should create all common application files, libraries, and registry entries at installation. a. The application should not create files and registry entries that contain user- specific data that is not needed by other users at this stage. b. An exception to 1.a is database and repository stores that are explicitly designed to handle concurrent users and feature mechanisms, such as data locking, isolation, and encryption. c. The application should store user shortcuts or any truly common files that will be used by all users (typically read- only files with common application settings or database/repository files) in the All Users stores (%allusersprofile% for data, and %public% for shortcuts, desktop content, etc.). d. We recommend, but don t require, that the administrator be allowed to determine if the given installation should be for all users or a given set of users. This preference should be respected at run- time and the post- installation activities should be tuned accordingly. 2. Post- installation activities: The application should create all user- specific data files and registry entries after installation. This can usually be triggered when a user logs on, or on the first run of the application. a. Common scripts and definitions created after installation can be stored in the common and public files as discussed above. b. These scripts can be executed on the first run of the application by a particular user to create files and registry entries for that user. This ensures that every user creates and owns their own user- specific data in their user profile that is isolated from all other users. Microsoft Windows Installer supports creating per- user scripts that can be leveraged for this purpose. Concurrent usage of applications: Issues System resources such as files, registry entries, pipes, IP addresses, and ports are used concurrently by multiple instances of applications that are installed on an RD Session Host server. If an application is not designed to take care of such concurrent access and modification scenarios, it might face compatibility issues whe installed on an RD Session Host server. Concurrent modification of these resources leads to data corruption and other unexpected behavior.
4 Concurrent usage of applications: Mitigations and solutions After the basic design of the application is governed by the installation recommendations, it is easier to manage concurrent usage of the application, because all users write and modify data only in their own stores. The following are some generic recommendations for applications in a concurrent user environment: All data files must be isolated per user, either by using different files for every user or by enforcing locking and exclusive writing as per application scenarios. Common application files (non- data files) should never be locked by one instance of the application, as that would interfere with other users usage of the application. All objects, such as pipes, ports, shared libraries, and components, must be isolated per session or locked for exclusive access for modification as per application scenarios. To avoid data corruption, concurrent writes by multiple instances should not be allowed. The application should not use a fixed port number for listening or a pipe name for an application, but rather have a unique identifier for each instance. User data privacy in a multi- user environment: Issues Applications installed on an RD Session Host server are vulnerable to privacy breaches and unexpected sharing of data and user preferences. It is not uncommon to see applications persisting or manifesting user preferences from one user to another. Applications that save preferences and data in a common (non- user specific) location often experience unwanted behavior on an RD Session Host server, such as one user s settings taking affect for another user, and one user being able to see another user s data. User data privacy in a multi- user environment: Mitigations and solutions Applications should maintain all user- specific data and application settings within the user profile (%userprofile%). We recommend using %userprofile% and HKEY_CURRENT_USER as the data stores. Depending on your application deployment requirements, you may need to design for roaming users (users who can log on from different computers at different times) to ensure that the user data is maintained across roaming locations. For more information about maintaining roaming user profiles, see the Managing Roaming User Data Deployment Guide (TechNet). Performance: Issues RD Session Host sessions work over networks where multiple users log on to a Windows Server over a network. When network bandwidth or hardware is a constraint, application performance may suffer. 1. Because Remote Desktop Services is a presentation virtualization platform, it transmits information about the display and graphical output and I/O over the network. This makes the graphical performance dependent on the network bandwidth. 2. High- bandwidth video and animation content may overwhelm the network and reduce the response time of the RD Session Host session. This may result in skipped display frames, flickering video display, and lag in I/O.
5 3. The slow speed of the network (relative to, for example, a desktop graphical system where display content is transmitted from the graphics card to the display device directly), can cause a general lag in display updates. Performance may be visibly affected on dial- up connections and other slow networks. 4. Using video memory (off- screen video buffers) to cache display content results in unnecessary network traffic. Similarly, applications that require a lot of CPU time (real- time applications) or memory may monopolize the resources of a server running the RD Session Host role service, resulting in poor user experiences. Performance: Mitigations and solutions It is important to optimize your applications to consume minimal system resources because these resources are shared across multiple users on an RD Session Host server. 1. It is a good practice to turn off any non- essential videos and animations over an RD Session Host session. 2. The application should not use off- screen or other video buffers for storing data or for computation. It is better to store any such data in RAM and only transmit actual display content to the video buffers and display device. 3. Disk and network I/O are usually the slowest operations and these should be used optimally on an RD Session Host server. The application should not unnecessarily use memory because doing so could cause virtual memory paging and thus disk I/O. Also, caching to disk can become a bottleneck when multiple users are sharing the same disk for various applications. Moreover, the application must not send data packets over the network when tasks can be completed in memory locally at the server. For more information about detecting the Remote Desktop Services environment to enforce conditional behavior over a Remote Desktop Services session, see Detecting the Remote Desktop Services Environment (MSDN). Remote devices in a Remote Desktop Services environment: Issues Virtual desktops and RD Session Host sessions provide redirection of devices, such as printers, drives, and the Clipboard, to allow applications to access client resources seamlessly. While virtual desktops and RD Session Host sessions support redirection of most commonly used devices and enables our partners to add support for other devices, it is possible that some devices needed by an application might not be redirected. The following are not redirected: CD drives, hard disk drives, and other special devices that are not available as native devices. Operations, such as burning CDs or disk defragmentation, do not work over with an RD Session Host session. Similarly any native operations that require native device access do not work unless the device has drivers for Remote Desktop Services. Remote devices in a Remote Desktop Services environment: Mitigations and solutions Applications targeted for Remote Desktop Services should not have critical dependencies on direct access to devices via native drivers. Microsoft provides some devices with native support for Remote
6 Desktop Services, and partners can develop and support other devices by developing Remote Desktop Services- aware drivers that use virtual channels. For more information about virtual channels, see Using Remote Desktop Services Virtual Channels (MSDN). Introducing the Remote Desktop Services Application Analyzer Remote Desktop Services Application Analyzer is a runtime program analysis tool that enables administrators and users to determine the compatibility of an application with an RD Session Host server before deploying it. The tool provides a summary of incompatible behavior between the RD Session Host server and an application, and provides recommendations for deploying the application on an RD Session Host server. The Remote Desktop Services Application Analyzer uses the Microsoft Application Verifier as the backend. When you analyze an application, the tool intercepts function calls from that application into the operating system, and notes the calls and the parameters passed. Depending on the function call and the parameters passed, it decides whether this call is going to cause problems on an RD Session Host server and categorizes the results as warnings or problems. Following are the classes of application compatibility issues that are being targeted for detection: 1. Shared resources, such as files and registry entries 2. Access or privilege issues 3. Windows API calls, with special cases for Remote Desktop Services The Remote Desktop Services Application Analyzer: 1. Enables administrators to analyze test runs on the given binary. 2. Decides whether the binary will face any problems when deployed on an RD Session Host server. If yes, finds out the type of problem and its severity. 3. Presents this information in a readable format and summarizes the results along with a recommendation. 4. Enables the results to be exported and analyzed or viewed at some other computer. 5. Can be deployed on a set of user computers or test computers (running the client operating system or the Windows Server operating system) seamlessly. The results can be gathered at the administrator s computer. The administrator goes through the results on all the computers and then makes a decision as to whether the application can be deployed on an RD Session Host server. Using the tool and interpreting the results Keep the following in mind when using the Remote Desktop Services Application Analyzer: 1. This tool primarily focuses on issues relating to concurrent usage and privacy (due to a multi- user environment). The potential problems it highlights may not always manifest. Understanding this is critical to correctly interpreting and effectively using the results. That an application generates no errors does not mean, for example, that it is not resource- hungry.
7 2. Second, the problems that the Remote Desktop Services Application Analyzer identifies are not necessarily deal- breakers. This tool breaks down issues into several categories by issue type such as File or Registry. The tool also breaks down the issues into two severity levels: Warnings and Problems. Most of the time you should focus on the problems unless you are actually trying to pinpoint a problem source (which a developer or tester might do). It is important to understand that when the Remote Desktop Services Application Analyzer identifies a problem, the tool has detected that the application has made an API call that is not compatible with RD Session Host, but this call itself can be a part of a condition in the application. For example, it can say, Try to open this file as an administrator, but if you can t, then just open it as a normal user. The Remote Desktop Services Application Analyzer would still see that the application tried to open a file as an Administrator and it would flag a problem. The key point is that just because something shows up as a problem, it still requires interpretation to determine if it s a real problem. If you are a developer and want to develop your application to be compatible with Remote Desktop Services, you can use the tool as a guideline. For a detailed programming reference, see the Remote Desktop Services developer documentation (MSDN). Resources Installing Remote Desktop Session Host Step- by- Step Guide (Download Center) Remote Desktop Services Programming Guidelines (MSDN) Remote Desktop Services (TechNet) Remote Desktop Services product homepage (Microsoft.com) Managing Roaming User Data Deployment Guide (TechNet) Detecting the Remote Desktop Services Environment (MSDN) Using Remote Desktop Services Virtual Channels (MSDN) Published October Microsoft Corporation. All rights reserved.
Caching SMB Data for Offline Access and an Improved Online Experience
Caching SMB Data for Offline Access and an Improved Online Experience Agenda What is Offline Files How does Offline Files interact with SMB Offline Files enhancements for Windows 7 Questions 2 What is
Citrix Application Streaming. Universal Application Packaging and Delivery Breaking Away from Traditional IT
Citrix Application Streaming Universal Application Packaging and Delivery Breaking Away from Traditional IT Application Packaging Application Delivery to Endpoint Devices Application Isolation Mode Automatic
Remote Desktop Protocol Performance
MICROSOFT Remote Desktop Protocol Performance Presentation and Hosted Desktop Virtualization Team 10/13/2008 Contents Overview... 3 User Scenarios... 3 Test Setup... 4 Remote Desktop Connection Settings...
6WRUP:DWFK. Policies for Dedicated SQL Servers Group
OKENA 71 Second Ave., 3 rd Floor Waltham, MA 02451 Phone 781 209 3200 Fax 781 209 3199 6WRUP:DWFK Policies for Dedicated SQL Servers Group The sample policies shipped with StormWatch address both application-specific
System Management. What are my options for deploying System Management on remote computers?
Getting Started, page 1 Managing Assets, page 2 Distributing Software, page 3 Distributing Patches, page 4 Backing Up Assets, page 5 Using Virus Protection, page 6 Security, page 7 Getting Started What
Benefit. Allows you to integrate RES PowerFuse with application virtualization technologies other than SoftGrid (e.g. Citrix XenApp, VMWare Thinapp).
Core (1/2) Access Control Access to settings and applications can be based on Organizational Units in Directory Services like (Active Directory and Novell) or through users and groups in the domain. This
Table of Contents. 2015 Cicero, Inc. All rights protected and reserved.
Desktop Analytics Table of Contents Contact Center and Back Office Activity Intelligence... 3 Cicero Discovery Sensors... 3 Business Data Sensor... 5 Business Process Sensor... 5 System Sensor... 6 Session
NE-2273B Managing and Maintaining a Microsoft Windows Server 2003 Environment
NE-2273B Managing and Maintaining a Microsoft Windows Server 2003 Environment Summary Duration Vendor Audience 5 Days Microsoft IT Professionals Published Level Technology 05 October 2005 200 Microsoft
Windows Remote Access
Windows Remote Access A newsletter for IT Professionals Education Sector Updates Issue 1 I. Background of Remote Desktop for Windows Remote Desktop Protocol (RDP) is a proprietary protocol developed by
WhatsUp Gold v11 Features Overview
WhatsUp Gold v11 Features Overview This guide provides an overview of the core functionality of WhatsUp Gold v11, and introduces interesting features and processes that help users maximize productivity
User Reports. Time on System. Session Count. Detailed Reports. Summary Reports. Individual Gantt Charts
DETAILED REPORT LIST Track which users, when and for how long they used an application on Remote Desktop Services (formerly Terminal Services) and Citrix XenApp (known as Citrix Presentation Server). These
AdminToys Suite. Installation & Setup Guide
AdminToys Suite Installation & Setup Guide Copyright 2008-2009 Lovelysoft. All Rights Reserved. Information in this document is subject to change without prior notice. Certain names of program products
Assignment # 1 (Cloud Computing Security)
Assignment # 1 (Cloud Computing Security) Group Members: Abdullah Abid Zeeshan Qaiser M. Umar Hayat Table of Contents Windows Azure Introduction... 4 Windows Azure Services... 4 1. Compute... 4 a) Virtual
"Charting the Course... ... to Your Success!" MOC 50331 D Windows 7 Enterprise Desktop Support Technician Course Summary
Description Course Summary This course provides students with the knowledge and skills needed to isolate, document and resolve problems on a Windows 7 desktop or laptop computer. It will also help test
Building A Secure Microsoft Exchange Continuity Appliance
Building A Secure Microsoft Exchange Continuity Appliance Teneros, Inc. 215 Castro Street, 3rd Floor Mountain View, California 94041-1203 USA p 650.641.7400 f 650.641.7401 ON AVAILABLE ACCESSIBLE Building
RES PowerFuse Version Comparison Chart (1/9)
RES PowerFuse Version Comparison Chart (1/9) Alerting Allows you to set up notifications of specific events, which can consist of sending e-mails to one or more recipients, sending SNMP notifications (
How To Install An Aneka Cloud On A Windows 7 Computer (For Free)
MANJRASOFT PTY LTD Aneka 3.0 Manjrasoft 5/13/2013 This document describes in detail the steps involved in installing and configuring an Aneka Cloud. It covers the prerequisites for the installation, the
Desktop Management, Profile Migration and Cross Platform Delivery. Technical Overview
Desktop Management, Profile Migration and Cross Platform Delivery Executive Summary This document provides a technical overview of how AppSense Environment Manager can deliver a flexible and managed user
BroadWorks Receptionist
BroadWorks Receptionist Administration Guide Release 14.sp2 Document Version 1 220 Perry Parkway Gaithersburg, MD USA 20877 Tel +1 301.977.9440 Fax +1 301.977.8846 WWW.BROADSOFT.COM BroadWorks Guide Copyright
McAfee Endpoint Encryption for Files and Folders. Best Practices. For EEFF product version 4.0.0
McAfee Endpoint Encryption for Files and Folders Best Practices For EEFF product version 4.0.0 McAfee, Inc. McAfee, Inc., 2821 Mission College Blvd., Santa Clara, CA 95054, USA Tel: (+1) 888.847.8766 Internet:
PROPALMS TSE 6.0 March 2008
PROPALMS March 2008 An Analysis of and Terminal Services: Contents System Administration... 2 Server Management... 3 Application Management... 5 Security... 7 End User Experience... 8 Monitoring and Reporting...
Release Notes for Epilog for Windows Release Notes for Epilog for Windows v1.7/v1.8
Release Notes for Epilog for Windows v1.7/v1.8 InterSect Alliance International Pty Ltd Page 1 of 22 About this document This document provides release notes for Snare Enterprise Epilog for Windows release
Windows 7, Enterprise Desktop Support Technician
Course 50331D: Windows 7, Enterprise Desktop Support Technician Page 1 of 11 Windows 7, Enterprise Desktop Support Technician Course 50331D: 4 days; Instructor-Led Introduction This four-day instructor-ledcourse
Enterprise Solution for Remote Desktop Services... 2. System Administration... 3. Server Management... 4. Server Management (Continued)...
CONTENTS Enterprise Solution for Remote Desktop Services... 2 System Administration... 3 Server Management... 4 Server Management (Continued)... 5 Application Management... 6 Application Management (Continued)...
Windows 7, Enterprise Desktop Support Technician Course 50331: 5 days; Instructor-led
Lincoln Land Community College Capital City Training Center 130 West Mason Springfield, IL 62702 217-782-7436 www.llcc.edu/cctc Windows 7, Enterprise Desktop Support Technician Course 50331: 5 days; Instructor-led
50331D Windows 7, Enterprise Desktop Support Technician (Windows 10 Curriculum)
This course can be purchased by authorized Microsoft Learning Centers at the Courseware Marketplace web-site. Microsoft Certified Trainers (MCTs) can get a free copy at the same website. About the Course
Exhibit B5b South Dakota. Vendor Questions COTS Software Set
Appendix C Vendor Questions Anything t Applicable should be marked NA. Vendor Questions COTS Software Set Infrastructure 1. Typically the State of South Dakota prefers to host all systems. In the event
Dell High Availability Solutions Guide for Microsoft Hyper-V
Dell High Availability Solutions Guide for Microsoft Hyper-V www.dell.com support.dell.com Notes and Cautions NOTE: A NOTE indicates important information that helps you make better use of your computer.
Course Description. Course Audience. Course Outline. Course Page - Page 1 of 12
Course Page - Page 1 of 12 Windows 7 Enterprise Desktop Support Technician M-50331 Length: 5 days Price: $2,795.00 Course Description This five-day instructor-led course provides students with the knowledge
Pcounter Web Report 3.x Installation Guide - v2014-11-30. Pcounter Web Report Installation Guide Version 3.4
Pcounter Web Report 3.x Installation Guide - v2014-11-30 Pcounter Web Report Installation Guide Version 3.4 Table of Contents Table of Contents... 2 Installation Overview... 3 Installation Prerequisites
CITRIX 1Y0-A16 EXAM QUESTIONS & ANSWERS
CITRIX 1Y0-A16 EXAM QUESTIONS & ANSWERS Number: 1Y0-A16 Passing Score: 550 Time Limit: 165 min File Version: 37.5 http://www.gratisexam.com/ CITRIX 1Y0-A16 EXAM QUESTIONS & ANSWERS Exam Name: Architecting
Cisco Application Networking for Citrix Presentation Server
Cisco Application Networking for Citrix Presentation Server Faster Site Navigation, Less Bandwidth and Server Processing, and Greater Availability for Global Deployments What You Will Learn To address
TANDBERG MANAGEMENT SUITE 10.0
TANDBERG MANAGEMENT SUITE 10.0 Installation Manual Getting Started D12786 Rev.16 This document is not to be reproduced in whole or in part without permission in writing from: Contents INTRODUCTION 3 REQUIREMENTS
Intel DPDK Boosts Server Appliance Performance White Paper
Intel DPDK Boosts Server Appliance Performance Intel DPDK Boosts Server Appliance Performance Introduction As network speeds increase to 40G and above, both in the enterprise and data center, the bottlenecks
APPLICATION VIRTUALIZATION TECHNOLOGIES WHITEPAPER
APPLICATION VIRTUALIZATION TECHNOLOGIES WHITEPAPER Oct 2013 INTRODUCTION TWO TECHNOLOGY CATEGORIES Application virtualization technologies can be divided into two main categories: those that require an
Print Audit 6 Technical Overview
Print Audit 6 Technical Overview Print Audit 6 is the most accurate and powerful suite of print tracking and print management products available. It is used to analyze, reduce and recover costs along with
NetLeverage UK ThinPoint Solution Overview Version 2 Copyright 2012 NetLeverage UK
NetLeverage UK ThinPoint Solution Overview Version 2 Copyright 2012 NetLeverage UK 1. ThinPoint solution to Access your Own PC You require your business users to access their own PC in the office remotely
PEPPERDATA IN MULTI-TENANT ENVIRONMENTS
..................................... PEPPERDATA IN MULTI-TENANT ENVIRONMENTS technical whitepaper June 2015 SUMMARY OF WHAT S WRITTEN IN THIS DOCUMENT If you are short on time and don t want to read the
Automation Engine 14. Troubleshooting
4 Troubleshooting 2-205 Contents. Troubleshooting the Server... 3. Checking the Databases... 3.2 Checking the Containers...4.3 Checking Disks...4.4.5.6.7 Checking the Network...5 Checking System Health...
Simplify Suite in a VDI Environment
Simplify Suite in a VDI Environment Before jumping onto the VDI bandwagon, ensure a smooth transition. tricerat solves the problems you may face when transitioning to VDI. Andrew Parlette, VP of Product
Scaling out a SharePoint Farm and Configuring Network Load Balancing on the Web Servers. Steve Smith Combined Knowledge MVP SharePoint Server
Scaling out a SharePoint Farm and Configuring Network Load Balancing on the Web Servers Steve Smith Combined Knowledge MVP SharePoint Server Scaling out a SharePoint Farm and Configuring Network Load Balancing
White Paper. The Ten Features Your Web Application Monitoring Software Must Have. Executive Summary
White Paper The Ten Features Your Web Application Monitoring Software Must Have Executive Summary It s hard to find an important business application that doesn t have a web-based version available and
Maintaining a Microsoft Windows Server 2003 Environment
Maintaining a Microsoft Windows Server 2003 Environment Course number: 2275C Course lenght: 3 days Course Outline Module 1: Preparing to Administer a Server This module explains how to administer a server.
AKCess Pro Server Management Software
Management Software v.100.00x takes the best from IP Video Monitoring Software and is the first to combine it with Environmental / Security Sensor and Access Control equipment in one centralized management
Frequently Asked Questions
Table of contents 1. Agent Technology...3 1.1. Has the Knoa agent been tested with standard set of services on the PC?... 3 1.2. Do users need to do anything to activate the Agent?...3 1.3. Does the Knoa
FileMaker Server 15. Getting Started Guide
FileMaker Server 15 Getting Started Guide 2007 2016 FileMaker, Inc. All Rights Reserved. FileMaker, Inc. 5201 Patrick Henry Drive Santa Clara, California 95054 FileMaker and FileMaker Go are trademarks
Secure Network Communications FIPS 140 2 Non Proprietary Security Policy
Secure Network Communications FIPS 140 2 Non Proprietary Security Policy 21 June 2010 Table of Contents Introduction Module Specification Ports and Interfaces Approved Algorithms Test Environment Roles
Desktop Activity Intelligence
Desktop Activity Intelligence Table of Contents Cicero Discovery Delivers Activity Intelligence... 1 Cicero Discovery Modules... 1 System Monitor... 2 Session Monitor... 3 Activity Monitor... 3 Business
Media Server Installation & Administration Guide
Media Server Installation & Administration Guide Smarter Surveillance for a Safer World On-Net Surveillance Systems, Inc. One Blue Hill Plaza, 7 th Floor, PO Box 1555 Pearl River, NY 10965 Phone: (845)
Web Conferencing Version 8.3 Troubleshooting Guide
System Requirements General Requirements Web Conferencing Version 8.3 Troubleshooting Guide Listed below are the minimum requirements for participants accessing the web conferencing service. Systems which
GlobalSCAPE DMZ Gateway, v1. User Guide
GlobalSCAPE DMZ Gateway, v1 User Guide GlobalSCAPE, Inc. (GSB) Address: 4500 Lockhill-Selma Road, Suite 150 San Antonio, TX (USA) 78249 Sales: (210) 308-8267 Sales (Toll Free): (800) 290-5054 Technical
IT Essentials v4.1 LI 11.4.5 Upgrade and configure storage devices and hard drives. IT Essentials v4.1 LI 12.1.3 Windows OS directory structures
IT Essentials v4.1 LI 11.4.5 Upgrade and configure storage devices and hard drives 2.3 Disk management tools In Windows Vista and Windows 7, use the following path: Start > Start Search > type diskmgmt.msc
Print Audit 6 Technical Overview
Print Audit 6 Technical Overview Print Audit 6 is the most accurate and powerful suite of print tracking and print management products available. It is used to analyse, reduce and recover costs along with
Accelerating Microsoft Windows 7 migrations with Citrix XenApp
Citrix XenApp and Microsoft Windows 7 White Paper Accelerating Microsoft Windows 7 migrations with Citrix XenApp XenApp will accelerate your Windows 7 migration, save money and resources, minimize disruption
Symantec Mail Security for Domino
Getting Started Symantec Mail Security for Domino About Symantec Mail Security for Domino Symantec Mail Security for Domino is a complete, customizable, and scalable solution that scans Lotus Notes database
Load Testing and Monitoring Web Applications in a Windows Environment
OpenDemand Systems, Inc. Load Testing and Monitoring Web Applications in a Windows Environment Introduction An often overlooked step in the development and deployment of Web applications on the Windows
Windows Server 2008 R2 Remote Desktop Services
Microsoft Windows Server 2008 R2 Remote Desktop Services Resource Kit Christa Anderson and Kristin L. Griffin with the Remote Desktop Virtualization Team Acknowledgments Introduction xv xvii Chapter 1
6WRUP:DWFK. Policies for Dedicated IIS Web Servers Group. V2.1 policy module to restrict ALL network access
OKENA 71 Second Ave., 3 rd Floor Waltham, MA 02451 Phone 781 209 3200 Fax 781 209 3199 6WRUP:DWFK Policies for Dedicated IIS Web Servers Group The policies shipped with StormWatch address both application-specific
ThinPoint Quick Start Guide
ThinPoint Quick Start Guide 2 ThinPoint Quick Start Guide Table of Contents Part 1 Introduction 3 Part 2 ThinPoint Windows Host Installation 3 1 Compatibility... list 3 2 Pre-requisites... 3 3 Installation...
Detecting rogue systems
Product Guide Revision A McAfee Rogue System Detection 4.7.1 For use with epolicy Orchestrator 4.6.3-5.0.0 Software Detecting rogue systems Unprotected systems, referred to as rogue systems, are often
Hosting Users Guide 2011
Hosting Users Guide 2011 eofficemgr technology support for small business Celebrating a decade of providing innovative cloud computing services to small business. Table of Contents Overview... 3 Configure
Timbuktu Pro for Windows, version 8
Timbuktu Pro for Windows, version 8 Release Notes, version 8.6.8 May 2010 This document contains important information about Timbuktu Pro for Windows, version 8. If you have additional questions, consult
Building a Mobile App Security Risk Management Program. Copyright 2012, Security Risk Advisors, Inc. All Rights Reserved
Building a Mobile App Security Risk Management Program Your Presenters Who Are We? Chris Salerno, Consultant, Security Risk Advisors Lead consultant for mobile, network, web application penetration testing
Sawmill Log Analyzer Best Practices!! Page 1 of 6. Sawmill Log Analyzer Best Practices
Sawmill Log Analyzer Best Practices!! Page 1 of 6 Sawmill Log Analyzer Best Practices! Sawmill Log Analyzer Best Practices!! Page 2 of 6 This document describes best practices for the Sawmill universal
Table Of Contents. - Microsoft Windows - WINDOWS XP - IMPLEMENTING & SUPPORTING MICROSOFT WINDOWS XP PROFESSIONAL...10
Table Of Contents - - WINDOWS SERVER 2003 MAINTAINING AND MANAGING ENVIRONMENT...1 WINDOWS SERVER 2003 IMPLEMENTING, MANAGING & MAINTAINING...6 WINDOWS XP - IMPLEMENTING & SUPPORTING MICROSOFT WINDOWS
District of Columbia Courts Attachment 1 Video Conference Bridge Infrastructure Equipment Performance Specification
1.1 Multipoint Control Unit (MCU) A. The MCU shall be capable of supporting (20) continuous presence HD Video Ports at 720P/30Hz resolution and (40) continuous presence ports at 480P/30Hz resolution. B.
Wyse vworkspace Supports Higher Education s Desktop Virtualization Needs
Wyse vworkspace Supports Higher Education s Desktop Virtualization Needs Prepared by Chris Lyman, Senior Systems Consultant Dell cloud client-computing Solutions Abstract As interest in alternative approaches
Infor Web UI Sizing and Deployment for a Thin Client Solution
Infor Web UI Sizing and Deployment for a Thin Client Solution Copyright 2012 Infor Important Notices The material contained in this publication (including any supplementary information) constitutes and
Module 3: Resolve Software Failure This module explains how to fix problems with applications that have problems after being installed.
CÔNG TY CỔ PHẦN TRƯỜNG CNTT TÂN ĐỨC TAN DUC INFORMATION TECHNOLOGY SCHOOL JSC LEARN MORE WITH LESS! 50331 - Windows 7, Enterprise Desktop Support Technician Duration: 5 days About this Course This five-day
Contents. 1 Introduction 3 1.1 Purpose... 3 1.2 Target audience... 3 1.3 Overview... 3
Contents 1 Introduction 3 1.1 Purpose............................................ 3 1.2 Target audience........................................ 3 1.3 Overview...........................................
Windows Embedded Standard 7 Technical Overview
Windows Embedded Standard 7 Technical Overview Introduction Windows Embedded Standard 7 is the next generation platform in the product family that includes Windows XP Embedded and Windows Embedded Standard
Managing and Maintaining a Microsoft Windows Server 2003 Environment
Managing and Maintaining a Microsoft Windows Server 2003 Environment Course 2273: Five days; Blended (classroom/e-learning) Introduction Elements of this syllabus are subject to change. This course combines
Getting Started with Attunity CloudBeam for Azure SQL Data Warehouse BYOL
Getting Started with Attunity CloudBeam for Azure SQL Data Warehouse BYOL Overview This short guide explains how to use Attunity CloudBeam to replicate data from your on premises database to Microsoft
ArcGIS for Desktop Best Practices in a Citrix XenApp Environment. Jeff DeWeese Sr. Technical Architect Esri January 4, 2013
ArcGIS for Desktop Best Practices in a Citrix XenApp Environment Jeff DeWeese Sr. Technical Architect Esri January 4, 2013 Primer - How Compute Intensive is GIS? Processing Intensive (CPU) - Analysis and
Goverlan Remote Control
Goverlan Remote Control Feature Overview Goverlan Remote Control Powerful IT remote control, made easy Support, control and manage multiple users anywhere securely and seamlessly. With its powerful broadscope
OBSERVEIT DEPLOYMENT SIZING GUIDE
OBSERVEIT DEPLOYMENT SIZING GUIDE The most important number that drives the sizing of an ObserveIT deployment is the number of Concurrent Connected Users (CCUs) you plan to monitor. This document provides
Lync for Mac 2011 Deployment Guide
2011 Deployment Guide Getting Started Information in this document, including URL and other Internet Web site references, is subject to change without notice. Content in this document represents the current
Remote Network Accelerator
Remote Network Accelerator Evaluation Guide LapLink Software 10210 NE Points Drive Kirkland, WA 98033 Tel: (425) 952-6000 www.laplink.com LapLink Remote Network Accelerator Evaluation Guide Page 1 of 19
SysPatrol - Server Security Monitor
SysPatrol Server Security Monitor User Manual Version 2.2 Sep 2013 www.flexense.com www.syspatrol.com 1 Product Overview SysPatrol is a server security monitoring solution allowing one to monitor one or
Managing for the Long Term: Keys to Securing, Troubleshooting and Monitoring a Private Cloud
Deploying and Managing Private Clouds The Essentials Series Managing for the Long Term: Keys to Securing, Troubleshooting and Monitoring a Private Cloud sponsored by Managing for the Long Term: Keys to
Aqua Accelerated Protocol (AAP) For Mac User Manual
Aqua Accelerated Protocol (AAP) For Mac User Manual Table of Contents About Aqua Accelerated Protocol...3 System Requirements... 4 Hardware (Client)... 4 Hardware (Server Connecting to)... 4 Software (AAP
An Analysis of Propalms TSE and Microsoft Remote Desktop Services
An Analysis of TSE and Remote Desktop Services JULY 2010 This document illustrates how TSE can extend your Remote Desktop Services environment providing you with the simplified and consolidated management
Imaging Computing Server User Guide
Imaging Computing Server User Guide PerkinElmer, Viscount Centre II, University of Warwick Science Park, Millburn Hill Road, Coventry, CV4 7HS T +44 (0) 24 7669 2229 F +44 (0) 24 7669 0091 E [email protected]
The Evolved Office APPLICATION PLATFORM REQUIREMENTS. Release: 16.0
The Evolved Office APPLICATION PLATFORM REQUIREMENTS TM 989 Old Eagle School Road Suite 315 Wayne, PA 19087 USA 610.964.8000 www.evolveip.net Release: 16.0 Table of Contents The Evolved Office Assistant
Installing Windows XP Professional
CHAPTER 3 Installing Windows XP Professional After completing this chapter, you will be able to: Plan for an installation of Windows XP Professional. Use a CD to perform an attended installation of Windows
Version 3.8. Installation Guide
Version 3.8 Installation Guide Copyright 2007 Jetro Platforms, Ltd. All rights reserved. This document is being furnished by Jetro Platforms for information purposes only to licensed users of the Jetro
SiteCelerate white paper
SiteCelerate white paper Arahe Solutions SITECELERATE OVERVIEW As enterprises increases their investment in Web applications, Portal and websites and as usage of these applications increase, performance
CITRIX 1Y0-A14 EXAM QUESTIONS & ANSWERS
CITRIX 1Y0-A14 EXAM QUESTIONS & ANSWERS Number: 1Y0-A14 Passing Score: 800 Time Limit: 90 min File Version: 42.2 http://www.gratisexam.com/ CITRIX 1Y0-A14 EXAM QUESTIONS & ANSWERS Exam Name: Implementing
Server Consolidation with SQL Server 2008
Server Consolidation with SQL Server 2008 White Paper Published: August 2007 Updated: July 2008 Summary: Microsoft SQL Server 2008 supports multiple options for server consolidation, providing organizations
Analyzer 2.0. Installation Guide. Contents
Analyzer 2.0 Analyzer 2.0 is a comprehensive suite of tools designed to help you analyze complex aqueous and multisolvent electrolyte solution chemistry, thermophysical properties, phase behavior and corrosion
An overwhelming majority of IaaS clouds leverage virtualization for their foundation.
1 2 3 An overwhelming majority of IaaS clouds leverage virtualization for their foundation. 4 With the use of virtualization comes the use of a hypervisor. Normally, the hypervisor simply provisions resources
How To Set Up Foglight Nms For A Proof Of Concept
Page 1 of 5 Foglight NMS Overview Foglight Network Management System (NMS) is a robust and complete network monitoring solution that allows you to thoroughly and efficiently manage your network. It is
Remote Support Jumpoint Guide: Unattended Access to Computers in a Network 3. Requirements and Considerations to Install a Jumpoint 4.
Jumpoint Guide 2015 Bomgar Corporation. All rights reserved worldwide. BOMGAR and the BOMGAR logo are trademarks of Bomgar Corporation; other trademarks shown are the property of their respective owners.
OneStop Reporting 3.7 Installation Guide. Updated: 2013-01-31
OneStop Reporting 3.7 Installation Guide Updated: 2013-01-31 Copyright OneStop Reporting AS www.onestopreporting.com Table of Contents System Requirements... 1 Obtaining the Software... 2 Obtaining Your
SharePoint Performance Optimization
White Paper AX Series SharePoint Performance Optimization September 2011 WP_SharePoint_091511.1 TABLE OF CONTENTS 1 Introduction... 2 2 Executive Overview... 2 3 SSL Offload... 4 4 Connection Reuse...
WhatsUp Gold v11 Features Overview
WhatsUp Gold v11 Features Overview This guide provides an overview of the core functionality of WhatsUp Gold v11, and introduces interesting features and processes that help users maximize productivity
MCSE SYLLABUS. Exam 70-290 : Managing and Maintaining a Microsoft Windows Server 2003:
MCSE SYLLABUS Course Contents : Exam 70-290 : Managing and Maintaining a Microsoft Windows Server 2003: Managing Users, Computers and Groups. Configure access to shared folders. Managing and Maintaining
VMware ThinApp Agentless Application Virtualization Overview W HITE P APER
VMware ThinApp Agentless Application W HITE P APER VMware defines application virtualization as the ability to deploy software without modifying the host computer or making any changes to the local operating
INUVIKA OPEN VIRTUAL DESKTOP FOUNDATION SERVER
INUVIKA OPEN VIRTUAL DESKTOP FOUNDATION SERVER ARCHITECTURE OVERVIEW AND SYSTEM REQUIREMENTS Mathieu SCHIRES Version: 1.0.0 Published March 5, 2015 http://www.inuvika.com Contents 1 Introduction 3 2 Architecture
Citrix EdgeSight Administrator s Guide. Citrix EdgeSight for Endpoints 5.3 Citrix EdgeSight for XenApp 5.3
Citrix EdgeSight Administrator s Guide Citrix EdgeSight for Endpoints 5.3 Citrix EdgeSight for enapp 5.3 Copyright and Trademark Notice Use of the product documented in this guide is subject to your prior
