Automating client deployment
|
|
- Regina Bates
- 7 years ago
- Views:
Transcription
1 Automating client deployment 1
2 Copyright Datacastle Corporation All rights reserved. Datacastle is a registered trademark of Datacastle Corporation. Microsoft Windows is either a registered trademark of Microsoft Corporation or a trademark of the Microsoft group of companies. Other product and company names including Datacastle are trademarks of their respective owners. Mac OS X, Leopard, and Snow Leopard are trademarks of Apple Inc., registered in the U.S. and other countries. Distribution of substantively modified versions of this document is prohibited without the explicit permission of the copyright holder. Distribution of this work or derivative work in any standard (paper) book form for commercial purposes are prohibited unless prior permission is obtained from the copyright holder. DOCUMENTATION IS PROVIDED «AS IS» AND ALL EXPRESS OR IMPLIED CONDITIONS, REPRESENTATIONS AND WARRANTIES, INCLUDING ANY IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE OR NON- INFRINGEMENT, ARE DISCLAIMED, EXCEPT TO THE EXTENT THAT SUCH DISCLAIMERS ARE HELD TO BE LEGALLY INVALID. 2
3 Contents Automating client deployment... 4 Setting up the company for automated deployment... 4 Select policy... 4 Create activation code... 5 Create customized installation package... 6 Installing the software... 6 Pushing an MSI using Group Policy... 8 Create install point... 8 Installing management tools... 8 Create a test security group... 9 Create a Group Policy Object... 9 To retest a package Alternative deployment scenarios A few users who need different policies Big groups of users with different policies
4 Automating client deployment This document describes how to automate deployment of data protection across your organization. V6.0 or above required (vault and client). Setting up the company for automated deployment The first step is to configure the company in the vault to use automated deployment. Log in to the dashboard as a user with administrative access to the company and navigate to the company details page. Select policy The company needs to be configured to use a centrally managed policy so that devices will start backing up immediately when they are installed. Check that the policy is Enterprise- Centrally Managed as in this image: If it is not, change the policy: 1. Click the Edit company button on the top right 2. Select Enterprise- Centrally Managed in the Default policy set list shown below 3. Click Save changes 4
5 Create activation code Deployments are managed using activation codes. These control what happens when the installation runs. 1. Click the Activation codes tab 2. Click Add activation code 3. Click Enable creating users and devices. This option allows you to push out the installation to computers and users and devices will be automatically create as needed. When users are 5
6 created the system needs an address and name, so these need to be set up on your domain accounts. 4. A window will pop- up for more information on creating the users. Click Save changes to accept the default of creating the users under the All users group and to allow users to log in to the web retrieve site to access their backed up data. 5. Finally click on Add activation code to create the code. 6. Copy the activation code that was created for use in the next section. Create customized installation package To push out the installation via Active Directory Group Policy you will need an MSI package which is customized for your installation. Please contact support and give them the URL you use to connect to the dashboard and the activation code created in the previous section. They will create an MSI with the customized values. Installing the software To install the software across your organization you will want to push it using Active Directory group policy or another management system. However before you do this you should confirm that everything is working properly. Here are the steps: Install one machine interactively Install one machine silently manually Push the software automatically to a single machine Push the software out more broadly this could be to all machines or in stages depending on the size of your organization You need to use a test machine that is joined to the domain and log in as a domain user while doing these tests because the installation will get user information from the domain to use when creating the user in the vault. Install interactively Start by running the exe version of the installer. After the installation completes you will see the activation screen asking for the Activation Server URL and Activation Code. 6
7 Enter your vault URL in the Activation Server URL field. You should enter just the DNS name, unless you are using a trial non- SSL vault, in which case you need to enter Enter the company activation code created earlier in the Activation Code entry fields (note that you can paste the whole code into the first box and it will fill them all out). If the activation was successful you will see a success message. If there was a problem you will see a message that the activation code was invalid. Some reasons why this may happen: The code was entered incorrectly sometimes when copying an extra character may be added to the beginning, or the first character not copied The code is not for the correct vault this usually happens when you are testing using a trial vault but entered the URL for the production vault It was not able to find or create the user. The software needs to find the address for the current user on the machine. Sometimes when using a test environment this may not be possible for a number of reasons: o The machine is not domain joined, or you are logged on with a local account o The user s domain account doesn t have an address configured (common if you are using a test user or a test domain) Less commonly the user already has a device created for this machine and it is in the reset state. In this case it assumes you really want to re- activate that device to be able to restore data rather than create a new device (which you would do by entering the activation code from the specific device). Rename the existing device if you want to allow automatically creating a new device. Once activation is successful you will be able to go to the vault dashboard and see the newly activated device, under a newly created user if the user didn t already exist. Install silently To test the silent installation, you need use the MSI. Start an elevated command prompt by using run as administrator. If you already have the customized MSI, you just need to run that silently using the following command: msiexec /qn /i DCProtectInstall.msi If you don t yet have the customized MSI, then you can specify the customizations on the command line to test first. Note that the properties need to be specified in capitals as shown here: msiexec /qn /i DCProtectInstall.msi ACTIVATIONURL=vaulturl ACTIVATIONCODE=code SILENT=1 7
8 Once the install and activation has been successful you can see the device and user in the vault dashboard. You can uninstall so you can test again either manually from Control Panel or from the command line: msiexec /x DCProtectInstall.msi Pushing to a single machine Next you should push out the installation automatically, but just to the one machine so you can confirm success. If you are using a software management system to do this then follow your normal procedures. If you will be automating the deployment using Active Directory Group Policy then you will need to have the customized MSI with the activation information embedded in it ready at this point. This is because we need to pass the activation details and pushing using Active Directory doesn t have any capability to pass these using a command line, they need to be embedded in the MSI. Using the Group Policy instructions below, create a security group, place the single test machine into that group and then test deploying to that single machine. Pushing to more machines Once you are happy with the deployment to a single machine you can deploy to more machines. Usually this is done in batches, so you would do this by adding machine to the security group that you have been using to manage the deployment. You can also edit the filter on the GPO to add other groups if your machines are already in groups. Pushing an MSI using Group Policy Active Directory group policy can be used to push an MSI out to computers. It can only push a single MSI with no command line parameters, so all the activation information needs to be embedded into a custom MSI for your deployment. Contact Support with your activation information to get this customized MSI. Create install point The first step is to put the MSI somewhere where it is accessible to the computers you are deploying to, as a UNC path. You may already have a software installations share available where this can be placed. If not: 1. On a server on your network, create a folder SoftwarePackages 2. Right click the folder and click Share with then Specific people 3. Choose Everyone in the list then click Add (leave the permission level as Read) 4. Click Share 5. You now have that folder shared as \\servername\softwarepackages 6. Copy the MSI into this folder Installing management tools You will need some management tools to set up and test the group policy for the installation package - Active Directory Users and Computers and Group Policy Management. If you don t have these, here is how to get them: On Windows Server 2008 R2 8
9 1. Open Server Manager 2. Click Features 3. Click Add Features 4. Expand Remote Server Administration Tools, Role Administration Tools, AD DS and AD LDS Tools, AD DS Tools 5. Select AD DS Snap- Ins and Command- line tools 6. Back at the top level, select Group Policy Management 7. Click Next and finish the installation On client operating systems such as Windows 7 or 8 you need to install the Remote Server Administration Tools. o For Windows 8 see us/download/details.aspx?id=28972 o For Windows 7 see us/download/details.aspx?id=7887 Create a test security group Identify a computer that is joined to the domain to use for testing installations. While testing we want to make sure that only the test computer gets the package installed. To do this we will create a security group and add only our test computer into that group, using Active Directory Users and Computers. To create a testing security group: 1. Open Active Directory Users and Computers 2. Select your domain 3. Right click the domain, choose New then Group. You can do this inside an OU instead this is up to how you organize your domain. 4. Give the group a name. Follow any conventions your organization has for names, but including test is a good way to indicate to others that this shouldn t generally be used. 5. Check that Security is selected as the group type 6. Click Ok to create the group To add the computer to the group 1. Open the properties for the new group 2. Click the Members tab 3. Click Add 4. Click Object Types 5. Check Computers and uncheck the other types 6. Select the test computer a. Either enter the computer name in the box and clicking Check Names to confirm it was found b. Or click Advanced to search, enter criteria and click Find Now to find matching computers. Select the test computer in the list once found and click Ok to return 7. Click Ok to add the test computer to the group Create a Group Policy Object A group policy object is how you specify that the software should be deployed. Start by creating an empty policy and restricting the computers it should apply to: 9
10 1. Open Group Policy Management 2. Expand the tree expand the Forest, Domains and then the domain you are deploying to 3. If the computers you are deploying to are all under an OU then select that OU, if not (if they are just in Computers) then select the domain 4. Right click the selection and choose Create a GPO in this domain, and Link it here 5. Enter a name for the GPO and click OK to create it 6. Double click the new GPO (or select it in the tree) 7. On the Scope tab you restrict the objects this GPO applies to 8. Select Authenticated Users in the Security Filtering box 9. Click Remove to remove Authenticated Users from the list, and confirm 10. Click Add 11. Select the Security group created earlier for testing (type the name in or click Advanced to search) 12. Click Ok to add the group to the Security Filtering list Add package to GPO 1. Right click the GPO and select Edit. This opens the Group Policy Management Editor for this object 2. Expand Computer Configuration, Policies, Software Settings 3. Select Software installation 4. Right click Software installation and select New, Package 5. A file selection dialog opens. Select the installation package by navigating to the share created for installations. You need to use a UNC path here, even if the package is on a local drive because computers need to be able to download the package from this path. 6. In the Deploy Software dialog, make sure that Assigned is selected and then click Ok. The package is now set in policy and will deploy when the policy is applied. Software installation policies are only applied when the computer reboots so the next step is to test that it deploys to the test computer. 1. Restart the test computer 2. As it reboots you will see a message about the policy being applied and then installing the package 3. Restarting will take a little longer than usual as it installs, but once you can log in to the computer you should see that it is installed (the icon will be on the desktop for example) 4. Log on to the test computer You need to log on as the last step here because when the computer restarts the software is installed but probably not yet be activated. If you are automatically creating users and devices, or creating devices under detected users, then the software will activate only after it can determine the user of the computer, which means after a user logs on. Activation will not happen immediately after you log on because it has built in delays. After about 1 minute the user information will be passed to the service. It will then wait up to 10 minutes to try to activate. You can restart the Data Protection service to accelerate this. 10
11 To retest a package Once you have deployed the package to a test computer, here is how to get back to the uninstalled state and ensure the package will be pushed to the computer again. 1. Remove the computer from the security group that applies the policy in Active Directory Users and Computer, open the computer properties, go to the Member of tab, select the security group and click Remove 2. On the test computer, login and manually uninstall the application 3. Reboot to ensure the removal of the policy has been processed Now the test computer is ready to be put back into the security group and be restarted to get a new installation. Alternative deployment scenarios The previous sections show one deployment scenario automatically creating users and devices with all devices getting the same policy. This section will identify some other scenarios and what to change to deploy in those scenarios. A few users who need different policies This scenario is common when there is a small group that needs a different policy to the majority, such as an Executives policy. To enable this scenario: Create a user group for the Executives (or whatever group needs the different policy) Set the default policy on the user group to the policy for the executives Manually create user accounts in that group for the users who should have this policy Proceed as above to deploy devices As devices activate they will look to see if the user already exists. For most users the answer will be no, and so the users will get automatically created under the main user group and will get the policy set on the company. For the executives, the user accounts will be found and devices created under those users. These devices will pick up the specialized policy from their user group. Big groups of users with different policies If more than a few users need different policies, you should follow much the same process as for a few, but you won t want to create the users manually. For this scenario you should import either all users, or all who are not on the standard policy. Create a user group for each group that you need and set their default policies Go to Import users from the Company details page Download the template spreadsheet Fill out the spreadsheet, specifying the correct user group for each user Import the list of users Proceed with the deployment as above This time you have automatically created users into groups with specific policies and so their devices will get the correct policies as they activate. Any users you didn t import will be created during the deployment and get the default policy. 11
HOW TO SILENTLY INSTALL CLOUD LINK REMOTELY WITHOUT SUPERVISION
HOW TO SILENTLY INSTALL CLOUD LINK REMOTELY WITHOUT SUPERVISION Version 1.1 / Last updated November 2012 INTRODUCTION The Cloud Link for Windows client software is packaged as an MSI (Microsoft Installer)
More informationUser Document. Adobe Acrobat 7.0 for Microsoft Windows Group Policy Objects and Active Directory
Adobe Acrobat 7.0 for Microsoft Windows Group Policy Objects and Active Directory Copyright 2005 Adobe Systems Incorporated. All rights reserved. NOTICE: All information contained herein is the property
More informationFor Active Directory Installation Guide
For Active Directory Installation Guide Version 2.5.2 April 2010 Copyright 2010 Legal Notices makes no representations or warranties with respect to the contents or use of this documentation, and specifically
More informationAdobe Acrobat 9 Deployment on Microsoft Windows Group Policy and the Active Directory service
Adobe Acrobat 9 Deployment on Microsoft Windows Group Policy and the Active Directory service white paper TABLE OF CONTENTS 1. Document overview......... 1 2. References............. 1 3. Product overview..........
More informationInstallation Manual (MSI Version)
Installation Manual (MSI Version) 1. SYSTEM REQUIREMENTS... 2 2. INSTALLATION INSTRUCTIONS... 2 2.1 REMOTE INSTALLATION USING GROUP POLICY... 2 2.1.1 Assigning Software...2 2.1.2 Publishing Software...2
More informationIBM Connections Plug-In for Microsoft Outlook Installation Help
IBM Connections Version 5 IBM Connections Plug-In for Microsoft Outlook Installation Help Edition Notice Note: Before using this information and the product it supports, read the information in "Notices."
More informationXMap 7 Administration Guide. Last updated on 12/13/2009
XMap 7 Administration Guide Last updated on 12/13/2009 Contact DeLorme Professional Sales for support: 1-800-293-2389 Page 2 Table of Contents XMAP 7 ADMINISTRATION GUIDE... 1 INTRODUCTION... 5 DEPLOYING
More informationMailStore Outlook Add-in Deployment
MailStore Outlook Add-in Deployment A MailStore Server installation deploys the MailStore Outlook Add-in as a Windows Installer package (MSI) that can be installed on client machines using software distribution.
More informationTool Tip. SyAM Management Utilities and Non-Admin Domain Users
SyAM Management Utilities and Non-Admin Domain Users Some features of SyAM Management Utilities, including Client Deployment and Third Party Software Deployment, require authentication credentials with
More informationSharpdesk V3.5. Push Installation Guide for system administrator Version 3.5.01
Sharpdesk V3.5 Push Installation Guide for system administrator Version 3.5.01 Copyright 2000-2015 by SHARP CORPORATION. All rights reserved. Reproduction, adaptation or translation without prior written
More informationDeployment of Keepit for Windows
Deployment of Keepit for Windows Keepit A/S October 13, 2010 1 Introduction When deploying Keepit in larger setups with many desktops and servers, installing Keepit individually on each computer is cumbersome
More informationDriveLock Quick Start Guide
Be secure in less than 4 hours CenterTools Software GmbH 2012 Copyright Information in this document, including URL and other Internet Web site references, is subject to change without notice. Unless otherwise
More information4cast Client Specification and Installation
4cast Client Specification and Installation Version 2015.00 10 November 2014 Innovative Solutions for Education Management www.drakelane.co.uk System requirements The client requires Administrative rights
More informationSETTING UP ACTIVE DIRECTORY (AD) ON WINDOWS 2008 FOR DOCUMENTUM @ EROOM
SETTING UP ACTIVE DIRECTORY (AD) ON WINDOWS 2008 FOR DOCUMENTUM @ EROOM Abstract This paper explains how to setup Active directory service on windows server 2008.This guide also explains about how to install
More informationEventTracker: Support to Non English Systems
EventTracker: Support to Non English Systems Publication Date: April 25, 2012 EventTracker 8815 Centre Park Drive Columbia MD 21045 www.eventtracker.com Introduction This document has been prepared to
More informationTest Note Phone Manager Deployment Windows Group Policy Sever 2003 and XP SPII Clients
Test Note Phone Manager Deployment Windows Group Policy Sever 2003 and XP SPII Clients Note: I have only tested these procedures on Server 2003 SP1 (DC) and XP SPII client, in a controlled lab environment,
More informationAutograph 3.3 Network Installation
Eastmond Publishing Ltd (Autograph) PO Box 46, Oundle, Peterborough, PE8 4JX, UK Tel: +44 (0)1832 273444 Fax: +44 (0)1832 273529 Email: support@autograph-maths.com Web: www.autograph-maths.com Technical
More informationWeb-Access Security Solution
WavecrestCyBlock Client Version 2.1.13 Web-Access Security Solution UserGuide www.wavecrest.net Copyright Copyright 1996-2014, Wavecrest Computing, Inc. All rights reserved. Use of this product and this
More informationHow to - Install EventTracker and Change Audit Agent
How to - Install EventTracker and Change Audit Agent Agent Deployment User Manual Publication Date: Oct.17, 2015 EventTracker 8815 Centre Park Drive Columbia MD 21045 www.eventtracker.com Abstract EventTracker
More informationTrusted Stackware series. Rev. 1.0.2. D.O.I-Net Co., Ltd. Document No.:TST-10-002E
TruMonitor Client Setup Guide Rev. 1.0.2 D.O.I-Net Co., Ltd. Document No.:TST-10-002E Disclaimers 1. D.O.I-Net Co., Ltd. shall not take responsibility for any direct and indirect damage caused by the descriptions
More informationUniversal Management Service 2015
Universal Management Service 2015 UMS 2015 Help All rights reserved. No parts of this work may be reproduced in any form or by any means - graphic, electronic, or mechanical, including photocopying, recording,
More informationDeploying the DisplayLink Software using the MSI files
How to deploy DisplayLink MSI files in a corporate environment with GPO or SCCM Go to: http://support.displaylink.com/knowledgebase/articles/615840 Introduction Or This article is intended to give a Windows
More informationCreating Home Directories for Windows and Macintosh Computers
ExtremeZ-IP Active Directory Integrated Home Directories Configuration! 1 Active Directory Integrated Home Directories Overview This document explains how to configure home directories in Active Directory
More informationActive Directory Software Deployment
APPLICATION N0TE ST-0128 March 24, 2006 Product: Active Directory / PCM Deployment System version: ShoreTel 6 Active Directory Software Deployment Courtesy of: Dylan Moser with LANtelligence Inc. This
More informationSymantec AntiVirus Corporate Edition Patch Update
Symantec AntiVirus Corporate Edition Patch Update Symantec AntiVirus Corporate Edition Update Documentation version 10.0.1.1007 Copyright 2005 Symantec Corporation. All rights reserved. Symantec, the Symantec
More informationDistributing EmailSMS v2.0
Distributing EmailSMS v2.0 1) Requirements Windows 2000/XP and Outlook 2000, 2002 or 2003, Microsoft.NET Framework v 2).NET Framework V 1 Rollout Microsoft.NET Framework v1 needed to run EmailSMS v2.0.
More informationHow To Install Outlook Addin On A 32 Bit Computer
Deployment Guide - Outlook Add-In www.exclaimer.com Contents About This Guide... 3 System Requirements... 4 Software... 4 Installation Files... 5 Deployment Preparation... 6 Installing the Add-In Manually...
More informationDownload/Install IDENTD
Download/Install IDENTD IDENTD is the small software program that must be installed on each user s computer if multiple filters are to be used in ComSifter. The program may be installed and executed locally
More informationNovell ZENworks 10 Configuration Management SP3
AUTHORIZED DOCUMENTATION Software Distribution Reference Novell ZENworks 10 Configuration Management SP3 10.3 November 17, 2011 www.novell.com Legal Notices Novell, Inc., makes no representations or warranties
More informationSMART Sync 2011. Windows operating systems. System administrator s guide
SMART Sync 2011 Windows operating systems System administrator s guide Trademark notice SMART Sync, smarttech and the SMART logo are trademarks or registered trademarks of SMART Technologies ULC in the
More informationUser Guide. Version 3.2. Copyright 2002-2009 Snow Software AB. All rights reserved.
Version 3.2 User Guide Copyright 2002-2009 Snow Software AB. All rights reserved. This manual and computer program is protected by copyright law and international treaties. Unauthorized reproduction or
More informationNetSpective Logon Agent Guide for NetAuditor
NetSpective Logon Agent Guide for NetAuditor The NetSpective Logon Agent The NetSpective Logon Agent is a simple application that runs on client machines on your network to inform NetSpective (and/or NetAuditor)
More informationHELP DOCUMENTATION E-SSOM DEPLOYMENT GUIDE
HELP DOCUMENTATION E-SSOM DEPLOYMENT GUIDE Copyright 1998-2013 Tools4ever B.V. All rights reserved. No part of the contents of this user guide may be reproduced or transmitted in any form or by any means
More informationPassword Manager Windows Desktop Client
Password Manager Windows Desktop Client EmpowerID provides an extension that allows organizations to plug into Password Manager to customize the Windows logon experience beyond that supplied by the standard
More informationAcronis Backup & Recovery 11.5 Quick Start Guide
Acronis Backup & Recovery 11.5 Quick Start Guide Applies to the following editions: Advanced Server for Windows Virtual Edition Advanced Server SBS Edition Advanced Workstation Server for Linux Server
More informationVersion 5.0. SurfControl Web Filter for Citrix Installation Guide for Service Pack 2
Version 5.0 SurfControl Web Filter for Citrix Installation Guide for Service Pack 2 NOTICES Updates to the SurfControl documentation and software, as well as Support information are available at www.surfcontrol.com/support.
More informationSymantec Enterprise Vault
Symantec Enterprise Vault Guide for Mac OS X Users 10.0 Symantec Enterprise Vault: Guide for Mac OS X Users The software described in this book is furnished under a license agreement and may be used only
More informationOUTLOOK ADDIN V1.5 ABOUT THE ADDIN
OUTLOOK ADDIN V1.5 ABOUT THE ADDIN The SpamTitan Outlook Addin v1.5 allows reporting of SPAM and HAM messages to the SpamTitan appliance, these messages are then examined by the SpamTitan Bayesian filter
More informationAutomatic Network Deployment
White paper Automatic Network Deployment Easy way to manage add-in deployment February 2012 Version 1.3 Standss (South Pacific) Limited Contents Introduction... 3 Getting Started... 3 Installing MSI Package
More informationNetBackup Backup, Archive, and Restore Getting Started Guide
NetBackup Backup, Archive, and Restore Getting Started Guide UNIX, Windows, and Linux Release 6.5 Veritas NetBackup Backup, Archive, and Restore Getting Started Guide Copyright 2007 Symantec Corporation.
More informationMoxa Device Manager 2.0 User s Guide
First Edition, March 2009 www.moxa.com/product 2009 Moxa Inc. All rights reserved. Reproduction without permission is prohibited. Moxa Device Manager 2.0 User Guide The software described in this manual
More informationPowerMapper/SortSite Desktop Deployment Guide v2.11. 1. Introduction
PowerMapper/SortSite Desktop Deployment Guide v2.11 1. Introduction... 1 2. Architecture... 2 3. Independent Certification... 2 4. Setup.exe Command Line... 2 5. Registry Settings... 3 6. Deployment using
More informationPromap V4 ActiveX MSI File
Promap V4 ActiveX MSI File Contents What is an MSI File? Promap V4 MSI Main Advantage Installation via Group Policy (Windows Server 2000) Installation via Group Policy (Windows Server 2003) What is an
More informationUser Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream
User Manual Onsight Management Suite Version 5.1 Another Innovation by Librestream Doc #: 400075-06 May 2012 Information in this document is subject to change without notice. Reproduction in any manner
More informationAbout This Guide... 4. Signature Manager Outlook Edition Overview... 5
Contents About This Guide... 4 Signature Manager Outlook Edition Overview... 5 How does it work?... 5 But That's Not All...... 6 And There's More...... 6 Licensing... 7 Licensing Information... 7 System
More informationSystem Area Management Software Tool Tip: Agent Deployment utilizing. the silent installation with Active Directory
System Area Management Software Tool Tip: Agent Deployment utilizing the silent installation with Active Directory Table of Contents Introduction... 3 Prerequisites... 3 Windows 2003 Server... 3 Using
More informationAdministration Quick Start
www.novell.com/documentation Administration Quick Start ZENworks 11 Support Pack 3 February 2014 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of
More informationInstalling LearningBay Enterprise Part 2
Installing LearningBay Enterprise Part 2 Support Document Copyright 2012 Axiom. All Rights Reserved. Page 1 Please note that this document is one of three that details the process for installing LearningBay
More informationACTIVE DIRECTORY DEPLOYMENT
ACTIVE DIRECTORY DEPLOYMENT CASAS Technical Support 800.255.1036 2009 Comprehensive Adult Student Assessment Systems. All rights reserved. Version 031809 CONTENTS 1. INTRODUCTION... 1 1.1 LAN PREREQUISITES...
More informationSpecops Command. Installation Guide
Specops Software. All right reserved. For more information about Specops Command and other Specops products, visit www.specopssoft.com Copyright and Trademarks Specops Command is a trademark owned by Specops
More informationPC Power Down. MSI Deployment Guide
PC Power Down MSI Deployment Guide 1. Introduction 1.1. Outline The client software for PC Power Down can be pushed out across a network, saving the effort of individually visiting each computer to install
More informationMDM Mass Configuration Tool User s Manual
User s Manual First Edition, October 2010 www.moxa.com/product 2010 Moxa Inc. All rights reserved. Reproduction without permission is prohibited. User s Manual The software described in this manual is
More informationTechnical Support Set-up Procedure
Technical Support Set-up Procedure How to Setup the Amazon S3 Application on the DSN-320 Amazon S3 (Simple Storage Service) is an online storage web service offered by AWS (Amazon Web Services), and it
More informationThinManager and Active Directory
ThinManager and Active Directory Use the F1 button on any page of a ThinManager wizard to launch Help for that page. Visit http://www.thinmanager.com/kb/index.php/special:allpages for a list of Knowledge
More informationSQL Express to SQL Server Database Migration Goliath Performance Monitor v11.5
Goliath Performance Monitor v11.5 (v11.5) July 2015 www.goliathtechnologies.com Legal Notices Guide for Goliath Performance Monitor v11.5 Copyright 2014 Goliath Technologies Inc. All rights reserved. www.goliathtechnologies.com
More informationEnterprise Vault Installing and Configuring
Enterprise Vault Installing and Configuring Enterprise Vault 6.0 Legal Notice Copyright 2005 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, VERITAS, the VERITAS Logo, and Enterprise
More informationProject management integrated into Outlook
y Project management integrated into Outlook InLoox PM 7.x deployment via Group Policy An InLoox Whitepaper Published: October 2011 You can find up-to-date information at http://www.inloox.com The information
More informationTECHNICAL DOCUMENTATION SPECOPS DEPLOY / APP 4.7 DOCUMENTATION
TECHNICAL DOCUMENTATION SPECOPS DEPLOY / APP 4.7 DOCUMENTATION Contents 1. Getting Started... 4 1.1 Specops Deploy Supported Configurations... 4 2. Specops Deploy and Active Directory...5 3. Specops Deploy
More informationComodo MyDLP Software Version 2.0. Endpoint Installation Guide Guide Version 2.0.010215. Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013
Comodo MyDLP Software Version 2.0 Endpoint Installation Guide Guide Version 2.0.010215 Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013 Table of Contents 1.About MyDLP... 3 1.1.MyDLP Features...
More informationWindows Firewall Configuration with Group Policy for SyAM System Client Installation
with Group Policy for SyAM System Client Installation SyAM System Client can be deployed to systems on your network using SyAM Management Utilities. If Windows Firewall is enabled on target systems, it
More informationNetIQ Advanced Authentication Framework. FIDO U2F Authentication Provider Installation Guide. Version 5.1.0
NetIQ Advanced Authentication Framework FIDO U2F Authentication Provider Installation Guide Version 5.1.0 Table of Contents 1 Table of Contents 2 Introduction 3 About This Document 3 System Requirements
More informationSophos for Microsoft SharePoint startup guide
Sophos for Microsoft SharePoint startup guide Product version: 2.0 Document date: March 2011 Contents 1 About this guide...3 2 About Sophos for Microsoft SharePoint...3 3 System requirements...3 4 Planning
More informationContentWatch Auto Deployment Tool
ContentWatch Auto Deployment Tool ContentWatch gives administrators the ability to easily distribute ContentProtect (or say our products) over any network. With our Unattended Installer you can install
More informationSpamTitan Outlook Addin V2.0
SpamTitan Outlook Addin V2.0 The SpamTitan Outlook Addin v2.0 allows users to do a varity of spam filtering management from the outlook client, including Report Spam and Ham messages to the SpamTitan Bayesian
More information2X ApplicationServer & LoadBalancer Manual
2X ApplicationServer & LoadBalancer Manual 2X ApplicationServer & LoadBalancer Contents 1 URL: www.2x.com E-mail: info@2x.com Information in this document is subject to change without notice. Companies,
More informationDisplayLink Corporate Install Guide
This document s classification is: Public This means: It can be freely distributed to Customers without an NDA needing to be in place Document Analysis Title Document number DisplayLink Corporate Install
More informationServer Installation Guide ZENworks Patch Management 6.4 SP2
Server Installation Guide ZENworks Patch Management 6.4 SP2 02_016N 6.4SP2 Server Installation Guide - 2 - Notices Version Information ZENworks Patch Management Server Installation Guide - ZENworks Patch
More informationGuide to deploy MyUSBOnly via Windows Logon Script Revision 1.1. Menu
Menu INTRODUCTION...2 HOW DO I DEPLOY MYUSBONLY ON ALL OF MY COMPUTERS...3 ADMIN KIT...4 HOW TO SETUP A LOGON SCRIPTS...5 Why would I choose one method over another?...5 Can I use both methods to assign
More informationGetting Microsoft Outlook and Salesforce in Sync
Getting Microsoft Outlook and Salesforce in Sync Salesforce, Summer 15 @salesforcedocs Last updated: July 1, 2015 Copyright 2000 2015 salesforce.com, inc. All rights reserved. Salesforce is a registered
More informationInstalling Client GPO Software
NetVanta Unified Communications Technical Note Installing Client GPO Software Client Software Installation Using Group Policy Objects This section describes how to deploy the client software using Group
More informationAdministration guide. Océ LF Systems. Connectivity information for Scan-to-File
Administration guide Océ LF Systems Connectivity information for Scan-to-File Copyright 2014, Océ All rights reserved. No part of this work may be reproduced, copied, adapted, or transmitted in any form
More informationActive Directory integration with CloudByte ElastiStor
Active Directory integration with CloudByte ElastiStor Prerequisite Change the time and the time zone of the Active Directory Server to the VSM time and time zone. Enabling Active Directory at VSM level
More informationAdministration Guide. . All right reserved. For more information about Specops Deploy and other Specops products, visit www.specopssoft.
. All right reserved. For more information about Specops Deploy and other Specops products, visit www.specopssoft.com Copyright and Trademarks Specops Deploy is a trademark owned by Specops Software. All
More informationInstallation Guide. . All right reserved. For more information about Specops Deploy and other Specops products, visit www.specopssoft.
. All right reserved. For more information about Specops Deploy and other Specops products, visit www.specopssoft.com Copyright and Trademarks Specops Deploy is a trademark owned by Specops Software. All
More informationManagement Utilities Configuration for UAC Environments
Management Utilities Configuration for UAC Environments For optimal use of SyAM Management Utilities, Windows client machines should be configured with User Account Control disabled or set to the least
More informationDell Recovery Manager for Active Directory 8.6. Quick Start Guide
Dell Recovery Manager for Active Directory 8.6 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished
More informationSELF SERVICE RESET PASSWORD MANAGEMENT GPO DISTRIBUTION GUIDE
SELF SERVICE RESET PASSWORD MANAGEMENT GPO DISTRIBUTION GUIDE Copyright 1998-2015 Tools4ever B.V. All rights reserved. No part of the contents of this user guide may be reproduced or transmitted in any
More informationMSI Admin Tool User Guide
MSI Admin Tool User Guide Introduction The MSI Admin Tool is a utility which allows you to pre-configure your Read&Write installation package prior to installation. The tool is primarily designed to be
More informationMoxa Device Manager 2.3 User s Manual
User s Manual Third Edition, March 2011 www.moxa.com/product 2011 Moxa Inc. All rights reserved. User s Manual The software described in this manual is furnished under a license agreement and may be used
More informationSubversion Server for Windows
Subversion Server for Windows VisualSVN Team VisualSVN Server: Subversion Server for Windows VisualSVN Team Copyright 2005-2008 VisualSVN Team Windows is a registered trademark of Microsoft Corporation.
More informationHow To Manage Storage With Novell Storage Manager 3.X For Active Directory
www.novell.com/documentation Installation Guide Novell Storage Manager 4.1 for Active Directory September 10, 2015 Legal Notices Condrey Corporation makes no representations or warranties with respect
More informationCS WinOMS Practice Management Software Server Migration Help Guide
CS WinOMS Practice Management Software Server Migration Help Guide Checklist Prior to Beginning a Server Migration: A. The CS WinOMS install disk. Install files can be downloaded to server via FTP, contact
More informationWindows Clients and GoPrint Print Queues
Windows Clients and GoPrint Print Queues Overview The following tasks demonstrate how to configure shared network printers on Windows client machines in a Windows Active Directory Domain and Workgroup
More informationStep-by-step installation guide for monitoring untrusted servers using Operations Manager ( Part 3 of 3)
Step-by-step installation guide for monitoring untrusted servers using Operations Manager ( Part 3 of 3) Manual installation of agents and importing the SCOM certificate to the servers to be monitored:
More informationProject management integrated into Outlook
y Project management integrated into Outlook InLoox 6.x deployment via Group Policy An InLoox Whitepaper Published: February 2011 You can find up-to-date information at http://www.inloox.com The information
More informationInstallation Guide. . All right reserved. For more information about Specops Inventory and other Specops products, visit www.specopssoft.
. All right reserved. For more information about Specops Inventory and other Specops products, visit www.specopssoft.com Copyright and Trademarks Specops Inventory is a trademark owned by Specops Software.
More informationPrint Audit 6 Network Installation Guide
Print Audit 6 Network Installation Guide IMPORTANT: READ THIS BEFORE PERFORMING A PRINT AUDIT 6 INSTALLATION Print Audit 6 is a desktop application that you must install on every computer where you want
More informationSARANGSoft WinBackup Business v2.5 Client Installation Guide
SARANGSoft WinBackup Business v2.5 Client Installation Guide (November, 2015) WinBackup Business Client is a part of WinBackup Business application. It runs in the background on every client computer that
More informationDownloading and Mass Deploying Applications
Downloading and Mass Deploying Applications Use of this product requires additional applications that must be downloaded to your users' computers. You can download and mass deploy these applications using
More informationAras Innovator.NET Client Security Policy Configuration
Aras Innovator.NET Client Security Policy Configuration Aras Innovator 9.1 Document #: 9.1.009022008 Last Modified: 3/17/2009 Aras Corporation ARAS CORPORATION Copyright 2009 Aras Corporation 300 Brickstone
More informationWelcome to the QuickStart Guide
QuickStart Guide Welcome to the QuickStart Guide This QuickStart Guide provides the information you need to install and start using Express Software Manager. For more comprehensive help on using Express
More informationNetIQ. How to guides: AppManager v7.04 Initial Setup for a trial. Haf Saba Attachmate NetIQ. Prepared by. Haf Saba. Senior Technical Consultant
How to guides: AppManager v7.04 Initial Setup for a trial By NetIQ Prepared by Haf Saba Senior Technical Consultant Asia Pacific 1 Executive Summary This document will walk you through an initial setup
More informationConsolidated Monitoring, Analysis and Automated Remediation For Hybrid IT Infrastructures. Goliath Performance Monitor Installation Guide v11.
Consolidated Monitoring, Analysis and Automated Remediation For Hybrid IT Infrastructures Goliath Performance Monitor Installation Guide v11.5 (v11.5) Document Date: March 2015 www.goliathtechnologies.com
More informationUsing Group Policies to Install AutoCAD. CMMU 5405 Nate Bartley 9/22/2005
Using Group Policies to Install AutoCAD CMMU 5405 Nate Bartley 9/22/2005 Before we get started This manual provides a step-by-step process for creating a Group Policy that will install AutoCAD to a Windows
More informationCreate, Link, or Edit a GPO with Active Directory Users and Computers
How to Edit Local Computer Policy Settings To edit the local computer policy settings, you must be a local computer administrator or a member of the Domain Admins or Enterprise Admins groups. 1. Add the
More informationTIBCO Spotfire Metrics Prerequisites and Installation
TIBCO Spotfire Metrics Prerequisites and Installation Software Release 6.0 November 2013 Two-Second Advantage 2 Important Information SOME TIBCO SOFTWARE EMBEDS OR BUNDLES OTHER TIBCO SOFTWARE. USE OF
More informationSymantec PGP Whole Disk Encryption Hands-On Lab V 3.7
Symantec PGP Whole Disk Encryption Hands-On Lab V 3.7 Description This hands-on lab session covers the hard drive encryption technologies from PGP. Students will administer a typical Whole Disk Encryption
More informationDell Statistica 13.0. Statistica Enterprise Installation Instructions
Dell Statistica 13.0 2015 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license or
More informationParallels Panel. Parallels Small Business Panel 10.2: User's Guide. Revision 1.0
Parallels Panel Parallels Small Business Panel 10.2: User's Guide Revision 1.0 Copyright Notice ISBN: N/A Parallels 660 SW 39 th Street Suite 205 Renton, Washington 98057 USA Phone: +1 (425) 282 6400 Fax:
More informationInstallation and Deployment
Installation and Deployment Help Documentation This document was auto-created from web content and is subject to change at any time. Copyright (c) 2016 SmarterTools Inc. Installation and Deployment SmarterStats
More information