Administration Guide. . All right reserved. For more information about Specops Inventory and other Specops products, visit

Size: px
Start display at page:

Download "Administration Guide. . All right reserved. For more information about Specops Inventory and other Specops products, visit www.specopssoft."

Transcription

1 . All right reserved. For more information about Specops Inventory and other Specops products, visit

2 Copyright and Trademarks Specops Inventory is a trademark owned by Specops Software. All other trademarks used and mentioned in this document belong to their respective owners. 2

3 Contents Key Components 5 Group Policy Editor Snap-In 6 Edit inventory settings 7 Specops Configuration Tool 12 Computers 12 License 12 Specops Reporting 14 View predefined Reports 14 Create a new report 15 Edit an existing report 15 Export Report data 15 Delete a Report 16 3

4 About Specops Inventory Specops Inventory is a Group Policy based inventory solution that leverages your existing infrastructure to provide a new level of functionality in Windows asset management. You can use Specops Inventory to collect and report information on hardware, software, registry, user settings, operating system, security data, and Active Directory data. Specops inventory provides you with tools to help you with your license compliance needs. 4

5 Key components Specops Inventory can be configured from any computer in the domain where the Administration Tools are installed. The Specops Inventory Administration Tools consist of the following components: Group Policy Editor Snap-in: You can use the Group Policy Editor Snap-in to configure what information the Specops Inventory Group Policy Client Side Extension should collect and send to the Specops Inventory Server. Specops Configuration Tool: You can use the Specops Configuration Tool to import your license keys and monitor the status of your Client Side Extensions. You can also use the following component to administer Specops Inventory: Specops Reporting: You can use Specops Reporting to view and create detailed inventory reports. 5

6 Group Policy Editor snap-in The Group Policy snap-in, installed with the Administration Tools, allows you to configure what information the Specops Inventory Group Policy Client Side Extension should collect and send to the Specops Inventory Server. Information about what to collect during inventory is stored in Group Policy Objects. You can collect information from either the computers and/or the users. 6

7 Edit inventory settings You can edit inventory settings by enabling different categories that you want to collect information from. A computer that is affected by the policy will collect information during the next Group Policy refresh interval and send it to a centralized database. You need to run this task on a machine where the Administration Tools have been installed. 1. In the GPMC, expand your domain node and locate the Group Policy Objects node. 2. Right-click on the desired GPO and click Edit 3. In the Group Policy Management Editor, expand Computer Configuration or User Configuration, Policies, Systems Management, and select Specops Inventory. 4. Click Edit inventory settings. 5. From the list, select the category you want to enable. You will have the following options if you are in the computer configuration node: Category General hardware information Operating System Installed Software Files Description Contains general hardware information about the computer including: Computer manufacturer and model BIOS name and version Disk drives Video controllers Printers Computer chassis type Contains information about the installed operating system including: OS name Version Service pack level OS language Time zone Hot Fixes Page file settings Contains information about installed software including: Windows Installer installations Legacy installations Time of installation Can be used to inventory files. To set the inventory filter: 7

8 WMI User query 1. Click Add to select the file expressions to include in the inventory. 2. In the Name of this file inventory field, enter the name that will be used to identify the found files in the report. 3. In the File name field, enter the name of the file or files to search for. 4. From the Root to start search in field select a search root from the environment variables. 5. In the Sub path field, enter a sub directory within the selected root directory. 6. To add the file expression to the list, click Add. 7. If you want to add another file expression, click Clear to clear the information in the file expression field and repeat steps 2 through 6. Can be used to inventory custom WMI properties. To set the inventory filter: 1. Select a WMI Namespace. 2. Select a WMI Class. 3. Select a WMI Property. 4. Click OK. Can be used to display a query to the end user of a computer. The user can respond to this question in different ways depending on the settings in the query. The responses from the end user will be saved in the inventory database. 1. In the Question title field enter a title for the question that you want displayed to the end user of the computer. 2. In the Question field enter the question you want displayed to the end user of the computer. 3. From the Query type drop-box, select the question type. You have the following options: Yes/No question Multiple choice question. You will need to click Add answer choice and enter a possible answer in the Response text field. Free text question 4. Select a time limit from the Time limit for user response before closing field. 5. Enable Allow user to postpone query if you want to allow the user to postpone the query. 8

9 Registry values Environment variables Services Networking Scheduler jobs Active Directory information 6. Click OK. Can be used to inventory one or more registry values. To set the inventory filter: 1. Click Add to select the registry key to include in the inventory. 2. In the Registry hive field, enter 3. In the Path to registry key field, enter the path to the registry key. 4. In the Registry key name field, browse to, or enter the registry key. 5. To add the registry key, click Add. 6. If you want to add registry key, click Clear to clear the registry key information you have already added, and repeat steps 2 through Click OK. Can be used to collect information about all the environment variables for the user or computer. Both the variable names and their values will be inventoried. Contains information about Windows Services including: Services name Start mode Current status Contains information about all network adapters including: Adapter name Type Mac address IP address DHCP server information Gateway WINS servers Contains information about the configured tasks in the Task Scheduler including: Task name Command Time Result from last run Contains information from Active Directory about this computer object including: 9

10 Group Policy information Organizational Unit Location Description Contains information about the group policy objects that are applied on the computer including: GPO name Version Link information You will have the following options if you are in the user configuration node: Category User information Files Registry values Environmental variables Description Contains general user information including: Profile size Max allowed size Home directory path User screen saver settings Excluded directories for profile replication Can be used to inventory files. To set the inventory filter: 1. Click Add to select the file expressions to include in the inventory. 2. In the Name of this file inventory field, enter the name that will be used to identify the found files in the report. 3. In the File name field, enter the name of the file or files to search for. 4. From the Root to start search in field select a search root from the environment variables. 5. In the Sub path field, enter a sub directory within the selected root directory. 6. To add the file expression to the list, click Add. 7. If you want to add another file expression, click Clear to clear the information in the file expression field and repeat steps 2 through 6. Can be used to inventory one or more registry values. Can be used to collect information about all the environment variables for the user or computer. Both the variable names and their values will be inventoried. 10

11 Active Directory information Group Policy information Contains information from Active Directory about this user object including: Organizational Unit address Full Name Location Description Contains information about the group policy objects that are applied on the user including: GPO name Version Link information 6. Click OK to save your inventory settings. 11

12 Specops Configuration Tool The Specops Configuration Tool allows you to manage the various components of your installed Specops products such as importing license keys, and monitoring the status of your Client Side Extensions. Computers 1. Search for a computer by using one or more of the below criteria: Number of days of inactivity Computer name Client version 2. Click Search. 3. The computers that meet the criteria will appear in the list. For a detailed list of your computers including database ID, computer name, heartbeat, and version, click Export Computer List to File. a. Enter a file name. b. Click Save. 4. Select a computer from the list, and click Delete Selected Computer Records to delete records for the computer. a. In the Delete Computer Record dialog box, click Yes. License Import License 1. Open the Specops Configuration tool. 2. Select the Specops Command tab. 3. In the navigation pane, select License. 12

13 4. Click Import License. 5. Browse to the location of the TXT file, and click Open. Export License Information to File 1. Open the Specops Configuration tool. 2. Select the Specops Command tab. 3. In the navigation pane, select License. 4. Click Export License Information to File. 5. Enter a file name, and click Save. 13

14 Specops Reporting The Specops Reporting component is entirely web based and can be accessed from your browser. The URL for Specops Reporting depends on where the component was installed. Inventory reports provide a good overview of the feedback gathered from your users and computers. View predefined Reports 1. Enter the URL for Specops Reporting. 2. In the navigation pane, expand Specops Reporting, and click Specops Inventory. 3. The predefined reports are grouped into categories. Select a report from the below categories: Hardware Operating system Sample custom reports Software reports User reports 14

15 Create a new report You can customize the view of the information gathered by creating a new report definition. 1. Enter the URL for Specops Reporting. 2. In the navigation pane, click Create new report. 3. Specify the following fields: Field Report name Report category Report description Columns Groupings Filters Import report definition Export report definition 4. Click Save. Edit an existing report Step Enter a report name. Specify a report category. Enter a report description Add columns to the report. You will be able to specify the Column heading, Field, and Display name. To group data in the report data, select a column and drag and drop it in the group panel. This will remove the column from the visible columns and display a grouping rectangle for the column in the group panel. Add any filtering of data by clicking on the Filters tab and selecting additional filter data and values to filter by. You can import report definition from the import web page or from a file. You can export a report definition from the export web page. The export page displays a complete list of all reports in the database grouped by report categories. 1. Enter the URL for Specops Reporting. 2. In the navigation pane, expand Specops Reporting, and click Specops Inventory. 3. Click Edit next to the report you want to modify. 4. Make the necessary changes, and click Save. Export Report data You can export report data in a PDF or a CSV format for further processing. 1. Enter the URL for Specops Reporting. 2. In the navigation pane, expand Specops Reporting, and click Specops Inventory. 3. Select the Report you want to export. 15

16 4. If required, select the client computer from the Computer drop box, or the user from the User drop box. 5. Specify the page size in the Page size drop box. 6. From the Export to drop box, select the report format. Note: If you select PDF, you will also need to specify the page layout from the drop box. 7. Click the green button next to Export to. Delete a Report 1. Enter the URL for Specops Reporting. 2. In the navigation pane, expand Specops Reporting, and click Specops Inventory. 3. Click Delete next to the report you want to delete. 4. Click OK. 16

17 Support Online We recommend submitting your case directly on our website at: Telephone International Monday - Friday: 09:00-17:00 CET North America SPECOPS ( ) Monday - Friday: 09:00-17:00 EST 17

Installation Guide. . All right reserved. For more information about Specops Inventory and other Specops products, visit www.specopssoft.

Installation Guide. . All right reserved. For more information about Specops Inventory and other Specops products, visit www.specopssoft. . All right reserved. For more information about Specops Inventory and other Specops products, visit www.specopssoft.com Copyright and Trademarks Specops Inventory is a trademark owned by Specops Software.

More information

Administration Guide. . All right reserved. For more information about Specops Deploy and other Specops products, visit www.specopssoft.

Administration Guide. . All right reserved. For more information about Specops Deploy and other Specops products, visit www.specopssoft. . All right reserved. For more information about Specops Deploy and other Specops products, visit www.specopssoft.com Copyright and Trademarks Specops Deploy is a trademark owned by Specops Software. All

More information

Specops Command. Installation Guide

Specops Command. Installation Guide Specops Software. All right reserved. For more information about Specops Command and other Specops products, visit www.specopssoft.com Copyright and Trademarks Specops Command is a trademark owned by Specops

More information

Installation Guide. . All right reserved. For more information about Specops Deploy and other Specops products, visit www.specopssoft.

Installation Guide. . All right reserved. For more information about Specops Deploy and other Specops products, visit www.specopssoft. . All right reserved. For more information about Specops Deploy and other Specops products, visit www.specopssoft.com Copyright and Trademarks Specops Deploy is a trademark owned by Specops Software. All

More information

Installation Guide. . All right reserved. For more information about Specops Deploy and other Specops products, visit www.specopssoft.

Installation Guide. . All right reserved. For more information about Specops Deploy and other Specops products, visit www.specopssoft. . All right reserved. For more information about Specops Deploy and other Specops products, visit www.specopssoft.com Copyright and Trademarks Specops Deploy is a trademark owned by Specops Software. All

More information

Administration Guide. . All right reserved. For more information about Specops Gpupdate and other Specops products, visit www.specopssoft.

Administration Guide. . All right reserved. For more information about Specops Gpupdate and other Specops products, visit www.specopssoft. . All right reserved. For more information about Specops Gpupdate and other Specops products, visit www.specopssoft.com Copyright and Trademarks Specops Gpupdate is a trademark owned by Specops Software.

More information

TECHNICAL DOCUMENTATION SPECOPS DEPLOY / APP 4.7 DOCUMENTATION

TECHNICAL DOCUMENTATION SPECOPS DEPLOY / APP 4.7 DOCUMENTATION TECHNICAL DOCUMENTATION SPECOPS DEPLOY / APP 4.7 DOCUMENTATION Contents 1. Getting Started... 4 1.1 Specops Deploy Supported Configurations... 4 2. Specops Deploy and Active Directory...5 3. Specops Deploy

More information

Copyright and Trademarks

Copyright and Trademarks . All right reserved. For more information about Specops Active Directory Janitor and other Specops products, visit www.specopssoft.com Copyright and Trademarks Specops Active Directory Janitor is a trademark

More information

Deep Freeze and Microsoft System Center Configuration Manager 2012 Integration

Deep Freeze and Microsoft System Center Configuration Manager 2012 Integration 1 Deep Freeze and Microsoft System Center Configuration Manager 2012 Integration Technical Paper Last modified: May 2015 Web: www.faronics.com Email: sales@faronics.com Phone: 800-943-6422 or 604-637-3333

More information

Idera SQL Diagnostic Manager Management Pack Guide for System Center Operations Manager. Install Guide. Idera Inc., Published: April 2013

Idera SQL Diagnostic Manager Management Pack Guide for System Center Operations Manager. Install Guide. Idera Inc., Published: April 2013 Idera SQL Diagnostic Manager Management Pack Guide for System Center Operations Manager Install Guide Idera Inc., Published: April 2013 Contents Introduction to the Idera SQL Diagnostic Manager Management

More information

User Guide. Version 3.2. Copyright 2002-2009 Snow Software AB. All rights reserved.

User Guide. Version 3.2. Copyright 2002-2009 Snow Software AB. All rights reserved. Version 3.2 User Guide Copyright 2002-2009 Snow Software AB. All rights reserved. This manual and computer program is protected by copyright law and international treaties. Unauthorized reproduction or

More information

Create, Link, or Edit a GPO with Active Directory Users and Computers

Create, Link, or Edit a GPO with Active Directory Users and Computers How to Edit Local Computer Policy Settings To edit the local computer policy settings, you must be a local computer administrator or a member of the Domain Admins or Enterprise Admins groups. 1. Add the

More information

SSL Intercept Mode. Certificate Installation Guide. Revision 1.0.0. Warning and Disclaimer

SSL Intercept Mode. Certificate Installation Guide. Revision 1.0.0. Warning and Disclaimer SSL Intercept Mode Certificate Installation Guide Revision 1.0.0 Warning and Disclaimer This document is designed to provide information about the configuration of CensorNet Professional. Every effort

More information

Deploying Remote Desktop Connection Broker with High Availability Step-by-Step Guide

Deploying Remote Desktop Connection Broker with High Availability Step-by-Step Guide Deploying Remote Desktop Connection Broker with High Availability Step-by-Step Guide Microsoft Corporation Published: May 2010 Abstract This guide describes the steps for configuring Remote Desktop Connection

More information

Exclaimer Mail Archiver

Exclaimer Mail Archiver Deployment Guide - Outlook Add-In www.exclaimer.com Contents About This Guide... 3 System Requirements... 4 Software... 4 Installation Files... 5 Deployment Preparation... 6 Installing the Add-In Manually...

More information

Tool Tip. SyAM Management Utilities and Non-Admin Domain Users

Tool Tip. SyAM Management Utilities and Non-Admin Domain Users SyAM Management Utilities and Non-Admin Domain Users Some features of SyAM Management Utilities, including Client Deployment and Third Party Software Deployment, require authentication credentials with

More information

Web Dashboard. User Manual. Build 2.0 2015-09-17

Web Dashboard. User Manual. Build 2.0 2015-09-17 Web Dashboard User Manual Build 2.0 2015-09-17 This is the official user manual on using SAMLite web dashboard to perform reporting and administrative tasks. This manual describes each section of reporting

More information

Creating and Issuing the Workstation Authentication Certificate Template on the Certification Authority

Creating and Issuing the Workstation Authentication Certificate Template on the Certification Authority In this post we will see the steps for deploying the client certificate for windows computers. This post is a part of Deploy PKI Certificates for SCCM 2012 R2 Step by Step Guide. In the previous post we

More information

S/MIME on Good for Enterprise MS Online Certificate Status Protocol. Installation and Configuration Notes. Updated: October 08, 2014

S/MIME on Good for Enterprise MS Online Certificate Status Protocol. Installation and Configuration Notes. Updated: October 08, 2014 S/MIME on Good for Enterprise MS Online Certificate Status Protocol Installation and Configuration Notes Updated: October 08, 2014 Installing the Online Responder service... 1 Preparing the environment...

More information

Group Policy 21/05/2013

Group Policy 21/05/2013 Group Policy Group Policy is not a new technology for Active Directory, but it has grown and improved with every iteration of the operating system and service pack since it was first introduced in Windows

More information

ACTIVE DIRECTORY DEPLOYMENT

ACTIVE DIRECTORY DEPLOYMENT ACTIVE DIRECTORY DEPLOYMENT CASAS Technical Support 800.255.1036 2009 Comprehensive Adult Student Assessment Systems. All rights reserved. Version 031809 CONTENTS 1. INTRODUCTION... 1 1.1 LAN PREREQUISITES...

More information

Advanced Event Viewer Manual

Advanced Event Viewer Manual Advanced Event Viewer Manual Document version: 2.2944.01 Download Advanced Event Viewer at: http://www.advancedeventviewer.com Page 1 Introduction Advanced Event Viewer is an award winning application

More information

Windows 2008 Server DIRECTIVAS DE GRUPO. Administración SSII

Windows 2008 Server DIRECTIVAS DE GRUPO. Administración SSII Windows 2008 Server DIRECTIVAS DE GRUPO Administración SSII Group Policy A centralized approach to applying one or more changes to one or more users or computers Setting: Definition of a change or configuration

More information

DriveLock Quick Start Guide

DriveLock Quick Start Guide Be secure in less than 4 hours CenterTools Software GmbH 2012 Copyright Information in this document, including URL and other Internet Web site references, is subject to change without notice. Unless otherwise

More information

Legal Notes. Regarding Trademarks. 2012 KYOCERA Document Solutions Inc.

Legal Notes. Regarding Trademarks. 2012 KYOCERA Document Solutions Inc. Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held liable for any problems arising from

More information

Novell ZENworks Asset Management 7.5

Novell ZENworks Asset Management 7.5 Novell ZENworks Asset Management 7.5 w w w. n o v e l l. c o m October 2006 USING THE WEB CONSOLE Table Of Contents Getting Started with ZENworks Asset Management Web Console... 1 How to Get Started...

More information

How to deploy Arkeia Network Backup v10 on Windows Server 2008 and later with a domain

How to deploy Arkeia Network Backup v10 on Windows Server 2008 and later with a domain Alexandre Macard 11th January 2013 How to deploy Arkeia Network Backup v10 on Windows Server 2008 and later with a domain This step-by-step document describes how to use Group Policy to automatically distribute

More information

DeviceLock Management via Group Policy

DeviceLock Management via Group Policy User Manual DeviceLock Management via Group Policy SmartLine Inc 1 Contents Using this Manual...3 1. General Information...4 1.1 Overview...4 1.2 Applying Group Policy...5 2. DeviceLock Service Deployment...6

More information

SARANGSoft WinBackup Business v2.5 Client Installation Guide

SARANGSoft WinBackup Business v2.5 Client Installation Guide SARANGSoft WinBackup Business v2.5 Client Installation Guide (November, 2015) WinBackup Business Client is a part of WinBackup Business application. It runs in the background on every client computer that

More information

MTA Course: 10753 Windows Operating System Fundamentals Topic: Understand backup and recovery methods File name: 10753_WindowsOS_SA_6.

MTA Course: 10753 Windows Operating System Fundamentals Topic: Understand backup and recovery methods File name: 10753_WindowsOS_SA_6. STUDENT ACTIVITY 6.1: UNDERSTAND BACKUP AND RECOVERY METHODS MTA Course: 10753 Windows Operating System Fundamentals Topic: Understand backup and recovery methods File name: 10753_WindowsOS_SA_6.1 Lesson

More information

Pharos Uniprint 8.4. Maintenance Guide. Document Version: UP84-Maintenance-1.0. Distribution Date: July 2013

Pharos Uniprint 8.4. Maintenance Guide. Document Version: UP84-Maintenance-1.0. Distribution Date: July 2013 Pharos Uniprint 8.4 Maintenance Guide Document Version: UP84-Maintenance-1.0 Distribution Date: July 2013 Pharos Systems International Suite 310, 80 Linden Oaks Rochester, New York 14625 Phone: 1-585-939-7000

More information

SMART Sync 2011. Windows operating systems. System administrator s guide

SMART Sync 2011. Windows operating systems. System administrator s guide SMART Sync 2011 Windows operating systems System administrator s guide Trademark notice SMART Sync, smarttech and the SMART logo are trademarks or registered trademarks of SMART Technologies ULC in the

More information

Dell SupportAssist Version 2.0 for Dell OpenManage Essentials Quick Start Guide

Dell SupportAssist Version 2.0 for Dell OpenManage Essentials Quick Start Guide Dell SupportAssist Version 2.0 for Dell OpenManage Essentials Quick Start Guide Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your computer.

More information

Administering Group Policy with Group Policy Management Console

Administering Group Policy with Group Policy Management Console Administering Group Policy with Group Policy Management Console By Jim Lundy Microsoft Corporation Published: April 2003 Abstract In conjunction with Windows Server 2003, Microsoft has released a new Group

More information

Group Policy for Beginners

Group Policy for Beginners Group Policy for Beginners Microsoft Corporation Published: April 2011 Abstract Group Policy is the essential way that most organizations enforce settings on their computers. This white paper introduces

More information

Distributing EmailSMS v2.0

Distributing EmailSMS v2.0 Distributing EmailSMS v2.0 1) Requirements Windows 2000/XP and Outlook 2000, 2002 or 2003, Microsoft.NET Framework v 2).NET Framework V 1 Rollout Microsoft.NET Framework v1 needed to run EmailSMS v2.0.

More information

White Paper. Configuration of Fabasoft Folio Printer Ports. Fabasoft Folio 2015 Update Rollup 2

White Paper. Configuration of Fabasoft Folio Printer Ports. Fabasoft Folio 2015 Update Rollup 2 White Paper Configuration of Fabasoft Folio Printer Ports Fabasoft Folio 2015 Update Rollup 2 Copyright Fabasoft R&D GmbH, Linz, Austria, 2015. All rights reserved. All hardware and software names used

More information

WhatsVirtual for WhatsUp Gold v16.0 User Guide

WhatsVirtual for WhatsUp Gold v16.0 User Guide WhatsVirtual for WhatsUp Gold v16.0 User Guide Contents Welcome Welcome to WhatsVirtual... 1 Using WhatsVirtual Discovering virtual devices... 2 Viewing discovery output... 4 Manage and monitor virtual

More information

Tenrox and Microsoft Dynamics CRM Integration Guide

Tenrox and Microsoft Dynamics CRM Integration Guide Tenrox Tenrox and Microsoft Dynamics CRM Integration Guide January, 2012 2012 Tenrox. All rights reserved. About this Guide This guide describes the procedures for setting up integration between Microsoft

More information

How to Configure Microsoft System Operation Manager to Monitor Active Directory, Group Policy and Exchange Changes Using NetWrix Active Directory

How to Configure Microsoft System Operation Manager to Monitor Active Directory, Group Policy and Exchange Changes Using NetWrix Active Directory How to Configure Microsoft System Operation Manager to Monitor Active Directory, Group Policy and Exchange Changes Using NetWrix Active Directory Change Reporter Table of Contents General Information...

More information

Archive Attender Version 3.5

Archive Attender Version 3.5 Archive Attender Version 3.5 Getting Started Guide Sherpa Software (800) 255-5155 www.sherpasoftware.com Page 1 Under the copyright laws, neither the documentation nor the software can be copied, photocopied,

More information

WatchDox Administrator's Guide. Application Version 3.7.5

WatchDox Administrator's Guide. Application Version 3.7.5 Application Version 3.7.5 Confidentiality This document contains confidential material that is proprietary WatchDox. The information and ideas herein may not be disclosed to any unauthorized individuals

More information

Promap V4 ActiveX MSI File

Promap V4 ActiveX MSI File Promap V4 ActiveX MSI File Contents What is an MSI File? Promap V4 MSI Main Advantage Installation via Group Policy (Windows Server 2000) Installation via Group Policy (Windows Server 2003) What is an

More information

Foxit Enterprise Reader GPO User Guide

Foxit Enterprise Reader GPO User Guide 1 Copyright 2013 Foxit Corporation. All Rights Reserved. No part of this document can be reproduced, transferred, distributed or stored in any format without the prior written permission of Foxit. Anti-Grain

More information

CCC Report Center Overview... 3. Accessing the CCC Report Center... 4. Accessing, Working With, and Running Reports... 6. Customizing Reports...

CCC Report Center Overview... 3. Accessing the CCC Report Center... 4. Accessing, Working With, and Running Reports... 6. Customizing Reports... CCC Report Center Contents 2 Contents CCC Report Center Overview... 3 Accessing the CCC Report Center... 4 Accessing, Working With, and Running Reports... 6 Customizing Reports... 11 Creating Ad Hoc Views

More information

Operation Error Management

Operation Error Management S&C IntelliTeam CNMS Communication Network Management System Operation Error Management Table of Contents Section Page Section Page Overview.... 2 Error Management Alarms... 4 Viewing Alarms.... 5 Editing

More information

Test Note Phone Manager Deployment Windows Group Policy Sever 2003 and XP SPII Clients

Test Note Phone Manager Deployment Windows Group Policy Sever 2003 and XP SPII Clients Test Note Phone Manager Deployment Windows Group Policy Sever 2003 and XP SPII Clients Note: I have only tested these procedures on Server 2003 SP1 (DC) and XP SPII client, in a controlled lab environment,

More information

Security Explorer 9.5. User Guide

Security Explorer 9.5. User Guide 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license or nondisclosure agreement.

More information

Setting Up Scan to SMB on TaskALFA series MFP s.

Setting Up Scan to SMB on TaskALFA series MFP s. Setting Up Scan to SMB on TaskALFA series MFP s. There are three steps necessary to set up a new Scan to SMB function button on the TaskALFA series color MFP. 1. A folder must be created on the PC and

More information

Wavecrest Certificate

Wavecrest Certificate Wavecrest InstallationGuide Wavecrest Certificate www.wavecrest.net Copyright Copyright 1996-2015, Wavecrest Computing, Inc. All rights reserved. Use of this product and this manual is subject to license.

More information

Server Manager Performance Monitor. Server Manager Diagnostics Page. . Information. . Audit Success. . Audit Failure

Server Manager Performance Monitor. Server Manager Diagnostics Page. . Information. . Audit Success. . Audit Failure Server Manager Diagnostics Page 653. Information. Audit Success. Audit Failure The view shows the total number of events in the last hour, 24 hours, 7 days, and the total. Each of these nodes can be expanded

More information

LepideAuditor Suite for File Server. Installation and Configuration Guide

LepideAuditor Suite for File Server. Installation and Configuration Guide LepideAuditor Suite for File Server Installation and Configuration Guide Table of Contents 1. Introduction... 4 2. Requirements and Prerequisites... 4 2.1 Basic System Requirements... 4 2.2 Supported Servers

More information

Table of Contents. Introduction...9. Installation...17. Program Tour...31. The Program Components...10 Main Program Features...11

Table of Contents. Introduction...9. Installation...17. Program Tour...31. The Program Components...10 Main Program Features...11 2011 AdRem Software, Inc. This document is written by AdRem Software and represents the views and opinions of AdRem Software regarding its content, as of the date the document was issued. The information

More information

Using Logon Agent for Transparent User Identification

Using Logon Agent for Transparent User Identification Using Logon Agent for Transparent User Identification Websense Logon Agent (also called Authentication Server) identifies users in real time, as they log on to domains. Logon Agent works with the Websense

More information

Plug-In for Informatica Guide

Plug-In for Informatica Guide HP Vertica Analytic Database Software Version: 7.0.x Document Release Date: 2/20/2015 Legal Notices Warranty The only warranties for HP products and services are set forth in the express warranty statements

More information

Citrix Systems, Inc.

Citrix Systems, Inc. Citrix Password Manager Quick Deployment Guide Install and Use Password Manager on Presentation Server in Under Two Hours Citrix Systems, Inc. Notice The information in this publication is subject to change

More information

DigitalPersona Pro Server for Active Directory v4.x Quick Start Installation Guide

DigitalPersona Pro Server for Active Directory v4.x Quick Start Installation Guide DigitalPersona Pro Server for Active Directory v4.x Quick Start Installation Guide 1 of 7 DigitalPersona Pro Server for Active Directory v4.x Quick Start Installation Guide Process Overview Step Description

More information

Event Log View Online Getting Started Guide

Event Log View Online Getting Started Guide Event Log View Online Getting Started Guide Copyright 2002 Engagent Sections: A. The Event Log View Interface B. Run a Scan C. Additional Features D. Support A. The Event Log View Online Interface When

More information

Autodesk Inventory Advisor Quick Start Guide

Autodesk Inventory Advisor Quick Start Guide Autodesk Inventory Advisor Quick Start Guide 30- Mar- 12 i Contents Overview... 3 Installation... 3 Install AIA... 3 Enter unlock code... 4 Initial configuration... 5 Selecting a scan option... 6 Import

More information

DeviceLock Management via Group Policy

DeviceLock Management via Group Policy User Manual DeviceLock Management via Group Policy SmartLine Inc 1 Contents Using this Manual...3 1. General Information...4 1.1 Overview...4 1.2 Applying Group Policy...5 1.3 Standard GPO Inheritance

More information

Getting Started Guide

Getting Started Guide Getting Started Guide Microsoft Corporation Published: December 2005 Table of Contents Getting Started Guide...1 Table of Contents...2 Get Started with Windows Server 2003 R2...4 Windows Storage Server

More information

Audit Management Reference

Audit Management Reference www.novell.com/documentation Audit Management Reference ZENworks 11 Support Pack 3 February 2014 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of

More information

NETWRIX USER ACTIVITY VIDEO REPORTER

NETWRIX USER ACTIVITY VIDEO REPORTER NETWRIX USER ACTIVITY VIDEO REPORTER ADMINISTRATOR S GUIDE Product Version: 1.0 January 2013. Legal Notice The information in this publication is furnished for information use only, and does not constitute

More information

Outpost Office Firewall

Outpost Office Firewall Technical Reference Outpost Office Firewall Office Firewall Software from Agnitum Abstract This document provides advanced technical information on administering Outpost Office Firewall in a corporate

More information

Password Manager Windows Desktop Client

Password Manager Windows Desktop Client Password Manager Windows Desktop Client EmpowerID provides an extension that allows organizations to plug into Password Manager to customize the Windows logon experience beyond that supplied by the standard

More information

IriScene Remote Manager. Version 4.8 FRACTALIA Software

IriScene Remote Manager. Version 4.8 FRACTALIA Software IriScene Remote Manager Version 4.8 FRACTALIA Software 2 A. INTRODUCTION...3 B. WORKING DESCRIPTION...3 C. PLATFORM MANUAL...3 1. ACCESS TO THE PLATFORM...3 2. AUTHENTICATION MODES...5 3. AUTHENTICATION

More information

2. Using Notepad, create a file called c:\demote.txt containing the following information:

2. Using Notepad, create a file called c:\demote.txt containing the following information: Unit 4 Additional Projects Configuring the Local Computer Policy You need to prepare your test lab for your upcoming experiments. First, remove a child domain that you have configured. Then, configure

More information

TECHNICAL SUPPORT GUIDE

TECHNICAL SUPPORT GUIDE TECHNICAL SUPPORT GUIDE INTRODUCTION This document has been developed to provide a guideline for assisting our clients and their technicians with a standard Console Gateway Live configuration. IS THIS

More information

Desktop Surveillance Help

Desktop Surveillance Help Desktop Surveillance Help Table of Contents About... 9 What s New... 10 System Requirements... 11 Updating from Desktop Surveillance 2.6 to Desktop Surveillance 3.2... 13 Program Structure... 14 Getting

More information

EMC Smarts Network Configuration Manager

EMC Smarts Network Configuration Manager EMC Smarts Network Configuration Manager Version 9.4.1 Advisors User Guide P/N 302-002-279 REV 01 Copyright 2013-2015 EMC Corporation. All rights reserved. Published in the USA. Published October, 2015

More information

LifeSize Control Installation Guide

LifeSize Control Installation Guide LifeSize Control Installation Guide April 2005 Part Number 132-00001-001, Version 1.0 Copyright Notice Copyright 2005 LifeSize Communications. All rights reserved. LifeSize Communications has made every

More information

Windows Server Update Services 3.0 SP2 Step By Step Guide

Windows Server Update Services 3.0 SP2 Step By Step Guide Windows Server Update Services 3.0 SP2 Step By Step Guide Microsoft Corporation Author: Anita Taylor Editor: Theresa Haynie Abstract This guide provides detailed instructions for installing Windows Server

More information

Secure Web Appliance. SSL Intercept

Secure Web Appliance. SSL Intercept Secure Web Appliance SSL Intercept Table of Contents 1. Introduction... 1 1.1. About CYAN Secure Web Appliance... 1 1.2. About SSL Intercept... 1 1.3. About this Manual... 1 1.3.1. Document Conventions...

More information

NETWRIX EVENT LOG MANAGER

NETWRIX EVENT LOG MANAGER NETWRIX EVENT LOG MANAGER ADMINISTRATOR S GUIDE Product Version: 4.0 July/2012. Legal Notice The information in this publication is furnished for information use only, and does not constitute a commitment

More information

ENABLE LOGON/LOGOFF AUDITING

ENABLE LOGON/LOGOFF AUDITING Lepide Software LepideAuditor Suite ENABLE LOGON/LOGOFF AUDITING This document explains the steps required to enable the auditing of logon and logoff events for a domain. Table of Contents 1. Introduction...

More information

Active Directory Software Deployment

Active Directory Software Deployment APPLICATION N0TE ST-0128 March 24, 2006 Product: Active Directory / PCM Deployment System version: ShoreTel 6 Active Directory Software Deployment Courtesy of: Dylan Moser with LANtelligence Inc. This

More information

Census. di Monitoring Installation User s Guide

Census. di Monitoring Installation User s Guide Census di Monitoring Installation User s Guide 1 r1 Contents Introduction... 3 Content overview... 3 Installing Windows 2003 Server Components... 4 System requirements... 4 di Monitoring Web Set-up...

More information

Windows Firewall Exceptions Configuring Windows Firewall Exceptions for Docusnap

Windows Firewall Exceptions Configuring Windows Firewall Exceptions for Docusnap Windows Firewall Exceptions Configuring Windows Firewall Exceptions for Docusnap www.docusnap.com TITLE Windows Firewall Exceptions AUTHOR Docusnap Consulting DATE 21/04/2015 The reproduction and distribution

More information

Windows Firewall Configuration with Group Policy for SyAM System Client Installation

Windows Firewall Configuration with Group Policy for SyAM System Client Installation with Group Policy for SyAM System Client Installation SyAM System Client can be deployed to systems on your network using SyAM Management Utilities. If Windows Firewall is enabled on target systems, it

More information

CONFIGURING TARGET ACTIVE DIRECTORY DOMAIN FOR AUDIT BY NETWRIX AUDITOR

CONFIGURING TARGET ACTIVE DIRECTORY DOMAIN FOR AUDIT BY NETWRIX AUDITOR CONFIGURING TARGET ACTIVE DIRECTORY DOMAIN FOR AUDIT BY NETWRIX AUDITOR TECHNICAL ARTICLE Product Version: 5.0 July 2013. Legal Notice The information in this publication is furnished for information use

More information

RoomWizard Synchronization Software Manual Installation Instructions

RoomWizard Synchronization Software Manual Installation Instructions 2 RoomWizard Synchronization Software Manual Installation Instructions Table of Contents Exchange Server Configuration... 4 RoomWizard Synchronization Software Installation and Configuration... 5 System

More information

How to add your Weebly website to a TotalCloud hosted Server

How to add your Weebly website to a TotalCloud hosted Server How to add your Weebly website to a TotalCloud hosted Server Creating your Weebly website: 1.) Go to weebly.com and create a free account. 2.) Build and design your personal website using the Weebly features.

More information

White Paper. Deployment of ActiveX Controls via Microsoft Windows Active Directory. Fabasoft Folio 2015 Update Rollup 2

White Paper. Deployment of ActiveX Controls via Microsoft Windows Active Directory. Fabasoft Folio 2015 Update Rollup 2 White Paper Fabasoft Folio 2015 Update Rollup 2 Copyright Fabasoft R&D GmbH, Linz, Austria, 2015. All rights reserved. All hardware and software names used are registered trade names and/or registered

More information

Installing Microsoft Exchange Integration for LifeSize Control

Installing Microsoft Exchange Integration for LifeSize Control Installing Microsoft Exchange Integration for LifeSize Control September 2005 Part Number 132-00002-001, Version 1.1 Copyright Notice Copyright 2005 LifeSize Communications. All rights reserved. LifeSize

More information

Managed Security Web Portal USER GUIDE

Managed Security Web Portal USER GUIDE Managed Security Web Portal USER GUIDE CONTENTS 1.0 Introduction 4 2.0 Login 4 3.0 Portal Layout 4 3.1 Home Tab 5 3.2 Web Filtering Tab 5 3.3 SSL VPN Users Tab 6 4.0 Web Filtering Administration 7 4.1

More information

Version 5.0. SurfControl Web Filter for Citrix Installation Guide for Service Pack 2

Version 5.0. SurfControl Web Filter for Citrix Installation Guide for Service Pack 2 Version 5.0 SurfControl Web Filter for Citrix Installation Guide for Service Pack 2 NOTICES Updates to the SurfControl documentation and software, as well as Support information are available at www.surfcontrol.com/support.

More information

EventTracker: Support to Non English Systems

EventTracker: Support to Non English Systems EventTracker: Support to Non English Systems Publication Date: April 25, 2012 EventTracker 8815 Centre Park Drive Columbia MD 21045 www.eventtracker.com Introduction This document has been prepared to

More information

Product Manual. MDM On Premise Installation Version 8.1. Last Updated: 06/07/15

Product Manual. MDM On Premise Installation Version 8.1. Last Updated: 06/07/15 Product Manual MDM On Premise Installation Version 8.1 Last Updated: 06/07/15 Parallels IP Holdings GmbH Vordergasse 59 8200 Schaffhausen Switzerland Tel: + 41 52 632 0411 Fax: + 41 52 672 2010 www.parallels.com

More information

Microsoft Windows Storage Server 2003 R2

Microsoft Windows Storage Server 2003 R2 Microsoft Windows Storage Server 2003 R2 Getting Started Guide Abstract This guide documents the various features available in Microsoft Windows Storage Server 2003 R2. Rev 1. 2005 Microsoft Corporation.

More information

Managing Identities and Admin Access

Managing Identities and Admin Access CHAPTER 4 This chapter describes how Cisco Identity Services Engine (ISE) manages its network identities and access to its resources using role-based access control policies, permissions, and settings.

More information

Setting Up Peak Performance Group Policies

Setting Up Peak Performance Group Policies Setting Up Peak Performance Group Policies It is possible and recommended to create Group Policies for Peak Performance in order to control configuration related to Peak Performance users and computers.

More information

Installing and Configuring vcloud Connector

Installing and Configuring vcloud Connector Installing and Configuring vcloud Connector vcloud Connector 2.7.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new

More information

DocAve 6 Service Pack 1 Job Monitor

DocAve 6 Service Pack 1 Job Monitor DocAve 6 Service Pack 1 Job Monitor Reference Guide Revision C Issued September 2012 1 Table of Contents About Job Monitor... 4 Submitting Documentation Feedback to AvePoint... 4 Before You Begin... 5

More information

HP Universal Print Driver Series for Windows Active Directory Administrator Template White Paper

HP Universal Print Driver Series for Windows Active Directory Administrator Template White Paper HP Universal Print Driver Series for Windows Active Directory Administrator Template White Paper Table of Contents: Purpose... 2 Active Directory Administrative Template Overview.. 2 Decide whether to

More information

Contents 1. Introduction 2. Security Considerations 3. Installation 4. Configuration 5. Uninstallation 6. Automated Bulk Enrollment 7.

Contents 1. Introduction 2. Security Considerations 3. Installation 4. Configuration 5. Uninstallation 6. Automated Bulk Enrollment 7. Contents 1. Introduction 2. Security Considerations 3. Installation 4. Configuration 5. Uninstallation 6. Automated Bulk Enrollment 7. Troubleshooting Introduction Adaxes Self-Service Client provides secure

More information

Sharpdesk V3.5. Push Installation Guide for system administrator Version 3.5.01

Sharpdesk V3.5. Push Installation Guide for system administrator Version 3.5.01 Sharpdesk V3.5 Push Installation Guide for system administrator Version 3.5.01 Copyright 2000-2015 by SHARP CORPORATION. All rights reserved. Reproduction, adaptation or translation without prior written

More information

Integrating WebSphere Portal V8.0 with Business Process Manager V8.0

Integrating WebSphere Portal V8.0 with Business Process Manager V8.0 2012 Integrating WebSphere Portal V8.0 with Business Process Manager V8.0 WebSphere Portal & BPM Services [Page 2 of 51] CONTENTS CONTENTS... 2 1. DOCUMENT INFORMATION... 4 1.1 1.2 2. INTRODUCTION... 5

More information

ITIS 2110 Lab 11: Domain Name Server. Tyler Everhart 11/12/2010

ITIS 2110 Lab 11: Domain Name Server. Tyler Everhart 11/12/2010 ITIS 2110 Lab 11: Domain Name Server Tyler Everhart 11/12/2010 Overview The purpose of Lab 11 was to implement a simple domain name server between the end clients host and the top level domain DNS server.

More information

Copyright 2012 Trend Micro Incorporated. All rights reserved.

Copyright 2012 Trend Micro Incorporated. All rights reserved. Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,

More information

Browser-based Support Console

Browser-based Support Console TECHNICAL PAPER Browser-based Support Console Mass deployment of certificate Netop develops and sells software solutions that enable swift, secure and seamless transfer of video, screens, sounds and data

More information