Thin Client Virus Vulnerability Analysis
|
|
|
- Ralph Robertson
- 9 years ago
- Views:
Transcription
1 Thin Client Virus Vulnerability Analysis Introduction Virus Vulnerabilities, Encounters, and Impact Virus Encounter Vectors Technology Vulnerabilities Impact of Client Computing Vulnerabilities HP Thin Client Response to Vulnerabilities Diskette/Removable Media /Office applications Web Browser/Internet/Non- /Peer-to-Peer Operating System Instant Messaging Multimedia Viewers Thin Client Firewall What is Internet Connection Firewall and How Does it Work? Downloading Internet Connection Firewall Enabling Internet Connection Firewall Disabling Internet Connection Firewall Using Altiris to Deploy Internet Connection Firewall Pros and Cons of Internet Connection Firewall Recovery Time Locking Down A Thin Client Standard User Rights DisableCMD Permission Changes on Desktop Folder Prevent File Downloads from Internet Explorer Prevent Disk-on-Key Access
2 Hiding Desktop Items on the HP Compaq t57x0 Thin Client Summary For more information
3 Introduction Enterprise computing networks require effective protection against computer viruses and other security issues. These security breaches can result in costly service calls, user downtime and loss of business-critical data. When compared to the traditional unmanaged PC network model, the HP thin client computing model yields a less vulnerable segregated approach to computing with substantially better recovery time, while minimizing total cost of ownership (TCO). According to an ICSA Labs virus analysis 1, the average downtime lost during an encounter was 23 person days. This down time accounted for data loss recovery and patching the connected network servers and PCs. With the HP thin client computing model, your exposure to virus attack on the thin client system is over 80% less than a standard Windows PC. This means that your user will experience significantly less downtime due to security vulnerabilities than a PC user. In addition, since no user data resides on the thin client, there is no risk of user data loss on the thin client. Finally, if a thin client's image is compromised or corrupted, the recovery time is typically measured in minutes instead of hours. Furthermore, the HP thin client computing model utilizes PC blades and/or servers located in the data center. These centralized devices can be protected and monitored more easily with centrally managed virus and firewall tools. Compromised resources can be quickly taken offline, corrected, or recovered faster and cheaper than distributed PC resources. This model also allows a user's data to be segregated and centralized for easy backup and recovery, ensuring a higher level of service and security for your users at a lower TCO than distributed PC resources. At HP, we realize security and TCO are important factors in enterprise computing. A Fall 2003 EDC survey showed more than eight out of every 10 enterprises suffered a security breach as a result of malicious code. As a result, more than half the enterprises are increasing their IT security budgets. HP believes the thin client computing model is an effective solution for the security conscious enterprise. 1.ICSA Labs 8th Annual Computer Virus Prevalence Survey 3
4 Virus Vulnerabilities, Encounters, and Impact The following graph depicts security vulnerabilities experienced by actual enterprise customers as surveyed by ICSA Labs for the years 1996 through The second graph contains the most vulnerable technologies as perceived by the enterprises surveyed in 2003 by EDC. The graphs illustrate a strong correlation between the actual occurrence of each vulnerability and its associated technology in an enterprise. For example, 86% of the encounters experienced in 2002 were related and according to EDC, 50% of the enterprises surveyed in 2003 perceive as their most vulnerable technology. The third graph illustrates the impact of these vulnerabilities on the enterprises surveyed by ICSA in Virus Encounter Vectors Note: Other in this graph represents unknown vectors and 3rd party/freeware software distribution. 4
5 Technology Vulnerabilities 5
6 Impact of Client Computing Vulnerabilities 6
7 HP Thin Client Response to Vulnerabilities Given the data in the previous section, the thin client computing model substantially reduces the likelihood that the client device will encounter a vulnerability as compared to a standard PC. It also centralizes an enterprise's most vulnerable technologies in the data center where they can be most effectively controlled and protected from exposure at the user level. The following table summarizes the previous data and shows that thin clients are substantially less susceptible to the virus vectors and are exposed to fewer of the perceived vulnerable technologies than a standard PC. The following sections detail these areas as related to the thin client computing model. Technology Personal Computers (PC) Thin Clients (TC) 2002 Encounter Vector Experienced a 2003 Perceived Vulnerability b 2002 Encounter Vector Experienced a 2003 Perceived Vulnerability b 86% 49.9% 0% 0% Operating System 0% 13.5% 0% 13.5 Instant Messaging 0% 10.1% 0% c 0% c Web Browser 4% 8.1% 0% c 0% c Peer-to-peer Apps Office Applications Multimedia Viewers Other d 11% 6% 0% 0% 0% 6% 0% 0% 0% 3.6% 0% c 0% c 4% 2.9% 0% 0% Total 105% 100% 0% 13.5% a.icsa Labs Virus Prevalence Survey 2002 b.enterprise Development Mgt. Issues 2003: Fall, 2003 Evans Data Corp. c.this vulnerability is zero only if this component is not installed on the thin client device d.other in this table represents unknown vectors and 3rd party/freeware software distribution Diskette/Removable Media The intrusion of viruses from diskettes has declined significantly over the years and does not appear to be a significant vulnerability point. Still, a small percentage of virus encounters do occur via CD-ROMs and 7
8 other removable media, typically when infected retail software is installed. Thin clients are predominantly deployed with no local removable drives such as CD-ROMs, diskettes, or hard drives. /Office applications With thin clients, users execute their and office productivity applications on centralized servers and/or blade PCs. These applications and their associated data execute only on the server/blade. The user interface for these applications is rendered locally on the thin client through the Terminal Services Remote Desktop Protocol (RDP) or the Citrix Independent Computing Architecture (ICA ) protocol. This means any virus or vulnerability introduced through your /office or other remote applications typically affect the server/blade and not the thin client. Additionally, the administrator has total control over the crucial applications and data on the servers or blade PCs, and can readily manage and deploy virus and firewall protection to these centralized systems. While these backend systems are at risk, applying patches or hot-fixes to centralized computing resources is more cost effective and takes less time than it does for standalone PC systems. Web Browser/Internet/Non- /Peer-to-Peer These vectors and technologies are a growing concern. The majority of infection occurs through infected/ malicious code that is downloaded or shared via these technologies. Security holes in internet browsers are reported frequently. Browser-related intrusions are centered on JavaScript, Java Applets and Active X. The thin client model addresses these exposures in several ways. First, peer-to-peer applications and many of the internet and non- web services are typically not deployed on thin clients. The best thin client strategy is to deploy only what you need to achieve your business goals. Second, user initiated file downloads and sharing typically occur at the server/blade PC level and not on the thin client itself. The thin client typically does not provide the user with the space and access rights to support this. For example, on HP XPe thin clients, the Enhanced Write Filter (EWF) prevents permanent modifications (writes) to the contents of the system's flash. Finally, the internet browser is an optional feature on the HP thin clients. It can be removed to ensure a more secure environment. Operating System Compared to a standard PC operating system, embedded operating systems are substantially smaller, providing less surface area to attack. Also, it is usually easier to configure an embedded OS to have fewer services that can be exploited than it is for a standard operating system. Advantages of the operating system will differ based upon the embedded OS chosen. Different operating systems are targeted at different rates and inherently have unique vulnerabilities. For example, CE.NET is substantially smaller and lighter than XPe or XP and is not targeted aggressively. The following is a comparison of operating systems and their exposure on HP systems to the most exploited vulnerabilities of 2003 as listed by TruSecure 1. As compared to a standard Windows PC, 1.Wildtrends 2003: A Look at Virus Trends in 2003 and a Few Prediction for 2004; A TruSecure Whitepaper 8
9 only two (MS and MS03-007) or around 22% these nine most exploited vulnerabilities were relevant to the HP XPe thin client. Patches for both are included in the image. Number of Viruses Exploited Vulnerability Number Exploited Vulnerability Name 28 MS Incorrect MIME Header Can Cause IE to Execute Attachment 16 MS Share Level Password 6 MS Buffer Overrun In RPC Interface Could Allow Code Execution 3 MS Scriptlet.typelib/eyedog 2 MS Microsoft VM ActiveX Component 1 MS IRFRAME ExecCommand 1 MS Malformed Header 1 MS Cache Bypass 1 MS Unchecked Buffer in Windows Component In addition to being a smaller target, HP's thin client XP embedded OS contains an Enhanced Write Filter (EWF) preventing damage to the local file system and its OS files. The EWF protects the contents of the media by redirecting all the writes to a temporary virtual memory location. These writes are lost when the system is shutdown or restarted. Finally, none of these vulnerabilities were relevant to the HP CE.NET thin client. CE.NET is significantly smaller than XPe and is not a targeted operating system. Instant Messaging 2003 saw a rise in viruses that infected devices via instant messenger (IM) clients. The proliferation of IM clients and greater acceptance of their use in corporate settings will continue to increase the attractiveness of this vulnerability for virus infections 1. Instant messenger is an optional component for the HP thin client and can be removed to ensure the most secure environment. Multimedia Viewers This technology is a growing concern for security conscious network administrators. The majority of infection occurs through infected/malicious code that is downloaded or shared via the internet. Security holes in internet Media Player have also been reported. Media Player-related intrusions are centered on requests and downloads of media files and skins. Media Player is an optional component for the HP thin client and can be removed to ensure the most secure environment. 1.Wildtrends 2003: A Look at Virus Trends in 2003 and a Few Prediction for 2004; A TruSecure Whitepaper 9
10 Thin Client Firewall A key component to ensure the most secure computing environment is a firewall. HP offers the Microsoft Internet Connection Firewall as an add-on. If one of your systems on the network is compromised by malicious code, the firewall will help prevent your thin client from infection. Additionally, a firewall will help prevent external attacks from reaching your system, protecting against intruders infecting the thin client with malicious code. The following sections show how to enable the Internet Connection Firewall feature to provide Internet security for your HP Compaq t5700 thin client. This paper also discussed how to disable the Internet Connection Firewall feature, which may help in troubleshooting some applications that do not function as expected behind a firewall. The Internet Connection Firewall can be downloaded from: What is Internet Connection Firewall and How Does it Work? Internet Connection Firewall is software that can set restrictions on the information that is communicated between a computer network and the Internet. Internet Connection Firewall is recommended for any Microsoft Windows XP-based computer that is connected directly to the Internet. Internet Connection Firewall is a "stateful" firewall. A stateful firewall is one that monitors all aspects of the communications that cross its path and examines the source and the destination address of each message that the firewall handles. To prevent unsolicited traffic from the public side of the connection from entering the private side, Internet Connection Firewall keeps a table of all the communications that have originated from the computer that is running Internet Connection Firewall. Communications that originate from a source outside the computer that is running Internet Connection Firewall, such as from the Internet, are dropped by the firewall unless an entry is created on the Services tab to permit passage. Instead of sending notifications about activity, Internet Connection Firewall silently discards unsolicited communications. This stops common hacking attempts such as port scanning. Such notifications might be sent frequently enough to become a distraction. Instead, Internet Connection Firewall can create a security log to view the activity that is tracked by the firewall. Downloading Internet Connection Firewall The current HP image ships without the Internet Connection Firewall enabled. This is because most computer users are unaccustomed to using operating systems in which a firewall is enabled by default. To meet the challenge of increasing security vulnerabilities, such as viruses and worms, and to reduce maintenance and total cost of ownership, HP provides the Internet Connection Firewall for download at hp.com. The Internet Connection Firewall can be downloaded from: Enabling Internet Connection Firewall The Internet Connection Firewall is useful when you want to protect a dial-up connection when dialing directly into an Internet service provider (ISP), or to protect a LAN connection that is connected to an asymmetric digital subscriber line (ADSL) or cable modem. You can also enable the Internet Connection 10
11 Firewall feature on the Internet connection of an ICS host computer to provide protection to the ICS host computer. Configuring Internet Connection Firewall Using Network Setup Wizard To enable Internet Connection Firewall feature using the Network Setup Wizard, perform the following steps: 1. Run the Network Setup Wizard. Select Start > Settings > Control Panel and double-click Network and Internet Connections, and then click Setup. 2. The Internet Connection Firewall is enabled when you choose a configuration in the wizard that indicates that your computer is connected directly to the Internet. Configuring Internet Connection Firewall Manually To configure Internet Connection Firewall manually for a connection, perform the following steps: 1. In Control Panel, double-click Networking and Internet Connections, and then click Network Connections. 2. Right-click the connection on which you would like to enable ICF, and then click Properties. 3. On the Advanced tab, select the option, Protect my computer or network. 4. If you want to enable the use of some applications and services through the firewall, you need to enable them by clicking the Settings button, and then selecting the programs, protocols, and services to be enabled for the ICF configuration. Disabling Internet Connection Firewall To disable the Internet Connection Firewall, perform the following steps: 1. In Control Panel, double-click Networking and Internet Connections, and then click Network Connections. 2. Right-click the connection on which you would like to disable ICF, and then click Properties. 3. On the Advanced tab, click the box to clear the option, Protect my computer or network. Using Altiris to Deploy Internet Connection Firewall The install package, Add_Internet_Connection_Firewall_1.00_B1.exe, contains only files for the Internet Connection Firewall. It does not execute any commands that are needed to complete the installation of the component. To successfully deploy this component to the client, the following steps must be done in addition to executing the install package: 1. The Add_Internet_Connection_Firewall_1.00_B1.exe install program must be executed using the "-s" switch. If this program is not executed using the "-s" switch, the program may not install correctly. 2. After executing the install program, the write filter must commit the changes to the flash memory. This can be done by executing the command line. C:\windows\system32\ewfmgr.exe c: -commit 3. A reboot must be executed after the changes are committed to the flash memory. This can be done from an Altiris deployment server job. 11
12 NOTE: For space reasons on a thin client running Windows XPe, HP recommends that the setup program be executed from a network share, and the %TEMP% and %TMP% Windows XPe system variables be temporarily re-defined. Unless the client has free uncompressed space equal to three to four times the size of the install package, the install will probably fail. After modifying the enclosed example batch file, create a new job in the Altiris deployment server. 1. Leave the security context as "Default" 2. Add a reboot to the job. 3. Select the "Run the Script from file" option and select the Add_Internet_Connection_Firewall_1.00_B1.bat file. 4. Under the "In which OS would you like to run this script?" option, select "Windows". NOTE: The "Window state" option can be any of the options. 5. Add a reboot to the job. 6. Select the "Run the Script from file" option and in the "run this script" box type: C:\windows\system32\sleep.exe 60 C:\windows\system32\ewfmgr.exe c: -commit 7. Add a reboot to the job. 8. The job is now ready to be deployed. Pros and Cons of Internet Connection Firewall Pros ICF is free. ICF performed robustly under attack as well as under high utilization. By default, the firewall rule set is very restrictive, preventing most attacks. ICF is a stateful firewall. Stateful firewalls are generally more secure than packet filters. Cons Like all firewalls, ICF will block certain applications. ICF does not perform any outbound filtering. ICF does not have real-time notification of attacks. ICF does not create granular access rules. Recovery Time In the event of a virus attack or other security issue, the HP thin client computing model offers significantly shorter recovery time when compared to the traditional desktop model. If a thin client's image is compromised or corrupted, the recovery time is typically measured in minutes instead of hours. Recovery usually involves a power cycle (1 minute), patch (5 minutes), or re-image (15 minutes) of the system. This is substantially less time than the typical two hours it takes to re-image a PC or the multiple hours that can be spent rebuilding and recovering a user's data and environment. 12
13 The following graph compares the average recovery time of thin clients and desktop computers. In all categories, the HP thin client computing model meets or greatly exceeds the recovery speed performance of the traditional desktop computing model. 13
14 Locking Down A Thin Client Additional security is available for the HP Compaq t57x0 thin client series. Although the default "User" account on the t57x0 thin client is already somewhat locked down, the account does have administrative rights and can still perform activities such as downloading programs to the desktop and executing them. A t57x0 can be further locked down by creating an account with normal user rights (rather than administrative rights) and additionally applying more restrictive policies, such as preventing the user from downloading any files to the thin client. The following sections provide information and instructions for applying these restrictions. Standard User Rights By default, a user account without administrative rights cannot modify the C: drive on a thin client. Furthermore, a user without administrative rights cannot commit changes using the Enhanced Write Filter (EWF). DisableCMD This command provides additional restrictions to a user account. The command prevents users from running the interactive command prompt, Cmd.exe. This setting also determines whether batch files (.cmd and.bat) can run on the computer. If you enable this setting and the user tries to open a command window, the system displays a message explaining that a setting prevents the action. NOTE: Do not prevent the computer from running batch files if the computer uses logon, logoff, startup, or shutdown batch file scripts, or for users that use Terminal Services. Permission Changes on Desktop Folder An administrator can change the security permission on the Desktop folder so that it is Read-only. Prevent File Downloads from Internet Explorer An administrator can set permissions so that a user cannot download files from Internet Explorer. To restrict a user from downloading files from the Internet, perform the following steps: 1. Open Internet Explorer. 2. Select Tools > Internet Options. 3. From Internet Options, select the Security tab and click Custom Level. 4. Scroll down to Downloads > File Downloads. 5. Select Disable to prevent Internet downloads. Prevent Disk-on-Key Access An administrator can disable Disk-On-Keys by performing the following steps: 1. Select Start > Settings > Control Panel > System. 2. Select the Hardware tab. 3. From the Hardware tab, click the Device Manager button. 4. From Device Manager, click on Disk Drives to view all available drives. 14
15 5. Right-click on the device you wish to disable and select Disable. 6. To disable a USB device, click on Universal Serial Bus controllers and repeat steps 4 and 5. NOTE: Future types of Disk-on-Keys may be developed that cannot be blocked by the above method. 7. To prevent users with administrative rights from enabling Disk-on-Keys, you can delete Device Manager after using it to disable the USB devices. Hiding Desktop Items on the HP Compaq t57x0 Thin Client Administrators can remove all or some items from a user s desktop using the hide-stuff.reg file. The hidestuff.reg file will remove all icons from the start menu for the default user. It also removes the tray icon. This will only allow the user to double-click on the IE and/or remote desktop icons that are on the desktop. The hide-stuff.reg file is: REGEDIT4 [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced] "Start_ShowControlPanel"=dword: "Start_ShowMyComputer"=dword: "Start_ShowPrinters"=dword: "Start_MinMFU"=dword: [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer] "NoTrayItemsDisplay"=dword: "NoStartMenuMorePrograms"=dword: [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\StartPage] "Favorites"=hex:ff The hide-stuff-reg file can be modified to include whatever icons you wish. The following table is a list of definitions for each line of the file. To include a particular icon or item, simply delete the appropriate line. Code "Start_ShowControlPanel"=dword: "Start_ShowMyComputer"=dword : "Start_ShowPrinters"=dword: Definition Hide the control panel Hide My Computer Hide Printers 15
16 Code "Start_MinMFU"=dword: Programs "NoTrayItemsDisplay"=dword: "NoStartMenuMorePrograms"=dword: "Favorites"=hex:ff Definition Hide Recently used Hide the Tray icons Hide the More Programs Menus Hide Favorites from Internet Explorer After modifying the hide-stuff.reg file, perform the following steps: 1. Log on as Administrator on the t Copy the attached file into c:\documents and Settings\User\Desktop\. 3. Log off and log on as User. 4. Double-click on the hide-stuff.reg file on the desktop. 5. Click Yes to the warning dialog box. 6. Click OK and log off. 7. Log on as Administrator again. 8. Delete c:\documents and Settings\User\Desktop\hide-stuff.reg. 9. Log on again as User. 10. Click the Start button, and you'll see that all icons are gone. 11. Make sure that the hide-stuff.reg is removed from the desktop and log off. 12. Log on as Administrator. 13. Go in Control Panel and start the EWF Manager. 14. Click the "Commit data to volume" button and reboot. 16
17 Summary The HP thin client computing model provides significantly better virus protection than its PC counterpart. This protection is achieved by: Centralizing an enterprise's computer resources in the data center. Using centralized virus protection and firewall tools to protect these resources. Segregating the user's data for enhanced security, backup, and quick recovery. Deploying HP thin clients for simple, secure, reliable, and efficient access to these centralized resources. Using HP centralized management tools to manage and patch at all levels of the enterprise. 17
18 For more information For additional HP Compaq t5000 thin clients information, please refer to the following: Microsoft, MS-DOS, Windows, and Windows NT are trademarks of Microsoft Corporation in the U.S. and other countries Hewlett-Packard Development Company, L.P.The information in this document is subject to change without notice.the only warranties for HP products and services are set forth in the express warranty statements accompanying such products and services. Nothing herein should be construed as constituting an additional warranty. HP shall not be liable for technical or editorial errors or omissions contained herein , 10/
Thin Client Virus Vulnerability Analysis HP Compaq t5000 Thin Clients
Hp Compaq t5000 Thin Clients June 2004 Instructions. Thin Client Virus Vulnerability Analysis HP Compaq t5000 Thin Clients Table Of Contents Table Of Contents... 1 Executive Summary... 2 Virus Vulnerabilities,
Quick Start to Evaluating. HP t5630w, HP t5730w, HP gt7720
Get your thin client Get your running thin client running Right out Right out of of the box the box Quick Start to Evaluating HP Windows Embedded Standard Thin Clients HP t5630w, HP t5730w, HP gt7720 Get
Quick start to evaluating HP Windows Embedded Standard 2009 Thin Clients. HP t5630w, HP t5730w, HP t5740, HP gt7720
Get your thin client running Right out of the box Quick start to evaluating HP Windows Embedded Standard 2009 Thin Clients HP t5630w, HP t5730w, HP t5740, HP gt7720 Get your new thin client system up and
How To Use The Enhanced Write Filter On Windows Xp Embedded (Dota) With A Powerbook (Dot) And Powerbook 2 (Windows Xp) With An Overlay (Powerbook) With The Write Filter (Wfmgr) On A
Using the Enhanced Write Filter HP Windows XP Embedded-based thin clients: t5630 t57x0 Abstract... 2 Introduction... 2 Benefits of the Enhanced Write Filter... 2 Enhanced Write Filter Status Service...
Step-by-Step Guide to Securing Windows XP Professional with Service Pack 2 in Small and Medium Businesses
Step-by-Step Guide to Securing Windows XP Professional with Service Pack 2 in Small and Medium Businesses 2004 Microsoft Corporation. All rights reserved. This document is for informational purposes only.
Embedded Operating Systems Selection Guide
Embedded Selection Guide Common features........................................................2 Advantages of embedded operating systems and thin client hardware................... 3 Windows XP Embedded
USER GUIDE. Ethernet Configuration Guide (Lantronix) P/N: 2900-300321 Rev 6
KRAMER ELECTRONICS LTD. USER GUIDE Ethernet Configuration Guide (Lantronix) P/N: 2900-300321 Rev 6 Contents 1 Connecting to the Kramer Device via the Ethernet Port 1 1.1 Connecting the Ethernet Port Directly
HP Digital Signage Player MP4 and MP9 Microsoft Windows Embedded Standard 7. Quick Reference Guide
HP Digital Signage Player MP4 and MP9 Microsoft Windows Embedded Standard 7 Quick Reference Guide Copyright 2014 Hewlett-Packard Development Company, L.P. Microsoft and Windows are U.S. registered trademarks
Windows Embedded Standard 7 for HP Thin Clients. Administrator Guide
Windows Embedded Standard 7 for HP Thin Clients Administrator Guide Copyright 2010, 2012 2014 Hewlett- Packard Development Company, L.P. Microsoft and Windows are trademarks of the Microsoft group of companies.
Bluetooth for Windows
Bluetooth for Windows Getting Started Copyright 2006 Hewlett-Packard Development Company, L.P. Microsoft and Windows are U.S. registered trademarks of Microsoft Corporation. Bluetooth is a trademark owned
Quick Reference Guide for Microsoft Windows XPe-based Thin Clients - t5720 & t5730 Quick Reference Guide
Quick Reference Guide for Microsoft Windows XPe-based Thin Clients - t5720 & t5730 Quick Reference Guide Copyright 2008 Hewlett-Packard Development Company, L.P. The information contained herein is subject
Implementing Gemalto Smart Card for Use with HP Compaq t5720 and HP CCI
Implementing Gemalto Smart Card for Use with HP Compaq t5720 and HP CCI Introduction............................................................ 2 Prerequisites............................................................
Connection and Printer Setup Guide
Connection and Printer Setup Guide For connection issues, see the following sections of this document: "Connection Requirements" on page 1 "Log on" on page 2 "Troubleshooting Your Connection" on page 4
How to Configure Windows Firewall on a Single Computer
Security How to Configure Windows Firewall on a Single Computer Introduction Windows Firewall is a new feature of Microsoft Windows XP Service Pack 2 (SP2) that is turned on by default. It monitors and
HP External Hard Disk Drive Backup Solution by Seagate User Guide. November 2004 (First Edition) Part Number 373652-001
HP External Hard Disk Drive Backup Solution by Seagate User Guide November 2004 (First Edition) Part Number 373652-001 Copyright 2004 Hewlett-Packard Development Company, L.P. The information contained
HP Thin Client Imaging Tool
HP Thin Client Imaging Tool Table of Contents: Abstract... 1 Introduction... 1 System Requirements... 1 Software... 1 Hardware... 1 Getting Started... 2 Formatting a USB Flash Device... 3 Unpacking the
HP PolyServe Software 4.1.0 upgrade guide
HP StorageWorks HP PolyServe Software 4.1.0 upgrade guide This document describes how to upgrade to HP PolyServe Matrix Server 4.1.0, HP PolyServe Software for Microsoft SQL Server 4.1.0, and HP PolyServe
Using HP System Software Manager for the mass deployment of software updates to client PCs
Using HP System Software Manager for the mass deployment of software updates to client PCs Introduction... 2 HP manageability solutions... 2 SSM overview... 3 Software updates... 3 Why not SSM-enabled?...
ADSL Router Quick Installation Guide Revised, edited and illustrated by Neo
ADSL Router Quick Installation Guide Revised, edited and illustrated by Neo A typical set up for a router PCs can be connected to the router via USB or Ethernet. If you wish to use a telephone with the
FTP Server Configuration
FTP Server Configuration For HP customers who need to configure an IIS or FileZilla FTP server before using HP Device Manager Technical white paper 2 Copyright 2012 Hewlett-Packard Development Company,
Kaseya 2. Installation guide. Version 7.0. English
Kaseya 2 Kaseya Server Setup Installation guide Version 7.0 English September 4, 2014 Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept
HP ThinShell. Administrator Guide
HP ThinShell Administrator Guide Copyright 2014 Hewlett-Packard Development Company, L.P. Microsoft and Windows are U.S. registered trademarks of the Microsoft group of companies. Confidential computer
Instructions for installing Microsoft Windows Small Business Server 2003 R2 on HP ProLiant servers
Instructions for installing Microsoft Windows Small Business Server 2003 R2 on HP ProLiant servers integration note Abstract... 2 Installation requirements checklists... 3 HP ProLiant server checklist...
HP Softpaq Download Manager and HP System Software Manager
Technical white paper HP Softpaq Download Manager and HP System Software Manager A Powerful Combination Table of contents Executive summary... 2 Overview of HP SDM and HP SSM... 2 Use case for HP SDM and
STATISTICA VERSION 9 STATISTICA ENTERPRISE INSTALLATION INSTRUCTIONS FOR USE WITH TERMINAL SERVER
Notes: STATISTICA VERSION 9 STATISTICA ENTERPRISE INSTALLATION INSTRUCTIONS FOR USE WITH TERMINAL SERVER 1. These instructions focus on installation on Windows Terminal Server (WTS), but are applicable
Creating and Restoring Images on the HP Thin Client with Altiris Deployment Server v6.5
Creating and Restoring Images on the HP Thin Client with Altiris Deployment Server v6.5 HP thin clients running Microsoft Windows Embedded Standard 2009 (WES) and Windows XP Embedded (XPe) Table of Contents:
Network/Floating License Installation Instructions
Network/Floating License Installation Instructions Installation steps: On the Windows PC that will act as License Manager (SERVER): 1. Install HASP Run-time environment, SERVER 2. Plug in the red USB hardware
HP ProtectTools Embedded Security Guide
HP ProtectTools Embedded Security Guide Document Part Number: 364876-001 May 2004 This guide provides instructions for using the software that allows you to configure settings for the HP ProtectTools Embedded
Implementing, Managing, and Maintaining a Microsoft Windows Server 2003 Network Infrastructure
Question Number (ID) : 1 (wmpmsp_mngnwi-121) You are an administrator for an organization that provides Internet connectivity to users from the corporate network. Several users complain that they cannot
Surf it Easy. User Guide
Surf it Easy User Guide User Manual Version 1.1 2004 CoSoSys SRL Surf it Easy User Manual Table of Contents Table of Contents... I 1. Introduction... 1 2. System Requirements... 2 3. Installation... 2
InventoryControl for use with QuoteWerks Quick Start Guide
InventoryControl for use with QuoteWerks Quick Start Guide Copyright 2013 Wasp Barcode Technologies 1400 10 th St. Plano, TX 75074 All Rights Reserved STATEMENTS IN THIS DOCUMENT REGARDING THIRD PARTY
Sharing Pictures, Music, and Videos on Windows Media Center Extender
Sharing Pictures, Music, and Videos on Windows Media Center Extender Applies to: Microsoft Windows XP Media Center Edition Microsoft Windows Media Center Extender Microsoft Windows Media Center Extender
Troubleshooting File and Printer Sharing in Microsoft Windows XP
Operating System Troubleshooting File and Printer Sharing in Microsoft Windows XP Microsoft Corporation Published: November 2003 Updated: August 2004 Abstract File and printer sharing for Microsoft Windows
Windows Embedded Standard 7 (WES7) Administration Guide
Windows Embedded Standard 7 (WES7) Administration Guide Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your computer. CAUTION: A CAUTION indicates
Windows Operating Systems. Basic Security
Windows Operating Systems Basic Security Objectives Explain Windows Operating System (OS) common configurations Recognize OS related threats Apply major steps in securing the OS Windows Operating System
HP IMC User Behavior Auditor
HP IMC User Behavior Auditor Administrator Guide Abstract This guide describes the User Behavior Auditor (UBA), an add-on service module of the HP Intelligent Management Center. UBA is designed for IMC
Metasys System Direct Connection and Dial-Up Connection Application Note
Metasys System Direct Connection and Dial-Up Connection Application Note Code No. LIT-1201639 Software Release 5.1 Issued August 27, 2013 Supersedes October 4 2010 Refer to the QuickLIT website for the
HP SoftPaq Download Manager and HP System Software Manager A Powerful Combination
HP SoftPaq Download Manager and HP System Software Manager A Powerful Combination Technical white paper Table of contents Executive summary... 2 Overview of HP SDM and HP SSM... 2 Use Case for SDM/SSM...
Setup and Configuration Guide for Pathways Mobile Estimating
Setup and Configuration Guide for Pathways Mobile Estimating Setup and Configuration Guide for Pathways Mobile Estimating Copyright 2008 by CCC Information Services Inc. All rights reserved. No part of
SMART INSTALL CONTENTS. Questions and answers
SMART INSTALL Questions and answers CONTENTS Frequently asked questions...2 Compatibility...3 USB connection...3 Wired or wireless network connection...4 Software CD...5 After installation...6 Software
Windows Remote Access
Windows Remote Access A newsletter for IT Professionals Education Sector Updates Issue 1 I. Background of Remote Desktop for Windows Remote Desktop Protocol (RDP) is a proprietary protocol developed by
City of Jacksonville 1 of 6 Start Here >> http://remote.coj.net
Citrix Remote Access allows employees to access all parts of the city s computer network from any PC with internet connectivity. Simply type the URL for Remote Access on any internet browser anywhere,
Table of Contents. FleetSoft Installation Guide
FleetSoft Installation Guide Table of Contents FleetSoft Installation Guide... 1 Minimum System Requirements... 2 Installation Notes... 3 Frequently Asked Questions... 4 Deployment Overview... 6 Automating
HP LaserJet MFP Analog Fax Accessory 300 Send Fax Driver Guide
HP LaserJet MFP Analog Fax Accessory 300 Send Fax Driver Guide Copyright and License 2008 Copyright Hewlett-Packard Development Company, L.P. Reproduction, adaptation, or translation without prior written
DocuPrint C3290 FS Features Setup Guide
DocuPrint C3290 FS Features Setup Guide Adobe and PostScript are trademarks of Adobe Systems Incorporated in the United States and/or other countries. Apple, Bonjour, ColorSync, EtherTalk, Macintosh, and
Citrix Access Gateway Plug-in for Windows User Guide
Citrix Access Gateway Plug-in for Windows User Guide Access Gateway 9.2, Enterprise Edition Copyright and Trademark Notice Use of the product documented in this guide is subject to your prior acceptance
Topaz Installation Sheet
Topaz Installation Sheet P/N 460924001E ISS 08FEB12 Content Introduction... 3 Recommended minimum requirements... 3 Setup for Internet Explorer:... 4 Topaz installation... 10 Technical support... 14 Copyright
WinConnect Server ES User Manual
THINSOFT PTE LTD 23 Tai Seng Drive, #06-00, Singapore 535224, Fax (65) 6289-7308 www.thinsoftinc.com WinConnect Server ES User Manual Document Version 1.0 1 WinConnect Server ES User Manual Copyright 2007
Enabling Backups for Windows and MAC OS X
Enabling Backups for Windows and MAC OS X TM Trademarks and Copyrights Copyright Storix, Inc. 1999-2005 Storix is a registered trademark of Storix, Inc. SBAdmin is a trademark of Storix, Inc in the USA
PC Security and Maintenance
PC Security and Maintenance by IMRAN GHANI PC Maintenance and Security-Forecast. Major sources of danger. Important steps to protect your PC. PC Security Tools. PC Maintenance Tools. Tips. PC Security-
Printing and Imaging Support on HP Compaq Thin Clients
Printing and Imaging Support on HP Compaq Thin Clients Overview.............................................................. 2 Microsoft Windows XP Embedded Operating System............................
CANON FAX L360 SOFTWARE MANUAL
CANON FAX L360 SOFTWARE MANUAL Before You Begin the Installation: a Checklist 2 To ensure a smooth and successful installation, take some time before you begin to plan and prepare for the installation
Easy Setup Guide for the Sony Network Camera
-878-191-11 (1) Easy Setup Guide for the Sony Network Camera For setup, a computer running the Microsoft Windows Operating System is required. For monitoring camera images, Microsoft Internet Explorer
HP Device Manager 4.6
Technical white paper HP Device Manager 4.6 FTP Server Configuration Table of contents Overview... 2 IIS FTP server configuration... 2 Installing FTP v7.5 for IIS... 2 Creating an FTP site with basic authentication...
HP ProtectTools User Guide
HP ProtectTools User Guide Copyright 2007 Hewlett-Packard Development Company, L.P. Microsoft and Windows are U.S. registered trademarks of Microsoft Corporation. Intel is a trademark or registered trademark
COMMANDS 1 Overview... 1 Default Commands... 2 Creating a Script from a Command... 10 Document Revision History... 10
LabTech Commands COMMANDS 1 Overview... 1 Default Commands... 2 Creating a Script from a Command... 10 Document Revision History... 10 Overview Commands in the LabTech Control Center send specific instructions
Installation Guide. Your FedEx Ship Manager system number. Before you start
Installation Guide Your FedEx Ship Manager system number Installation Guide During registration, you receive a FedEx Ship Manager system number. Write the number here so you have it on hand whenever you
ms-help://ms.technet.2005mar.1033/security/tnoffline/security/smbiz/winxp/fwgrppol...
Page 1 of 16 Security How to Configure Windows Firewall in a Small Business Environment using Group Policy Introduction This document explains how to configure the features of Windows Firewall on computers
Getting started. Symantec AntiVirus Corporate Edition. About Symantec AntiVirus. How to get started
Getting started Symantec AntiVirus Corporate Edition Copyright 2004 Symantec Corporation. All rights reserved. Printed in the U.S.A. 03/04 10223881 Symantec and the Symantec logo are U.S. registered trademarks
HP Device Manager 4.6
Technical white paper HP Device Manager 4.6 Disaster Recovery Guide Table of contents Overview... 2 General recovery process... 2 Recovering the HPDM Server... 5 Backing up the data... 5 Installing the
Kaseya Server Instal ation User Guide June 6, 2008
Kaseya Server Installation User Guide June 6, 2008 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private Sector IT organizations. Kaseya's
VERITAS Backup Exec 9.1 for Windows Servers Quick Installation Guide
VERITAS Backup Exec 9.1 for Windows Servers Quick Installation Guide N109548 Disclaimer The information contained in this publication is subject to change without notice. VERITAS Software Corporation makes
Symantec LiveUpdate Administrator. Getting Started Guide
Symantec LiveUpdate Administrator Getting Started Guide Symantec LiveUpdate Administrator Getting Started Guide The software described in this book is furnished under a license agreement and may be used
Internet Explorer 7. Getting Started The Internet Explorer Window. Tabs NEW! Working with the Tab Row. Microsoft QUICK Source
Microsoft QUICK Source Internet Explorer 7 Getting Started The Internet Explorer Window u v w x y { Using the Command Bar The Command Bar contains shortcut buttons for Internet Explorer tools. To expand
HP Compaq Thin Client Imaging Tool HP Compaq Thin Client t5000 Series
thin clients april 2003 instructions. HP Compaq Thin Client Imaging Tool HP Compaq Thin Client t5000 Series Table Of Contents Table Of Contents... 1 Abstract... 2 Introduction... 2 System Requirements...
TouchPad and Keyboard
TouchPad and Keyboard Document Part Number: 393522-001 October 2005 This guide explains the TouchPad and keyboard. Contents 1 TouchPad Identifying the Touchpad........................... 1 Using the TouchPad...............................
Web-Access Security Solution
WavecrestCyBlock Client Version 2.1.13 Web-Access Security Solution UserGuide www.wavecrest.net Copyright Copyright 1996-2014, Wavecrest Computing, Inc. All rights reserved. Use of this product and this
How to use Data Protector 6.0 or 6.10 with Exchange Recovery Storage Groups to restore a single mailbox
How to use Data Protector 6.0 or 6.10 with Exchange Recovery Storage Groups to restore a single mailbox Introduction... 3 Exchange 2003... 4 Creating a Recovery Storage Group... 4 Restoring the Information
GlobalSCAPE DMZ Gateway, v1. User Guide
GlobalSCAPE DMZ Gateway, v1 User Guide GlobalSCAPE, Inc. (GSB) Address: 4500 Lockhill-Selma Road, Suite 150 San Antonio, TX (USA) 78249 Sales: (210) 308-8267 Sales (Toll Free): (800) 290-5054 Technical
Getting Started. rp5800, rp5700 and rp3000 Models
Getting Started rp5800, rp5700 and rp3000 Models Copyright 2011 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. Microsoft, Windows, and Windows
HP CLASSROOM MANAGER. Empowering teachers, engaging students. QuickStart Guide for Teachers
HP CLASSROOM MANAGER Empowering teachers, engaging students QuickStart Guide for Teachers Copyright 2011 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change
Reporting for Contact Center Setup and Operations Guide. BCM Contact Center
Reporting for Contact Center Setup and Operations Guide BCM Contact Center Document Number: NN40040-302 Document Status: Standard Document Version: 04.00 Part Code: N0060637 Date: June 2006 Copyright 2005
STATISTICA VERSION 10 STATISTICA ENTERPRISE SERVER INSTALLATION INSTRUCTIONS
Notes: STATISTICA VERSION 10 STATISTICA ENTERPRISE SERVER INSTALLATION INSTRUCTIONS 1. The installation of the STATISTICA Enterprise Server entails two parts: a) a server installation, and b) workstation
Introduction. Before you begin. Installing efax from our CD-ROM. Installing efax after downloading from the internet
Introduction Before you begin Before you begin installing efax, please check the following: You have received confirmation that your application for the efax service has been processed. The confirmation
Creating client-server setup with multiple clients
Creating client-server setup with multiple clients Coffalyser.Net uses a SQL client server database model to store all project/experiment- related data. The client-server model has one main application
Objectives. At the end of this chapter students should be able to:
NTFS PERMISSIONS AND SECURITY SETTING.1 Introduction to NTFS Permissions.1.1 File Permissions and Folder Permission.2 Assigning NTFS Permissions and Special Permission.2.1 Planning NTFS Permissions.2.2
HP VMware ESXi 5.0 and Updates Getting Started Guide
HP VMware ESXi 5.0 and Updates Getting Started Guide Abstract This guide is intended to provide setup information for HP VMware ESXi. HP Part Number: 616896-002 Published: August 2011 Edition: 1 Copyright
Getting started. Symantec AntiVirus Business Pack. About Symantec AntiVirus. Where to find information
Getting started Symantec AntiVirus Business Pack Copyright 2004 Symantec Corporation. All rights reserved. Printed in the U.S.A. 03/04 Symantec and the Symantec logo are U.S. registered trademarks of Symantec
System Environment Specifications Network, PC, Peripheral & Server Requirements
Allscripts MyWay 8.6 System Environment Specifications Network, PC, Peripheral & Server Requirements NETWORK REQUIREMENTS An Internet Protocol (TCP/IP) network is required between Allscripts MyWay clients
User Profile Manager 2.6
User Profile Manager 2.6 User Guide ForensiT Limited, Innovation Centre Medway, Maidstone Road, Chatham, Kent, ME5 9FD England. Tel: US 1-877-224-1721 (Toll Free) Intl. +44 (0) 845 838 7122 Fax: +44 (0)
Windows 10 IoT Enterprise on HP Thin Clients. Administrator Guide
Windows 10 IoT Enterprise on HP Thin Clients Administrator Guide Copyright 2016 HP Development Company, L.P. Citrix and XenDesktop are trademarks of Citrix Systems, Inc. and/or one more of its subsidiaries,
Using TS-ACCESS for Remote Desktop Access
Using TS-ACCESS for Remote Desktop Access Introduction TS-ACCESS is a remote desktop access feature available to CUA faculty and staff who need to access administrative systems or other computing resources
McAfee.com Personal Firewall
McAfee.com Personal Firewall 1 Table of Contents Table of Contents...2 Installing Personal Firewall...3 Configuring Personal Firewall and Completing the Installation...3 Configuring Personal Firewall...
CODESOFT Installation Scenarios
CODESOFT Installation Scenarios NOTES: CODESOFT is a separate install from existing versions of CODESOFT. You will need to make note of your current settings (default directories, etc.) so you can duplicate
Antivirus. Quick Start Guide. Antivirus
Antivirus 2007 Antivirus plus I Firewall Quick Start Guide Helpful Information on Installation and Set-Up STOPS and Removes Viruses DELIVERS Proactive Firewall Protection EASY to Set Up and Use FREE Upgrades
MGC WebCommander Web Server Manager
MGC WebCommander Web Server Manager Installation and Configuration Guide Version 8.0 Copyright 2006 Polycom, Inc. All Rights Reserved Catalog No. DOC2138B Version 8.0 Proprietary and Confidential The information
Fiery E100 Color Server. Welcome
Fiery E100 Color Server Welcome 2011 Electronics For Imaging, Inc. The information in this publication is covered under Legal Notices for this product. 45098226 27 June 2011 WELCOME 3 WELCOME This Welcome
Iridium Extreme TM Satellite Phone. Data Services Manual
Iridium Extreme TM Satellite Phone Data Services Manual Table of Contents 1 OVERVIEW... 1 2 HOW IT WORKS... 1 3 BEFORE INSTALLING... 2 4 USB DRIVER INSTALLATION... 3 5 MODEM INSTALLATION AND CONFIGURATION...
Sharp Remote Device Manager (SRDM) Server Software Setup Guide
Sharp Remote Device Manager (SRDM) Server Software Setup Guide This Guide explains how to install the software which is required in order to use Sharp Remote Device Manager (SRDM). SRDM is a web-based
Moxa Device Manager 2.0 User s Guide
First Edition, March 2009 www.moxa.com/product 2009 Moxa Inc. All rights reserved. Reproduction without permission is prohibited. Moxa Device Manager 2.0 User Guide The software described in this manual
Release Notes. Contents. Release Purpose. Platform Compatibility. Windows XP and Internet Explorer 8 Update
Secure Remote Access Dell SonicWALL SRA 7.5.0.12 Contents Release Purpose... 1 Platform Compatibility... 1 Licensing on the Dell SonicWALL SRA Appliances and Virtual Appliance... 2 Important Differences
McAfee Internet Security Suite Quick-Start Guide
Enjoy a Worry Free Online Experience McAfee Internet Security Suite protects your PC, identity and online experience. It also includes PC and network tools, plus McAfee SiteAdvisor for safe surfing. Internet
USB 2.0 4-PORT NETWORK HUB. User Manual DA-70251 DA-70252 1
USB 2.0 4-PORT NETWORK HUB User Manual DA-70251 DA-70252 1 Copyright Notice Copyright DIGITUS 2010. All rights reserved. Disclaimer DIGITUS shall not be liable for technical or editorial errors or omissions
Sage ERP MAS 90 Sage ERP MAS 200 Sage ERP MAS 200 SQL. Installation and System Administrator's Guide 4MASIN450-08
Sage ERP MAS 90 Sage ERP MAS 200 Sage ERP MAS 200 SQL Installation and System Administrator's Guide 4MASIN450-08 2011 Sage Software, Inc. All rights reserved. Sage, the Sage logos and the Sage product
Microsoft BackOffice Small Business Server 4.5 Installation Instructions for Compaq Prosignia and ProLiant Servers
Integration Note October 2000 Prepared by OS Integration Engineering Compaq Computer Corporation Contents Introduction...3 Requirements...3 Minimum Requirements...4 Required Information...5 Additional
HP ProLiant DL380 G5 High Availability Storage Server
HP ProLiant DL380 G5 High Availability Storage Server installation instructions *5697-7748* Part number: 5697 7748 First edition: November 2008 Legal and notice information Copyright 1999, 2008 Hewlett-Packard
Additional Requirements for ARES-G2 / RSA-G2. One Ethernet 10 Base T/100 Base TX network card required for communication with the instrument.
TA Instruments TRIOS Software Installation Instructions Installation Requirements Your TRIOS Instrument Control software includes all the components necessary to install or update the TRIOS software, as
Go Wireless. Open up new possibilities for work and play
Go Wireless Open up new possibilities for work and play Start with 3 pieces A typical home or small-office wireless LAN requires only 3 pieces of hardware. With these 3 pieces, you re ready to get started!
Lab - Using Wireshark to View Network Traffic
Topology Objectives Part 1: (Optional) Download and Install Wireshark Part 2: Capture and Analyze Local ICMP Data in Wireshark Start and stop data capture of ping traffic to local hosts. Locate the IP
