Setting Up Database Security with Access 97

Size: px
Start display at page:

Download "Setting Up Database Security with Access 97"

Transcription

1 Setting Up Database Security with Access 97 The most flexible and extensive method of securing a database is called user-level security. This form of security is similar to methods used in most network systems. Users are required to identify themselves and type a password when they start Microsoft Access. Within the workgroup information file, they are identified as members of a group. Microsoft Access provides two default groups: administrators (named the Admins group) and users (named the Users group), but additional groups can be defined. Permissions are granted to groups and users to regulate how they are allowed to work with each object in a database. Creating a Secure Workgroup Information File When you install Microsoft Access, the Setup program automatically creates a Microsoft Access workgroup information file that is identified by the name and organization information you specify. With this existing workgroup, anyone can administer any database. To prevent this, create a new workgroup information file and specify a workgroup ID (WID). All information regarding user names, passwords and groups will be stored in this file. 1) Exit Microsoft Access, if necessary. 2) To start the Workgroup Administrator, do one of the following, depending on which operating system you are using:? If you are using Windows 95, use My Computer or Windows Explorer to open the System subfolder in the Windows folder, and then double-click Wrkgadm.exe.? If you are using Windows NT Workstation 4.0, use My Computer or Windows Explorer to open the System32 subfolder in the WinNT folder, and then doubleclick Wrkgadm.exe. 3) In the Workgroup Administrator dialog box, click Create, and then type your name and organization. 4) In the Workgroup Owner Information dialog box, type any combination of up to 20 numbers and letters, and then click OK. Caution: Be sure to write down your exact name, organization, and workgroup ID, including whether letters are uppercase or lowercase (for all three entries), and keep them in a secure place. If you have to re-create the workgroup information file, you must supply exactly the same name, organization, and workgroup ID. If you forget or lose these entries, you can't recover them and might lose access to your databases. 5) Type a new name for the new workgroup information file, and then click OK. To save in a different location, type a new path or click Browse to specify the new path.)

2 Joining a Microsoft Access workgroup 1) Exit Microsoft Access. 2) To start the Workgroup Administrator, do one of the following, depending on which operating system you are using:? If you are using Windows 95, use My Computer or Windows Explorer to open the System subfolder in the Windows folder, and then double-click Wrkgadm.exe.? If you are using Windows NT Workstation 4.0, use My Computer or Windows Explorer to open the System32 subfolder in the WinNT folder, and then doubleclick Wrkgadm.exe. 3) In the Workgroup Administrator dialog box, click Join. 4) Type the path and name of the workgroup information file that defines the Microsoft Access workgroup you want to join, and then click OK, or click Browse and then use the Select Workgroup Information File dialog box to locate the workgroup information file. The next time you start Microsoft Access, it uses the user and group accounts and passwords stored in the workgroup information file for the workgroup you joined. Activate the Logon dialog box Until you activate the logon procedure for a workgroup, Microsoft Access automatically logs on all users at startup using the predefined Admin user account. You require users in a workgroup to log on by adding a password to the Admin user account. 1) Join the workgroup whose logon procedure you want to activate. 2) Start Microsoft Access and then open a database. 3) On the Tools menu, point to Security, and then click User And Group Accounts. 4) Click the Users tab, and make sure that the predefined Admin user account is highlighted in the Name box. 5) Click the Change Logon Password tab, click the New Password box, and type the new password. Don't type anything in the Old Password box. To maintain the security of your password, Microsoft Access displays asterisks (*) as you type. Passwords can be 1 to 14 characters and can include any characters except ASCII character 0 (null). Passwords are case-sensitive. 6) Verify the password by typing it again in the Verify box, and then click OK. 7) The Logon dialog box is displayed the next time any member of the workgroup that you joined starts Microsoft Access. If no user accounts are currently defined for that workgroup, the Admin user is the only valid account at this point.

3 Create the Administrator's User Account. To complete this procedure, you must be logged on as a member of the Admins group. 1) Start Microsoft Access using a secure workgroup. 2) Open a database. 3) On the Tools menu, point to Security, and then click User And Group Accounts. 4) On the Users tab, click New. 5) In the New User/Group dialog box, type the name of the administrator account and a personal ID (PID), and then click OK to create the new account. Note The PID is not a password. Microsoft Access uses the PID and the user name as seeds for an encryption algorithm to generate a secure identifier for the user account. User names can be 1 to 20 characters long and can include alphabetic characters, accented characters, numbers, spaces, and symbols, with the following exceptions:? The characters " / \ [ ] : < > + = ;,? *? Leading spaces? Control characters (ASCII 00 through ASCII 31) Caution Be sure to write down the exact account name and PID entries, including whether letters are uppercase or lowercase, and keep them in a secure place. If you ever have to re-create the account, you must supply the same name and PID entries. If you forget or lose these entries, you can't recover them. 6) In the Available Groups box, click Admins, and then click Add. Microsoft Access adds the new administrator account to the Admins group and displays Admins in the Member Of box. 7) Click OK to create the new administrator account. 8) Exit Microsoft Access and log on as the administrator. Remove the Admin user from the Admins group. To complete this procedure, you must be logged on as a member of the Admins group. 1) Start Microsoft Access and open a database. 2) On the Tools menu, point to Security, and then click User And Group Accounts. 3) On the Users tab, display the Admin user in the Name box. 4) In the Member Of box, click the Admins group you want to remove the user from, and then click Remove. 5) Click OK when you are finished. Note There must be at least one user in the predefined Admins group at all times.

4 Using the User-Level Security Wizard 1) Open the database you want to secure. 2) On the Tools menu, point to Security, and then click User-Level Security Wizard. 3) Follow the directions in the wizard dialog boxes. The User-Level Security Wizard creates a new database, exports copies of all of the objects from the original database, secures the object types selected in the first dialog box of the wizard by revoking all permissions of the Users group for those objects in the new database, and then encrypts the new database. The original database is not changed in any way. Table relationships and any linked tables are also re-created in the new database. At this point, only members of the Admins group in the workgroup you joined in step 1 will have access to the secured objects in the new database. The Users group has no permissions for the secured objects. You need to grant permissions to users and/or groups in order to regulate access to the secured objects. For information on granting permissions and creating user and group accounts, click. How permissions work and who can assign them There are two types of permissions: explicit and implicit. Explicit permissions are those permissions granted directly to a user account; no other users are affected. Implicit permissions are those permissions granted to a group account. Adding a user to that group grants the group's permissions to that user; removing a user from the group takes away the group's permissions from that user. Permissions can be changed for a database object by:? Members of the Admins group of the workgroup information file in use when the database was created.? The owner of the object.? Any user who has Administer permission for the object. Even though users might not currently be able to perform an action, they might be able to grant themselves permissions to perform the action. This is true if a user is a member of the Admins group, or if a user is the owner of an object. The user who creates an object is the owner of that object. The same group of users who can change permissions can change the ownership of an object using the User And Group Permissions command on the Security submenu (Tools menu), or can recreate the object. The best way to secure an entire database is by using the User-Level Security Wizard, which creates a new database and imports all objects into it.

5 Create user or group accounts and grant permissions If you only need an administrators group and users group for your security purposes, you don't need to create additional groups; you can use the default Admins and Users groups. In this case, you only need to assign the appropriate permissions to the default Users group and add any additional administrators to the default Admins group. Any new users you add are automatically added to the Users group. Typical permissions for the Users group might include Read Data and Update Data for tables and queries, and Open/Run for forms and reports. Creating a User Account To complete this procedure, you must be logged on as a member of the Admins group. 1) Start Microsoft Access using the workgroup in which you want to use the account. Important The accounts you create for users must be stored in the workgroup information file that those users will use. If you're using a different workgroup to create the database, change your workgroup before creating the accounts. 2) Open a database. 3) On the Tools menu, point to Security, and then click User And Group Accounts. 4) On the Users tab, click New. 5) In the New User/Group dialog box, type the name of the new account and a personal ID (PID), and then click OK to create the new account. It is automatically added to the Users group User names can be 1 to 20 characters long and can include alphabetic characters, accented characters, numbers, spaces, and symbols, with the following exceptions:? The characters " / \ [ ] : < > + = ;,? *? Leading spaces? Control characters (ASCII 00 through ASCII 31) Caution Be sure to write down the exact account name and PID, including whether letters are uppercase or lowercase, and keep them in a secure place. If you ever have to re-create an account that has been deleted or created in a different workgroup, you must supply the same name and PID entries. If you forget or lose these entries, you can't recover them. Note It is usually easier to manage security if you organize users into groups and then assign permissions to groups rather than to individual users.

6 Assign or remove permissions for a database and existing database objects 1) Open the database that contains the objects you want to secure. The workgroup information file in use when you log on must contain the user or group accounts you want to assign permissions for at this time; however, you can assign permissions to groups and add users to those groups later. 2) On the Tools menu, point to Security, and then click User And Group Permissions. 3) On the Permissions tab, click Users or Groups, and then click the user or group whose permissions you want to assign in the User/Group Name box. 4) Click the type of object in the Object Type box, and then click the name of the object to assign permissions for in the Object Name box. Tip You can select multiple objects in the Object Name box by dragging through the objects you want to select or by holding down CTRL and clicking the objects you want. 5) Under Permissions, select the permissions you want to assign, or clear the permissions you want to remove for the group or user, and then click Apply. Repeat steps 4 and 5 to assign or remove permissions for additional objects for the current user or group. 6) Repeat steps 3 through 5 for any additional users or groups, and then click OK when you have finished. Notes? Some permissions automatically imply the selection of others. For example, the Modify Data permission for a table automatically implies the Read Data and Read Design permissions because you need these to modify the data in a table. Modify Design and Read Data imply Read Design. For macros, Read Design implies Open/Run.? When you edit an object and save it, it retains its assigned permissions. However, if an object is saved with a new name using the Save As command on the File menu or by cutting and pasting, importing, or exporting the object, the associated permissions are lost; you have to reassign them. This is because you are creating a new object that is assigned the default permissions defined for that object type.

Outlook 2007: Managing your mailbox

Outlook 2007: Managing your mailbox Outlook 2007: Managing your mailbox Find its size and trim it down Use Mailbox Cleanup On the Tools menu, click Mailbox Cleanup. You can do any of the following from this one location: View the size of

More information

STATISTICA VERSION 9 STATISTICA ENTERPRISE INSTALLATION INSTRUCTIONS FOR USE WITH TERMINAL SERVER

STATISTICA VERSION 9 STATISTICA ENTERPRISE INSTALLATION INSTRUCTIONS FOR USE WITH TERMINAL SERVER Notes: STATISTICA VERSION 9 STATISTICA ENTERPRISE INSTALLATION INSTRUCTIONS FOR USE WITH TERMINAL SERVER 1. These instructions focus on installation on Windows Terminal Server (WTS), but are applicable

More information

File and Printer Sharing with Microsoft Windows

File and Printer Sharing with Microsoft Windows Operating System File and Printer Sharing with Microsoft Windows Microsoft Corporation Published: November 2003 Abstract File and printer sharing in Microsoft Windows allows you to share the contents of

More information

Windows Server 2003 Logon Scripts Paul Flynn

Windows Server 2003 Logon Scripts Paul Flynn Creating logon scripts You can use logon scripts to assign tasks that will be performed when a user logs on to a particular computer. The scripts can carry out operating system commands, set system environment

More information

Installation Instruction STATISTICA Enterprise Small Business

Installation Instruction STATISTICA Enterprise Small Business Installation Instruction STATISTICA Enterprise Small Business Notes: ❶ The installation of STATISTICA Enterprise Small Business entails two parts: a) a server installation, and b) workstation installations

More information

Fairfield University Using Xythos for File Sharing

Fairfield University Using Xythos for File Sharing Fairfield University Using Xythos for File Sharing Version 7.0 Table of Contents I: Manage your Department Folder...2 Your Department Folder... 2 II: Sharing Folders and Files Inside of Fairfield U...3

More information

STATISTICA VERSION 12 STATISTICA ENTERPRISE SMALL BUSINESS INSTALLATION INSTRUCTIONS

STATISTICA VERSION 12 STATISTICA ENTERPRISE SMALL BUSINESS INSTALLATION INSTRUCTIONS STATISTICA VERSION 12 STATISTICA ENTERPRISE SMALL BUSINESS INSTALLATION INSTRUCTIONS Notes 1. The installation of STATISTICA Enterprise Small Business entails two parts: a) a server installation, and b)

More information

Figure 1 - Open Window with drop down menu displayed

Figure 1 - Open Window with drop down menu displayed Microsoft Access Database Security R. Baker Database security is an important issue in all organizations for several reasons. The data itself is an asset to the organization and has a value like all other

More information

Transitioning from TurningPoint 5 to TurningPoint Cloud - LMS 1

Transitioning from TurningPoint 5 to TurningPoint Cloud - LMS 1 Transitioning from TurningPoint 5 to TurningPoint Cloud - LMS 1 A Turning Account is a unique identifier that is used to tie together all software accounts and response devices. A Turning Account is required

More information

STATISTICA VERSION 10 STATISTICA ENTERPRISE SERVER INSTALLATION INSTRUCTIONS

STATISTICA VERSION 10 STATISTICA ENTERPRISE SERVER INSTALLATION INSTRUCTIONS Notes: STATISTICA VERSION 10 STATISTICA ENTERPRISE SERVER INSTALLATION INSTRUCTIONS 1. The installation of the STATISTICA Enterprise Server entails two parts: a) a server installation, and b) workstation

More information

Using the Client Encryption Manager

Using the Client Encryption Manager CHAPTER 4 This chapter explains how to use the Client Encryption Manager (CEM) utility to set a Wired Equivalent Privacy (WEP) key for your client adapter. The following topics are covered in this chapter:

More information

NeoMail Guide. Neotel (Pty) Ltd

NeoMail Guide. Neotel (Pty) Ltd NeoMail Guide Neotel (Pty) Ltd NeoMail Connect Guide... 1 1. POP and IMAP Client access... 3 2. Outlook Web Access... 4 3. Outlook (IMAP and POP)... 6 4. Outlook 2007... 16 5. Outlook Express... 24 1.

More information

PaymentNet Federal Card Solutions Cardholder FAQs

PaymentNet Federal Card Solutions Cardholder FAQs PaymentNet Federal Card Solutions It s easy to find the answers to your questions about PaymentNet! June 2014 Frequently Asked Questions First Time Login How do I obtain my login information?... 2 How

More information

Importing Contacts to Outlook

Importing Contacts to Outlook Importing Contacts to Outlook 1. The first step is to create a file of your contacts from the National Chapter Database. 2. You create this file under Reporting, Multiple. You will follow steps 1 and 2

More information

STATISTICA VERSION 11 CONCURRENT NETWORK LICENSE WITH BORROWING INSTALLATION INSTRUCTIONS

STATISTICA VERSION 11 CONCURRENT NETWORK LICENSE WITH BORROWING INSTALLATION INSTRUCTIONS data analysis data mining quality improvement web-based analytics Notes STATISTICA VERSION 11 CONCURRENT NETWORK LICENSE WITH BORROWING INSTALLATION INSTRUCTIONS 1. The installation of the Concurrent network

More information

Transitioning from TurningPoint 5 to TurningPoint Cloud - NO LMS 1

Transitioning from TurningPoint 5 to TurningPoint Cloud - NO LMS 1 Transitioning from TurningPoint 5 to TurningPoint Cloud - NO LMS 1 A Turning Account is a unique identifier that is used to tie together all software accounts and response devices. A Turning Account is

More information

Moving the TRITON Reporting Databases

Moving the TRITON Reporting Databases Moving the TRITON Reporting Databases Topic 50530 Web, Data, and Email Security Versions 7.7.x, 7.8.x Updated 06-Nov-2013 If you need to move your Microsoft SQL Server database to a new location (directory,

More information

Online Backup and Recovery Manager Setup for Microsoft Windows.

Online Backup and Recovery Manager Setup for Microsoft Windows. Online Backup and Recovery Manager Setup for Microsoft Windows. Backup Wizard Default Interface Recovery Wizard Online Backup and Recovery Manager Setup Backup Wizard After installing and launching the

More information

Batch Eligibility Long Term Care claims

Batch Eligibility Long Term Care claims Hewlett Packard Enterprise Provider Electronic Solutions software lets Connecticut Medical Assistance Program providers verify patient s eligibility and submit and correct claims for services all electronically.

More information

Folder Management in Outlook for Macintosh

Folder Management in Outlook for Macintosh Folder Management in Outlook Introduction Learn to create and manage folders in your mailbox on the Exchange server, in Personal Folders saved on your computer s hard disk or to a local network server,

More information

9 Administering Shared Folders

9 Administering Shared Folders 9 Administering Shared Folders Exam Objectives in this Chapter: Manage and troubleshoot access to shared folders. Create and remove shared folders. Why This Chapter Matters Control access to shared folders

More information

Outlook: Storing Email

Outlook: Storing Email Outlook: Storing Email Academic Computing Services www.ku.edu/acs Abstract: Use AutoArchive to move items to an archive file (.pst). Archiving copies items to the archive file and then removes them from

More information

Create a New Database in Access 2010

Create a New Database in Access 2010 Create a New Database in Access 2010 Table of Contents OVERVIEW... 1 CREATING A DATABASE... 1 ADDING TO A DATABASE... 2 CREATE A DATABASE BY USING A TEMPLATE... 2 CREATE A DATABASE WITHOUT USING A TEMPLATE...

More information

Configuring Outlook 2013 For IMAP Connections

Configuring Outlook 2013 For IMAP Connections Configuring Outlook 2013 For IMAP Connections VERSION 1.0 1 P a g e U A C o n n e c t C o n f i g u r i n g O u t l o o k 2013 f o r I M A P 12/2013 Configuring Outlook 2013 for IMAP Connections Overview

More information

Introduction. Before you begin. Installing efax from our CD-ROM. Installing efax after downloading from the internet

Introduction. Before you begin. Installing efax from our CD-ROM. Installing efax after downloading from the internet Introduction Before you begin Before you begin installing efax, please check the following: You have received confirmation that your application for the efax service has been processed. The confirmation

More information

NODE4 SERVICE DESK SYSTEM

NODE4 SERVICE DESK SYSTEM NODE4 SERVICE DESK SYSTEM KNOWLEDGE BASE ARTICLE INTERNAL USE ONLY NODE4 LIMITED 24/04/2015 ADD A POP, IMAP OR OFFICE 365 ACCOUNT TO OUTLOOK USING CUSTOM SETTINGS If you re setting up Outlook for the first

More information

Previewing & Publishing

Previewing & Publishing Getting Started 1 Having gone to some trouble to make a site even simple sites take a certain amount of time and effort it s time to publish to the Internet. In this tutorial we will show you how to: Use

More information

Moving a database from MS Access to MS SQL server. Introduction. Selecting the database. Creating a Data Source

Moving a database from MS Access to MS SQL server. Introduction. Selecting the database. Creating a Data Source GO Software Pty Limited Map: 27 Tacoma Blvd, Pasadena SA 5042 Phn: 0403-063-991 Fax: none ABN: 54-008-044-906 ACN: 008-044-906 Eml: support@gosoftware.com.au Web: www.gosoftware.com.au Moving a database

More information

Objectives. At the end of this chapter students should be able to:

Objectives. At the end of this chapter students should be able to: NTFS PERMISSIONS AND SECURITY SETTING.1 Introduction to NTFS Permissions.1.1 File Permissions and Folder Permission.2 Assigning NTFS Permissions and Special Permission.2.1 Planning NTFS Permissions.2.2

More information

Departmental (Service) Account Set Up

Departmental (Service) Account Set Up Departmental (Service) Account Set Up Exchange does not offer an exact equivalent to GroupWise proxy. Listed below are different methods of accessing your departmental or service account. All require that

More information

To successfully initialize Microsoft Outlook (Outlook) the first time, email settings need to be verified.

To successfully initialize Microsoft Outlook (Outlook) the first time, email settings need to be verified. TO: UAN CLIENTS FROM: UAN STAFF DATE: OCTOBER 8, 2008 SUBJECT: Steps for Initial Setup of Microsoft Outlook To successfully initialize Microsoft Outlook (Outlook) the first time, email settings need to

More information

Server & Workstation Installation of Client Profiles for Windows

Server & Workstation Installation of Client Profiles for Windows C ase Manag e m e n t by C l i e n t P rofiles Server & Workstation Installation of Client Profiles for Windows T E C H N O L O G Y F O R T H E B U S I N E S S O F L A W General Notes to Prepare for Installing

More information

Manual Password Depot Server 8

Manual Password Depot Server 8 Manual Password Depot Server 8 Table of Contents Introduction 4 Installation and running 6 Installation as Windows service or as Windows application... 6 Control Panel... 6 Control Panel 8 Control Panel...

More information

Cloud Server powered by Mac OS X. Getting Started Guide. Cloud Server. powered by Mac OS X. AKJZNAzsqknsxxkjnsjx Getting Started Guide Page 1

Cloud Server powered by Mac OS X. Getting Started Guide. Cloud Server. powered by Mac OS X. AKJZNAzsqknsxxkjnsjx Getting Started Guide Page 1 Getting Started Guide Cloud Server powered by Mac OS X Getting Started Guide Page 1 Getting Started Guide: Cloud Server powered by Mac OS X Version 1.0 (02.16.10) Copyright 2010 GoDaddy.com Software, Inc.

More information

Scan to SMB(PC) Set up Guide

Scan to SMB(PC) Set up Guide Scan to SMB(PC) Set up Guide Regarding Trade Names Windows is a registered trademark of Microsoft Corporation in the U.S.A. and/or other countries. Windows XP and Windows Vista are trademarks of Microsoft

More information

Microsoft Access 2010 Part 1: Introduction to Access

Microsoft Access 2010 Part 1: Introduction to Access CALIFORNIA STATE UNIVERSITY, LOS ANGELES INFORMATION TECHNOLOGY SERVICES Microsoft Access 2010 Part 1: Introduction to Access Fall 2014, Version 1.2 Table of Contents Introduction...3 Starting Access...3

More information

Eastern Shore Community College. Employee Information Technology Handbook

Eastern Shore Community College. Employee Information Technology Handbook Eastern Shore Community College Employee Information Technology Handbook 6/5/2008 Table of Contents ESCC Network Account Quick Facts...3 Overview... 3 What is my login name and password?... 3 What happens

More information

Data Warehouse Troubleshooting Tips

Data Warehouse Troubleshooting Tips Table of Contents "Can't find the Admin layer "... 1 "Can't locate connection document "... 3 Column Headings are Missing after Copy/Paste... 5 Connection Error: ORA-01017: invalid username/password; logon

More information

User guide. Business Email

User guide. Business Email User guide Business Email June 2013 Contents Introduction 3 Logging on to the UC Management Centre User Interface 3 Exchange User Summary 4 Downloading Outlook 5 Outlook Configuration 6 Configuring Outlook

More information

Troubleshooting File and Printer Sharing in Microsoft Windows XP

Troubleshooting File and Printer Sharing in Microsoft Windows XP Operating System Troubleshooting File and Printer Sharing in Microsoft Windows XP Microsoft Corporation Published: November 2003 Updated: August 2004 Abstract File and printer sharing for Microsoft Windows

More information

Using Logon Agent for Transparent User Identification

Using Logon Agent for Transparent User Identification Using Logon Agent for Transparent User Identification Websense Logon Agent (also called Authentication Server) identifies users in real time, as they log on to domains. Logon Agent works with the Websense

More information

Using SQL Reporting Services with Amicus

Using SQL Reporting Services with Amicus Using SQL Reporting Services with Amicus Applies to: Amicus Attorney Premium Edition 2011 SP1 Amicus Premium Billing 2011 Contents About SQL Server Reporting Services...2 What you need 2 Setting up SQL

More information

iw Document Manager Cabinet Converter User s Guide

iw Document Manager Cabinet Converter User s Guide iw Document Manager Cabinet Converter User s Guide Contents Contents.................................................................... 1 Abbreviations Used in This Guide................................................

More information

Email Account Create for Outlook Express

Email Account Create for Outlook Express Email Account Create for Outlook Express Click Start Menu Choose Outlook Express Click Tools menu from Menu Bar and then click Accounts In Internet Account Wizard, Click Add Button and Click Mail. 1 In

More information

Live@edu User Guide. Please visit the Helpdesk website for more information: http://www.smu.edu.sg/iits/helpdesk_support/index.asp

Live@edu User Guide. Please visit the Helpdesk website for more information: http://www.smu.edu.sg/iits/helpdesk_support/index.asp IITS Main Office SINGAPORE MANAGEMENT UNIVERSITY Administration Building, Level 11 81, Victoria Street Singapore 188065 Phone: 65-6828 1930 Email: iits@smu.edu.sg Please visit the Helpdesk website for

More information

Server & Workstation Installation of Client Profiles for Windows (WAN Edition)

Server & Workstation Installation of Client Profiles for Windows (WAN Edition) C ase Manag e m e n t by C l i e n t P rofiles Server & Workstation Installation of Client Profiles for Windows (WAN Edition) T E C H N O L O G Y F O R T H E B U S I N E S S O F L A W Important Note on

More information

Table of Contents SQL Server Option

Table of Contents SQL Server Option Table of Contents SQL Server Option STEP 1 Install BPMS 1 STEP 2a New Customers with SQL Server Database 2 STEP 2b Restore SQL DB Upsized by BPMS Support 6 STEP 2c - Run the "Check Dates" Utility 7 STEP

More information

TSM for Windows Installation Instructions: Download the latest TSM Client Using the following link:

TSM for Windows Installation Instructions: Download the latest TSM Client Using the following link: TSM for Windows Installation Instructions: Download the latest TSM Client Using the following link: ftp://ftp.software.ibm.com/storage/tivoli-storagemanagement/maintenance/client/v6r2/windows/x32/v623/

More information

Installation Instruction STATISTICA Enterprise Server

Installation Instruction STATISTICA Enterprise Server Installation Instruction STATISTICA Enterprise Server Notes: ❶ The installation of STATISTICA Enterprise Server entails two parts: a) a server installation, and b) workstation installations on each of

More information

Network Printing In Windows 95/98/ME

Network Printing In Windows 95/98/ME Network Printing In Windows 95/98/ME If you are using Windows 2000/ XP: To install a printer on your network using D-Link Print Server or DI-series router with built-in print server you do not need to

More information

Does the GC have an online document management solution?

Does the GC have an online document management solution? This FAQ contains: Web File Services definition Access web file services Create a WFS folder Upload a document Email a link to a document folder Create WFS subscription Cancel existing subscription Create

More information

Linko Software Express Edition Typical Installation Guide

Linko Software Express Edition Typical Installation Guide Linko Software Express Edition Typical Installation Guide Install Database Service Components and Database...1 Install Workstation Components...4 Install DB Administration Tool...6 Office 2003 Security

More information

User Profile Manager 2.6

User Profile Manager 2.6 User Profile Manager 2.6 User Guide ForensiT Limited, Innovation Centre Medway, Maidstone Road, Chatham, Kent, ME5 9FD England. Tel: US 1-877-224-1721 (Toll Free) Intl. +44 (0) 845 838 7122 Fax: +44 (0)

More information

3 Setting up Databases on a Microsoft SQL 7.0 Server

3 Setting up Databases on a Microsoft SQL 7.0 Server 3 Setting up Databases on a Microsoft SQL 7.0 Server Overview of the Installation Process To set up GoldMine properly, you must follow a sequence of steps to install GoldMine s program files, and the other

More information

Installation Instruction STATISTICA. Concurrent Network License with Borrowing Domain Based Registration

Installation Instruction STATISTICA. Concurrent Network License with Borrowing Domain Based Registration Installation Instruction STATISTICA Concurrent Network License with Borrowing Domain Based Registration Notes: ❶ The installation of the Concurrent network version entails two parts: a) a server installation,

More information

Lotus Notes 6.x Client Installation Guide for Windows. Information Technology Services. CSULB

Lotus Notes 6.x Client Installation Guide for Windows. Information Technology Services. CSULB The goal of this document This document was created by the Information Technology Services department to assist the Lotus Notes Coordinators in the successful installation of Lotus Notes release 6 (R6)

More information

ProSeries DMS. Getting Started Guide

ProSeries DMS. Getting Started Guide ProSeries DMS Getting Started Guide Copyright 00 Intuit Inc. All Rights Reserved. Intuit, the Intuit logo, Intuit ProLine, ProSeries, and QuickBooks, among others, are trademarks or registered trademarks

More information

Entrust Certificate Services for Adobe CDS

Entrust Certificate Services for Adobe CDS Entrust Certificate Services Entrust Certificate Services for Adobe CDS Getting Started Guide Entrust SafeNet Authentication Client: 8.3 Date of issue: July 2015 Document issue: 3.0 Revisions Issue and

More information

Setup and Configuration Guide for Pathways Mobile Estimating

Setup and Configuration Guide for Pathways Mobile Estimating Setup and Configuration Guide for Pathways Mobile Estimating Setup and Configuration Guide for Pathways Mobile Estimating Copyright 2008 by CCC Information Services Inc. All rights reserved. No part of

More information

Dell Statistica 13.0. Statistica Enterprise Installation Instructions

Dell Statistica 13.0. Statistica Enterprise Installation Instructions Dell Statistica 13.0 2015 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license or

More information

Database Backup and Restore Instructions. Version 6.5. Instructions

Database Backup and Restore Instructions. Version 6.5. Instructions Database Backup and Restore Instructions Version 6.5 Instructions Summer 2010 Table of Contents Overview... 2 Backup Considerations... 2 Running the Backup Utility (with User Interface)... 4 Running the

More information

Spambrella SaaS Email Encryption Enablement for Customers, Domains and Users Quick Start Guide

Spambrella SaaS Email Encryption Enablement for Customers, Domains and Users Quick Start Guide January 24, 2015 Spambrella SaaS Email Encryption Enablement for Customers, Domains and Users Quick Start Guide Spambrella and/or other noted Spambrella related products contained herein are registered

More information

Bulk Downloader. Call Recording: Bulk Downloader

Bulk Downloader. Call Recording: Bulk Downloader Call Recording: Bulk Downloader Contents Introduction... 3 Getting Started... 3 Configuration... 4 Create New Job... 6 Running Jobs... 7 Job Log... 7 Scheduled Jobs... 8 Recent Runs... 9 Storage Device

More information

Horizon Debt Collect. User s and Administrator s Guide

Horizon Debt Collect. User s and Administrator s Guide Horizon Debt Collect User s and Administrator s Guide Microsoft, Windows, Windows NT, Windows 2000, Windows XP, and SQL Server are registered trademarks of Microsoft Corporation. Sybase is a registered

More information

2012 Teklynx Newco SAS, All rights reserved.

2012 Teklynx Newco SAS, All rights reserved. D A T A B A S E M A N A G E R DMAN-US- 01/01/12 The information in this manual is not binding and may be modified without prior notice. Supply of the software described in this manual is subject to a user

More information

Active Directory Authentication Integration

Active Directory Authentication Integration Active Directory Authentication Integration This document provides a detailed explanation of how to integrate Active Directory into the ipconfigure Installation of a Windows 2003 Server for network security.

More information

Outlook Connector. Version 2 User Manual. client-side plugin. Collaborate Using Outlook. Version 2.0.0

Outlook Connector. Version 2 User Manual. client-side plugin. Collaborate Using Outlook. Version 2.0.0 Outlook Connector client-side plugin Collaborate Using Outlook Version 2 User Manual Version 2.0.0 2003-2005 Alt-N Technologies. All rights reserved. MDaemon, WorldClient, and RelayFax are registered trademarks

More information

Set Up Your Email. HTC Touch Pro. www.sprint.com

Set Up Your Email. HTC Touch Pro. www.sprint.com Set Up Your Email HTC Touch Pro www.sprint.com 2008 Sprint. Sprint and the logo are trademarks of Sprint. Other marks are the property of their respective owners. Intellectual Property Notices Copyright

More information

3. On the E-mail Accounts wizard window, select Add a new e-mail account, and then click Next.

3. On the E-mail Accounts wizard window, select Add a new e-mail account, and then click Next. To Set Up Your E-mail Account in Microsoft Outlook 2003 1. Open Microsoft Outlook 03 3. On the E-mail Accounts wizard window, select Add a new e-mail account, and then click Next. 4. For your server type,

More information

Understanding MS Access Security

Understanding MS Access Security Understanding MS Access Security There are two fundamental approaches you can take to securing your database: user-level security or share-level security. We explain how to implement each, and what you

More information

Enterprise Asset Management System

Enterprise Asset Management System Enterprise Asset Management System in the Agile Enterprise Asset Management System AgileAssets Inc. Agile Enterprise Asset Management System EAM, Version 1.2, 10/16/09. 2008 AgileAssets Inc. Copyrighted

More information

BIGPOND ONLINE STORAGE USER GUIDE Issue 1.1.0-18 August 2005

BIGPOND ONLINE STORAGE USER GUIDE Issue 1.1.0-18 August 2005 BIGPOND ONLINE STORAGE USER GUIDE Issue 1.1.0-18 August 2005 PLEASE NOTE: The contents of this publication, and any associated documentation provided to you, must not be disclosed to any third party without

More information

User s Guide For Department of Facility Services

User s Guide For Department of Facility Services Doc s File Server User s Guide For Department of Facility Services For Ver : 7.2.88.1020 Rev : 1_05-27-2011 Created by : Elliott Jeyaseelan 2 Table of Contents SERVER LOGIN & AUTHENTICATION REQUIREMENTS

More information

Contents. Welcome to the Priority Zoom System Version 17 for Windows. This document contains instructions for installing the system.

Contents. Welcome to the Priority Zoom System Version 17 for Windows. This document contains instructions for installing the system. Welcome to the Priority Zoom System Version 17 for Windows. This document contains instructions for installing the system. Contents 1. Introduction... 2 2. Installing the Server... 2 3. Installing a Client...

More information

How to monitor AD security with MOM

How to monitor AD security with MOM How to monitor AD security with MOM A article about monitor Active Directory security with Microsoft Operations Manager 2005 Anders Bengtsson, MCSE http://www.momresources.org November 2006 (1) Table of

More information

Stored Documents and the FileCabinet

Stored Documents and the FileCabinet Stored Documents and the FileCabinet Introduction The stored document features have been greatly enhanced to allow easier storage and retrieval of a clinic s electronic documents. Individual or multiple

More information

Exercise Safe Commands and Audit Trail

Exercise Safe Commands and Audit Trail Exercise Safe Commands and Audit Trail Table of Contents Exercise 1: Secure Objects with Safe Commands...2 Exercise 2: Record User Actions in the Audit Trail... 13 3.1 Setting up the SQL Server for Audit

More information

WorldShip Install on a Single or Workgroup Workstation

WorldShip Install on a Single or Workgroup Workstation PRE-INSTALLATION INSTRUCTIONS: This document discusses using the WorldShip DVD to install WorldShip. You can also install WorldShip from the web. Go to the following web page and click on the appropriate

More information

TOSHIBA GA-1310. Printing from Windows

TOSHIBA GA-1310. Printing from Windows TOSHIBA GA-1310 Printing from Windows 2009 Electronics for Imaging, Inc. The information in this publication is covered under Legal Notices for this product. 45081979 04 February 2009 CONTENTS 3 CONTENTS

More information

Personal Folders Backup

Personal Folders Backup Personal Folders Backup The Personal Folders Backup tool is designed for use in Outlook 2000 and later and the operating systems that support each respective Outlook version. The tool provides a quick

More information

PUBLIC Password Manager for SAP Single Sign-On Implementation Guide

PUBLIC Password Manager for SAP Single Sign-On Implementation Guide SAP Single Sign-On 2.0 SP1 Document Version: 1.0 2015-10-02 PUBLIC Password Manager for SAP Single Sign-On Implementation Guide Content 1 Password Manager....4 2 Password Manager Installation Guide....5

More information

Novell ZENworks Asset Management 7.5

Novell ZENworks Asset Management 7.5 Novell ZENworks Asset Management 7.5 w w w. n o v e l l. c o m October 2006 USING THE WEB CONSOLE Table Of Contents Getting Started with ZENworks Asset Management Web Console... 1 How to Get Started...

More information

ContentWatch Auto Deployment Tool

ContentWatch Auto Deployment Tool ContentWatch Auto Deployment Tool ContentWatch gives administrators the ability to easily distribute ContentProtect (or say our products) over any network. With our Unattended Installer you can install

More information

USING STUFFIT DELUXE THE STUFFIT START PAGE CREATING ARCHIVES (COMPRESSED FILES)

USING STUFFIT DELUXE THE STUFFIT START PAGE CREATING ARCHIVES (COMPRESSED FILES) USING STUFFIT DELUXE StuffIt Deluxe provides many ways for you to create zipped file or archives. The benefit of using the New Archive Wizard is that it provides a way to access some of the more powerful

More information

Inpatient Rehabilitation Assessment Validation and Entry Systems (jirven) Installation Guide. In support of Software Version 1.2.

Inpatient Rehabilitation Assessment Validation and Entry Systems (jirven) Installation Guide. In support of Software Version 1.2. Inpatient Rehabilitation Assessment Validation and Entry Systems (jirven) Installation Guide In support of Software Version 1.2.0 October 01, 2015 Page 2 of 28 Table of Content QUICK ACCESS TIP: To navigate

More information

How to use the VMware Workstation / Player to create an ISaGRAF (Ver. 3.55) development environment?

How to use the VMware Workstation / Player to create an ISaGRAF (Ver. 3.55) development environment? Author Janice Hong Version 1.0.0 Date Mar. 2014 Page 1/56 How to use the VMware Workstation / Player to create an ISaGRAF (Ver. 3.55) development environment? Application Note The 32-bit operating system

More information

Time Matters and Billing Matters Administration Guide

Time Matters and Billing Matters Administration Guide Time Matters and Billing Matters Administration Guide Version 14.1 2015 LexisNexis. All rights reserved. Copyright and Trademark LexisNexis, Lexis, and the Knowledge Burst logo are registered trademarks

More information

DocuPrint C3290 FS Features Setup Guide

DocuPrint C3290 FS Features Setup Guide DocuPrint C3290 FS Features Setup Guide Adobe and PostScript are trademarks of Adobe Systems Incorporated in the United States and/or other countries. Apple, Bonjour, ColorSync, EtherTalk, Macintosh, and

More information

Migrating Groupwise Data

Migrating Groupwise Data Migrating Groupwise Data Requirements: Windows Computer on CCSF admin network Outlook 2010 Groupwise 8 windows client Network access Office 365 login and password Groupwise login and password USB Flash

More information

Symantec Enterprise Vault

Symantec Enterprise Vault Symantec Enterprise Vault Guide for Microsoft Outlook 2003/2007 Users 10.0 Light Outlook Add-In Symantec Enterprise Vault: Guide for Microsoft Outlook 2003/2007 Users The software described in this book

More information

Internet Synchronization with Microsoft Jet 3.5

Internet Synchronization with Microsoft Jet 3.5 Internet Synchronization with Microsoft Jet 3.5 Michael Wachal, Microsoft Corporation, Redmond WA Published 1998 For the latest information, see http://support.microsoft.com Internet Synchronization with

More information

Olathe District Schools 1 of 11 GroupWise 7

Olathe District Schools 1 of 11 GroupWise 7 Olathe District Schools 1 of 11 GroupWise 7 Creating an email group To create and save a personal group: 1. Click on the toolbar. 2. Click the personal address book you want to add this group to. 3. Click

More information

Google Drive: Access and organize your files

Google Drive: Access and organize your files Google Drive: Access and organize your files Use Google Drive to store and access your files, folders, and Google Docs, Sheets, and Slides anywhere. Change a file on the web, your computer, tablet, or

More information

E-Notebook SQL 12.0 Desktop Database Installation Guide. E-Notebook SQL 12.0 Desktop Database Installation Guide

E-Notebook SQL 12.0 Desktop Database Installation Guide. E-Notebook SQL 12.0 Desktop Database Installation Guide E-Notebook SQL 12.0 Desktop Database Installation Guide 1. Introduction... 3 2. Database System... 3 2.1. Software requirements... 3 2.2. Database Creation and Configuration... 4 2.2.1. Create and share

More information

Technical Bulletin. SQL Express Backup Utility

Technical Bulletin. SQL Express Backup Utility Technical Bulletin SQL Express Backup Utility May 2012 Introduction This document describes the installation, configuration and use of the SATEON SQL Express Backup utility, which is used to provide scheduled

More information

SECURE EMAIL USER GUIDE OUTLOOK 2000

SECURE EMAIL USER GUIDE OUTLOOK 2000 WELLS FARGO AUTHENTICATION SERVICES DATED: MAY 2003 TABLE OF CONTENTS GENERAL INFORMATION... 1 INSTALLING THE WELLS FARGO ROOT CERTIFICATE CHAIN.. 2 INSTALLING THE CERTIFICATES INTO IE... 3 SETTING UP

More information

Using SQL Reporting Services with Amicus

Using SQL Reporting Services with Amicus Using SQL Reporting Services with Amicus Applies to: Amicus Attorney Premium 2016 (with or without Premium Billing) With Microsoft SQL Server Reporting Services, use Report Builder to generate and author

More information

Creating and Sharing Contact Groups in Outlook Client

Creating and Sharing Contact Groups in Outlook Client Creating and Sharing Contact Groups in Outlook Client If you frequently address messages to groups of contacts you may find it helpful to create contact groups that can be addressed rather than having

More information

Snow Inventory. Installing and Evaluating

Snow Inventory. Installing and Evaluating Snow Inventory Installing and Evaluating Snow Software AB 2002 Table of Contents Introduction...3 1. Evaluate Requirements...3 2. Download Software...3 3. Obtain License Key...4 4. Install Snow Inventory

More information