How To Protect Your Computer From Being Hacked On A Pc Or Mac (Windows) From A Virus (For A Free Download) On A Windows Xp) On Pc Or Ipad (For Free) On Your Pc Or Pc (For An Ipad
|
|
- Roger Dominick Miller
- 3 years ago
- Views:
Transcription
1 GE Centricity* Business V4.3+ Desktop Internet Security s Summary This document describes the Microsoft Internet Security settings recommended and required to run Centricity Business web solutions. Software Version 4.3+ Document Version General Electric Company. All Rights Reserved. * Centricity is a trademark of General Electric Company
2 2 Desktop Internet Security s Acknowledgments Prepared by Centricity Business Knowledge Services. Please send comments to KnowledgeServicesOrganization@ge.com. Confidentiality and Proprietary Rights This document is the confidential property of, a division of General Electric Company ( ). No part of this document may be reproduced in any form, by photostat, microfilm, xerography, or any other means, or incorporated into any information retrieval system, electronic or mechanical, without the written permission of GE Healthcare. Inquiries regarding copying and/or using the materials contained in this document outside of the limited scope described herein should be addressed to the address listed above. reminds you that there may be legal, ethical, and moral obligations for medical care providers to protect sensitive patient information when dealing with vendors such as. You should obtain explicit written consent from both the patient and before you disclose sensitive patient information to. Limitations and Conditions of Use furnishes this document to you, a current customer, as confidential information pursuant to a non-disclosure agreement ( NDA ) or an agreement with confidentiality provisions between you and. If you are not (i) a current customer, and (ii) subject to an NDA or an agreement with confidentiality provisions with, you are not authorized to access this document. The information contained herein is confidential and should not be used, disclosed, or duplicated for any purpose other than developing information system plans within customer organizations. Duplication and/or distribution of this document beyond customer organization information systems and management executives are not allowed without express written consent from. Trademarks GE, the GE Monogram, Centricity, and imagination at work are trademarks of General Electric Company. All other product names and logos are trademarks or registered trademarks of their respective companies. Copyright Notice Copyright General Electric Company. All rights reserved. Disclaimers Any information related to clinical functionality is intended for clinical professionals. Clinical professionals are expected to know the medical procedures, practices and terminology required to monitor patients. Operation of the product should neither circumvent nor take precedence over required patient care, nor should it impede the human intervention of attending nurses, physicians or other medical personnel in a manner that would have a negative impact on patient health. General Electric Company reserves the right to make changes in specifications and features shown herein, or discontinue the products described at any time without notice or obligation. This does not constitute a representation or warranty or documentation regarding the product or service featured. All illustrations or examples are provided for informational or reference purposes and/or as fictional examples only. Your product features and configuration may be different than those shown. Contact your GE Representative for the most current information. 540 West Northwest Highway Barrington, IL U.S.A.
3 Desktop Internet Security s 3 Contents Desktop Requirements for Running Centricity Business Web Applications... 4 Internet Security s for Running Centricity Business Web Applications on the Desktop... 5 Microsoft Default s... 5 Internet Security s... 5 Downloading Signed ActiveX Controls Additional Security Recommendations General Recommendations Using a Shortcut to Launch Centricity Business Google Toolbar Plug-in for Internet Explorer, other Pop-up Blockers Using Trusted Sites List to Manage Security () Using Group Policy Objects to Manage Security s Configuring.Net CLR Programmatically... 15
4 4 Desktop Internet Security s Desktop Requirements for Running Centricity Business Web Applications Following are desktop requirements for Centricity Business 4.3 and later: Display requirements: A 1024x768 or larger display area On Windows XP and Windows 7, the Windows Classic Theme and Windows XP Theme (Styles) are supported. 256 or more colors Microsoft Internet Explorer 6.0 SP1 or higher; the highest version currently supported is 8.0. Microsoft.NET Common Language Runtime (CLR) version 2.0 (higher versions may be used; consult the appropriate System Environment Specifications document for details).
5 Desktop Internet Security s 5 Internet Security s for Running Centricity Business Web Applications on the Desktop Centricity Business applications work with only minimal setup changes within Internet Security. We recommend changing Internet Security default settings only when non-default settings provide significant benefits. If, however, you are running other web-based applications that require special settings, you need a more sophisticated approach to managing security on the desktop than that outlined in this document. Security settings in the security zone used to access the Centricity Framework server (and application servers if there are any) are the settings that matter. Microsoft Default s Before you apply any of the recommended changes listed below, force default settings by clicking the Default button for each security zone (Internet, Local intranet, or ), and for Advanced, then Apply and OK. Internet security rarely, if ever, has all of the default settings, even when delivered directly from Microsoft. Internet Security s The following table describes the recommended security settings. settings that differ from Microsoft default settings are highlighted in red. To review/modify Internet Security s go to Control Panel/Internet Options/Security Tab. IE 6.0 and 7.0 Comment General tab (Temporary Internet files, s) Check for newer versions of stored pages Every time you start Internet Explorer Automatic setting has caused performance problems at GE Healthcare sites; network is flooded with cache-checking traffic. Amount of disk space to use Content tab 250 MB or more A user that touched every page of all products might need this much. Content Not enabled Required; Centricity Framework is NOT Default settings in IE 6.0 SP1 All Windows versions before XP SP2 Automatic 3.2% of total partition space Not enabled Windows XP SP2 GR, WS2003 SP1 Automatic 3.2% of total partition space Not enabled
6 6 Desktop Internet Security s Advisor Security tab.net Framework-reliant components: Run components not signed with Authenticode Run components signed with Authenticode ActiveX and plug-ins Download signed ActiveX Download unsigned ActiveX Initialize and script ActiveX marked as not safe Comment compatible with the Microsoft Content Advisor Default settings in IE 6.0 SP1 All Windows versions before XP SP2 Windows XP SP2 GR, WS2003 SP1 Internet, Local intranet, and security zones Centricity Framework uses.net assemblies. Also requires MS.Net CLR Prompt, or Required for user to download components from the Centricity Framework server (user must also have local Administrative rights). See Downloading Signed ActiveX Controls, below. Such objects present a security risk Such objects present a security risk Prompt, except in zone Prompt, except in zone except Prompt in zone except Prompt in zone Run ActiveX and plugins Script ActiveX marked safe for scripting ; Required ; Required Required Required
7 Desktop Internet Security s 7 Comment Default settings in IE 6.0 SP1 All Windows versions before XP SP2 Windows XP SP2 GR, WS2003 SP1 Downloads Automatic prompting for file downloads Required for.net (WF Admin, Flowcast.Net) NA, except in Internet zone: WS2003: in Internet zone File download Required Miscellaneous Access data sources across domains Advanced tab (for all security zones) Browsing thirdparty browser extensions Reuse windows for launching shortcuts Required for ETM except when WF server and CSP Gateway server are the same box Internet: Local Intranet: Prompt : Internet: Local Intranet: Prompt : d Required d d Not enabled (required) change from default value that affects Centricity Business applications when running other web applications on the same desktop Data can be lost from IDX products if links/shortcuts are launched in the same browser window. See Using a Shortcut to Launch Centricity Framework in the next section. Not enabled is d WS2003 SP2: default is not enabled d
8 8 Desktop Internet Security s Automatically check for Internet Explorer updates Multimedia NOT enabled Comment Required to run CareCast viewer. change from default value that does not affect Centricity Business applications this to prevent browser going to MS for updates when every time it starts Show pictures d Required by Centricity Framework graphics Default settings in IE 6.0 SP1 All Windows versions before XP SP2 d d Windows XP SP2 GR, WS2003 SP1 d d Security Do not save encrypted pages to disk Empty Temporary Internet Files folder when browser is closed d d Flowcast 2.0: If enabled with SSL, generates LOTS of network traffic Flowcast 3.0: If enabled, WF Admin doesn t work, including color palette If enabled, generates more network traffic to start up new sessions; WF, WB, AW, ETM do NOT store any data in cacheable files Additional Security tab setting required by Flowcast 2.0 Microsoft VM: Java Permissions High safety Required to be at least High safety. Default for Internet, Local intranet, and Trusted sites zones all are satisfactory for running Flowcast 2.0. Flowcast 2.0 Requires Microsoft VM on desktop d d Internet zone: High safety Local intranet zone: Medium safety zone: Low safety XP: d WS2003: d XP: d WS2003: d Internet zone: High safety Local intranet zone: Medium safety zone: Low safety
9 Desktop Internet Security s 9 IE 7.0 Usage and Limitations IE 8.0 The Web Client supports IE7 with the following exceptions: 1. Centricity Business does not support being used in conjunction with active use of multiple IE7 Tabs. It does not require that tabs be disabled in IE7 settings, just that users understand that if the IE7 browser session is to be used with Centricity Business, there should be no concurrent usage of multiple tabs in that session. You may wish to disable Tabs to avoid issues. To do this, access Control Panel/Internet options, select Tabs, then s, and uncheck Tabbed Browsing. 2. Centricity Business does not support ensuring proper display and navigation in conjunction with using the IE7 Page Zoom feature. 3. Centricity Business does not support IE7 installed on Windows Server 2003 SP1 environments that are used as the Framework Server (that is, within the Application Server Tier). General tab (Temporary Internet files, s) Check for newer versions of stored pages Every time you start Internet Explorer Automatic setting has caused performance problems at GE Healthcare sites; network is flooded with cache-checking traffic. Amount of disk space to use Content tab Content Advisor Security tab Comment Default settings in IE MB or more A user that touched every page of all products might need this much. Not enabled.net Framework-reliant components: Run components not signed with Authenticode Required; Centricity Framework is NOT compatible with the Microsoft Content Advisor Centricity Framework Windows XP SP2 and SP3 Automatic 3.2% of total partition space Not enabled Windows 7 Automatic 3.2% of total partition space Not enabled Internet, Local intranet, and security zones
10 10 Desktop Internet Security s Run components signed with Authenticode ActiveX and plug-ins Comment Default settings in IE 8.0 uses.net assemblies. Also requires MS.Net CLR Windows XP SP2 and SP3 Required to enable the successful download of updated versions of client-side components Download signed ActiveX Download unsigned ActiveX Initialize and script ActiveX marked as not safe Run ActiveX and plugins Script ActiveX marked safe for scripting Downloads Prompt, or ; Required ; Required Required for user to download components from The Centricity Framework server (user must also have local Administrative rights). See Downloading Signed ActiveX Controls, below. Such objects present a security risk Such objects present a security risk Prompt, except in zone Windows 7 Prompt, except in zone Required Required These options let you keep client-side synchronized with the server Automatic prompting for file downloads Required for.net (WF Admin, Flowcast.Net), except in Internet zone: File download Required Privacy, except in Internet zone:
11 Desktop Internet Security s 11 toolbars and extensions when inprivate browsing starts (In Private section) Miscellaneous Comment Default settings in IE 8.0 Windows XP Windows 7 SP2 and SP3 (uncheck) (checked) (checked) Access data sources across domains Allow scriptinitiated windows without size of position constraints. Navigate windows and frames across different domains Scripting for for Intranet for Trusted Sites Required for ETM except when WF server and CSP Gateway server are the same box Necessary to ensure the workplace menu items display (VF /SPR 2576) Prevents 2 Help Windows displaying when the F1 key is pressed (VF /SPR 2592) XSS filter d Required for Cognos 8.4 and Centricity Business Reporter Advanced tab (for all security zones) Browsing thirdparty browser extensions Reuse windows for launching shortcuts d Not enabled Required NOTE: You must restart the computer before a change to this setting takes effect. change from default value that affects Centricity Business applications when running other web Internet: Local Intranet: Prompt : for Trusted Sites for Trusted Sites and Local Intranet d d Internet: Local Intranet: Prompt : for Trusted Sites for Trusted Sites and Local Intranet d WS2003 SP2: default is not enabled d
12 12 Desktop Internet Security s Automatically check for Internet Explorer updates Multimedia (required) NOT enabled Comment Default settings in IE 8.0 applications on the same desktop Data can be lost from IDX products if links/shortcuts are launched in the same browser window. See Using a Shortcut to Launch Centricity Framework in the next section. Not enabled is Required to run CareCast viewer. change from default value that does not affect Centricity Business applications this to prevent browser going to MS for updates when every time it starts Show pictures d Required by Centricity Framework graphics Security Do not save encrypted pages to disk Empty Temporary Internet Files folder when browser is closed Check for server certificate revocation d d Uncheck NOTE: You must restart the computer before a change to this setting takes effect. If enabled, generates more network traffic to start up new sessions; WF, WB, AW, ETM do NOT store any data in cacheable files Prevents errors in ETM Preview Pane (VF ) Windows XP SP2 and SP3 d d d d Windows 7 d d d WS2003: d d WS2003: d Check
13 Desktop Internet Security s 13 IE 8.0 Usage and Limitations 1. IE 8.0 Compatibility Mode is not required and does not need to be turned on. Under Tools, Compatibility View should not be checked. 2. If you are using Centricity Business Reporter, Cognos must be at version 8.4 to be compatible with IE 8.0. Additionally, The Cognos URL must be added to the Sites for the and Local intranet zones. The XSS filter Security Internet Option (found under Scripting) must be disabled for the and Local intranet zones (see table above). 3. All limitations listed under IE 7.0 Usage and Limitations apply to IE 8.0 as well. Downloading Signed ActiveX Controls A user must have local Admin rights to download and install ActiveX. The Prompt setting for the Download Signed ActiveX Controls property causes a dialog box to be presented to the user when a component must be downloaded, unless Previous component(s) signed by the same digital certificate have already been downloaded, and The check box Always trust content from IDX Systems Corporation is checked. The setting for this property allows download and installation of ActiveX without the user having to confirm the download every time. This setting does not matter on a locked-down desktop that receives updates from either Active Directory or the Desktop Components install kit.
14 14 Desktop Internet Security s Additional Security Recommendations General Recommendations Centricity Business recommends that you: Include your Centricity Framework server(s) in the zone. Use Fully Qualified Domain Names to refer to your servers. Using a Shortcut to Launch Centricity Business If you are accessing Centricity Business products using the Internet Explorer browser, use a target like "C:\Program Files\Internet Explorer\iexplore.exe" to define a shortcut to launch Centricity Business. This ensures that a new iexplorer.exe process is started, and thus gives the new window completely clean context. If you are accessing Centricity Business products using smart client, you use the desktop shortcut created during smart client deployment for access. Google Toolbar Plug-in for Internet Explorer, other Pop-up Blockers The Google Toolbar has a pop-up blocker. Centricity Business web applications use pop-ups. Therefore, to ensure that the applications operate properly, enable ( whitelist ) pop-ups from the Centricity Framework server(s). Any other application that blocks pop-ups within the browser must be configured to allow pop-ups from the Centricity Framework server(s). Pop-up blocking should be disabled with IE7 and IE8 (Tools/Pop-up blocking; uncheck). Using Trusted Sites List to Manage Security () By default, URLs with no domain (for example, use the Local intranet zone security (simple domain name) URLs with domain (for example, use the Internet zone security (Fully Qualified Domain Name) URLs can be added to the Sites list for each zone to change default behavior. We recommend that you configure your systems so that Centricity Business is secured by running in the zone. To do this, set security in this zone correctly, then add the URL of your Centricity Framework server (or Content switch) to the list.
15 Desktop Internet Security s 15 Simple and Fully Qualified DNS names are independent; therefore both addresses, as well as the enumerated IP address, must be listed to cover all possible references. Various wild cards are allowed; for example, you can add *://*.yourorg.yourtld and *:// to the list to allow both http and https. Simple domain names cannot be wildcarded. For more details, see documentation for the Group Policy editor (gpedit.msc) included with each version of Internet Explorer. Using Group Policy Objects to Manage Security s Configuring.Net CLR Programmatically Microsoft s Technet provides articles on managing configuration with Group Policies. Policy settings for controlling URL Actions are available in both the Computer Configuration and the User Configuration nodes of Group Policy Object Editor, in Administrative Templates\Windows Components\Internet Explorer\Internet Control Panel\Security Page..NET CLR should be configured using code similar to that provided in the sample Dotnet2.0_trust.bat file included in the desktop components kit.
Microsoft Internet Explorer (IE) Settings
GE Healthcare Centricity* RIS-IC and Centricity OneView 10.x and Centricity ConnectR 5.x Microsoft Internet Explorer (IE) Settings December 2009, Revision 2 2048299-001, DOC0629804 Do not duplicate. Copyright
More informationSmartOffice Configuration Guide for Microsoft Windows XP with Internet Explorer 7
SmartOffice Configuration Guide for Microsoft Windows XP with Internet Explorer 7 Copyright 1998-2007, E-Z Data, Inc. All Rights Reserved No part of this documentation may be copied, reproduced, or translated
More informationGE Healthcare. Desktop Components Reference Guide. GE Centricity* Business v4.3+ Summary
GE Healthcare GE Centricity* Business v4.3+ Desktop Components Reference Guide Summary This document provides information for GE Healthcare customer staff who install, maintain, and troubleshoot the Centricity
More informationUsing Active Directory to Install Client-Side Web Framework Components
Using Active Directory to Install Client-Side Web Framework Components (Windows 2000 only) Summary This internal document is intended for use by IDX staff implementing Version 4.06 or 4.07 installations
More informationOptimal Internet Explorer v6.0 Settings User Guide
Optimal Internet Explorer v6.0 Settings User Guide Copyright 1998-2006, E-Z Data, Inc. All Rights Reserved. No part of this documentation may be copied, reproduced, or translated in any form without the
More informationehealth Information Exchange
GE Healthcare IHE Integration Statement ehealth Information Exchange ehealth Information Exchange Version 2.0 INTRODUCTION OVERVIEW This IHE Integration Statement describes the intended conformance of
More informationCalREDIE Browser Requirements
CalREDIE Browser Requirements Table of Contents Section 1: Browser Settings... 2 Section 2: Windows Requirements... 11 Section 3: Troubleshooting... 12 1 Section 1: Browser Settings The following browser
More informationAras Innovator Internet Explorer Client Configuration
Aras Innovator Internet Explorer Client Configuration Aras Innovator 9.4 Document #: 9.4.012282009 Last Modified: 7/31/2013 Aras Corporation ARAS CORPORATION Copyright 2013 All rights reserved Aras Corporation
More informationSetting up Client Browsers Oracle FLEXCUBE Universal Banking Release 11.3.0 [May] [2011]
Setting up Client Browsers Oracle FLEXCUBE Universal Banking Release 11.3.0 [May] [2011] Table of Contents 1. SETTING UP CLIENT BROWSERS... 1-1 1.1 INTRODUCTION... 1-1 1.2 LIST OF CLIENT BROWSERS... 1-1
More informationisupplier PORTAL ACCESS SYSTEM REQUIREMENTS
TABLE OF CONTENTS Recommended Browsers for isupplier Portal Recommended Microsoft Internet Explorer Browser Settings (MSIE) Recommended Firefox Browser Settings Recommended Safari Browser Settings SYSTEM
More information1. To ensure the appropriate level of security, you will need Microsoft Windows XP or above.
System Requirements This section describes the resources you will need on your computer and how to configure your system to use @venture. Because individual systems widely vary, these guidelines are general
More informationAbila Nonprofit Online. Connection Guide
Abila Nonprofit Online This is a publication of Abila, Inc. 2014 Abila, Inc. and its affiliated entities. All rights reserved. Abila, the Abila logos, and the Abila product and service names mentioned
More informationDO NOT PRESERVE FAVORITE WEBSITE DATA
Instructions to Fix LMR/Internet Explorer 10 Issues With recent Windows Updates, Internet Explorer 10 may have been installed on your system without your knowledge. The LMR Over the Internet Application
More informationChecking Browser Settings, and Basic System Requirements for QuestionPoint
Checking Browser Settings, and Basic System Requirements for QuestionPoint This document covers basic IE settings and system requirements necessary for QuestionPoint. These settings and requirements apply
More informationUsing Internet Explorer 8 and Windows 7 with Administrative Applications
Using Internet Explorer 8 and Windows 7 with Administrative Applications (CAADS, CREW, GMAS, HUBS, ID Card, IRB, Oracle Financials, SIS, PeopleSoft ) Revised: March 2012 Contents Recommended Version of
More informationXCM Internet Explorer Settings
XCM Internet Explorer Settings For best results, you must prepare your Internet Explorer (IE) browser so that interactions with the XCM site are fully trusted (XCM only supports Microsoft s Internet Explorer).
More informationJava. How to install the Java Runtime Environment (JRE)
Java How to install the Java Runtime Environment (JRE) Install Microsoft Virtual Machine (VM) via System Check Install Sun Java Runtime Environment (JRE) via System Check Loading Java Applet Failed How
More informationUser Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream
User Manual Onsight Management Suite Version 5.1 Another Innovation by Librestream Doc #: 400075-06 May 2012 Information in this document is subject to change without notice. Reproduction in any manner
More informationPersonal Computer Checklist (Windows and Internet Explorer.0)
Personal Computer Checklist (Windows and Internet Explorer.0) RealPage, Inc. Release 3.0, 20 Doc ID IMPORTANT NOTICE: YOUR USE OF THESE MATERIALS SHALL BE DEEMED TO CONSTITUTE YOUR AGREEMENT THAT SUCH
More informationTopaz Installation Sheet
Topaz Installation Sheet P/N 460924001E ISS 08FEB12 Content Introduction... 3 Recommended minimum requirements... 3 Setup for Internet Explorer:... 4 Topaz installation... 10 Technical support... 14 Copyright
More informationWelcome To Paragon 3.0
Welcome To Paragon 3.0 Paragon MLS is the next generation of web-based services designed by FNIS specifically for agents, brokers, and MLS administrators. Paragon MLS is an amazingly flexible online system
More informationMaximizing Performance on Cognos, Workflow, and BDMS
Maximizing Performance on Cognos, Workflow, and BDMS System Configuration In order Cognos, Banner Document Management (ApplicationXtender), and Banner Workflow to work optimally, some initial configuration
More informationCAMPUSCALL 3.9 Station Setup
CAMPUSCALL 3.9 Station Setup VoIP Setup... 2 1. Software Installation... 2 2. Connections to the call station... 2 Analog Setup (Way2Call Hi-Phone)... 2 1. Connections to the call station... 2 2. Connections
More informationCognos 10 Getting Started with Internet Explorer and Windows 7
Browser/Windows Settings There are several Internet Explorer browser settings required for running reports in Cognos. This document will describe specifically how to set those in Internet Explorer 9 and
More informationConfiguring Internet Explorer Oracle FLEXCUBE Universal Banking Release 12.0.3.0.0 [April] [2014]
Configuring Internet Explorer Oracle FLEXCUBE Universal Banking Release 12.0.3.0.0 [April] [2014] Table of Contents 1. CONFIGURING INTERNET EXPLORER... 1-1 1.1 CONFIGURING INTERNET OPTIONS... 1-1 1.2 CREATING
More informationTroubleshooting steps for Oracle Financials and Markview. Jan 2015
Troubleshooting steps for Oracle Financials and Markview Jan 2015 RU-VPN... 3 RECOMMENDED BROWSERS AND BROWSER SETTINGS... 4 Mozilla Firefox... 4 Internet Explorer... 5 CHROME... 7 Verify JAVA Version...
More informationOrientation Course - Lab Manual
Orientation Course - Lab Manual Using the Virtual Managed Workplace site for the lab exercises Your instructor will provide the following information before the first lab exercise begins: Your numerical
More informationServer Sentinel Client Workstation
Server Sentinel Client Workstation Installation and Reinstallation Guide Server Sentinel 4.4.3 and Higher April 2008 . unisys imagine it. done. Server Sentinel Client Workstation Installation and Reinstallation
More informationHow to Configure Windows 8.1 to run ereports on IE11
How to Configure Windows 8.1 to run ereports on IE11 Description: Windows 8.1 ships with IE10, but can be updated to IE11. There is a special mode in IE11 called Enterprise Mode that can be used to emulate
More informationJava version 7 update 45 (7u45)
TO DISABLE JAVA - visit this website for instructions. http://www.java.com/en/download/help/disable_browser.xml http://www.oracle.com/technetwork/java/javase/downloads/jdk7-downloads-1880260.html If you
More informationFederated Identity Service Certificate Download Requirements
Federated Identity Service Certificate Download Requirements Version 3.2 Exostar, LLC February 14, 2013 Table of Contents Introduction... 1 Purpose... 1 FIS System Requirements... 2 Adding Exostar as a
More informationFoxit Enterprise Reader GPO User Guide
1 Copyright 2013 Foxit Corporation. All Rights Reserved. No part of this document can be reproduced, transferred, distributed or stored in any format without the prior written permission of Foxit. Anti-Grain
More informationSystem Configuration Guide For Desktop Originator /Desktop Underwriter July 2013
System Configuration Guide For Desktop Originator /Desktop Underwriter July 2013 2013 Fannie Mae. Trademarks of Fannie Mae. DO/DU System Configuration Guide 1 2003-2013 Fannie Mae. All Rights Reserved.
More informationNSi Mobile Installation Guide. Version 6.2
NSi Mobile Installation Guide Version 6.2 Revision History Version Date 1.0 October 2, 2012 2.0 September 18, 2013 2 CONTENTS TABLE OF CONTENTS PREFACE... 5 Purpose of this Document... 5 Version Compatibility...
More informationConfiguring Internet Explorer for CareLogic
Configuring Internet Explorer for CareLogic March 19, 2014 1 P a g e Table of Contents Configuring Internet Explorer for CareLogic... 3 Configuring Internet Explorer Security Settings... 4 Internet Explorer
More informationEnterprise Vault Installing and Configuring
Enterprise Vault Installing and Configuring Enterprise Vault 6.0 Legal Notice Copyright 2005 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, VERITAS, the VERITAS Logo, and Enterprise
More informationConfiguring Internet Explorer for Voyager on Client Computers
1 Configuring Internet Explorer for Voyager on Client Computers You must configure Microsoft Internet Explorer settings on each of your client computers so that your users can properly access and operate
More informationSTEP BY STEP IIS, DotNET and SQL-Server Installation for an ARAS Innovator9x Test System
STEP BY STEP IIS, DotNET and SQL-Server Installation for an ARAS Innovator9x Test System Abstract The intention of this document is to ensure successful installation of 3rd-Party software required for
More informationFileMaker Server 13. FileMaker Server Help
FileMaker Server 13 FileMaker Server Help 2010-2013 FileMaker, Inc. All Rights Reserved. FileMaker, Inc. 5201 Patrick Henry Drive Santa Clara, California 95054 FileMaker and Bento are trademarks of FileMaker,
More informationWatchDox for Windows. User Guide. Version 3.9.5
WatchDox for Windows User Guide Version 3.9.5 Notice Confidentiality This document contains confidential material that is proprietary WatchDox. The information and ideas herein may not be disclosed to
More informationWindows Server Update Services 3.0 SP2 Step By Step Guide
Windows Server Update Services 3.0 SP2 Step By Step Guide Microsoft Corporation Author: Anita Taylor Editor: Theresa Haynie Abstract This guide provides detailed instructions for installing Windows Server
More informationCA Unified Infrastructure Management Server
CA Unified Infrastructure Management Server CA UIM Server Configuration Guide 8.0 Document Revision History Version Date Changes 8.0 September 2014 Rebranded for UIM 8.0. 7.6 June 2014 No revisions for
More informationSage HRMS 2014 Sage Employee Self Service
Sage HRMS 2014 Sage Employee Self Service Pre-Installation Guide October 2013 This is a publication of Sage Software, Inc. Document version: October 17, 2013 Copyright 2013. Sage Software, Inc. All rights
More informationMyReports Recommended Browser Settings MYR-200a
MyReports Recommended Browser Settings MYR-200a Note: If you have installed an additional Tool Bar on your browser, such as Yahoo Tool Bar or Google Tool Bar, be sure that it is also configured to allow
More informationConcur Travel & Expense
Concur Travel & Expense Supported Configurations Client Version Contents Supported Configurations... 1 Section 1: About Concur Travel & Expense... 1 Section 2: Read This First... 1 Browser Settings General...
More informationFileMaker Server 14. FileMaker Server Help
FileMaker Server 14 FileMaker Server Help 2007 2015 FileMaker, Inc. All Rights Reserved. FileMaker, Inc. 5201 Patrick Henry Drive Santa Clara, California 95054 FileMaker and FileMaker Go are trademarks
More informationM86 Web Filter USER GUIDE for M86 Mobile Security Client. Software Version: 5.0.00 Document Version: 02.01.12
M86 Web Filter USER GUIDE for M86 Mobile Security Client Software Version: 5.0.00 Document Version: 02.01.12 M86 WEB FILTER USER GUIDE FOR M86 MOBILE SECURITY CLIENT 2012 M86 Security All rights reserved.
More informationTaleo Recruiting 7.5. Technical Requirements and Configuration Guidelines for Candidates. Software Version: 7.5 SP11
Taleo Recruiting 7.5 Technical Requirements and Configuration Guidelines for Candidates Software Version: 7.5 SP11 January 2010 Information Confidentiality It shall be agreed by the recipient of the document
More informationXenClient Enterprise Synchronizer Installation Guide
XenClient Enterprise Synchronizer Installation Guide Version 5.1.0 March 26, 2014 Table of Contents About this Guide...3 Hardware, Software and Browser Requirements...3 BIOS Settings...4 Adding Hyper-V
More informationThe cloud server setup program installs the cloud server application, Apache Tomcat, Java Runtime Environment, and PostgreSQL.
GO-Global Cloud 4.1 QUICK START SETTING UP A WINDOWS CLOUD SERVER AND HOST This guide provides instructions for setting up a cloud server and configuring a host so it can be accessed from the cloud server.
More informationSC-T35/SC-T45/SC-T46/SC-T47 ViewSonic Device Manager User Guide
SC-T35/SC-T45/SC-T46/SC-T47 ViewSonic Device Manager User Guide Copyright and Trademark Statements 2014 ViewSonic Computer Corp. All rights reserved. This document contains proprietary information that
More informationQuestionPoint chat The Guide to IE browser setup Last updated: 2013 Nov 12
QuestionPoint chat The Guide to IE browser setup Last updated: 2013 Nov 12 This guide provides a procedure for initially configuring your Internet Explorer (IE) browser to use Flash Chat. Please note that
More informationWatchDox for Windows User Guide. Version 3.9.0
Version 3.9.0 Notice Confidentiality This document contains confidential material that is proprietary WatchDox. The information and ideas herein may not be disclosed to any unauthorized individuals or
More informationProjectDox 7.7 Setup Requirements
ProjectDox 7.7 Setup Requirements Client computers must be configured as follows, for end-users to be able to view files from within ProjectDox. 1) Client Installation a) Disable User Account Control (UAC)
More informationSage 300 ERP 2012. Sage CRM 7.1 Integration Guide
Sage 300 ERP 2012 Sage CRM 7.1 Integration Guide This is a publication of Sage Software, Inc. Version 2012 Copyright 2012. Sage Software, Inc. All rights reserved. Sage, the Sage logos, and the Sage product
More informationFoxit Reader Deployment and Configuration
Copyright 2004-2015 Foxit Software Incorporated. All Rights Reserved. No part of this document can be reproduced, transferred, distributed or stored in any format without the prior written permission of
More informationRMFT Web Client User Guide
RMFT Web Client User Guide Software Version 2.5 Supported Browsers: Browser Internet Explorer Firefox Safari Google Chrome Version 7.0 and above 3 and above 3.2 and above 1.0 and above August 7, 2011 RepliWeb,
More informationChecking IE Settings, and Basic System Requirements for QuestionPoint
Checking IE Settings, and Basic System Requirements for QuestionPoint This document covers basic IE settings and system requirements necessary for QuestionPoint. These settings and requirements apply to
More informationRSView 32 ACTIVE DISPLAY SYSTEM GETTING RESULTS GUIDE. PUBLICATION VW32AD-GR001E-EN-E July 2011 Supersedes Publication VW32AD-GR001D-EN-E
RSView 32 ACTIVE DISPLAY SYSTEM GETTING RESULTS GUIDE PUBLICATION VW32AD-GR001E-EN-E July 2011 Supersedes Publication VW32AD-GR001D-EN-E Contact Rockwell Copyright Notice Trademark Notices Customer Support
More informationTxEIS on Internet Explorer 7
TxEIS on Internet Explorer 7 General Set Up Recommendations: Several modifications will need to be made to the computer settings in Internet Explorer to ensure TxEIS runs smoothly, reports pop up as desired,
More informationSage ACT! Premium 2013 Web Administrator's Guide
Copyright 2012 Sage Software, Inc. All Rights Reserved. Sage, the Sage logos, ACT!, and the Sage product and service names mentioned herein are registered trademarks or trademarks of Sage Software, Inc.
More informationInstallation Guide and Machine Setup
Installation Guide and Machine Setup Page 1 Browser Configurations Installation Guide and Machine Setup The first requirement for using CURA is to ensure that your browser is set up accurately. 1. Once
More informationTable of Contents. Contents
Contents Copyright 2015 SolarWinds Worldwide, LLC. All rights reserved worldwide. No part of this document may be reproduced by any means nor modified, decompiled, disassembled, published or distributed,
More informationSage 300 ERP 2014. Sage CRM 7.2 Integration Guide
Sage 300 ERP 2014 Sage CRM 7.2 Integration Guide This is a publication of Sage Software, Inc. Version 2014 Copyright 2013. Sage Software, Inc. All rights reserved. Sage, the Sage logos, and the Sage product
More informationGómez Script Recorder
Gómez Script Recorder GETTING STARTED October 2003 Overview The Gómez Performance Network (GPN) measures Web page and transaction performance globally in real-time, enabling organizations to continuously
More informationBusinessObjects Enterprise InfoView User's Guide
BusinessObjects Enterprise InfoView User's Guide BusinessObjects Enterprise XI 3.1 Copyright 2009 SAP BusinessObjects. All rights reserved. SAP BusinessObjects and its logos, BusinessObjects, Crystal Reports,
More informationAdvanced Event Viewer Manual
Advanced Event Viewer Manual Document version: 2.2944.01 Download Advanced Event Viewer at: http://www.advancedeventviewer.com Page 1 Introduction Advanced Event Viewer is an award winning application
More informationPersonal Computer Checklist (Windows 10 and Internet Explorer 11.0) RealPage, Inc.
Personal Computer Checklist (Windows 10 and Internet Explorer 11.0) RealPage, Inc. IMPORTANT NOTICE: YOUR USE OF THESE MATERIALS SHALL BE DEEMED TO CONSTITUTE YOUR AGREEMENT THAT SUCH USE SHALL BE GOVERNED
More informationMadCap Software. Upgrading Guide. Pulse
MadCap Software Upgrading Guide Pulse Copyright 2014 MadCap Software. All rights reserved. Information in this document is subject to change without notice. The software described in this document is furnished
More informationNETWRIX ACCOUNT LOCKOUT EXAMINER
NETWRIX ACCOUNT LOCKOUT EXAMINER ADMINISTRATOR S GUIDE Product Version: 4.1 July 2014. Legal Notice The information in this publication is furnished for information use only, and does not constitute a
More informationClient Workstation Guide Document version: 7.2 2014-09-02 PUBLIC. SAP Contact Center
Client Workstation Guide Document version: 7.2 2014-09-02 Document History Caution Before you start the implementation, make sure you have the latest version of this document. You can find the latest version
More informationDesktop Surveillance Help
Desktop Surveillance Help Table of Contents About... 9 What s New... 10 System Requirements... 11 Updating from Desktop Surveillance 2.6 to Desktop Surveillance 3.2... 13 Program Structure... 14 Getting
More informationBroadWorks Receptionist
BroadWorks Receptionist Administration Guide Release 14.sp2 Document Version 1 220 Perry Parkway Gaithersburg, MD USA 20877 Tel +1 301.977.9440 Fax +1 301.977.8846 WWW.BROADSOFT.COM BroadWorks Guide Copyright
More informationPLATO Learning Environment System and Configuration Requirements for workstations. October 27th, 2008
PLATO Learning Environment System and Configuration Requirements for workstations October 27th, 2008 Windows 2000 Professional with SP4 Windows XP Professional with SP2 Windows XP Home Edition with SP2
More information2X Cloud Portal v10.5
2X Cloud Portal v10.5 URL: www.2x.com E-mail: info@2x.com Information in this document is subject to change without notice. Companies, names, and data used in examples herein are fictitious unless otherwise
More informationLumInsight CMS Installation Guide
LumInsight CMS Installation Guide This guide walks you through the installation steps to run your LumInsight CMS software. 078-1059-01C Echelon, LumInsight, and the Echelon logo are trademarks of Echelon
More informationInterworks. Interworks Cloud Platform Installation Guide
Interworks Interworks Cloud Platform Installation Guide Published: March, 2014 This document contains information proprietary to Interworks and its receipt or possession does not convey any rights to reproduce,
More informationGrandView. Web Client Software Requirements and Recommendations. Revision 2012.9.26
GrandView Web Client Software Requirements and Recommendations Revision 2012.9.26 RoviSys 1455 Danner Drive Aurora, OH 44202 330-562-8600 grandviewbusinesssolutions.com TABLE OF CONTENTS Introduction...
More informationFileMaker Server 11. FileMaker Server Help
FileMaker Server 11 FileMaker Server Help 2010 FileMaker, Inc. All Rights Reserved. FileMaker, Inc. 5201 Patrick Henry Drive Santa Clara, California 95054 FileMaker is a trademark of FileMaker, Inc. registered
More informationWatchDox Administrator's Guide. Application Version 3.7.5
Application Version 3.7.5 Confidentiality This document contains confidential material that is proprietary WatchDox. The information and ideas herein may not be disclosed to any unauthorized individuals
More informationEducation Software Installer 2011
Education Software Installer 2011 Windows operating systems System administrator s guide Trademark notice SMART Notebook, SMART Document Camera, SMART Response, SMART Sync, SMART Classroom Suite, Senteo,
More informationDigipass Plug-In for IAS. IAS Plug-In IAS. Microsoft's Internet Authentication Service. Installation Guide
Digipass Plug-In for IAS IAS Plug-In IAS Microsoft's Internet Authentication Service Installation Guide Disclaimer of Warranties and Limitations of Liabilities Disclaimer of Warranties and Limitations
More informationFile and Printer Sharing with Microsoft Windows
Operating System File and Printer Sharing with Microsoft Windows Microsoft Corporation Published: November 2003 Abstract File and printer sharing in Microsoft Windows allows you to share the contents of
More informationFoxit Reader Deployment and Configuration
Copyright 2004-2016 Foxit Software Incorporated. All Rights Reserved. No part of this document can be reproduced, transferred, distributed or stored in any format without the prior written permission of
More informationNETWRIX CHANGE NOTIFIER
NETWRIX CHANGE NOTIFIER FOR SQL SERVER QUICK-START GUIDE Product Version: 2.6.194 February 2014. Legal Notice The information in this publication is furnished for information use only, and does not constitute
More informationTIBCO ActiveMatrix BPM - Integration with Content Management Systems
TIBCO ActiveMatrix BPM - Integration with Content Management Systems Software Release 3.0 May 2014 Two-Second Advantage 2 Important Information SOME TIBCO SOFTWARE EMBEDS OR BUNDLES OTHER TIBCO SOFTWARE.
More informationPLATO Learning Environment System and Configuration Requirements. for workstations. April 14, 2008
PLATO Learning Environment System and Configuration Requirements Version 1.1 (for use with Academic Systems Algebra only) for workstations April 14, 2008 Windows 2000 Professional with SP4 Windows XP Professional
More informationClient Administrator Quick Reference Guide
Client Administrator Quick Reference Guide Thank you for using ADP's ipaystatements to view your payroll information. Use this Quick Reference Guide to learn how to view your pay statement, understand
More informationEntrust Managed Services PKI Administrator Guide
Entrust Managed Services PKI Entrust Managed Services PKI Administrator Guide Document issue: 3.0 Date of issue: May 2009 Copyright 2009 Entrust. All rights reserved. Entrust is a trademark or a registered
More informationInstructions for Configuring Your Browser Settings and Online Security FAQ s. ios8 Settings for iphone and ipad app
Instructions for Configuring Your Browser Settings and Online Security FAQ s ios8 Settings for iphone and ipad app General Settings The following browser settings and plug-ins are required to properly
More informationNTP Software File Auditor for Windows Edition
NTP Software File Auditor for Windows Edition An NTP Software Installation Guide Abstract This guide provides a short introduction to installation and initial configuration of NTP Software File Auditor
More informationSmartOffice Configuration Guide for Microsoft Windows XP Service Pack 2
SmartOffice Configuration Guide for Microsoft Windows XP Service Pack 2 Copyright 1998-2004, E-Z Data, Inc. All Rights Reserved No part of this documentation may be copied, reproduced, or translated in
More informationIntel Unite Solution. Standalone User Guide
Intel Unite Solution Standalone User Guide Legal Disclaimers & Copyrights All information provided here is subject to change without notice. Contact your Intel representative to obtain the latest Intel
More informationLepide Active Directory Self Service. Installation Guide. Lepide Active Directory Self Service Tool. Lepide Software Private Limited Page 1
Installation Guide Lepide Active Directory Self Service Tool Lepide Software Private Limited Page 1 Lepide Software Private Limited, All Rights Reserved This User Guide and documentation is copyright of
More informationTechnical Brief for Windows Home Server Remote Access
Technical Brief for Windows Home Server Remote Access Microsoft Corporation Published: October, 2008 Version: 1.1 Abstract This Technical Brief provides an in-depth look at the features and functionality
More informationTANDBERG MANAGEMENT SUITE 10.0
TANDBERG MANAGEMENT SUITE 10.0 Installation Manual Getting Started D12786 Rev.16 This document is not to be reproduced in whole or in part without permission in writing from: Contents INTRODUCTION 3 REQUIREMENTS
More informationInstallation Guide for Pulse on Windows Server 2012
MadCap Software Installation Guide for Pulse on Windows Server 2012 Pulse Copyright 2014 MadCap Software. All rights reserved. Information in this document is subject to change without notice. The software
More information