Appendix. Fractalia Manager Version 5.0 FRACTALIA Software

Size: px
Start display at page:

Download "Appendix. Fractalia Manager Version 5.0 FRACTALIA Software"

Transcription

1 Appendix Fractalia Manager Version 5.0 FRACTALIA Software

2 2 A. SERVER TOOLS SYNCHRONIZER WITH ACTIVE DIRECTORY (AD) SyncAD2IRM.exe.config Installation PROCESS AND URLS ANALYZER Configurating ProcessAndUrlAnalyzer.exe.config Task programmed with the ProcessAndUrlAnalyzer LICENSEACTIONS IRMLicenseActions.exe.config Enterprise License ODP/OTP TOOL REPEATERS Normal CONFIGURATION OF SQL REPORTING SERVICES GENERATING CUSTOMER REPORTS Creation of models Report Builder B. CLIENT TOOLS IRM CONFIGURATION FILES Config.xml Updates.xml PatchClientModule.config SelfServiceTool.exe.config Registering terminals by command line FRACTALIA MANAGER MOBILE CONFIGURATION FILES Config.xml C. UTILITIES INSTANT RECOVERY SYSTEM UNATTENDED INSTALLATION Normal installation Unattended Installation Update Disk Write Strategy INSTANT RECOVERY SYSTEM COMMAND LINES VirtualDiskControl.exe GENERATING INVENTORY TEMPLATES Format of the inventory template UNATTENDED INSTALLATIONS deploy.bat Creating the installation... 66

3 3 A. Server Tools 1. Synchronizer with Active Directory (AD) The synchronizer of the Active Directory (AD) with IRM takes care of dumping the information necessary to integrate IRM with AD. The information is only transferred from AD to the IRM database so that it never modifies the information in the AD. On synchronizing the AD data against the IRM, the unit organisational structure is copied converting them into IRM groups and positioning the machines in the same place as in the AD. 1. SyncAD2IRM.exe.config The configuration file is used to introduce the synchronization characteristics. <syncad2irm> <domains> <domain server="eccweb48" aduser="administrator" nbdomain="" adroot="dc=irm48,dc=ecc" syncpart="0" descriptiontoalias="true" /> </syncad2irm> Server: introduces the domain server against which the replica will be made. You can specify the complete domain name with which it will search for the closest domain server. aduser: introduces the AD user name that is used to connect to it. If the machine belongs to the AD then this field can be omitted, indicating the synchroniser to use the user that is functioning already. adpass: introduces the user password with which you access the AD. If the user is omitted then this field will not be valid. nbdomain: introduces the domain name. This parameter is only necessary if the machine in which the synchroniser is running does not have access to the DNS server associated with the active directory. If you omit this parameter and specify the user you must specify in the form: (for example adroot: introduces the AD root partition that you want to synchronise. It must have the form DC=fractalia, DC=biz. Sync Part: introduces partial synchronisation instead of a total one. The synchroniser will only take into account those elements that have been modified since the last synchronisation. If various domain servers are used, the synchroniser cannot detect changes made in a domain server other than the one indicated, so it is not recommendable to put a very high value for this parameter.

4 4 <sync2irm connectionstring = "Data Source=ECCWEB48\SQL2005;Initial Catalog=IRM48;User ID=sa;pwd=P@ssw0rd;Application Name=SyncAD2IRM" idclient = "3" timesleep="0" defaultrollbackmode="manual" timepoll="1" timeretry="1" numretry="1" connectiontype="1" /> Connection String: configures the connection string to the IRM database. Pressing on Check, you can verify that the connection string to the IRM database is correct. IdClient: when you are using multiple clients identify the IRM client to which the synchronisation data is assigned. Time Sleep: to configure the delay, in milliseconds, between the synchronisation of the AD elements. This field is used to slow the service so as not to consume all the machine s resources. Default Rollback Mode: configures the Rollback mode as manual or automatic, with which new machines detected in AD will be configured. Time Poll: configures the time, in seconds, of the call to check the inventory with which the new groups detected in AD will be configured. Time Retry: configures the time, in seconds, of the call to check the updates with which the new groups detected in AD will be configured. numretry: configures the time, in seconds, of the call to check the state of the Rollback with which the new groups detected in AD will be configured. This call time is different from the one in the IRM platform group properties tab. 2. Installation The synchronizer can be installed in any machine, even if it is not registered in the AD, although it is recommendable to install it in a domain server for security and performance. It is necessary to create a service using the executable of ADSync, and initiate it, so that it functions correctly. For this, execute from the command line: sc create ĄServicenameą binpath= ąpath where the SyncAD2IRM.exe is to be foundą start= auto Every time a change is made in the configuration file the service must be rebooted. Configuration example:

5 5 Figure 1. Example of synchroniser configuration <syncad2irm> <domains> <domain server=" " aduser="administrator" adpass="pass" nbdomain="" adroot="dc=tests,dc=fractalia" syncpart="0" descriptiontoalias="true" /> </syncad2irm> <sync2irm connectionstring = "Data Source= ;Initial Catalog=IRM48;User ID=sa;pwd=pwd;Application Name=SyncAD2IRM" idclient = "3" timesleep="0" defaultrollbackmode="manual" timepoll="1" timeretry="1" numretry="1" connectiontype="1" /> 2. Process and URLs Analyzer In order to execute the Process and URLs application, the file, ProcessAndUrlAnalyzer.exe.config, must be configured and a scheduled task for Windows must be created.

6 6 1. Configurating ProcessAndUrlAnalyzer.exe.config <?xml version="1.0" encoding="utf-8"?> <configuration> <appsettings> <add key="sourcepath" value="c:\inetpub\wwwroot\irm\pub\receivedfiles\" /> The local path where the files uploaded from the platform are stored is configured. <add key="processedpath" value="c:\inetpub\wwwroot\irm\pub\receivedfiles\processed" /> The local path where the processed files once they have been processed by the analyser are stored. <add key="erroneouspath" value="c:\inetpub\wwwroot\irm\pub\receivedfiles_diff\" /> The local path where the erroneous processed files once they have been processed by the analyser are stored. <add key="connectionstring" value=" data source= ;initial catalog=irm; persist security info=false; user id=sa; pwd=; packet size=4096" /> data source=.; initial catalog=irm; persist security info=false; user id=sairm; pwd=sairm; packet size=4096 PROPERTY data source initial catalog persist security info user id pwd packet size DESCRIPTION The name of the SQL server is introduced, and such usually matches the IP or host name of the machine. The database to be used is introduced; in this case, IRM. Introduce this if you want the security to be integrated with Windows, or not if you want security to be integrated with the SQL Server. If the value is set to false, then security is not integrated with Windows, and if the value is set to true, it is integrated. This option is set, by default, to false. The user name is introduced in order to access the database indicated to the initial catalog. The password corresponding to the login session introduced with the previous property is introduced. The maximum size of the packets to be introduced into the database is introduced. This property can be omitted. </appsettings> <system.windows.forms jitdebugging="true" /> </configuration>

7 7 2. Task programmed with the ProcessAndUrlAnalyzer The Scheduled Task is accessed through the Control Panel (Figure 6), and Figure 7 is shown, where a new scheduled task must be added. Figure 6. Open Scheduled Tasks through the Control Panel Figure 7. Scheduled Task When Add Scheduled Task is clicked, Figure 8 is shown, which is a window in which a process must be followed for a program to be executed when the user has scheduled it. Figure 8. Scheduled Task Wizard

8 8 After clicking on Browse, a window is shown (Figure 9) that will allow you to go to the path where the executable file, ProcessAndUrlAnalyzer, is stored in order to open it. Figure 9. Select the executable file, ProcessAndUrlAnalyzer In the windows in Figure 10 and Figure 11, you can select when the task is to be executed, that is, the time and date when the task must begin execution. Figure 10. Select when the task is to be executed Daily is selected in the window in Figure 10 and Every Day in the window in Figure 11.

9 9 Figure 11. Select the time and date you want this task to begin execution In the window in Figure 12, the user name and password needed to access the Server are requested in order for the execution of the task to start once that user is logged in. Figure 12. Introduce the user name and password for the Server Below (Figure 13), select the option of opening advanced properties when the configuration of the task is finalised. Figure 13. Select open advanced properties when finalising

10 10 When the advanced properties of the scheduled task are open, you must click on the Schedule tab in order to schedule when the task is to be executed after the machine is turned on. Figure 14. Schedule the task 3. LicenseActions LicenseActions is a tool that uses a super administrator to create several enterprises for the use of the platform, and administrator users for the created enterprises. It is also used to generate a number of licenses for the enterprises. When double clicking on the executable file, the window in Figure 15 is shown, where you must authenticate in order to access the configuration tool. Figure 15. Authentication window 1. IRMLicenseActions.exe.config <nhibernate> <add key="hibernate.connection.provider" value="nhibernate.connection.driverconnectionprovider" /> <add key="hibernate.dialect" value="nhibernate.dialect.mssql2005dialect" />

11 11 <add value="nhibernate.driver.sqlclientdriver"/> key="hibernate.connection.driver_classą <add key="hibernate.connection.connection_string" value="data source=.; initial catalog=irm;persist security info=false;user id=sa;pwd=;packet size=4093" /> data source=.; initial catalog=irm; persist security info=false; user id=sairm; pwd=sairm; packet size=4096 PROPERTY data source initial catalog persist security info user id pwd packet size DESCRIPTION The name of the SQL server is introduced, and such usually matches the IP or host name of the machine. The database to be used is introduced; in this case, IRM. Introduce this if you want the security to be integrated with Windows, or not if you want security to be integrated with the SQL Server. If the value is set to false, then security is not integrated with Windows, and if the value is set to true, it is integrated. This option is set, by default, to false. The user name is introduced in order to access the database indicated to the initial catalog. The password corresponding to the login session introduced with the previous property is introduced. The maximum size of the packets to be introduced into the database is introduced. This property can be omitted. </nhibernate> <appsettings> <add key="pathsetupconfig" value="c:\_utils\platformconfigurator\serverconfig.xml"/> The path where the ServerConfig.xml file is located is introduced. </appsettings> 2. Enterprise License With this tab, enterprises are created, as well as an administrator user for each of the created enterprises. Also, a number of licenses can be allocated, without exceeding the number of total licenses, to each of the enterprises (Figure 24).

12 12 License Information Figure 24. Entreprises Licenses tab With this panel, enterprises are created and deleted, and information related to each of them is shown: name of the enterprise (Enterprises), administrator user (Master User), number of licenses allocated (Licenses), number of active licenses (Activated), beginning date for licence operation (Initial Date) and end date for licence operation (Final Date). : a new enterprise is created. When clicking the button, the window in Figure 25 is shown, where the data regarding the enterprise must be introduced. Figure 25. Enterprise Data window Name: the name of the enterprise is introduced. Address: the address of the enterprise is introduced. Postal code: the postal code of the enterprise is introduced. City: the city where the enterprise is located is introduced. Country: the country where the enterprise is located is introduced.

13 13 : the enterprise selected in the panel is deleted. Once the enterprise is created, an administrator user for this enterprise must be created. To do so, you must click the Master User field of the enterprise, and the window in Figure 26 will be shown, where the user s data must be filled in. Figure 26. Generic tab for the Agent window Under the Generic tab (Figure 20), you must introduce the new user data, as well as the name with which s/he will use to log into the platform and his/her password. Name: the user name is introduced, 50 characters maximum. Surname 1: the first surname of the user is introduced, 50 characters maximum. (Optional field) Surname 2: the second surname of the user is introduced, 50 characters maximum. (Optional field) the address of the user is introduced. The admitted mail format is [email protected] (optional field) Description: some comment about the user is introduced, 50 characters maximum. (Optional field) Login: the user name used to access the platform is introduced, 20 characters maximum. Password: the user key used to access the platform is introduced, 6-15 characters maximum. Retype password: the user key used to access the platform is repeated, 6-15 characters maximum. Under the Configuration tab (Figure 27) the user language is selected.

14 14 Figure 27. Configuration tab Under Additional Data (Figure 28), the user data is introduced. It is not necessary to fill in all those details, as they are optional. Figure 28. Additional Data tab Department: the department to which the user belongs is introduced, 50 characters maximum. Address: the address of the user is introduced, 50 characters maximum. Locality: the locality of the user is introduced, 50 characters maximum. Postal Code: the postal code of the user is introduced, 10 digits maximum. Province: the province of the user is introduced, 50 characters maximum. Country: the country of the user is introduced, 50 characters maximum. Contact person: the contact person corresponding to the user is introduced, 50 characters maximum. Telephone: the telephone number of the user is introduced, 10 digits maximum. Web page: the web page of the user is introduced, 50 characters maximum. Mobile pone: the mobile telephone number of the user is introduced, 10 digits maximum. Company: the company the user belongs to is introduced, 50 characters maximum. Then the initial date and final date for licence operation must be selected. To do so, the Initial Date and Final Date fields must be clicked and the relevant dates must be selected.

15 15 License Management With this panel, a number of licenses can be assigned to the enterprise, and the enterprise s assigned licenses, which can be selected under the License Information panel, are updated. : the number of licenses, introduced in the upper field, is assigned to the selected enterprise. : the active licenses of the selected company are updated. License Expire Date This panel shows the expiry date of the licenses introduced in the Expire Date field of the License Generator application, which is explained below. 4. ODP/OTP tool ODP/OTP is a tool used by an administrator to generate a key. This key is provided to the user so that he can access the Instant Recovery System. Figure 31. Password provided to the administrator (graphic mode) Figure 32. Password provided to the administrator (text mode)

16 16 The password, which is marked in red in Figure 31 or Figure 32, is provided to the administrator so that, through the use of the ODP/OTP tool, it generates a key so that the user can introduce it in the Password field, which is marked in green in Figure 31 or Figure 32. When the administrator receives the password, s/he executes, per command line, the tool, depending on whether the key that the user needs is for once (OTP) or for a day (ODP), using one argument or another. The ODP (One Day Password): generates a password for each day. It must be requested from the system administrator. The format of the instruction the administrator must introduce per command line is: ODTPTool.exe ODP dd.mm.yyyy Where dd.mm.yyyy is the present date format ( dd : day, mm : month, yyyy : year). The OTP (One Time Password): generates a password every time the console is accessed. 5. Repeaters ODTPTool.exe OTP passworduser PasswordUser is the password that the user provides to the administrator, which is marked in red in Figure 31 or Figure Normal You need to mount a server, outside the LAN, with the IRM Repeater vx.x, Setup.exe application. This application acts as a Bypass for the user petitions to take remote control of other terminals, if this application is deactivated the connections die, and it will not be possible to establish remote connections in accordance with petitions. On installing the application, the notification area will show that the Repeater is executing. you press on it with the right hand button of the mouse (Figure 2), you can access the Repeater adjustments (Figure 3). Figure 2. Icon in the notification area To configure the Normal mode introduce the Viewer and Server port. The Viewer port must be mapped in the router input and with the terminal over which you want to take remote control.

17 17 Figure 3. Repeater Adjustments For the client it is necessary to configure the Remoting fields so that it connects correctly. The configuration can be made with the local client configurator or by modifying the client configuration file. If you do it through the local configurator, you have to execute the application (Figure 4), click on Proxy and configure the part corresponding to the Remoting channel (Figure 5) Figure 4. Opening local client configurator

18 18 Figure 5. Local client configurator Server: introduces the server name or IP where the Remoting module is installed. Directory: introduces the path to the Remoting module folder. Port: introduces the port through will go to Remoting. Resource: introduces the Remoting resource name. If you do it through the configuration file, you must edit the Config.xml file in the path %PROGRAMFILES%\4.8\Iriscene Remote Manager\" and reboot the IRM service. <remotingchannel> <Enabled>true</Enabled> Enables Remoting. <ReconnectionTime>15</ReconnectionTime> Reconnection time for Remoting. <HttpSleepRetryConnectionTime>500</HttpSleepRetryConnectionTime> <UrlGenuineChannelLog>D:\IRM\log\</UrlGenuineChannelLog> <Url> <Protocol>ghttp</Protocol> <Host>ECCWEB48</Host> Public IP or DNS of the server where you find the Remoting module. <Port>80</Port> Remoting port <Dir>Fractalia/IRM/IRMRemotingServiceHost</Dir> Path to the IRMRemotingServiceHost folder in the Server <Resource>IrmRemotingService.rem</Resource> </Url>

19 19 </remotingchannel> Figure 6. Normal 6. Configuration of SQL Reporting Services Report Server is a complete server solution to allow you to create, administrate and deliver Web reports. Figure 7. Reporting Services Configuration Execute the Reporting Services Configuration (Figure 7) and connect with the database server (Figure 8).

20 20 Figure 8. Connection with database server Next, you have to create the Report Server virtual directory, to do this, click on Report Server Virtual Directory, press the New button and select the WebSite where you want to create it. (Figure 9 and Figure 10) Figure 9. Create a Report Server virtual directory

21 21 Figure 10. Virtual directory successfully created Then you have to create a Report Manager virtual directory, to do this, click on the Report Manager Virtual Directory, press the New button and select the WebSite where you are going to create it. (Figure 11 and Figure 12)

22 22 Figure 11. Create a Report Manager virtual directory Figure 12. Virtual directory successfully created Lastly, you have to connect with the Report Server database, to do this, you have to introduce the credentials to connect you with the database, click on the Connect button and apply the changes by pressing the Apply button. (Figure 13 and Figure 14)

23 23 Figure 13. Connect to the Report Server database Figure 14. Connection to the database successful

24 24 7. Generating Customer Reports The Customer Reports are reports generated by the Report Server that have been created by the administrator with the Report Builder tool. To generate them it is necessary to follow certain rules, which are explained in the following text. 1. Creation of models To create the models to be used in the next step you have to open the program SQL Server Business Intelligence in the server where the Report Server is installed. (Figure 56 and Figure 57) Figure 56. Open SQL Server Business Intelligence Figure 57. SQL Server Business Intelligence Next, you have to create a new Project Report Model (Figure 58 and Figure 59)

25 25 Figure 58. Create a new project Figure 59. Create a Report Model Project In Solution Explorer (View Solution Explorer), you have to click on the folder Data Sources with the right hand button of the mouse and select the option to add a new Data Source. Figure 60 will be shown. Figure 60. Add a new Data Source Next, you have to press on the New button and insert <Name or IP of server>\instance of database, the user and password to access the database from which you are going to do the reports, the corresponding database (Figure 61). Pressing OK will display (Figure 62). On

26 26 pressing finish, you will have to insert the name of the new Data source (Figure 63) and so complete the process of adding a new Data Source. Figure 61. Configure the connection string for the new Data Source Figure 62. Configuration finalized

27 27 Figure 63. Completion of the creation of a new Data Source Figure 64. New Data Source created successfully Next, you have to click on the Data Source Views folder with the right hand button of the mouse and select the option to add a new Data Source View. Figure 65 will be displayed. Figure 65. Add new views of de Data Source Next, select the Data Source created previously (Figure 66) and select the tables on which you are going to make a customised report (Figure 67). If you wish to select all the tables that depend on the one selected, you have to select the table in Included objects and press on the Add Related Tables button.(figure 68 and Figure 69) and then press Next. Insert the name for the new Data Source view to finish the process. (Figure 70 and Figure 71)

28 28 Figure 66. Selection of Data Source Figure 67. Select tables to include in the report

29 29 Figure 68. Add tables that depend on one that has been selected Figure 69. Tables added

30 30 Figure 70. Insert a name for the Data Source view Figure 71. New Data Source view successfully created Next, click on the Report Models folder with the right hand button of the mouse and select the option to add a new Report Model. Figure 72 will be displayed. Figure 72. Add a new Report Model Following this, select the Data Source created previously (Figure 73) and the elements to be created will be displayed (Figure 74) (the default values are recommended). Insert a name for the Report Model to complete the process and then press Run. (Figure 75, Figure 76 and Figure 77)

31 31 Figure 73. Select the view created previously Figure 74. Select the options on which the reports are generated

32 32 Figure 75. Insert a name for the Report Model and press Run Figure 76. Start of the Report Model creation process

33 33 Figure 77. Report Model completed Next, you have to deploy the solution, to do this press on the button marked in Figure Report Builder Figure 78. Deploy the solution To open the Report Builder application in the server you have to open the Internet Information Server (IIS), click on the virtual directory created in Report Manager Virtual Directory in the Report Server configuration tool (Figure 79). Next, click with the right hand button..

34 34 Figure 79. Report Manager Virtual Directory in IIS Figure 80. Open the Home.aspx page in the explorer

35 35 Figure 81. Home.aspx To open the Report Builder application in a machine execute the following from the explorer Error! Referencia de hipervínculo no válida. or IP of the server>/< Report Manager Virtual Directory >/Home.aspx and Figure 81 will be displayed. To show (Figure 82, Figure 83 and Figure 84) you must execute Report Builder. Figure 82. Execute the Report Builder Figure 83. Download the Report Builder application

36 36 Figure 84. Report Builder Next, double click on one of the models displayed in the Figure 85 panel and the report designer will open. It is here that you will create a personalised report by dragging the entities or fields that we want to appear in the report. Figure 85. Select one of the available models in the panel

37 37 Figure 86. Designer of reports for personalised reports Once the reports are finished, save them in the ReportServer folder. (Figure 87) NOTE: The name used to save the report must not have blank spaces. Figure 87. Save the description of the reports You have to create a shared folder in the server to keep the file.rdl with the same name used in the previous step. (Figure 88, Figure 89, Figure 90, Figure 91, Figure 92, Figure 93 and Figure 94)

38 38 Figure 88. Create a new folder in the server Figure 89. Share the folder I Figure 90. Share the folder II Figure 91. Share the folder III

39 39 Figure 92. Save the rdl file Figure 93. Select the shared folder created previously in the server Figure 94. Save the rdl file in the shared folder on the server

40 40 B. CLIENT TOOLS 1. IRM configuration files 1. Config.xml This file is to configure the internal parameters of the client. It is to be found in the directory: Ą%PROGRAMFILES%\Iriscene Remote Manager\4.8" The code lines that are configured in this file will appear in bold. Normally this file is modified with the IRM configurator program; nevertheless, it is always possible to do it manually. <general> <GuidTerminal>SOFTWARE\Fractalia\Irm\</GuidTerminal> In this line, the part of the register where the terminal identifier is kept is configured. <LogFile>D:\IRM\log\IriSceneRemoteManager.log</LogFile> Configures the path where the log of calls between client and platform is stored. <CentralPlatform> </CentralPlatform> Configures the address in the IRM server where the Web Service connection with the client can be found. <Client>ECC</Client> Shows the company where the client is registered. <ServiceStartTime>30</ServiceStartTime> Configures the delay, in seconds, which the IRM service takes before initiating after starting the machine. <ReconnectionTime>1</ReconnectionTime> Configures the time, in minutes, of reconnection with the Web Service, in case this is interrupted. <RestartInterval>60</RestartInterval> Configures the time, in seconds, that is displayed in the countdown window when the computer has to reboot for some action taken in the platform. <User>Fractalia</User> Configures the administrator s user name. <Password>82ZuX+E=</Password> Shows the coded password of IRM. <Language>es</Language> Configures the default language for IRM tools in the client.

41 41 <EnableInstallLog>true</EnableInstallLog> Enables the IRM logs in the client. </general> <proxy> <IpProxy> </IpProxy> Configures the Proxy IP. <PortProxy> </PortProxy> Configures the Proxy port. <UserProxy> </UserProxy> Configures the user for Proxy authentication. <PasswordProxy> </PasswordProxy> Configures the password for Proxy authentication. <DomainProxy> </DomainProxy> Configures the Proxy domain. </proxy> <inventory> <InventoryPath>D:\IRM\Datos</InventoryPath> Configures the address where the client inventory is going to be stored. </inventory> <upload> <UploadTime>1</UploadTime> Configures the time frequency, in minutes, the data found in the send data path is sent. <UploadPath>D:\IRM\Datos\Envio</UploadPath> Configures the address to upload data. Any file placed in this folder will be sent in UploadTime seconds to the platform. <NumberRetry>2</NumberRetry> Configures the number of attempts to upload to the server. <Icon> <Path>Images\Subida.gif</Path> Configures the address of the upload icon. This icon is displayed in the notification area. <Message>Uploading file to Central Platform</Message> Configures the message that will be displayed in platform events when uploading data. </Icon> </upload> <rollback>

42 42 <password>82zux+e=</password> Shows the coded password of rollback. </ rollback > The IRM Windows applications (IRS console and configuration) have different types of security: Authentication integrated with Windows. Only those users that are system administrators can access the applications. Authentication IRM. The applications will request authentication on initiation, (as defined in the general section of the present file). Authentication ODP. The applications will request authentication on initiation. This will be a key obtained through the ODP/OTP tools. <security> <authentication> <Windows>1</Windows> Authentication of Windows, if it is 1 the value is true and if it is 0, false. <IRM>1</IRM> Authentication of Iriscene Remote Manager, if it is 1 the value is true and if it is 0, false. <ODP>1</ODP> Authentication of Instant Recovery System One Day Password, if it is 1 the value is true and if it is 0, false. </authentication> </security> <remotingchannel> <Enabled>true</Enabled> Enables Remoting. <ReconnectionTime>15</ReconnectionTime> Remoting reconnection time. <HttpSleepRetryConnectionTime>500</HttpSleepRetryConnectionTime> <UrlGenuineChannelLog>D:\IRM\log\</UrlGenuineChannelLog> <Url> <Protocol>ghttp</Protocol> <Host>ECCWEB48</Host> Public IP or DNS of the server where the Remoting module is to be found. <Port>80</Port> Remoting Port <Dir>Fractalia/IRM/IRMRemotingServiceHost</Dir> Path to find the RemotingServiceHost folder in the Server <Resource>IrmRemotingService.rem</Resource> </Url> </remotingchannel>

43 43 <TerminalControlServer> <Enabled>true</Enabled> Enable or disable the Callback Port. <CallBackPort>27027</CallBackPort> Inserts the port that is going to function as callback. </TerminalControlServer> <information> <CallInterval>15</CallInterval> </information> This is the time interval, in minutes, with which the information module calls the platform. <remoteconfig> <CallInterval>15</CallInterval> </remoteconfig> This is the time interval, in minutes, with which the configuration module calls the platform. <remotecontrol> <Password>82ZuX+E=</Password> Shows the remote control codified password. <Port>5900</Port> Configures the remote control port. <MSSecurity>0</MSSecurity> Security is integrated with Windows, if it is 1 the value is true and if it is 0, false. </remotecontrol> </remoteconfig> <actualizacion> <Password>82ZuX+E=</Password> </actualizacion> 2. Updates.xml This file allows the configuration of the download parameters of the client. It is to be found in the directory: Ą%PROGRAMFILES%\Iriscene Remote Manager\4.8" <P2P_Temp>d:\IRM\p2p\temporal</P2P_Temp> Configures the path where the temporary files are going to be stored. <Shared_Path>d:\IRM\p2p\shared</Shared_Path> Configures the path where the downloaded updates are going to be stored. <Shared_Mb>2048</Shared_Mb>

44 44 Configures the maximum folder size where the updates are going to be downloaded. <Share_Files>1</Share_Files> Indicates the number of updates that have been downloaded from the platform. <Path_ini>d:\IRM\p2p\ini</Path_ini> Configures the path where the download configuration files are going to be stored. The download configuration files are stored in the server with the extension.ini. <Shared_HTTPServerPort>8182</Shared_HTTPServerPort> Configures the server port for TCP protocol petitions. It is the port for sharing the P2P files. <Mirror>0</Mirror> Shows if the client is in Mirror mode. If it is in Mirror mode it will show a 1 and, if not, a 0. <WAN>1</WAN> Shows if the client is in WAN mode. If it is in WAN mode it will show a 1 and, if not, a 0. <LAN>1</LAN> Shows if the client is in LAN mode. If it is in LAN mode it will show a 1 and, if not, a 0. <BroadcastPort>20082</BroadcastPort> Configures the server port for UDP protocol petitions. It is necessary to be able to share P2P files. <Icons> <Icon Name="Download"> <Path>Images\Descarga.gif</Path> <Message>Downloading updates</message> </Icon> <Icon Name="Installation"> <Path>Images\Instalando.gif</Path> <Message>Installing updates</message> </Icon> </Icons> Configures the images and messages that will be shown during and after the download of updates. Configures the path where the contents for Iriscene Public Media are left when they are received from Iriscene Remote Manager. <SpeedLimit> <! -- Speed limit is in Bytes per second (BPS) --> <Download>-1</Download> <Upload>-1</Upload> </SpeedLimit> Configures the bandwidth, in bytes per second, of uploading and downloading updates. If the value is -1 bandwidth control is inactive.

45 45 3. PatchClientModule.config This file allows you to configure the path of the FPDServiceSetup service that is installed as part of Patch Management in the client. It is found in the directory: Ą%PROGRAMFILES%\Iriscene Remote Manager\4.8" <setting name="patchmanagerwebservicereferences_fpcservice_service" serializeas="string"> <value> </setting> It is necessary to reboot the IRMService.exe service to make the changes correctly. 4. SelfServiceTool.exe.config This file allows you to configure the path for the platform web service if you have installed the Self Service part in the client. It is in the directory: Ą%PROGRAMFILES%\Iriscene Remote Manager\4.8" <setting name="proxywrapper_irm_platform_irm_service" serializeas="string"> <value> </setting> To make the changes correctly you must restart the IRMService.exe service. 5. Registering terminals by command line Iriscene Remote Manager gives you the possibility to register a terminal by command line instead of having to run the configurator. To do this you have to access the path by the Windows terminal: Ą%PROGRAMFILES%/Iriscene Remote Manager/ą and execute the instruction RegisterTerminal.exe. The format for this instruction is: RegisterTerminal.exe <WebService> <License> <WebService>: inserts the URL of the platform WebService. <License>: inserts the group serial number where you will register the terminal. To obtain the serial number of the terminal you must access the platform and you get it by clicking, with the right-hand button of the mouse, on the group where you wish to register the terminal, and looking at the properties of the group in the Generic tab (Figure 95).

46 46 Figure 95. Getting the serial number of a group in the platform 2. Fractalia Manager Mobile configuration files 1. Config.xml <Configuration> <License>LicenseKey</License> This inserts the group licence you wish to register in the terminal. <UrlService> This inserts the connection URL with the platform client web service. <PathDownload>Program Files\Fractalia Manager Mobile\data\downloads\</PathDownload> This configures the path for keeping the files of the distribution of downloaded software. <PathLogFiles>Program Files\Fractalia Manager Mobile\data\logs\</PathLogFiles> This configures the path for the storage of the client logs. <PathStorage> Program Files\Fractalia Manager Mobile\data\storage\</PathStorage> This configures the path for the storage of the client internal files. <ReconnectionTime>30000</ReconnectionTime> This configures the platform reconnection time. (In milliseconds) <VNCPort>5900</VNCPort> This configures the VNC port. (5900 by default) </Configuration>

47 47 C. UTILITIES 1. Instant Recovery System unattended installation 1. Normal installation Execution of the Instant Recovery System can be done in two ways: Clicking directly on the IRS32.msi icon Executing the instruction msiexec /i Ą%rutaDelIRS%IRS32.msią from the command line, where %rutadelirs% is the path where the msi is to be found. 2. Unattended Installation The basic syntax for unattended installations is the following: msiexec /i IRS32.msi /qn <Other options msi> <IRS_OPTION=ąvalueą> <IRS_OPTION=ąvalueą> This table contains the options to personalise the IRS default installation options. Option Description Values By default TARGETDIR Installation Directory Any valid directory. If no directory exists, it will be created. C:\%program Remote files%\iriscene Manager\4.8\IRS PASSWORD IRS password Any alphanumeric Admin chain. AXSNAPSHOTS Maximum From 2 to number of Recovery Points DRIVES Disks to protect Any valid disk Active disk (normally C:) BOOTMENU Show or hide On Off On the load start menu OTP Enable or On Off On disable one time Password ODP Enable or On Off On disable Password for one day PROTECT Protect or not the disks ROR Specifies the disk to configure the restore on /none any valid disk /none

48 48 CONFIGLOG RESTART ALGORITHM SNAPFILEPERC SNAPFILESIZE OOTCACHELOCK COUNT OOTRECOVERY STRATEGY restarting Specifies the log file path for the configuration phase Enable or disable the restart after installation Disk Write Strategy (copy on write, redirect on write) See paragraph C.1. Error! No se encuentra el origen de la referencia. Percentage of the disk that takes the snapshot file that grows Initial size of the snapshot file (MB). It is recommended that exceed 1000 In Windows Vista Minimum number of cache blocks required to start Strategy to follow in case you do not have enough memory to boot the IRS /none any valid file (If exists it will be overwritten) yes no /cow /row The size should never exceed 45% of disk size /none Yes /cow 200 Any integer 10 Message RollbackToBaseSnapshot RollbackToLastSnapshot Message <Other msi options > Option /norestart /l* log_file /lx log_file Description No restart after installation (NOT RECOMMENDED) Normal installer log (NOT of the IRS protection) Detailed installer log (NOT of the IRS protection)

49 49 Note: If the User Access Control (UAC), a Windows Vista improvement, is active the installation process must have high administrator permissions or the installation will be cancelled, as the Windows Installer does not allow silent installation without said permissions. Examples To Install IRS in C:\IRS and the results of the detailed log in C:\irs_install.log msiexec /i IRS32.msi /qn /lx c:\irs_install.log TARGETDIR=ąc:\IRSą To Install IRS, protected disks C: and D: and without rebooting: msiexec /i IRS32.msi /qn DRIVES=ąc: d:ą /norestart To Install IRS but not protect any disk: msiexec /i IRS32.msi /qn PROTECT=ą0ą To Install IRS without the boot menu msiexec /i IRS32.msi /qn BOOTMENU=ąOffą To install IRS with Restore On Restart and select Disk Write Strategy: Copy on Write msiexec /i IRS32.msi /qn ROR=ąc:ą ALGORITHM=ą/cową 3. Update Execution of the update in normal mode: msiexec /i IRS32.msi REINSTALL=ALL REINSTALLMODE=ąvomusą Execution of the update in silent mode: msiexec /i IRS32.msi REINSTALL=ALL REINSTALLMODE=ąvomusą /qn 4. Disk Write Strategy There are two strategies with opposite properties that can be used when you check a disk partition with IRS: COW (Copy On Write): changes are made on the current state. In favour: instantaneous reading Against: It penalizes the disk write for the reallocation of sectors and also takes longer to return to a previous ROW (Redirect On Write): changes are made on the initial state. In favour: writing and recovery instant Against: slow reads. 2. Instant Recovery System Command lines In the path %PROGRAMFILES%\Fractalia\iRollback various applications exist that can be run by a terminal. The syntax is obtained keying in the name of the application without adding any type of parameter: ActionOnRestart.exe obtains information of the actions programmed after the reboot or cancels the planned actions.

50 50 ActionOnRestart.exe [ <disk-letter> <password> ] get disable AutoRollback.exe activates or deactivates the automatic mode. If it is in automatic mode, each time the machine is rebooted, it returns to a previous Recovery Point. AutoRollback.exe [ <disk-letter> <password> ] on off BootMenu.exe activates the start menu and the One Time Password/One Day Password (ODP/OTP). BootMenu.exe [ <password> ] <menu> <OTP> <ODP> specify on turn on off turn off - leave unchanged BootRecoveryStrategy.exe strategy to select if there is insufficient system memory to boot the IRS BootRecoveryStrategy.exe get BootRecoveryStrategy.exe [<password>] <boot-recovery-strategy> boot-recovery-strategy = Message RollbackToBaseSnapshot RollbackToLastSnapshot Config.exe launches the graphic application (Figure 96) that allows you to protect more than one partition. Config.exe To protect a disk you must press (Figure 96) and that will show all the unprotected disks in the equipment (Figure 97). To continue the process you must mark the disks that you want to protect, if you want to restore the previous state each time you reboot the machine and insert the IRS password (Figure 98, Figure 99 and Figure 100).

51 51 Figure 96. Protect a disk from the IRS configurator Figure 97. Select the disk to protect Figure 98. Insert the IRS password

52 52 Figure 99. Protected disk I Figure 100. Protected disk II

53 53 To unprotect a disk press on (Figure 101) and all the disks in the machine that are protected will be displayed (Figure 102). To continue the process you have to mark the disk that you want to unprotect, select the recovery point you want to restore or leave in its present state and insert the IRS password. (Figure 102 and Figure 103). To unprotect a disk you have to reboot the equipment. (Figure 104 and Figure 105) Figure 101. Unprotect a disk from IRS Configurator Figure 102. Selection of disk and recovery point to restore inserting the IRS password

54 54 Figure 103. Unprotect disk I Figure 104. Reboot to finalise unprotection of the disk Figure 105. Unprotect disk II Current Status.exe obtains the latest SnapShot made in the machine and its status. CurrentStatus.exe ChangeMode.exe changes the IRS mode, automatic or manual, on the selected protected disk.

55 55 ChangeMode.exe [ <disk-letter> ] AUTOMATIC MANUAL <password> DeleteRecoveryPoint.exe deletes a Recovery Point. DeleteRecoveryPoint.exe [ <disk-letter> <password> ] <recovery-point-number> Disable.exe returns to the true disk on the next reboot. This action has to be before uninstalling the Instant Recovery System. Disable.exe [ <disk-letter> <password> ] <recovery-point-number> [ /u ] For <recovery-point-number> 1 is the baseline and 0 the present status /u Ā uninstall IRS after rebooting the machine, this option is only valid for <recovery-point-number> = 0 FixedSnapshot.exe deactivates the Fixed Recovery Point. FixedSnapshot.exe [ <disk-letter> ] status FixedSnapshot.exe [ <disk-letter> <password> ] disable GetInfo.exe displays basic information of protected disks. GetInfo.exe Getversion.exe verifies the dll and driver versions of the installation. GetVersion.exe dll driver [ <disk-letter> ] IRSDefrag.exe frees the space of Recovery Points removed. IRSDefrag.exe [<disk-letter> <password>] [files] [boot on off] boot - enabled or disabled defragmentation at boot LockRecoveryPoint.exe blocks or unblocks the recovery point given as an argument. LockRecoveryPoint.exe [ <disk-letter> <password> ] <rec-point-number> [unlock] MaxSnapshot.exe used to establish the maximum number of snapshots. MaxSnapshots.exe [ <disk-letter> <password> ] <max-rec-point-count> MaxSnapshots.exe [ <disk-letter> ] get NextRecoveryPoint.exe creates a new Recovery Point. NextRecoveryPoint.exe NextRecoveryPointReboot.exe programs the creation of a Recovery Point after a reboot of the machine.

56 56 NextRecoveryPointReboot.exe Password.exe verifies or changes the password. Password.exe check <password> Password.exe change <old-password> <new-password> RestoreToSnapshot.exe restores the Recovery Point indicated as an argument. RestoreToSnapshot.exe [ <disk-letter> <password> ] <rec-point-number> last Rollback.exe programs the restoration of a prior Recovery Point for the next reboot. Rollback.exe SetBaseline.exe changes the baseline image to the image corresponding to the number introduced as the argument. SetBaseline.exe [ <disk-letter> <password> ] <recovery-point-number> SnapShotFileDump the internal information of snapshot file is displayed. SnapshotFileDump.exe /g <disk-letter>: general information is obtained SnapshotFileDump.exe /c <disk-letter>: <cluster-number>: cluster information is obtained SnapshotFileDump.exe /f <full-file-path>: file information is obtained SnapshotFileDump.exe /v <disk-letter>: [ range <first-cluster-number> <cluster-c ount> ]: specific information is collected every cluster of a unit SnapshotNumber.exe displays the number of recovery points currently existing in the machine. SnapshotNumber.exe UserStorage data are stored in protected memory of IRS, which does not change between snapshots. UserStorage.exe <password> getsize UserStorage.exe <password> write <offset> <string> UserStorage.exe <password> read <offset> <length> VirtualDiskControl.exe mounts and unmounts a virtual unit with the Recovery Point indicated as an argument. VirtualDiskControl mount <virtual-disk-letter> <protected-disk-letter> <RP> VirtualDiskControl unmount <virtual-disk-letter> where <RP> = <recovery-point-number> fixed

57 57 1. VirtualDiskControl.exe This is a command of the Instant Recovery System that allows you to recover the contents of a disk with a damaged Recovery Point. To do this, before loading the operating system, select in the menu, if you wish to use the preloading console of the IRS operating system in graphic mode (F3 or D) or in text mode (F4 or F). Graphic mode Select the protected disk that you want to act on (Figure 106), mark the checkbox Use Fixed Recovery Point and select the Recovery Point from which you want to obtain the information from the disk (Figure 107) and press the escape key. Figure 106. Protected disk selection

58 58 Figure 107. Use fixed This action creates a fixed Recovery Point, not visible for the user, with the disk contents of the damaged Recovery Point. Text mode Select the protected disk that you want to act on (Figure 108), press the F4 or F key to enable the option Fixed Recovery Point is enabled, introduce the Recovery Point number that you want recover the information from (Figure 109) and press the escape button. Figure 108. Protected disk selection

59 59 Figure 109. Use fixed This action creates a fixed Recovery Point, not visible for the user, with the disk contents of the damaged Recovery Point. There are two possibilities to recover the contents of the disk: From the command line. You must execute the instruction VirtualDiskControl.exe mount <Disk unit to mount> <Protected disk unit> fixed to mount the disk contents from the damaged Recovery Point in a virtual disk. From the IRS console. Press the button and this will display Figure 110, where you select the disk you want to mount the disk contents of the damaged Recovery Point. 3. Generating inventory templates Figure 110. Mount the Fixed Recovery Point The inventory template is based on a number of calls to registration and calls to the attributes of WMI classes. All of these calls are defined in an xml file, which is uploaded to the platform, and terminals which have, due to their group, this template assigned; such will download it, take the data requested from the template of the Terminal itself, and return them, in another XML file, to the platform. The other XML file must then be processed by the AnalyzerInventory application.

60 60 1. Format of the inventory template Elements of the structure REPORT - <REPORT> <TITLE>Canaries - example</title> + <PAGE> + <PAGE> + <PAGE> + <PAGE> + <PAGE> </REPORT> PAGE </PAGE> - <PAGE> <TITLE>Operating System</TITLE> <MENUTITLE>Configuration</MENUTITLE> +<DEVICE> +<DEVICE> +<DEVICE> +<GROUP> +<GROUP> +<GROUP> +<ITEM> +<ITEM> +<ITEM> +<ITEM> </PAGE> Section DEVICE There are three options: SPECIFIC DEVICE: all items have a WMI class indicated, as well as a specific entry, if there are several, for example, caches, network cards... - <DEVICE> <TITLE>Test</TITLE> +<GROUP> +<GROUP> +<GROUP>

61 61 +<ITEM> +<ITEM> +<ITEM> +<ITEM> </DEVICE> EXPAND TO ALL OF THOSE IN THE SYSTEM (NO HARDWARE), THROUGHOUT SEVERAL DEVICES: This will be used as the name of the device that returned by way of the field NAME of the WMI class. Therefore, it is not necessary to indicate the element (for example, Windows XP Professional ) through which it is being accessed. All ITEMS below the device that uses WMI will have access through the class indicated in the device, so that the class does not need to be stated in the ITEM. - <DEVICE> <TITLE>*</TITLE> <CLASS>Win32_OperatingSystem</CLASS> +<GROUP> +<GROUP> +<GROUP> +<ITEM> +<ITEM> +<ITEM> +<ITEM> </DEVICE> EXPAND TO ALL OF THOSE IN THE SYSTEM (HARDWARE, the WMI class must have a DeviceID field, which will be used for the name of the devices), THROUGHOUT SEVERAL DEVICES Therefore, it is not necessary to indicate the element (for example, cache L1) through which it is being accessed. All ITEMS below the device which use WMI will access through the class indicated in the device, so the class does not need to be stated in the ITEM. - <DEVICE> <TITLE>*</TITLE> <CLASS>Win32_CacheMemory</CLASS> +<GROUP> +<GROUP> +<GROUP> +<ITEM> +<ITEM> +<ITEM> +<ITEM> </DEVICE>

62 62 GROUP OF ITEMS It serves as a grouping entity, for example, Version, System directories, etc. - <GROUP> <TITLE>Version</TITLE> +<ITEM> +<ITEM> +<ITEM> +<ITEM> </GROUP> ITEM Values will be taken for the terminal. The ID can be indicated in the database, if it is known. If the device contains * it will not be taken into account, since the generic device will expand to all of those existing in the system. - <ITEM> <TITLE>WMI Test - 2</TITLE> <IDITEM>2</IDITEM> +<ACTION> +<CONDITION> - <WMI> <CLASS>Win32_BIOS</CLASS> <ELEMENT>Phoenix FirstBIOS(tm) Notebook Pro Version 2.0</ELEMENT> <ATTRIBUTE>BIOSVersion</ATTRIBUTE> </WMI> </ACTION> </ITEM> - <ITEM> <TITLE>Version</TITLE> +<ACTION> </ITEM> Actions for the calculation of values in the terminal (ACTIONS) The following actions have been defined for the calculation of the values (both hardware and software or configuration) of the terminal. WMI REGISTRY CONST: Specifies a constant string to be printed in the inventory. It mainly serves to complete, through composition, the values returned by a WMI or REGISTRY-type action. CONVERT: Allows the system to perform conversions between values returned by other actions (BYTE<->KILOBYTE<->MEGABYTE <->GIGABYTE) COMPOSE: Allows the user to combine the results of a list of actions-

63 63 Below, the syntaxes of each of these actions are presented, in detail. WMI The WMI action is indicated between the <WMI> and </WMI> labels, and the attributes it uses are: <CLASS>: WMI class over which the query will be made. <ELEMENT>: Entry of the WMI-class table (there can be tables with several entries, for example, the hardware or system dlls) <ATTRIBUTE>: Column from which the value to be returned will be obtained. - <ACTION> - <WMI> <CLASS>Win32_BIOS</CLASS> <ELEMENT>Phoenix FirstBIOS(tm) Notebook Pro Version 2.0</ELEMENT> <ATTRIBUTE>BIOSVersion</ATTRIBUTE> </WMI> </ACTION> The name of the value is in the property <TITLE> of the ITEM. If it is the action of an ITEM from a DEVICE to be expanded, it is not necessary to indicate the class, since all items will use the class indicated in the DEVICE. The element over which the query is made does not need to be indicated either, since it is an expanded element (For example, Cache Memory Cache L1, Cache L2, Cache L3) - <WMI> <ATTRIBUTE>TotalVisibleMemorySize</ATTRIBUTE> </WMI> REGISTRY - <REGISTRY> <HIVE>HKEY_LOCAL_MACHINE</HIVE> <KEY>HARDWARE\Description\System</KEY> <ENTRY>Identifier</ENTRY> </REGISTRY> - <REGISTRY> <HIVE>HKEY_LOCAL_MACHINE</HIVE> <KEY>HARDWARE\Description\System</KEY> <ENTRY>Identifier</ENTRY> </REGISTRY> If you wish to take out the value of an entry for all of the sub-keys of a key, it must be indicated in the TITLE of the ITEM.

64 64 For example: If you want to obtain a list of applications, it must be indicated in the TITLE of the ITEM * - <ITEM> <TITLE>*</TITLE> - <ACTION> - <REGISTRY> <HIVE>HKEY_LOCAL_MACHINE</HIVE> <KEY>Software\Microsoft\Windows\CurrentVersion\Uninstall </KEY> <ENTRY>DisplayName</ENTRY> </REGISTRY> </ACTION> </ITEM> CONST <CONST>constant string</const> CONVERT The entry unit, the exit unit and an action that will generate the value to be converted must be indicated. -<CONVERT> <IN>BYTE</IN> <OUT>KILOBYTE</OUT> -<ACTION> <CONST>4096</CONST> </ACTION> </CONVERT> --- It can be any action It can be converted between: BYTE, KILOBYTE, MEGABYTE and GIGABYTE. COMPOSE The size (<SIZE>) of the list (number of actions) must be indicated, and below, the actions: - <COMPOSE> <SIZE>7</SIZE> <CONST>This</CONST> <CONST>is</CONST> <CONST>a</CONST> <CONST>test</CONST> <CONST>regarding</CONST> <CONST>multiple</CONST>

65 65 <CONST>composition</CONST> </COMPOSE> - <COMPOSE> <SIZE>2</SIZE> - <WMI> <CLASS>Win32_ComputerSystem</CLASS> <ELEMENT>IMASD-PORTATIL</ELEMENT> <ATTRIBUTE>TotalPhysicalMemory</ATTRIBUTE> </WMI> <CONST>Bytes</CONST> </COMPOSE> - <COMPOSE> <SIZE>2</SIZE> - <CONVERT> <IN>BYTE</IN> <OUT>MEGABYTE</OUT> - <ACTION> - <WMI> <ATTRIBUTE>FreePhysicalMemory</ATTRIBUTE> </WMI> </ACTION> </CONVERT> <CONST>Megabytes</CONST> </COMPOSE> Expansion of * multiple entries With the aim of making inventory taking flexible, the previous specification is modified so that each level can expand from an action. This was already being made for devices and items. It is generalised here, extending to all levels. This generalisation will have the following form: <element><title>*</title><action>ć</action> Where the element can be a <device>, <group> or <item>, and the list to which they expand is calculated through the assessment of the action, replacing the value of the title with the result of the action. In previous points, it was seen that the information of the action of an element passed to the elements that were below it in the hierarchy. The WMI class used in the title for the elements below it in the hierarchy was transmitted. This also generalises the data, so that not only the WMI class is transmitted, but also the conveyance of registry to all lower levels.

66 66 Summing up: Any element can be expanded with any action (usually, this only happens for WMI and registry actions). The WMI class and registry key are transferred to lower levels. 4. Unattended installations In order to perform an unattended installation through WinRaR, it is necessary to create the file, deploy.bat, and have the folder where the executable file for the program you want to install is located. 1. deploy.bat This file is edited to introduce the instructions for creating the unattended installation. Name_folder_executable\executable.exe <unattended installation parameters > An example would be: MicrosoftNETFrameworkv20\install.exe /q 2. Creating the installation The deploy.bat file must be selected, and the folder where the executable is located must be right-clicked. When the option Add to archive is marked, the window in Figure 46 is shown. Figure 46. Select Add to archive from the drop down menu In the window in Figure 47, the Create SFX archive option must be marked in order to create an executable file.

67 67 Figure 47. Configuration of unattended installation parameters Then you click on the Advanced tab in the window that displays the SFX options. When clicking such button, the Advanced options for the SFX (Figure 48) will be shown. Figure 48. General tab for Advanced SFX options In the Path to extract, the path where the installation files are located will be temporarily extracted. In the Setup Program, you must choose if you want to execute a file before (Run before extraction) or after (Run after extraction) extraction. In this case, the name of the file, deploy.bat, must be introduced in the Run after extraction file. Then, you must click the Modes tab and select the option, Hide all, so that it does not show the installation window, and Overwrite all files, so that it overwrites all of the files, if they are already stored in the folders where the files will be extracted.figure 49)

68 68 Figure 49. Modes of the advanced SFX options tab

Appendix. IriScene Remote Manager Version 4.8 FRACTALIA Software

Appendix. IriScene Remote Manager Version 4.8 FRACTALIA Software Appendix IriScene Remote Manager Version 4.8 FRACTALIA Software 2 1. SYNCHRONIZER WITH ACTIVE DIRECTORY (AD)...3 1. SyncAD2IRM.exe.config...3 2. Installation...4 2. REPEATERS...5 1. Normal...5 3. CONFIGURATION

More information

IriScene Remote Manager. Version 4.8 FRACTALIA Software

IriScene Remote Manager. Version 4.8 FRACTALIA Software IriScene Remote Manager Version 4.8 FRACTALIA Software 2 A. INTRODUCTION...3 B. WORKING DESCRIPTION...3 C. PLATFORM MANUAL...3 1. ACCESS TO THE PLATFORM...3 2. AUTHENTICATION MODES...5 3. AUTHENTICATION

More information

Fractalia Manager. Version 5.0 FRACTALIA Software

Fractalia Manager. Version 5.0 FRACTALIA Software Fractalia Manager Version 5.0 FRACTALIA Software 2 A. INTRODUCTION... 3 B. WORKING DESCRIPTION... 3 C. PLATFORM MANUAL... 3 1. ACCESS TO THE PLATFORM... 3 2. AUTHENTICATION MODES... 6 3. AUTHENTICATION

More information

There are numerous ways to access monitors:

There are numerous ways to access monitors: Remote Monitors REMOTE MONITORS... 1 Overview... 1 Accessing Monitors... 1 Creating Monitors... 2 Monitor Wizard Options... 11 Editing the Monitor Configuration... 14 Status... 15 Location... 17 Alerting...

More information

Table of Contents. CHAPTER 1 About This Guide... 9. CHAPTER 2 Introduction... 11. CHAPTER 3 Database Backup and Restoration... 15

Table of Contents. CHAPTER 1 About This Guide... 9. CHAPTER 2 Introduction... 11. CHAPTER 3 Database Backup and Restoration... 15 Table of Contents CHAPTER 1 About This Guide......................... 9 The Installation Guides....................................... 10 CHAPTER 2 Introduction............................ 11 Required

More information

4cast Client Specification and Installation

4cast Client Specification and Installation 4cast Client Specification and Installation Version 2015.00 10 November 2014 Innovative Solutions for Education Management www.drakelane.co.uk System requirements The client requires Administrative rights

More information

WhatsUp Gold v16.1 Installation and Configuration Guide

WhatsUp Gold v16.1 Installation and Configuration Guide WhatsUp Gold v16.1 Installation and Configuration Guide Contents Installing and Configuring Ipswitch WhatsUp Gold v16.1 using WhatsUp Setup Installing WhatsUp Gold using WhatsUp Setup... 1 Security guidelines

More information

Active Directory Management. Agent Deployment Guide

Active Directory Management. Agent Deployment Guide Active Directory Management Agent Deployment Guide Document Revision Date: April 26, 2013 Active Directory Management Deployment Guide i Contents System Requirements... 1 Hardware Requirements... 2 Agent

More information

Legal Notes. Regarding Trademarks. 2012 KYOCERA Document Solutions Inc.

Legal Notes. Regarding Trademarks. 2012 KYOCERA Document Solutions Inc. Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held liable for any problems arising from

More information

HP IMC Firewall Manager

HP IMC Firewall Manager HP IMC Firewall Manager Configuration Guide Part number: 5998-2267 Document version: 6PW102-20120420 Legal and notice information Copyright 2012 Hewlett-Packard Development Company, L.P. No part of this

More information

STATISTICA VERSION 9 STATISTICA ENTERPRISE INSTALLATION INSTRUCTIONS FOR USE WITH TERMINAL SERVER

STATISTICA VERSION 9 STATISTICA ENTERPRISE INSTALLATION INSTRUCTIONS FOR USE WITH TERMINAL SERVER Notes: STATISTICA VERSION 9 STATISTICA ENTERPRISE INSTALLATION INSTRUCTIONS FOR USE WITH TERMINAL SERVER 1. These instructions focus on installation on Windows Terminal Server (WTS), but are applicable

More information

WhatsUp Gold v16.3 Installation and Configuration Guide

WhatsUp Gold v16.3 Installation and Configuration Guide WhatsUp Gold v16.3 Installation and Configuration Guide Contents Installing and Configuring WhatsUp Gold using WhatsUp Setup Installation Overview... 1 Overview... 1 Security considerations... 2 Standard

More information

Portions of this product were created using LEADTOOLS 1991-2009 LEAD Technologies, Inc. ALL RIGHTS RESERVED.

Portions of this product were created using LEADTOOLS 1991-2009 LEAD Technologies, Inc. ALL RIGHTS RESERVED. Installation Guide Lenel OnGuard 2009 Installation Guide, product version 6.3. This guide is item number DOC-110, revision 1.038, May 2009 Copyright 1992-2009 Lenel Systems International, Inc. Information

More information

Lenovo Online Data Backup User Guide Version 1.8.14

Lenovo Online Data Backup User Guide Version 1.8.14 Lenovo Online Data Backup User Guide Version 1.8.14 Contents Chapter 1: Installing Lenovo Online Data Backup...5 Downloading the Lenovo Online Data Backup Client...5 Installing the Lenovo Online Data

More information

Aradial Installation Guide

Aradial Installation Guide Aradial Technologies Ltd. Information in this document is subject to change without notice. Companies, names, and data used in examples herein are fictitious unless otherwise noted. No part of this document

More information

for Networks Installation Guide for the application on the server July 2014 (GUIDE 2) Lucid Rapid Version 6.05-N and later

for Networks Installation Guide for the application on the server July 2014 (GUIDE 2) Lucid Rapid Version 6.05-N and later for Networks Installation Guide for the application on the server July 2014 (GUIDE 2) Lucid Rapid Version 6.05-N and later Copyright 2014, Lucid Innovations Limited. All Rights Reserved Lucid Research

More information

WebSpy Vantage Ultimate 2.2 Web Module Administrators Guide

WebSpy Vantage Ultimate 2.2 Web Module Administrators Guide WebSpy Vantage Ultimate 2.2 Web Module Administrators Guide This document is intended to help you get started using WebSpy Vantage Ultimate and the Web Module. For more detailed information, please see

More information

WhatsUp Gold v16.2 Installation and Configuration Guide

WhatsUp Gold v16.2 Installation and Configuration Guide WhatsUp Gold v16.2 Installation and Configuration Guide Contents Installing and Configuring Ipswitch WhatsUp Gold v16.2 using WhatsUp Setup Installing WhatsUp Gold using WhatsUp Setup... 1 Security guidelines

More information

PowerMapper/SortSite Desktop Deployment Guide v2.11. 1. Introduction

PowerMapper/SortSite Desktop Deployment Guide v2.11. 1. Introduction PowerMapper/SortSite Desktop Deployment Guide v2.11 1. Introduction... 1 2. Architecture... 2 3. Independent Certification... 2 4. Setup.exe Command Line... 2 5. Registry Settings... 3 6. Deployment using

More information

Avalanche Remote Control User Guide. Version 4.1.3

Avalanche Remote Control User Guide. Version 4.1.3 Avalanche Remote Control User Guide Version 4.1.3 ii Copyright 2012 by Wavelink Corporation. All rights reserved. Wavelink Corporation 10808 South River Front Parkway, Suite 200 South Jordan, Utah 84095

More information

STATISTICA VERSION 12 STATISTICA ENTERPRISE SMALL BUSINESS INSTALLATION INSTRUCTIONS

STATISTICA VERSION 12 STATISTICA ENTERPRISE SMALL BUSINESS INSTALLATION INSTRUCTIONS STATISTICA VERSION 12 STATISTICA ENTERPRISE SMALL BUSINESS INSTALLATION INSTRUCTIONS Notes 1. The installation of STATISTICA Enterprise Small Business entails two parts: a) a server installation, and b)

More information

VMware Mirage Web Manager Guide

VMware Mirage Web Manager Guide Mirage 5.1 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of this document,

More information

RoomWizard Synchronization Software Manual Installation Instructions

RoomWizard Synchronization Software Manual Installation Instructions 2 RoomWizard Synchronization Software Manual Installation Instructions Table of Contents Exchange Server Configuration... 4 RoomWizard Synchronization Software Installation and Configuration... 5 System

More information

Kaseya 2. Installation guide. Version 7.0. English

Kaseya 2. Installation guide. Version 7.0. English Kaseya 2 Kaseya Server Setup Installation guide Version 7.0 English September 4, 2014 Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept

More information

DriveLock Quick Start Guide

DriveLock Quick Start Guide Be secure in less than 4 hours CenterTools Software GmbH 2012 Copyright Information in this document, including URL and other Internet Web site references, is subject to change without notice. Unless otherwise

More information

DESLock+ Basic Setup Guide Version 1.20, rev: June 9th 2014

DESLock+ Basic Setup Guide Version 1.20, rev: June 9th 2014 DESLock+ Basic Setup Guide Version 1.20, rev: June 9th 2014 Contents Overview... 2 System requirements:... 2 Before installing... 3 Download and installation... 3 Configure DESLock+ Enterprise Server...

More information

VERITAS Backup Exec TM 10.0 for Windows Servers

VERITAS Backup Exec TM 10.0 for Windows Servers VERITAS Backup Exec TM 10.0 for Windows Servers Quick Installation Guide N134418 July 2004 Disclaimer The information contained in this publication is subject to change without notice. VERITAS Software

More information

User Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream

User Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream User Manual Onsight Management Suite Version 5.1 Another Innovation by Librestream Doc #: 400075-06 May 2012 Information in this document is subject to change without notice. Reproduction in any manner

More information

Bosch ReadykeyPRO Unlimited Installation Guide, product version 6.5. This guide is item number DOC-110-2-029, revision 2.029, May 2012.

Bosch ReadykeyPRO Unlimited Installation Guide, product version 6.5. This guide is item number DOC-110-2-029, revision 2.029, May 2012. Bosch ReadykeyPRO Unlimited Installation Guide, product version 6.5. This guide is item number DOC-110-2-029, revision 2.029, May 2012. Copyright 1995-2012 Lenel Systems International, Inc. Information

More information

026-1010 Rev 7 06-OCT-2011. Site Manager Installation Guide

026-1010 Rev 7 06-OCT-2011. Site Manager Installation Guide 026-1010 Rev 7 06-OCT-2011 Site Manager Installation Guide Retail Solutions 3240 Town Point Drive NW, Suite 100 Kennesaw, GA 30144, USA Phone: 770-425-2724 Fax: 770-425-9319 Table of Contents 1 SERVER

More information

User Guide. Version 3.2. Copyright 2002-2009 Snow Software AB. All rights reserved.

User Guide. Version 3.2. Copyright 2002-2009 Snow Software AB. All rights reserved. Version 3.2 User Guide Copyright 2002-2009 Snow Software AB. All rights reserved. This manual and computer program is protected by copyright law and international treaties. Unauthorized reproduction or

More information

Networking Best Practices Guide. Version 6.5

Networking Best Practices Guide. Version 6.5 Networking Best Practices Guide Version 6.5 Summer 2010 Copyright: 2010, CCH, a Wolters Kluwer business. All rights reserved. Material in this publication may not be reproduced or transmitted in any form

More information

Installation Instruction STATISTICA Enterprise Small Business

Installation Instruction STATISTICA Enterprise Small Business Installation Instruction STATISTICA Enterprise Small Business Notes: ❶ The installation of STATISTICA Enterprise Small Business entails two parts: a) a server installation, and b) workstation installations

More information

GUARD1 PLUS SE Administrator's Manual

GUARD1 PLUS SE Administrator's Manual GUARD1 PLUS SE Administrator's Manual Version 4.4 30700 Bainbridge Road Solon, Ohio 44139 Phone 216-595-0890 Fax 216-595-0991 [email protected] www.guard1.com i 2010 TimeKeeping Systems, Inc. GUARD1 PLUS

More information

Intelligent Power Protector User manual extension for Microsoft Virtual architectures: Hyper-V 6.0 Manager Hyper-V Server (R1&R2)

Intelligent Power Protector User manual extension for Microsoft Virtual architectures: Hyper-V 6.0 Manager Hyper-V Server (R1&R2) Intelligent Power Protector User manual extension for Microsoft Virtual architectures: Hyper-V 6.0 Manager Hyper-V Server (R1&R2) Hyper-V Manager Hyper-V Server R1, R2 Intelligent Power Protector Main

More information

safend a w a v e s y s t e m s c o m p a n y

safend a w a v e s y s t e m s c o m p a n y safend a w a v e s y s t e m s c o m p a n y SAFEND Data Protection Suite Installation Guide Version 3.4.5 Important Notice This guide is delivered subject to the following conditions and restrictions:

More information

STIDistrict Server Replacement

STIDistrict Server Replacement STIDistrict Server Replacement Major Steps Defined This document addresses how to migrate data and applications from an existing STIDistrict (SQL) Server to a new machine. There will be 8 major steps:

More information

Snow Inventory. Installing and Evaluating

Snow Inventory. Installing and Evaluating Snow Inventory Installing and Evaluating Snow Software AB 2002 Table of Contents Introduction...3 1. Evaluate Requirements...3 2. Download Software...3 3. Obtain License Key...4 4. Install Snow Inventory

More information

System Administration Training Guide. S100 Installation and Site Management

System Administration Training Guide. S100 Installation and Site Management System Administration Training Guide S100 Installation and Site Management Table of contents System Requirements for Acumatica ERP 4.2... 5 Learning Objects:... 5 Web Browser... 5 Server Software... 5

More information

Partner. Sage Pastel. Accounting. Installation Guide

Partner. Sage Pastel. Accounting. Installation Guide Sage Pastel Accounting Partner Installation Guide Sage Pastel: +27 11 304 3000 Sage Pastel Intl: +27 11 304 3400 www.pastel.co.za www.sagepastel.com [email protected] [email protected] Sage Pastel Accounting

More information

EXPRESSCLUSTER X for Windows Quick Start Guide for Microsoft SQL Server 2014. Version 1

EXPRESSCLUSTER X for Windows Quick Start Guide for Microsoft SQL Server 2014. Version 1 EXPRESSCLUSTER X for Windows Quick Start Guide for Microsoft SQL Server 2014 Version 1 NEC EXPRESSCLUSTER X 3.x for Windows SQL Server 2014 Quick Start Guide Document Number ECX-MSSQL2014-QSG, Version

More information

Installation Notes for Outpost Network Security (ONS) version 3.2

Installation Notes for Outpost Network Security (ONS) version 3.2 Outpost Network Security Installation Notes version 3.2 Page 1 Installation Notes for Outpost Network Security (ONS) version 3.2 Contents Installation Notes for Outpost Network Security (ONS) version 3.2...

More information

IBM Connections Plug-In for Microsoft Outlook Installation Help

IBM Connections Plug-In for Microsoft Outlook Installation Help IBM Connections Version 5 IBM Connections Plug-In for Microsoft Outlook Installation Help Edition Notice Note: Before using this information and the product it supports, read the information in "Notices."

More information

Bitrix Site Manager ASP.NET. Installation Guide

Bitrix Site Manager ASP.NET. Installation Guide Bitrix Site Manager ASP.NET Installation Guide Contents Introduction... 4 Chapter 1. Checking for IIS Installation... 5 Chapter 2. Using An Archive File to Install Bitrix Site Manager ASP.NET... 7 Preliminary

More information

Ekran System Help File

Ekran System Help File Ekran System Help File Table of Contents About... 9 What s New... 10 System Requirements... 11 Updating Ekran to version 4.1... 13 Program Structure... 14 Getting Started... 15 Deployment Process... 15

More information

Gladinet Cloud Backup V3.0 User Guide

Gladinet Cloud Backup V3.0 User Guide Gladinet Cloud Backup V3.0 User Guide Foreword The Gladinet User Guide gives step-by-step instructions for end users. Revision History Gladinet User Guide Date Description Version 8/20/2010 Draft Gladinet

More information

Kaseya Server Instal ation User Guide June 6, 2008

Kaseya Server Instal ation User Guide June 6, 2008 Kaseya Server Installation User Guide June 6, 2008 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private Sector IT organizations. Kaseya's

More information

SOS SO S O n O lin n e lin e Bac Ba kup cku ck p u USER MANUAL

SOS SO S O n O lin n e lin e Bac Ba kup cku ck p u USER MANUAL SOS Online Backup USER MANUAL HOW TO INSTALL THE SOFTWARE 1. Download the software from the website: http://www.sosonlinebackup.com/download_the_software.htm 2. Click Run to install when promoted, or alternatively,

More information

Table of Contents. OpenDrive Drive 2. Installation 4 Standard Installation Unattended Installation

Table of Contents. OpenDrive Drive 2. Installation 4 Standard Installation Unattended Installation User Guide for OpenDrive Application v1.6.0.4 for MS Windows Platform 20150430 April 2015 Table of Contents Installation 4 Standard Installation Unattended Installation Installation (cont.) 5 Unattended

More information

HP A-IMC Firewall Manager

HP A-IMC Firewall Manager HP A-IMC Firewall Manager Configuration Guide Part number: 5998-2267 Document version: 6PW101-20110805 Legal and notice information Copyright 2011 Hewlett-Packard Development Company, L.P. No part of this

More information

Net Protector Admin Console

Net Protector Admin Console Net Protector Admin Console USER MANUAL www.indiaantivirus.com -1. Introduction Admin Console is a Centralized Anti-Virus Control and Management. It helps the administrators of small and large office networks

More information

Desktop Surveillance Help

Desktop Surveillance Help Desktop Surveillance Help Table of Contents About... 9 What s New... 10 System Requirements... 11 Updating from Desktop Surveillance 2.6 to Desktop Surveillance 3.2... 13 Program Structure... 14 Getting

More information

InventoryControl for use with QuoteWerks Quick Start Guide

InventoryControl for use with QuoteWerks Quick Start Guide InventoryControl for use with QuoteWerks Quick Start Guide Copyright 2013 Wasp Barcode Technologies 1400 10 th St. Plano, TX 75074 All Rights Reserved STATEMENTS IN THIS DOCUMENT REGARDING THIRD PARTY

More information

ilaw Installation Procedure

ilaw Installation Procedure ilaw Installation Procedure This guide will provide a reference for a full installation of ilaw Case Management Software. Contents ilaw Overview How ilaw works Installing ilaw Server on a PC Installing

More information

How To Install An Aneka Cloud On A Windows 7 Computer (For Free)

How To Install An Aneka Cloud On A Windows 7 Computer (For Free) MANJRASOFT PTY LTD Aneka 3.0 Manjrasoft 5/13/2013 This document describes in detail the steps involved in installing and configuring an Aneka Cloud. It covers the prerequisites for the installation, the

More information

Important. Please read this User s Manual carefully to familiarize yourself with safe and effective usage.

Important. Please read this User s Manual carefully to familiarize yourself with safe and effective usage. Important Please read this User s Manual carefully to familiarize yourself with safe and effective usage. About This Manual This manual describes how to install and configure RadiNET Pro Gateway and RadiCS

More information

for Networks Installation Guide for the application on the server August 2014 (GUIDE 2) Lucid Exact Version 1.7-N and later

for Networks Installation Guide for the application on the server August 2014 (GUIDE 2) Lucid Exact Version 1.7-N and later for Networks Installation Guide for the application on the server August 2014 (GUIDE 2) Lucid Exact Version 1.7-N and later Copyright 2014, Lucid Innovations Limited. All Rights Reserved Lucid Research

More information

How To Install Powerpoint 6 On A Windows Server With A Powerpoint 2.5 (Powerpoint) And Powerpoint 3.5.5 On A Microsoft Powerpoint 4.5 Powerpoint (Powerpoints) And A Powerpoints 2

How To Install Powerpoint 6 On A Windows Server With A Powerpoint 2.5 (Powerpoint) And Powerpoint 3.5.5 On A Microsoft Powerpoint 4.5 Powerpoint (Powerpoints) And A Powerpoints 2 DocAve 6 Service Pack 1 Installation Guide Revision C Issued September 2012 1 Table of Contents About the Installation Guide... 4 Submitting Documentation Feedback to AvePoint... 4 Before You Begin...

More information

Installing GFI Network Server Monitor

Installing GFI Network Server Monitor Installing GFI Network Server Monitor System Requirements Machines running GFI Network Server Monitor require: Windows 2000 (SP1 or higher), 2003 or XP Pro operating systems. Windows scripting host 5.5

More information

Education Software Installer 2011

Education Software Installer 2011 Education Software Installer 2011 Windows operating systems System administrator s guide Trademark notice SMART Notebook, SMART Document Camera, SMART Response, SMART Sync, SMART Classroom Suite, Senteo,

More information

owncloud Configuration and Usage Guide

owncloud Configuration and Usage Guide owncloud Configuration and Usage Guide This guide will assist you with configuring and using YSUʼs Cloud Data storage solution (owncloud). The setup instructions will include how to navigate the web interface,

More information

Cloud Services ADM. Agent Deployment Guide

Cloud Services ADM. Agent Deployment Guide Cloud Services ADM Agent Deployment Guide 10/15/2014 CONTENTS System Requirements... 1 Hardware Requirements... 1 Installation... 2 SQL Connection... 4 AD Mgmt Agent... 5 MMC... 7 Service... 8 License

More information

ZENworks 11 Support Pack 4 Full Disk Encryption Agent Reference. May 2016

ZENworks 11 Support Pack 4 Full Disk Encryption Agent Reference. May 2016 ZENworks 11 Support Pack 4 Full Disk Encryption Agent Reference May 2016 Legal Notice For information about legal notices, trademarks, disclaimers, warranties, export and other use restrictions, U.S. Government

More information

Sophos for Microsoft SharePoint startup guide

Sophos for Microsoft SharePoint startup guide Sophos for Microsoft SharePoint startup guide Product version: 2.0 Document date: March 2011 Contents 1 About this guide...3 2 About Sophos for Microsoft SharePoint...3 3 System requirements...3 4 Planning

More information

Team Foundation Server 2012 Installation Guide

Team Foundation Server 2012 Installation Guide Team Foundation Server 2012 Installation Guide Page 1 of 143 Team Foundation Server 2012 Installation Guide Benjamin Day [email protected] v1.0.0 November 15, 2012 Team Foundation Server 2012 Installation

More information

NETASQ SSO Agent Installation and deployment

NETASQ SSO Agent Installation and deployment NETASQ SSO Agent Installation and deployment Document version: 1.3 Reference: naentno_sso_agent Page 1 / 20 Copyright NETASQ 2013 General information 3 Principle 3 Requirements 3 Active Directory user

More information

QIAsymphony Management Console User Manual

QIAsymphony Management Console User Manual April 2012 QIAsymphony Management Console User Manual For use with software version 4.0 Sample & Assay Technologies Trademarks QIAGEN, QIAsymphony, Rotor-Gene (QIAGEN Group). InstallShield (Informer Technologies,

More information

Setup guide. TELUS AD Sync

Setup guide. TELUS AD Sync Setup guide TELUS AD Sync June 2013 TELUS AD Sync User Guide. The AD Sync Tool must be downloaded onto your organization s Domain Controller. Please call TELUS at 1 877 846 4456 to have this feature provisioned

More information

HDA Integration Guide. Help Desk Authority 9.0

HDA Integration Guide. Help Desk Authority 9.0 HDA Integration Guide Help Desk Authority 9.0 2011ScriptLogic Corporation ALL RIGHTS RESERVED. ScriptLogic, the ScriptLogic logo and Point,Click,Done! are trademarks and registered trademarks of ScriptLogic

More information

Sharp Remote Device Manager (SRDM) Server Software Setup Guide

Sharp Remote Device Manager (SRDM) Server Software Setup Guide Sharp Remote Device Manager (SRDM) Server Software Setup Guide This Guide explains how to install the software which is required in order to use Sharp Remote Device Manager (SRDM). SRDM is a web-based

More information

Universal Management Service 2015

Universal Management Service 2015 Universal Management Service 2015 UMS 2015 Help All rights reserved. No parts of this work may be reproduced in any form or by any means - graphic, electronic, or mechanical, including photocopying, recording,

More information

Backup & Disaster Recovery Appliance User Guide

Backup & Disaster Recovery Appliance User Guide Built on the Intel Hybrid Cloud Platform Backup & Disaster Recovery Appliance User Guide Order Number: G68664-001 Rev 1.0 June 22, 2012 Contents Registering the BDR Appliance... 4 Step 1: Register the

More information

Metalogix SharePoint Backup. Advanced Installation Guide. Publication Date: August 24, 2015

Metalogix SharePoint Backup. Advanced Installation Guide. Publication Date: August 24, 2015 Metalogix SharePoint Backup Publication Date: August 24, 2015 All Rights Reserved. This software is protected by copyright law and international treaties. Unauthorized reproduction or distribution of this

More information

ACTIVE DIRECTORY DEPLOYMENT

ACTIVE DIRECTORY DEPLOYMENT ACTIVE DIRECTORY DEPLOYMENT CASAS Technical Support 800.255.1036 2009 Comprehensive Adult Student Assessment Systems. All rights reserved. Version 031809 CONTENTS 1. INTRODUCTION... 1 1.1 LAN PREREQUISITES...

More information

Creating client-server setup with multiple clients

Creating client-server setup with multiple clients Creating client-server setup with multiple clients Coffalyser.Net uses a SQL client server database model to store all project/experiment- related data. The client-server model has one main application

More information

Operating System Installation Guide

Operating System Installation Guide Operating System Installation Guide This guide provides instructions on the following: Installing the Windows Server 2008 operating systems on page 1 Installing the Windows Small Business Server 2011 operating

More information

Hillstone StoneOS User Manual Hillstone Unified Intelligence Firewall Installation Manual

Hillstone StoneOS User Manual Hillstone Unified Intelligence Firewall Installation Manual Hillstone StoneOS User Manual Hillstone Unified Intelligence Firewall Installation Manual www.hillstonenet.com Preface Conventions Content This document follows the conventions below: CLI Tip: provides

More information

Freshservice Discovery Probe User Guide

Freshservice Discovery Probe User Guide Freshservice Discovery Probe User Guide 1. What is Freshservice Discovery Probe? 1.1 What details does Probe fetch? 1.2 How does Probe fetch the information? 2. What are the minimum system requirements

More information

Installing GFI MailSecurity

Installing GFI MailSecurity Installing GFI MailSecurity Introduction This chapter explains how to install and configure GFI MailSecurity. You can install GFI MailSecurity directly on your mail server or you can choose to install

More information

Migrating TimeForce To A New Server

Migrating TimeForce To A New Server Rev. 4/28/14 Migrating TimeForce To A New Server Table of Contents 1. Installation Prerequisites... 2 Required... 2 Recommended... 3 2. Update to a Migration Compatible Version... 3 Determine the Database

More information

Docufide Client Installation Guide for Windows

Docufide Client Installation Guide for Windows Docufide Client Installation Guide for Windows This document describes the installation and operation of the Docufide Client application at the sending school installation site. The intended audience is

More information

RMCS Installation Guide

RMCS Installation Guide RESTRICTED RIGHTS Use, duplication, or disclosure by the Government is subject to restrictions as set forth in subparagraph (C)(1)(ii) of the Rights in Technical Data and Computer Software clause at DFARS

More information

Team Foundation Server 2010, Visual Studio Ultimate 2010, Team Build 2010, & Lab Management Beta 2 Installation Guide

Team Foundation Server 2010, Visual Studio Ultimate 2010, Team Build 2010, & Lab Management Beta 2 Installation Guide Page 1 of 243 Team Foundation Server 2010, Visual Studio Ultimate 2010, Team Build 2010, & Lab Management Beta 2 Installation Guide (This is an alpha version of Benjamin Day Consulting, Inc. s installation

More information

Active Directory Management. Agent Deployment Guide

Active Directory Management. Agent Deployment Guide Active Directory Management Agent Deployment Guide Document Revision Date: June 12, 2014 Active Directory Management Deployment Guide i Contents System Requirements...1 Hardware Requirements...1 Installation...3

More information

Installation and Operation Manual Unite Log Analyser

Installation and Operation Manual Unite Log Analyser Installation and Operation Manual Unite Log Analyser Contents 1 Introduction... 3 1.1 Abbreviations and Glossary... 4 2 Technical Solution... 4 2.1 Requirements... 5 2.1.1 Hardware... 5 2.1.2 Software...

More information

START YOUR INVENTORY WITH SCANFRE

START YOUR INVENTORY WITH SCANFRE START YOUR INVENTORY WITH SCANFRE April 2014 LANDPARK SCANFREE «Quickly estimate your data processing systems before considering their evolution. Landpark Scanfree, solution for your IT asset tracking

More information

UserLock advanced documentation

UserLock advanced documentation UserLock advanced documentation 1. Agent deployment with msi package or with the UserLock deployment module The UserLock deployment module doesn t deploy the msi package. It just transfers the agent file

More information

Thinspace deskcloud. Quick Start Guide

Thinspace deskcloud. Quick Start Guide Thinspace deskcloud Quick Start Guide Version 1.2 Published: SEP-2014 Updated: 16-SEP-2014 2014 Thinspace Technology Ltd. All rights reserved. The information contained in this document represents the

More information

MGC WebCommander Web Server Manager

MGC WebCommander Web Server Manager MGC WebCommander Web Server Manager Installation and Configuration Guide Version 8.0 Copyright 2006 Polycom, Inc. All Rights Reserved Catalog No. DOC2138B Version 8.0 Proprietary and Confidential The information

More information

User Guide. CTERA Agent. August 2011 Version 3.0

User Guide. CTERA Agent. August 2011 Version 3.0 User Guide CTERA Agent August 2011 Version 3.0 Copyright 2009-2011 CTERA Networks Ltd. All rights reserved. No part of this document may be reproduced in any form or by any means without written permission

More information

PIGCHAMP MOBILE. PigCHAMP Knowledge Software. Installation Guide for Mobile Units

PIGCHAMP MOBILE. PigCHAMP Knowledge Software. Installation Guide for Mobile Units PIGCHAMP MOBILE PigCHAMP Knowledge Software Installation Guide for Mobile Units Table of Contents: Important Note:... 4 Chapter 1: PC Setup... 5 A. Install PigCHAMP Mobile Manager on Windows XP...5 B.

More information

Dell UPS Local Node Manager USER'S GUIDE EXTENSION FOR MICROSOFT VIRTUAL ARCHITECTURES Dellups.com

Dell UPS Local Node Manager USER'S GUIDE EXTENSION FOR MICROSOFT VIRTUAL ARCHITECTURES Dellups.com CHAPTER: Introduction Microsoft virtual architecture: Hyper-V 6.0 Manager Hyper-V Server (R1 & R2) Hyper-V Manager Hyper-V Server R1, Dell UPS Local Node Manager R2 Main Operating System: 2008Enterprise

More information

Portions of this product were created using LEADTOOLS 1991-2010 LEAD Technologies, Inc. ALL RIGHTS RESERVED.

Portions of this product were created using LEADTOOLS 1991-2010 LEAD Technologies, Inc. ALL RIGHTS RESERVED. Installation Guide Lenel OnGuard 2010 Installation Guide, product version 6.4. This guide is item number DOC-110, revision 1.045, May 2010 Copyright 1995-2010 Lenel Systems International, Inc. Information

More information

Pearl Echo Installation Checklist

Pearl Echo Installation Checklist Pearl Echo Installation Checklist Use this checklist to enter critical installation and setup information that will be required to install Pearl Echo in your network. For detailed deployment instructions

More information

How To Create An Easybelle History Database On A Microsoft Powerbook 2.5.2 (Windows)

How To Create An Easybelle History Database On A Microsoft Powerbook 2.5.2 (Windows) Introduction EASYLABEL 6 has several new features for saving the history of label formats. This history can include information about when label formats were edited and printed. In order to save this history,

More information

Installation Instruction STATISTICA Enterprise Server

Installation Instruction STATISTICA Enterprise Server Installation Instruction STATISTICA Enterprise Server Notes: ❶ The installation of STATISTICA Enterprise Server entails two parts: a) a server installation, and b) workstation installations on each of

More information

Installing and Using the vnios Trial

Installing and Using the vnios Trial Installing and Using the vnios Trial The vnios Trial is a software package designed for efficient evaluation of the Infoblox vnios appliance platform. Providing the complete suite of DNS, DHCP and IPAM

More information

NETWORK PRINT MONITOR User Guide

NETWORK PRINT MONITOR User Guide NETWORK PRINT MONITOR User Guide Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held liable

More information

Legal Notes. Regarding Trademarks. 2013 KYOCERA Document Solutions Inc.

Legal Notes. Regarding Trademarks. 2013 KYOCERA Document Solutions Inc. Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held liable for any problems arising from

More information

USER GUIDE WEB-BASED SYSTEM CONTROL APPLICATION. www.pesa.com August 2014 Phone: 256.726.9200. Publication: 81-9059-0703-0, Rev. C

USER GUIDE WEB-BASED SYSTEM CONTROL APPLICATION. www.pesa.com August 2014 Phone: 256.726.9200. Publication: 81-9059-0703-0, Rev. C USER GUIDE WEB-BASED SYSTEM CONTROL APPLICATION Publication: 81-9059-0703-0, Rev. C www.pesa.com Phone: 256.726.9200 Thank You for Choosing PESA!! We appreciate your confidence in our products. PESA produces

More information