Files, Folders, and Shares

Size: px
Start display at page:

Download "Files, Folders, and Shares"

Transcription

1 Files, Folders, and Shares One of the core functions of any server is to serve resources such as files and folders. In Windows Server 2008 R2, File Services is one of the key roles you can add. If you plan on sharing files and folders, it s important that you understand not only how to share the data but also how to protect it with permissions including both New Technology File System (NTFS) and share permissions. Although both sets of permissions work independently, they also interact with each other. 1

2 UNDERSTANDING THE FILE SERVICES ROLE The core component of any server is its ability to share files. Sharing resources means that you allow your users to access those resources from the network. No real processing goes into it as far as the server is concerned; it just hands out files and folders as they are. ADDING ROLE SERVICES 2

3 Server Manager includes several consoles that can be used to manage the different server roles including the File Services role. The File Services role includes several additional role services: File Server This is the primary role service required to support the File Services role. It is automatically added when a folder is shared. Distributed File System (DFS) DFS includes both DFS Replication and DFS Namespaces and is covered later. File Server Resource Manager (FSRM) The FSRM provides a rich set of additional tools that can be used to manage the storage of data on the server including configuring quotas, and generating storage reports. The File Services role includes several additional role services: Services for Network File System (NFS) This service enables you to grant access to files from Unix client computers. Windows Search Service The Windows Search Service uses indexing to perform quicker file searches. Windows Server 2003 File Services This includes the Indexing Service for backward compatibility with Windows Server 2003 File Services. 3

4 The File Services role includes several additional role services: BranchCache for Network Files BranchCache can be used in a multiple site environment to allow computers in branch offices to cache commonly downloaded files. BranchCache needs to be enabled on the shared folder. ADDING THE FILE SERVICES ROLE For this lab, take a linked clone of Server 2008, add in an extra hard drive (to be used for file shares) Set up a partition on the Drive using disk manager 4

5 You can add the File Services role by following these steps: Launch Server Manager by selecting Start Administrative Tools Server Manager. Select Roles, and click the Add Roles link. This image cannot currently be displayed. Review the information on the Before You Begin page, and click Next. Select the File Services role, and click Next. 5

6 Review the information on the Introduction to File Services page, and click Next. On the Select Role Services page, select the following role services File Server, File Server Resource Manager, and BranchCache for network files. Click Next. The Configure Storage Usage Monitoring page is used to identify which volumes you want to monitor. The File Server Resource Manager can monitor and generate storage reports on any volumes you choose to monitor. 6

7 Select the volume that you plan on using to share data. Select the second volume and Click Next. The Set Report Options page allows you to specify a location for storage reports. You can either accept the default location or browse to another location. You can also configure the reports to be ed if you have an SMTP server available to send the reports. For now, accept the default location, and click Next. 7

8 Review the information on the Confirmation page, and click Install. After a moment, the file services will be installed. Click Close. At this point, Server Manager includes the File Services role. Open Server Manager if it is not already open, It includes the Share and Storage Management node and several selections under the File Server Resource Manager 8

9 If you expand down to Share and Storage Management, the shared resources will be displayed Admin$ Windows Dir Inter Process Communication (IPC) share A network share on computers running Microsoft Windows. This share is used to facilitate communication between processes and computers, often to exchange authentication data between computers. CREATING SHARES There are several methods of creating shares First we will examine creating shares via server manager Once a share is created, it can be published to Active Directory to make it easy for users to locate the share. 9

10 CREATING SHARES WITH SERVER MANAGER The Share and Storage Management node includes a Provision a Shared Folder Wizard that you can use by following these steps: Launch Server Manager by selecting Start Administrative Tools Server Manager. Browse to the Roles File Services Share and Storage Management node, right click Share and Storage Management, and select Provision Share. 10

11 On the Shared Folder Location page, click Browse. Browse to a folder you want to share. You can create folders also in here Create a folder called Sales Click OK after browsing to and selecting a folder. Click Next. The provision storage button allows you to set up available free unallocated drive space. 11

12 The NTFS Permissions page gives you an opportunity to change the NTFS permissions if desired. Next to accept the NTFS permissions. On the Share Protocols page, you identify the protocols used to access the share and can also give the share a different share name. SMB is the primary protocol used by Windows clients to connect, and when this is selected, it allows both SMB version 1 and SMB version 2 depending on the client s capabilities. If you added NFS support for Unix clients, you could select NFS here. Accept the default of SMB, and click Next. The SMB Settings page allows you to manipulate some of the advanced settings by clicking the Advanced button. The User Limit option is set to Maximum Allowed by default, but you can limit it to a specific number of connections if desired. The Access based Enumeration setting is related to DFS and is disabled if the DFS role service isn t added. Offline Settings affects Offline Folders Click Next. 12

13 On the SMB Permissions page, you have the opportunity to change the default share permissions. By default, the Everyone group is granted Read access to the share. The Quota Policy page allows you to apply quotas to the share. If you wanted to ensure users were limited to no more than 100MB of storage space, you could create a quota policy to enforce the limit. The File Screen Policy page allows you to apply a file screen that can be used to monitor or block specific types of files from being saved on the share. You may want to ensure that users didn t store any audio and video files on the server, you could select the Block Audio and Video Files file screen. Click Next 13

14 If you re using DFS, you can publish an SMB share to a DFS namespace. Review the settings you ve selected, and click Create. After a moment, the wizard will complete the creation of the share and indicate success. Click Close. 14

15 PUBLISHING SHARES IN ACTIVE DIRECTORY The primary reason to publish a share to Active Directory is to allow users to easily find it. To publish a share, you need to be in the Active Directory Users and Computers Management Console. The share needs to have been created previously prior to publishing Right click the organizational unit of choice, and select New Shared Folder. 15

16 From there, you ll be asked to provide a name for this publication of the share and, of course, the actual share name. The share will then appear in ADUC Searching Active Directory If a client is a member of a domain, the Search Active Directory command appears on the Network console. You can launch Network by selecting Start Network on Windows Server 2008 R2. 16

17 MANAGING PERMISSIONS One of the great strengths of both NTFS formatted drives and shares is the ability to assign permissions and control who can access different files and folders. There are many similarities between NTFS and share permissions NTFS PERMISSIONS 17

18 NTFS permissions apply to any file or folder on a disk that has been formatted with NTFS. Read When a user is assigned Read permission, the user is allowed to view the contents, permissions, and attributes associated with a file or folder. Read and Execute The Read and Execute permission is used to grant permission for a user to execute files. If a user has only Read permission, and not Read and Execute, the files can t be executed. List Folder Contents The List Folder Contents permission allows a user to view the contents of a folder. It will allow a user to see that files exist in a folder, but will not apply Read permissions to those files. Write If a user is assigned Write permission to a file or folder, the user can modify the file or folder. This includes adding new files or folders to a folder or making changes to existing files or folders. However, it does not include deleting files from a folder. Modify Modify includes all of the permissions from Read, Read & Execute, and Change, and adds the ability to delete files and folders. Full Control Full Control is a combination of all the available permissions. It adds the ability to change permissions and take ownership of files or folders. SHARE PERMISSIONS Share permissions only apply to shares when they are accessed over the network. There are only three share permissions. Read Users granted Read permission can read files and folders within the share. Change Users granted Change permission can read, execute, modify, and delete files and folders within the share. Full Control Users granted Full Control permission have all the permissions from Change, and can also modify permissions on the share. 18

19 ASSIGNING ALLOW OR DENY If the permission is set to Allow for a user or group, the user or group has this permission. If the permission is set to Deny for a user or group, the user or group will not have the permission. Permissions are cumulative. If a user has multiple Allow permissions assigned (such as allow Read and Allow Change), the user has a combination of the assigned permissions. If both Allow and Deny permissions are assigned for a user, deny takes precedence. If there aren t any permissions assigned to a user, then the user does not have access to the object. This is referred to as an implicit deny. Both share permissions and NTFS permissions use the discretionary access control (DAC) model to control access. Each object has a discretionary access control list (DACL; pronounced as dackel ). The DACL is a list of access control entries (ACEs). Each ACE identifies a user or a group with their associated security identifier (SID) and Allow or Deny permission. 19

20 If multiple permissions apply to a user, the user has the combination of all the permissions. Deny Takes Precedence If both Allow and Deny for any permission are assigned to a user, Deny takes precedence. Implicit Deny If permissions aren t explicitly granted, they are implicitly denied. Anyone who is not given access, but also is not restricted access does not get any access by default, this is implicit deny 20

21 MODIFYING SHARE AND NTFS PERMISSIONS You can modify both the share and NTFS permissions using Server Manager, Computer Management, or Windows Explorer. Launch Server Manager, and browse to Roles File Services Share and Storage Management. 21

22 Right click the share, and select Properties. Click the Permissions tab, and then click the Share Permissions Tab. Choose either Share or NTFS permissions 22

23 Clicking on one of the buttons will open the relevant permissions (share or NTFS) accordingly Combining Share and NTFS Permissions Identifying permissions can be hard, keep it simple with these three steps: Determine the cumulative NTFS permissions. Determine the cumulative share permissions. Determine which of the two provides the least access (commonly called the most restrictive permission). Connecting to Shares Primarily, you connect to a share using the universal naming convention (UNC) of which follows the following syntax: \\ServerName\ShareName. You can also click Start and in the search box enter \\ServerName (using the server name of any server on your network) followed by a backslash, Once the operating system connects, it retrieves a list of shares available. 23

24 Mapping a drive You can map a drive letter to a share on your network. You can right click either Computer or Network from the Start menu and select Map Network Drive You can also right click on the share if you open up the server via its UNC and right click it and choose Map network drive COMMON SHARES C$, D$, and so on All drives, including CD ROM drives, are given a hidden share to the root of the drive. This share is what is called an administrative share. You cannot change the permissions or properties of these shares Only the Administrators and Backup Operators groups can connect to administrative shares 24

25 ADMIN$ The ADMIN$ share is another administrative share and it maps to the location of the operating system. PRINT$ Whenever you create a shared printer, the system places the drivers in this share. This allows the drivers to be easily downloaded when clients connect to the shared printer. IPC$ The IPC$ share is probably one of the most widely used shares in interserver communications though you will rarely interact with it directly. When you try to access shared resources on other computers (to read event logs, for example), the system uses named pipes. A named pipe is a piece of memory that handles a communication channel between two processes, whether local or remote, IPC$ is used by the named pipes. 25

26 NETLOGON The NETLOGON share is used in conjunction with processing logon requests from users. Once users successfully log in, they are given any profile and script information that they are required to run. SYSVOL The SYSVOL share is used to house Group Policy information and scripts that are accessed by clients on the network. You will always see SYSVOL shares on domain controllers, but they can be replicated to member servers. QUOTAS 26

27 Quotas allow you to monitor and limit the space users can consume on a volume or folder. When creating quotas, you have the ability to set warning limits, set enforcement limits, provide notification of reached limits via or event log entries, and even execute commands in response to any limit. You can use the quota policy to just monitor the usage. To manage Disk Quotas, you use File Services Resource Manager (FSRM), this is available via server manager roles, if you did not install it you can install it from Server manager Microsoft have included several quota templates in File Services Resource Manager (FSRM) that you can easily be applied as is, or you can modify them to fit your needs. You can even create your own templates. 27

28 Quota Types There are two types of quota hard or soft. A hard quota limit will enforce the limit and prevent users from exceeding the limit. A soft quota limit is just used for monitoring; it will provide notification but does not enforce the limit. To view Existing Quotas click Quotas under Quota Management Any existing quotas will be shown Creating a Quota from a template Launch Server Manager, and browse to the Roles File Services Share and Storage Management File Services Resource Manager Quota Management Quota Templates node. 28

29 Right click the 200 MB Limit Reports to User quota template, and select Create Quota from Template. Enter the path or click browse and browse to the folder you want to monitor in the Quota Path text box. View the properties 29

30 Click Create. The Quota will be created Modifying the Quota Select Quotas. Right click your new quota, and select Edit Quota Properties. The edit quota properties page appears 30

31 Select Quotas (right above Quota Templates in the Server Manager navigation tree). Right click your new quota, and select Edit Quota Properties. Change the Space Limit from 200MB to 500MB. Select the Warning (100%) notification threshold, and select Edit. 31

32 Review the information on the E mail Message, Event Log, and Command tabs. You may get a warning message indicating that an SMTP server is not configured Notice that you can modify the data on any of these tabs. The Tab The E mail Message tab allows you to configure an response if the threshold is reached. If you want an sent to an administrator, simply add the administrator s address on this page in the format of account@domain, admins@tombrett.local You can also configure it to send an to the user who exceeded the threshold simply by selecting a box. The templates include a preconfigured subject line and message body, and both can include variables (Source I/O Owner, Quota Path, Server etc.) When you can select any of these variables you can see a short explanation of what it is. 32

33 Event Log Tab You can configure the events to be logged in the Application log if desired. Selecting the Event Log tab and selecting the box to send the warning to the event log. Any events sent from here are logged into the Application log. Command Tab The command tab allows you to run a command or script when the limit is exceeded Report Tab You can configure reports to be generated in response to a threshold and automatically be sent via to administrators and/or the user. Reports can also be created on demand. 33

34 The reports are already configured. The Generate Reports check box is checked, and three reports are configured to be generated: Duplicate Files, Large Files, and Least Recently Accessed Files. Additionally, it s configured to send the report to the user exceeding the threshold. CREATING FILE SCREEN POLICIES File screens are used to filter or screen files to ensure certain types of files aren t stored on a server. You can create a file screen that will block users from saving specific types of files and generate notifications when anyone attempts to save these blocked files on the server. File screens can be created on entire volumes or specific folders, File screens also have templates. 34

35 Launch Server Manager, and browse to the File Screen Templates node. Right click the Block E mail Files template, and select Create File Screen from Template. Enter the volume name that you want to screen (such as C:\sales) in the File Screen Path text box. Click Create. 35

36 Select File Screens (right above File Screen Templates). Right click the new file screen you just created, and select Edit File Screen Properties. you can select either Active Screening or Passive Screening. Since you want to specifically block users from storing the files on the server, leave it as Active Screening. Click through the Message, Event Log, Command, and Report tabs. If a warning appears indicating that an SMTP server is not configured, review the information, and click Yes to continue. These are very similar to the tabs used with quotes. Only the notification content is changed. Click OK once you ve reviewed the tabs. 36

37 GENERATING REPORTS Several different reports are available. You can generate reports as part of any quota policy or file screen policy. You can also configure reports to be generated on a schedule or generate them on demand. The different reports available are Duplicate Files, File Screening Audit, Files by File Group, Files by Owner, Files by Property, Large Files, Least Recently Accessed Files, Most Recently Accessed Files, and Quota Usage. You can also save the reports in several different formats such as DHTML, HTML, XML, CSV, and text. 37

38 ACCESSING REPORTS Launch Server Manager. Right click the Storage Reports Management node within the File Server Resource Manager, and select Generate Reports Now. Click the Add button. 38

39 Browse to a drive or a folder, and click OK. You can add multiple drives and folders. You can select as many reports as you d like to view, if you select them all, be patient; they take some time to generate. Some of the reports have additional parameters that you can modify. if you select the Quota Usage report, you can click the Edit Parameters button and modify the minimum quota usage that will be included in the report. Click the Delivery tab. Notice you can add an address and send the reports via . Click OK. 39

40 Depending on the amount of data in the reports, this could take several minutes to complete. The relevant reports are created You can also schedule reports to run 40

41 The schedule tab appears Click Create schedule The Task Scheduler opens where you can schedule a new task by clicking new 41

42 BITLOCKER BitLocker Drive Encryption is a technology designed to provide protection for entire disk drives. BitLocker To Go is a newer technology that came out with Windows 7 and 2008 server and is designed to allow you to encrypt USB flash drives. Requirements A TPM 1.2 compatible chip Computers which don t have TPM 1.2. There are alternatives that can be used to encrypt drives with BitLocker: Password BitLocker can encrypt the drive, and a password can be used to unlock it. Smart Card BitLocker can encrypt the drive, and a smart card with a PIN can be used to unlock the drive. 42

43 Recovery Key Once TPM detects that it has been moved (or the hardware has been changed), it will lock the drive until the recovery key is used to unlock it. Enabling BitLocker Launch Server Manager. Select Features, and click Add Features. Select the BitLocker Drive Encryption check box Click Install. When prompted, restart your computer to complete the installation. After the reboot, log on. When the installation completes, click Close. Launch the Control Panel, and click System and Security. 43

SHARING FILE SYSTEM RESOURCES

SHARING FILE SYSTEM RESOURCES 1 Chapter 9 SHARING FILE SYSTEM RESOURCES Chapter 9: SHARING FILE SYSTEM RESOURCES 2 CHAPTER OVERVIEW Create and manage file system shares and work with share permissions Use NTFS file system permissions

More information

Group Policy 21/05/2013

Group Policy 21/05/2013 Group Policy Group Policy is not a new technology for Active Directory, but it has grown and improved with every iteration of the operating system and service pack since it was first introduced in Windows

More information

Encrypting with BitLocker for disk volumes under Windows 7

Encrypting with BitLocker for disk volumes under Windows 7 Encrypting with BitLocker for disk volumes under Windows 7 Summary of the contents 1 Introduction 2 Hardware requirements for BitLocker Driver Encryption 3 Encrypting drive 3.1 Operating System Drive 3.1.1

More information

How To Manage Hard Disk Partitioning In Windows 8.1.2 (Windows 8) (Windows 7) (Powerbook) (For Windows 8) And Windows 8 (Pro) (Winstone) (Probation) (Perl

How To Manage Hard Disk Partitioning In Windows 8.1.2 (Windows 8) (Windows 7) (Powerbook) (For Windows 8) And Windows 8 (Pro) (Winstone) (Probation) (Perl Exam : 70-688 Title : Managing and Maintaining Windows 8 Version : Demo 1 / 19 1.DRAG DROP Your company recently purchased 25 new laptops. All 25 laptops have the same hardware configuration and do not

More information

Creating and Managing Shared Folders

Creating and Managing Shared Folders Creating and Managing Shared Folders Microsoft threw all sorts of new services, features, and functions into Windows 2000 Server, but at the heart of it all was still the requirement to be a good file

More information

9 Administering Shared Folders

9 Administering Shared Folders 9 Administering Shared Folders Exam Objectives in this Chapter: Manage and troubleshoot access to shared folders. Create and remove shared folders. Why This Chapter Matters Control access to shared folders

More information

Microsoft Virtual Labs. Windows Server 2003 R2: Efficient Storage Management

Microsoft Virtual Labs. Windows Server 2003 R2: Efficient Storage Management Microsoft Virtual Labs Windows Server 2003 R2: Efficient Storage Management Table of Contents Windows Server 2003 R2: Efficient Storage Management... 1 Exercise 1 Using the Storage Manager for SANs Snap-in

More information

DIGILIANT Windows Storage Server 2012

DIGILIANT Windows Storage Server 2012 DIGILIANT Windows Storage Server 2012 User s Guide Copyright 2012 Digiliant, LLC. All Rights Reserved. This User s Guide is provided AS IS and Digiliant, LLC makes no warranty as to its accuracies or use.

More information

Objectives. At the end of this chapter students should be able to:

Objectives. At the end of this chapter students should be able to: NTFS PERMISSIONS AND SECURITY SETTING.1 Introduction to NTFS Permissions.1.1 File Permissions and Folder Permission.2 Assigning NTFS Permissions and Special Permission.2.1 Planning NTFS Permissions.2.2

More information

STATISTICA VERSION 10 STATISTICA ENTERPRISE SERVER INSTALLATION INSTRUCTIONS

STATISTICA VERSION 10 STATISTICA ENTERPRISE SERVER INSTALLATION INSTRUCTIONS Notes: STATISTICA VERSION 10 STATISTICA ENTERPRISE SERVER INSTALLATION INSTRUCTIONS 1. The installation of the STATISTICA Enterprise Server entails two parts: a) a server installation, and b) workstation

More information

Lesson Plans Microsoft s Managing and Maintaining a Microsoft Windows Server 2003 Environment

Lesson Plans Microsoft s Managing and Maintaining a Microsoft Windows Server 2003 Environment Lesson Plans Microsoft s Managing and Maintaining a Microsoft Windows Server 2003 Environment (Exam 70-290) Table of Contents Table of Contents... 1 Course Overview... 2 Section 0-1: Introduction... 4

More information

DriveLock Quick Start Guide

DriveLock Quick Start Guide Be secure in less than 4 hours CenterTools Software GmbH 2012 Copyright Information in this document, including URL and other Internet Web site references, is subject to change without notice. Unless otherwise

More information

Module 12. Configuring and Managing Storage Technologies. Contents:

Module 12. Configuring and Managing Storage Technologies. Contents: Configuring and Managing Storage Technologies 12-1 Module 12 Configuring and Managing Storage Technologies Contents: Lesson 1: Overview of Windows Server 2008 Storage Management 12-3 Lesson 2: Managing

More information

In order to enable BitLocker, your hard drive must be partitioned in a particular manner.

In order to enable BitLocker, your hard drive must be partitioned in a particular manner. ENABLE BITLOCKER ON WINDOWS VISTA - WITHOUT A TPM Requirements: You must be running Vista Enterprise or Vista Ultimate to enable BitLocker. Any other version of Vista is not compatible. It is recommended

More information

Windows Clients and GoPrint Print Queues

Windows Clients and GoPrint Print Queues Windows Clients and GoPrint Print Queues Overview The following tasks demonstrate how to configure shared network printers on Windows client machines in a Windows Active Directory Domain and Workgroup

More information

Virtual CD v10. Network Management Server Manual. H+H Software GmbH

Virtual CD v10. Network Management Server Manual. H+H Software GmbH Virtual CD v10 Network Management Server Manual H+H Software GmbH Table of Contents Table of Contents Introduction 1 Legal Notices... 2 What Virtual CD NMS can do for you... 3 New Features in Virtual

More information

Acronis Backup & Recovery 11

Acronis Backup & Recovery 11 Acronis Backup & Recovery 11 Quick Start Guide Applies to the following editions: Advanced Server Virtual Edition Advanced Server SBS Edition Advanced Workstation Server for Linux Server for Windows Workstation

More information

2. Using Notepad, create a file called c:\demote.txt containing the following information:

2. Using Notepad, create a file called c:\demote.txt containing the following information: Unit 4 Additional Projects Configuring the Local Computer Policy You need to prepare your test lab for your upcoming experiments. First, remove a child domain that you have configured. Then, configure

More information

Exclaimer Signature Manager 2.0 User Manual

Exclaimer Signature Manager 2.0 User Manual Exclaimer Exclaimer UK +44 (0) 1252 531 422 USA 1-888-450-9631 info@exclaimer.com Contents GETTING STARTED... 10 Signature Manager Overview... 11 How does it Work?... 11 But That's Not All...... 12 And

More information

Symantec Backup Exec 12.5 for Windows Servers. Quick Installation Guide

Symantec Backup Exec 12.5 for Windows Servers. Quick Installation Guide Symantec Backup Exec 12.5 for Windows Servers Quick Installation Guide 13897290 Installing Backup Exec This document includes the following topics: System requirements Before you install About the Backup

More information

Installing Windows Server Update Services (WSUS) on Windows Server 2012 R2 Essentials

Installing Windows Server Update Services (WSUS) on Windows Server 2012 R2 Essentials Installing Windows Server Update Services (WSUS) on Windows Server 2012 R2 Essentials With Windows Server 2012 R2 Essentials in your business, it is important to centrally manage your workstations to ensure

More information

Symantec Backup Exec TM 11d for Windows Servers. Quick Installation Guide

Symantec Backup Exec TM 11d for Windows Servers. Quick Installation Guide Symantec Backup Exec TM 11d for Windows Servers Quick Installation Guide September 2006 Symantec Legal Notice Copyright 2006 Symantec Corporation. All rights reserved. Symantec, Backup Exec, and the Symantec

More information

Hyper-V Protection. User guide

Hyper-V Protection. User guide Hyper-V Protection User guide Contents 1. Hyper-V overview... 2 Documentation... 2 Licensing... 2 Hyper-V requirements... 2 2. Hyper-V protection features... 3 Windows 2012 / 2012 R2 Hyper-V support...

More information

Installing the Microsoft Network Driver Interface

Installing the Microsoft Network Driver Interface Installing the Microsoft Network Driver Interface Overview This guide explains how to install the PictureTel Live200 Microsoft Network Driver Interface (NDIS) software you have downloaded from PictureTel's

More information

VERITAS Backup Exec 9.1 for Windows Servers Quick Installation Guide

VERITAS Backup Exec 9.1 for Windows Servers Quick Installation Guide VERITAS Backup Exec 9.1 for Windows Servers Quick Installation Guide N109548 Disclaimer The information contained in this publication is subject to change without notice. VERITAS Software Corporation makes

More information

ScriptLogic Enterprise Security Reporter. VERSION 3 Installation Guide

ScriptLogic Enterprise Security Reporter. VERSION 3 Installation Guide ScriptLogic Enterprise Security Reporter VERSION 3 Installation Guide ENTERPRISE SECURITY REPORTER 3 INSTALLATION GUIDE II Copyright 2011 by ScriptLogic Corporation All rights reserved. This publication

More information

How to Encrypt your Windows 7 SDS Machine with Bitlocker

How to Encrypt your Windows 7 SDS Machine with Bitlocker How to Encrypt your Windows 7 SDS Machine with Bitlocker ************************************ IMPORTANT ******************************************* Before encrypting your SDS Windows 7 Machine it is highly

More information

WebSpy Vantage Ultimate 2.2 Web Module Administrators Guide

WebSpy Vantage Ultimate 2.2 Web Module Administrators Guide WebSpy Vantage Ultimate 2.2 Web Module Administrators Guide This document is intended to help you get started using WebSpy Vantage Ultimate and the Web Module. For more detailed information, please see

More information

StarWind iscsi SAN Software: Using StarWind with MS Cluster on Windows Server 2003

StarWind iscsi SAN Software: Using StarWind with MS Cluster on Windows Server 2003 StarWind iscsi SAN Software: Using StarWind with MS Cluster on Windows Server 2003 www.starwindsoftware.com Copyright 2008-2011. All rights reserved. COPYRIGHT Copyright 2008-2011. All rights reserved.

More information

VERITAS Backup Exec TM 10.0 for Windows Servers

VERITAS Backup Exec TM 10.0 for Windows Servers VERITAS Backup Exec TM 10.0 for Windows Servers Quick Installation Guide N134418 July 2004 Disclaimer The information contained in this publication is subject to change without notice. VERITAS Software

More information

ATX Document Manager. User Guide

ATX Document Manager. User Guide ATX Document Manager User Guide ATX DOCUMENT MANAGER User Guide 2010 CCH Small Firm Services. All rights reserved. 6 Mathis Drive NW Rome, GA 30165 No part of this manuscript may be copied, photocopied,

More information

Installation Instruction STATISTICA Enterprise Server

Installation Instruction STATISTICA Enterprise Server Installation Instruction STATISTICA Enterprise Server Notes: ❶ The installation of STATISTICA Enterprise Server entails two parts: a) a server installation, and b) workstation installations on each of

More information

Exclaimer Signature Manager 2.0 User Manual

Exclaimer Signature Manager 2.0 User Manual Exclaimer Exclaimer UK +44 (0) 1252 531 422 USA 1-888-450-9631 info@exclaimer.com Contents GETTING STARTED... 10 Signature Manager Overview... 11 How Does it Work?... 11 But That's Not All...... 12 And

More information

QUANTIFY INSTALLATION GUIDE

QUANTIFY INSTALLATION GUIDE QUANTIFY INSTALLATION GUIDE Thank you for putting your trust in Avontus! This guide reviews the process of installing Quantify software. For Quantify system requirement information, please refer to the

More information

EMBASSY Remote Administration Server (ERAS) BitLocker Deployment Guide

EMBASSY Remote Administration Server (ERAS) BitLocker Deployment Guide EMBASSY Remote Administration Server (ERAS) BitLocker Deployment Guide BitLocker Deployment Guide Document Version 0.0.0.5 http://www.wave.com ERAS v 2.8 Wave Systems Corp. 2010 Contents Contents... 2

More information

User Profile Manager 2.6

User Profile Manager 2.6 User Profile Manager 2.6 User Guide ForensiT Limited, Innovation Centre Medway, Maidstone Road, Chatham, Kent, ME5 9FD England. Tel: US 1-877-224-1721 (Toll Free) Intl. +44 (0) 845 838 7122 Fax: +44 (0)

More information

NETWRIX FILE SERVER CHANGE REPORTER

NETWRIX FILE SERVER CHANGE REPORTER NETWRIX FILE SERVER CHANGE REPORTER ADMINISTRATOR S GUIDE Product Version: 3.3 April/2012. Legal Notice The information in this publication is furnished for information use only, and does not constitute

More information

HOW TO SILENTLY INSTALL CLOUD LINK REMOTELY WITHOUT SUPERVISION

HOW TO SILENTLY INSTALL CLOUD LINK REMOTELY WITHOUT SUPERVISION HOW TO SILENTLY INSTALL CLOUD LINK REMOTELY WITHOUT SUPERVISION Version 1.1 / Last updated November 2012 INTRODUCTION The Cloud Link for Windows client software is packaged as an MSI (Microsoft Installer)

More information

Exam 70-411: Administrating Windows Server 2012 R2. Course Overview

Exam 70-411: Administrating Windows Server 2012 R2. Course Overview Exam 70-411: Administrating Windows Server 2012 R2 Course Overview This course teaches students server deployment and image management, managing servers and updates, file and print services, configuring

More information

Basic Windows 2000/ Windows 2000 Server Installation and Configuration

Basic Windows 2000/ Windows 2000 Server Installation and Configuration d229466 Ch01.F 1/22/03 10:03 AM Page 11 CHAPTER 1 Basic Windows 2000/ Windows 2000 Server Installation and Configuration This chapter steps you through the installation process of your Windows-based Tiger

More information

Many home and small office networks exist for no

Many home and small office networks exist for no C H A P T E R Accessing and Sharing Network Resources Many home and small office networks exist for no other reason than to share a broadband Internet connection. The administrators of those networks attach

More information

How To Set Up A Backupassist For An Raspberry Netbook With A Data Host On A Nsync Server On A Usb 2 (Qnap) On A Netbook (Qnet) On An Usb 2 On A Cdnap (

How To Set Up A Backupassist For An Raspberry Netbook With A Data Host On A Nsync Server On A Usb 2 (Qnap) On A Netbook (Qnet) On An Usb 2 On A Cdnap ( WHITEPAPER BackupAssist Version 5.1 www.backupassist.com Cortex I.T. Labs 2001-2008 2 Contents Introduction... 3 Hardware Setup Instructions... 3 QNAP TS-409... 3 Netgear ReadyNas NV+... 5 Drobo rev1...

More information

Sage HRMS 2014 Sage Employee Self Service Tech Installation Guide for Windows 2003, 2008, and 2012. October 2013

Sage HRMS 2014 Sage Employee Self Service Tech Installation Guide for Windows 2003, 2008, and 2012. October 2013 Sage HRMS 2014 Sage Employee Self Service Tech Installation Guide for Windows 2003, 2008, and 2012 October 2013 This is a publication of Sage Software, Inc. Document version: October 17, 2013 Copyright

More information

GFI LANguard 9.0 ReportPack. Manual. By GFI Software Ltd.

GFI LANguard 9.0 ReportPack. Manual. By GFI Software Ltd. GFI LANguard 9.0 ReportPack Manual By GFI Software Ltd. http://www.gfi.com E-mail: info@gfi.com Information in this document is subject to change without notice. Companies, names, and data used in examples

More information

Module 11. Configuring and Managing Distributed File System. Contents:

Module 11. Configuring and Managing Distributed File System. Contents: Configuring and Managing Distributed File System 11-1 Module 11 Configuring and Managing Distributed File System Contents: Lesson 1: DFS Overview 11-3 Lesson 2: Configuring DFS Namespaces 11-15 Lesson

More information

Getting Started With Delegated Administration

Getting Started With Delegated Administration Getting Started With Delegated Administration Delegated Administration (available with Websense v6.1 Corporate Editions) is a powerful tool for distributing filtering and reporting responsibilities for

More information

FaxCore Ev5 Email-To-Fax Setup Guide

FaxCore Ev5 Email-To-Fax Setup Guide 1 FaxCore Ev5 - Email-To-Fax Setup Guide Version 1.0.0 FaxCore Ev5 Email-To-Fax Setup Guide 2 FaxCore Ev5 - Email-To-Fax Setup Guide Contents The Email To Fax Setup Guide... 3 FaxCore Email Integration

More information

Lenovo Online Data Backup User Guide Version 1.8.14

Lenovo Online Data Backup User Guide Version 1.8.14 Lenovo Online Data Backup User Guide Version 1.8.14 Contents Chapter 1: Installing Lenovo Online Data Backup...5 Downloading the Lenovo Online Data Backup Client...5 Installing the Lenovo Online Data

More information

MCSE TestPrep: Windows NT Server 4, Second Edition - 3 - Managing Resources

MCSE TestPrep: Windows NT Server 4, Second Edition - 3 - Managing Resources MCSE TestPrep: Windows NT Server 4, Second Edition - CH 3 - Managing Resources Page 1 of 36 [Figures are not included in this sample chapter] MCSE TestPrep: Windows NT Server 4, Second Edition - 3 - Managing

More information

STATISTICA VERSION 9 STATISTICA ENTERPRISE INSTALLATION INSTRUCTIONS FOR USE WITH TERMINAL SERVER

STATISTICA VERSION 9 STATISTICA ENTERPRISE INSTALLATION INSTRUCTIONS FOR USE WITH TERMINAL SERVER Notes: STATISTICA VERSION 9 STATISTICA ENTERPRISE INSTALLATION INSTRUCTIONS FOR USE WITH TERMINAL SERVER 1. These instructions focus on installation on Windows Terminal Server (WTS), but are applicable

More information

ECA IIS Instructions. January 2005

ECA IIS Instructions. January 2005 ECA IIS Instructions January 2005 THIS PAGE INTENTIONALLY BLANK ECA IIS Instructions ii July 22, 2005 Table of Contents 1. Install Certificate in IIS 5.0... 1 2. Obtain and Install the ECA Root Certificate

More information

Hyper-V Protection. User guide

Hyper-V Protection. User guide Hyper-V Protection User guide Contents 1. Hyper-V overview... 2 Documentation... 2 Licensing... 2 Hyper-V requirements... 2 2. Hyper-V protection features... 3 Windows 2012 R1/R2 Hyper-V support... 3 Custom

More information

NovaBACKUP. Storage Server. NovaStor / May 2011

NovaBACKUP. Storage Server. NovaStor / May 2011 NovaBACKUP Storage Server NovaStor / May 2011 2011 NovaStor, all rights reserved. All trademarks are the property of their respective owners. Features and specifications are subject to change without notice.

More information

Working with Administrative Tools

Working with Administrative Tools This final chapter considers a variety of administrative 12 tools and how to use them. Working with Administrative Tools Using Administrative Tools Once you go though Control Panel (assuming you haven

More information

DESLock+ Basic Setup Guide Version 1.20, rev: June 9th 2014

DESLock+ Basic Setup Guide Version 1.20, rev: June 9th 2014 DESLock+ Basic Setup Guide Version 1.20, rev: June 9th 2014 Contents Overview... 2 System requirements:... 2 Before installing... 3 Download and installation... 3 Configure DESLock+ Enterprise Server...

More information

Appendix B Lab Setup Guide

Appendix B Lab Setup Guide JWCL031_appB_467-475.indd Page 467 5/12/08 11:02:46 PM user-s158 Appendix B Lab Setup Guide The Windows Server 2008 Applications Infrastructure Configuration title of the Microsoft Official Academic Course

More information

How to enable Disk Encryption on a laptop

How to enable Disk Encryption on a laptop How to enable Disk Encryption on a laptop Skills and pre-requisites Intermediate IT skills required. You need to: have access to, and know how to change settings in the BIOS be confident that your data

More information

StarWind iscsi SAN: Configuring HA File Server for SMB NAS February 2012

StarWind iscsi SAN: Configuring HA File Server for SMB NAS February 2012 StarWind iscsi SAN: Configuring HA File Server for SMB NAS February 2012 TRADEMARKS StarWind, StarWind Software and the StarWind and the StarWind Software logos are trademarks of StarWind Software which

More information

Moving the TRITON Reporting Databases

Moving the TRITON Reporting Databases Moving the TRITON Reporting Databases Topic 50530 Web, Data, and Email Security Versions 7.7.x, 7.8.x Updated 06-Nov-2013 If you need to move your Microsoft SQL Server database to a new location (directory,

More information

How to Create a Delegated Administrator User Role / To create a Delegated Administrator user role Page 1

How to Create a Delegated Administrator User Role / To create a Delegated Administrator user role Page 1 Managing user roles in SCVMM How to Create a Delegated Administrator User Role... 2 To create a Delegated Administrator user role... 2 Managing User Roles... 3 Backing Up and Restoring the VMM Database...

More information

To install the SMTP service:

To install the SMTP service: To install the SMTP service: From the Start menu, click Control Panel. 2. Double-click Add or Remove Programs. 3. From the left pane, click Add/Remove Windows Components. 4. From the Components list, click

More information

Using iscsi with BackupAssist. User Guide

Using iscsi with BackupAssist. User Guide User Guide Contents 1. Introduction... 2 Documentation... 2 Terminology... 2 Advantages of iscsi... 2 Supported environments... 2 2. Overview... 3 About iscsi... 3 iscsi best practices with BackupAssist...

More information

LifeSize Control Installation Guide

LifeSize Control Installation Guide LifeSize Control Installation Guide April 2005 Part Number 132-00001-001, Version 1.0 Copyright Notice Copyright 2005 LifeSize Communications. All rights reserved. LifeSize Communications has made every

More information

About This Guide... 4. Signature Manager Outlook Edition Overview... 5

About This Guide... 4. Signature Manager Outlook Edition Overview... 5 Contents About This Guide... 4 Signature Manager Outlook Edition Overview... 5 How does it work?... 5 But That's Not All...... 6 And There's More...... 6 Licensing... 7 Licensing Information... 7 System

More information

BackupAssist v6 quickstart guide

BackupAssist v6 quickstart guide Using the new features in BackupAssist v6... 2 VSS application backup (Exchange, SQL, SharePoint)... 2 Backing up VSS applications... 2 Restoring VSS applications... 3 System State backup and restore...

More information

BitLocker/Active Directory Encryption Procedure Department: Information Security Office Version: 1.0 Last Revised: 09/26/2011

BitLocker/Active Directory Encryption Procedure Department: Information Security Office Version: 1.0 Last Revised: 09/26/2011 BitLocker/Active Directory Encryption Procedure Department: Information Security Office Version: 1.0 Last Revised: 09/26/2011 Purpose To provide a step-by-step procedure for encrypting installed laptop

More information

BackupAssist v6 quickstart guide

BackupAssist v6 quickstart guide New features in BackupAssist v6... 2 VSS application backup (Exchange, SQL, SharePoint)... 3 System State backup... 3 Restore files, applications, System State and mailboxes... 4 Fully cloud ready Internet

More information

CTERA Agent for Windows

CTERA Agent for Windows User Guide CTERA Agent for Windows May 2012 Version 3.1 Copyright 2009-2012 CTERA Networks Ltd. All rights reserved. No part of this document may be reproduced in any form or by any means without written

More information

User Guide. CTERA Agent. August 2011 Version 3.0

User Guide. CTERA Agent. August 2011 Version 3.0 User Guide CTERA Agent August 2011 Version 3.0 Copyright 2009-2011 CTERA Networks Ltd. All rights reserved. No part of this document may be reproduced in any form or by any means without written permission

More information

TSM for Windows Installation Instructions: Download the latest TSM Client Using the following link:

TSM for Windows Installation Instructions: Download the latest TSM Client Using the following link: TSM for Windows Installation Instructions: Download the latest TSM Client Using the following link: ftp://ftp.software.ibm.com/storage/tivoli-storagemanagement/maintenance/client/v6r2/windows/x32/v623/

More information

Getting Started Guide

Getting Started Guide Getting Started Guide Microsoft Corporation Published: December 2005 Table of Contents Getting Started Guide...1 Table of Contents...2 Get Started with Windows Server 2003 R2...4 Windows Storage Server

More information

+27O.557+! RM Auditor Additions - Web Monitor. Contents

+27O.557+! RM Auditor Additions - Web Monitor. Contents RM Auditor Additions - Web Monitor Contents RM Auditor Additions - Web Monitor... 1 Introduction... 2 Installing Web Monitor... 2 Overview... 2 Pre-requisites for installation... 2 Server installation...

More information

MICROSOFT BITLOCKER ADMINISTRATION AND MONITORING (MBAM)

MICROSOFT BITLOCKER ADMINISTRATION AND MONITORING (MBAM) MICROSOFT BITLOCKER ADMINISTRATION AND MONITORING (MBAM) MICROSOFT BITLOCKER ADMINISTRATION AND MONITORING (MBAM) Microsoft BitLocker Administration and Monitoring (MBAM) provides a simplified administrative

More information

Active Directory Software Deployment

Active Directory Software Deployment APPLICATION N0TE ST-0128 March 24, 2006 Product: Active Directory / PCM Deployment System version: ShoreTel 6 Active Directory Software Deployment Courtesy of: Dylan Moser with LANtelligence Inc. This

More information

DigitalPersona Pro Server for Active Directory v4.x Quick Start Installation Guide

DigitalPersona Pro Server for Active Directory v4.x Quick Start Installation Guide DigitalPersona Pro Server for Active Directory v4.x Quick Start Installation Guide 1 of 7 DigitalPersona Pro Server for Active Directory v4.x Quick Start Installation Guide Process Overview Step Description

More information

NovaBACKUP xsp Version 12.2 Upgrade Guide

NovaBACKUP xsp Version 12.2 Upgrade Guide NovaBACKUP xsp Version 12.2 Upgrade Guide NovaStor / August 2011 Rev 20110815 2011 NovaStor, all rights reserved. All trademarks are the property of their respective owners. Features and specifications

More information

Creating client-server setup with multiple clients

Creating client-server setup with multiple clients Creating client-server setup with multiple clients Coffalyser.Net uses a SQL client server database model to store all project/experiment- related data. The client-server model has one main application

More information

GFI LANguard 9.0 ReportPack. Manual. By GFI Software Ltd.

GFI LANguard 9.0 ReportPack. Manual. By GFI Software Ltd. GFI LANguard 9.0 ReportPack Manual By GFI Software Ltd. http://www.gfi.com E-mail: info@gfi.com Information in this document is subject to change without notice. Companies, names, and data used in examples

More information

Windows Server 2008 R2 Essentials

Windows Server 2008 R2 Essentials Windows Server 2008 R2 Essentials Installation, Deployment and Management 2 First Edition 2010 Payload Media. This ebook is provided for personal use only. Unauthorized use, reproduction and/or distribution

More information

Windows Server 2003 Logon Scripts Paul Flynn

Windows Server 2003 Logon Scripts Paul Flynn Creating logon scripts You can use logon scripts to assign tasks that will be performed when a user logs on to a particular computer. The scripts can carry out operating system commands, set system environment

More information

Administering Windows Server 2012

Administering Windows Server 2012 WINDOWS 2012 COURSE OUTLINE Visit Our Website to Enroll Now Www.ITBigBang.Com/IT-Training Administering Windows Server 2012 Course Title Administering Windows Server 2012 Course Code 20411D Days / Duration

More information

Team Foundation Server 2013 Installation Guide

Team Foundation Server 2013 Installation Guide Team Foundation Server 2013 Installation Guide Page 1 of 164 Team Foundation Server 2013 Installation Guide Benjamin Day benday@benday.com v1.1.0 May 28, 2014 Team Foundation Server 2013 Installation Guide

More information

Microsoft Exchange 2010 and 2007

Microsoft Exchange 2010 and 2007 Microsoft Exchange 2010 and 2007 Download the server certificate and intermediate certificates. Perform the following procedure for each of the intermediate certificates and then for the server certificate.

More information

Migrating MSDE to Microsoft SQL 2008 R2 Express

Migrating MSDE to Microsoft SQL 2008 R2 Express How To Updated: 11/11/2011 2011 Shelby Systems, Inc. All Rights Reserved Other brand and product names are trademarks or registered trademarks of the respective holders. If you are still on MSDE 2000,

More information

FileMaker Server 7. Administrator s Guide. For Windows and Mac OS

FileMaker Server 7. Administrator s Guide. For Windows and Mac OS FileMaker Server 7 Administrator s Guide For Windows and Mac OS 1994-2004, FileMaker, Inc. All Rights Reserved. FileMaker, Inc. 5201 Patrick Henry Drive Santa Clara, California 95054 FileMaker is a trademark

More information

Netop Remote Control User's Guide. Version 12.20

Netop Remote Control User's Guide. Version 12.20 Netop Remote Control User's Guide Version 12.20 Copyright 1981-2015 Netop Business Solutions A/S. All Rights Reserved. Portions used under license from third parties. Please send any comments to: Netop

More information

Install SQL Server 2014 Express Edition

Install SQL Server 2014 Express Edition How To Install SQL Server 2014 Express Edition Updated: 2/4/2016 2016 Shelby Systems, Inc. All Rights Reserved Other brand and product names are trademarks or registered trademarks of the respective holders.

More information

Migration Strategies and Tools for the HP Print Server Appliance

Migration Strategies and Tools for the HP Print Server Appliance white paper HP Print Server Appliance 4250 July 2003 Migration Strategies and Tools for the HP Print Server Appliance (Web Jetadmin version 7.2 and above; PSA Firmware version 2.4.x and above) Overview

More information

Server Installation Guide ZENworks Patch Management 6.4 SP2

Server Installation Guide ZENworks Patch Management 6.4 SP2 Server Installation Guide ZENworks Patch Management 6.4 SP2 02_016N 6.4SP2 Server Installation Guide - 2 - Notices Version Information ZENworks Patch Management Server Installation Guide - ZENworks Patch

More information

Web. Security Options Comparison

Web. Security Options Comparison Web 3 Security Options Comparison Windows Server 2003 provides a number of Security Options that can be applied within the scope of managing a GPO. Most are the same as those available in Windows 2000.

More information

Installing and Configuring a SQL Server 2014 Multi-Subnet Cluster on Windows Server 2012 R2

Installing and Configuring a SQL Server 2014 Multi-Subnet Cluster on Windows Server 2012 R2 Installing and Configuring a SQL Server 2014 Multi-Subnet Cluster on Windows Server 2012 R2 Edwin Sarmiento, Microsoft SQL Server MVP, Microsoft Certified Master Contents Introduction... 3 Assumptions...

More information

How To Install And Configure Windows Server 2003 On A Student Computer

How To Install And Configure Windows Server 2003 On A Student Computer Course: WIN310 Student Lab Setup Guide Microsoft Windows Server 2003 Network Infrastructure (70-291) ISBN: 0-470-06887-6 STUDENT COMPUTER SETUP Hardware Requirements All hardware must be on the Microsoft

More information

Exchange Mailbox Protection Whitepaper

Exchange Mailbox Protection Whitepaper Exchange Mailbox Protection Contents 1. Introduction... 2 Documentation... 2 Licensing... 2 Exchange add-on comparison... 2 Advantages and disadvantages of the different PST formats... 3 2. How Exchange

More information

How to Manage a Windows NT Server Computer Remotely

How to Manage a Windows NT Server Computer Remotely MCSE Server Enterprise Using Windows NT Server Tools CHAPTER 14 Windows NT Server Tools................. 541 NT Server Tools for Windows 95 Computers........ 541 Installing NT Server tools on a Windows

More information

Installation Instruction STATISTICA Enterprise Small Business

Installation Instruction STATISTICA Enterprise Small Business Installation Instruction STATISTICA Enterprise Small Business Notes: ❶ The installation of STATISTICA Enterprise Small Business entails two parts: a) a server installation, and b) workstation installations

More information

Installation and Setup Guide

Installation and Setup Guide Installation and Setup Guide Contents 1. Introduction... 1 2. Before You Install... 3 3. Server Installation... 6 4. Configuring Print Audit Secure... 11 5. Licensing... 16 6. Printer Manager... 17 7.

More information

Creating a New Domain Tree in the Forest

Creating a New Domain Tree in the Forest Creating Domain Trees and Forests 163 Creating a New Domain Tree in the Forest 1. Open the Active Directory Installation Wizard by clicking Start Run, and typing dcpromo. Click the Use Advanced Mode Installation

More information

Implementing Moodle on a Windows High Availability Environment

Implementing Moodle on a Windows High Availability Environment Implementing Moodle on a Windows High Availability Environment Implementing Moodle 1.9 on 2 Microsoft Load Balanced Web Front End Server and a Microsoft SQL Server 2008 R2 Cluster environment Written by:

More information

HOW TO CONFIGURE SQL SERVER REPORTING SERVICES IN ORDER TO DEPLOY REPORTING SERVICES REPORTS FOR DYNAMICS GP

HOW TO CONFIGURE SQL SERVER REPORTING SERVICES IN ORDER TO DEPLOY REPORTING SERVICES REPORTS FOR DYNAMICS GP HOW TO CONFIGURE SQL SERVER REPORTING SERVICES IN ORDER TO DEPLOY REPORTING SERVICES REPORTS FOR DYNAMICS GP When you install SQL Server you have option to automatically deploy & configure SQL Server Reporting

More information

StarWind iscsi SAN Configuring HA File Server for SMB NAS

StarWind iscsi SAN Configuring HA File Server for SMB NAS Hardware-less VM Storage StarWind iscsi SAN Configuring HA File Server for SMB NAS DATE: FEBRUARY 2012 TECHNICAL PAPER Trademarks StarWind, StarWind Software and the StarWind and the StarWind Software

More information