Cyber Security: Software Security and Hard Drive Encryption

Size: px
Start display at page:

Download "Cyber Security: Software Security and Hard Drive Encryption"

Transcription

1 Links in this document have been set for a desktop computer with the resolution set to 1920 x 1080 pixels. Cyber Security: Software Security and Hard Drive Encryption , Rev A September 2012

2 Copyright 2012 Cepheid. Cepheid, the Cepheid logo, GeneXpert, and Xpert are trademarks of Cepheid. Symantec, the Symantec Logo, the Checkmark Logo, Norton, Norton 360, and NortonLive are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. McAfee and McAfee AntiVirus Plus are trademarks or registered trademarks of McAfee Corporation or its affiliates in the U.S. and other countries. Trend Micro and Titanium Maximum Security are trademarks or registered trademarks of Trend Micro Inc. or its affiliates in the U.S. and other countries. Microsoft Windows, Windows 7, Windows XP, and Windows Vista are trademarks of Microsoft Corporation. Other names may be trademarks of their respective owners.

3 Table of Contents Introduction Scope Intended Audience Contents Norton 360 Premier Edition Version 6 Introduction Estimated Time Before You Begin Installing Norton 360 Premier Edition Setting Up Norton 360 Premier Edition McAfee AntiVirus Plus 2012 Introduction Estimated Time Before You Begin Installing McAfee AntiVirus Plus Setting Up McAfee AntiVirus Plus Trend Micro Titanium Maximum Security 2012 Introduction Estimated Time Before You Begin Installing Trend Micro Titanium Maximum Security Setting Up Trend Micro Titanium Maximum Security Installing or Upgrading GeneXpert Software for Windows XP Symantec PGP Whole Disk Encryption Configuration Introduction Scope General Overview of Encryption Setup Estimated Time Before You Begin Installing Symantec PGP Whole Disk Encryption Setting Up PGP Desktop Creating a Passphrase User Setting Up Whole Disk Encryption Technical Support Troubleshooting Contact Cepheid...6-1

4

5 Chapter 1 Introduction 1.1 Scope Cepheid is a molecular diagnostics company that is dedicated to improving healthcare by developing, manufacturing, and marketing accurate yet easy-to use molecular systems and tests. Ensuring the integrity of our systems and the business continuity of our customers is a top concern for Cepheid. This document is intended to assist our customer IT staff in securing their general network infrastructure where Cepheid medical products are in use. Cepheid uses commercial off-the-shelf products that include Microsoft Operating Systems in its portfolio of computer based medical products. Cepheid takes cybersecurity seriously by taking a number of actions and measures in an effort to make our products safe from software vulnerability and exploits. However, due to the ubiquitous computing and interconnected nature of today s world coupled with the fast changing landscape of cyber threats, this volatile condition poses a significant risk to the security of our products. Cepheid expects our customers to be vigilant in the security of their systems. This document provides guidance on implementing some of the most common anti-virus and security tools. However, this document is not intended to cover all aspects of cybersecurity required to protect our customers systems. This document provides instructions for implementing off-the-shelf security products on the GeneXpert products. 1.2 Intended Audience This document is intended for experienced IT professionals. 1.3 Contents Chapter 1: Introduction Chapter 2: Norton 360 Premier Edition Version 6 Chapter 3: McAfee AntiVirus Plus 2012 Chapter 4: Trend Micro Titanium Maximum Security 2012 Chapter 5: Symantec PGP Whole Disk Encryption Configuration Chapter 6: Technical Support Cyber Security Manual 1-1

6 Introduction , Rev A September 2012

7 Chapter 2 Norton 360 Premier Edition Version Introduction Norton 360 Premier Edition is a complete security software suite. The software provides several complementary features that protect your computer from security threats: Antivirus running scans for detection of risks Firewall intrusion and browser protection Automatic Protection of active files This document provides information for installing and configuring Norton 360 Premier Edition on the GeneXpert System Computer. 2.2 Estimated Time Installation of Norton 360 Premier Edition 6 will take approximately 30 minutes. 2.3 Before You Begin 1. Connect to the internet. The internet is needed to complete installation. 2. Have a Norton 360 Premier Edition product key ready. 3. Login as cepheid-admin (Windows 7) or cepheid (Windows XP). a. If other antivirus software is installed, uninstall it prior to installing Norton 360 Premier Edition: b. In Windows 7, click Start, click Control Panel, under Programs click Uninstall a Program, click on the antivirus software, and click Uninstall/Change. c. In Windows XP, click Start, click Control Panel, click Add or Remove Programs, click on the antivirus software, and click Change/Remove. 4. Turn Windows Firewall Off: a. For Windows 7, click Start, click Control Panel, click System and Security, and click Windows Firewall. On the left panel, click Turn Windows Firewall on or off, check Off and click OK. b. In Windows XP, click Start, click Control Panel, click Windows Firewall, check Off (not recommended) and click OK. 5. Close any open applications. Cyber Security Manual 2-1

8 Norton 360 Premier Edition Version Installing Norton 360 Premier Edition 1. Launch the Norton 360 Premier Edition installer. 2. When the Welcome to Norton 360 Premier Edition screen appears, click on Install Norton 360 Premier Edition. The screen will remain open for the installation process. Figure 2-1. Welcome Screen 3. If a prompt asks to run a publisher or program that is not verified during installation, click Run or Yes. 4. Enter in the Product Key. Uncheck I want to join Norton Community Watch and click Agree & Install. Progress screens will appear the next 2 to 5 minutes. Figure 2-2. Get Started , Rev A September 2012

9 Installing Norton 360 Premier Edition 5. After Installation is complete, click Explore. A reminder will appear to connect the internet if you haven t already. Figure 2-3. Installation is Complete 6. Activation will automatically start. When prompted to complete activation, enter an address and click Next. Figure 2-4. Complete Your Activation Cyber Security Manual 2-3

10 Norton 360 Premier Edition Version 6 7. If a Norton account has already been activated, enter the password. If no Norton account is activated, finish completing account setup. Click Next. Optional - Uncheck me security alerts and me product updates, offers, and security newsletters. Figure 2-5. Create Your Norton Account 8. After successful completion of activation and registration, click Done. 2.5 Setting Up Norton 360 Premier Edition 1. Click on Norton 360 desktop icon if software is not already launched. Figure 2-6. Home page , Rev A September 2012

11 Setting Up Norton 360 Premier Edition 2. By default, a scheduled scan will be performed once every 8 days starting from the first day software gets installed. The scan will occur during idle time. Modify the frequency of the time to meet your organization s security guidelines. However, ensure that the scan will not be performed during a time when the GeneXpert System will be processing tests. To modify the scan schedule: a. Click on Settings. b. Click on the Antivirus icon. Figure 2-7. Antivirus icon c. Click on the Scans and Risks tab. d. Find Full System Scan near the end of the list and click on Configure +. Figure 2-8. Antivirus Settings - Scans and Risks e. Under Scan Schedule tab, modify scan schedule based on Start Time, and Day of the week. 3. It is recommended running a scan after installing the software. To complete, click Tasks, and click Run Scan. Figure 2-9. Tasks Cyber Security Manual 2-5

12 Norton 360 Premier Edition Version 6 4. Check Custom Scan and click Go. Figure Scans , Rev A September 2012

13 Chapter 3 McAfee AntiVirus Plus Introduction McAfee AntiVirus Plus 2012 software is a complete security software suite. The software provides several complementary features to protect your computer from security threats: Antivirus, spyware, and malware protection with scheduled scans that detect and eliminate viruses and spyware Real-time scanning of active files Firewall to protect the computer against intruders This document provides information for installing and configuring McAfee AntiVirus Plus on the GeneXpert System Computer. 3.2 Estimated Time Installation of McAfee AntiVirus Plus 2012 will take approximately 30 minutes. 3.3 Before You Begin 1. Connect to the internet which is needed for a complete installation. 2. Have a McAfee AntiVirus Plus 2012 product key ready. 3. Login as cepheid-admin (Windows 7) or cepheid (Windows XP). 4. If other antivirus software is installed, uninstall it prior to installing McAfee AntiVirus Plus 2012: a. In Windows 7, click Start, click Control Panel, under Programs click Uninstall a Program, click on the antivirus software, and click Uninstall/Change. b. In Windows XP, click Start, click Control Panel, click Add or Remove Programs, click on the antivirus software, and click Change/Remove. 5. Close any open applications. 3.4 Installing McAfee AntiVirus Plus Launch the McAfee Antivirus Plus installer. 2. If a prompt asks to run a publisher or program that is not verified during installation, click Run or Yes. Cyber Security Manual 3-1

14 McAfee AntiVirus Plus If the Internet Connection Required message appears, connect to the internet and click Next. Figure 3-1. Internet Connection Required 4. Check the box underneath License Agreement; check Download and install the latest version of your software from the web; uncheck Send anonymous usage information to McAfee. Click Install. Progress screens will appear for the next 5-10 minutes. Figure 3-2. Install McAfee AntiVirus Plus , Rev A September 2012

15 Installing McAfee AntiVirus Plus After Installation Complete message appears, click Next. Figure 3-3. Installation Complete 6. Enter in the Activation Key and click Next. Figure 3-4. Activate your McAfee Product Cyber Security Manual 3-3

16 McAfee AntiVirus Plus For Log in or Create a New Account, enter required information to create a new McAfee account or log in to an existing account, then click Next. Optional - uncheck boxes on the right side of the screen Figure 3-5. Activation Successful 8. After account Activation Successful screen appears, click Finish. Window will close and a confirmation will be sent. 3.5 Setting Up McAfee AntiVirus Plus To launch McAfee Antivirus Plus software, click on the McAfee AntiVirus Plus shortcut displayed on the Desktop. 2. By default, a scheduled scan will be performed once a week at 4:00 AM. The scan frequency and start time may be modified to meet your organization s security guidelines. However, ensure that the scan will not be performed during a time when the GeneXpert System will be processing tests. To modify the scan schedule: , Rev A September 2012

17 Setting Up McAfee AntiVirus Plus 2012 a. Click on Virus and Spyware Protection. Figure 3-6. McAfee AntiVirus Plus Home Screen 3. Click the last option, Schedule Scanning. Figure 3-7. Schedule Scanning 4. Click Schedule Your Scan which will then allow you to create an own schedule scan Cyber Security Manual 3-5

18 McAfee AntiVirus Plus Click Apply after all schedule changes are made All defaults settings set require no further actions. If further configuration settings are needed, modify according to your organization s security guidelines. It is suggested to start a scan after installing McAfee AntiVirus Plus , Rev A September 2012

19 Chapter 4 Trend Micro Titanium Maximum Security Introduction Trend Micro Titanium Maximum Security 2012 is a complete security software suite. The software provides several complementary features that protect your computer from security threats: Virus & Spyware Controls allows for schedule scans to eliminate viruses and spyware Firewall to protect the computer against intruders Real-time scanning for active files This document provides information for installing and configuring Trend Micro Titanium Maximum Security on the GeneXpert System Computer. 4.2 Estimated Time Installation of Trend Micro Titanium Maximum Security 2012 will take approximately 30 minutes. 4.3 Before You Begin 1. Connect to the internet. The internet is needed to complete installation. 2. Have a Trend Micro Titanium Maximum Security product key ready 3. Login as cepheid-admin (Windows 7) or cepheid (Windows XP). 4. If other antivirus software is installed, uninstall it prior to installing Trend Micro Titanium Maximum Security.: a. In Windows 7, click Start, click Control Panel, under Programs click Uninstall a Program, click on the antivirus software, and click Uninstall/Change. b. In Windows XP, click Start, click Control Panel, click Add or Remove Programs, click on the antivirus software, and click Change/Remove. 5. Close any open applications. 4.4 Installing Trend Micro Titanium Maximum Security Launch the Trend Micro Titanium Maximum Security 2012 installer. 2. If a prompt asks to run a publisher or program that is not verified during installation, click Run or Yes. Cyber Security Manual 4-1

20 Trend Micro Titanium Maximum Security Wait a few minutes until installer window appears and click Install Program. The installer window will remain open for the remainder installation and other information can be opened without interruption. Figure 4-1. Trend Micro Titanium: Install Program 4. A system requirement check will run. After completion, type in the serial number and then click Next. Figure 4-2. Trend Micro Titanium: Provide Your Serial Number , Rev A September 2012

21 Installing Trend Micro Titanium Maximum Security Uncheck Share threat information with Trend Micro and click Agree and Install. Figure 4-3. Trend Micro Titanium: License Agreement 6. Installation progress screens will appear for the next 5-10 minutes. After completion, enter your address to activate the software. 7. If an account is already set up, enter in password. If an account is setup, fill in the following information and then click Next. Optional Uncheck Receive the latest news and offers from Trend Micro. Figure 4-4. Trend Micro Titanium: Enter Account Information 8. Verify information was entered correctly, and then click Next. 9. After activation completes, click Finish. Cyber Security Manual 4-3

22 Trend Micro Titanium Maximum Security When SafeSync introduction screen appears, click Don t show this page again and Exit. Figure 4-5. Trend Micro Titanium: SafeSync 11.Exit any installer screens if any remain open 4.5 Setting Up Trend Micro Titanium Maximum Security To modify the Trend Micro Titanium Maximum Security settings according to your organization s guidelines, click on Settings. The Protection Settings screen will open. Figure 4-6. Trend Micro Titanium: Protected , Rev A September 2012

23 Setting Up Trend Micro Titanium Maximum Security Click on the Virus & Spyware Controls tab. Optional - Check Enable real-time scanning for compressed files (like ZIP files). Click Apply to save settings. Figure 4-7. Trend Micro Titanium: Enable Real-Time Scanning 3. By default, a scheduled scan will be performed once a week, on Friday at 12:00 PM. The scan frequency and start time may be modified to meet your organization s security guidelines. However, ensure that the scan will not be performed during a time when the GeneXpert System will be processing tests. To modify the scan schedule: a. Click Schedule Scans. b. Modify the schedule and the scan type, click Apply when completed. Figure 4-8. Trend Micro Titanium: Protection Settings - Scheduled Scans Cyber Security Manual 4-5

24 Trend Micro Titanium Maximum Security To modify Firewall Booster, click on the Internet & Controls tab and click Network. Check Activate the Firewall Booster and click Apply Figure 4-9. Trend Micro Titanium: Protection Settings - Network 5. It is recommended to run an initial scan after setup. On the home screen click Scan and a Quick Scan will start. Figure Trend Micro Titanium: Scan Icon 4.6 Installing or Upgrading GeneXpert Software for Windows XP If Trend Micro Security software is configured and you wish to install or upgrade GeneXpert software, complete the following steps: 1. Launch Trend Micro Titanium Maximum Security and click on Settings. 2. Click on the Virus & Spyware Controls tab , Rev A September 2012

25 Installing or Upgrading GeneXpert Software for Windows XP 3. Click on Scan Preferences and uncheck Check if programs try to make unauthorized changes to the system settings. 4. Click Apply. Figure Trend Micro Titanium: Protection Settings - Scan Preferences 5. Install or upgrade GeneXpert software by following the Install Instructions in Launch Trend Micro Titanium Maximum Security and click on Settings. 2. Click on the Virus & Spyware Controls tab. 3. Check the box Check if programs try to make unauthorized changes to the system settings. 4. Click OK to save the settings. Cyber Security Manual 4-7

26 Trend Micro Titanium Maximum Security , Rev A September 2012

27 Chapter 5 Symantec PGP Whole Disk Encryption Configuration 5.1 Introduction 5.2 Scope Hard drive encryption is an important layer of data security in the event of a malicious attack against a physical computer. When a hard drive has been encrypted, the data on the drive is not accessible by anyone who does not possess a valid password, regardless of their physical possession of the computer. Once the hard drive has been encrypted, every time a user starts the computer a password will be required prior to logging into Windows. Symantec PGP Whole Disk Encryption is an FIPS validated security product, and Cepheid has qualified the GeneXpert software for use with this product on both Windows 7 and Windows XP computers. This document provides information for installing and configuring hard drive encryption on the GeneXpert System Computer. While Symantec PGP Whole Disk Encryption provides other features such as encryption and USB drive encryption, this document will only provide information for the hard drive encryption feature. 5.3 General Overview of Encryption Setup Install PGP Whole Disk Encryption software Setup PGP Whole Disk Encryption software Configure User Account (s) and starting passphrases Encrypt Whole Disk Type Passphrase to a pre-boot window, before Windows login 5.4 Estimated Time Installation of the Symantec PGP Whole Disk Encryption software takes about 1 hour. The software takes up to 12 hours to encrypt the hard drive. The computer does not need to be monitored during the time, and if the computer is shut down the encryption will resume once it is rebooted. 5.5 Before You Begin Ensure all applications are closed. Have a Symantec PGP Whole Disk Encryption license key available. Cepheid recommends backing up the GeneXpert Software database and any other critical data on the computer to external storage before installing hard drive encryption. Cyber Security Manual 5-1

28 Symantec PGP Whole Disk Encryption Configuration Log in as a user with administrator privileges. The user cepheid may be used on Windows XP computers, and cepheid-admin on Windows Installing Symantec PGP Whole Disk Encryption Note 1. Launch the Symantec PGP Whole Disk Encryption installer. 2. Select English from drop-down menu and click OK. 3. Check I accept the license agreement and click Next. 4. Check Do not display the Release Notes and click Next. 5. Click Yes to restarting computer message. If a prompt asks to run a publisher or program that is not verified during installation, click Run or Yes 5.7 Setting Up PGP Desktop 1. After the computer restarts, PGP Setup Assistant should automatically launch. If no dialog appears, click on the PGP Desktop icon. The PGP Setup Assistant will automatically launch the first time a new Windows user logs in. PGP Setup only needs to be performed once per computer, so if PGP is already installed and configured, check No and click Next to exit the PGP Setup Assistant , Rev A September 2012

29 Setting Up PGP Desktop 2. For the first prompt asking to Enable PGP, check Yes and click Next. Figure 5-1. Symantec PGP Desktop: Enabling PGP 3. Enter the following information: Name, Organization, Address, and click Next. 4. Enter License Key, click Next. 5. After successful authorization, click Next. 6. In User Type screen, check I am a new user, and click Next. 7. If the Personal Certificate Importation screen appears, click Skip. This step is not needed to enable hard drive encryption. 8. If the PGP Key Generation Assistant screen appears, click Skip. This step is not needed to enable hard drive encryption. 9. If the PGP Global Directory Assistant screen appears, click Skip. This step is not needed to enable hard drive encryption. Cyber Security Manual 5-3

30 Symantec PGP Whole Disk Encryption Configuration 10.If the PGP Messaging: Introduction screen appears, uncheck two checkboxes, and click Next. This step is not needed to enable hard drive encryption. Figure 5-2. Symantec PGP Desktop: PGP Messaging Introduction 11.Click Finish to complete PGP setup. 5.8 Creating a Passphrase User At least one passphrase user must be created before the whole disk can be encrypted. 1. In PGP Desktop, click PGP Disk, and then click Encrypt Whole Disk or Partition Figure 5-3. Symantec PGP Desktop: PGP Disk , Rev A September 2012

31 Creating a Passphrase User 2. On bottom right, click New Passphrase User Figure 5-4. Symantec PGP Desktop: Encrypt Whole Disk or Partition A New User can be created two different ways: Windows Password or New Passphrase. The first option, Use Windows Password, will use an existing Windows User Account and its password. The second option, Create New Passphrase, will create a new password used only by the encryption software. Cepheid recommends the second option for consistency between users and over time. Important It is critical to remember the Password for the selected Windows account, as it will be required for a user to boot the computer. Multiple users and passwords can be added if desired. Cyber Security Manual 5-5

32 Symantec PGP Whole Disk Encryption Configuration 3. Check Create New Passphrase, and click Next. Figure 5-5. Symantec PGP Desktop: Whole Disk Encryption New User 4. Check Proceed with passphrase authentication only and click Next , Rev A September 2012

33 Creating a Passphrase User 5. Enter in the username and the new passphrase. The software will indicate the strength of the password, but does not place requirements on password strength. Follow your organization's IT recommendations for password strength. Click Next to create the new user. Figure 5-6. Symantec PGP Desktop: Create User Name and Passphrase 6. Click Finish to complete passphrase creation. Cyber Security Manual 5-7

34 Symantec PGP Whole Disk Encryption Configuration 5.9 Setting Up Whole Disk Encryption 1. Click on PGP Disk and then Encrypt Whole Disk or Partition screen to enter the Encrypt Whole Disk or Partition screen. 2. Click on the C: disk and click Encrypt. Figure 5-7. Symantec PGP Desktop: Select Disk or Partition to Encrypt 3. A confirmation message will appear. Click Yes. The software will take up to 12 hours to encrypt the disk. If you need to shut down the computer while encryption is in process, the encryption process will resume after the computer restarts , Rev A September 2012

35 Setting Up Whole Disk Encryption 4. After completing disk encryption a new log in screen will appear when the computer is started. Use the passphrase from Section 5.8, Creating a Passphrase User to log in. Figure 5-8. Symantec PGP Desktop: Enter Passphrase Cyber Security Manual 5-9

36 Symantec PGP Whole Disk Encryption Configuration , Rev A September 2012

37 Chapter 6 Technical Support 6.1 Troubleshooting For more information about installation of the security products mentioned in this document, or about their interactions with Cepheid software, please contact Cepheid Technical Support. For other questions about these security products, please contact the manufacturer. 6.2 Contact Cepheid Before contacting Cepheid Technical Support, collect the following information: Product name Lot number Serial number of the instrument Error messages (if any) Software version and, if applicable, Computer Service Tag number Region Telephone North America Sales Support: Option 1 Technical Support: Option 2 Service Support: Option 3 Instrument Service Contracts: Option 4 CustomerService@cepheid.com TechSupport@cepheid.com Cepheid.ServiceSupport@cepheid.com Service.Contracts@cepheid.com European Union Sales Support: Technical Support: Service Support (calibrations only): Support@cepheideurope.com Our corporate headquarters is located in North America. Cepheid 904 Caribbean Drive Sunnyvale, CA USA Telephone: Fax: Cyber Security Manual 6-1

38 Technical Support For technical support outside of North America, can contact Cepheid Europe for assistance. Cepheid Europe S.A.S. Vira Solelh Maurens-Scopont FranceTelephone: Fax: www.cepheidinternational.com/ Contact information for other Cepheid offices is available on our website at , Rev A September 2012

How To Install Safari Antivirus On A Dv8000 Dv Recorder On A Pc Or Macbook Or Ipad (For A Pc) On A Microsoft Dv8 (For Macbook) On An Ipad Or Ipa (

How To Install Safari Antivirus On A Dv8000 Dv Recorder On A Pc Or Macbook Or Ipad (For A Pc) On A Microsoft Dv8 (For Macbook) On An Ipad Or Ipa ( Using Symantec AntiVirus Corporate Edition Version 9.0 Software On a DX8000 DVR DX8000 Digital Video Recorder C1613M-A (12/04) Contents Using Symantec AntiVirus Corporate Edition 9.0 Software.....................................................................5

More information

Contents. VPN Instructions. VPN Instructions... 1

Contents. VPN Instructions. VPN Instructions... 1 VPN Instructions Contents VPN Instructions... 1 Download & Install Check Point VPN Software... 2 Connect to FPUA by VPN... 6 Connect to Your Computer... 8 Determine Your Machine Type... 10 Identify 32-bit

More information

Global VPN Client Getting Started Guide

Global VPN Client Getting Started Guide Global VPN Client Getting Started Guide 1 Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your system. CAUTION: A CAUTION indicates potential

More information

Symantec AntiVirus Corporate Edition Patch Update

Symantec AntiVirus Corporate Edition Patch Update Symantec AntiVirus Corporate Edition Patch Update Symantec AntiVirus Corporate Edition Update Documentation version 10.0.1.1007 Copyright 2005 Symantec Corporation. All rights reserved. Symantec, the Symantec

More information

Abila MIP. Installation User's Guide

Abila MIP. Installation User's Guide This is a publication of Abila, Inc. Version 2014.x Copyright 2013 Abila, Inc. All rights reserved. Abila, the Abila logos, and the Abila product and service names mentioned herein are registered trademarks

More information

Spector 360 Deployment Guide. Version 7.3 January 3, 2012

Spector 360 Deployment Guide. Version 7.3 January 3, 2012 Spector 360 Deployment Guide Version 7.3 January 3, 2012 Table of Contents Deploy to All Computers... 48 Step 1: Deploy the Servers... 5 Recorder Requirements... 52 Requirements... 5 Control Center Server

More information

Abila MIP. Installation Guide

Abila MIP. Installation Guide This is a publication of Abila, Inc. Version 2015.x Copyright 2014 Abila, Inc. All rights reserved. Abila, the Abila logos, and the Abila product and service names mentioned herein are registered trademarks

More information

Citrix Client Install Instructions

Citrix Client Install Instructions Citrix Client Install Instructions If you are using Citrix remotely, Information Technology Services recommends updating Citrix client to the newest version available online. You must be an administrator

More information

Send technical support questions to tmss@support.trendmicro.com. In the United States, call the technical support team toll-free at 1-866-787-TMSS

Send technical support questions to tmss@support.trendmicro.com. In the United States, call the technical support team toll-free at 1-866-787-TMSS Quick Start Guide Send technical support questions to tmss@support.trendmicro.com. In the United States, call the technical support team toll-free at 1-866-787-TMSS (1-866-787-8677). For online support

More information

Contents. Hardware Configuration... 27 Uninstalling Shortcuts Black...29

Contents. Hardware Configuration... 27 Uninstalling Shortcuts Black...29 Contents Getting Started...1 Check your Computer meets the Minimum Requirements... 1 Ensure your Computer is Running in Normal Sized Fonts... 7 Ensure your Regional Settings are Correct... 9 Reboot your

More information

COX BUSINESS ONLINE BACKUP

COX BUSINESS ONLINE BACKUP COX BUSINESS ONLINE BACKUP Quick start Guide www.cox.com Services and features not available in all areas and package options vary by market. Rates and speeds vary by market. Number of users and network

More information

NTI Backup Now EZ v2 User s Guide

NTI Backup Now EZ v2 User s Guide NTI Backup Now EZ v2 User s Guide GMAA00423010 11/12 2 Copyright statement This guide is copyrighted by Toshiba Corporation with all rights reserved. Under the copyright laws, this guide cannot be reproduced

More information

Guide to Installing BBL Crystal MIND on Windows 7

Guide to Installing BBL Crystal MIND on Windows 7 Guide to Installing BBL Crystal MIND on Windows 7 Introduction The BBL Crystal MIND software can not be directly installed on the Microsoft Windows 7 platform, however it can be installed and run via XP

More information

Overview... 2. Using the Secure Desktop Agent... 4. Troubleshooting... 10

Overview... 2. Using the Secure Desktop Agent... 4. Troubleshooting... 10 Overview... 2 Installing... 2 Step 1: Download... 2 Step 2: Install... 2 Step 3: Sign In... 3 Step 4: That's It!... 3 Minimum System Requirements:... 3 Using the Secure Desktop Agent... 4 Accessing & Login

More information

Instructions for accessing the new TU wireless Network

Instructions for accessing the new TU wireless Network Instructions for accessing the new TU wireless Network These instructions are meant for University owned systems directly supported by ENS Computer Services. Users of other systems may find this document

More information

formerly Help Desk Authority 9.1.3 Upgrade Guide

formerly Help Desk Authority 9.1.3 Upgrade Guide formerly Help Desk Authority 9.1.3 Upgrade Guide 2 Contacting Quest Software Email: Mail: Web site: info@quest.com Quest Software, Inc. World Headquarters 5 Polaris Way Aliso Viejo, CA 92656 USA www.quest.com

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before using this service, please review the latest version of the applicable

More information

Software Update for WinXP

Software Update for WinXP Software Update for WinXP ( Pre-requisites SP2 Patch and Post-SP2 Patches Novell Client 32 McAfee 8.0i GroupWise 6.52 WinZip 9.0 SR1 Oracle 9i Client Others ) This Installer contains the following patches

More information

Motorola Phone Tools. Quick Start

Motorola Phone Tools. Quick Start Motorola Phone Tools Quick Start Contents Minimum Requirements...2 Before Installing Motorola Phone Tools...3 Installing Motorola Phone Tools...4 Mobile Device Installation and Configuration...5 Online

More information

User Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream

User Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream User Manual Onsight Management Suite Version 5.1 Another Innovation by Librestream Doc #: 400075-06 May 2012 Information in this document is subject to change without notice. Reproduction in any manner

More information

Tufts VPN Client User Guide for Windows

Tufts VPN Client User Guide for Windows Tufts VPN Client User Guide for Windows Introduction The Tufts Virtual Private Network (VPN) implementation is a service that is provided to the faculty and staff of Tufts University to enable secure access

More information

Lepide Active Directory Self Service. Installation Guide. Lepide Active Directory Self Service Tool. Lepide Software Private Limited Page 1

Lepide Active Directory Self Service. Installation Guide. Lepide Active Directory Self Service Tool. Lepide Software Private Limited Page 1 Installation Guide Lepide Active Directory Self Service Tool Lepide Software Private Limited Page 1 Lepide Software Private Limited, All Rights Reserved This User Guide and documentation is copyright of

More information

2. PMP New Computer Installation. & Networking Instructions

2. PMP New Computer Installation. & Networking Instructions ONTARIO CHIROPRACTIC ASSOCIATION PATIENT MANAGEMENT PROGRAM PUTTING EXPERIENCE INTO PRACTICE PMP New Computer Installation & Networking Instructions This document provides installation instructions for

More information

Using McAfee VirusScan. Professional Edition Version 8.0. Software On a DX8000 DVR

Using McAfee VirusScan. Professional Edition Version 8.0. Software On a DX8000 DVR Using McAfee VirusScan Professional Edition Version 8.0 Software On a DX8000 DVR DX8000 Digital Video Recorder C1611M-B (12/04) Contents Using McAfee VirusScan Professional Edition Version 8.0.....................................................................5

More information

DIRECT INTERNET 3. Install Guide for the Windows XP Operating System

DIRECT INTERNET 3. Install Guide for the Windows XP Operating System DIRECT INTERNET 3 Install Guide for the Windows XP Operating System Iridium Communications Inc. Rev. 1; October 15, 2010 Overview Iridium s Direct Internet Data Service allows customers to connect directly

More information

DataSuite Installation and Activation Guide

DataSuite Installation and Activation Guide DataSuite Installation and Activation Guide This document provides a detailed overview of the installation and activation procedure for the DataSuite v2.4.0.0 software. DataSuite allows you to configure

More information

Core Protection for Virtual Machines 1

Core Protection for Virtual Machines 1 Core Protection for Virtual Machines 1 Comprehensive Threat Protection for Virtual Environments. Installation Guide e Endpoint Security Trend Micro Incorporated reserves the right to make changes to this

More information

STEP 1: INSTALLING WINDOWS DEFENDER

STEP 1: INSTALLING WINDOWS DEFENDER Office of Information Technology Secure your Windows XP Computer for Use on AU s Network Every member of the AU community has a shared responsibility for the safekeeping of our computer network. Since

More information

Charter Business Desktop Security Administrator's Guide

Charter Business Desktop Security Administrator's Guide Charter Business Desktop Security Administrator's Guide Table of Contents Chapter 1: Introduction... 4 Chapter 2: Getting Started... 5 Creating a new user... 6 Recovering and changing your password...

More information

How to connect to VUWiFi

How to connect to VUWiFi Wireless Registration Instructions Windows XP How to connect to VUWiFi 1. The first step in setting up your wireless card for VUWiFi is to open your Network Connections window. You can find this by going

More information

Microsoft Security Essentials Installation and Configuration Guide

Microsoft Security Essentials Installation and Configuration Guide Microsoft Security Essentials Installation and Configuration Guide This installation guide is for users who are intending to download the software from Microsoft s web site. If you are not intending on

More information

Iridium Extreme TM Satellite Phone. Data Services Manual

Iridium Extreme TM Satellite Phone. Data Services Manual Iridium Extreme TM Satellite Phone Data Services Manual Table of Contents 1 OVERVIEW... 1 2 HOW IT WORKS... 1 3 BEFORE INSTALLING... 2 4 USB DRIVER INSTALLATION... 3 5 MODEM INSTALLATION AND CONFIGURATION...

More information

DIRECT INTERNET 3. Install Guide for the Windows 7 Operating System

DIRECT INTERNET 3. Install Guide for the Windows 7 Operating System DIRECT INTERNET 3 Install Guide for the Windows 7 Operating System Iridium Communications Inc. Rev. 1; October 15, 2010 Overview Iridium s Direct Internet Data Service allows customers to connect directly

More information

8x8 Virtual Office NetSuite Integration User Guide

8x8 Virtual Office NetSuite Integration User Guide 8x8 Virtual Office Version 1.3, July 2012 The Champion For Business Communications Table of Contents 8x8 Virtual Office NetSuite Integration...3 System Requirements...3 Uninstalling NetSuite Integration

More information

extranet.airproducts.com Windows XP Client Configuration

extranet.airproducts.com Windows XP Client Configuration extranet.airproducts.com Windows XP Client Configuration To successfully connect to the Air Products extranet.airproducts.com website and have full functionality, the client computer needs to have the

More information

CBH Provider EDI Browser Manual

CBH Provider EDI Browser Manual CBH Provider EDI Browser Manual Table of Contents PGP Software Installation Windows XP 2 PGP Software Installation Windows 7 9 Main Screen 16 Log In Screen 19 Report: Authorizations 21 Decryption Instructions

More information

http://downloadcenter.trendmicro.com/

http://downloadcenter.trendmicro.com/ Trend Micro Incorporated reserves the right to make changes to this document and to the product described herein without notice. Before installing and using the product, review the readme files, release

More information

Yale Software Library

Yale Software Library Yale Software Library http://www.yale.edu/its/software/ For assistance contact the ITS Help Desk 203-432-9000, helpdesk@yale.edu Two-factor authentication: Installation and configuration instructions for

More information

Getting Started with Symantec Endpoint Protection

Getting Started with Symantec Endpoint Protection Getting Started with Symantec Endpoint Protection 20983668 Getting Started with Symantec Endpoint Protection The software described in this book is furnished under a license agreement and may be used only

More information

2. Installation and System requirements

2. Installation and System requirements RELEASE NOTES F-Secure Anti-Virus for Windows Servers Version 9.00 build 333 Copyright 1993-2010 F-Secure Corporation. All Rights Reserved. Portions Copyright 2004 BackWeb Technologies Inc. This product

More information

Network Connect Installation and Usage Guide

Network Connect Installation and Usage Guide Network Connect Installation and Usage Guide I. Installing the Network Connect Client..2 II. Launching Network Connect from the Desktop.. 9 III. Launching Network Connect Pre-Windows Login 11 IV. Installing

More information

Symantec File Share Encryption Quick Start Guide Version 10.3

Symantec File Share Encryption Quick Start Guide Version 10.3 Symantec File Share Encryption Quick Start Guide Version 10.3 What is Symantec File Share Encryption? Symantec File Share Encryption is a software tool that provides multiple ways to protect and share

More information

Global VPN Client Getting Started Guide

Global VPN Client Getting Started Guide Global VPN Client Getting Started Guide PROTECTION AT THE SPEED OF BUSINESS Introduction The SonicWALL Global VPN Client creates a Virtual Private Network (VPN) connection between your computer and the

More information

Important Notes for WinConnect Server VS Software Installation:

Important Notes for WinConnect Server VS Software Installation: Important Notes for WinConnect Server VS Software Installation: 1. Only Windows Vista Business, Windows Vista Ultimate, Windows 7 Professional, Windows 7 Ultimate, Windows Server 2008 (32-bit & 64-bit),

More information

my.airproducts.com Windows Vista Client Configuration

my.airproducts.com Windows Vista Client Configuration my.airproducts.com Windows Vista Client Configuration To successfully connect to the Air Products my.airproducts.com website, the client computer needs to have the following three pieces of software installed

More information

XStream Remote Control: Configuring DCOM Connectivity

XStream Remote Control: Configuring DCOM Connectivity XStream Remote Control: Configuring DCOM Connectivity APPLICATION BRIEF March 2009 Summary The application running the graphical user interface of LeCroy Windows-based oscilloscopes is a COM Automation

More information

Best Practice Configurations for OfficeScan (OSCE) 10.6

Best Practice Configurations for OfficeScan (OSCE) 10.6 Best Practice Configurations for OfficeScan (OSCE) 10.6 Applying Latest Patch(es) for OSCE 10.6 To find out the latest patches for OfficeScan, click here. Enable Smart Clients 1. Ensure that Officescan

More information

Pearl Echo Installation Checklist

Pearl Echo Installation Checklist Pearl Echo Installation Checklist Use this checklist to enter critical installation and setup information that will be required to install Pearl Echo in your network. For detailed deployment instructions

More information

Net Protector Admin Console

Net Protector Admin Console Net Protector Admin Console USER MANUAL www.indiaantivirus.com -1. Introduction Admin Console is a Centralized Anti-Virus Control and Management. It helps the administrators of small and large office networks

More information

How To Use Secureanything On A Mac Or Ipad (For A Mac)

How To Use Secureanything On A Mac Or Ipad (For A Mac) User Guide for Mac OS X Copyright Webroot SecureAnywhere User Guide for Mac OS X March, 2013 2012-2013 Webroot Software, Inc. All rights reserved. Webroot is a registered trademark and SecureAnywhere is

More information

Quick Install Guide. Lumension Endpoint Management and Security Suite 7.1

Quick Install Guide. Lumension Endpoint Management and Security Suite 7.1 Quick Install Guide Lumension Endpoint Management and Security Suite 7.1 Lumension Endpoint Management and Security Suite - 2 - Notices Version Information Lumension Endpoint Management and Security Suite

More information

Windows Server 2003 x64 with Symantec AntiVirus 10 Corporate Edition

Windows Server 2003 x64 with Symantec AntiVirus 10 Corporate Edition NC State University 1 of 5 Windows Server 2003 x64 with Symantec AntiVirus 10 Corporate Edition home download free antivirus now windows server 2003 x64 with symantec antivirus 10 corporate edition CAUTION:

More information

How To Backup Your Computer With A Remote Drive Client On A Pc Or Macbook Or Macintosh (For Macintosh) On A Macbook (For Pc Or Ipa) On An Uniden (For Ipa Or Mac Macbook) On

How To Backup Your Computer With A Remote Drive Client On A Pc Or Macbook Or Macintosh (For Macintosh) On A Macbook (For Pc Or Ipa) On An Uniden (For Ipa Or Mac Macbook) On Remote Drive PC Client software User Guide -Page 1 of 27- PRIVACY, SECURITY AND PROPRIETARY RIGHTS NOTICE: The Remote Drive PC Client software is third party software that you can use to upload your files

More information

User Guide Online Backup

User Guide Online Backup User Guide Online Backup Table of contents Table of contents... 1 Introduction... 2 Adding the Online Backup Service to your Account... 2 Getting Started with the Online Backup Software... 4 Downloading

More information

WA1791 Designing and Developing Secure Web Services. Classroom Setup Guide. Web Age Solutions Inc. Web Age Solutions Inc. 1

WA1791 Designing and Developing Secure Web Services. Classroom Setup Guide. Web Age Solutions Inc. Web Age Solutions Inc. 1 WA1791 Designing and Developing Secure Web Services Classroom Setup Guide Web Age Solutions Inc. Web Age Solutions Inc. 1 Table of Contents Part 1 - Minimum Hardware Requirements...3 Part 2 - Minimum Software

More information

SSL VPN Service. Once you have installed the AnyConnect Secure Mobility Client, this document is available by clicking on the Help icon on the client.

SSL VPN Service. Once you have installed the AnyConnect Secure Mobility Client, this document is available by clicking on the Help icon on the client. Contents Introduction... 2 Prepare Work PC for Remote Desktop... 4 Add VPN url as a Trusted Site in Internet Explorer... 5 VPN Client Installation... 5 Starting the VPN Application... 6 Connect to Work

More information

Upgrading from MSDE to SQL Server 2005 Express Edition with Advanced Services SP2

Upgrading from MSDE to SQL Server 2005 Express Edition with Advanced Services SP2 Upgrading from MSDE to SQL Server 2005 Express Edition with Advanced Services SP2 Installation and Configuration Introduction This document will walk you step by step in removing MSDE and the setup and

More information

ATTENTION: End users should take note that Main Line Health has not verified within a Citrix

ATTENTION: End users should take note that Main Line Health has not verified within a Citrix Subject: Citrix Remote Access using PhoneFactor Authentication ATTENTION: End users should take note that Main Line Health has not verified within a Citrix environment the image quality of clinical cal

More information

McAfee Enterprise Edition v 7.1.0 Installation & Configuration For Windows NT, 2000, and XP

McAfee Enterprise Edition v 7.1.0 Installation & Configuration For Windows NT, 2000, and XP McAfee Enterprise Edition v 7.1.0 Installation & Configuration For Windows NT, 2000, and XP McAfee Enterprise Edition v 7.1.0: Installation & Configuration 1 McAfee Enterprise Edition v 7.1.0: Installation

More information

LANDesk Management Suite 9.0. Getting started with Patch Manager

LANDesk Management Suite 9.0. Getting started with Patch Manager LANDesk Management Suite 9.0 Getting started with Patch Manager DOWNLOAD PATCH CONTENT TO THE CORE SERVER INTRODUCTION This document is intended to assist LANDesk Management Suite administrators with implementing

More information

Configuring WPA2 for Windows XP

Configuring WPA2 for Windows XP Configuring WPA2 for Windows XP Requirements for wireless using WPA2 on Windows XP with Service Pack 2 Your wireless card must support 802.1x, AES, and WPA2. Windows XP with service pack 2, it is recommended

More information

How to Install a Network-Licensed Version of IBM SPSS Statistics 19

How to Install a Network-Licensed Version of IBM SPSS Statistics 19 How to Install a Network-Licensed Version of IBM SPSS Statistics 19 Important: IBM SPSS Statistics 19 requires either Windows XP Professional or later. IBM SPSS Statistics 19 installs from a DVD and your

More information

Basic Virus Removal Steps

Basic Virus Removal Steps Basic Virus Removal Steps The following are basic instructions on how to remove most virus and spyware that infect Windows XP/Vista computers. By providing these, we hope that users will be able to remove

More information

What is PC Matic?...4. System Requirements...4. Launching PC Matic.5. How to Purchase a PC Matic Subscription..6. Additional Installations.

What is PC Matic?...4. System Requirements...4. Launching PC Matic.5. How to Purchase a PC Matic Subscription..6. Additional Installations. USER Manual Table of Contents Getting Started What is PC Matic?...4 System Requirements....4 Launching PC Matic.5 How to Purchase a PC Matic Subscription..6 Additional Installations. 6 Registration...6

More information

STATISTICA VERSION 9 STATISTICA ENTERPRISE INSTALLATION INSTRUCTIONS FOR USE WITH TERMINAL SERVER

STATISTICA VERSION 9 STATISTICA ENTERPRISE INSTALLATION INSTRUCTIONS FOR USE WITH TERMINAL SERVER Notes: STATISTICA VERSION 9 STATISTICA ENTERPRISE INSTALLATION INSTRUCTIONS FOR USE WITH TERMINAL SERVER 1. These instructions focus on installation on Windows Terminal Server (WTS), but are applicable

More information

Bitdefender Internet Security 2015 User's Guide

Bitdefender Internet Security 2015 User's Guide USER'S GUIDE Bitdefender Internet Security 2015 User's Guide Publication date 10/16/2014 Copyright 2014 Bitdefender Legal Notice All rights reserved. No part of this book may be reproduced or transmitted

More information

IIS, FTP Server and Windows

IIS, FTP Server and Windows IIS, FTP Server and Windows The Objective: To setup, configure and test FTP server. Requirement: Any version of the Windows 2000 Server. FTP Windows s component. Internet Information Services, IIS. Steps:

More information

Global VPN Client Getting Started Guide

Global VPN Client Getting Started Guide Global VPN Client Getting Started Guide PROTECTION AT THE SPEED OF BUSINESS Introduction The SonicWALL Global VPN Client creates a Virtual Private Network (VPN) connection between your computer and the

More information

CANON FAX L360 SOFTWARE MANUAL

CANON FAX L360 SOFTWARE MANUAL CANON FAX L360 SOFTWARE MANUAL Before You Begin the Installation: a Checklist 2 To ensure a smooth and successful installation, take some time before you begin to plan and prepare for the installation

More information

Juniper NetScreen IPSec Dial Client. Installation Guide for Windows 2000 Windows XP Windows Vista

Juniper NetScreen IPSec Dial Client. Installation Guide for Windows 2000 Windows XP Windows Vista Juniper NetScreen IPSec Dial Client Installation Guide for Windows 2000 Windows XP Windows Vista Revision 2.0 NetScreen is a registered trademark of Juniper, Inc. Windows is a registered trademark of Microsoft

More information

McAfee Total Protection Service Installation Guide

McAfee Total Protection Service Installation Guide McAfee Total Protection Service Installation Guide COPYRIGHT Copyright 2009 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval

More information

SOS Suite Installation Guide

SOS Suite Installation Guide SOS Suite Installation Guide rev. 8/31/2010 Contents Overview Upgrading from SOS 2009 and Older Pre-Installation Recommendations Network Installations System Requirements Preparing for Installation Installing

More information

for Windows 7 Laplink Software, Inc. Quick Start Guide h t t p : / / w w w. l a p l i n k. c o m / h e l p MN-LLG-EN-15 (REV.

for Windows 7 Laplink Software, Inc. Quick Start Guide h t t p : / / w w w. l a p l i n k. c o m / h e l p MN-LLG-EN-15 (REV. 1 for Windows 7 Laplink Software, Inc. Customer Service/Technical Support: Web: http://www.laplink.com/help E-mail: CustomerService@laplink.com Laplink Software, Inc. 14335 NE 24th Street, Suite 201 Bellevue,

More information

Spector 360 Deployment Guide. Version 7

Spector 360 Deployment Guide. Version 7 Spector 360 Deployment Guide Version 7 December 11, 2009 Table of Contents Deployment Guide...1 Spector 360 DeploymentGuide... 1 Installing Spector 360... 3 Installing Spector 360 Servers (Details)...

More information

Recommended Settings for PACS HRS-d/eJacket via Remote Access

Recommended Settings for PACS HRS-d/eJacket via Remote Access The Main Line Health (MLH) system can be accessed through the Internet using the MLH Extranet Portal. The Extranet Portal gives users access to the MLH Intranet, PACS Horizon RadStation Distributed (HRS-d),

More information

User Guide Microsoft Exchange Remote Test Instructions

User Guide Microsoft Exchange Remote Test Instructions User Guide Microsoft Exchange Remote Test Instructions University of Louisville Information Technology 1.1 Who Should Use It This guide is intended for University of Louisville Faculty and Staff participating

More information

Brazosport College VPN Connection Installation and Setup Instructions. Draft 2 March 24, 2005

Brazosport College VPN Connection Installation and Setup Instructions. Draft 2 March 24, 2005 Brazosport College VPN Connection Installation and Setup Instructions Draft 2 March 24, 2005 Introduction This is an initial draft of these instructions. These instructions have been tested by the IT department

More information

InventoryControl for use with QuoteWerks Quick Start Guide

InventoryControl for use with QuoteWerks Quick Start Guide InventoryControl for use with QuoteWerks Quick Start Guide Copyright 2013 Wasp Barcode Technologies 1400 10 th St. Plano, TX 75074 All Rights Reserved STATEMENTS IN THIS DOCUMENT REGARDING THIRD PARTY

More information

Symantec Endpoint Protection Getting Started Guide

Symantec Endpoint Protection Getting Started Guide Symantec Endpoint Protection Getting Started Guide 12167130 Symantec Endpoint Protection Getting Started Guide The software described in this book is furnished under a license agreement and may be used

More information

AT&T Internet Security Suite - powered by McAfee. Installation Guide (for Customers with Existing Security Software)

AT&T Internet Security Suite - powered by McAfee. Installation Guide (for Customers with Existing Security Software) AT&T Internet Security Suite - powered by McAfee Installation Guide (for Customers with Existing Security Software) Contents 2 Contents Introduction 3 Chapters 1. Start Download Manager...4 2. Remove Incompatible

More information

ez Agent Administrator s Guide

ez Agent Administrator s Guide ez Agent Administrator s Guide Copyright This document is protected by the United States copyright laws, and is proprietary to Zscaler Inc. Copying, reproducing, integrating, translating, modifying, enhancing,

More information

Windows XP with Symantec AntiVirus 10 Corporate Edition

Windows XP with Symantec AntiVirus 10 Corporate Edition NC State University 1 of 7 Windows XP with Symantec AntiVirus 10 Corporate Edition home download free antivirus now windows xp with symantec antivirus 10 corporate edition Install SAV10 on Windows XP only

More information

Important Notes for WinConnect Server ES Software Installation:

Important Notes for WinConnect Server ES Software Installation: Important Notes for WinConnect Server ES Software Installation: 1. Only Windows 8/8.1 Enterprise, Windows 8/8.1 Professional (32-bit & 64-bit) or Windows Server 2012 (64-bit) or Windows Server 2012 Foundation

More information

Blackbaud FundWare Installation and Update Guide VERSION 7.60, JULY 2010

Blackbaud FundWare Installation and Update Guide VERSION 7.60, JULY 2010 Blackbaud FundWare Installation and Update Guide VERSION 7.60, JULY 2010 Blackbaud FundWare Installation and Update Guide USER GUIDE HISTORY Date Changes November 2000 June 2001 August 2001 January 2002

More information

Step-by-Step Guide to Securing Windows XP Professional with Service Pack 2 in Small and Medium Businesses

Step-by-Step Guide to Securing Windows XP Professional with Service Pack 2 in Small and Medium Businesses Step-by-Step Guide to Securing Windows XP Professional with Service Pack 2 in Small and Medium Businesses 2004 Microsoft Corporation. All rights reserved. This document is for informational purposes only.

More information

SecuraLive ULTIMATE SECURITY

SecuraLive ULTIMATE SECURITY SecuraLive ULTIMATE SECURITY Home Edition for Windows USER GUIDE SecuraLive ULTIMATE SECURITY USER MANUAL Introduction: Welcome to SecuraLive Ultimate Security Home Edition. SecuraLive Ultimate Security

More information

WARNING!!: Before installing Truecrypt encryption software on your

WARNING!!: Before installing Truecrypt encryption software on your Truecrypt installation and usage guide for Windows XP, 7, Vista and 8 WARNING!!: Before installing Truecrypt encryption software on your computer, you should create an Acronis image back up of your computer

More information

Manually Add Programs to Your Firewall or Anti-Virus Programs Trusted List. ZoneAlarm

Manually Add Programs to Your Firewall or Anti-Virus Programs Trusted List. ZoneAlarm Manually Add Programs to Your Firewall or Anti-Virus Programs Trusted List ZoneAlarm AVG Open the AVG Anti-Virus plus Firewall. Double-click the Firewall button to configure the Firewall. Add the programs

More information

Galveston College Wireless Network Users Setup Guide Version 1.0

Galveston College Wireless Network Users Setup Guide Version 1.0 Galveston College Wireless Network Users Setup Guide Version 1.0 TABLE OF CONTENT 1 DOCUMENT CONTROL RECORD... 3 2 ISSUE AND AMENDMENT RECORD... 3 3 GENERAL... 3 3.1 INTRODUCTION...3 3.2 OBJECTIVE... 3

More information

Frequently Asked Questions

Frequently Asked Questions Frequently Asked Questions 1) What does SkyBest Internet Guardian do? Prevents e-mail and image spam from reaching your inbox Halts access to dangerous Web pages Stops Web sites from installing dangerous

More information

Symantec Backup Exec System Recovery Exchange Retrieve Option User's Guide

Symantec Backup Exec System Recovery Exchange Retrieve Option User's Guide Symantec Backup Exec System Recovery Exchange Retrieve Option User's Guide Symantec Backup Exec System Recovery Exchange Retrieve Option User's Guide The software described in this book is furnished under

More information

AT&T Internet Security Suite - powered by McAfee. Installation Guide (for Clean Machine with No Anti-Virus Installed)

AT&T Internet Security Suite - powered by McAfee. Installation Guide (for Clean Machine with No Anti-Virus Installed) AT&T Internet Security Suite - powered by McAfee Installation Guide (for Clean Machine with No Anti-Virus Installed) Contents 2 Contents Introduction 3 Chapters 1. Start Download Manager...4 2. Select

More information

Topaz Installation Sheet

Topaz Installation Sheet Topaz Installation Sheet P/N 460924001E ISS 08FEB12 Content Introduction... 3 Recommended minimum requirements... 3 Setup for Internet Explorer:... 4 Topaz installation... 10 Technical support... 14 Copyright

More information

Quick Start Using DASYLab with your Measurement Computing USB device

Quick Start Using DASYLab with your Measurement Computing USB device Quick Start Using DASYLab with your Measurement Computing USB device Thank you for purchasing a USB data acquisition device from Measurement Computing Corporation (MCC). This Quick Start document contains

More information

F-Secure Client Security. Administrator's Guide

F-Secure Client Security. Administrator's Guide F-Secure Client Security Administrator's Guide F-Secure Client Security TOC 3 Contents Chapter 1: Introduction...9 System requirements...10 Policy Manager Server...10 Policy Manager Console...10 Main

More information

Getting Your Multifunction Back On Your Network After A Router Or Network Change

Getting Your Multifunction Back On Your Network After A Router Or Network Change Getting Your Multifunction Back On Your Network After A Router Or Network Change PIXMA MX860 Windows OS 1 If any of the following situations exist, you will need to Uninstall and Re-Install the MP Drivers

More information

Installation Instruction STATISTICA. Concurrent Network License with Borrowing Domain Based Registration

Installation Instruction STATISTICA. Concurrent Network License with Borrowing Domain Based Registration Installation Instruction STATISTICA Concurrent Network License with Borrowing Domain Based Registration Notes: ❶ The installation of the Concurrent network version entails two parts: a) a server installation,

More information

Installation Instruction STATISTICA Enterprise Small Business

Installation Instruction STATISTICA Enterprise Small Business Installation Instruction STATISTICA Enterprise Small Business Notes: ❶ The installation of STATISTICA Enterprise Small Business entails two parts: a) a server installation, and b) workstation installations

More information

STATISTICA VERSION 11 CONCURRENT NETWORK LICENSE WITH BORROWING INSTALLATION INSTRUCTIONS

STATISTICA VERSION 11 CONCURRENT NETWORK LICENSE WITH BORROWING INSTALLATION INSTRUCTIONS data analysis data mining quality improvement web-based analytics Notes STATISTICA VERSION 11 CONCURRENT NETWORK LICENSE WITH BORROWING INSTALLATION INSTRUCTIONS 1. The installation of the Concurrent network

More information

YSU Secure Wireless Connect Guide Windows XP Home/Professional/Media Center/Tablet PC Edition

YSU Secure Wireless Connect Guide Windows XP Home/Professional/Media Center/Tablet PC Edition YSU Secure Wireless Connect Guide Windows XP Home/Professional/Media Center/Tablet PC Edition Required Items: Windows XP Home, Professional, Media Center, or Tablet PC Edition Any 802.11b, g, b/g, or a/b/g

More information