V1.1. Installation and Administration Guide. September 2013

Size: px
Start display at page:

Download "V1.1. Installation and Administration Guide. September 2013"

Transcription

1 V1.1 Installation and Administration Guide September 2013

2 Condrey Corporation makes no representations or warranties with respect to the contents or use of this documentation, and specifically disclaims any express or implied warranties of merchantability or fitness for any particular purpose. Further, Condrey Corporation reserves the right to revise this publication and to make changes to its content, at any time, without obligation to notify any person or entity of such revisions or changes. Further, Condrey Corporation makes no representations or warranties with respect to any software, and specifically disclaims any express or implied warranties of merchantability or fitness for any particular purpose. Further, Condrey Corporation reserves the right to make changes to any and all parts of the software at any time, without obligation to notify any person or entity of such revisions or changes. See the Software EULA for full license and warranty information with regard to the Software. Any products or technical information provided under this Agreement may be subject to U.S. export controls and the trade laws of other countries. You agree to comply with all export control regulations and to obtain any required licenses or classification to export, re-export, or import deliverables. You agree not to export or re-export to entities on the current U.S. export exclusion lists or to any embargoed or terrorist countries as specified in the U.S. export laws. You agree to not use deliverables for prohibited nuclear, missile, or chemical biological weaponry end uses. Condrey Corporation assumes no responsibility for your failure to obtain any necessary export approvals. Copyright 2013 Condrey Corporation. All Rights Reserved. No part of this publication may be reproduced, photocopied, or transmitted in any fashion without the express written consent of the publisher. Condrey Corporation 125 The Parkway, Suite 500 Greenville, SC U.S.A.

3 Contents Chapter 1: How Groupsymmetry Works Overview Groupsymmetry Policies Automated Real-time Group Management Group Synchronization Product Benefits... 2 Chapter 2: Downloading and Licensing Groupsymmetry Downloading Groupsymmetry Licensing Overview Obtaining a Production License Obtaining an Evaluation License... 4 Chapter 3: Installing Groupsymmetry Overview of Groupsymmetry Components... 7 Event Monitor Service... 7 Engine Service... 7 Administration Operating System Requirements... 8 Windows Server 2012, 2008, or 2008 R2 (Member or DC Server)... 8 Windows 8 or 7 Workstation Supported Web Browsers Run the Installation Wizard Run the Setup Wizard Adding Groupsymmetry Administrators Installing in a Multi-Domain Environment Chapter 4: Managing Groupsymmetry Overview of Groupsymmetry Policies Create a Groupsymmetry Policy Import a Policy Edit a Groupsymmetry Policy View Events View Scheduled Group Synchronizations Access the Log Files Generate a Runtime Configuration Report Stop Processing Events View the Server Status Update the Product Replace the License File... 36

4 Chapter 5: Integrating Groupsymmetry with File System Factory for AD Disabling Users Creating an Inactive Users Group Groupsymmetry Policy Change the File System Factory for AD Policy Association Test the Associated Policies Appendix A: Groupsymmetry Policy Reference Appendix B: Constructed, Non-Replicated, and Linked Attributes Constructed Attributes (non-linked) Non-replicated Attributes (non-linked) Linked Attributes (constructed half): Appendix C: LDAP Query Examples Scenario Scenario Appendix D: XML Import Schema D1 XML Import Schema Example D2 Description of Settings and Variables... 59

5 Chapter 1: How Groupsymmetry Works 1.1 Overview Groupsymmetry automates Active Directory group memberships in real-time. Through Active Directory enacted policies, Groupsymmetry adds or deletes users, computers, or both to or from groups according to the specifications of the group-specific policy. 1.2 Groupsymmetry Policies Groupsymmetry policies are rules that specify the criteria for group membership inclusion or exclusion. Each group object in Active Directory is managed by an individual Groupsymmetry policy. Within the policy, you can specify the Active Directory Organizational Unit where the user or computer object must reside and optionally specify the Active Directory attribute settings that the group member must have. You can also specify which users or computers to always include and which to always exclude. 1

6 Once a Groupsymmetry policy has been defined for a group, you never need to manually add a user or computer to or remove a user or computer from the group. Those tasks are automated based on any of the following events: A new user or computer is created in Active Directory A user or computer is removed from Active Directory The user or computer attributes are modified The policy defined for the group is modified A user or computer is moved to another container in Active Directory 1.3 Automated Real-time Group Management During the installation, Groupsymmetry installs both an Event Monitor service and an Engine service. The Event Monitor service monitors Active Directory for events that could affect group membership. For example, a user object created in an Organizational Unit, or a user object attribute being changed. These events are reported to the Engine service which enacts changes to the membership of one or more groups based on the rules defined in the Groupsymmetry policies. 1.4 Group Synchronization When there are no events to trigger group membership updates automatically, you can use Groupsymmetry to synchronize group memberships either manually or as a regularly-scheduled event. 1.5 Product Benefits As dramatically as groups can simplify network administration, Groupsymmetry can simplify group administration by: Updating group membership in real-time through Active Directory events Synchronizing group membership either manually or through a scheduled synchronization Assuring that groups are always accurate and up to date Solving potential security risks by managing all security groups Eliminating the need to ever manually add or remove a user from a group 2

7 Chapter 2: Downloading and Licensing Groupsymmetry This section provides procedures for downloading the product, an overview of license types and procedures for obtaining and updating a license file. 2.1 Downloading Groupsymmetry 1. Visit 2. Click the Download button. 3. Click one of the following files: Groupsymmetry x86-xxx.msi (for installations on a 32-bit platform) Groupsymmetry x64-xxx.msi (for installations on a 64-bit platform) 4. Save the file to a location on your hard disk. 2.2 Licensing Overview Groupsymmetry has two license types: License Type Production Evaluation Intended Use Allows you to define Groupsymmetry policies for an unlimited number of groups. Allows you to define Groupsymmetry policies for up to ten groups for the 30-day life of the license. 2.3 Obtaining a Production License Once you have purchased Groupsymmetry, you are sent an message from the Condrey Corporation License Generator with an embedded link to the license file. 1. From the message, click the embedded link. 3

8 A screen similar to the following appears: 2. Right-click the license file, select Save Target As, then save the license file to a folder of your choice. 3. Note where the license file is saved. You need to retrieve the license during the Groupsymmetry installation. 2.4 Obtaining an Evaluation License 1. In a Web browser, go to 2. From the left side of the page, click Download. 3. Click the 30 Day Groupsymmetry Evaluation License link. A new Web page appears with registration fields for you to complete. 4. Complete the fields and click Submit. 4

9 An from the License Generator is automatically sent to you with an embedded link for accessing the license. 5. Click the link to access a new Web page with an embedded license file. 6. Right-click the license file, select Save Target As, then save the license file to a directory of your choice. 7. Note where the license is saved. You need to retrieve the license during the Groupsymmetry installation. 5

10 6

11 Chapter 3: Installing Groupsymmetry When you install Groupsymmetry, you install an Engine service and Event Monitor service on the same server. Once these two services have been installed, you perform administrative work through a standard Web browser. Note Groupsymmetry s default port setting (3031) does not conflict with other Condrey Corporation products. For example, you can host the Groupsymmetry Engine on the same server that is hosting the File System Factory for AD Engine. 3.1 Overview of Groupsymmetry Components Event Monitor Service The Event Monitor service monitors changes to Active Directory and informs the Engine Service when there has been a change to Active Directory. These changes are referred to as events in Active Directory and can include: A new user or computer object is created in Active Directory A user or computer object is removed from Active Directory A user or computer attribute is modified in Active Directory A user or computer is moved to another container in Active Directory Note The Event Monitor only detects events within the domain where it is installed. Engine Service Once the Engine service is notified by the Event Monitor service of an event, it determines if the event affects an Active Directory group object that is managed by a Groupsymmetry policy. If the group object is managed by a Groupsymmetry policy, then the Engine service takes any appropriate action by adding or removing group members. Note Both the Event Monitor service and the Engine service communicate with Active Directory and therefore, must be able to access a domain controller. Neither service however is required to be installed on a domain controller. You can install the two services on a computer that is a member of the domain, or on a domain controller. 7

12 Administration All Groupsymmetry administration is performed through a Web browser. The workstation running the Web browser must be able to access the appropriate port on the computer hosting the Engine service, which by default is port Operating System Requirements Install Groupsymmetry on one of the Windows environments below. Windows Server 2012, 2008, or 2008 R2 (Member or DC Server) Dual or quad core processor with minimum of 4GB of RAM Minimum of 500MB of available disk space Forest Functional Level 2003 in Native mode Windows 8 or 7 Workstation 64 bit operating system with minimum of 4 GB of RAM Minimum 500MB of available disk space Must be member of domain 3.3 Supported Web Browsers Groupsymmetry can be managed using any of the following Web browsers: Internet Explorer Firefox Safari Chrome 3.4 Run the Installation Wizard This first phase of the installation installs the Groupsymmetry Engine service and Event Monitor files. Afterwards, you complete the installation by running the Setup Wizard. Note Groupsymmetry uses only one Engine service and Event Monitor service per domain. Both services are installed together on a Windows server or workstation. Once installed, both the Engine service and Event Monitor service use port

13 Note These procedures apply to new installations and upgrades from Version At the Windows machine where you will host the Groupsymmetry Engine service and Event Monitor service, double-click one of the following installation files: Groupsymmetry x86-xxx.msi (32-bit platform) Groupsymmetry x64-xxx.msi (64-bit platform) An Introduction page appears in the Groupsymmetry Installation Wizard. 2. Read the text and click Next. 3. Accept the licensing terms and click Next. 4. Accept the installation path or indicate a new path by using the Browse button. To review possible locations, you can click Disk Usage to see all available volumes with disk size and disk availability data. 5. Click Next. 6. Click Install to begin the installation. 7. Click Finish. 8. Proceed with Run the Setup Wizard. If you are upgrading Groupsymmetry 1.0, you are prompted to restart the Groupsymmetry Engine Service to replace the old certificate with a new one. 9. (Conditional) click OK to restart the Engine Service. 3.5 Run the Setup Wizard Complete the Groupsymmetry installation by running the Setup Wizard using any standard Web browser. In the Setup Wizard you will: Upload the product license file Create a Groupsymmetry Proxy object Create a Groupsymmetry Proxy Rights Group Create a Groupsymmetry Administrators Group Make yourself a member of the Groupsymmetry Administrators Group Note You must be a member of the Domain Admins group in the domain where Groupsymmetry is installed to run the Setup Wizard. 9

14 1. Using a standard Web browser, enter the IP address or DNS name of the Windows machine where you installed the Groupsymmetry Engine service and Event Monitor service, followed by :3031. For example: The login page appears. 2. In the Username field, enter the username using either of the following syntaxes: Domain name followed by a backslash and username. For example: nvb\administrator Username followed by character followed by the domain name. For example: administrator@nvb Important If you are installing Groupsymmetry into a subdomain instead of the forest root, you will need to use the ID for the subdomain administrator rather than the administrator of the parent domain. 10

15 3. Enter the administrator password and click Login. Since this is the initial setup of Groupsymmetry, the Setup Wizard is launched automatically, where the first task in the setup is uploading the license file. 4. Click Browse to specify the location of the Groupsymmetry license file. 11

16 5. Click Upload File. The next task in the Setup Wizard is defining objects and rights in Active Directory so that Groupsymmetry can operate correctly. The following page appears displaying the default names for the Groupsymmetry proxy object, Proxy Rights Group, and Groupsymmetry Administrators Group. It also indicates that you will be added to the Groupsymmetry Administrators Group. 6. Accept the default names and the default settings. We recommend that you do not change any of the default names because if you need to work with a Condrey Corporation Support representative in the future, it will be much easier to locate the object and groups and then diagnose any problems. By adding yourself to the GroupsymmetryAdmins group you will be the only group member and therefore, the only user that can log in and perform administrative tasks. To authorize others to administer Groupsymmetry tasks, you will need to add them to the group. 12

17 7. Click Next. 8. Click Finish Wizard to complete the setup of Groupsymmetry. With the tasks completed in the Setup Wizard, you are now ready to define Groupsymmetry policies. Procedures for doing so are found in Chapter 4: Managing Groupsymmetry. 3.6 Adding Groupsymmetry Administrators With the GroupsymmetryAdmins group created, you should now add to the group all the users that you want to serve as Groupsymmetry administrators. 1. Launch Active Directory Users and Computers. 2. Open the GroupsymmetryAdmins group. 3. Add the users that will serve as Groupsymmetry administrators to the group. 13

18 3.7 Installing in a Multi-Domain Environment Groupsymmetry is engineered to manage groups only in the domain where the product is installed. In environments that have more than one domain within the same Active Directory forest, you can install a copy of Groupsymmetry in each domain. When multiple copies of Groupsymmetry are installed within the same forest, each copy will manage only those groups in the domain where it is installed. There is no interaction between the copies of Groupsymmetry and therefore, your individual installations and configuration settings will not conflict. 14

19 Chapter 4: Managing Groupsymmetry Once you have installed Groupsymmetry and run the Setup Wizard, you are ready to start operating the software. The Web browser-based administrative interface includes options for managing the operation of the product. This includes log management, license management, event management, and most importantly, policy management. 4.1 Overview of Groupsymmetry Policies Groupsymmetry policies are rules that specify the criteria for inclusion or exclusion from a group. Each group object in Active Directory can be managed by an individual Groupsymmetry policy. Each policy can be specific so that it applies only to users or computer objects in particular containers or users and computers with particular Active Directory attributes. You can also specify which users and computers to always include and which users to always exclude. 4.2 Create a Groupsymmetry Policy 1. Using a standard Web browser, enter the IP address of the Windows machine where you installed the Groupsymmetry Engine service and Event Monitor service, followed by :3031. For example: The login page appears. 2. In the Username field, enter the username using either of the following syntaxes: Domain name followed by a backslash and username. For example: nvb\administrator Username followed by character followed by the domain name. For example: administrator@nvb 15

20 3. Enter the administrator password and click Login. The following page appears. 16

21 4. From the Main menu, select Tree View. 17

22 5. In the Container field, use the arrows to navigate to the location of the group for which you want to create a Groupsymmetry policy. 6. From the Create/Edit column, click the Create link that pertains to the group for which you want to create a Groupsymmetry policy. 18

23 The following page appears. Note For an advanced discussion of Groupsymmetry policy configurations, refer to Appendix A: Groupsymmetry Policy Reference. 19

24 7. Do one of the following: Leave the Enabled check box selected to activate the Groupsymmetry policy once it has been saved. Deselect the Enabled check box to make the Groupsymmetry policy dormant until it is enabled. 8. Specify whether the policy is to apply user objects, computer objects, or both. 9. Do one of the following: Leave the Search Subcontainers check box selected to have Groupsymmetry search all specified containers in the Containers field, as well as any subcontainers. Deselect the Search Subcontainers check box to have Groupsymmetry search only the specified containers in the Containers field and not any subcontainers. 10. Begin the process of specifying the containers through which Groupsymmetry will search to find users, computers, or both for the group by clicking the Add button that corresponds to the Containers field. 11. From the page pictured above, select a container you want Groupsymmetry to search through to find users or computers to add as group members. You must place at least one container in the Container field. If you want Groupsymmetry to search the entire domain, you can select the root of the domain. 20

25 12. Repeat Steps 10 and 11 to specify each of the containers you want Groupsymmetry to search through. Important Specifying containers does not necessarily mean that the users or computers in those containers will be in the group. If you set additional specifications to the policy through the remaining fields of the page, the group membership will depend on those additional specifications as well. 13. (Optional) In the Query region of the page, do one of the following: Leave the Editor option selected to build the query using the drop-down menus and proceed with Step 14. Select the LDAP filter option to build the query using LDAP syntax and proceed with Step (Conditional) If you left the Editor option selected, in the Query region of the page, use the drop-down menu of LDAP attributes to select any user attribute with a setting that will differentiate the user from others and thus, add the user to the group. Attributes are listed according to their LDAP attribute name and not the Microsoft Active Directory attribute name. For a comparative attribute name list, click the question mark icon in the Query region of the page. 21

26 Important Because the useraccountcontrol attribute uses a complex series of bit flags, Condrey Corporation includes its own useraccountenabled pseudo-attribute which simplifies the designation of an enabled user using Boolean logic. a. From the second drop-down menu in the Query region, select the parameter you want. b. In the remaining field in the Query region, enter the applicable designation for the attribute and click Add. For example if your Groupsymmetry policy were to include a specification that all group members be enabled users, using the useraccountenabled pseudoattribute, you would type either True, Yes, or 1 in this field. Note Refer to Appendix A: Groupsymmetry Policy Reference for more advanced information on the settings in the Query region. 15. Repeat Step 14 to specify additional LDAP attributes for the group s membership. These additional specifications create a logical AND comparison to the original query, meaning that in order to become a member of the group, the user or computer object must meet the conditions of all queries in the policy. Important If your policy needs a logical OR comparison, you must use the LDAP filter option. 16. (Conditional) If you selected the LDAP filter option, in the LDAP Filter field, enter the syntax for the query. Note Refer to Appendix C: LDAP Query Examples for more information on LDAP queries. 17. (Optional) In the Include List region, use the Add button to list any specific users to include in the group. 22

27 18. (Optional) In the Exclude List region, use the Add button to list any specific users or computer objects to exclude from the group. Note Specifications in the Exclude List region override all other settings on the page. For example, if a user were to be included in the group based on an attribute setting, but excluded based on being listed in the Exclude List, the user would not be made a member of the group. Specifications in the Include List region override all settings on the page except for those in the Exclude List region. 19. (Conditional) Set the synchronization schedule. a. If you want the Engine service to synchronize groups at a time other than 12:00 AM, select the desired time from the Engine Local Time drop-down menu. b. If you want the Engine service to perform the first group synchronization on a date other than the one displayed, click the date in the field to access a calendar and select a new date. c. In the Schedule Recurrence region, specify the schedule for synchronization recurrence. 20. Click Preview to view the users, computers, or both that Groupsymmetry will add to the group, based on the specifications in the policy. An object name preceded by a + indicates that the objects will be added to the group. An object name preceded by a indicates that object will be removed from the group. An object name with no sign preceding it indicates that the object is already a member of the group and will remain in the group once the synchronization takes place. If the preview displays objects that you do not want included in the group, or it does not display objects that should be in the group, modify the specifications in the policy and click Preview again. 21. Save the Groupsymmetry policy by doing one of the following: Click Save to save the Groupsymmetry policy. The group sync will take place according to the scheduled recurrence. If no recurrence changes have been made, it will take place at midnight. Click Save and Sync to save the Groupsymmetry policy. When prompted if you want to immediately sync the group to which the Groupsymmetry policy applies, click Sync. 23

28 Note Syncing is the process of making the group conform to Groupsymmetry policy, which means adding or removing group members. 22. Verify that the Groupsymmetry policy is automating the group membership by creating a new user in Active Directory and placing the user in the container or giving the user the attributes that would include the member in the group. Important If the Query field lists any Active Directory constructed attributes, the group will not be synchronized in real-time and will require a scheduled or manual synchronization. That is because constructed attributes are not real attributes, but are calculated by Active Directory when queried. For a list all constructed attributes in Active Directory, refer to Appendix B: Constructed, Per-Replica, and Linked Attributes. 23. In Active Directory, verify that the new user has been made a member of the group. 4.3 Import a Policy The Policy Import option lets you import policies into Groupsymmetry from an XML source file. The XML file must be structured with the proper schema, including specifications for all Groupsymmetry policy settings. For more information on structuring the schema in the XML file, refer to Appendix D: XML Import Schema. In addition to creating policies, the Policy Import option can also create groups if they do not already exist, and then apply policies to those groups. Note You can use the Policy Import option to import policies from competitive group management systems by first exporting those third party policies to XML files. The Condrey Corporation Support team has developed a PowerShell conversion tool that converts CSV files to XML. To obtain this tool, contact Condrey Corporation Support at support@condreycorp.com. 24

29 1. From the Main menu, select Policy Import. 2. Click Browse. 3. Locate and select the XML file. The XML filename appears next to the Browse button. 4. Click Import. The policy is imported and a log file is created. 25

30 5. (Optional) Click the log file to view the details. 6. (Optional) View the imported policy details using the Policy Management option. 26

31 4.4 Edit a Groupsymmetry Policy Use the Policy Management page to edit a Groupsymmetry policy. 1. From the Main menu, select Policy Management. 2. In the Edit column, click the Groupsymmetry policy you want to edit. 27

32 The Policy Management page appears with all of the policy settings displayed. 3. Edit the settings and click Preview to verify that the new settings will update the group to meet your expectations. 28

33 4. Save the updated Groupsymmetry policy by doing one of the following: Click Save to save the Groupsymmetry policy. The group sync will take place according to the scheduled recurrence. If no recurrence changes have been made, it will take place at midnight. Click Save and Sync to save the Groupsymmetry policy and immediately sync the group to which the Groupsymmetry policy applies. 4.5 View Events Groupsymmetry lets you view Active Directory events that will affect groups managed by Groupsymmetry policies once the action is processed. For example, when a user attribute setting triggering membership in a particular group is changed to a new setting, the event will be listed momentarily on the Events page before Groupsymmetry takes any resulting action. In addition to Active Directory events, the Events page lists actions such as scheduled synchronizations. 1. From the Main menu, select Events. 29

34 2. (Conditional) If you want to abort the action before it takes place, click Abort. 4.6 View Scheduled Group Synchronizations You can see the synchronization schedule for all of the Groupsymmetry policies through the Scheduled Policies menu option. 1. From the Main menu, select Scheduled Policies. 2. View the scheduled synchronization information. 3. (Conditional) If you want to modify the schedule of a Groupsymmetry policy, do so through the Policy Management menu option. 4.7 Access the Log Files Groupsymmetry maintains a set of Engine and Synchronization log files. You will generally only need to access these log files when you working with a Condrey Corporation Support representative in diagnosing a problem. 30

35 1. From the Main menu, select Log Management. 2. From the Engine Logs or Synchronization Logs region, click the.log file you want to open or save. Note You must have an application such as Notepad or Wordpad associated with.log files to open log files directly from this page. 31

36 4.8 Generate a Runtime Configuration Report When working with a Condrey Corporation Support representative in diagnosing a problem, the representative might ask you to export a Runtime Configuration report. 1. From the Main menu, select View Runtime Configuration. 2. Click Run Export. This generates a configuration file that is listed on the page. 3. Click the name of the runtime configuration file and when prompted, specify whether to save or open the file. 4.9 Stop Processing Events You can stop processing events using the Stop Processing Events menu option. This prevents the Engine from changing Active Directory group memberships, including real-time and scheduled changes, until event processing is restarted. Events will queue up for the Engine after a restart, and may be managed in the Events interface (see Section 4.5). 32

37 1. From the Main menu, select Stop Processing Events. 2. In the field provided, indicate the reason you are stopping the Engine service. This message appears in the Event Status region of the Server Status page until the Engine service is restarted. 3. To restart processing events, click Start Processing Events from the Main menu. 33

38 4.10 View the Server Status The Server Status page provides general information such as the name of the Groupsymmetry Proxy object and the Admins group, along with status information pertaining to events, including whether events are currently being processed and the time the last event was received. 1. From the Main menu, select Server Status. 2. View the individual categories and status of each Update the Product The Check for Updates menu option not only indicates your version of Groupsymmetry and the most current version number of the product, it provides access to product updates. 1. From the Main menu, select Check for Updates. 34

39 2. Click the embedded link to the latest product version. 3. Select the version of.msi file that is applicable to your processor (either 64-bit or 32-bit). 4. Accept the terms of the Condrey Corporation disclaimer and export restrictions. 5. Save the file. 6. Double-click the.msi file. 7. When you are asked if you want to run this file, click Run. An Introduction page appears in the Groupsymmetry Installation Wizard. 8. Read the text and click Next. 9. Accept the licensing terms and click Next. 10. Accept the installation path or indicate a new path by using the Browse button. To review possible locations, you can click Disk Usage to see all available volumes with disk size and disk availability data. 35

40 11. Click Next. 12. Click Install to begin the installation. 13. Click Finish Replace the License File Replace your Groupsymmetry evaluation license or production license by following the procedures below. 1. From the Main menu, select Upload License. 2. Click Browse to specify the location of the Groupsymmetry license file. 3. Click Upload File. 36

41 Chapter 5: Integrating Groupsymmetry with File System Factory for AD For organizations that have deployed Condrey Corporation s File System Factory for Active Directory to manage their user home folders and group shares, Groupsymmetry can expand the capabilities of the File System Factory AD policies. This chapter includes one scenario and the corresponding procedures for integrating the two products together when a user account is disabled. As you work with Groupsymmetry, you may come up with many more scenarios on your own for integrating the two products. 5.1 Disabling Users A common practice with File System Factory customers is to create an Inactive Users policy associated to an Inactive Users container. When a user is disabled in Active Directory, the administrator moves the user to the Inactive Container. This initiates the actions of the policy which normally include moving the user s home folder from primary storage to the target path for inactive users and revoking the user s access rights. When you have both Groupsymmetry and File System Factory for AD, you can simplify this process by eliminating the need for the administrator to move a disabled user to the Inactive Users container. By simply disabling the user, Groupsymmetry views the updated attribute of the user and then automatically moves the user to an Inactive Users group. The File System Factory for AD policy, which is now associated with the Inactive Users group rather than the Inactive Users container, then moves the storage and disables the access rights. If the administrator later enables the user, the original group membership is restored and File System Factory for AD restores the home folder and access rights. Follow the procedures below to: Create an Inactive Users group Modify the existing Inactive Users File System Factory policy so it is associated with the new Inactive Users group Creating an Inactive Users Group Groupsymmetry Policy 1. Using Active Directory Users and Computers create a group object and name it Inactive Users. 2. Using a standard Web browser, enter the IP address of the Windows machine where you installed the Groupsymmetry Engine service and Event Monitor service, followed by :3031. For example: 37

42 The login page appears. 3. In the Username field, enter the username using either of the following syntaxes: Domain name followed by a backslash and username. For example: nvb\administrator Username followed by character followed by the domain name. For example: administrator@nvb 4. Enter the administrator password and click Login. 38

43 The following page appears. 39

44 5. From the Main menu, select Tree View. 6. In the Container field, use the arrow to navigate to the location of the Inactive Users group. 40

45 7. From the Create/Edit column, click the Create link that pertains to the Inactive Users group. 41

46 8. Leave the Enabled and Search Subcontainers check boxes selected. 9. Leave the Applies to objects of type setting to User. 10. Click the Add button that corresponds to the Containers field. 42

47 11. From the page pictured above, select the container you want Groupsymmetry to search through to find users to add as group members. You must place at least one container in the Container field. If you want Groupsymmetry to search the entire domain, you can select the root of the domain. 12. In the Query region of the page, use the drop-down menu of LDAP attributes to select the useraccountenabled attribute. 43

48 13. In the drop-down menu to the right, leave the Equal To setting and in the field to the right, type False. The Query region of the page should look like this. 14. In the Schedule region of the page, specify your Schedule Start and Schedule Recurrence settings. 15. Click Save Change the File System Factory for AD Policy Association In File System Factory for AD, when a user is moved manually in Active Directory from one container to the Inactive Users container, the File System Factory for AD Inactive Users policy can then automatically move the user home folder from primary storage to secondary storage and disables access rights. Now that you have created a Groupsymmetry Inactive Users policy, Groupsymmetry will automatically move disabled user accounts in Active Directory to the Inactive Users group. To associate the Groupsymmetry Inactive Users policy and the File System Factory for AD Inactive Users policy, you just need to edit some settings in the File System Factory for AD Inactive Users policy. Note If you do not already have a File System Factory for AD Inactive Users policy, refer to Section 4.8 Using a Policy to Manage Inactive Users in the File System Factory for AD Administration Guide. 1. Launch FSFAdmin. 2. When prompted, enter your username and password. 3. Click the Policy Management button. 4. Double-click the listed Inactive Users policy. 5. From the left pane, click Associations. 6. Highlight the path to the Inactive Users Organizational Unit and click Remove. 7. From the right pane, click Add. 8. Browse to the Inactive Users group that you created in Step 1 in Section 5.1.1, click Add and then OK. 44

49 9. Click OK and then close FSFAdmin Test the Associated Policies Now that the two Inactive User policies are associated, you should perform a test to see that everything is working to your satisfaction. 1. Using Active Directory Users and Computers, create a test user and wait for the events to process through File System Factory for AD. 2. Right-click a user and select Disable Account. 3. Double-click the disabled user and click the Member Of tab to verify that the user has been added to the Inactive Users group. 4. Click the Profile tab and in the To: field of the Home Folder region, view where the disabled user s home folder has been moved from primary storage to secondary storage. 5. Using Windows Explorer, locate the moved home folder, right-click it and select Properties. 6. Click the Security tab and in the upper pane, verify that the user has no rights to the home folder by viewing that the user disabled object is not listed. 7. Using Active Directory Users and Computers, right-click a user and select Disable Account. 45

50 46

51 Appendix A: Groupsymmetry Policy Reference This appendix is provided as a reference and as an advanced discussion on Groupsymmetry policies. All Groupsymmetry policies are configured through the page pictured below. A detailed discussion of all of the fields follows. 47

52 Enabled: This check box indicates if the Groupsymmetry policy is enabled and operational once it has been saved. By default, all Groupsymmetry policies are enabled unless this check box is deselected. Search Subcontainers: This check box indicates if the Groupsymmetry policy will search for users or computers in the subcontainers of the containers listed in the Containers field. For example, if this check box were selected, and one of the containers to search was the Atlanta Organizational Unit, Groupsymmetry would search not only the Atlanta container, but all containers within that container. This check box is selected by default, but you may want to deselect it to improve search performance when you know that the subcontainers contain no users you want to include. Applies to objects of type: For the group policy that you are creating, you can choose whether to have the policy apply to users, computers, or both. Containers: This field displays all of the Organizational Units in Active Directory that Groupsymmetry will search through to locate users or computers that meet the conditions of membership specified on the page. If you want Groupsymmetry to search all containers, you should list the domain rather than individual containers. To add a container, click the Add button that corresponds to the Containers field, browse to and select the container you want listed. To remove a listed container, select the container you want to remove and click Remove. Query: The Query region lets you specify the Active Directory attribute settings a user or computer must have to be a member of the group. To specify the attribute settings, you can use either the drop-down menus and field, or the LDAP Filter field 48

53 The drop-down menu on the left lets you select from all available Active Directory attributes, which are listed in their LDAP format. For your convenience the corresponding Friendly Attribute Names are available by clicking the question mark button below the word Query. 49

54 The drop-down menu in the middle lets you specify the LDAP argument you want for the attribute you selected in the left drop-down menu. For example, the Equal to argument means that the attribute must be equal to a certain value to be true. You specify that value by typing it in the field to the right. In the example below, the query is for all disabled user accounts. Once you have selected an attribute, argument, and entered a value, click the Add button to add the query in the field below. You can refine your search for group members by entering multiple queries. Be aware that unless a certain user or computer is specified in the Include List field, only users or computers that meet all of the query specifications will be added to the group. To remove a listed query, select the query you want to remove and click Remove. If you are familiar with writing LDAP queries manually, you can specify the query using the LDAP Filter field. Note For more information on LDAP queries, refer to Appendix C: LDAP Query Examples. Include List: This field lets you indicate specific users or computers to include in the group. This means that unless the user or computer is also listed in the Exclude List field, the user or computer will always be a member of the group whether the user or computer meets the specifications in the Query field or not. To add a user or computer, click the Add button, browse to and select the user or computer you want listed. To remove a listed user or computer, select the user or computer you want to remove and click Remove. Exclude List: This field lets you indicate specific users or computers to exclude from the group. This means that the user or computer will always be excluded from the group whether the user or computer is also listed in the Include List field or meets the specifications in the Query field. 50

55 To add a user or computer, click the Add button, browse to and select the user or computer you want listed. To remove a listed user or computer, select the user or computer you want to remove and click Remove. Engine Local Time: If you want the Engine service to synchronize groups at a time other than 12:00 AM, select the desired time from the drop-down menus. If you want the Engine service to perform the first group synchronization on a date other than the one displayed, click the date in the field to access a calendar and select a new date. Schedule Recurrence: Use this region to schedule the recurrence for synchronizations. Unless you specify Hourly, the synchronization takes place at the hour indicated in the Engine Local Time field. Preview: This button lets you view the changes that will take place to the group membership once the Groupsymmetry policy has been synced. If an object will be added, the object name will be preceded by a + sign. If a will be deleted, the object name will be preceded by a sign. 51

56 Save: This button saves the Groupsymmetry policy. If the Groupsymmetry policy does not include constructed attribute settings, the group membership will be updated in real-time. If the policy includes constructed attribute settings, the membership updates will not take place until a manual or scheduled sync. For more information on constructed attributes, see Appendix B: Constructed, Per-Replica, and Linked Attributes. Save and Sync: This button saves and syncs the Groupsymmetry policy. If the policy includes constructed attribute settings, you must save and sync the Groupsymmetry policy in order for the group membership changes to take place. Reset: This button removes any unsaved changes from the fields on the page. Cancel: This button closes the page without saving any of settings. 52

57 Appendix B: Constructed, Non-Replicated, and Linked Attributes Constructed attributes in Active Directory are unique in that they do not really exist in the directory database, but rather, are dynamically computed by the directory server only when an LDAP client requests to read the value of a constructed attribute. To compute these attribute values, Active Directory uses other attributes and sometimes other objects through a linkage arrangement. When linked to another attribute, the constructed attribute is also referred to as one half of a linked pair of attributes, or simply as a linked attribute. Non-replicated attributes have values that exist within the directory database in Active Directory, but their values do not get replicated to other domain controllers when their values change. As a result of this, every domain controller for a given domain may have different values for the same per-replica attribute on any given object. Since constructed, linked and non-replicated attributes do not get reported on by the DirSync LDAP Control that is used to monitor for changes to attribute values in Active Directory, any Groupsymmetry policies that include queries with constructed attribute settings cannot be reliably updated in real-time and updates to the group must be made through a manual or scheduled sync. To utilize the real-time management capabilities in Groupsymmetry, you should avoid constructed, linked and per-replica attribute queries in your Groupsymmetry policies. For your convenience, this appendix includes a list of constructed, per-replica, and linked attributes. Note If you have extended the Active Directory schema, there may be additional constructed, linked and non-replicated attributes that are not included in this list. Constructed Attributes (non-linked) allowedattributes allowedattributeseffective allowedchildclasses allowedchildclasseseffective canonicalname createtimestamp fromentry modifytimestamp msds-approx-immed-subordinates 53

58 msds-keyversionnumber msds-ncreplcursors msds-ncreplinboundneighbors msds-ncreploutboundneighbors msds-principalname msds-replattributemetadata msds-replvaluemetadata msds-resultantpso msds-revealedlistbl msds-user-account-control-computed msds-userpasswordexpirytimecomputed possibleinferiors sdrightseffective structuralobjectclass subschemasubentry tokengroups tokengroupsglobalanduniversal tokengroupsnogcacceptable Non-replicated Attributes (non-linked) badpasswordtime badpwdcount dscorepropagationdata distinguishedname lastlogoff lastlogon logoncount msds-cached-membership msds-cached-membership-time-stamp msds-nctype objectguid partialattributedeletionlist partialattributeset replpropertymetadata repluptodatevector 54

59 repsfrom repsto subrefs usnchanged usncreated usnlastobjrem whenchanged Linked Attributes (constructed half): bridgeheadserverlistbl directreports frsmemberreferencebl frscomputerreferencebl isprivilegeholder managedobjects masteredby memberof mscom-partitionsetlink mscom-userlink msdfsr-computerreferencebl msdfsr-memberreferencebl msds-authenticatedtoaccountlist msds-isdomainfor msds-isfullreplicafor msds-ispartialreplicafor msds-krbtgtlinkbl msds-membersforazrolebl msds-nc-ro-replica-locations-bl msds-nonmembersbl msds-objectreferencebl msds-operationsforazrolebl msds-operationsforaztaskbl msds-psoapplied msds-revealeddsas msds-tasksforazrolebl 55

60 msds-tasksforaztaskbl msds-masteredby mssfu30posixmemberof netbootscpbl nonsecuritymemberbl ownerbl querypolicybl serverreferencebl siteobjectbl 56

61 Appendix C: LDAP Query Examples Groupsymmetry supports Lightweight Directory Access Protocol (LDAP) queries which you can specify in the LDAP Filter field of the policy page. The operators for LDAP queries are the characters in the left column of the table below. LDAP Argument Logical Representation = EQUAL TO & AND! NOT * wildcard OR ( Beginning of grouping ) End of grouping Note For a more complete explanation of LDAP queries, refer to LDAP Query Basics from Microsoft TechNet. The following scenarios might be helpful to you in developing LDAP queries. Scenario 1 The administrator of a school district needs to manage a select group of students. The criteria for group membership are as follows: The group member must be in Grade 11 or Grade 12 according to the Description attribute. The group member s Title attribute must be Yearbook Student Staff or at least Yearbook. Or the group member must be a member of the group Yearbook Faculty. First, you need a query that meets the first criterion of the user being in Grade 11 or Grade 12. The school district stores each user s grade level in the Description attribute, so the query would be as follows: ( (Description=Grade 11)(Description=Grade 12)) Notice that the groupings keep attributes and values tied together following the logical OR. 57

62 Next, you need to add the criterion that states that the student must have a Title of Yearbook*. Then you need to include the logical AND to the first query. (&( ((Description=Grade 11)(Description=Grade 12))(Title=Yearbook*))) Lastly, you need to add the logical OR stating pertaining to the user being a member of the group Yearbook Faculty. ( (&( (Description=Grade 11)(Description=Grade 12)(Title=Yearbook*)))(memberof=cn=yearbook faculty,ou=fchs,dc=domian,dc=local)) Note Because memberof is a linked attribute, this group would not be updated when users are added to the Yearbook Faculty group, but the group would by updated following a manual or scheduled synch. Scenario 2 The organization needs to keep an outside sales distribution group up to date with all sales individuals from all categories who do not have physicaldeliveryofficename set in Active Directory. (&( (title=*sales*)(description=*sales*)(department=*sales*))((mail=*) (!physicaldeliveryofficename=*)) The first part of the query includes a logical OR statement to gather all users that have a title, description, or department containing the word Sales. The second part of the query includes a logical AND to only include the individuals that meet the first criterion, have their address set, and do not have the physicaldeliveryofficename attribute set in Active Directory. 58

63 Appendix D: XML Import Schema You can import policies into Groupsymmetry, provided that the schema is structured properly. A properly structured XML schema appears below. D1 XML Import Schema Example <?xml version="1.0" encoding="utf-8"?> <Policies> <Policy GroupSAM="Demo" Description="Demo Description" LDAPQueryString="(company=Demo)" UseLDAPFilter="1" Enabled="1" ContainerSearchFlags="2" GroupFDN="optional FDN" GroupType="9" ObjectTypes= 1 > <Containers> <Container fdn="ou=demo container,dc=demo,dc=local" /> </Containers> <QueryRules> <QueryRule attribute="company" operator="0" value="demo" /> </QueryRules> <Includes> <Include fdn="cn=demo_user,ou=demo container,dc=demo,dc=local"/> </Includes> <Excludes> <Exclude fdn="cn=demo_user2,ou=demo container,dc=demo,dc=local" /> </Excludes> <Schedule enabled="0" recurrence="2" description="demo group" /> </Policy> </Policies> D2 Description of Settings and Variables Header Fields Description Value Type GroupSAM SAMAccountName of the group Single Valued Required True Description This description can be anything in plain text. (limited to * characters) Single Valued False ObjectTypes Determines the object types that you want to be queried. Defaults to (1) User. Single Valued False (1) User (2) Computer (3) Both 59

Installation Guide. Novell Storage Manager 3.1.1 for Active Directory. Novell Storage Manager 3.1.1 for Active Directory Installation Guide

Installation Guide. Novell Storage Manager 3.1.1 for Active Directory. Novell Storage Manager 3.1.1 for Active Directory Installation Guide Novell Storage Manager 3.1.1 for Active Directory Installation Guide www.novell.com/documentation Installation Guide Novell Storage Manager 3.1.1 for Active Directory October 17, 2013 Legal Notices Condrey

More information

Aurora. Version 1.0. Installation and Administration Guide. June 2012

Aurora. Version 1.0. Installation and Administration Guide. June 2012 Aurora Version 1.0 Installation and Administration Guide June 2012 Condrey Corporation makes no representations or warranties with respect to the contents or use of this documentation, and specifically

More information

How To Manage Storage With Novell Storage Manager 3.X For Active Directory

How To Manage Storage With Novell Storage Manager 3.X For Active Directory www.novell.com/documentation Installation Guide Novell Storage Manager 4.1 for Active Directory September 10, 2015 Legal Notices Condrey Corporation makes no representations or warranties with respect

More information

For Active Directory Installation Guide

For Active Directory Installation Guide For Active Directory Installation Guide Version 2.5.2 April 2010 Copyright 2010 Legal Notices makes no representations or warranties with respect to the contents or use of this documentation, and specifically

More information

Administration Guide. Novell Storage Manager 3.1.1 for Active Directory. Novell Storage Manager 3.1.1 for Active Directory Administration Guide

Administration Guide. Novell Storage Manager 3.1.1 for Active Directory. Novell Storage Manager 3.1.1 for Active Directory Administration Guide Novell Storage Manager 3.1.1 for Active Directory Administration Guide www.novell.com/documentation Administration Guide Novell Storage Manager 3.1.1 for Active Directory October 17, 2013 Legal Notices

More information

Server Installation Guide ZENworks Patch Management 6.4 SP2

Server Installation Guide ZENworks Patch Management 6.4 SP2 Server Installation Guide ZENworks Patch Management 6.4 SP2 02_016N 6.4SP2 Server Installation Guide - 2 - Notices Version Information ZENworks Patch Management Server Installation Guide - ZENworks Patch

More information

ATT8367-Novell GroupWise 2014 and the Directory Labs

ATT8367-Novell GroupWise 2014 and the Directory Labs ATT8367-Novell GroupWise 2014 and the Directory Labs ATT8367 Novell Training Services AUTHORIZED COURSEWARE www.novell.com Legal Notices Novell, Inc., makes no representations or warranties with respect

More information

Installation and Configuration Guide

Installation and Configuration Guide www.novell.com/documentation Installation and Configuration Guide GroupWise Coexistence Solution for Exchange November 2015 Legal Notices Novell, Inc., makes no representations or warranties with respect

More information

Audit Management Reference

Audit Management Reference www.novell.com/documentation Audit Management Reference ZENworks 11 Support Pack 3 February 2014 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of

More information

SSL Management Reference

SSL Management Reference www.novell.com/documentation SSL Management Reference ZENworks 11 Support Pack 4 July 2015 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of this

More information

www.novell.com/documentation Server Installation ZENworks Mobile Management 2.7.x August 2013

www.novell.com/documentation Server Installation ZENworks Mobile Management 2.7.x August 2013 www.novell.com/documentation Server Installation ZENworks Mobile Management 2.7.x August 2013 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of this

More information

NetIQ Sentinel 7.0.1 Quick Start Guide

NetIQ Sentinel 7.0.1 Quick Start Guide NetIQ Sentinel 7.0.1 Quick Start Guide April 2012 Getting Started Use the following information to get Sentinel installed and running quickly. Meeting System Requirements on page 1 Installing Sentinel

More information

Generating an Apple Push Notification Service Certificate

Generating an Apple Push Notification Service Certificate www.novell.com/documentation Generating an Apple Push Notification Service Certificate ZENworks Mobile Management 2.6.x January 2013 Legal Notices Novell, Inc., makes no representations or warranties with

More information

Web Application User Guide

Web Application User Guide www.novell.com/documentation Web Application User Guide Filr 1.2 November 2015 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of this documentation,

More information

Administration Quick Start

Administration Quick Start www.novell.com/documentation Administration Quick Start ZENworks 11 Support Pack 3 February 2014 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of

More information

Novell ZENworks 10 Configuration Management SP3

Novell ZENworks 10 Configuration Management SP3 AUTHORIZED DOCUMENTATION Software Distribution Reference Novell ZENworks 10 Configuration Management SP3 10.3 November 17, 2011 www.novell.com Legal Notices Novell, Inc., makes no representations or warranties

More information

High Availability Configuration

High Availability Configuration www.novell.com/documentation High Availability Configuration ZENworks Mobile Management 3.2.x September 2015 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents

More information

Mobile App Quick Start

Mobile App Quick Start www.novell.com/documentation Mobile App Quick Start Service Desk Mobile App 1.0 November 2013 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of this

More information

Android App User Guide

Android App User Guide www.novell.com/documentation Android App User Guide ZENworks Mobile Management 2.7.x August 2013 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of

More information

Novell Identity Manager

Novell Identity Manager Password Management Guide AUTHORIZED DOCUMENTATION Novell Identity Manager 3.6.1 June 05, 2009 www.novell.com Identity Manager 3.6.1 Password Management Guide Legal Notices Novell, Inc. makes no representations

More information

Web Application User Guide

Web Application User Guide www.novell.com/documentation Web Application User Guide Filr 1.1 January 2015 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of this documentation,

More information

Novell Open Workgroup Suite Small Business Edition Helpdesk

Novell Open Workgroup Suite Small Business Edition Helpdesk Administration Guide AUTHORIZED DOCUMENTATION Novell Open Workgroup Suite Small Business Edition Helpdesk 2.5 June 1, 2009 www.novell.com Helpdesk Administration Guide Legal Notices Novell, Inc. makes

More information

www.novell.com/documentation Jobs Guide Identity Manager 4.0.1 February 10, 2012

www.novell.com/documentation Jobs Guide Identity Manager 4.0.1 February 10, 2012 www.novell.com/documentation Jobs Guide Identity Manager 4.0.1 February 10, 2012 Legal Notices Novell, Inc. makes no representations or warranties with respect to the contents or use of this documentation,

More information

Installation and Administration Guide Microsoft Active Directory. May 2012

Installation and Administration Guide Microsoft Active Directory. May 2012 Installation and Administration Guide Microsoft Active Directory May 2012 Condrey Corporation makes no representations or warranties with respect to the contents or use of this documentation, and specifically

More information

Password Management Guide

Password Management Guide www.novell.com/documentation Management Guide Identity Manager 4.0.2 June 2012 Legal Notices Novell, Inc. makes no representations or warranties with respect to the contents or use of this documentation,

More information

System Administration Guide

System Administration Guide www.novell.com/documentation System Administration Guide Data Synchronizer 1.2 August 22, 2012 Legal Notices Novell, Inc. makes no representations or warranties with respect to the contents or use of this

More information

www.novell.com/documentation Administration Guide Novell Filr 1.0.1 May 2014

www.novell.com/documentation Administration Guide Novell Filr 1.0.1 May 2014 www.novell.com/documentation Administration Guide Novell Filr 1.0.1 May 2014 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of this documentation,

More information

WebSpy Vantage Ultimate 2.2 Web Module Administrators Guide

WebSpy Vantage Ultimate 2.2 Web Module Administrators Guide WebSpy Vantage Ultimate 2.2 Web Module Administrators Guide This document is intended to help you get started using WebSpy Vantage Ultimate and the Web Module. For more detailed information, please see

More information

Integration Guide. SafeNet Authentication Service. Integrating Active Directory Lightweight Services

Integration Guide. SafeNet Authentication Service. Integrating Active Directory Lightweight Services SafeNet Authentication Service Integration Guide Technical Manual Template Release 1.0, PN: 000-000000-000, Rev. A, March 2013, Copyright 2013 SafeNet, Inc. All rights reserved. 1 Document Information

More information

Novell Identity Manager

Novell Identity Manager AUTHORIZED DOCUMENTATION Manual Task Service Driver Implementation Guide Novell Identity Manager 4.0.1 April 15, 2011 www.novell.com Legal Notices Novell, Inc. makes no representations or warranties with

More information

Interworks. Interworks Cloud Platform Installation Guide

Interworks. Interworks Cloud Platform Installation Guide Interworks Interworks Cloud Platform Installation Guide Published: March, 2014 This document contains information proprietary to Interworks and its receipt or possession does not convey any rights to reproduce,

More information

SMART Vantage. Installation guide

SMART Vantage. Installation guide SMART Vantage Installation guide Product registration If you register your SMART product, we ll notify you of new features and software upgrades. Register online at smarttech.com/registration. Keep the

More information

Deploying System Center 2012 R2 Configuration Manager

Deploying System Center 2012 R2 Configuration Manager Deploying System Center 2012 R2 Configuration Manager This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED, OR STATUTORY, AS TO THE INFORMATION IN THIS DOCUMENT.

More information

User Guide. DocAve Lotus Notes Migrator for Microsoft Exchange 1.1. Using the DocAve Notes Migrator for Exchange to Perform a Basic Migration

User Guide. DocAve Lotus Notes Migrator for Microsoft Exchange 1.1. Using the DocAve Notes Migrator for Exchange to Perform a Basic Migration User Guide DocAve Lotus Notes Migrator for Microsoft Exchange 1.1 Using the DocAve Notes Migrator for Exchange to Perform a Basic Migration This document is intended for anyone wishing to familiarize themselves

More information

www.novell.com/documentation Administration Guide GroupWise Mobility Service 2.1 February 2015

www.novell.com/documentation Administration Guide GroupWise Mobility Service 2.1 February 2015 www.novell.com/documentation Administration Guide GroupWise Mobility Service 2.1 February 2015 Legal Notices Novell, Inc. makes no representations or warranties with respect to the contents or use of this

More information

NetIQ Operations Center 5: The Best IT Management Tool in the World Lab

NetIQ Operations Center 5: The Best IT Management Tool in the World Lab NetIQ Operations Center 5: The Best IT Management Tool in the World Lab NIQ08 Novell Training Services ATT LIVE 2012 LAS VEGAS www.novell.com Legal Notices Novell, Inc., makes no representations or warranties

More information

Migrating MSDE to Microsoft SQL 2008 R2 Express

Migrating MSDE to Microsoft SQL 2008 R2 Express How To Updated: 11/11/2011 2011 Shelby Systems, Inc. All Rights Reserved Other brand and product names are trademarks or registered trademarks of the respective holders. If you are still on MSDE 2000,

More information

Novell Access Manager

Novell Access Manager J2EE Agent Guide AUTHORIZED DOCUMENTATION Novell Access Manager 3.1 SP3 February 02, 2011 www.novell.com Novell Access Manager 3.1 SP3 J2EE Agent Guide Legal Notices Novell, Inc., makes no representations

More information

System Planning, Deployment, and Best Practices Guide

System Planning, Deployment, and Best Practices Guide www.novell.com/documentation System Planning, Deployment, and Best Practices Guide ZENworks Application Virtualization 9.0 February 22, 2012 Legal Notices Novell, Inc., makes no representations or warranties

More information

www.novell.com/documentation Administration Guide Modular Authentication Services (NMAS) 3.3.4 April 2013

www.novell.com/documentation Administration Guide Modular Authentication Services (NMAS) 3.3.4 April 2013 www.novell.com/documentation Administration Guide Modular Authentication Services (NMAS) 3.3.4 April 2013 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents

More information

www.novell.com/documentation Administration Guide Messenger 3.0 February 2015

www.novell.com/documentation Administration Guide Messenger 3.0 February 2015 www.novell.com/documentation Administration Guide Messenger 3.0 February 2015 Legal Notices Novell, Inc. makes no representations or warranties with respect to the contents or use of this documentation,

More information

Configuring File Servers and Active Directory with Domain Services for Windows-Lab

Configuring File Servers and Active Directory with Domain Services for Windows-Lab Configuring File Servers and Active Directory with Domain Services for Windows-Lab OES11 Novell Training Services ATT LIVE 2012 LAS VEGAS www.novell.com Legal Notices Novell, Inc., makes no representations

More information

Sage 200 Web Time & Expenses Guide

Sage 200 Web Time & Expenses Guide Sage 200 Web Time & Expenses Guide Sage (UK) Limited Copyright Statement Sage (UK) Limited, 2006. All rights reserved If this documentation includes advice or information relating to any matter other than

More information

SC-T35/SC-T45/SC-T46/SC-T47 ViewSonic Device Manager User Guide

SC-T35/SC-T45/SC-T46/SC-T47 ViewSonic Device Manager User Guide SC-T35/SC-T45/SC-T46/SC-T47 ViewSonic Device Manager User Guide Copyright and Trademark Statements 2014 ViewSonic Computer Corp. All rights reserved. This document contains proprietary information that

More information

XenClient Enterprise Synchronizer Installation Guide

XenClient Enterprise Synchronizer Installation Guide XenClient Enterprise Synchronizer Installation Guide Version 5.1.0 March 26, 2014 Table of Contents About this Guide...3 Hardware, Software and Browser Requirements...3 BIOS Settings...4 Adding Hyper-V

More information

Installation and Configuration Guide

Installation and Configuration Guide www.novell.com/documentation Installation and Configuration Guide GroupWise Coexistence Solution for Exchange August 2014 Legal Notices Novell, Inc., makes no representations or warranties with respect

More information

Quest ChangeAuditor 5.1 FOR ACTIVE DIRECTORY. User Guide

Quest ChangeAuditor 5.1 FOR ACTIVE DIRECTORY. User Guide Quest ChangeAuditor FOR ACTIVE DIRECTORY 5.1 User Guide Copyright Quest Software, Inc. 2010. All rights reserved. This guide contains proprietary information protected by copyright. The software described

More information

Certificate Management

Certificate Management www.novell.com/documentation Certificate Management ZENworks Mobile Management 3.1.x August 2015 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of

More information

Installation Guide for Pulse on Windows Server 2012

Installation Guide for Pulse on Windows Server 2012 MadCap Software Installation Guide for Pulse on Windows Server 2012 Pulse Copyright 2014 MadCap Software. All rights reserved. Information in this document is subject to change without notice. The software

More information

www.novell.com/documentation Administration Guide Messenger 2.2 July 30, 2013

www.novell.com/documentation Administration Guide Messenger 2.2 July 30, 2013 www.novell.com/documentation Administration Guide Messenger 2.2 July 30, 2013 Legal Notices Novell, Inc. makes no representations or warranties with respect to the contents or use of this documentation,

More information

www.novell.com/documentation Policy Guide Access Manager 3.1 SP5 January 2013

www.novell.com/documentation Policy Guide Access Manager 3.1 SP5 January 2013 www.novell.com/documentation Policy Guide Access Manager 3.1 SP5 January 2013 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of this documentation,

More information

VMware Identity Manager Administration

VMware Identity Manager Administration VMware Identity Manager Administration VMware Identity Manager 2.4 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new

More information

Novell SUSE Linux Enterprise Virtual Machine Driver Pack

Novell SUSE Linux Enterprise Virtual Machine Driver Pack SLES 10 Virtual Machine Drivers for Windows on Xen Novell SUSE Linux Enterprise Virtual Machine Driver Pack 10 September 10, 2007 SUSE DRIVERS FOR WINDOWS* ON XEN* www.novell.com Legal Notices Novell,

More information

Installing and Configuring vcloud Connector

Installing and Configuring vcloud Connector Installing and Configuring vcloud Connector vcloud Connector 2.7.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new

More information

Bosch ReadykeyPRO Unlimited Installation Guide, product version 6.5. This guide is item number DOC-110-2-029, revision 2.029, May 2012.

Bosch ReadykeyPRO Unlimited Installation Guide, product version 6.5. This guide is item number DOC-110-2-029, revision 2.029, May 2012. Bosch ReadykeyPRO Unlimited Installation Guide, product version 6.5. This guide is item number DOC-110-2-029, revision 2.029, May 2012. Copyright 1995-2012 Lenel Systems International, Inc. Information

More information

Installation Guide for Pulse on Windows Server 2008R2

Installation Guide for Pulse on Windows Server 2008R2 MadCap Software Installation Guide for Pulse on Windows Server 2008R2 Pulse Copyright 2014 MadCap Software. All rights reserved. Information in this document is subject to change without notice. The software

More information

Portions of this product were created using LEADTOOLS 1991-2009 LEAD Technologies, Inc. ALL RIGHTS RESERVED.

Portions of this product were created using LEADTOOLS 1991-2009 LEAD Technologies, Inc. ALL RIGHTS RESERVED. Installation Guide Lenel OnGuard 2009 Installation Guide, product version 6.3. This guide is item number DOC-110, revision 1.038, May 2009 Copyright 1992-2009 Lenel Systems International, Inc. Information

More information

Lepide Event Log Manager. Users Help Manual. Lepide Event Log Manager. Lepide Software Private Limited. Page 1

Lepide Event Log Manager. Users Help Manual. Lepide Event Log Manager. Lepide Software Private Limited. Page 1 Users Help Manual Lepide Event Log Manager Lepide Software Private Limited. Page 1 Users Help Manual for Lepide Event Log Manager Lepide Software Private Limited, All Rights Reserved This User Guide and

More information

VMware Mirage Web Manager Guide

VMware Mirage Web Manager Guide Mirage 5.1 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of this document,

More information

F-Secure Messaging Security Gateway. Deployment Guide

F-Secure Messaging Security Gateway. Deployment Guide F-Secure Messaging Security Gateway Deployment Guide TOC F-Secure Messaging Security Gateway Contents Chapter 1: Deploying F-Secure Messaging Security Gateway...3 1.1 The typical product deployment model...4

More information

Installing Samsung SDS CellWe EMM cloud connectors and administrator consoles

Installing Samsung SDS CellWe EMM cloud connectors and administrator consoles Appendix 1 Installing Samsung SDS CellWe EMM cloud connectors and administrator consoles This section explains how you use the Cloud Management Suite installation wizard for the following purposes: To

More information

Point of Sale 2015 Enterprise. Installation Guide

Point of Sale 2015 Enterprise. Installation Guide Point of Sale 2015 Enterprise Installation Guide Contents About this guide 3 System Requirements - Microsoft SQL Server 2008 R2 Express 3 System Requirements - POS Enterprise 2015 (Administrator) 3 System

More information

Synchronizer Installation

Synchronizer Installation Synchronizer Installation Synchronizer Installation Synchronizer Installation This document provides instructions for installing Synchronizer. Synchronizer performs all the administrative tasks for XenClient

More information

Installation & Configuration Guide

Installation & Configuration Guide Installation & Configuration Guide Bluebeam Studio Enterprise ( Software ) 2014 Bluebeam Software, Inc. All Rights Reserved. Patents Pending in the U.S. and/or other countries. Bluebeam and Revu are trademarks

More information

Table of Contents. CHAPTER 1 About This Guide... 9. CHAPTER 2 Introduction... 11. CHAPTER 3 Database Backup and Restoration... 15

Table of Contents. CHAPTER 1 About This Guide... 9. CHAPTER 2 Introduction... 11. CHAPTER 3 Database Backup and Restoration... 15 Table of Contents CHAPTER 1 About This Guide......................... 9 The Installation Guides....................................... 10 CHAPTER 2 Introduction............................ 11 Required

More information

Software Distribution Reference

Software Distribution Reference www.novell.com/documentation Software Distribution Reference ZENworks 11 Support Pack 3 July 2014 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use

More information

2 Downloading Access Manager 3.1 SP4 IR1

2 Downloading Access Manager 3.1 SP4 IR1 Novell Access Manager 3.1 SP4 IR1 Readme May 2012 Novell This Readme describes the Novell Access Manager 3.1 SP4 IR1 release. Section 1, Documentation, on page 1 Section 2, Downloading Access Manager 3.1

More information

DESLock+ Basic Setup Guide Version 1.20, rev: June 9th 2014

DESLock+ Basic Setup Guide Version 1.20, rev: June 9th 2014 DESLock+ Basic Setup Guide Version 1.20, rev: June 9th 2014 Contents Overview... 2 System requirements:... 2 Before installing... 3 Download and installation... 3 Configure DESLock+ Enterprise Server...

More information

WhatsUp Gold v16.2 Installation and Configuration Guide

WhatsUp Gold v16.2 Installation and Configuration Guide WhatsUp Gold v16.2 Installation and Configuration Guide Contents Installing and Configuring Ipswitch WhatsUp Gold v16.2 using WhatsUp Setup Installing WhatsUp Gold using WhatsUp Setup... 1 Security guidelines

More information

User Source and Authentication Reference

User Source and Authentication Reference User Source and Authentication Reference ZENworks 11 www.novell.com/documentation Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of this documentation,

More information

Asset Inventory Reference

Asset Inventory Reference www.novell.com/documentation Asset Inventory Reference ZENworks 11 Support Pack 3 July 2014 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of this

More information

MadCap Software. Upgrading Guide. Pulse

MadCap Software. Upgrading Guide. Pulse MadCap Software Upgrading Guide Pulse Copyright 2014 MadCap Software. All rights reserved. Information in this document is subject to change without notice. The software described in this document is furnished

More information

Database Management Reference

Database Management Reference www.novell.com/documentation Database Management Reference ZENworks 11 October 2013 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of this documentation,

More information

NSi Mobile Installation Guide. Version 6.2

NSi Mobile Installation Guide. Version 6.2 NSi Mobile Installation Guide Version 6.2 Revision History Version Date 1.0 October 2, 2012 2.0 September 18, 2013 2 CONTENTS TABLE OF CONTENTS PREFACE... 5 Purpose of this Document... 5 Version Compatibility...

More information

Novell Identity Manager Resource Kit

Novell Identity Manager Resource Kit AUTHORIZED DOCUMENTATION Installation Guide for SUSE Linux Enterprise Server 10 SP2 Novell Identity Manager Resource Kit 1.2 August 17, 2009 www.novell.com Identity Manager Resource Kit 1.2 Installation

More information

QUANTIFY INSTALLATION GUIDE

QUANTIFY INSTALLATION GUIDE QUANTIFY INSTALLATION GUIDE Thank you for putting your trust in Avontus! This guide reviews the process of installing Quantify software. For Quantify system requirement information, please refer to the

More information

StarWind SMI-S Agent: Storage Provider for SCVMM April 2012

StarWind SMI-S Agent: Storage Provider for SCVMM April 2012 StarWind SMI-S Agent: Storage Provider for SCVMM April 2012 TRADEMARKS StarWind, StarWind Software, and the StarWind and StarWind Software logos are trademarks of StarWind Software that may be registered

More information

Remote Management Reference

Remote Management Reference www.novell.com/documentation Remote Management Reference ZENworks 11 Support Pack 2 October 2013 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of

More information

Digipass Plug-In for IAS. IAS Plug-In IAS. Microsoft's Internet Authentication Service. Installation Guide

Digipass Plug-In for IAS. IAS Plug-In IAS. Microsoft's Internet Authentication Service. Installation Guide Digipass Plug-In for IAS IAS Plug-In IAS Microsoft's Internet Authentication Service Installation Guide Disclaimer of Warranties and Limitations of Liabilities Disclaimer of Warranties and Limitations

More information

What Is Ad-Aware Update Server?

What Is Ad-Aware Update Server? Contents What Is Ad-Aware Update Server?...2 Installation and Removal...3 System Requirements...3 Obtaining the Installation File...3 Installing Ad-Aware Update Server...3 Upgrade...4 Repairing, Modifying

More information

www.novell.com/documentation User Guide Novell iprint 1.1 March 2015

www.novell.com/documentation User Guide Novell iprint 1.1 March 2015 www.novell.com/documentation User Guide Novell iprint 1.1 March 2015 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of this documentation, and specifically

More information

Introduction to Directory Services

Introduction to Directory Services Introduction to Directory Services Overview This document explains how AirWatch integrates with your organization's existing directory service such as Active Directory, Lotus Domino and Novell e-directory

More information

Reconfiguring VMware vsphere Update Manager

Reconfiguring VMware vsphere Update Manager Reconfiguring VMware vsphere Update Manager vsphere Update Manager 6.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a

More information

How To Install Caarcserve Backup Patch Manager 27.3.2.2 (Carcserver) On A Pc Or Mac Or Mac (Or Mac)

How To Install Caarcserve Backup Patch Manager 27.3.2.2 (Carcserver) On A Pc Or Mac Or Mac (Or Mac) CA ARCserve Backup Patch Manager for Windows User Guide r16 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation

More information

FOR WINDOWS FILE SERVERS

FOR WINDOWS FILE SERVERS Quest ChangeAuditor FOR WINDOWS FILE SERVERS 5.1 User Guide Copyright Quest Software, Inc. 2010. All rights reserved. This guide contains proprietary information protected by copyright. The software described

More information

AVG Business SSO Connecting to Active Directory

AVG Business SSO Connecting to Active Directory AVG Business SSO Connecting to Active Directory Contents AVG Business SSO Connecting to Active Directory... 1 Selecting an identity repository and using Active Directory... 3 Installing Business SSO cloud

More information

LifeSize Control Installation Guide

LifeSize Control Installation Guide LifeSize Control Installation Guide April 2005 Part Number 132-00001-001, Version 1.0 Copyright Notice Copyright 2005 LifeSize Communications. All rights reserved. LifeSize Communications has made every

More information

Avigilon Control Center Server User Guide

Avigilon Control Center Server User Guide Avigilon Control Center Server User Guide Version 4.10 PDF-SERVER-D-Rev1 Copyright 2011 Avigilon. All rights reserved. The information presented is subject to change without notice. No copying, distribution,

More information

Full Disk Encryption Agent Reference

Full Disk Encryption Agent Reference www.novell.com/documentation Full Disk Encryption Agent Reference ZENworks 11 Support Pack 3 May 2014 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or

More information

Installing Management Applications on VNX for File

Installing Management Applications on VNX for File EMC VNX Series Release 8.1 Installing Management Applications on VNX for File P/N 300-015-111 Rev 01 EMC Corporation Corporate Headquarters: Hopkinton, MA 01748-9103 1-508-435-1000 www.emc.com Copyright

More information

Configuration Guide. BES12 Cloud

Configuration Guide. BES12 Cloud Configuration Guide BES12 Cloud Published: 2016-04-08 SWD-20160408113328879 Contents About this guide... 6 Getting started... 7 Configuring BES12 for the first time...7 Administrator permissions you need

More information

Sophos Mobile Control Installation guide

Sophos Mobile Control Installation guide Sophos Mobile Control Installation guide Product version: 2.5 Document date: July 2012 Contents 1 Introduction... 3 2 The Sophos Mobile Control server... 4 3 Set up Sophos Mobile Control... 13 4 Running

More information

www.novell.com/documentation Database Maintenance ZENworks Mobile Management 2.7.x August 2013

www.novell.com/documentation Database Maintenance ZENworks Mobile Management 2.7.x August 2013 www.novell.com/documentation Database Maintenance ZENworks Mobile Management 2.7.x August 2013 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of

More information

How To Take Advantage Of Active Directory Support In Groupwise 2014

How To Take Advantage Of Active Directory Support In Groupwise 2014 White Paper Collaboration Taking Advantage of Active Directory Support in GroupWise 2014 Flexibility and interoperability have always been hallmarks for Novell. That s why it should be no surprise that

More information

2 Configuring GroupWise Mobility Service to Support Microsoft Outlook Clients

2 Configuring GroupWise Mobility Service to Support Microsoft Outlook Clients GroupWise Mobility Service 2.1 for Microsoft Outlook 2013 First Look - February 2015 GroupWise Mobility Service 2.1 allows the Microsoft Outlook 2013 client for Windows and the Microsoft Outlook app to

More information

WebAccess Mobile User Guide

WebAccess Mobile User Guide www.novell.com/documentation WebAccess Mobile User Guide GroupWise 2014 April 2014 Legal Notices Novell, Inc. makes no representations or warranties with respect to the contents or use of this documentation,

More information

LepideAuditor Suite for File Server. Installation and Configuration Guide

LepideAuditor Suite for File Server. Installation and Configuration Guide LepideAuditor Suite for File Server Installation and Configuration Guide Table of Contents 1. Introduction... 4 2. Requirements and Prerequisites... 4 2.1 Basic System Requirements... 4 2.2 Supported Servers

More information

HYPERION SYSTEM 9 N-TIER INSTALLATION GUIDE MASTER DATA MANAGEMENT RELEASE 9.2

HYPERION SYSTEM 9 N-TIER INSTALLATION GUIDE MASTER DATA MANAGEMENT RELEASE 9.2 HYPERION SYSTEM 9 MASTER DATA MANAGEMENT RELEASE 9.2 N-TIER INSTALLATION GUIDE P/N: DM90192000 Copyright 2005-2006 Hyperion Solutions Corporation. All rights reserved. Hyperion, the Hyperion logo, and

More information

TIGERPAW EXCHANGE INTEGRATOR SETUP GUIDE V3.6.0 August 26, 2015

TIGERPAW EXCHANGE INTEGRATOR SETUP GUIDE V3.6.0 August 26, 2015 TIGERPAW EXCHANGE INTEGRATOR SETUP GUIDE V3.6.0 August 26, 2015 2201 Thurston Circle Bellevue, NE 68005 www.tigerpawsoftware.com Contents Tigerpaw Exchange Integrator Setup Guide v3.6.0... 1 Contents...

More information

Migration Tool Administration Guide

Migration Tool Administration Guide www.novell.com/documentation Migration Tool Administration Guide Open Enterprise Server 11 SP2 January 2014 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents

More information