Compulink Advantage. INSTALLATION, CONFIGURATION AND PERFORMANCE GUIDE (Revised 09/01/10)
|
|
|
- Silas Moody
- 10 years ago
- Views:
Transcription
1 Compulink Advantage INSTALLATION, CONFIGURATION AND PERFORMANCE GUIDE (Revised 09/01/10) 2010 Compulink Business Systems, Inc. All rights reserved 2645 Townsgate Road, suite 200 Westlake Village, California Compulink Advantage software installation, configuration and performance guide for windows
2 Page 2
3 Contents PRE REQUISITES Page 5 HARDWARE MINIMUM REQUIREMENTS.. Page 5 NETWORK OPERATING SYSTEMS.... Page 8 INSTALLATION OF ADVANTAGE SOFTWARE (GENERAL).. Page 8 DRIVE SHARING COMPUTER NAMES and SHARE NAMES DIRECTORY SHARED NAMES SETUP INSTRUCTIONS FOR ADVANTAGE SOFTWARE Page 9 WINDOWS SERVER ENVIRONMENT WINDOWS WORKSTATION ENVIRONMENT ENVIRONMENTAL SETTINGS.. Page 10 MISCELLANEOUS INFORMATION.. Page 11 SYSTEM AND HARDWARE REQUIREMENTS RECOMMENDED COMPUTER ROOM TEMPERATURE AND HUMIDITY CABLING ELECTRICAL BATTERY BACKUP USERS AND GROUPS PRINTERS TWAIN DEVICES WIRELESS AND REMOTE ACCESS. Page 12 REQUIREMENTS WINDOWS TERMINAL SERVICES CONFIGURATION REMOTE PRINTING RECOMMENDED NETWORK APPLIANCES WIDE AREA NETWORK ADDITIONAL INFORMATION Page 3
4 WIRELESS LOCAL AREA NETWORKS (WLAN).. Page 14 SECURITY INFORMATION.. Page 15 NETWORK COMMUNICATION AND SECURITY SECURITY AND ANTI VIRUS SOLUTION SECURITY AND ANTI VIRUS SOLUTION RECOMMENDATION DATA INFORMATION AND PROTECTION.. Page 16 BACKUP STORED DATA PROTECTION AND ENCRYPTION RESTORE STANDBY FAILOVER SERVER DISK REDUNDANCY AND CRASH FUTURE DATA PROTECTION ENHANCEMENTS Page 18 ON LINE BACKUP ADVANTAGE REPLICATION FAILOVER CLUSTERING IMPORTANT NOTES.. Page 19 OPERATING SYSTEM UPDATES AND PATCHES SYBASE IANYWHERE DATABASE MANAGEMENT SERVER HOSTED SaaS (SOFTWARE AS A SERVICE) SOLUTION.. Page 20 SOLUTIONS FOR SECURITY, DATA PROTECTION AND PERFORMANCE. Page 21 WIRELESS DATA PROTECTION AND ENCRYPTION COMPULINK AND 64 BIT COMPUTING SYNCHRONIZING A WINDOWS NETWORK WITH AN NTP TIME SERVER PROTECT YOUR FILES BY USING A SCREEN SAVER PASSWORD CLIENT ACKNOWLEDGEMENT.. Page 24 Page 4
5 PRE REQUISITES A Certified Network Professional, if not provided by Compulink, must install, be readily available and administer your network prior to, during and following your Compulink training. Installation and operability must include the following: Recommended minimum network hardware resources, e.g., servers, workstations, network appliances (routers and switches), scanners, printers, etc. Operational TCP/IP configured network, configured network user accounts for access to shared resources, workstations mapped to shared resources on file server HARDWARE MINIMUM REQUIREMENTS NOTE: THE BELOW CHARTS ARE ONLY MINIMUM SYSTEM REQUIREMENTS, Enhancements to these requirements will boost performance depending on the number of workstations, overall system and network configuration. If in doubt, check with your IT consultant or Compulink IT support staff at (800) Page 5
6 Page 6
7 Page 7
8 NETWORK OPERATING SYSTEMS Compulink has proven compatibility with the following Network Operating Systems: Windows Server 2003/2008 (LAN and WAN) Windows 2003/ bit SBS (LAN ONLY) Windows 7 Professional and Ultimate Windows XP Professional Windows Vista Business and Ultimate Advantage software is compatible with 64 bit operating systems, however, many hardware manufacturers have elected not to create suitable hardware drivers for this operating system Compulink Advantage software has been tested and is compatible with Citrix Metaframe using Windows Server environments. Using the compatible Operating System listed above is required on all workstations. Installation of Windows NT SERVER, Windows 2000, Windows Millennium (ME) or Windows 98 and Windows 2000 is not supported on any server or workstation. Clients with existing Windows XP Home, Vista Home and Windows 7 home may use these operating systems only as a workstation and not in an Active Directory domain environment. COMPULINK DOES NOT INSTALL, RECOMMEND OR SUPPORT ANY VERSIONS OF NOVELL NETWARE OR LINUX ON THE SERVER AND DOES NOT GUARANTEE COMPATIBILITY OR RELIABILITY WITH ANY OF OUR ADVANTAGE PRODUCTS IN THESE ENVIRONMENTS. INSTALLATION OF ADVANTAGE SOFTWARE (GENERAL) Compulink Advantage software for Windows is installed using the Internet and Compulink s remote connection/assistance software. Your assigned Implementation coordinator will deliver the necessary files electronically, install and test the product on your server or any available station. In most cases the software will be installed in the root of the C drive by your implementation coordinator. Sharing operating system files, program files or any other sensitive documents is not recommended. It is suggested that our clients designate an exclusive partition or directory for the Advantage software s files and folders. The contents of this partition/directory are shared and will be available to all Advantage users with read/write access. Once the installation has been completed, a shortcut will be created on the desktop to launch the Advantage software. Please see Advantage software setup instruction in this guide for details. To confirm the successful installation and operation of Advantage software, log in to Advantage software with the username and password (provided in the implementation or by your implementation coordinator) and run diagnostics using the Utility menu. In most cases your implementation coordinator will assist you with this process. NOTE: Advantage software database and client directories (i.e. EYECARE, EYEMD, CHIRO, PT, CBSMAIL, etc.) do not edit the Windows registry and can be moved/copied without the need for reinstallation. Compulink s database management software by Sybase does edit the Windows registry and has to be reinstalled with assistance from Compulink s support staff. DRIVE SHARING In a Peer to Peer or client/server environment, one computer will act as the file server. This will be the computer where your Advantage software files and databases will be installed. The hard drive, partition or folder that contains the Advantage software in this machine must have full control (read/write) for EVERYONE (or any designated group using the Advantage software). SYSTEM must also be given Full Control of this share. Do not share the folder that contains the Advantage files, i.e. EYECARE or EYEMD, PT, PSYCH, etc. Share only the root of the directory or partition where these folders reside. Multiple copies or copies saved on workstation local hard drives can possibly cause system errors. Page 8
9 COMPUTER NAMES and SHARE NAMES SERVER NAMES CANNOT contain spaces, (i.e., DELL SERVER). The proper naming would be, DELLSERVER. DIRECTORY SHARED NAMES SHARED NAMES CANNOT contain spaces or hyphens ( ), (i.e., NET DRIVE or NET DRIVE). The proper naming would be, NETDRIVE or NET_DRIVE. SETUP INSTRUCTIONS FOR ADVANTAGE SOFTWARE WINDOWS SERVER ENVIRONMENT SETUP The following applies to server operating systems such as 2000, 2003 and 2008 Server or a workstation/server using XP Pro., Vista Business and Windows 7 Pro. For Multi User environments and after the initial installation from the CD, Compulink recommends moving the product directory (i.e. EYECARE, EYEMD, CHIRO, PT, etc.) and the mail client software directory, CBSMAIL, to a directory named DATA. Data directory can be created on any available local drive with sufficient storage space (using the boot partition is not recommended). Share this directory as NETDRIVE. NETDRIVE share must have full control (read/write) for EVERYONE (or a designated group using the Advantage software). SYSTEM must also be given Full Control of this share. Once shared, all stations launching the application, including the server, will map a network drive to the NETDRIVE share. Caution: Do not share the product folder. The incorrect mapping will prohibit the launch of the software. WINDOWS WORKSTATION ENVIRONMENT SETUP On all workstations, map a network drive to the NETDRIVE share. Create a shortcut on the workstation s desktop using the mapped drive to the product s executable. Windows will assign the next available drive letter to the mapped drive. Compulink recommends using X as the drive letter. PLEASE NOTE: Advantage software will not function properly if the path to the product executable is using a UNC (UNIVERSAL NAMING CONVENTION.) Example of a wrong target in the shortcut properties: \\SERVERNAME\NETDRIVE\EYECARE\EYECARE.EXE. Example of a correct target: X:\EYECARE\EYECARE.EXE. The Frog icon is located in the product folder (EYECARE, EYEMD, PT, etc.). The file name for the icon is PRODUCT.ICO. NOTE: ALL STATIONS, INCLUDING ANY REMOTE SESSIONS, MUST MAP TO THE SAME DRIVE LETTER. DO NOT USE DIFFERENT DRIVE LETTERS TO LAUNCH THE PRODUCT. In versions 9.0 and higher, the installation of Crystal Report s client setup file and Adobe Acrobat Reader are required on all workstations. If patient s data merge is utilized, Microsoft Word must be present on the workstation. For creating Microsoft s XML templates when merging patient s data, at least one workstation in the office must have Word 2007 installed. After creating the XML templates, update all older version of Microsoft Word with Microsoft Office Compatibility Pack for Word, Excel, and PowerPoint 2007 File Formats. Page 9
10 ENVIRONMENT SETTING (AKA SET STATEMENT) Advantage software utilizes the Environmental Variables settings in the System Properties to add a unique environment/id for each user accessing the software. These variables are also referred to as SET STATEMENTS. WINDOWS XP AND SERVER 2003 To access the Environment Variables, navigate to the control panel, double click the system icon, choose the advanced tab and click on the Environment Variable button. To add a Global set statement, use the SYSTEM Variable (recommended on workstations only). Create a new variable using CBS as the Variable Name (without the quotation marks). For Variable Value type X (without the quotation marks). X represents a sequential alphabetical ID based on the number of Compulink licenses purchased (i.e., five licenses will allow you to use IDs ranging from A~E.) WINDOWS 2008, VISTA AND WINDOWS 7 To access the Environment Variables, navigate to the control panel, double click the system icon (classic view), choose the Advanced System Settings in the menu and click on the Environment Variable button under the Advanced tab. To add a Global SET statement; use the SYSTEM Variable (recommended on workstations only). Create a new variable using CBS as the Variable Name (without the quotation marks). For Variable Value type X (without the quotation marks). X represents a sequential alphabetical ID based on the number of Compulink licenses purchased (i.e., five licenses will allow you to use IDs ranging from A~E.) GENERAL ENVIRONMENTAL SETTING THE VARIABLES MUST BE TYPED IN CAPITAL LETTERS. Should your network exceed 26 workstations, use sequential double alpha IDs, beginning with AA for the 27 th workstation, AB for the 28 th, etc It is important to assign the double alpha IDs in consecutive order within the range AA to RZ. For assistance with assigning variables in environments with a large number of clients, Compulink s IT department has designed a DOS script that will generate and assign variables based on workstation/client names, locally and remotely. Please contact Compulink s IT department at (800) for additional information regarding this solution. CONCURRENT LICENSING Starting with version 9.5 and higher, verification of your Advantage station licenses is now determined by the number of active users. Offices with mobile staff or those who are setup with more workstations than staff can license the total number of stations that will be in use at any given time, rather than each individual station. With concurrent licensing, workstations no longer need to be identified by a CBS environment variable (see exceptions below). A dynamic license will be assigned to all stations once the Advantage software is launched. Stations with any of the following items connected must be assigned a CBS environment variable for proper operation. Cash Drawer and Dymo label printers Local or remote Twain Interface devices such as cameras and scanners Workstation Name identified for Patient Tracking Any equipment interface/hand off to 3 rd party software requiring workstation setup Note: Stations assigned a CBS variable due to the above requirements are NOT available for concurrent licensing. CAUTION: IT IS VERY IMPORTANT THAT EACH WORKSTATION USES A UNIQUE ENVIRONMENTAL VARIABLE. SHARING VARIABLES WILL CAUSE INTERRUPTION IN THE SOFTWARE OPERATION AND DATA CORRUPTION. Page 10
11 MISCELLANEOUS INFORMATION SYSTEM AND HARDWARE REQUIREMENTS Compulink Advantage software does not require specific hardware or computer systems. Advantage software will function over most current versions of Widows based operating systems (see Network Operating Systems) and Windows based compatible hardware. RECOMMENDED COMPUTER ROOM TEMPERATURE AND HUMIDITY Monitoring the environment in a computer room or data center is vital to ensuring uptime and system reliability. Maintaining recommended temperature and humidity levels in the area where computer systems are placed can increase uptime. Maintaining an ambient temperature range of 68 to 75 F (20 to 24 C) is optimal for system reliability. This temperature range provides a safe environment for equipment to operate in the event of air conditioning or HVAC equipment failure. Relative humidity (RH) is a term used to describe the amount of water vapor that exists in a gaseous mixture of air and water vapor. In a data center or computer room, maintaining ambient relative humidity levels between 45% and 55% is recommended for optimal performance and reliability. CABLING Minimum of Category 5 or 5e Balanced 100 cable and associated connecting hardware whose transmission characteristics are specified up to 100 MHz. On networks with more than 5 concurrent connections, 1000 Mbps bandwidth from the file server to the switch is recommended. Compulink does not supply, install or contract with any network cable installers. It is necessary that a professional and capable cable installer install your network cable prior to the arrival of your computer systems and your Compulink Trainer. ELECTRICAL Power fluctuation and outages are common; Compulink recommends the use of UPS (Uninterruptible Power Supply) on file servers and systems that store your data. Surge protectors are recommended for workstations. Standard Electrical Requirements: 2 standard electrical duplex receptacles (1 circuit per 2 workstations) maximum of (24) receptacles per circuit BATTERY BACKUP (UNINTERRUPTIBLE POWER SUPPLY) Uninterruptible power supply units are important for equipment that could be damaged in a power failure. In any business environments with a network application such as Advantage software, networking equipment could also benefit from being on an uninterruptible power supply, as a lack of power to network equipment could prevent communication. An uninterruptible power supply can ensure that electronic equipment remains operational even if external power was unavailable. It also reduces the chance that a power outage could corrupt data on a server. An appropriate backup power solution is highly recommended for use with Advantage software. USERS AND GROUPS Whether you are using Windows built in groups or a new group created by the administrator, users of Compulink Advantage software must be granted Full Control/Access to the share where the application resides. If security is an issue, the network administrator can place restriction on all other shares on the network while granting Advantage users Full Control to Compulink s NETDRIVE Share. PRINTERS Compulink Advantage software utilizes printers that are properly setup in the Windows environment. Once printer drivers have been installed and the printer has been configured, a Test Page should be printed from within the Properties Sheet for that printer to confirm the printer s functionality prior to printing from Advantage software. Page 11
12 Printer s continued: Some all in one (multi function) printers/scanners are not compatible with Advantage software. Compulink software has been tested successfully with the HP LaserJet and Dell Laser Black and White business printer line. It is recommended that basic printer driver language, such as PCL5 drivers are used. Postscript and PCL6 drivers may cause printing issues in Advantage software. WAN CLIENTS: Not all printers are compatible with Terminal Services and RDP protocol. Please consult the printer manufacturer s documentation. (Refer to page 13 Remote Printing) For generating labels, Advantage software has proven compatibility with Dymo Labelwriter 450 Turbo. TWAIN DEVICES Compulink software utilizes TWAIN compliant peripherals to capture and transfer images/data to the various sections of the patient s demographic screen. In most cases, the peripherals with DEVICE SPECIFIC file or.ds extension located in Windows TWAIN_32 folder should allow Advantage software to acquire the image/data from the TWAIN source. Due to the wide variety of peripherals and their associated drivers available on the market, it is impossible to guarantee which devices/peripherals will successfully work with Advantage software. Compulink recommends the use of peripherals that are tested and researched by our IT lab. Note: Multi page scanning is not supported in wide area network environment due to bandwidth restrictions. In these environments, clients can utilize an import solution using the Paperport software or a third party remote scan application such as RemoteScan ( scan.com). Contact Compulink s IT department for details. WIRELESS AND REMOTE ACCESS (Wide area Network) REQUIREMENTS IN ORDER TO ACCESS ADVANTAGE SOFTWARE OVER THE PUBLIC INTERNET LINES, WIRELESS NETWORKS AND/OR A REMOTE LOCATION, A VPN (VIRTUAL PRIVATE NETWORK) IS RECOMMENDED. Compulink advantage software requires Microsoft windows 2003/2008 Server with Terminal Server in application mode for remote access capabilities. Public Internet lines or wireless networks do not provide sufficient bandwidth to access the Advantage software. Virtual Private Networks such as Microsoft s L2TP/IPSec VPN Client and IPSec tunnels will be mandatory in the near future security of patient health data. Microsoft s L2TP/IPSec VPN Client: The combination of L2TP and IPSec, known as L2TP/IPSec, is a highly secure technology for making remote access virtual private network (VPN) connections across public networks such as the Internet. L2TP/IPSec connections use the Data Encryption Standard (DES) algorithm, which uses either a 56 bit key for DES or three 56 bit keys for Triple DES (3DES). Internet Protocol Security (IPSec): Internet Protocol security (IPSec) is a framework of open standards for helping to ensure private, secure communications over Internet Protocol (IP) networks through the use of cryptographic security services. IPSec uses packet filtering and cryptography. Cryptography provides user authentication, ensures data confidentiality and integrity, and enforces trusted communication. Compulink requires the following site to site communication settings over open networks: Tunnel 1 IKE Proposal settings: Tunnel 1 IPSec Proposal settings: DH Group Group2 DH Group Group2 Encryption algorithm Authorization algorithm 3DES SHA1 Protocol Encryption algorithm Authorization algorithm ESP 3DES SHA 1 Life Time Life Time Page 12
13 WINDOWS TERMINAL SERVICES CONFIGURATION Adding the remote desktop users is similar to adding users to the LAN with the exception of environmental variables. Terminal Server session variables must be added using the USER VARIABLE SECTION ONLY. A unique variable must be set for each session. DO NOT ADD THE CBS VARIABLE TO THE SYSTEM VARIABLE OF THE SERVER. Once each variable is set, in each user profile/session, map a network drive to the share where the Compulink software resides and create a shortcut on the remote user s desktop to launch the software. ALWAYS USE A MAPPED DRIVE TO LAUNCH THE APPLICATION, even on the server. It is recommended that all shortcuts have read only attributes so they do not resolve to the absolute root in case the network path and the mapped drive are temporarily unavailable. If your office utilizes multiple locations, use the variable CBSWAN along with the correct variable value assigned to each location by Compulink. Adding CBSWAN will allow the users to set the respective location prior to the launch of the software. If all terminal server users are from the same location, it is possible to use the SYSTEM VARIABLE and set this variable globally. If the terminal server users use different locations codes, use the USER VARIABLE section. (Example CBSWAN=001 for main location, and CBSWAN=002 for the remote location.) The CBSMOBILE variable has been created for clients with staff members that move between offices and locations. This variable will allow users to enter the correct location code prior to the full launch of the Advantage software. When CBSMOBILE=Y is in the environmental settings, the software will prompt the user to enter the CBSWAN and set the location code. PLEASE NOTE: It is very important that each workstation (remote sessions or local) utilizes a unique environment variable. Duplicating variables will cause interruption in the software operation and serious data corruption. Microsoft Word must be installed on the server to allow Terminal Server users to merge patient data. Adobe Acrobat Reader is also required for printing reports. WIDE AREA NETWORK GENERAL INFORMATION REMOTE PRINTING All remote printers, including the Dymo label printers, must have an exact matching printer driver on the server and be registered as a known printer in the NTPRINT.INF file. In most cases, only printers created by the session will successfully print to Advantage software unless a third party application is used to create and redirect the printer. In Windows 2008, the Easy Print driver could eliminate the need for installing matching print drivers in certain environments. Easy Print driver has to be disabled when redirecting and using the Dymo Label printers to print labels in Advantage software. Compulink recommends using simplest language printer drivers such as PCL5 for all printing. RECOMMENDED NETWORK APPLIANCES As more health care providers make patient information available over the Web and on wireless devices, security and patient privacy are a big concern. The Data Protection Act 1998 (DPA) requires "appropriate technical and organizational measures" to prevent "unauthorized or unlawful processing of personal data. Compulink recommends client use advanced network appliances to assist in protecting this information. Aside from the security software (see SECURITY INFORMATION section), Internet connectivity devices play a big role in securing a network from external threats. Compulink Recommends Sonicwall ( security appliances. WIDE AREA NETWORK ADDITIONAL INFORMATION Accessing Advantage software from a remote location is only possible if Windows Remote Desktop Protocol (Terminal Services) is utilized. System Administrators must login as each individual user during the initial setup and set the environment for accessing Advantage software. Recommended bandwidth per user: 50 kbps (note: up to 60/80 kbps may be required if the TWAINWAN solution is implemented). The general memory recommendation for servers running terminal services is a minimum of 50MB of memory per session. This requirement does not include any other application or the operating system s general RAM requirements. All sessions require a unique USER environmental variable of CBS and CBSWAN (where applicable). Questions regarding Wide Area Networks should be directed to: Cole Galbraith, MIS Director at: (800) or [email protected] Page 13
14 WIRELESS LOCAL AREA NETWORKS (WLAN) Compulink Advantage software has been tested and proven compatible with Tablets, Notebooks and Desktops using wireless connectivity while utilizing Terminal Services or Remote Desktop technology ONLY. Wireless connections with direct connectivity to the Wireless Local Area Network (WLAN) are not supported. Implementing a wireless connection from the station hosting the databases and another station on the network could cause delay in packet delivery and result in performance issues, database disconnections and data corruption. The use of Windows Terminal Services and similar products, available from proprietary vendors such as Elusiva, are necessary with low bandwidth environments. Reliability Like any radio frequency transmission, wireless networking signals are subject to a wide variety of interference. Speed The speed of a wireless network depends on several factors. Wireless standards, typically advertised at Mbps, will transmit data at a fraction of a wired network (uusually at 100 Mbps and up to several Gigabits per second). There are also performance issues caused by TCP and its built in congestion avoidance. Implementing a Wireless Local Area Network (WLAN) should be limited ONLY to environments where wired connectivity is not an option. Security The "open air" nature of wireless radio signals poses challenges for securing wireless computer networks. Wireless radio signals broadcast through the air and are naturally easier to intercept. Signals from most wireless LANs pass through exterior walls and into nearby streets or parking lots. Strong encryption and wireless security is absolutely necessary to protect patient data. Requirements for setting up wireless environments are similar to the Wide Area Network which is outlined in the Wireless and remote access (page 12) and Wireless Data Protection and Encryption (page 21) of this guide. For additional details regarding wireless networking, contact Compulink s IT department. Please note: Installation of Sybase SQL Database Management software is mandatory for wireless connection using Remote Desktop or Terminal Services. I have read and understand the Installation and Configuration Guide for Compulink Advantage software in a Wireless Area Network. A copy of this guide has also been provided to my Network Professional. These instructions have been followed to the best of my knowledge and ability. I hereby release Compulink from any configurations implemented by this office other than what is stated here or recommended by Compulink: Date: / / Account Number: Client s Signature: Print Your Name IT Professional s Signature: Print Your Name Page 14
15 SECURITY AND ANTI VIRUS SOLUTION SECURITY INFORMATION Compulink recommends Security and Anti Virus solutions developed for business/corporate environments. Solutions made for home/home office users, such as Norton Anti Virus 2010, are not designed for network applications such as Advantage software. It is imperative that your security solution provides an interface for proper configuration and unfiltered network packet delivery on the local area network. All security applications, such as Symantec Endpoint Protection, must be configured by a network professional to permit full access to Advantage software and all of its associated TCP/UDP ports. Network scanning option MUST be disabled for all available Security and Anti Virus programs. The content of the local drives are scanned and protected. Enabling the network drive scanning will only cause latency and create lag time for users of Advantage software. Scanning system for malware should also be scheduled during off peak hours or when system is not in use to avoid performance issues. SECURITY AND ANTI VIRUS SOLUTION RECOMMENDATION Many proprietary software companies provide threat prevention and defense against malware. Symantec Endpoint Protection is recommended for use with Advantage software. Advantage Users can deploy Symantec Endpoint Security on their networks to protect against even the most sophisticated attacks. Symantec Endpoint Protection can provide advanced threat prevention from unknown targets. It includes proactive technologies that automatically analyze application behaviors and network communications to detect, block and report suspicious activities. Deploying Symantec Endpoint Security will provide real time security protection for Advantage users. NOTE Compulink Business Systems, Inc. utilizes Symantec Endpoint Protection and Windows Server Update Services (WSUS) to certify all communication between Compulink and Advantage clients are free of malware. At Compulink, all network nodes are protected, real time, and scanned daily using Symantec TruScan TM Technology. A comprehensive scan is also scheduled and performed on a weekly basis on all network nodes. Symantec Endpoint and WSUS are updated daily for any available and most current threat protection. These updates are delivered to all Servers, workstations and laptops immediately to ensure a malware free environment. NETWORK COMMUNICATION AND SECURITY Advantage software utilizes the following technologies to identify the authenticity of its users prior to the initial product launch. The product also adds another layer of protection by authenticating the users prior to the launch of the software by requiring a username and password. LOCAL AREA NETWORK Starting with Microsoft Windows 2000, Microsoft products use Kerberos protocol and Integrated Windows Authentication (IWA) to check the authenticity of any network user requesting information from the server or acting server and the shared resources on the server. Windows Authentication is commonly used between all software running on Windows. Also filesharing permissions can use Kerberos and IWA with Microsoft Active Directory. This way user only needs to give login credentials once on a PC and has access to shared files over network with suitable permissions. Advantage software utilizes UDP port 4000 on the local area network to establish communication between clients and the server. WIDE AREA NETWORK See Wireless and Remote Access (Page 12) Page 15
16 DATA INFORMATION AND PROTECTION The following is provided for Advantage clients to ensure data integrity and maximizing system up time. BACKUP HOW MUCH IS YOUR DATA WORTH? Compulink cannot stress enough the importance of performing daily backup. Many businesses fail to appreciate the importance of backing up vital data on a daily basis until it is too late. Valuable equipment is usually insured against fire, theft or other disasters. A current backup is the only insurance policy on your patient data. HIPAA Security Regulations dictate specific details as to how the electronic information used by the healthcare industry should be stored, transferred, and used to ensure the privacy of individually identifiable data related to a patient s healthcare. Your backup is your first defense against the loss of patient data. DIFFERENT TYPES OF BACKUP Different types of backups are available with most backup software. A FULL backup of Compulink's Advantage product folder (e.g. EYEMD, EYECARE, PT, PSYCH) must be performed daily. Differential or Incremental backups are not supported. A Full backup will store all files and system data to the backup media. The Advantage product folder includes all application data, Security credentials and all transactional details. No other folder or directory needs to be backed up to successfully restore the Advantage software. BACKUP STRATEGY 1. Each day, back up the product folder (e.g. EYEMD, EYECARE, PT, PSYCH) onto removable media to keep in the office 2. Keep at least 5 days worth of backup on hand 3. Once a week ( or at least once a month), make a backup copy for keeping off premises and bring back weekly to exchange for a new copy to take off site 4. At the end of your fiscal year, make a copy of your data to keep off premises for one year WHEN SHOULD BACKUPS TAKE PLACE? Backups should ideally take place outside of business hours, when network traffic is at its minimum. Scheduling the backup at some time during the night (e.g. Midnight) is a suitable tactic. Backing up data once a day (after each working day) provides good coverage against data disaster. WHAT STORAGE MEDIUM SHOULD I USE? There are several factors to consider when selecting a place where your files will be stored: Time you want to spend on backups Convenience of restoring files Medium reliability Total size of files to backup The following backup media are to be taken into account when choosing where to backup: Tape: Tape backups are far more reliable than CD ROMs, but tape drives and their associated media are much more expensive. CD: good for copying small sets of files DVD: suitable for storing medium sets of files USB: works best for moving files between distant computers External hard disk or SAN: ideal for backing up huge amounts of data Flash USB drive: the best choice for keeping your important files always at hand Page 16
17 MISCELLANEOUS BACKUP INFORMATION CHECK THE BACKUP LOG OFTEN TO MAKE SURE YOUR DAILY BACKUP IS RUNNING ERROR FREE. It is imperative that the advantage software is not running while the backup is being performed. Contact Compulink s IT department to obtain information on how to close all connections to the software prior to your backup. Hard Drive Redundancy (RAID 5 or RAID 1) on the file server is recommended. Note: Compulink recommends RAID 5 due to the performance gain. Internet based backup sites can only backup data that has change and do not provide a full backup copy and are not recommended Note: Do not use XCOPY command to make an online backup while Advantage Software is in use. RECOMMENDED BACKUP SOFTWARE Compulink Recommends using Symantec Backup Exec or Acronis Backup and Recovery software to backup and restore data. STORED DATA PROTECTION AND ENCRYPTION Health Insurance Portability and Accountability Act (HIPAA) requires medical service providers to provide security measures for all stored patient health information. The compliance efforts are sometimes threatened by the ease with which sensitive information could reside unprotected on USB flash drives, external hard drivers, backup tapes and other portable devices and media. There are many solutions that secure mobile data and ensure that sensitive data remains private through encryption and password protection. Password protecting the data is one of the most common used data protection means today. Backup applications generally offer an option to password protect the data during the backup operation. Compulink also recommends the workstations do not include writeable drives such as CD/DVD writers. Group Policies can be implemented in a domain to make flash drives read only. If you are using portable devices, a program such as Winzip utility ( can compress and encrypt any file or folder that resides on a local or portable device. Winzip utilizes AES encryption and password policy to protect stored data. There are many other solutions such as ( that can provide the same level of security. BitLocker to Go Drive Encryption is a data protection feature available in Windows 7 Enterprise and Ultimate. It extends data protection to USB storage devices, enabling them to be restricted with a passphrase. Bitlocker uses the AES encryption algorithm in CBC mode with a 128 bit key, combined with the Elephant diffuser for additional disk encryption specific security not provided by AES. RESTORE In order to restore all application data, Security credentials and all transactional details, restore a full copy of Advantage software s folder (i.e. EYEMD, EYECARE, PT, PSYCH, etc.) STANDBY FAILOVER SERVER (AVAILABLE WITH ADVANTAGE VERSION 9.0 AND HIGHER) Standby Failover server can be achieved by installing Advantage software in an environment where Advantage software is running on a Storage Area Network (SAN) and connected to a server. In case the server fails, another server can be connected to the Storage Area Network (SAN) that is on standby with the same name and engine running. Advantage clients will not automatically reconnect in the case of a failure. Clients will have to refresh the network drive and restart their applications only. DISK REDUNDANCY AND CRASH Advantage software can be installed on a system with disks that utilize RAID Redundant Array of Inexpensive Disks for fault tolerance. RAID allows data to be stored redundantly on an array of disks for easy data recovery. Page 17
18 FUTURE DATA PROTECTION ENHANCEMENTS ON LINE BACKUP (SCHEDULED TO BE AVAILABLE IN VERSION 10) Advantage software can be backed up using the (hot) backup feature built in the engine. This functionality allows for creating a backup of the data while the databases are in use. Advantage backup creates a snapshot of the data and copies it to a specified location. Advantage online backup is a powerful tool for ensuring that you have a copy of your database if your primary database gets lost. Online backup allows administrative and backup users the ability to create a backup of a database or set of free tables while the tables are open. It does not interfere with any current operations which may be occurring on the data. In addition to (hot) backup, a routine backup scheme should be implemented using the most popular and available backup hardware and software. For additional information regarding Advantage On line Backup and an overview, please visit the following site: support.com/technotes/onlinebackup.htm ADVANTAGE REPLICATION (SCHEDULED TO BE AVAILABLE IN VERSION 10) Advantage Replication creates the capability to synchronize data and/or subsets of data in a database across one or more servers. It also has the capability to transmit all updates in a source database to structurally equivalent tables in one or more target databases. Using Advantage Replication, a consistent view of a database can be maintained across multiple Advantage Database Servers, opening the doors to a new realm of database functionality. The uses and benefits of replicating data from one server to another are obvious and now replication support is built in to Advantage Database Server and can easily be added to any 8.0 or newer server as separately licensed functionality. Advantage Replication is based upon an asynchronous push model in order to minimize performance impact on applications and to minimize latency when delivering updates to target databases. One way and two way replication is possible by creating rules at the target database to replicate changes back to the source or to other databases. If multiple target databases are used, where each target has only a subset of the data, filters can be specified at the source in order to control the delivery of data to the target databases. Transactional and referential integrity is maintained during replication. If a target database is not available, the source server will queue up all updates and transmit them to the target when it becomes available. Handling of conflict resolution is provided by "ON CONFLICT" triggers on target tables. Advantage Replication is available for Advantage Database Server. ADVANTAGE REPLICATION (SCHEDULED TO BE AVAILABLE IN VERSION 10) For additional information regarding Advantage Replication and an overview, please visit the following site: support.com/technotes/replication.htm For additional information regarding Advantage Replication and a Datasheet, please visit the following site: support.com/technotes/links/advantage_replication_ds.pdf FAILOVER CLUSTERING (SCHEDULED TO BE AVAILABLE IN VERSION 10) Using Windows 2008 Enterprise and Storage Area Network (SAN), Advantage software can be installed on multiple nodes to facilitate Failover Clustering. Once one node is down, the other node(s) can restart the database service. Advantage clients will not automatically reconnect in the case of a node failure. The failover cluster will automatically start Advantage on another node but the clients will have to restart their applications. NOTE: All above data protection solutions available in version 10 require the installation of Sybase ianywhere Database Management Server. Page 18
19 IMPORTANT NOTES OPERATING SYSTEM UPDATES AND PATCHES In addition to malware protection software, Windows Updates are the easiest, most reliable and cost efficient way to help protect your computer from the latest Internet threats. Installing the most current Windows Service Packs, Critical Updates and Patches are highly recommended. To check for available or missing Windows Updates, visit the following Microsoft Web site: All current and supported Microsoft operating systems will have the ability to check for missing updates by viewing, downloading and installing the available Windows Service Packs, Critical Updates and Patches free of charge. (Broadband Internet service may be required.) Internet Explorer Enhanced Security Configuration Compulink recommends adding the server s path to the Local Intranet zone. Enhanced Security Configuration restricts access to scripts, executable files, and other potentially unsafe files on a UNC path unless it is added to the Local intranet zone explicitly. For example, if you want to access \\server\share\setup.exe, you must add \\server to the Local intranet zone SYBASE IANYWHERE DATABASE MANAGEMENT SERVER The use of Sybase Database Management software may be required for any size network with excessive broadcast and traffic. Installation of Sybase Database Management software is mandatory for networks with 7 or more workstations or a wireless connection using Remote Desktop or Terminal Services. For additional details regarding Sybase Advantage Database Server software, please visit the following link: support.com/faq.htm#sales MISCELLANEOUS All stations, including any remote sessions, must use a specific mapped drive letter such as X. Do not use different drive letters throughout the network when accessing Advantage software. When upgrading to Advantage 8.0 and higher, the image frame grabber must also be upgraded if Image Advantage add on is in use. This interface requires a TWAIN compliant image board/frame grabber. To avoid possible data corruption, it is REQUIRED that the NTFS File Allocation Table be used on the server if any of the workstations are utilizing NTFS. EMC and NEIC require an External Modem connected to 9 pin serial COM1 and/or COM2 Port Compulink has experienced difficulties with Keytronics brand keyboards. If you encounter abnormal behavior related to keyboard input with your copy of Advantage software, please consult with your systems supplier. For a list of Advantage software s Error codes, please visit the following link: support.com/technotes/adshelp/adserrors.htm For a list of Advantage software s recommended peripherals, please visit the following link: support.com/faq.htm#peripherals For additional information and troubleshooting during Compulink off hours, visit the IT support web site at: support.com Page 19
20 Advantage Online Hosted SaaS (Software as a Service) Solution Experience the functionality of the leading EHR software deployed over the Internet and access your patient data via the Web. Compulink Business Systems, Inc. has partnered with leading industry hosting solutions to simplify deployment and reduce customer acquisition costs with a SaaS (software as a Service) solution. Advantage Online TM will allow Advantage software to be deployed as a hosted service and accessed over the Internet globally. With Compulink s Advantage Online TM solution, our clients have the flexibility to customize their servers and devices without having to troubleshoot, patch, monitor, backup or worry about the hardware and network. Advantage Online TM Hosting Solutions Secure Sockets Layer (SSL) Secure Sockets Layer (SSL) encryption technology is used to protect private information while it's in transit via the Internet. Network Administrative and Support Compulink IT experts, with assistance from Compulink s software support staff, are available to assist in troubleshooting any issues with Advantage software deployed over the Web Unlimited and Toll Free Software Expert Support Compulink s Customer Care department is available Monday through Friday, 5:00 AM to 5:30 PM (Pacific Time), for troubleshooting any software related issues. Note: current support contract required Network Uptime We have designed and built a state of the art network to minimize downtime Managed Backup State of the art technologies in Network Attached Storage for backing up files Proactive Protection against Viruses and Malware Compulink has deployed Symantec Endpoint Protection for defense against threats Supports Paperless Capture all your paper documents and images over the Web Inventory Management Advantage Online TM supports patient bar coding and inventory management HIPAA Compliant Our deployed encryption, security and storage management ensures your PHI is protected from disaster and unauthorized access Flexible and Scalable Compulink s Advantage Online TM can be tailored to your specific needs regardless of the size of your organization Page 20
21 SOLUTIONS FOR SECIRUTY AND DATA PROTECTION WIRELESS DATA PROTECTION AND ENCRYPTION The "open air" nature of wireless radio signals poses challenges for securing wireless computer networks. Wireless radio signals broadcast through the air and are naturally easier to intercept. Signals from most wireless LANs pass through exterior walls and into nearby streets or parking lots. Strong encryption and wireless security is absolutely necessary to protect patient data. Compulink requires the following safeguards for implementing wireless security: 1. Change default administrator passwords and usernames (if available) At the core of your wireless network is the access point or router. Hackers can discover the initial default settings of your device via the Internet. Change the administrator password immediately after installing the access point or router. 2. Turn on WPA encryption and implement a VPN Encryption is a means of protecting transmitted data from being read by anyone but the intended recipient. WEP is not a secure protocol and has proven to have many flaws. Only implement wireless equipment that supports the Wi Fi Protected Access (WPA) encryption technology or stronger. Wireless LAN users access the network just as remote dial in or Internet users would. Access points and routers without VPN capabilities are viewed as a security risk. A hacker with an IEEE b network interface card who is in the transmission range can connect and access the wireless network. Place the access point behind the firewall, requiring that wireless clients authenticate to the VPN or firewall using third party software or hardware. Utilizing L2TP VPN tunneling and IPSec encryption and authentication (see Wireless and Remote Access) adds another layer of encryption to secure the data. Hackers can easily penetrate and gain access to the data traversing unsecure access points but data secured by a firewall and VPN will be harder to decrypt and adds another layer of protection to protect patient data. 3. Change the default network name Known as the Service Set Identifier (SSID), the name of the wireless local area network (WLAN) must be the same for all your network s wireless devices for them to communicate with each other. Manufacturers of access points and routers normally ship their products with the same SSID set. While knowing just the SSID does not enable anyone to break into your network, using a default SSID is a sign of a poorly configured network and is easy prey for hackers. So, when configuring your WLAN, change the default SSID as soon as possible. 4. Activate address filtering Every piece of wireless hardware possesses a unique identifier called a Media Access Control (MAC) address. Access points and routers keep track of the MAC addresses of all wireless devices that connect to them. Your device should be configured to allow only MAC addresses that have been registered with the wireless access point or router. You can usually locate the MAC address of your network card on the device itself. 5. Disable SSID broadcast In wireless networking, the access point or router typically broadcasts the Service Set Identifier (SSID) over the air at regular intervals. This feature of Wi Fi network protocols is intended to allow clients to dynamically discover and roam between WLANs. After the implementation of your WLAN, this feature is unnecessary and makes your network more accessible to hackers. 6. Assign static Internet Protocol addresses to devices Potential attackers of your network can easily obtain valid Internet Protocol (IP) addresses from your network s Dynamic Host Configuration Protocol (DHCP). To remedy this, disable DHCP on the router or access point and set a fixed IP address range. 7. Refrain from using the default IP subnet Many routers and access points use the default IP subnet (e.g and ). Change the IP subnet on your device during initial installation. Page 21
22 COMPULINK AND 64 BIT COMPUTING What is 64 bit computing? Most PC users are confused about 64 bit computing. The main source of confusion is that the term "64 bit" applies to three separate computing components: the PC processor, the operating system, and the software that runs on the operating system. In order to run a 64 bit version of Windows, your PC must have a 64 bit processor. If your PC was built after 2007, there's a good chance it has a 64 bit processor. Netbooks are an exception; most use Intel's 32 bit Atom processor. The third and final element you need for 64 bit computing is software that can run on a 64 bit version of Windows. The good news is that most 32 bit programs will run perfectly well on 64 bit Windows. This means you can continue to use many of the programs you already have. Why is 64 bit computing something that I should even consider? The maximum physical memory supported by 32 bit Windows is 4GB. Of this, only 3.5GB is available to the operating system and applications, and a maximum of 2GB for any individual application. With 64 bit Windows, there's essentially no practical limit to the amount of physical memory available to the operating system and applications. (The actual limit is theoretically 16 exabytes the equivalent of 16 billion gigabytes though the current practical limit is 8 terabytes or 8,000 gigabytes.) Would 64 bit computing make a difference in a database application like Compulink s? The ability to use more memory can have a profound impact on the performance of your PC. This is especially true when running such memory hungry applications as video editing, multimedia production, and advanced gaming, or if you run many programs simultaneously. However, database applications (such as Compulink s Advantage software) are generally not memory hungry and typically have performance benefits from other factors such as faster hard drives. However, extremely large databases would see some benefit in a 64 bit environment on the server. Compulink s 64 bit Server Solution: There are two parts of Compulink s product platform that have to be addressed here the relational database management system used (the back end, what runs on the server) and the development tools used to develop the software (the front end, what runs on the user workstations). The relational database management system used in Compulink s applications (Sybase SQL Advantage Database Server) is already available in a 64 bit version. Compulink continues to evaluate the benefits of a 64 bit front end. Currently the lack of widespread workstation use of 64 bit operating systems and the relatively small performance boost at the workstation level for our type of application does not justify the additional cost that our clients would incur to be able to use a 64 bit application. We anticipate moving to 64 bit in the future when there is a compelling benefit to our clients. Page 22
23 SYNCHRONIZING A WINDOWS NETWORK WITH AN NTP TIME SERVER Synchronizing a network is done using the Windows Time Service, also known as W32Time. The Windows Time Service was implemented in compliance with the Kerberos V5 authentication protocol, which is defined by RFC Among the protocol's requirements are accurate time stamps. Advantage software utilizes Windows time synchronization (NTP) technology to time stamp all records. The applications time stamp provides accurate tracking of all records including security records. For additional details regarding Windows Time Service, please visit the following web page: support.com/technotes/time.htm TO PROTECT YOUR FILES BY USING A SCREEN SAVER PASSWORD 1. Open Display in Control Panel. 2. On the Screen Saver tab under Screen saver, click a screen saver 3. Select the On resume, password protect check box. If Fast User Switching is turned on, select the On resume, display Welcome screen check box. Note: To open Display, click Start, click Control Panel, click Appearance and Themes, and then click Display. Selecting the On Resume, password protect check box will lock your computer when the screen saver is activated. When you begin working again you will be prompted to type your password to unlock it. Your screen saver password is the same as your logon password. If you do not use a password to log on, you cannot set a screen saver password. Fast User Switching is only available for stand alone computers and users in a workgroup. It is not available if your computer is part of a network domain Using Group Policy in a domain Environment You can enable Group Policy settings that control whether users use screen savers and whether they can change screen saver properties. Table below lists and describes each Group Policy setting. Other Group Policy settings you enforce can affect screen saver Group Policy settings. The Group Policy settings listed in Table below are located in the Group Policy snap in under: Local Computer Policy\User Configuration\Administrative Templates\Control Panel\Display key. Group Policy Settings That Can Affect Screen Saver Functionality Group Policy Setting Hide screen saver tab No screen saver Screen saver executable name Password protect the screen saver Description Removes Screen Saver tab from Display in Control Panel. Enable to prevent any screen savers from running. Specifies the screen saver for the users desktop and prevents changes. Enable to set passwords on all screen savers. Disable to prevent passwords from being used on all screen savers. Page 23
24 CLIENT S ACKNOWLEDGEMENT Compulink provides these instructions as a guide to help insure a hassle free installation and operation. The support staff is available to assist with any questions and/or issues not covered in this guide. I have read and understand the Installation, Configuration and Performance Guide for Compulink Advantage software (24 pages). A copy of this guide has also been provided to my Network Professional. These instructions have been followed to the best of my knowledge and ability. I hereby release Compulink from any configurations implemented by this office other than what is stated here or recommended by Compulink: Date: / / Account Number: Client s Signature: Print Your Name IT Professional s Signature: Print Your Name Page 24
Compulink Advantage Online TM
Compulink Advantage Online TM COMPULINK ADVANTAGE ONLINE TM INSTALLATION, CONFIGURATION AND PERFORMANCE GUIDE FOR WINDOWS (Revised 07/08/2011) 2011 Compulink Business Systems, Inc. All rights reserved
Compulink Advantage Cloud sm Software Installation, Configuration, and Performance Guide for Windows
Compulink Advantage Cloud sm Software Installation, Configuration, and Performance Guide for Windows Compulink Business Systems, Inc. 2645 Townsgate Road, Suite 200 Westlake Village, CA 91361 2013 Compulink
How To Run Compulink Advantage Software On A Server Or Client Computer Or Computer
Software Installation, Configuration, and Performance Guide for Windows Support: 800.888.8075 Fax: 805.497.4983 2015 Compulink Business Systems, Inc. All rights reserved. Contents PREFACE... 3 PRE-REQUISITES...
MN-700 Base Station Configuration Guide
MN-700 Base Station Configuration Guide Contents pen the Base Station Management Tool...3 Log ff the Base Station Management Tool...3 Navigate the Base Station Management Tool...4 Current Base Station
Customized Cloud Solution
Customized Cloud Solution (Overall Cloud Performance Expectations) Last Updated: June 5, 2012 Prepared by: Polleo Systems, Inc. Notice of Confidentiality: The enclosed material is proprietary to Polleo
Server must be connected to the internet via high-speed internet connection.
Server Based System Requirements Database Server Component / Number of users 1-10 Users 11-25 Users 28-50 Users Processor Recommended 4 Cores 6 Cores 8 Cores Processor Minimum 2 Cores 4 Cores 6 Cores Memory
Chapter 3 Safeguarding Your Network
Chapter 3 Safeguarding Your Network The RangeMax NEXT Wireless Router WNR834B provides highly effective security features which are covered in detail in this chapter. This chapter includes: Choosing Appropriate
Network Client. Troubleshooting Guide FREQUENTLY ASKED QUESTIONS
Network Client Troubleshooting Guide 1 Network Client Troubleshooting Guide The first section of this guide answers some frequently asked questions (FAQs) about the operation of Intellex and the Network
Sage MAS 200 ERP Level 3.71 Version 4.30 Supported Platform Matrix
The information in this document applies to Sage MAS 200 ERP Level 3.71 through version 4.30. Sage generally supports only the current Sage MAS 200 level and one prior major level. As of the version 4.10
Network Guidelines and Hardware Requirements
Network Guidelines and Hardware Requirements To optimize performance in the IntraVet program we suggest that your network and computers follow the recommendations listed below. Doing so will help ensure
Server & Workstation Installation of Client Profiles for Windows
C ase Manag e m e n t by C l i e n t P rofiles Server & Workstation Installation of Client Profiles for Windows T E C H N O L O G Y F O R T H E B U S I N E S S O F L A W General Notes to Prepare for Installing
Linksys WAP300N. User Guide
User Guide Contents Contents Overview Package contents 1 Back view 1 Bottom view 2 How to expand your home network 3 What is a network? 3 How to expand your home network 3 Where to find more help 3 Operating
How To Install Sedar On A Workstation
SEDAR Client Installation Guide Version 1.2 January 27, 2014 10 Contents About This Guide... 2 Assumptions... 3 Date Format Synchronization... 3 Before You Begin the Installation Test of the SEDAR Client...
Movie Cube. User s Guide to Wireless Function
Movie Cube User s Guide to Wireless Function Table of Contents 1. WLAN USB Adapter Connection...3 2. Wireless Setup...4 2.1 Infrastructure (AP)...5 2.2 Peer to Peer (Ad Hoc)...7 2.3 Settings for PC...8
Updated: April 2010. Copyright 2005-2010 DBA Software Inc. All rights reserved. 2 Getting Started Guide
Updated: April 2010 Copyright 2005-2010 DBA Software Inc. All rights reserved. 2 Getting Started Guide Table of Contents Welcome 4 Support Center Subscription 5 1. System Requirements 8 2. Installing the
Backup Exec Private Cloud Services. Planning and Deployment Guide
Backup Exec Private Cloud Services Planning and Deployment Guide Chapter 1 Introducing Backup Exec Private Cloud Services This chapter includes the following topics: About Backup Exec Private Cloud Services
A+ Guide to Software: Managing, Maintaining, and Troubleshooting, 5e. Chapter 3 Installing Windows
: Managing, Maintaining, and Troubleshooting, 5e Chapter 3 Installing Windows Objectives How to plan a Windows installation How to install Windows Vista How to install Windows XP How to install Windows
User Guide. E-Series Routers
User Guide E-Series Routers Table of Contents Table of Contents Product overview E900/E1200/E1500/E2500/E3200 1 Back view 1 Bottom view 1 E4200 2 Top view 2 Back view 2 Setting Up Your E-Series Router
KASPERSKY LAB. Kaspersky Administration Kit version 6.0. Administrator s manual
KASPERSKY LAB Kaspersky Administration Kit version 6.0 Administrator s manual KASPERSKY ADMINISTRATION KIT VERSION 6.0 Administrator s manual Kaspersky Lab Visit our website: http://www.kaspersky.com/
Getting started. Symantec AntiVirus Corporate Edition. About Symantec AntiVirus. How to get started
Getting started Corporate Edition Copyright 2005 Corporation. All rights reserved. Printed in the U.S.A. 03/05 PN: 10362873 and the logo are U.S. registered trademarks of Corporation. is a trademark of
CONSTRUCTION / SERVICE BILLING SYSTEM SPECIFICATIONS
CONSTRUCTION / SERVICE BILLING SYSTEM SPECIFICATIONS Jonas Software, March 2013 Contents Introduction... 3 Hardware Specifications... 4 Recommended Server Hardware Specifications... 4 Recommended Workstation
Advanced Diploma In Hardware, Networking & Server Configuration
Advanced Diploma In Hardware, Networking & Server Configuration Who should do this course? This course is meant for those persons who have a dream of getting job based on Computer Hardware, Networking
LockView 4.3.1 CompX Database & Network Configuration & Installation Manual
LockView 4.3.1 CompX Database & Network Configuration & Installation Manual Table of Contents CompX Database & Network Configuration & Installation Manual Introduction... 4 Installation Requirements...
INFORMATION TECHNOLOGY MANAGEMENT COMMITTEE LIVINGSTON, NJ WWW.LIVINGSTONNJ.ORG ITMC TECH TIP ROB COONCE, MARCH 2008
INFORMATION TECHNOLOGY MANAGEMENT COMMITTEE LIVINGSTON, NJ WWW.LIVINGSTONNJ.ORG What is wireless technology? ITMC TECH TIP ROB COONCE, MARCH 2008 In our world today, this may mean sitting down at a coffee
Networking Best Practices Guide. Version 6.5
Networking Best Practices Guide Version 6.5 Summer 2010 Copyright: 2010, CCH, a Wolters Kluwer business. All rights reserved. Material in this publication may not be reproduced or transmitted in any form
English version. LW320/LW321 Sweex Wireless 300N Router. Package Contents. Terminology list
LW320/LW321 Sweex Wireless 300N Router Do not expose the Sweex Wireless 300N Router to extreme temperatures. Do not place the device in direct sunlight or in the direct vicinity of heating elements. Do
Backup and Recovery FAQs
May 2013 Page 1 This document answers frequently asked questions regarding the Emerson system Backup and Recovery application. www.deltav.com May 2013 Page 2 Table of Contents Introduction... 6 General
Chapter 2 Configuring Your Wireless Network and Security Settings
Chapter 2 Configuring Your Wireless Network and Security Settings This chapter describes how to configure the wireless features of your DG834N RangeMax TM NEXT Wireless ADSL2+ Modem Router. For a wireless
Audit4 Installation Requirements
Audit4 version 8.1+ 2015 Copyright 2012 S4S Pty Ltd Audit4 Support Matrix 2015 The following table provides details on the operating system and database engine support for Audit4 as at March 2015. Operating
User Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream
User Manual Onsight Management Suite Version 5.1 Another Innovation by Librestream Doc #: 400075-06 May 2012 Information in this document is subject to change without notice. Reproduction in any manner
INFUSION BUSINESS SOFTWARE Installation and Upgrade Guide
INFUSION BUSINESS SOFTWARE Installation and Upgrade Guide 27/01/2016 Published by Infusion Business Software Ltd All Rights Reserved Copyright Infusion Business Software Ltd 2012 Copyright No part of this
Profit Tools for Trucking General System Requirements. Requirements For Hardware, Network, Software and Communications
Revised 01/02/14 Profit Tools for Trucking General System Requirements Requirements For Hardware, Network, Software and Communications Hardware and Network Requirements: CLIENTS 1. Practical Minimum Client
Storage Guardian Remote Backup Restore and Archive Services
Storage Guardian Remote Backup Restore and Archive Services Storage Guardian is the unique alternative to traditional backup methods, replacing conventional tapebased backup systems with a fully automated,
Getting Started. Symantec Client Security. About Symantec Client Security. How to get started
Getting Started Symantec Client Security About Security Security provides scalable, cross-platform firewall, intrusion prevention, and antivirus protection for workstations and antivirus protection for
enicq 5 System Administrator s Guide
Vermont Oxford Network enicq 5 Documentation enicq 5 System Administrator s Guide Release 2.0 Published November 2014 2014 Vermont Oxford Network. All Rights Reserved. enicq 5 System Administrator s Guide
C R E A T E D 8 / 2 1 / 2 0 1 3. Recommended Settings for AVImark
C R E A T E D 8 / 2 1 / 2 0 1 3 Recommended Settings for AVImark Introduction The following pages contain instructions for setting up AVImark. If you need assistance, please call our friendly technical
Legal Notes. Regarding Trademarks. Models supported by the KX printer driver. 2011 KYOCERA MITA Corporation
Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held liable for any problems arising from
Step-by-Step Guide to Securing Windows XP Professional with Service Pack 2 in Small and Medium Businesses
Step-by-Step Guide to Securing Windows XP Professional with Service Pack 2 in Small and Medium Businesses 2004 Microsoft Corporation. All rights reserved. This document is for informational purposes only.
BASIC INSTRUCTIONS TO CONFIGURE ZYXEL P8701T CPE USING THE WEB INTERFACE
BASIC INSTRUCTIONS TO CONFIGURE ZYXEL P8701T CPE USING THE WEB INTERFACE 12/11/2012 Index 1 INTRODUCTION... 1-1 2 FACTORY DEFAULT SETTINGS... 2-1 3 CPE BASIC OPERATIONS... 3-1 3.1 PASSWORD MODIFICATION...
CITRIX 1Y0-A14 EXAM QUESTIONS & ANSWERS
CITRIX 1Y0-A14 EXAM QUESTIONS & ANSWERS Number: 1Y0-A14 Passing Score: 800 Time Limit: 90 min File Version: 42.2 http://www.gratisexam.com/ CITRIX 1Y0-A14 EXAM QUESTIONS & ANSWERS Exam Name: Implementing
LW310V2 Sweex Wireless 300N Router
LW310V2 Sweex Wireless 300N Router Please notice! On the included CD-ROM you will find the Setup Wizard. This easy install procedure will show you how to setup the router step-by-step. Do not expose the
Hosting Users Guide 2011
Hosting Users Guide 2011 eofficemgr technology support for small business Celebrating a decade of providing innovative cloud computing services to small business. Table of Contents Overview... 3 Configure
Hardware Requirements
Hardware Requirements This guide details the critical points of installing the IntraVet software from specific technology requirements to explicit hardware recommendations. communication organization practice
INFORMATION TECHNOLOGY. Revised May 07. Home Networking Guide
INFORMATION TECHNOLOGY Revised May 07 Home Networking Guide Contents Introduction... 3 Intent... 3 Disclaimer... 3 Rexnord Support limitations... 3 Remotely Connecting to the Rexnord Data Network... 3
BULLGUARD BAckUp GUIDE
BULLGUARD backup GUIDE CONTENTS BullGuard Backup introduction page 3 Installing BullGuard Backup page 6 Uninstalling BullGuard Backup page 11 Registering BullGuard Backup: creating an account page 12 Running
Setup and Configuration Guide for Pathways Mobile Estimating
Setup and Configuration Guide for Pathways Mobile Estimating Setup and Configuration Guide for Pathways Mobile Estimating Copyright 2008 by CCC Information Services Inc. All rights reserved. No part of
Security. TestOut Modules 12.6 12.10
Security TestOut Modules 12.6 12.10 Authentication Authentication is the process of submitting and checking credentials to validate or prove user identity. 1. Username 2. Credentials Password Smart card
USER GUIDE AC2400. DUAL BAND GIGABIT Wi Fi ROUTER. Model# E8350
USER GUIDE AC2400 DUAL BAND GIGABIT Wi Fi ROUTER Model# E8350 Table of Contents Product overview E8350..................................... 1 Setting Up Your E-Series Router Where to find more help.........................
Networking. General networking. Networking overview. Common home network configurations. Wired network example. Wireless network examples
Networking General networking Networking overview A network is a collection of devices such as computers, printers, Ethernet hubs, wireless access points, and routers connected together for communication
2 Setting Up the Hardware for a Wired Ethernet Network... 13. 3 Setting Up the Software for an Ethernet Network... 21
Contents 1 Networking Basics............................................... 1 Selecting a network connection........................................ 2 Wired Ethernet network...........................................
Allworx Installation Course
VPN Hello and welcome. In the VPN section we will cover the steps for enabling the VPN feature on the Allworx server and how to set up a VPN connection to the Allworx System from your PC. Page 1 VPN The
Link Link sys E3000 sys RE1000
User Guide High Performance Extender Wireless-N Router Linksys Linksys RE1000 E3000Wireless-N Table of Contents Contents Chapter 1: Product Overview 1 Front 1 Top 1 Bottom 1 Back 2 Chapter 2: Advanced
Verizon Remote Access User Guide
Version 17.12 Last Updated: August 2012 2012 Verizon. All Rights Reserved. The Verizon names and logos and all other names, logos, and slogans identifying Verizon s products and services are trademarks
Gorilla CRM System Requirements
Gorilla CRM System Requirements A Supplement to the Bill Good Marketing System Proposal Bill Good Marketing System April 2010 White Paper Bill Good, Chairman of Bill Good Marketing, Inc. 1 PREFACE This
Creating client-server setup with multiple clients
Creating client-server setup with multiple clients Coffalyser.Net uses a SQL client server database model to store all project/experiment- related data. The client-server model has one main application
with the ArchiveSync Add-On Evaluator s Guide 2015 Software Pursuits, Inc.
with the ArchiveSync Add-On Evaluator s Guide 2015 Table of Contents Introduction... 2 System Requirements... 2 Contact Information... 3 Required Add-Ons for ArchiveSync in Real-Time... 3 Communications
Updated: May 2008. Copyright 2005-2008 DBA Software Inc. All rights reserved. 2 Getting Started Guide
Updated: May 2008 Copyright 2005-2008 DBA Software Inc. All rights reserved. 2 Getting Started Guide Table of Contents Welcome 4 Support Center Subscription 5 1. System Requirements 7 2. Installing the
HOUR 3. Installing Windows Server 2003
HOUR 3 Installing Windows Server 2003 In this hour, we discuss the different types of Windows Server 2003 installations, such as upgrading an existing server or making a clean install on a server that
Preparing Your Network for an MDsuite Installation
Preparing Your Network for an MDsuite Installation Professional Data Services 1632 East 23 rd Avenue Hutchinson, KS 67502 Toll-free: 800.875.0480 Fax: 858.486.5493 www.mdsuite.com Introduction This document
HELPDESK & SERVER MONITORING. Helpdesk HOURS OF COVER KEY FEATURES
HELPDESK & SERVER MONITORING Organisations are under pressure to implement efficient, reliable and cost effective helpdesk And server monitoring service solutions. Our Helpdesk & Server Monitoring services
System i and System p. Customer service, support, and troubleshooting
System i and System p Customer service, support, and troubleshooting System i and System p Customer service, support, and troubleshooting Note Before using this information and the product it supports,
Millbeck Communications. Secure Remote Access Service. Internet VPN Access to N3. VPN Client Set Up Guide Version 6.0
Millbeck Communications Secure Remote Access Service Internet VPN Access to N3 VPN Client Set Up Guide Version 6.0 COPYRIGHT NOTICE Copyright 2013 Millbeck Communications Ltd. All Rights Reserved. Introduction
Installation Guide: Delta Module Manager Launcher
Installation Guide: Delta Module Manager Launcher Overview... 2 Delta Module Manager Launcher... 2 Pre-Installation Considerations... 3 Hardware Requirements... 3 Software Requirements... 3 Virtualisation...
Hardware/Software Requirements For Self-Hosting Multi Server
Hardware/Software Requirements For Self-Hosting Multi Server Ebix recommends two or more servers for sites with more than 20 active users. The first step is deciding which type of configuration would best
Internet and Intranet Calling with Polycom PVX 8.0.1
Internet and Intranet Calling with Polycom PVX 8.0.1 An Application Note Polycom PVX is an advanced conferencing software application that delivers Polycom's premium quality audio, video, and content sharing
Information Technology Security Procedures
Information Technology Security Procedures Prepared By: Paul Athaide Date Prepared: Dec 1, 2010 Revised By: Paul Athaide Date Revised: September 20, 2012 Version 1.2 Contents 1. Policy Procedures... 3
Table of Contents. Introduction...9. Installation...17. Program Tour...31. The Program Components...10 Main Program Features...11
2011 AdRem Software, Inc. This document is written by AdRem Software and represents the views and opinions of AdRem Software regarding its content, as of the date the document was issued. The information
Distribution One Server Requirements
Distribution One Server Requirements Introduction Welcome to the Hardware Configuration Guide. The goal of this guide is to provide a practical approach to sizing your Distribution One application and
Storage Sync for Hyper-V. Installation Guide for Microsoft Hyper-V
Installation Guide for Microsoft Hyper-V Egnyte Inc. 1890 N. Shoreline Blvd. Mountain View, CA 94043, USA Phone: 877-7EGNYTE (877-734-6983) www.egnyte.com 2013 by Egnyte Inc. All rights reserved. Revised
Diamond II v2.3 Service Pack 4 Installation Manual
Diamond II v2.3 Service Pack 4 Installation Manual P/N 460987001B ISS 26APR11 Copyright Disclaimer Trademarks and patents Intended use Software license agreement FCC compliance Certification and compliance
Windows Server 2003 default services
Windows Server 2003 default services To view a description for a particular service, hover the mouse pointer over the service in the Name column. The descriptions included here are based on Microsoft documentation.
Release Notes for Websense Email Security v7.2
Release Notes for Websense Email Security v7.2 Websense Email Security version 7.2 is a feature release that includes support for Windows Server 2008 as well as support for Microsoft SQL Server 2008. Version
Created By: 2009 Windows Server Security Best Practices Committee. Revised By: 2014 Windows Server Security Best Practices Committee
Windows Server Security Best Practices Initial Document Created By: 2009 Windows Server Security Best Practices Committee Document Creation Date: August 21, 2009 Revision Revised By: 2014 Windows Server
Sage ERP MAS 90 Sage ERP MAS 200 Sage ERP MAS 200 SQL. Installation and System Administrator's Guide 4MASIN450-08
Sage ERP MAS 90 Sage ERP MAS 200 Sage ERP MAS 200 SQL Installation and System Administrator's Guide 4MASIN450-08 2011 Sage Software, Inc. All rights reserved. Sage, the Sage logos and the Sage product
LockView 4.2 CompX Database & Network Configuration & Installation Manual
LockView 4.2 CompX Database & Network Configuration & Installation Manual Table of Contents CompX Database & Network Configuration & Installation Manual Introduction... 4 Installation Requirements... 5
GUARD1 PLUS SE Administrator's Manual
GUARD1 PLUS SE Administrator's Manual Version 4.4 30700 Bainbridge Road Solon, Ohio 44139 Phone 216-595-0890 Fax 216-595-0991 [email protected] www.guard1.com i 2010 TimeKeeping Systems, Inc. GUARD1 PLUS
CentreWare Internet Services Setup and User Guide. Version 2.0
CentreWare Internet Services Setup and User Guide Version 2.0 Xerox Corporation Copyright 1999 by Xerox Corporation. All rights reserved. XEROX, The Document Company, the digital X logo, CentreWare, and
InventoryControl for use with QuoteWerks Quick Start Guide
InventoryControl for use with QuoteWerks Quick Start Guide Copyright 2013 Wasp Barcode Technologies 1400 10 th St. Plano, TX 75074 All Rights Reserved STATEMENTS IN THIS DOCUMENT REGARDING THIRD PARTY
A Division of Cisco Systems, Inc. GHz 2.4 802.11g. Wireless-G. USB Network Adapter with RangeBooster. User Guide WIRELESS WUSB54GR. Model No.
A Division of Cisco Systems, Inc. GHz 2.4 802.11g WIRELESS Wireless-G USB Network Adapter with RangeBooster User Guide Model No. WUSB54GR Copyright and Trademarks Specifications are subject to change without
System Requirements. 60GB free after OS and Updates, Raid 5 or Hybrid SSD array
System Requirements The system requirements are shown below for each type of installation, software, and peripherals. Should you have questions about the system requirements or replacement peripherals
Designing and Deploying Connected Device Solutions for Small and Medium Business
Designing and Deploying Connected Device Solutions for Small and Medium Business HPATA Connected Devices Study Guide Rev 1.1 Table of Contents 1.1 Describe and recognize common desktop virtualization technologies
Introduction 1-1 Installing FAS 500 Asset Accounting the First Time 2-1 Installing FAS 500 Asset Accounting: Upgrading from a Prior Version 3-1
Contents 1. Introduction 1-1 Supported Operating Environments................ 1-1 System Requirements............................. 1-2 Security Requirements........................ 1-3 Installing Server
General Hardware Requirements... 1. Workstation Requirements... 2. Application / Database Server Requirements... 3. Storage Requirements...
General Contents General... 1 Workstation Requirements... 2 Application / Database Server Requirements... 3 Storage Requirements... 4 Thin Client Requirements... 5 HIS/RIS Interface Installation... 6 Interfacing...
System Requirements - filesmart
System Requirements - filesmart The following are minimum and recommended system requirements for filesmart. Whilst the program will operate on the minimums listed, we strongly suggest you meet or exceed
Chapter 15: Advanced Networks
Chapter 15: Advanced Networks IT Essentials: PC Hardware and Software v4.0 1 Determine a Network Topology A site survey is a physical inspection of the building that will help determine a basic logical
Small Business Server Part 1
Small Business Server Part 1 Presented by : Robert Crane BE MBA MCP [email protected] Computer Information Agency http://www.ciaops.com Agenda Week 1 What is SBS / Setup Week 2 Using & configuring SBS
Security Policy JUNE 1, 2012. SalesNOW. Security Policy v.1.4 2012-06-01. v.1.4 2012-06-01 1
JUNE 1, 2012 SalesNOW Security Policy v.1.4 2012-06-01 v.1.4 2012-06-01 1 Overview Interchange Solutions Inc. (Interchange) is the proud maker of SalesNOW. Interchange understands that your trust in us
Stable and Secure Network Infrastructure Benchmarks
Last updated: March 4, 2014 Stable and Secure Network Infrastructure Benchmarks 501 Commons has developed a list of key benchmarks for maintaining a stable and secure IT Infrastructure for conducting day-to-day
Network FAX Driver. Operation Guide
Network FAX Driver Operation Guide About this Operation Guide This Operation Guide explains the settings for the Network FAX driver as well as the procedures that are required in order to use the Network
Cloud Services for Backup Exec. Planning and Deployment Guide
Cloud Services for Backup Exec Planning and Deployment Guide Chapter 1 Introducing Cloud Services for Backup Exec This chapter includes the following topics: About Cloud Services for Backup Exec Security
Rapattoni Magic 9 Hardware and Software Guidelines
Rapattoni Magic 9 real estate association management software represents a huge step forward in technology. It operates on Microsoft server technology and uses Microsoft SQL Server (MSSQL) as its underlying
Rapattoni Magic 10 Version Date: May 1, 2015. Hardware and Software Guidelines for Customer Hosted Systems
for Customer Hosted Systems Rapattoni Magic 10 real estate association management software represents a huge step forward in technology. It operates on Microsoft server technology and uses Microsoft SQL
FileMaker Server 7. Administrator s Guide. For Windows and Mac OS
FileMaker Server 7 Administrator s Guide For Windows and Mac OS 1994-2004, FileMaker, Inc. All Rights Reserved. FileMaker, Inc. 5201 Patrick Henry Drive Santa Clara, California 95054 FileMaker is a trademark
Agency Pre Migration Tasks
Agency Pre Migration Tasks This document is to be provided to the agency and will be reviewed during the Migration Technical Kickoff meeting between the ICS Technical Team and the agency. Network: Required
ImproMed Hardware/Software Specifications
A Tradition of Excellence ImproMed Hardware/Software Specifications For Infinity, Triple Crown, Advantage +, and DVM Manager IMP-HardwareSpecs.pdf Contents Introduction 3 Server Specifications 4 Virtual
System Requirements. 60GB free after OS and Updates, Raid 5 or Hybrid SSD array
System Requirements The system requirements are shown below for each type of installation, software, and peripherals. Should you have questions about the system requirements or replacement peripherals
Windows 7, Enterprise Desktop Support Technician
Windows 7, Enterprise Desktop Support Technician Course Number: 70-685 Certification Exam This course is preparation for the Microsoft Certified IT Professional (MCITP) Exam, Exam 70-685: Pro: Windows
Quick Start Guide 0514US
Quick Start Guide Copyright Wasp Barcode Technologies 2014 No part of this publication may be reproduced or transmitted in any form or by any means without the written permission of Wasp Barcode Technologies.
