ENABLE LOGON/LOGOFF AUDITING

Size: px
Start display at page:

Download "ENABLE LOGON/LOGOFF AUDITING"

Transcription

1 Lepide Software LepideAuditor Suite ENABLE LOGON/LOGOFF AUDITING This document explains the steps required to enable the auditing of logon and logoff events for a domain.

2 Table of Contents 1. Introduction Steps for Agent-based Auditing Steps for Agentless Auditing Installing Logon/Logoff Audit Module Stopping Logon/Logoff Module Uninstalling Logon/Logoff Audit Module Common Steps for Server Generating Logon.exe file Creating Group Policy Object at Server Support Helpline Lepide Software Pvt. Ltd. Page 2

3 1. Introduction To collect logon/logoff events, LepideAuditor Suite needs an agent to be added on server and a group policy at the server linked with this agent. This will help the software to monitor the logon/logoff events, generate their reports, show their LiveFeed updates, sending their reports on schedule, and dispatching alerts on real-time basis. The following items will not be generated if the required steps are not performed on the server. "Successful User Logon/Logoff" and "Domain Controller Logon/Logoff" Reports Custom Reports, LiveFeed, alerts, and scheduled reports for above reports 2. Steps for Agent-based Auditing In case of selecting agent-based auditing, the agent to collect logon and logoff events will be installed by default on the server. So, there is no additional steps are required to be performed except the default steps illustrated herein below for server. 3. Steps for Agentless Auditing In case of agentless auditing, no agent will be installed on server to collect the logon and logoff events. Therefore, it is required to install a module agent on a Domain Controller of the domain, which will collect these events and pass it to software. A separate installer file to install logon/logoff module will be supplied with the downloaded setup. It is required to run this installer file and install Logon/Logoff Audit module agent on any domain controller of the domain. Please refer to page Install Logon/Logoff Audit Module page to know more about it Lepide Software Pvt. Ltd. Page 3

4 3.1 Installing Logon/Logoff Audit Module If you are adding the domain in agentless mode that is without installing agent, then it is required to install LepideAuditor Logon/Logoff Audit Module on any of the domain controllers to collect logon/logoff events. If not installed, then logon/logoff events will not be collected; therefore, reports ("Successful User Logon/Logoff" and "Domain Controller Logon/Logoff") and their associated LiveFeed, alerts, and scheduled reports will not be generated. The installer file for this module will come with main setup file of software, which you can download from After downloading its installer file, execute the following steps to install the Logon/Logoff Audit Module. 1. Double click the downloaded installer file to start the installation. Figure 1: Starting the Installation 2015 Lepide Software Pvt. Ltd. Page 4

5 2. Click "Next" to proceed. This will display the following wizard. Figure 2: License Agreement 3. It's recommended to read the license agreement carefully before installing the software. 4. If you agree to the license agreement and want to continue the installation, then check "I accept the agreement" and click "Next" Lepide Software Pvt. Ltd. Page 5

6 5. Here, you can customize the location of the shortcuts folder in the Start Menu. Figure 3: Option to modify the Shortcuts folder 6. Click "Browse" and select a different location to modify the location of the shortcuts folder in the Start Menu Lepide Software Pvt. Ltd. Page 6

7 7. Click "Next" to use the default or customized shortcuts folder. This will display the following screen. Figure 4: Perform Additional Tasks 8. Check the boxes titled "Create a desktop icon" and/or "Create a Quick Launch icon", if you want. 9. Click "Next" to proceed further Lepide Software Pvt. Ltd. Page 7

8 Figure 5: Module is now ready to install 10. Click "Install" to begin the installation procedure. Figure 6: Module is being installed 2015 Lepide Software Pvt. Ltd. Page 8

9 11. When the installation process is completed successfully, you'll receive the following message. Figure 7: Module is installed 12. Click the Finish button to complete the process. It is recommended to keep the option "Launch LepideAuditor Logon/Logoff Audit Module" checked. Figure 8: Module is running 2015 Lepide Software Pvt. Ltd. Page 9

10 13. You can click cross icon on this dialog box to close it. However, LepideAuditor Logon/Logoff Audit Module will kept running and its icon will be visible in the system tray. Figure 9: Showing icon and options for Logon/Logoff Audit Module 3.2 Stopping Logon/Logoff Module You have to stop app server either to stop receiving logon/logoff events to uninstall the Module. Follow the steps below, 1. Right click on the server icon in system tray, and click "Exit". Figure 10: Option to stop and exit from Logon/Logoff Audit Module 2. Once you click "Exit", following warning message will appear on screen. 3. Click "Yes" to stop the module. Figure 11: Warning Message while stopping module 2015 Lepide Software Pvt. Ltd. Page 10

11 3.3 Uninstalling Logon/Logoff Audit Module Execute the following steps to uninstall the Logon/Logoff Module. 1. There are two ways to start the uninstallation. a. Go to Start All Programs "LepideAuditor Logon/Logoff Audit Module", click "Uninstall LepideAuditor Logon/Logoff Audit Module". b. Click Start Control Panel. Its window appears. Launch "Add/Remove Programs" or "Programs". Select "LepideAuditor Logon/Logoff Audit Module" and click "Remove". 2. Following any of the above methods will display a warning message. 3. Click Yes to uninstall the module. Figure 12: Warning to uninstall the module Lepide Software Pvt. Ltd. Page 11

12 Figure 13: Module is being uninstalled 4. After completing the un-installation, the following message box will appear. 5. Click OK to finish this process. Figure 14: Module has been uninstalled. This will uninstall the LepideAuditor Logon/Logoff Audit Module from your system Lepide Software Pvt. Ltd. Page 12

13 4. Common Steps for Server You have to perform the following steps to generate logon.exe for server and then to create a Group Policy to link it. This will enable the monitoring of logon/logoff events. If you have not generated "logon.exe" and linked it with server, then you will get the following error while generating "Successful User Logon/Logoff" or "Domain Controller Logon/Logoff". Figure 15: Error while generating logon/logoff reports Follow the steps herein below for both agentless and agent-based auditing to fix this issue and to enable the collection of logon/logoff events. 4.1 Generating Logon.exe file Perform the steps below at software to generate Logon.exe file for enabling monitoring. 1. Use any of the following methods to start with. A. While adding a domain with Advanced Configuration, you will come at the following step Lepide Software Pvt. Ltd. Page 13

14 Figure 16: Advanced Domain Configuration B. While modifying the domain, click "Object Class and Other Settings" to access the following settings Lepide Software Pvt. Ltd. Page 14

15 Figure 17: Modifying Object Class and other Settings 2. Check "Audit Successful User Logon/Logoff" option. 3. Click icon. It will show the following dialog box. Figure 18: Dialog box to create logon/logoff script 2015 Lepide Software Pvt. Ltd. Page 15

16 4. Follow any of the steps below as per the auditing mode. a. For Agent-based Auditing: Enter "IP Address" of server, of which logon/logoff events has to be monitored. b. For Agentless Auditing: Enter the IP Address of the domain controller, where Logon/Logoff Audit Module has been installed. 5. Click icon to select the location at server where you want to the save this executable file. Figure 19: Browse for Server It is recommended to save the executable file at the shared folder of server, of which logon/logoff events you want to monitor. 6. Select the folder and click "OK". This will take you back to previous dialog box, which will now show the selected folder Lepide Software Pvt. Ltd. Page 16

17 Figure 20: Sample details to save executable file 7. Click "OK". It will generate the executable file and will save at the specified location. You will receive the following message confirming the same. Figure 21: Successfully generated executable file 8. Click the link saying "Please follow link" to know the steps to be performed at the server. It will open a HTML file in the default Web Browser Lepide Software Pvt. Ltd. Page 17

18 Figure 22: Document showing further steps to be performed 2015 Lepide Software Pvt. Ltd. Page 18

19 4.2 Creating Group Policy Object at Server Execute the steps below at the domain controller, of which logon/logoff monitoring you want to enable. 1. Go to "Start Menu" "All Programs" "Administrative Tools" "Group Policy Management". This will display the Group Policy Management window. Figure 23: Group Policy Management 2. In the left panel, expand the nodes to reach the node of domain controller Lepide Software Pvt. Ltd. Page 19

20 3. Right click on the node of domain. This will display the following context menu. Figure 24: Context Menu for a DC in Group Policy Management 4. Select the option "Create a GPO in this domain, and Link here...". This will display the following dialog box to create a new Group Policy Object (GPO). Figure 25: Box to create a new GPO 5. Provide a name for the new Group Policy say - "Logon Logoff by LepideAuditor". Figure 26: Providing a name for the GPO 2015 Lepide Software Pvt. Ltd. Page 20

21 6. Click "OK". This will create the new GPO and will show it in the Group Policy Management. Figure 27: Showing the newly created GPO 2015 Lepide Software Pvt. Ltd. Page 21

22 7. Right click on this newly created GPO. Figure 28: Right Click Menu for the new GPO 8. Select the option "Edit" in this context menu. This will show the Group Policy Management Editor. Figure 29: Group Policy Management Editor 2015 Lepide Software Pvt. Ltd. Page 22

23 9. In the left pane, expand the nodes in this order - "Logon Logoff by LepideAuditor" "User Configuration" "Policies" "Windows Settings" Scripts (Logon/Logoff)". This will display two policies - Logon and Logoff in the Right Panel. Figure 30: Showing Logon and Logoff Policies 10. Here, you have to modify any of these two policies. In this test case, we're modifying the logon policy Lepide Software Pvt. Ltd. Page 23

24 11. Double click the "Logon" policy in the Right Panel. This will display the following dialog box. Figure 31: Logon Properties 12. Click "Add" on this tab. This will display the following box to add a script. Figure 32: Dialog box to add a logon script 2015 Lepide Software Pvt. Ltd. Page 24

25 13. Click "Browse" in this new box. Leave this box opened up as it is. Figure 33: Dialog box to open a logon script file 2015 Lepide Software Pvt. Ltd. Page 25

26 14. Open the shared folder where you have copied the "Logon.exe" script file. Copy it. Figure 34: Copying file "Logon.exe 15. Paste this file "logon.exe" in the folder section of the "Browse" window Lepide Software Pvt. Ltd. Page 26

27 Figure 35: Pasted the file named "Logon.exe 16. Select the file and click "Open". This will take you back to the "Add a Script" box, which will display the selected file. Figure 36: File has been selected 2015 Lepide Software Pvt. Ltd. Page 27

28 17. Click "OK". This will take you back to the "Logon Properties". Figure 37: Required Logon Properties 18. Click "Apply" and then click "OK". This will close the "Logon Properties". 19. Close the window of "Group Policy Management Editor". 20. Come back to "Group Policy Management" window. 21. Select the newly created/modified policy in the Left Panel. This will display its details in the Right Panel Lepide Software Pvt. Ltd. Page 28

29 Figure 38: Showing the properties of newly created policy 22. In its Right Panel, the "Security Filtering" section lets you select the objects like users, groups and computers on which this policy will be applied. 23. Click "Add" to display the box to add the objects upon which this policy will be applicable. Figure 39: Select the objects to be affected by this policy 2015 Lepide Software Pvt. Ltd. Page 29

30 24. Type "Everyone" in the text box and click "Check Names". This will select all objects. Figure 40: Selecting everyone 25. Click "OK" to confirm the change and take you back to the "Group Policy Management" window, which will now display the newly added object. Figure 41: Showing 'Everyone' in Security Filtering 2015 Lepide Software Pvt. Ltd. Page 30

31 26. Close the "Group Policy Management" window. 27. Go to the Run Prompt or Command Prompt and type the command "gpupdate". Figure 42: Command Prompt 28. Press Enter to run the "gpupdate" command. This will update the group policies. Figure 43: Updated the Group Policies successfully 2015 Lepide Software Pvt. Ltd. Page 31

32 29. It is required to logoff the current user and then logon again at the Windows Server to run the Logon.exe on the server. This will enable both the collection of logon/logoff events and the generation of relevant reports, alerts, and LiveFeed updates. 5. Support If user logon and logoff events are still not being captured and/or displayed in LepideAuditor Suite, then please contact our Support Team. 5.1 Helpline (Toll Free for USA/CANADA) You can also us about your queries at: for Sales for Support for General Queries 2015 Lepide Software Pvt. Ltd. Page 32

TROUBLESHOOTING GUIDE

TROUBLESHOOTING GUIDE Lepide Software LepideAuditor Suite TROUBLESHOOTING GUIDE This document explains the troubleshooting of the common issues that may appear while using LepideAuditor Suite. Copyright LepideAuditor Suite,

More information

Configuration Guide for SQL Server This document explains the steps to configure LepideAuditor Suite to add and audit SQL Server.

Configuration Guide for SQL Server This document explains the steps to configure LepideAuditor Suite to add and audit SQL Server. LEPIDE SOFTWARE Configuration Guide for SQL Server This document explains the steps to configure LepideAuditor Suite to add and audit SQL Server. LepideAuditor Suite Lepide Software Private Limited, All

More information

LepideAuditor Suite for File Server. Installation and Configuration Guide

LepideAuditor Suite for File Server. Installation and Configuration Guide LepideAuditor Suite for File Server Installation and Configuration Guide Table of Contents 1. Introduction... 4 2. Requirements and Prerequisites... 4 2.1 Basic System Requirements... 4 2.2 Supported Servers

More information

Secrets of Event Viewer for Active Directory Security Auditing Lepide Software

Secrets of Event Viewer for Active Directory Security Auditing Lepide Software Secrets of Event Viewer for Active Directory Security Auditing Windows Event Viewer doesn t need any introduction to the IT Administrators. However, some of its hidden secrets, especially those related

More information

Create, Link, or Edit a GPO with Active Directory Users and Computers

Create, Link, or Edit a GPO with Active Directory Users and Computers How to Edit Local Computer Policy Settings To edit the local computer policy settings, you must be a local computer administrator or a member of the Domain Admins or Enterprise Admins groups. 1. Add the

More information

HELP DOCUMENTATION E-SSOM DEPLOYMENT GUIDE

HELP DOCUMENTATION E-SSOM DEPLOYMENT GUIDE HELP DOCUMENTATION E-SSOM DEPLOYMENT GUIDE Copyright 1998-2013 Tools4ever B.V. All rights reserved. No part of the contents of this user guide may be reproduced or transmitted in any form or by any means

More information

ACTIVE DIRECTORY DEPLOYMENT

ACTIVE DIRECTORY DEPLOYMENT ACTIVE DIRECTORY DEPLOYMENT CASAS Technical Support 800.255.1036 2009 Comprehensive Adult Student Assessment Systems. All rights reserved. Version 031809 CONTENTS 1. INTRODUCTION... 1 1.1 LAN PREREQUISITES...

More information

Enabling Auditing Manually

Enabling Auditing Manually Enabling Auditing Manually This document explains the steps required to enable auditing at a domain manually Table of Contents Enabling auditing in Lepideauditor Suite... 3 Steps to enable auditing while

More information

How to recover IE Client

How to recover IE Client HIKVISION EUROPE B.V. How to recover IE Client (WebClientActiveX Control) Name: WebClientActiveX Control Publisher: HANGZHOU HIKVISION DIGITAL TECHNOLOGY CO.,LTD. Type: ActiveX Control Version: 2.4.0.56

More information

4cast Client Specification and Installation

4cast Client Specification and Installation 4cast Client Specification and Installation Version 2015.00 10 November 2014 Innovative Solutions for Education Management www.drakelane.co.uk System requirements The client requires Administrative rights

More information

Virtual Office Remote Installation Guide

Virtual Office Remote Installation Guide Virtual Office Remote Installation Guide Table of Contents VIRTUAL OFFICE REMOTE INSTALLATION GUIDE... 3 UNIVERSAL PRINTER CONFIGURATION INSTRUCTIONS... 12 CHANGING DEFAULT PRINTERS ON LOCAL SYSTEM...

More information

SSL Intercept Mode. Certificate Installation Guide. Revision 1.0.0. Warning and Disclaimer

SSL Intercept Mode. Certificate Installation Guide. Revision 1.0.0. Warning and Disclaimer SSL Intercept Mode Certificate Installation Guide Revision 1.0.0 Warning and Disclaimer This document is designed to provide information about the configuration of CensorNet Professional. Every effort

More information

How to Enable the Audit of Active Directory Objects in Windows 2008 R2 Lepide Software

How to Enable the Audit of Active Directory Objects in Windows 2008 R2 Lepide Software How to Enable the Audit of Active Directory Objects in Windows 2008 R2 Windows 2008 R2 has much more and better features than its predecessors. It also wins in the native auditing part when it comes to

More information

HOW TO SILENTLY INSTALL CLOUD LINK REMOTELY WITHOUT SUPERVISION

HOW TO SILENTLY INSTALL CLOUD LINK REMOTELY WITHOUT SUPERVISION HOW TO SILENTLY INSTALL CLOUD LINK REMOTELY WITHOUT SUPERVISION Version 1.1 / Last updated November 2012 INTRODUCTION The Cloud Link for Windows client software is packaged as an MSI (Microsoft Installer)

More information

etoken Enterprise For: SSL SSL with etoken

etoken Enterprise For: SSL SSL with etoken etoken Enterprise For: SSL SSL with etoken System Requirements Windows 2000 Internet Explorer 5.0 and above Netscape 4.6 and above etoken R2 or Pro key Install etoken RTE Certificates from: (click on the

More information

Lab A: Deploying and Managing Software by Using Group Policy Answer Key

Lab A: Deploying and Managing Software by Using Group Policy Answer Key Lab A: Deploying and Managing Software by Using Group Policy Answer Key Exercise 1 Assigning Software This Answer Key provides the detailed steps for completing Lab A: Deploying and Managing Software by

More information

RMS Cloud - Setup Instructions for Windows Computers

RMS Cloud - Setup Instructions for Windows Computers RMS Cloud - Setup Instructions for Windows Computers Please follow these instructions on each windows computer that requires a connection to the RMS Cloud system. If you are using a Mac, please see the

More information

Lepide Active Directory Self Service. Installation Guide. Lepide Active Directory Self Service Tool. Lepide Software Private Limited Page 1

Lepide Active Directory Self Service. Installation Guide. Lepide Active Directory Self Service Tool. Lepide Software Private Limited Page 1 Installation Guide Lepide Active Directory Self Service Tool Lepide Software Private Limited Page 1 Lepide Software Private Limited, All Rights Reserved This User Guide and documentation is copyright of

More information

Tech Tips Helpful Tips for Pelco Products

Tech Tips Helpful Tips for Pelco Products DX4104 UPDATING FROM THE NETWORK SERVER October 29, 2009 DX4104 UPDATING FROM THE NETWORK SERVER The Operation/Configuration manual provides users an option for updating the server through the network

More information

Lepide Event Log Manager: Installation Guide. Installation Guide. Lepide Event Log Manager. Lepide Software Private Limited

Lepide Event Log Manager: Installation Guide. Installation Guide. Lepide Event Log Manager. Lepide Software Private Limited Installation Guide Lepide Event Log Manager , All Rights Reserved This User Guide and documentation is copyright of Lepide Software Private Limited, with all rights reserved under the copyright laws. This

More information

To add Citrix XenApp Client Setup for home PC/Office using the 32bit Windows client.

To add Citrix XenApp Client Setup for home PC/Office using the 32bit Windows client. I. PURPOSE To add Citrix XenApp Client Setup for home PC/Office using the 32bit Windows client. II. POLICY: Network Request form must be sent from MIS staff to HCN Hardware Support requesting Citrix XenApp

More information

BioWin Network Installation

BioWin Network Installation BioWin Network Installation Introduction This document outlines the procedures for installing the network version of BioWin. There are three parts to the network version installation: 1. The installation

More information

SARANGSoft WinBackup Business v2.5 Client Installation Guide

SARANGSoft WinBackup Business v2.5 Client Installation Guide SARANGSoft WinBackup Business v2.5 Client Installation Guide (November, 2015) WinBackup Business Client is a part of WinBackup Business application. It runs in the background on every client computer that

More information

Outpost Office Firewall

Outpost Office Firewall Technical Reference Outpost Office Firewall Office Firewall Software from Agnitum Abstract This document provides advanced technical information on administering Outpost Office Firewall in a corporate

More information

Tool Tip. SyAM Management Utilities and Non-Admin Domain Users

Tool Tip. SyAM Management Utilities and Non-Admin Domain Users SyAM Management Utilities and Non-Admin Domain Users Some features of SyAM Management Utilities, including Client Deployment and Third Party Software Deployment, require authentication credentials with

More information

Installing GFI Network Server Monitor

Installing GFI Network Server Monitor Installing GFI Network Server Monitor System Requirements Machines running GFI Network Server Monitor require: Windows 2000 (SP1 or higher), 2003 or XP Pro operating systems. Windows scripting host 5.5

More information

Configuring a Custom Load Evaluator Use the XenApp1 virtual machine, logged on as the XenApp\administrator user for this task.

Configuring a Custom Load Evaluator Use the XenApp1 virtual machine, logged on as the XenApp\administrator user for this task. Lab 8 User name: Administrator Password: Password1 Contents Exercise 8-1: Assigning a Custom Load Evaluator... 1 Scenario... 1 Configuring a Custom Load Evaluator... 1 Assigning a Load Evaluator to a Server...

More information

Lepide Event Log Manager. Users Help Manual. Lepide Event Log Manager. Lepide Software Private Limited. Page 1

Lepide Event Log Manager. Users Help Manual. Lepide Event Log Manager. Lepide Software Private Limited. Page 1 Users Help Manual Lepide Event Log Manager Lepide Software Private Limited. Page 1 Users Help Manual for Lepide Event Log Manager Lepide Software Private Limited, All Rights Reserved This User Guide and

More information

Lepide Active Directory Manager

Lepide Active Directory Manager Installation Guide Lepide Active Directory Manager , All Rights Reserved This User Guide and documentation is copyright of Lepide Software Private Limited, with all rights reserved under the copyright

More information

Census. di Monitoring Installation User s Guide

Census. di Monitoring Installation User s Guide Census di Monitoring Installation User s Guide 1 r1 Contents Introduction... 3 Content overview... 3 Installing Windows 2003 Server Components... 4 System requirements... 4 di Monitoring Web Set-up...

More information

Installation & Activation Guide. Lepide Active Directory Self Service

Installation & Activation Guide. Lepide Active Directory Self Service Installation & Activation Guide Lepide Active Directory Self Service , All Rights Reserved This User Guide and documentation is copyright of Lepide Software Private Limited, with all rights reserved under

More information

Installing IDEA v8 Client Software on Citrix Server Environment

Installing IDEA v8 Client Software on Citrix Server Environment CASEWARE IDEA INC. Installing IDEA v8 Client Software on Citrix Server Environment Quick How to Guide This document describes the process of Installing Caseware IDEA v8 Client software on Citrix Server

More information

DigitalPersona Pro Server for Active Directory v4.x Quick Start Installation Guide

DigitalPersona Pro Server for Active Directory v4.x Quick Start Installation Guide DigitalPersona Pro Server for Active Directory v4.x Quick Start Installation Guide 1 of 7 DigitalPersona Pro Server for Active Directory v4.x Quick Start Installation Guide Process Overview Step Description

More information

TECHNICAL DOCUMENTATION SPECOPS DEPLOY / APP 4.7 DOCUMENTATION

TECHNICAL DOCUMENTATION SPECOPS DEPLOY / APP 4.7 DOCUMENTATION TECHNICAL DOCUMENTATION SPECOPS DEPLOY / APP 4.7 DOCUMENTATION Contents 1. Getting Started... 4 1.1 Specops Deploy Supported Configurations... 4 2. Specops Deploy and Active Directory...5 3. Specops Deploy

More information

Install the Production Treasury Root Certificate (Vista / Win 7)

Install the Production Treasury Root Certificate (Vista / Win 7) Install the Production Treasury Root Certificate (Vista / Win 7) The Production Treasury Root Certificate should be maintained on your local workstations to use OTCnet Check Capture and Deposit Reporting.

More information

Test Note Phone Manager Deployment Windows Group Policy Sever 2003 and XP SPII Clients

Test Note Phone Manager Deployment Windows Group Policy Sever 2003 and XP SPII Clients Test Note Phone Manager Deployment Windows Group Policy Sever 2003 and XP SPII Clients Note: I have only tested these procedures on Server 2003 SP1 (DC) and XP SPII client, in a controlled lab environment,

More information

Global VPN Client Getting Started Guide

Global VPN Client Getting Started Guide Global VPN Client Getting Started Guide 1 Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your system. CAUTION: A CAUTION indicates potential

More information

ILTA HANDS ON Securing Windows 7

ILTA HANDS ON Securing Windows 7 Securing Windows 7 8/23/2011 Table of Contents About this lab... 3 About the Laboratory Environment... 4 Lab 1: Restricting Users... 5 Exercise 1. Verify the default rights of users... 5 Exercise 2. Adding

More information

Web-Access Security Solution

Web-Access Security Solution WavecrestCyBlock Client Version 2.1.13 Web-Access Security Solution UserGuide www.wavecrest.net Copyright Copyright 1996-2014, Wavecrest Computing, Inc. All rights reserved. Use of this product and this

More information

Upgrading from MSDE to SQL Server 2005 Express Edition with Advanced Services SP2

Upgrading from MSDE to SQL Server 2005 Express Edition with Advanced Services SP2 Upgrading from MSDE to SQL Server 2005 Express Edition with Advanced Services SP2 Installation and Configuration Introduction This document will walk you step by step in removing MSDE and the setup and

More information

How to setup a VPN on Windows XP in Safari.

How to setup a VPN on Windows XP in Safari. How to setup a VPN on Windows XP in Safari. If you want to configure a VPN connection from a Windows XP client computer you only need what comes with the Operating System itself, it's all built right in.

More information

Lepide Software. LepideAuditor for File Server [CONFIGURATION GUIDE] This guide informs How to configure settings for first time usage of the software

Lepide Software. LepideAuditor for File Server [CONFIGURATION GUIDE] This guide informs How to configure settings for first time usage of the software Lepide Software LepideAuditor for File Server [CONFIGURATION GUIDE] This guide informs How to configure settings for first time usage of the software Lepide Software Private Limited, All Rights Reserved

More information

How to deploy SurveilStar PC/Internet Monitoring Software

How to deploy SurveilStar PC/Internet Monitoring Software How to deploy SurveilStar PC/Internet Monitoring Software 1/16 How to deploy SurveilStar PC/Internet Monitoring Software (Latest updated: April. 9, 2015) www.surveilstar.com This document provides detailed

More information

INSTALLATION INSTRUCTIONS FOR UKSSOGATEWAY

INSTALLATION INSTRUCTIONS FOR UKSSOGATEWAY INSTALLATION INSTRUCTIONS FOR UKSSOGATEWAY 1) Install the UKSSOGateway application on the desktop: The UKSSOGateway application passes information from the myuk portal to launch the FESClient. The FESClient

More information

Abila Nonprofit Online. Connection Guide

Abila Nonprofit Online. Connection Guide Abila Nonprofit Online This is a publication of Abila, Inc. 2014 Abila, Inc. and its affiliated entities. All rights reserved. Abila, the Abila logos, and the Abila product and service names mentioned

More information

Changing Your Cameleon Server IP

Changing Your Cameleon Server IP 1.1 Overview Technical Note Cameleon requires that you have a static IP address defined for the server PC the Cameleon server application runs on. Even if the server PC has a static IP address, you may

More information

Group Policy 21/05/2013

Group Policy 21/05/2013 Group Policy Group Policy is not a new technology for Active Directory, but it has grown and improved with every iteration of the operating system and service pack since it was first introduced in Windows

More information

NETWRIX WINDOWS SERVER CHANGE REPORTER

NETWRIX WINDOWS SERVER CHANGE REPORTER NETWRIX WINDOWS SERVER CHANGE REPORTER INSTALLATION AND CONFIGURATION GUIDE Product Version: 4.0 March 2013. Legal Notice The information in this publication is furnished for information use only, and

More information

Cyclope Internet Filtering Proxy

Cyclope Internet Filtering Proxy Cyclope Internet Filtering Proxy - Installation Guide - Cyclope-Series - 2010 - Table of contents 1. Overview - 3-2. Installation - 4-2.1. System requirements - 4-2.2. Cyclope Internet Filtering Proxy

More information

SafeWord Domain Login Agent Step-by-Step Guide

SafeWord Domain Login Agent Step-by-Step Guide SafeWord Domain Login Agent Step-by-Step Guide Author Johan Loos Date January 2009 Version 1.0 Contact johan@accessdenied.be Table of Contents Table of Contents... 2 Why SafeWord Agent for Windows Domains?...

More information

Magaya Software Installation Guide

Magaya Software Installation Guide Magaya Software Installation Guide MAGAYA SOFTWARE INSTALLATION GUIDE INTRODUCTION Introduction This installation guide explains the system requirements for installing any Magaya software, the steps to

More information

Installing FileMaker Pro 11 in Windows

Installing FileMaker Pro 11 in Windows Installing FileMaker Pro 11 in Windows Before you begin the installation process, please exit other open programs and save your work. Installation notes Before you install FileMaker Pro, review the following

More information

AD Certificate Distribution

AD Certificate Distribution Technical Brief AD Certificate Distribution Contents Introduction 2 Preparation 2 Server Actions 4 Active Directory Actions 5 Appendix A: Scripts zip 10 INTRODUCTION M86-Security provides a solution for

More information

Using Logon Agent for Transparent User Identification

Using Logon Agent for Transparent User Identification Using Logon Agent for Transparent User Identification Websense Logon Agent (also called Authentication Server) identifies users in real time, as they log on to domains. Logon Agent works with the Websense

More information

How to configure the DBxtra Report Web Service on IIS (Internet Information Server)

How to configure the DBxtra Report Web Service on IIS (Internet Information Server) How to configure the DBxtra Report Web Service on IIS (Internet Information Server) Table of Contents Install the DBxtra Report Web Service automatically... 2 Access the Report Web Service... 4 Verify

More information

DriveLock Quick Start Guide

DriveLock Quick Start Guide Be secure in less than 4 hours CenterTools Software GmbH 2012 Copyright Information in this document, including URL and other Internet Web site references, is subject to change without notice. Unless otherwise

More information

Installation Guide. Research Computing Team V1.9 RESTRICTED

Installation Guide. Research Computing Team V1.9 RESTRICTED Installation Guide Research Computing Team V1.9 RESTRICTED Document History This document relates to the BEAR DataShare service which is based on the product Power Folder, version 10.3.232 ( some screenshots

More information

eadvantage Certificate Enrollment Procedures

eadvantage Certificate Enrollment Procedures eadvantage Certificate Enrollment Procedures Purpose: Instructions for members to obtain a digital certificate which is a requirement to conduct financial transactions with the Federal Home Loan Bank of

More information

Important Notes for WinConnect Server VS Software Installation:

Important Notes for WinConnect Server VS Software Installation: Important Notes for WinConnect Server VS Software Installation: 1. Only Windows Vista Business, Windows Vista Ultimate, Windows 7 Professional, Windows 7 Ultimate, Windows Server 2008 (32-bit & 64-bit),

More information

About This Guide... 4. Signature Manager Outlook Edition Overview... 5

About This Guide... 4. Signature Manager Outlook Edition Overview... 5 Contents About This Guide... 4 Signature Manager Outlook Edition Overview... 5 How does it work?... 5 But That's Not All...... 6 And There's More...... 6 Licensing... 7 Licensing Information... 7 System

More information

TECHNICAL NOTE. The following information is provided as a service to our users, customers, and distributors.

TECHNICAL NOTE. The following information is provided as a service to our users, customers, and distributors. page 1 of 11 The following information is provided as a service to our users, customers, and distributors. ** If you are just beginning the process of installing PIPSPro 4.3.1 then please note these instructions

More information

IsItUp Quick Start Manual

IsItUp Quick Start Manual IsItUp - When you need to know the status of your network Taro Software Inc. Website: www.tarosoft.com Telephone: 703-405-4697 Postal address: 8829 110th Lane, Seminole Fl, 33772 Electronic mail: Contact1@tarosoft.com

More information

NSi Mobile Installation Guide. Version 6.2

NSi Mobile Installation Guide. Version 6.2 NSi Mobile Installation Guide Version 6.2 Revision History Version Date 1.0 October 2, 2012 2.0 September 18, 2013 2 CONTENTS TABLE OF CONTENTS PREFACE... 5 Purpose of this Document... 5 Version Compatibility...

More information

Exchange 2003 Mailboxes

Exchange 2003 Mailboxes Exchange 2003 Mailboxes Microsoft will stop supporting Exchange 2003 mailboxes in 2014 as it comes to the end of it s life. To maintain our levels of support and performance of all our customers, we will

More information

Zanibal Plug-in For Microsoft Outlook Installation & User Guide Version 1.1

Zanibal Plug-in For Microsoft Outlook Installation & User Guide Version 1.1 Zanibal Plug-in For Microsoft Outlook Installation & User Guide Version 1.1 Zanibal LLC Phone: +1-408-887-0480, +234-1-813-1744 Email: support@zanibal.com www.zanibal.com Copyright 2012, Zanibal LLC. All

More information

Installing GFI Network Server Monitor

Installing GFI Network Server Monitor Installing GFI Network Server Monitor System requirements Computers running GFI Network Server Monitor require: Windows 2000 (SP4 or higher), 2003 or XP Pro operating systems. Windows scripting host 5.5

More information

JAVS Scheduled Publishing. Installation/Configuration... 4 Manual Operation... 6 Automating Scheduled Publishing... 7 Windows XP... 7 Windows 7...

JAVS Scheduled Publishing. Installation/Configuration... 4 Manual Operation... 6 Automating Scheduled Publishing... 7 Windows XP... 7 Windows 7... 1 2 Copyright JAVS 1981-2010 Contents Scheduled Publishing... 4 Installation/Configuration... 4 Manual Operation... 6 Automating Scheduled Publishing... 7 Windows XP... 7 Windows 7... 12 Copyright JAVS

More information

How to install and use the File Sharing Outlook Plugin

How to install and use the File Sharing Outlook Plugin How to install and use the File Sharing Outlook Plugin Thank you for purchasing Green House Data File Sharing. This guide will show you how to install and configure the Outlook Plugin on your desktop.

More information

Centran Version 4 Getting Started Guide KABA MAS. Table Of Contents

Centran Version 4 Getting Started Guide KABA MAS. Table Of Contents Page 1 Centran Version 4 Getting Started Guide KABA MAS Kaba Mas Welcome Kaba Mas, part of the world-wide Kaba group, is the world's leading manufacturer and supplier of high security, electronic safe

More information

Using TViX Network. NFS mode : You must install the TViX NetShare utility in to your PC, but you can play the TP or DVD jukebox without stutter.

Using TViX Network. NFS mode : You must install the TViX NetShare utility in to your PC, but you can play the TP or DVD jukebox without stutter. Using TViX Network There are two network mode. One is SAMBA mode another is NFS mode. SAMBA mode : You can play the file via network without special program, but the speed is lower than NFS mode. ( Currently,

More information

Idera SQL Diagnostic Manager Management Pack Guide for System Center Operations Manager. Install Guide. Idera Inc., Published: April 2013

Idera SQL Diagnostic Manager Management Pack Guide for System Center Operations Manager. Install Guide. Idera Inc., Published: April 2013 Idera SQL Diagnostic Manager Management Pack Guide for System Center Operations Manager Install Guide Idera Inc., Published: April 2013 Contents Introduction to the Idera SQL Diagnostic Manager Management

More information

Outpost Network Security

Outpost Network Security Administrator Guide Reference Outpost Network Security Office Firewall Software from Agnitum Abstract This document provides information on deploying Outpost Network Security in a corporate network. It

More information

Wavecrest Certificate

Wavecrest Certificate Wavecrest InstallationGuide Wavecrest Certificate www.wavecrest.net Copyright Copyright 1996-2015, Wavecrest Computing, Inc. All rights reserved. Use of this product and this manual is subject to license.

More information

NetIQ Advanced Authentication Framework. FIDO U2F Authentication Provider Installation Guide. Version 5.1.0

NetIQ Advanced Authentication Framework. FIDO U2F Authentication Provider Installation Guide. Version 5.1.0 NetIQ Advanced Authentication Framework FIDO U2F Authentication Provider Installation Guide Version 5.1.0 Table of Contents 1 Table of Contents 2 Introduction 3 About This Document 3 System Requirements

More information

TSM for Windows Installation Instructions: Download the latest TSM Client Using the following link:

TSM for Windows Installation Instructions: Download the latest TSM Client Using the following link: TSM for Windows Installation Instructions: Download the latest TSM Client Using the following link: ftp://ftp.software.ibm.com/storage/tivoli-storagemanagement/maintenance/client/v6r2/windows/x32/v623/

More information

Print Audit 6 - SQL Server 2005 Express Edition

Print Audit 6 - SQL Server 2005 Express Edition Print Audit 6 - SQL Server 2005 Express Edition Summary This is a step-by-step guide to install SQL Server 2005 Express Edition to use as a database for Print Audit 6. Pre-Requisites There are a few pre-requisites

More information

Automatic Setup... 1 Manual Setup... 2 Installing the Wireless Certificates... 18

Automatic Setup... 1 Manual Setup... 2 Installing the Wireless Certificates... 18 Contents Automatic Setup... 1 Manual Setup... 2 Installing the Wireless Certificates... 18 Automatic Setup 1. Click on the Wireless icon in your system tray that looks like. 2. You will see a list of available

More information

Installing NetSupport School for use with the NetSupport School Student extension for Google Chrome

Installing NetSupport School for use with the NetSupport School Student extension for Google Chrome Installing NetSupport School for use with the NetSupport School Student extension for Google Chrome NetSupport School delivers the tools you need to help maximise the effectiveness of computer led teaching

More information

Important Notes for WinConnect Server ES Software Installation:

Important Notes for WinConnect Server ES Software Installation: Important Notes for WinConnect Server ES Software Installation: 1. Only Windows 8/8.1 Enterprise, Windows 8/8.1 Professional (32-bit & 64-bit) or Windows Server 2012 (64-bit) or Windows Server 2012 Foundation

More information

Administration Guide. . All right reserved. For more information about Specops Deploy and other Specops products, visit www.specopssoft.

Administration Guide. . All right reserved. For more information about Specops Deploy and other Specops products, visit www.specopssoft. . All right reserved. For more information about Specops Deploy and other Specops products, visit www.specopssoft.com Copyright and Trademarks Specops Deploy is a trademark owned by Specops Software. All

More information

Quick Start Guide. Installation and Setup

Quick Start Guide. Installation and Setup Quick Start Guide Installation and Setup Introduction Velaro s live help and survey management system provides an exciting new way to engage your customers and website visitors. While adding any new technology

More information

Immotec Systems, Inc. SQL Server 2005 Installation Document

Immotec Systems, Inc. SQL Server 2005 Installation Document SQL Server Installation Guide 1. From the Visor 360 installation CD\USB Key, open the Access folder and install the Access Database Engine. 2. Open Visor 360 V2.0 folder and double click on Setup. Visor

More information

Distributing EmailSMS v2.0

Distributing EmailSMS v2.0 Distributing EmailSMS v2.0 1) Requirements Windows 2000/XP and Outlook 2000, 2002 or 2003, Microsoft.NET Framework v 2).NET Framework V 1 Rollout Microsoft.NET Framework v1 needed to run EmailSMS v2.0.

More information

Contents. VPN Instructions. VPN Instructions... 1

Contents. VPN Instructions. VPN Instructions... 1 VPN Instructions Contents VPN Instructions... 1 Download & Install Check Point VPN Software... 2 Connect to FPUA by VPN... 6 Connect to Your Computer... 8 Determine Your Machine Type... 10 Identify 32-bit

More information

Pcounter for Windows

Pcounter for Windows Pcounter for Windows Pcounter Client and Printer Distribution Guide Copyright 2014 A.N.D. Technologies 4104 24 th Street #627 San Francisco, CA 94114 USA E-Mail: support@pcounter.com Web: http://www.pcounter.com

More information

14.1. bs^ir^qfkd=obcib`qflk= Ñçê=emI=rkfuI=~åÇ=léÉåsjp=eçëíë

14.1. bs^ir^qfkd=obcib`qflk= Ñçê=emI=rkfuI=~åÇ=léÉåsjp=eçëíë 14.1 bs^ir^qfkd=obcib`qflk= Ñçê=emI=rkfuI=~åÇ=léÉåsjp=eçëíë bî~äì~íáåö=oéñäéåíáçå=ñçê=emi=rkfui=~åç=lééåsjp=eçëíë This guide walks you quickly through key Reflection features. It covers: Getting Connected

More information

This document details the following four steps in setting up a Web Server (aka Internet Information Services -IIS) on Windows XP:

This document details the following four steps in setting up a Web Server (aka Internet Information Services -IIS) on Windows XP: Wazza s QuickStart: Setting up a Web Server (IIS) Windows XP This document details the following four steps in setting up a Web Server (aka Internet Information Services -IIS) on Windows XP: Configuring

More information

Signup instructions for the End User

Signup instructions for the End User Wellnomics Risk Management Server Hosted by Wellnomics Ltd Signup instructions for the End User Wellnomics Risk Management is a series of assessments, designed to help you to manage your exposure to computer-based

More information

Administrators Help Manual

Administrators Help Manual Administrators Help Manual Lepide Active Directory Self Service Lepide Software Private Limited Page 1 Administrators Help Manual for Active Directory Self-Service Lepide Active Directory Self Service

More information

Remote Access VPN SSL VPN Access via Internet Explorer

Remote Access VPN SSL VPN Access via Internet Explorer The following instructions will allow you to access your company network remotely, via your Internet Explorer web browser. 1. Launch Internet Explorer and choose Internet Options from the Tools menu. 2.

More information

Installation Manual (MSI Version)

Installation Manual (MSI Version) Installation Manual (MSI Version) 1. SYSTEM REQUIREMENTS... 2 2. INSTALLATION INSTRUCTIONS... 2 2.1 REMOTE INSTALLATION USING GROUP POLICY... 2 2.1.1 Assigning Software...2 2.1.2 Publishing Software...2

More information

StarWind iscsi SAN Software: Installing StarWind on Windows Server 2008 R2 Server Core

StarWind iscsi SAN Software: Installing StarWind on Windows Server 2008 R2 Server Core StarWind iscsi SAN Software: Installing StarWind on Windows Server 2008 R2 Server Core www.starwindsoftware.com Copyright 2008-2011. All rights reserved. COPYRIGHT Copyright 2008-2011. All rights reserved.

More information

Installing the Microsoft Network Driver Interface

Installing the Microsoft Network Driver Interface Installing the Microsoft Network Driver Interface Overview This guide explains how to install the PictureTel Live200 Microsoft Network Driver Interface (NDIS) software you have downloaded from PictureTel's

More information

Setting up VMware ESXi for 2X VirtualDesktopServer Manual

Setting up VMware ESXi for 2X VirtualDesktopServer Manual Setting up VMware ESXi for 2X VirtualDesktopServer Manual URL: www.2x.com E-mail: info@2x.com Information in this document is subject to change without notice. Companies, names, and data used in examples

More information

Setting up Hyper-V for 2X VirtualDesktopServer Manual

Setting up Hyper-V for 2X VirtualDesktopServer Manual Setting up Hyper-V for 2X VirtualDesktopServer Manual URL: www.2x.com E-mail: info@2x.com Information in this document is subject to change without notice. Companies, names, and data used in examples herein

More information

Manual. 3CX Phone System integration with Microsoft Outlook and Salesforce Version 1.0

Manual. 3CX Phone System integration with Microsoft Outlook and Salesforce Version 1.0 Manual 3CX Phone System integration with Microsoft Outlook and Salesforce Version 1.0 Copyright 2006-2009, 3CX ltd. http:// E-mail: info@3cx.com Information in this document is subject to change without

More information

You may have been given a download link on your trial software email. Use this link to download the software.

You may have been given a download link on your trial software email. Use this link to download the software. BackupVault / Attix5 Server Quickstart Guide This document takes about 5 minutes to read and will show you how to: Download the software Install the Attix5 Professional Backup software Backup your files

More information

8x8 Virtual Office Telephony Interface for Salesforce

8x8 Virtual Office Telephony Interface for Salesforce 8x8 Virtual Office Telephony Interface for Salesforce Administrator Guide May 2014 The Champion For Business Communications Table of Contents 8x8 Virtual Office Telephony Interface for Salesforce.... 3

More information

Print Audit 6 - How to Move Print Audit 6 and a SQL Server 2005 Express Database to a New Server

Print Audit 6 - How to Move Print Audit 6 and a SQL Server 2005 Express Database to a New Server Print Audit 6 - How to Move Print Audit 6 and a SQL Server 2005 Express Database to a New Server Overview This document includes the steps to move Print Audit 6 and a SQL Server 2005 Express database to

More information

Lepide Software Asset Management

Lepide Software Asset Management Installation Guide Lepide Software Asset Management , All Rights Reserved This User Guide and documentation is copyright of Lepide Software Private Limited, with all rights reserved under the copyright

More information