LANDesk Patch and Compliance. Common Troubleshooting steps for Vulnerability Remediation.
|
|
- Jacob Cameron
- 8 years ago
- Views:
Transcription
1 LANDesk Patch and Compliance Common Troubleshooting steps for Vulnerability Remediation.
2 Contents Introduction... 3 Scope... 3 Assumptions... 3 Logs used in Troubleshooting... 4 Vulscan Switches... 4 The Computer is being detected vulnerable when it shouldn t be ) If the vulnerability was just remediated and the computer is still showing detected: ) The Vulnerability should never have been detected The Computer is not being detected when it should be ) Verify the Vulnerability is in the Scan folder, and that the client is scanning for Vulnerabilities ) Run a Security scan on the client ) Verify that the client is not showing as vulnerable on the core ) Check the most recent Vulscan log. Check to see if the vulnerability is in the log The Client fails to download the Patch ) Verify the Core has downloaded the Patch ) Verify the Client is able to download the patch The Client fails to install the Patch ) The most likely reason for an Office patch installation errors is failure to access the original installation source ) Try running the install manually from the SDMCache folder as Local System The Client is installing Patches it is not supposed to The Client is rebooting when it is not supposed to Useful articles related to troubleshooting Patch Remediation About LANDesk Software... 25
3 Introduction LANDesk Patch and Compliance enables you to remediate (repair) vulnerabilities on clients with the LANDesk Agent installed. There are several situations where this remediation will not complete, detects improperly, or does not act as desired. Scope The scope of this whitepaper is to walk through some of the basic troubleshooting steps to find why the Patch and Compliance scan is not working as desired. It will not cover troubleshooting install errors, or corrupt installs that are being caused by the patch the vulnerability definition is attempting to remediate. Assumptions The LDMS Core Server is Version 9.0, installed on a Windows 2008 R2 64 bit server. The end points have the 9.0 Client installed and are able to send inventory and vulnerability scans to the Core.
4 Logs used in Troubleshooting 1. Vulscan.log a. Windows 2000, 2003, and XP i. C:\Documents and settings\all users\application Data\Vulscan b. Windows Vista, 7, 2008 and 2008 R2 i. C:\ProgramData\Vulscan 2. 0_winxp_enu_########.xml a. Client -..\ldclient\sdmcache b. Core - \\<corename>\ldlogon\computervulnerability 3. MergedGetVulnerabilitiesoftype_X.<Core>.xml a. Windows 2000, 2003, and XP i. C:\Documents and Settings\All Users\Application Data\Vulscan b. Windows Vista, 7, 2008 and 2008 R2 i. C:\Program Data\Vulscan 4. SDMCache folder a. C:Program Files\LANDesk\LDClient\ Vulscan Switches AgentBehavior=AgentBehaviorID /ShowUI /AllowUserCancelScan /AutoCloseTimeout=Seconds /Scan=X, where X is the Type (listed below) 0-Vulnerabilities 1-Spyware 2-Security Threats 3-LANDesk Updates 4-Custom Definitions 5-Blocked Apps 8-Antivirus /Group=GroupID /AutoFix=True or False
5 The Computer is being detected vulnerable when it shouldn t be. 1) If the vulnerability was just remediated and the computer is still showing detected: a. Make sure the client has rebooted. i. If the patch requires changing a system or protected file, that change will not take effect until the client reboots. b. Run a Security Scan on the client. i. You can manually run the scan with the following command. 1. Vulscan /scan=0 /showui (Vulscan Switches) c. Verify that the client installed the patch and still shows as vulnerable on the core server. i. Open a LANDesk Management Suite Console. ii. From the Network View expand Devices and click on All Devices. iii. Locate the computer in question.
6 iv. Right click on the computer and select Security and Patch Information v. Click on Clean/Repair History vi. Locate the patch and locate the Succeeded column. Verify it says Yes vii. Click on All Detected. viii. Look for the vulnerability in question. ix. Check the most recent Vulscan logs. x. Look for the vulnerability that is still showing as detected. xi. The log will show why the client is still showing as vulnerable. 1. Possible causes of why the client is still showing as vulnerable. a. The file or registry setting is not being properly updated by the Microsoft patch. i. Try uninstalling and reinstalling the patch. If detection works after this, the original patch failed to install the required files. b. The vulnerability detection logic needs to be adjusted. LANDesk Support will need the Vulscan log to submit a request to change the detection logic. 2) The Vulnerability should never have been detected. a. Run a Security Scan on the client. i. You can manually run the scan with the following command. 1. Vulscan \showui \scan=0
7 b. After the client runs a scan, check the most recent vulscan log in the vulscan folder. c. Look for the vulnerability that is still showing as detected. i. The log will show why the client is still showing as vulnerable. 1. Possible causes of why the client is still showing as vulnerable. a. Try to install the patch manually from the \\<corename>\ldlogon\patch folder. i. Most patches will give a message if the patch is not needed and why. b. Is the Patch showing as detected because there is a Dependency that needs to be installed? i. This will show in the Log File as: ii. To resolve this you will need to remediate the Dependency on the client. c. The Vulnerability Detection logic needs to be adjusted. LANDesk Support will need the Vulscan log to submit a request to change the detection logic. i. To resolve this you will need to remediate the dependency on the client. 2. The Vulnerability detection logic needs to be adjusted. LANDesk Support will need the Vulscan log to submit a request to change the detection logic. The Computer is not being detected when it should be 1) Verify the Vulnerability is in the Scan folder, and that the client is scanning for Vulnerabilities. a. Open a LANDesk Management Suite Console. b. Go to Tools Security and Compliance Patch and Compliance
8 c. Expand All Types, and click on All Items d. Use the Find window to search for the vulnerability. i. If it has a question mark next to it, it is in the Unassigned folder. ii. If it has a red circle next to it, it is in the Do Not Scan Folder. iii. If the vulnerability has one of these icons drag the vulnerability to the Scan folder. 2) Run a Security scan on the client. a. You can manually run the scan with the following command. i. Vulscan /showui /scan=0 3) Verify that the client is not showing as vulnerable on the core. a. Open a LANDesk Management Suite Console.
9 b. From the Network View expand Devices and click on All Devices. c. Locate the computer in question. d. Right click on the computer and select Security and Patch Information e. Click on Missing Patches. f. Verify the vulnerability is not listed. 4) Check the most recent Vulscan log. Check to see if the vulnerability is in the log. e. If the vulnerability is not in the log, check to make sure that the XML on the core has the vulnerability. i. The XML is located at \\<coreserver>\ldlogon\vulnerabilitydata\. And follows the following pattern. <Type>.<OS>.<Language>.<numbers>.xml 1. Type = Scan type. 2. OS = Operating System. 3. Language = Language type.
10 ii. Look for the XML with the latest date and make sure that it has an XMLZ file with the same file name. f. If the XMLZ file doesn t exist, is a.0 file, or is a.temp file, troubleshoot ASP.net problems on the IIS server. i. Restarting the IIS service or the server usually fixes this. 1. From the Run window type iisreset. ii. Register ASP.NET 3.5. a. Because.net 3.5 is an extension of.net 2.0 the aspnet_regiis command will be run from the 2.0 file directory. b. From the run window browse to C:\windows\microsoft.net\framework\v2.0.5####\ c. Run aspnet_regiis.exe exe with the i switch. This will register all the.net 2.0 files as well as the 3.5 files. iii. Delete all the files from the \\<coreserver>\ldlogon\vulnerabilitydata folder on the core server. They will be recreated when a client runs a security scan. iv. Reset the IIS service again (IISRESET) to reset the worker processes. g. Rerun a security scan on the client. h. If the Vulscan log is still showing the vulnerability as undetected, check the detection logic on the vulnerability and make sure that the client is missing the required files: i. Open a LANDesk Management Suite Console. ii. Go to Tools Security and Compliance Patch and Compliance iii. Expand All Type, and click on All Items iv. Use the Find window to search for the Vulnerability.
11 v. Right Click on the Vulnerability and click Properties.
12 vi. Right-click on the detection rule that includes that patch in question and select Properties. vii. Check the Files, and Registry Settings sections for the detection logic that is being used.
13 i. Verify that the client meets the vulnerability detection logic. j. If you are still sure that the client should be detected contact LANDesk Support. Please provide Vulscan log from the computer that is not detecting correctly. The Client fails to download the Patch. 1) Verify the Core has downloaded the Patch. a. Open a LANDesk Management Suite Console. a. Click on Tools Security and Compliance Patch and Compliance. b. Click on All Items.
14 c. Locate the Vulnerability in question. d. Right Click on the Vulnerability and click Properties. e. If the patch has been downloaded it will have a Yes in the downloaded column. i. If it has not been downloaded, right-click the patch and select Download Patch... ` 2) Verify the Client is able to download the patch. f. Check the latest Vulscan.log file. It will show the path that the client tried to download the patch from. Log file showing a successful download Log file showing a Failed Download of the Patch. g. Attempt to browse to that path from the client computer. If you are unable to access the path: i. Check the IIS Authentication methods to ensure that Enable Anonymous Access is selected:
15 1. Launch the Internet Information Service (IIS) Manager from Administrative Tools. 2. Browse to the Default Web Site. 3. Under IIS Click double click on Authentication
16 4. Verify that Anonymous Authentication is enabled. 5. Check the permission on the folder where the patch is located. The most important permission is the Internet Guest account. It needs to have Full control in order for Vulscan to have the required permissions when a patch is downloaded to the client. Required Permissions Everyone Read & Execute. IUSR Read & Execute. System Full Control. Network Service Full Control. LANDesk Management Suite Full Control. LANDesk Administrators Full Control. LANDesk Script Writers Read & Execute. Administrator Full Control. The Client fails to install the Patch. 1) The most likely reason for an Office patch installation errors is failure to access the original installation source. a. Check the registry to see what the source installation location is. If the source is a network share, Patch Manager may not be able to access the location. Patch Manager uses Local System when installing patches. Unless the network location has been given the correct rights (Domain Computers), Local System will not be able to access the location. i. Source Registry Key: HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\<GUID of Office version>\installsource 1. The Office installation GUID will always end in 0FF1CE
17 b. Adjust the Scan and Repair Setting to add a custom source for the scan. This will allow you to specify the location of the Office installation files. A separate Scan and Repair Setting for each version of Office will be needed. i. Open a LANDesk Management Suite Console. ii. Click on Tools Security and Compliance Patch and Compliance. iii. Expand Settings. iv. Expand All Settings. v. Click on Scan and Repair. vi. Right click on the Scan and Repair Setting that needs adjusting and choose Edit.
18 vii. Click on MSI information. viii. Enter the source location of the Office installation software. ix. Enter credentials that will give Patch Manager access to the source. c. Try the remediation task again using the Scan and Repair Setting that was just adjusted.
19 2) Try running the install manually from the SDMCache folder as Local System. a. This will show if there are problems installing the patch. Messages that the patch is not needed, a corrupt file, missing file, or other messages that explain why the patch cannot be installed will be displayed. In general, patches are installed using the local system account b. You can launch a CMD window as local system with the following commands:. i. Command to launch a CMD window. <LANDesk Client directory>\localsch.exe /cmd=cmd.exe ii. Second Method 1. Open a LANDesk Management Suite Console. 2. Locate the Computer in question in the network view. 3. Right-click on the computer select Remote Control. 4. Choose Remote Execute. 5. In the Run box Type CMD and click enter. The Client is installing Patches it is not supposed to. 1. LANDesk will install patches utilizing 3 different methods: Autofix, Repair, or a Custom Group that is set to repair immediately. None of these methods will install a patch on a client that doesn t show as detected for the vulnerability associated with the patch. a. Troubleshoot why the computer shows as detected. 2. If the patch was not supposed to install and did, check the Vulscan log created during the patch installation. Use the information you find to determine why it was repaired. a. At the top of the log look for the command that Vulscan was launched with. Look for the Switches: i. Repair Shows that a repair job was created. ii. Group Shows that a specific group was scanned. iii. Look for the Agent Behavior line. b. Check the Scan and Repair settings used in the scan.
20 i. Open a LANDesk Management Suite Console. ii. Click on Tools Security and Compliance Patch and Compliance. iii. Expand Settings. iv. Expand All Settings. v. Click on Scan and Repair. vi. Locate the Scan and Repair setting as noted from the log and double-click it. vii. Click on the Scan Options viii. Check for the Enable Autofix. AutoFix must be enabled both on the Scan and Repair setting and the vulnerability definition for it to remediate on the client.
21 1. Check to see if the vulnerability is marked as Autofix a. Locate the Vulnerability in the scan folder. b. Scroll over until you see the Autofix column. i. Right-clicking on the Vulnerability will give you an option to disable Autofix if it has been enabled.
22
23 ix. Check for the Group option with Immediately repair all detected items checked as well. 1. Check the Custom Group for the vulnerability in question. a. Adjust the Scan and Repair setting to match the desired result
24 The Client is rebooting when it is not supposed to 1. If the Scan and Repair Setting has Reboot set to Always the computer will reboot after installing any patch. 2. Vulscan will check for 2 registry settings when looking to see if the Client needs to reboot. a. PendingFileRename Value in HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Session Manager. This key is added when a Patch is installed that updates Protected Files or Registry Settings. This allows the changes to be made on the next reboot. b. VulscanReboot Value in HKLM\Software\LANDesk\ManagementSuite\Winclient. This key is created when a Component of the LANDesk Agent requires a reboot. For example the install of the LANDesk Antivirus. 3. A Security scan will check for both of these registry settings during its scan. The reboot tab in the scan and repair setting will determine how and if the Security scan will reboot the computer if it detects a reboot is necessary.
25 Useful articles related to troubleshooting Patch Remediation. Error: "Failed. Cannot Interpret Data" when running a Vulnerability Scan. How to change the Default Scan and Repair settings on a client. Security and Patch Repair: "Cannot complete the requested action. The device must be rebooted first." How to change the default Patch Location for Security and Patch Manager? Error: when patching Microsoft Office installs. How do I Scan and Repair against a custom group? How to read a vulnerability scan (vulscan.log) log file About LANDesk Software The foundation for LANDesk s leading IT management solutions was laid more than 20 years ago. And LANDesk has been growing and innovating the systems, security, service and process management spaces ever since. Our singular focus and our commitment to understanding customers real business needs and to delivering easy-to-use solutions for those needs are just a few of the reasons we continue to grow and expand. LANDesk pioneered the desktop management category back in That same year, IDC named LANDesk the category leader. And LANDesk has continued to lead the systems configuration space: pioneering virtual IT technology in 1999, revolutionizing large-packet distribution with LANDesk Targeted Multicast technology and LANDesk Peer Download technology in 2001, and delivering secure systems management over the Internet and hardware-independent network access control capabilities with LANDesk Management Gateway and LANDesk Trusted Access Technology in In 2006, LANDesk added process management technologies to its product line and began integrating the systems, security and process management markets. LANDesk also extended into the consolidated service desk market with LANDesk Service Desk, and was acquired by Avocent to operate as an independent division. Today, LANDesk continues to lead the convergence of the systems, security, process and service management markets. And our executives, engineers and other professionals work tirelessly to deliver leading solutions to markets around the globe.
LANDesk Management Suite 9.0. Getting started with Patch Manager
LANDesk Management Suite 9.0 Getting started with Patch Manager DOWNLOAD PATCH CONTENT TO THE CORE SERVER INTRODUCTION This document is intended to assist LANDesk Management Suite administrators with implementing
More informationUnderstanding Deployment Method Differences
Troubleshooting Landesk Software Distribution Jobs When a Software Distribution job fails you need to narrow down the cause of a failed job. Knowing the causes of a failed job will help you avoid the same
More informationLANDesk Management Suite 9. Best Practices for Agent Configuration and Deployment (BKM)
LANDesk Management Suite 9 Best Practices for Agent Configuration and Deployment (BKM) Revision 1.00 Don White Dec 10, 2009 Copyright 2002-2009 Avocent Corporation. All rights reserved. Avocent, LANDesk,
More informationHow To Install Database Oasis On A Computer Or Computer (For Free)
INSTALLATION INSTRUCTIONS Table of Contents Installation Instructions 1 Table of Contents 1 System Requirements 2 Installation 3 Selecting where to Install the Professional Server 3 Installing Prerequisites
More informationBCA Software Installation and Troubleshooting Guide
BCA Software Installation and Troubleshooting Guide This document contains four components: Prerequisites provides the list of prerequisites and system requirements to successfully install and run the
More informationNobeltec TZ: Microsoft SQL Server problems
Nobeltec TZ: Microsoft SQL Server problems Description: TimeZero uses Microsoft SQL server to manage routes, marks, logbook and track data. Microsoft SQL server is installed as part of the TimeZero installation.
More informationSophos Enterprise Console server to server migration guide. Product version: 5.2
Sophos Enterprise Console server to server migration guide Product : 5.2 Document date: December 2014 Contents 1 About this guide...3 2 Terminology...4 3 Assumptions...5 4 Prerequisite...6 5 What are the
More informationSophos Enterprise Console server to server migration guide. Product version: 5.1 Document date: June 2012
Sophos Enterprise Console server to server migration guide Product : 5.1 Document date: June 2012 Contents 1 About this guide...3 2 Terminology...4 3 Assumptions...5 4 Prerequisite...6 5 What are the key
More informationConfiguration for Professional Client Access
In a network environment, in order for the clients to access the data over the network, you will need to set up a network share to the data file. CREATING A NETWORK SHARE There may be slight differences
More informationTroubleshooting pcanywhere plug-in Deployment
Contents Verify implementation of pcanywhere Solution... 2 Deployment of the pcanywhere plug-in from the SMC... 3 Plug-in installation on managed computer... 5 Problems during pcanywhere Plug-in installation...
More informationCERN settings for Norton AntiVirus 7.6
Page 1 of 7 1. The system tray CERN settings for Norton AntiVirus 7.6 To show a good behaviour of the software Norton AntiVirus 7.6 (NAV), a yellow icon must appeared below, in the right place of the screen
More informationACTIVE DIRECTORY DEPLOYMENT
ACTIVE DIRECTORY DEPLOYMENT CASAS Technical Support 800.255.1036 2009 Comprehensive Adult Student Assessment Systems. All rights reserved. Version 031809 CONTENTS 1. INTRODUCTION... 1 1.1 LAN PREREQUISITES...
More informationMicrosoft SQL Database
This TechNote applies to MaxSea TimeZero Navigator and Explorer v1.9.5 and above Description: MaxSea display the following error when starting (in Navigation or Home Planning): Resolution: MaxSea TimeZero
More informationSophos Cloud Migration Tool Help. Product version: 1.0
Sophos Cloud Migration Tool Help Product version: 1.0 Document date: June 2015 Contents 1 About the Sophos Cloud Migration Tool...4 2 How does Sophos Cloud differ from on-premise management?...5 3 How
More informationMercy s Remote Access Instructions
Mercy s Remote Access Instructions ~~~~~~~~~~~~~~ Section A Windows 2000 / XP ~~~~~~~~~~~~~~ I. Install Meditech............................... A1 II. Install VPN Client............................. A3
More informationTest Note Phone Manager Deployment Windows Group Policy Sever 2003 and XP SPII Clients
Test Note Phone Manager Deployment Windows Group Policy Sever 2003 and XP SPII Clients Note: I have only tested these procedures on Server 2003 SP1 (DC) and XP SPII client, in a controlled lab environment,
More informationLANDesk Management Suite 8, v8.1 Creating Custom Vulnerabilities
LANDesk Management Suite 8, v8.1 Creating Custom Vulnerabilities Revision 1.0 Rex Moffitt May 26, 2004 Information in this document is provided in connection with LANDesk Software products. No license,
More informationInstallation Guide: Delta Module Manager Launcher
Installation Guide: Delta Module Manager Launcher Overview... 2 Delta Module Manager Launcher... 2 Pre-Installation Considerations... 3 Hardware Requirements... 3 Software Requirements... 3 Virtualisation...
More informationIntroduction. This white paper provides technical information on how to approach these steps with Symantec Antivirus Corporate edition.
Introduction The process of updating virus definitions on workstations protected by Deep Freeze Enterprise involves three fundamental steps: 1. Rebooting the workstations into a Thawed state so the updates
More informationESET REMOTE ADMINISTRATOR. Migration guide
ESET REMOTE ADMINISTRATOR Migration guide ESET REMOTE ADMINISTRATOR migration guide Copyright 2012 by ESET, spol. s r.o. ESET REMOTE ADMINISTRATOR was developed by ESET, spol. s r.o. For more information
More informationCitrix Access Gateway Plug-in for Windows User Guide
Citrix Access Gateway Plug-in for Windows User Guide Access Gateway 9.2, Enterprise Edition Copyright and Trademark Notice Use of the product documented in this guide is subject to your prior acceptance
More informationDC Agent Troubleshooting
DC Agent Troubleshooting Topic 50320 DC Agent Troubleshooting Web Security Solutions v7.7.x, 7.8.x 27-Mar-2013 This collection includes the following articles to help you troubleshoot DC Agent installation
More informationFederated Identity Service Certificate Download Requirements
Federated Identity Service Certificate Download Requirements Version 3.2 Exostar, LLC February 14, 2013 Table of Contents Introduction... 1 Purpose... 1 FIS System Requirements... 2 Adding Exostar as a
More informationInstalling and Trouble-Shooting SmartSystems
Installing and Trouble-Shooting SmartSystems Requirements: Processor: 2 GHz is recommended for optimum performance Memory/RAM: 2GB is required Disk space: 60MB is required for SmartSystems Server Operating
More informationWeb Deployment on Windows 2012 Server. Updated: August 28, 2013
Web Deployment on Windows 2012 Server Updated: August 28, 2013 Table of Contents Install IIS on Windows 2012... 3 Install Sage 300 ERP...16 Create Web Deployment User...17 Sage 300 ERP Services...22 Web
More informationPC Power Down. MSI Deployment Guide
PC Power Down MSI Deployment Guide 1. Introduction 1.1. Outline The client software for PC Power Down can be pushed out across a network, saving the effort of individually visiting each computer to install
More informationTECHNICAL SUPPORT GUIDE
TECHNICAL SUPPORT GUIDE INTRODUCTION This document has been developed to provide a guideline for assisting our clients and their technicians with a standard Console Gateway Live configuration. IS THIS
More informationSymantec AntiVirus Corporate Edition Patch Update
Symantec AntiVirus Corporate Edition Patch Update Symantec AntiVirus Corporate Edition Update Documentation version 10.0.1.1007 Copyright 2005 Symantec Corporation. All rights reserved. Symantec, the Symantec
More informationPSCAD Installation Errors
PSCAD PSCAD Installation Errors Written for: PSCAD v4.2 PSCAD X4 (v4.3, v4.4, v4.5, v4.6) Revision: 4 April 20, 2015 Contents 1. INSTALLATION ERROR ERROR 1053 STARTING LM SERVICE... 1 2. INSTALLATION ERROR
More informationUser Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream
User Manual Onsight Management Suite Version 5.1 Another Innovation by Librestream Doc #: 400075-06 May 2012 Information in this document is subject to change without notice. Reproduction in any manner
More informationLANDesk Patch Manager. Strategic and Tactical Implementation Guide
LANDesk Patch Manager Strategic and Tactical Implementation Guide Contents Using this Guide... 4 Quick Start... 4 Technical High-Level Overview... 5 Discovering your environment... 5 Using Inventory...
More informationThis document describes the installation of the Web Server for Bosch Recording Station 8.10.
Description Content 1 Introduction... 1 2 Web Server for BRS running on Windows 7... 2 3 Web Server for BRS running on Windows Server 2008... 15 4 Web Server for BRS running on Windows XP... 29 5 Web Server
More informationUser Guide. Version 3.2. Copyright 2002-2009 Snow Software AB. All rights reserved.
Version 3.2 User Guide Copyright 2002-2009 Snow Software AB. All rights reserved. This manual and computer program is protected by copyright law and international treaties. Unauthorized reproduction or
More informationDistributing EmailSMS v2.0
Distributing EmailSMS v2.0 1) Requirements Windows 2000/XP and Outlook 2000, 2002 or 2003, Microsoft.NET Framework v 2).NET Framework V 1 Rollout Microsoft.NET Framework v1 needed to run EmailSMS v2.0.
More informationTrueEdit Remote Connection Brief
MicroPress Server Configuration Guide for Remote Applications Date Issued: February 3, 2009 Document Number: 45082597 TrueEdit Remote Connection Brief Background TrueEdit Remote (TER) is actually the same
More informationCODESOFT Installation Scenarios
CODESOFT Installation Scenarios NOTES: CODESOFT is a separate install from existing versions of CODESOFT. You will need to make note of your current settings (default directories, etc.) so you can duplicate
More informationHow To Upgrade A Websense Log Server On A Windows 7.6 On A Powerbook (Windows) On A Thumbdrive Or Ipad (Windows 7.5) On An Ubuntu 7.3.2 (Windows 8) Or Windows
Websense v7.6 Install or Upgrade Checklist Greetings from Websense Technical Support. Most Websense upgrades complete successfully, and from my years of troubleshooting, I have learned a number of steps
More informationSTATISTICA VERSION 9 STATISTICA ENTERPRISE INSTALLATION INSTRUCTIONS FOR USE WITH TERMINAL SERVER
Notes: STATISTICA VERSION 9 STATISTICA ENTERPRISE INSTALLATION INSTRUCTIONS FOR USE WITH TERMINAL SERVER 1. These instructions focus on installation on Windows Terminal Server (WTS), but are applicable
More informationCONFIGURING MICROSOFT SECURITY
CONFIGURING MICROSOFT SECURITY Recent changes to the Microsoft Security suite of apps have resulted in creating an adverse effect on the Prospector system. It may seem that the Prospector Online Updates
More informationIn the same spirit, our QuickBooks 2008 Software Installation Guide has been completely revised as well.
QuickBooks 2008 Software Installation Guide Welcome 3/25/09; Ver. IMD-2.1 This guide is designed to support users installing QuickBooks: Pro or Premier 2008 financial accounting software, especially in
More informationSage ERP Accpac 6.0A. SageCRM 7.0 I Integration Guide
Sage ERP Accpac 6.0A SageCRM 7.0 I Integration Guide 2010 Sage Software, Inc. All rights reserved. Sage, the Sage logos, and all Sage ERP Accpac product and service names mentioned herein are registered
More informationHow To Use A Pvpn On A Pc Or Mac Or Ipad (For Pc) With A Password Protected (For Mac) On A Network (For Windows) On Your Computer (For Ipad) On An Ipad Or Ipa
VPN User Guide For PC System Requirements Operating System: Windows XP, Windows Vista, or Windows 7. (Windows 8 is not officially supported, but does work for some users.) Internet Browser: Internet Explorer
More informationMaxSea TZ: Microsoft SQL Server problems End User
MaxSea TZ: Microsoft SQL Server problems End User This TechNote applies to MaxSea TimeZero Navigator and Explorer v1.9.5 and above Description: TimeZero uses Microsoft SQL server to manage routes, marks,
More informationKepware Technologies Remote OPC DA Quick Start Guide (DCOM)
Kepware Technologies Remote OPC DA Quick Start Guide (DCOM) March, 2013 Ref. 03.10 Kepware Technologies Table of Contents 1. Overview... 1 1.1 What is DCOM?... 1 1.2 What is OPCEnum?... 1 2. Users and
More informationWhatsUp Gold v16.3 Installation and Configuration Guide
WhatsUp Gold v16.3 Installation and Configuration Guide Contents Installing and Configuring WhatsUp Gold using WhatsUp Setup Installation Overview... 1 Overview... 1 Security considerations... 2 Standard
More informationNetWrix USB Blocker. Version 3.6 Administrator Guide
NetWrix USB Blocker Version 3.6 Administrator Guide Table of Contents 1. Introduction...3 1.1. What is NetWrix USB Blocker?...3 1.2. Product Architecture...3 2. Licensing...4 3. Operation Guide...5 3.1.
More informationAdobe Acrobat 9 Deployment on Microsoft Windows Group Policy and the Active Directory service
Adobe Acrobat 9 Deployment on Microsoft Windows Group Policy and the Active Directory service white paper TABLE OF CONTENTS 1. Document overview......... 1 2. References............. 1 3. Product overview..........
More informationInstantAtlas TM Server Data Transfer Tools User Guide
InstantAtlas TM Server Data Transfer Tools User Guide Author: GeoWise User Support Released: 06/11/2012 Version: 6.5.1 InstantAtlas Server Data Transfer Tools Table of Contents 1. Introduction... 1 2.
More informationXIA Configuration Server
XIA Configuration Server XIA Configuration Server v7 Installation Quick Start Guide Monday, 05 January 2015 1 P a g e X I A C o n f i g u r a t i o n S e r v e r Contents Requirements... 3 XIA Configuration
More informationInstallation Instructions Release Version 15.0 January 30 th, 2011
Release Version 15.0 January 30 th, 2011 ARGUS Software: ARGUS Valuation - DCF The contents of this document are considered proprietary by ARGUS Software, the information enclosed and any portion thereof
More informationVirtual Office Remote Installation Guide
Virtual Office Remote Installation Guide Table of Contents VIRTUAL OFFICE REMOTE INSTALLATION GUIDE... 3 UNIVERSAL PRINTER CONFIGURATION INSTRUCTIONS... 12 CHANGING DEFAULT PRINTERS ON LOCAL SYSTEM...
More informationJuris and Juris Suite 2.5 Service Pack 2. Installation Guide
Juris and Juris Suite 2.5 Service Pack 2 Installation Guide Table of Contents Introduction... 2 Planning and Preparation... 2 System Requirements... 2 Server Required Pre-Install Items... 2 Servers Running
More informationTroubleshooting BPMS Errors
BPMS SOFTWARE bpms@bpms.net 877-250-2698 Troubleshooting BPMS Errors Last Updated: 5 June 2015 Table of Contents ERROR #2501 THE OPENFORM ACTION WAS CANCELLED... 5 APPLIES TO... 5 SYMPTOMS... 5 CAUSE...
More informationClick Studios. Passwordstate. Upgrade Instructions to V7 from V5.xx
Passwordstate Upgrade Instructions to V7 from V5.xx This document and the information controlled therein is the property of Click Studios. It must not be reproduced in whole/part, or otherwise disclosed,
More informationComodo MyDLP Software Version 2.0. Endpoint Installation Guide Guide Version 2.0.010215. Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013
Comodo MyDLP Software Version 2.0 Endpoint Installation Guide Guide Version 2.0.010215 Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013 Table of Contents 1.About MyDLP... 3 1.1.MyDLP Features...
More informationMigrating helpdesk to a new server
Migrating helpdesk to a new server Table of Contents 1. Helpdesk Migration... 2 Configure Virtual Web on IIS 6 Windows 2003 Server:... 2 Role Services required on IIS 7 Windows 2008 / 2012 Server:... 2
More informationFTP, IIS, and Firewall Reference and Troubleshooting
FTP, IIS, and Firewall Reference and Troubleshooting Although Cisco VXC Manager automatically installs and configures everything you need for use with respect to FTP, IIS, and the Windows Firewall, the
More informationInstalling Windows Server Update Services (WSUS) on Windows Server 2012 R2 Essentials
Installing Windows Server Update Services (WSUS) on Windows Server 2012 R2 Essentials With Windows Server 2012 R2 Essentials in your business, it is important to centrally manage your workstations to ensure
More informationJuris Suite 2.6. Upgrade Guide
Juris Suite 2.6 Upgrade Guide Table of Contents Introduction... 3 Upgrading Summary... 3 1 Upgrades from MyJuris 1.1 and JurisSuite Pre-2405... 3 Upgrades from 2405 and above versions of JurisSuite...
More informationMoxa Device Manager 2.3 User s Manual
User s Manual Third Edition, March 2011 www.moxa.com/product 2011 Moxa Inc. All rights reserved. User s Manual The software described in this manual is furnished under a license agreement and may be used
More informationAmadeus Selling Platform 3.1 P120
Amadeus Selling Platform 3.1 P120 Installation Guide Terminal Server and Citrix Index 1 Introduction... 3 1.1 About this guide... 3 1.2 Intended audience... 3 2 Limitations and requirements... 3 3 Technical
More informationHow To Deploy Lync 2010 Client Using SCCM 2012 R2
prajwaldesai.com http://prajwaldesai.com/how-to-deploy-lync-2010-client-using-sccm-2012-r2/ How To Deploy Lync 2010 Client Using SCCM 2012 R2 Prajwal Desai In this post we will see how to deploy Lync 2010
More informationILTA HANDS ON Securing Windows 7
Securing Windows 7 8/23/2011 Table of Contents About this lab... 3 About the Laboratory Environment... 4 Lab 1: Restricting Users... 5 Exercise 1. Verify the default rights of users... 5 Exercise 2. Adding
More informationSpector 360 Deployment Guide. Version 7
Spector 360 Deployment Guide Version 7 December 11, 2009 Table of Contents Deployment Guide...1 Spector 360 DeploymentGuide... 1 Installing Spector 360... 3 Installing Spector 360 Servers (Details)...
More informationRole Based Administration for LDMS 9.0 SP2
Role Based Administration for LDMS 9.0 SP2 This article is designed to help you understand Role Based Administration for LDMS 9.0 SP2 and how to configure it. We will try to give you as much information
More informationInstalling Globodox Web Client on Windows Server 2012
Installing Globodox Web Client on Windows Server 2012 Make sure that the Globodox Desktop Client is installed. Make sure it is not running. Note: Please click on Allow or Continue for all required UAC
More informationContents. VPN Instructions. VPN Instructions... 1
VPN Instructions Contents VPN Instructions... 1 Download & Install Check Point VPN Software... 2 Connect to FPUA by VPN... 6 Connect to Your Computer... 8 Determine Your Machine Type... 10 Identify 32-bit
More informationCalREDIE Browser Requirements
CalREDIE Browser Requirements Table of Contents Section 1: Browser Settings... 2 Section 2: Windows Requirements... 11 Section 3: Troubleshooting... 12 1 Section 1: Browser Settings The following browser
More information4cast Client Specification and Installation
4cast Client Specification and Installation Version 2015.00 10 November 2014 Innovative Solutions for Education Management www.drakelane.co.uk System requirements The client requires Administrative rights
More informationAdministration Guide. . All right reserved. For more information about Specops Gpupdate and other Specops products, visit www.specopssoft.
. All right reserved. For more information about Specops Gpupdate and other Specops products, visit www.specopssoft.com Copyright and Trademarks Specops Gpupdate is a trademark owned by Specops Software.
More informationInstallation instructions for MERLIN Dashboard
Installation instructions for MERLIN Dashboard Contents Installation Prerequisites:... 2 Procedure to manually backup and restore Views and Settings in AxOEE Manager... 3 For XP users go to:... 3 For Vista
More informationCONNECT-TO-CHOP USER GUIDE
CONNECT-TO-CHOP USER GUIDE VERSION V8 Table of Contents 1 Overview... 3 2 Requirements... 3 2.1 Security... 3 2.2 Computer... 3 2.3 Application... 3 2.3.1 Web Browser... 3 2.3.2 Prerequisites... 3 3 Logon...
More informationINSTALLATION INSTRUCTIONS FOR UKSSOGATEWAY
INSTALLATION INSTRUCTIONS FOR UKSSOGATEWAY 1) Install the UKSSOGateway application on the desktop: The UKSSOGateway application passes information from the myuk portal to launch the FESClient. The FESClient
More informationContents Minimum Requirements... 2 Instructions... 2 Troubleshooting... 7
Emdeon Remote Desktop Services Contents Minimum Requirements... 2 Instructions... 2 Troubleshooting... 7 Minimum Requirements 1. A high-speed Internet connection. DSL or Cable Internet are recommended.
More informationWeb-Access Security Solution
WavecrestCyBlock Client Version 2.1.13 Web-Access Security Solution UserGuide www.wavecrest.net Copyright Copyright 1996-2014, Wavecrest Computing, Inc. All rights reserved. Use of this product and this
More information1. Set Daylight Savings Time... 3. 2. Create Migrator Account... 3. 3. Assign Migrator Account to Administrator group... 4
1. Set Daylight Savings Time... 3 a. Have client log into Novell/Local Machine with Administrator Account...3 b. Access Adjust Date/Time...3 c. Make sure the time zone is set to Central Time...3 2. Create
More informationExchange Server Backup and Restore
WHITEPAPER BackupAssist Version 6 www.backupassist.com Cortex I.T. 2001-2007 2 Contents 1. Introduction... 3 1.1 Overview... 3 1.2 Requirements... 3 1.3 Requirements for remote backup of Exchange 2007...
More informationTo install Multifront you need to have familiarity with Internet Information Services (IIS), Microsoft.NET Framework and SQL Server 2008.
Znode Multifront - Installation Guide Version 6.2 1 System Requirements To install Multifront you need to have familiarity with Internet Information Services (IIS), Microsoft.NET Framework and SQL Server
More informationIBM Connections Plug-In for Microsoft Outlook Installation Help
IBM Connections Version 5 IBM Connections Plug-In for Microsoft Outlook Installation Help Edition Notice Note: Before using this information and the product it supports, read the information in "Notices."
More informationNetIQ. How to guides: AppManager v7.04 Initial Setup for a trial. Haf Saba Attachmate NetIQ. Prepared by. Haf Saba. Senior Technical Consultant
How to guides: AppManager v7.04 Initial Setup for a trial By NetIQ Prepared by Haf Saba Senior Technical Consultant Asia Pacific 1 Executive Summary This document will walk you through an initial setup
More informationSplendidCRM Deployment Guide
SplendidCRM Deployment Guide Version 5.x Last Updated: December 14, 2010 Category: Deployment This guide is for informational purposes only. SPLENDIDCRM SOFTWARE MAKES NO WARRANTIES, EXPRESS OR IMPLIED,
More informationPassword Manager Windows Desktop Client
Password Manager Windows Desktop Client EmpowerID provides an extension that allows organizations to plug into Password Manager to customize the Windows logon experience beyond that supplied by the standard
More informationSophos Enterprise Console Help. Product version: 5.1 Document date: June 2012
Sophos Enterprise Console Help Product version: 5.1 Document date: June 2012 Contents 1 About Enterprise Console...3 2 Guide to the Enterprise Console interface...4 3 Getting started with Sophos Enterprise
More informationSecret Server Installation Windows 8 / 8.1 and Windows Server 2012 / R2
Secret Server Installation Windows 8 / 8.1 and Windows Server 2012 / R2 Table of Contents Table of Contents... 1 I. Introduction... 3 A. ASP.NET Website... 3 B. SQL Server Database... 3 C. Administrative
More informationXMap 7 Administration Guide. Last updated on 12/13/2009
XMap 7 Administration Guide Last updated on 12/13/2009 Contact DeLorme Professional Sales for support: 1-800-293-2389 Page 2 Table of Contents XMAP 7 ADMINISTRATION GUIDE... 1 INTRODUCTION... 5 DEPLOYING
More informationSophos Anti-Virus standalone startup guide. For Windows and Mac OS X
Sophos Anti-Virus standalone startup guide For Windows and Mac OS X Document date: June 2007 Contents 1 What you need for installation...4 2 Installing Sophos Anti-Virus for Windows...5 3 Installing Sophos
More informationARCHER & GREINER. Citrix Client Install Instructions - For ALL Citrix Users. BigHand Client Install Instructions - For BigHand Users Only
ARCHER & GREINER Citrix Client Install Instructions - For ALL Citrix Users BigHand Client Install Instructions - For BigHand Users Only Table of Contents Citrix Client Install Instructions - For ALL Citrix
More informationGlobal Image Management System For epad-vision. User Manual Version 1.10
Global Image Management System For epad-vision User Manual Version 1.10 May 27, 2015 Global Image Management System www.epadlink.com 1 Contents 1. Introduction 3 2. Initial Setup Requirements 3 3. GIMS-Server
More informationVMware Mirage Web Manager Guide
Mirage 5.1 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of this document,
More informationGlobal VPN Client Getting Started Guide
Global VPN Client Getting Started Guide PROTECTION AT THE SPEED OF BUSINESS Introduction The SonicWALL Global VPN Client creates a Virtual Private Network (VPN) connection between your computer and the
More informationNetWrix USB Blocker Version 3.6 Quick Start Guide
NetWrix USB Blocker Version 3.6 Quick Start Guide Table of Contents 1. Introduction...3 1.1. What is NetWrix USB Blocker?...3 1.2. Product Architecture...3 2. Licensing...4 3. Getting Started...5 3.1.
More informationAscend Interface Service Installation
Ascend Interface Service Installation 1. If this is a new installation, make sure IIS is installed and running on your machine first, and make sure ASP is enabled under Extensions in IIS. 2. If you are
More informationInstallation Instruction STATISTICA Enterprise Server
Installation Instruction STATISTICA Enterprise Server Notes: ❶ The installation of STATISTICA Enterprise Server entails two parts: a) a server installation, and b) workstation installations on each of
More informationGlobal VPN Client Getting Started Guide
Global VPN Client Getting Started Guide 1 Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your system. CAUTION: A CAUTION indicates potential
More informationInstallation Guide for Pulse on Windows Server 2012
MadCap Software Installation Guide for Pulse on Windows Server 2012 Pulse Copyright 2014 MadCap Software. All rights reserved. Information in this document is subject to change without notice. The software
More informationHow To Configure CU*BASE Encryption
How To Configure CU*BASE Encryption Configuring encryption on an existing CU*BASE installation INTRODUCTION This booklet was created to assist CU*Answers clients with the configuration of encrypted CU*BASE
More informationSophos Anti-Virus for NetApp Storage Systems user guide. Product version: 3.0
Sophos Anti-Virus for NetApp Storage Systems user guide Product version: 3.0 Document date: May 2014 Contents 1 About this guide...3 2 About Sophos Anti-Virus for NetApp Storage Systems...4 3 System requirements...5
More informationPartner. Sage Pastel. Accounting. Installation Guide
Sage Pastel Accounting Partner Installation Guide Sage Pastel: +27 11 304 3000 Sage Pastel Intl: +27 11 304 3400 www.pastel.co.za www.sagepastel.com info@pastel.co.za info@sagepastel.com Sage Pastel Accounting
More informationPre Installation. Operating Systems: Windows 7 Pro, Server 2008, 2008 R2, Server 2012. Server 2012 (specific)
Table of Contents Pre Installation 3 Operating Systems: Windows 7 Pro, Server 2008, 2008 R2, Server 2012 3 Server 2012 (specific) 3 Check for a Firewall before you leave the server 4 Installation and IIS
More informationReference and Troubleshooting: FTP, IIS, and Firewall Information
APPENDIXC Reference and Troubleshooting: FTP, IIS, and Firewall Information Although Cisco VXC Manager automatically installs and configures everything you need for use with respect to FTP, IIS, and the
More information