SmartCenter for Pointsec - MI Overview

Size: px
Start display at page:

Download "SmartCenter for Pointsec - MI Overview"

Transcription

1 Chapter SmartCenter for Pointsec - MI Overview 1 SmartCenter for Pointsec - MI is a management and administration framework solution for the Check Point Endpoint Security product line that integrates with Microsoft Active Directory. MI enables Check Point Endpoint Security -Full Disk Encryption platforms (or MI Clients) to use a Device Agent based client/server approach for deployment, configuration, management, administration, and monitoring. This chapter provides an overview of SmartCenter for Pointsec - MI as the administrative piece for Full Disk Encryption, and also discusses the design philosophy of the MI framework. In addition, the use of SmartCenter for Pointsec - MI is compared to the Administrative mode of a Full Disk Encryption installation, resolving which solution is best applicable in a given environment. Objectives: Identify the Management Philosophy of SmartCenter for Pointsec - MI Compare and Contrast Active Directory OU management structure vs SmartCenter for Pointsec - MI OU management structure Identify the server and client side components of the MI framework Define the virtual and physical architecture of SmartCenter for Pointsec - MI Execute a compact installation of SmartCenter for Pointsec - MI 7

2 Key Terms: Framework Organizational Unit Active Directory Management Console MI database Directory Scanner Connection Point Device Agent 8 SmartCenter for Pointsec - MI

3 Administering Full-Disk Encryption Chapter 1: SmartCenter for Pointsec - MI Overview Administering Full-Disk Encryption Essentially and highly simplistically, administering Full-Disk encryption is a simple management process: 1. Configure the program. 2. Deploy the installation. 3. Verify that the installation has been successfully completed. But realistically this is not the case. Configuration poses numerous questions such as: Do I integrate user s disk encryption password with their network access password, or keep them separate? If I m using some a type of dynamic access for the network, can I use this with disk encryption? Some deployment considerations are: Do certain departments need different levels of encryption? Should one department uses dynamic token access, while the other uses traditional passwords? In addition, verification may or may not occur, depending on the type of software used. If the disk encryption software is not fully compatible with whatever enterprise management software is available, the administrator may be reduced to manually verifying each user s system installation. Check Point Full Disk Encryption (FDE), previously called Pointsec PC Enterprise Workplace edition. provides answers to these questions, as it is managed & deployed using an Administrative Installation of the product. This superuser configuration gives an administrator in a small-to-medium business environment the ability to work entirely within the Check Point FDE installation and perform all job-related tasks. Configuration settings can be set and/or adjusted, SmartCenter for Pointsec - MI 9

4 What SmartCenter for Pointsec -MI offers profiles can be created and/or updated, and profile and binary updates can be issued. Drive access can be configured to use the same password (or authentication scheme) as used by Network Access. Encryption can be configured depending on specific service levels for different departments. Additionally, logging and verification of installation can be configured to be written back to a shared server. If no integration with a user & resource management structure is required, this is a suitable management solution. However, as a business increases in size, such a type of installation is typically planned using some variant of LDAP or more often Microsoft Active Directory. In this case, a solution is a necessity instead of a luxury. Security critical functions such as managing the CheckPoint Full Disk Encryption installation in the superuser mode may be cumbersome. Therefore, if LDAP or Active Directory is being implemented, SmartCenter for Pointsec - MI is the most effective solution, offering scalability, integration with user and resource management and centralization. What SmartCenter for Pointsec -MI offers SmartCenter for Pointsec - MI is the management and administration solution for the Check Point Endpoint Security product line that integrates with Microsoft Active Directory. MI uses a client-server based model for deployment, configuration, monitoring, management and administration of various pieces of the Check Point Endpoint Security suite. Central management Leveraging the pre-existing organizational hierarchy structure of Active Directory, MI is a centralized management solution. A single administrator (or team of administrators) can deploy, upgrade and remove the Full Disk Encryption product from a single management console application. The MI Management Console (MIMC) also allows for full monitoring of the organization s security using centralized logging and system status reporting. 10 SmartCenter for Pointsec - MI

5 What SmartCenter for Pointsec -MI offers Chapter 1: SmartCenter for Pointsec - MI Overview Modular Framework solution Figure 1-1: The MI Framework - Server Side Components MI is described as a modular framework solution. Since a framework could be described as a structure that supports other components internally or externally, MI fits this description in that it can support multiple security products within its management scheme. As the above graphic shows, multiple pieces make up each component of the framework. While some of these pieces are specific to Microsoft s productline (ASP.NET, IIS, Active Directory) they still comprise critical elements of the framework. For example, the Full Disk Encryption software module is installed into the SmartCenter MI framework at the Connection Point, and the Administrator then configures the security profile for Full Disk Encryption in the MI Management Console, which then saves it to the MI Database. In the database, the Directory Scanner (DS) has reproduced the Active Directory structure to allow for the Full Disk Encryption configuration to propagate to all levels within an organization. Once the profile (or profiles) has been configured SmartCenter for Pointsec - MI 11

6 What SmartCenter for Pointsec -MI offers accordingly, the administrator can then deploy Full Disk Encryption and the relevant profile(s) to all parts of an organization. In addition to the Full Disk Encryption software, different software modules are supported, including Check Point Media Encryption and Check Point Mobile Encryption. The modular aspect of these pieces is illustrated in the following graphic: Figure 1-2: Modular Framework Solution - Client Side As in the framework of a house where additional structures can be added, MI is a scalable solution, capable of growing as an enterprise grows, based in part on MI s integration with Microsoft Active Directory. This is illustrated, in the following graphic using the Directory Scanner component: 12 SmartCenter for Pointsec - MI

7 What SmartCenter for Pointsec -MI offers Chapter 1: SmartCenter for Pointsec - MI Overview Figure 1-3: Scalability - Directory Scanner Example As the AD structure of checkpoint.com expands out into the subdomains of research.checkpoint.com, accounting.checkpoint.com and sales.checkpoint.com, each of these is still initially scanned by the same directory scanner. As the load grows too great for a single directory scanner, additional Directory Scanners are added to write information back to the MI Database. Eventually, the MI Database itself is partitioned into separate sections for each of the subdomains. Integration with Active Directory As previously mentioned, SmartCenter MI extends existing enterprise investments by integrating with Active Directory. This allows MI to leverage the management structure provided by Active Directory s existing configuration in a given enterprise environment. This gives SmartCenter MI a low installation threshold since a critical part of the SmartCenter for Pointsec - MI 13

8 What SmartCenter for Pointsec -MI offers configuration of SmartCenter MI s management structure is based on existing Active Directory structures. It should be noted, though that although SmartCenter for Pointsec - MI uses Active Directory s structure and philosophy, it does not interact directly with the Active Directory. Instead, SmartCenter - MI replicates the necessary information into the MI Database. As such there are no objects created in the Active Directory installation, and no need for schema extensions. Microsoft Active Directory - A Quick Overview Active Directory is a database technology created by Microsoft that is primarily used as a management tool for organizational structures in Windows environments. Using Active Directory, administrators assign policies, deploy software, and apply critical updates to an organization. Active Directory uses the concept of objects and containers in a hierarchical organizational structure. Each tier of the hierarchy is made up of containers, which contain objects, or a container may contain other containers and objects. The container in this structure is the aforementioned Organizational Unit (OU). OUs are tiers in the hierarchy and contain objects, which can be defined in three categories: resources - commonly defined as things like printers, user pc s, and servers. services - any service that may be used within the company network; E- mail, chat, file server access. users - user accounts and their network access. Much like DNS domains, AD hierarchies are nested within each other, stemming from a root or enterprise level. Hence, the OU checkpoint.com will have sub OUs of research.checkpoint.com, accounting.checkpoint.com and sales.checkpoint.com. Each of these are distinct containers at their own level, but they are all connected to the container for checkpoint.com. This extends down to the specific device object level, so a printer in 14 SmartCenter for Pointsec - MI

9 What SmartCenter for Pointsec -MI offers Chapter 1: SmartCenter for Pointsec - MI Overview research.checkpoint.com could have an active directory designation of north_office_hp.research.checkpoint.com The Microsoft Management Console Like most server-side applications in Windows, Active Directory is managed via the Active Directory snap-in for the Microsoft Management Console. This allows administrators to be able to access the objects in an OU directly. The following screenshot shows the Active Directory Users and Computers snap-in: Figure 1-4: The Microsoft Management Console (MMC) - Active Directory Users and Computers From here, an administrator can view the entire contents of an OU, related to the user accounts and computers of the OU. SmartCenter for Pointsec - MI 15

10 The SmartCenter MI Management Structure The SmartCenter MI Management Structure SmartCenter MI recreates and then uses the existing Active Directory structure by recreating the levels and specific elements of an organization s AD Organizational Units (OUs). As in Active Directory, SmartCenter MI defines an OU as an object used to distinguish different departments, sites, teams and devices in an organization. Using these units, Pointsec security modules are installed, modified, managed or removed. Building on the advantages Active Directory s organizational hierarchy brings to resource management, SmartCenter MI s OU structure makes propagation of installation, configuration and updates to protected resources easy. Settings that are configured for a top-level OU will normally be inherited by the sub-ous of the primary OU. For example, if you want all members of the OU checkpoint.com to use smartcards for login into Full Disk Encryption, making the configuration change in the research.checkpoint.com and accouting.checkpoint.com OUs will propagate down to the sub OUs dallas.research.checkpoint.com, tokyo.research.checkpoint.com and prague.accounting.checkpoint.com. 16 SmartCenter for Pointsec - MI

11 The SmartCenter MI Management Structure Chapter 1: SmartCenter for Pointsec - MI Overview Figure 1-5: OU Propagation Conversely, for instances where a sub-ou needs different settings than the parent OU; configuration settings made specifically at that sub-ou level normally override the settings configured on the higher level. (This can be modified if specific settings are needed throughout an OU and it s sub-ous). Check Point recommends configuring settings on the OU level rather than for specific devices in SmartCenter for Pointsec - MI modules. SmartCenter for Pointsec - MI 17

12 The SmartCenter MI Management Structure Figure 1-6: Installation via OU structures. When creating an installation package for a module in order to install a security product on end-users devices, the settings for the module are collected from the selected OU. In the above graphic, the specific device in research.checkpoint.com required settings only for that module, and as such, the administrator made configurations directly to the object for that device. However, all systems in accounting.checkpoint.com required the same security configuration. The administrator was able to create and deploy a configuration profile that was suitable for all machines by creating this at the OU level. 18 SmartCenter for Pointsec - MI

13 MI Components Chapter 1: SmartCenter for Pointsec - MI Overview MI Components Figure 1-7: SmartCenter for Pointsec - Component Interaction As mentioned earlier, SmartCenter for Pointsec - MI is considered a framework, or more succinctly, a Management Infrastructure (hence the initials MI). It is comprised of several different components, i.e. distinct programs that perform singular or multiple tasks contributing to the overall function. The above graphic illustrates these components and their interaction. To describe the process flow illustrated in the above graphic, consider the following: The Device Agent (DA) is installed on the client, allowing communications with the MI Connection Point (CP), and thereby the rest of the framework. This facilitates sending user & polling information between the client and the MI framework, specifically the SmartCenter for Pointsec - MI 19

14 MI Database (MIDB), as well as providing a channel for the framework to deliver software modules (such as Full Disk Encryption) to the client. The software modules are stored at the Connection Point, so that the Device Agent can download them to the clients. The Connection Point also acts as an encrypted relay (using the Keyboxes) between the MI Database (MIDB) and the Device Agent for AD structure related information. The MI Database could be viewed as the center of the framework. As illustrated above, the Directory Scanner (DS) pulls the relevant information regarding the Active Directory structure on the Domain Controller and populates the MI Database with this information. Subsequently, the Directory Scanner also polls AD to send any updates and/or changes to the MI Database. The MI Management Console (MIMC) connects directly to the MI Database as well. It centralizes all administrative functions in the MI Framework. From here, the administrator can add software modules to the connection point, add additional connection points and download locations, and view and modify software module properties and OU object and container information. 20 SmartCenter for Pointsec - MI

15 Server Side Components Chapter 1: SmartCenter for Pointsec - MI Overview Server Side Components The server-side components comprise the backbone of SmartCenter for Pointsec - MI. The following list gives a brief overview of each one, which are then discussed in greater detail in subsequent sections: MI Management Console (MIMC) - the main interface for the MI Administrator. All administrative work can be done via the MIMC. MI database (MIDB) - The SQL database store where MI recreates the Active Directory structure and uses this for its management functions. Active Directory (AD) - The organizational hierarchy database created by Microsoft. Stores all user, computer and resource information in an organization. Directory Scanner (DS) - This devices scans AD and then reproduces the necessary components in MI. Connection Point (CP) - Provides and access point for Device Agents and the User Collector on PCs. Keyboxes - Encrypts communications between the Connection Point, MI Database and the MIMC. SmartCenter for Pointsec - MI 21

16 Server Side Components The MI Management Console (MIMC) Figure 1-8: The MI Management Console As mentioned earlier, the MIMC is the primary location where the SmartCenter for Pointsec - MI administrator will do their work. The MIMC can be installed on any server or workstation with connectivity to the MIDB. It provides a visual display of the directory services that the Directory Scanner can scan, and uses the enterprise s Organizational Unit layout for configuration, deployment, monitoring, and management. A subsequent chapter covers the MIMC in detail, outlining the areas of the MIMC and the tasks that are performed in each of the areas. 22 SmartCenter for Pointsec - MI

17 Server Side Components Chapter 1: SmartCenter for Pointsec - MI Overview The following table lists the system requirements for the workstation running the MIMC: Item Requirement Operating System Microsoft Windows Vista Enterprise Edition Microsoft Windows XP Professional SP 2 or higher Microsoft Windows 2000 Server minimum service pack 4 Microsoft Windows Server 2003 (all variants) Disk Space (initial) 15 MB Memory (initial) 128 MB Network Connectivity TCP/IP networking Stored Procedure Call access to MIDB Terminal Server MIMC can be used over Terminal Services. Only one instance at the same time can run if the logged in Windows user has permission view/list running processes in the system. If the user does not have this permission, several instances can be run.hence several users can use the MIMC on one Terminal Server. Application Microsoft.NET 2.0 Table 1-9: MIMC System Requirements SmartCenter for Pointsec - MI 23

18 Server Side Components The MI Database (MIDB) Figure 1-10: The MI Database (MIDB) The MI Database (MIDB) is the storage location for all configuration and user data within SmartCenter for Pointsec - MI. It runs on a SQL server installation, and mirrors the Active Directory components that MI uses to create its management structure. All communications with the MIDB via the MIMC and the Connection Point are encrypted using the keyboxes (discussed later). All sensitive information in these communications such as user account information are encrypted. However, the information from Active Directory (OUs, containers, objects) are not encrypted, but are accessed only using stored procedures. 24 SmartCenter for Pointsec - MI

19 The following table lists the system requirements for the MI Database: Item Operating System Databases Disk Space (initial) Memory Network Connectivity Requirement Microsoft Windows 2000 Server (Standard, Enterprise, and Web Edition) minimum Service Pack 4 Microsoft Windows Server 2003 (all variants) Microsoft SQL Server 2000 (Standard and Enterprise) minimum Service Pack 2 (Service Pack 3 for Microsoft Windows Server 2003) or Microsoft SQL Server 2005 (Standard and Enterprise) 35 MB available 256 MB TCP/IP networking Stored Procedure Call access from other SmartCenter for Pointsec components Table 1-11: MI Database System Requirements Active Directory While AD is a core component of SmartCenter for MI, it is only used as a reference point for the management structure and object information that is used by MI. As has already been discussed, SmartCenter for Pointsec - MI mirrors the AD structure into it s own database. The organizational hierarchy created when the Domains are configured through which computers and users are associated with what domains (and subdomains) are all imported into MI, creating in essence a second AD used only by SmartCenter MI. For the system requirements and configuration information on Active Directory, refer to the documentation that came with your Domain Server Software. SmartCenter for Pointsec - MI 25

20 Directory Scanner Figure 1-12: Active Directory Scanner The Directory Scanner is the service by which SmartCenter MI initially mirrors the AD structures and objects into the MI database. To achieve this, the Directory Scanner only uses read permissions to the Active Directory database, ensuring that no modifications are made by the scanner to AD. After the mirroring has been performed and the MIDB has the structure reproduced in it s database, the Directory Scanner then regularly polls AD using the USN Number mechanism for incremental checks of the AD database against the MI mirrored database. Once it has made the check, the Directory Scanner then makes any updates or changes that need to be added to the MIDB. Working with the Directory Scanner is discussed in further detail in a later chapter. 26 SmartCenter for Pointsec - MI

21 The following table lists the system requirements for the Directory Scanner: Item Operating System Directory Services Disk Space (initial) Memory (initial) Network Connectivity Requirement Microsoft Windows 2000 Server (Standard, Enterprise, and Web Edition) minimum Service Pack 4 Microsoft Windows Server 2003 (all variants) Microsoft Windows 2000 AD, Microsoft Windows Server 2003 AD, 2003 R2 AD, and 2008 AD 15 MB 256 MB TCP/IP networking Stored Procedure Call access to MIDB Access to Directory Service host system (LDAP) Table 1-13: MI Directory Scanner System Requirements SmartCenter for Pointsec - MI 27

22 Connection Point Figure 1-14: Connection Point The Connection Point is the frontline component between the server side pieces of MI and the client side pieces. A service that works with IIS on a server, this component handles passing the information collected by the Device Agent and User Collector on to the MI Database via an encrypted connection. It also provides the download point for Device Agents to pull installation binaries of various software and security modules from when these are being deployed to the end-user machines. These binaries can be installed via UNC share, HTTP Download, or (in some cases) via group policy updates in Active Directory. 28 SmartCenter for Pointsec - MI

23 The following table lists the system requirements for the Connection Point: Item Requirement Operating System Web Servers Disk Space (initial) Memory (initial) Network Connectivity Microsoft Windows 2000 Server (Standard, Enterprise, and Web Edition) minimum Service Pack 4 Microsoft Windows Server 2003 (all variants) Microsoft Internet Information Server (IIS) IIS 5.0 (MS Windows 2000) IIS 6.0 (MS Windows Server 2003) 15 MB 512 MB TCP/IP networking Stored Procedure Call access to MIDB HTTP and HTTPS access from MI enabled clients SSL Certificate Optional Application Microsoft.NET 2.0 Table 1-15: Connection Point System Requirements Keyboxes The keybox is used to authenticate to and create the keys for the encrypted connections between the MIDB and the MIMC and Connection Point. The keybox uses AES256/RSA1024 encryption where the seed is generated from a unique fingerprint created during installation. All authentication is done to the keyboxes using dynamic tokens, and is required at each startup whether it is manual or automatic. SmartCenter for Pointsec - MI 29

24 Client Side Components Client Side Components In addition to the components running on the server side, there are several components that run on the client side. Device Agent - A client-side service that provides polling information to MI and also is used for deployment and installation. A later chapter discusses the device agent and it s GUI in greater detail. User Collector - An optional component that is used to collect user logon data to help populate the MI Database. A later chapter discusses the User Collector in greater detail. Client Side Software Module - Software Modules fall into two general categories; the device agents (such as the Device Agent service and the USer Collector) and the security modules that are installed on to workstations and laptops such as Check Point Endpoint Security - Full Disk Encryption. 30 SmartCenter for Pointsec - MI

25 Physical Architecture Chapter 1: SmartCenter for Pointsec - MI Overview Physical Architecture Figure 1-16: Distribution of SmartCenter for Pointsec - MI Physical Components Ideally, the best installation of the SmartCenter for Pointsec - MI components would be for each individual component to be installed on a separate system, so that resources would not be overtaxed on those devices. However, as this is not always possible, there are methods for combining SmartCenter MI components on physical hardware. The following is a recommendation for the minimum host architecture for SmartCenter for Pointsec - MI components: Microsoft Active Directory Domain Controller SmartCenter for Pointsec MI Server with the following SmartCenter for Pointsec - MI components: 1 MI Database (MIDB) on Microsoft SQL Server 2 Connection Point servers (CPs) on Microsoft Internet Information Server (IIS) 2 SmartCenter for Pointsec_-Management Consoles (MIMC) (installed with CPs) SmartCenter for Pointsec - MI 31

26 Physical Architecture. Directory Scanner (DS) is recommended for AD environments, but optional for VDS environments The following table outlines which components can be installed with other components in the same host environment. MI Component Active Directory (AD) Directory Scanner (DS) Host System AD Host DS Host NO = Not Supported or definitely not supported combination NR = Not Recommended. While it is possible to install components on hosts that are not recommended, operational impact on the host systems is possible, and non-pointsec MI related disaster recovery operations may be impacted. OK = OK, Supportable Combination MIDB Host CP Host MIMC Host Client PC - NR NR NR NR NO NR - OK OK OK NO MI Database NR OK - OK OK NO (MIDB) Connection NR OK OK - OK NO Point (CP) MI Management Console (MIMC) NR OK OK OK - OK MI Security Modules NO NO NO NO NR OK 32 SmartCenter for Pointsec - MI

27 Remote Help Chapter 1: SmartCenter for Pointsec - MI Overview Remote Help Figure 1-17: MI Web Remote Help MI now adds a web based Remote Help interface MI webremotehelp. This web based tool allows authentication to the MI Framework to execute Remote Help operations to MI Clients. These operations include enabling a one-time login for a user locked out of their account, and providing assistance for a remote password change. MI webremotehelp allows implementation of a Self-Service Remote Help operations, so that users can use and interface enabled on an intranet site to change their password, or update get a one time access password when locked out. It should be noted, however, that this is not the same product as webrh or SmartCenter for Pointsec webrh and is not compatible with these. SmartCenter for Pointsec - MI 33

28 Remote Help 34 SmartCenter for Pointsec - MI

LifeSize Control Installation Guide

LifeSize Control Installation Guide LifeSize Control Installation Guide April 2005 Part Number 132-00001-001, Version 1.0 Copyright Notice Copyright 2005 LifeSize Communications. All rights reserved. LifeSize Communications has made every

More information

Symantec Endpoint Encryption Full Disk

Symantec Endpoint Encryption Full Disk Symantec Endpoint Encryption Full Disk Installation Guide Version 7.0 Information in this document is subject to change without notice. No part of this document may be reproduced or transmitted in any

More information

FEATURE COMPARISON BETWEEN WINDOWS SERVER UPDATE SERVICES AND SHAVLIK HFNETCHKPRO

FEATURE COMPARISON BETWEEN WINDOWS SERVER UPDATE SERVICES AND SHAVLIK HFNETCHKPRO FEATURE COMPARISON BETWEEN WINDOWS SERVER UPDATE SERVICES AND SHAVLIK HFNETCHKPRO Copyright 2005 Shavlik Technologies. All rights reserved. No part of this document may be reproduced or retransmitted in

More information

DriveLock Quick Start Guide

DriveLock Quick Start Guide Be secure in less than 4 hours CenterTools Software GmbH 2012 Copyright Information in this document, including URL and other Internet Web site references, is subject to change without notice. Unless otherwise

More information

Chapter 1 Scenario 1: Acme Corporation

Chapter 1 Scenario 1: Acme Corporation Chapter 1 Scenario 1: Acme Corporation In This Chapter Description of the Customer Environment page 18 Introduction to Deploying Pointsec PC page 20 Prepare for Deployment page 21 Install Pointsec PC page

More information

Lesson Plans Microsoft s Managing and Maintaining a Microsoft Windows Server 2003 Environment

Lesson Plans Microsoft s Managing and Maintaining a Microsoft Windows Server 2003 Environment Lesson Plans Microsoft s Managing and Maintaining a Microsoft Windows Server 2003 Environment (Exam 70-290) Table of Contents Table of Contents... 1 Course Overview... 2 Section 0-1: Introduction... 4

More information

NSi Mobile Installation Guide. Version 6.2

NSi Mobile Installation Guide. Version 6.2 NSi Mobile Installation Guide Version 6.2 Revision History Version Date 1.0 October 2, 2012 2.0 September 18, 2013 2 CONTENTS TABLE OF CONTENTS PREFACE... 5 Purpose of this Document... 5 Version Compatibility...

More information

ITKwebcollege.ADMIN-Basics Fundamentals of Microsoft Windows Server

ITKwebcollege.ADMIN-Basics Fundamentals of Microsoft Windows Server ITKwebcollege.ADMIN-Basics Fundamentals of Microsoft Windows Server Inhalte Teil 01 Network Architecture Standards Network Components and Terminology Network Architecture Network Media Access Control Methods

More information

DESLock+ Basic Setup Guide Version 1.20, rev: June 9th 2014

DESLock+ Basic Setup Guide Version 1.20, rev: June 9th 2014 DESLock+ Basic Setup Guide Version 1.20, rev: June 9th 2014 Contents Overview... 2 System requirements:... 2 Before installing... 3 Download and installation... 3 Configure DESLock+ Enterprise Server...

More information

Bode Collection Point Electronic DNA Sample Information Program Technical Specifications

Bode Collection Point Electronic DNA Sample Information Program Technical Specifications Bode Collection Point Electronic DNA Sample Information Program Technical Specifications Product Definition Bode Collection Point software is used to collect and report personal information and other meta

More information

The Windows Server 2003 Environment. Introduction. Computer Roles. Introduction to Administering Accounts and Resources. Lab 2

The Windows Server 2003 Environment. Introduction. Computer Roles. Introduction to Administering Accounts and Resources. Lab 2 Islamic University of Gaza College of Engineering Computer Department Computer Networks Lab Introduction to Administering Accounts and Resources Prepared By: Eng.Ola M. Abd El-Latif Mar. /2010 0 :D Objectives

More information

NETWRIX IDENTITY MANAGEMENT SUITE

NETWRIX IDENTITY MANAGEMENT SUITE NETWRIX IDENTITY MANAGEMENT SUITE FEATURES AND REQUIREMENTS Product Version: 3.3 February 2013. Legal Notice The information in this publication is furnished for information use only, and does not constitute

More information

Step-by-Step Guide to Setup Instant Messaging (IM) Workspace Datasheet

Step-by-Step Guide to Setup Instant Messaging (IM) Workspace Datasheet Step-by-Step Guide to Setup Instant Messaging (IM) Workspace Datasheet CONTENTS Installation System requirements SQL Server setup Setting up user accounts Authentication mode Account options Import from

More information

Installation Notes for Outpost Network Security (ONS) version 3.2

Installation Notes for Outpost Network Security (ONS) version 3.2 Outpost Network Security Installation Notes version 3.2 Page 1 Installation Notes for Outpost Network Security (ONS) version 3.2 Contents Installation Notes for Outpost Network Security (ONS) version 3.2...

More information

Managing and Maintaining a Windows Server 2003 Network Environment

Managing and Maintaining a Windows Server 2003 Network Environment Managing and maintaining a Windows Server 2003 Network Environment. AIM This course provides students with knowledge and skills needed to Manage and Maintain a Windows Server 2003 Network Environment.

More information

PC-Duo Web Console Installation Guide

PC-Duo Web Console Installation Guide PC-Duo Web Console Installation Guide Release 12.1 August 2012 Vector Networks, Inc. 541 Tenth Street, Unit 123 Atlanta, GA 30318 (800) 330-5035 http://www.vector-networks.com Copyright 2012 Vector Networks

More information

KASPERSKY LAB. Kaspersky Administration Kit version 6.0. Administrator s manual

KASPERSKY LAB. Kaspersky Administration Kit version 6.0. Administrator s manual KASPERSKY LAB Kaspersky Administration Kit version 6.0 Administrator s manual KASPERSKY ADMINISTRATION KIT VERSION 6.0 Administrator s manual Kaspersky Lab Visit our website: http://www.kaspersky.com/

More information

Kaseya Server Instal ation User Guide June 6, 2008

Kaseya Server Instal ation User Guide June 6, 2008 Kaseya Server Installation User Guide June 6, 2008 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private Sector IT organizations. Kaseya's

More information

Active Directory Integration Manual

Active Directory Integration Manual Active Directory Integration Manual Fast and easy roll-out of BackupAgent platforms using Active Directory and web-panels 1. Online Backup for hosters This whitepaper describes the unique and valuable

More information

Microsoft Dynamics CRM Server 2011 software requirements

Microsoft Dynamics CRM Server 2011 software requirements Microsoft Dynamics CRM Server 2011 software requirements This section lists the software and application requirements for Microsoft Dynamics CRM Server 2011. Windows Server operating system: Microsoft

More information

Implementing, Managing, and Maintaining a Microsoft Windows Server 2003 Network Infrastructure

Implementing, Managing, and Maintaining a Microsoft Windows Server 2003 Network Infrastructure Question Number (ID) : 1 (jaamsp_mngnwi-025) Lisa would like to configure five of her 15 Web servers, which are running Microsoft Windows Server 2003, Web Edition, to always receive specific IP addresses

More information

MailStore Outlook Add-in Deployment

MailStore Outlook Add-in Deployment MailStore Outlook Add-in Deployment A MailStore Server installation deploys the MailStore Outlook Add-in as a Windows Installer package (MSI) that can be installed on client machines using software distribution.

More information

Best Practices & Deployment SurfControl Mobile Filter v 5.0.2.60

Best Practices & Deployment SurfControl Mobile Filter v 5.0.2.60 Best Practices & Deployment SurfControl Mobile Filter v 5.0.2.60 rev2.1, January 2006 Pre-Installation Guide Notice 2006 SurfControl. All rights reserved. SurfControl, SurfControl E-mail Filter, SurfControl

More information

Ultimus and Microsoft Active Directory

Ultimus and Microsoft Active Directory Ultimus and Microsoft Active Directory May 2004 Ultimus, Incorporated 15200 Weston Parkway, Suite 106 Cary, North Carolina 27513 Phone: (919) 678-0900 Fax: (919) 678-0901 E-mail: documents@ultimus.com

More information

Citrix EdgeSight Administrator s Guide. Citrix EdgeSight for Endpoints 5.3 Citrix EdgeSight for XenApp 5.3

Citrix EdgeSight Administrator s Guide. Citrix EdgeSight for Endpoints 5.3 Citrix EdgeSight for XenApp 5.3 Citrix EdgeSight Administrator s Guide Citrix EdgeSight for Endpoints 5.3 Citrix EdgeSight for enapp 5.3 Copyright and Trademark Notice Use of the product documented in this guide is subject to your prior

More information

Important. Please read this User s Manual carefully to familiarize yourself with safe and effective usage.

Important. Please read this User s Manual carefully to familiarize yourself with safe and effective usage. Important Please read this User s Manual carefully to familiarize yourself with safe and effective usage. About This Manual This manual describes how to install and configure RadiNET Pro Gateway and RadiCS

More information

Before deploying SiteAudit it is recommended to review the information below. This will ensure efficient installation and operation of SiteAudit.

Before deploying SiteAudit it is recommended to review the information below. This will ensure efficient installation and operation of SiteAudit. SiteAudit Knowledge Base Deployment Check List June 2012 In This Article: Platform Requirements Windows Settings Discovery Configuration Before deploying SiteAudit it is recommended to review the information

More information

TIBCO Spotfire Platform IT Brief

TIBCO Spotfire Platform IT Brief Platform IT Brief This IT brief outlines features of the system: Communication security, load balancing and failover, authentication options, and recommended practices for licenses and access. It primarily

More information

המרכז ללימודי חוץ המכללה האקדמית ספיר. ד.נ חוף אשקלון 79165 טל'- 08-6801535 פקס- 08-6801543 בשיתוף עם מכללת הנגב ע"ש ספיר

המרכז ללימודי חוץ המכללה האקדמית ספיר. ד.נ חוף אשקלון 79165 טל'- 08-6801535 פקס- 08-6801543 בשיתוף עם מכללת הנגב עש ספיר מודולות הלימוד של מייקרוסופט הקורס מחולק ל 4 מודולות כמפורט:.1Configuring Microsoft Windows Vista Client 70-620 Installing and upgrading Windows Vista Identify hardware requirements. Perform a clean installation.

More information

How To Set Up Safetica Insight 9 (Safetica) For A Safetrica Management Service (Sms) For An Ipad Or Ipad (Smb) (Sbc) (For A Safetaica) (

How To Set Up Safetica Insight 9 (Safetica) For A Safetrica Management Service (Sms) For An Ipad Or Ipad (Smb) (Sbc) (For A Safetaica) ( SAFETICA INSIGHT INSTALLATION MANUAL SAFETICA INSIGHT INSTALLATION MANUAL for Safetica Insight version 6.1.2 Author: Safetica Technologies s.r.o. Safetica Insight was developed by Safetica Technologies

More information

Agency Pre Migration Tasks

Agency Pre Migration Tasks Agency Pre Migration Tasks This document is to be provided to the agency and will be reviewed during the Migration Technical Kickoff meeting between the ICS Technical Team and the agency. Network: Required

More information

Designing a Windows Server 2008 Active Directory Infrastructure and Services

Designing a Windows Server 2008 Active Directory Infrastructure and Services Course Code: M6436 Vendor: Microsoft Course Overview Duration: 5 RRP: 2,025 Designing a Windows Server 2008 Active Directory Infrastructure and Services Overview During this five-day course, delegates

More information

XyLoc Security Server w/ AD Integration (XSS-AD 5.x.x) Administrator's Guide

XyLoc Security Server w/ AD Integration (XSS-AD 5.x.x) Administrator's Guide XyLoc Security Server w/ AD Integration (XSS-AD 5.x.x) Administrator's Guide Contacting Ensure Technologies Email: support@ensuretech.com Phone: (734) 547-1600 Home Office: Ensure Technologies 135 S Prospect

More information

NetIQ Advanced Authentication Framework. System Requirements. Version 5.1.0

NetIQ Advanced Authentication Framework. System Requirements. Version 5.1.0 NetIQ Advanced Authentication Framework System Requirements Version 5.1.0 Table of Contents 1 Table of Contents 2 Introduction 3 About This Document 3 Infrastructure 4 Communication Channel Throughput

More information

Corporate I.T. Services Limited Updating your Network Infrastructure Technology Skills to Windows Server 2008 (Beta 3)

Corporate I.T. Services Limited Updating your Network Infrastructure Technology Skills to Windows Server 2008 (Beta 3) Updating your Network Infrastructure Technology Skills to Windows Server 2008 (Beta 3) Course 6415A: Three days; Instructor-Led Introduction This 3 day instructor-led course provides students with an understanding

More information

MAPILab Reports Installation Guide. Document version 3.02

MAPILab Reports Installation Guide. Document version 3.02 MAPILab Reports Installation Guide Document version 3.02 MAPILab Ltd., April 2010 Table of Contents Introduction... 3 1. Product architecture and general explanations... 4 2. System requirements... 6 2.1.

More information

inforouter V8.0 Server & Client Requirements

inforouter V8.0 Server & Client Requirements inforouter V8.0 Server & Client Requirements Please review this document thoroughly before proceeding with the installation of inforouter Version 8. This document describes the minimum and recommended

More information

6445A - Implementing and Administering Windows Small Business Server 2008

6445A - Implementing and Administering Windows Small Business Server 2008 6445A - Implementing and Administering Windows Small Business Server 2008 Course Number: 6445A Course Length: 5 Days Course Overview This 5 day course provides students with the necessary knowledge to

More information

Configuring, Managing and Maintaining Windows Server 2008 Servers

Configuring, Managing and Maintaining Windows Server 2008 Servers Configuring, Managing and Maintaining Windows Server 2008 Servers Elements of this syllabus are subject to change Course Details Course Code: 6419 Duration: Notes: 5 day(s) This course syllabus should

More information

TECHNICAL DOCUMENTATION SPECOPS DEPLOY / APP 4.7 DOCUMENTATION

TECHNICAL DOCUMENTATION SPECOPS DEPLOY / APP 4.7 DOCUMENTATION TECHNICAL DOCUMENTATION SPECOPS DEPLOY / APP 4.7 DOCUMENTATION Contents 1. Getting Started... 4 1.1 Specops Deploy Supported Configurations... 4 2. Specops Deploy and Active Directory...5 3. Specops Deploy

More information

Server Installation Manual 4.4.1

Server Installation Manual 4.4.1 Server Installation Manual 4.4.1 1. Product Information Product: BackupAgent Server Version: 4.4.1 2. Introduction BackupAgent Server has several features. The application is a web application and offers:

More information

Using Remote Web Workplace Version 1.01

Using Remote Web Workplace Version 1.01 Using Remote Web Workplace Version 1.01 Remote web workplace allows you to access your Windows XP desktop through Small Business Server 2003 from a web browser. 1. Connect to the Internet in your remote

More information

VMware Horizon Mirage Installation Guide

VMware Horizon Mirage Installation Guide VMware Horizon Mirage Installation Guide Horizon Mirage 4.3 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition.

More information

LDAP Implementation AP561x KVM Switches. All content in this presentation is protected 2008 American Power Conversion Corporation

LDAP Implementation AP561x KVM Switches. All content in this presentation is protected 2008 American Power Conversion Corporation LDAP Implementation AP561x KVM Switches All content in this presentation is protected 2008 American Power Conversion Corporation LDAP Implementation Does not require LDAP Schema to be touched! Uses existing

More information

Designing Windows Server 2008 Active Directory Infrastructure and Services Course 6436B; 5 Days, Instructor-led

Designing Windows Server 2008 Active Directory Infrastructure and Services Course 6436B; 5 Days, Instructor-led Designing Windows Server 2008 Active Directory Infrastructure and Services Course 6436B; 5 Days, Instructor-led Course Description During this five-day course, students will learn how to design an Active

More information

Enabling single sign-on for Cognos 8/10 with Active Directory

Enabling single sign-on for Cognos 8/10 with Active Directory Enabling single sign-on for Cognos 8/10 with Active Directory Overview QueryVision Note: Overview This document pulls together information from a number of QueryVision and IBM/Cognos material that are

More information

ANNE ARUNDEL COMMUNITY COLLEGE ARNOLD, MARYLAND COURSE OUTLINE CATALOG DESCRIPTION

ANNE ARUNDEL COMMUNITY COLLEGE ARNOLD, MARYLAND COURSE OUTLINE CATALOG DESCRIPTION ANNE ARUNDEL COMMUNITY COLLEGE ARNOLD, MARYLAND COURSE OUTLINE COURSE: Windows 2003 Server COURSE NO: CSI 265 CREDIT HOURS: 3 hours of lecture weekly DEPARTMENT: CATALOG DESCRIPTION CSI 265 Windows 2003

More information

Configuring Managing and Maintaining Windows Server 2008 Servers (6419B)

Configuring Managing and Maintaining Windows Server 2008 Servers (6419B) Configuring Managing and Maintaining Windows Server 2008 Servers (6419B) Who Should Attend This course is intended for Windows Server administrators who operate Windows Servers on a daily basis and want

More information

NetWrix USB Blocker. Version 3.6 Administrator Guide

NetWrix USB Blocker. Version 3.6 Administrator Guide NetWrix USB Blocker Version 3.6 Administrator Guide Table of Contents 1. Introduction...3 1.1. What is NetWrix USB Blocker?...3 1.2. Product Architecture...3 2. Licensing...4 3. Operation Guide...5 3.1.

More information

http://docs.trendmicro.com

http://docs.trendmicro.com Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the product, please review the readme files,

More information

Enterprise Manager. Version 6.2. Installation Guide

Enterprise Manager. Version 6.2. Installation Guide Enterprise Manager Version 6.2 Installation Guide Enterprise Manager 6.2 Installation Guide Document Number 680-028-014 Revision Date Description A August 2012 Initial release to support version 6.2.1

More information

Installation Guide. . All right reserved. For more information about Specops Deploy and other Specops products, visit www.specopssoft.

Installation Guide. . All right reserved. For more information about Specops Deploy and other Specops products, visit www.specopssoft. . All right reserved. For more information about Specops Deploy and other Specops products, visit www.specopssoft.com Copyright and Trademarks Specops Deploy is a trademark owned by Specops Software. All

More information

Chapter. Managing Group Policy MICROSOFT EXAM OBJECTIVES COVERED IN THIS CHAPTER:

Chapter. Managing Group Policy MICROSOFT EXAM OBJECTIVES COVERED IN THIS CHAPTER: Chapter 10 Managing Group Policy MICROSOFT EXAM OBJECTIVES COVERED IN THIS CHAPTER: Implement and troubleshoot Group Policy. Create a Group Policy object (GPO). Link an existing GPO. Delegate administrative

More information

Administrator Guide. DigitalPersona Pro. for Active Directory. Version 4.0

Administrator Guide. DigitalPersona Pro. for Active Directory. Version 4.0 Administrator Guide DigitalPersona Pro for Active Directory Version 4.0 DigitalPersona, Inc. 2006 DigitalPersona, Inc. All Rights Reserved. All intellectual property rights in the DigitalPersona software,

More information

Archive One Policy V4.2 Quick Start Guide October 2005

Archive One Policy V4.2 Quick Start Guide October 2005 Archive One Policy V4.2 Quick Start Guide October 2005 Archive One Policy Quick Start Guide V4.2 Page 1 of 33 CONTENTS Introduction... 3 Components...3 Before You Start...4 System Requirements...5 Prerequisites...7

More information

Table of Contents. Introduction. Audience. At Course Completion

Table of Contents. Introduction. Audience. At Course Completion Table of Contents Introduction Audience At Course Completion Prerequisites Microsoft Certified Professional Exams Student Materials Course Outline Introduction This three-day instructor-led course provides

More information

Kaseya IT Automation Framework

Kaseya IT Automation Framework Kaseya Kaseya IT Automation Framework An Integrated solution designed for reducing complexity while increasing productivity for IT Professionals and Managed Service Providers. The powerful, web-based automation

More information

BlackBerry Enterprise Service 10. Version: 10.2. Configuration Guide

BlackBerry Enterprise Service 10. Version: 10.2. Configuration Guide BlackBerry Enterprise Service 10 Version: 10.2 Configuration Guide Published: 2015-02-27 SWD-20150227164548686 Contents 1 Introduction...7 About this guide...8 What is BlackBerry Enterprise Service 10?...9

More information

Enterprise Security Management CheckPoint SecuRemote VPN v4.0 for pcanywhere

Enterprise Security Management CheckPoint SecuRemote VPN v4.0 for pcanywhere Enterprise Security Management CheckPoint SecuRemote VPN v4.0 for pcanywhere White Paper 7KH#&KDOOHQJH Virtual Private Networks (VPNs) provides a powerful means of protecting the privacy and integrity

More information

RSA Authentication Manager 7.1 Basic Exercises

RSA Authentication Manager 7.1 Basic Exercises RSA Authentication Manager 7.1 Basic Exercises Contact Information Go to the RSA corporate web site for regional Customer Support telephone and fax numbers: www.rsa.com Trademarks RSA and the RSA logo

More information

NetWrix USB Blocker Version 3.6 Quick Start Guide

NetWrix USB Blocker Version 3.6 Quick Start Guide NetWrix USB Blocker Version 3.6 Quick Start Guide Table of Contents 1. Introduction...3 1.1. What is NetWrix USB Blocker?...3 1.2. Product Architecture...3 2. Licensing...4 3. Getting Started...5 3.1.

More information

Table Of Contents. - Microsoft Windows - WINDOWS XP - IMPLEMENTING & SUPPORTING MICROSOFT WINDOWS XP PROFESSIONAL...10

Table Of Contents. - Microsoft Windows - WINDOWS XP - IMPLEMENTING & SUPPORTING MICROSOFT WINDOWS XP PROFESSIONAL...10 Table Of Contents - - WINDOWS SERVER 2003 MAINTAINING AND MANAGING ENVIRONMENT...1 WINDOWS SERVER 2003 IMPLEMENTING, MANAGING & MAINTAINING...6 WINDOWS XP - IMPLEMENTING & SUPPORTING MICROSOFT WINDOWS

More information

Xerox Multifunction Devices. Verify Device Settings via the Configuration Report

Xerox Multifunction Devices. Verify Device Settings via the Configuration Report Xerox Multifunction Devices Customer Tips March 15, 2007 This document applies to these Xerox products: X WC 4150 X WCP 32/40 X WCP 35/45/55 X WCP 65/75/90 X WCP 165/175 X WCP 232/238 X WCP 245/255 X WCP

More information

4cast Client Specification and Installation

4cast Client Specification and Installation 4cast Client Specification and Installation Version 2015.00 10 November 2014 Innovative Solutions for Education Management www.drakelane.co.uk System requirements The client requires Administrative rights

More information

6419: Configuring, Managing, and Maintaining Server 2008

6419: Configuring, Managing, and Maintaining Server 2008 6419: Configuring, Managing, and Maintaining Server 2008 Course Number: 6419 Category: Technical Duration: 5 days Course Description This five-day instructor-led course combines five days worth of instructor-led

More information

50331D Windows 7, Enterprise Desktop Support Technician (Windows 10 Curriculum)

50331D Windows 7, Enterprise Desktop Support Technician (Windows 10 Curriculum) This course can be purchased by authorized Microsoft Learning Centers at the Courseware Marketplace web-site. Microsoft Certified Trainers (MCTs) can get a free copy at the same website. About the Course

More information

Backup Manager Configuration and Deployment Guide. Version 9.1

Backup Manager Configuration and Deployment Guide. Version 9.1 Backup Manager Configuration and Deployment Guide Version 9.1 Contents Backup Manager 3 Backup Manager Support 9 Backup Manager Configuration and Deployment 14 Defining a Backup Manager Profile 14 Configuring

More information

Prerequisites Guide. Version 4.0, Rev. 1

Prerequisites Guide. Version 4.0, Rev. 1 Version 4.0, Rev. 1 Contents Software and Hardware Prerequisites Guide... 2 anterradatacenter Version selection... 2 Required Software Components... 2 Sage 300 Construction and Real Estate ODBC... 2 Pervasive

More information

1. Server 2008 - Microsoft FEP 2010 - Instalation

1. Server 2008 - Microsoft FEP 2010 - Instalation 1. Server 2008 - Microsoft FEP 2010 - Instalation 1 2. Windows XP x86 (32bit) - Microsoft FEP 2010 Instalation 2 3 2.1. 4 System Requirements Microsoft Forefront Endpoint Protection 2010 1 System Requirements

More information

Single Sign-on 4.8 2015-03-15 04:30:46 UTC. 2015 Citrix Systems, Inc. All rights reserved. Terms of Use Trademarks Privacy Statement

Single Sign-on 4.8 2015-03-15 04:30:46 UTC. 2015 Citrix Systems, Inc. All rights reserved. Terms of Use Trademarks Privacy Statement Single Sign-on 4.8 2015-03-15 04:30:46 UTC 2015 Citrix Systems, Inc. All rights reserved. Terms of Use Trademarks Privacy Statement Contents Single Sign-on 4.8... 10 Single Sign-on Installation and Upgrade...

More information

PaperSave IT Prerequisites for Blackbaud s The Financial Edge

PaperSave IT Prerequisites for Blackbaud s The Financial Edge PaperSave IT Prerequisites for Blackbaud s The Financial Edge 1001 Brickell Bay Drive, 9 th floor Miami FL, 33131 305-373-5500 http://www.satmba.com Table of Contents Introduction to PaperSave...3 PaperSave

More information

safend a w a v e s y s t e m s c o m p a n y

safend a w a v e s y s t e m s c o m p a n y safend a w a v e s y s t e m s c o m p a n y SAFEND Data Protection Suite Installation Guide Version 3.4.5 Important Notice This guide is delivered subject to the following conditions and restrictions:

More information

Admin Report Kit for Active Directory

Admin Report Kit for Active Directory Admin Report Kit for Active Directory Reporting tool for Microsoft Active Directory Enterprise Product Overview Admin Report Kit for Active Directory (ARKAD) is a powerful reporting solution for the Microsoft

More information

DESlock+ Basic Setup Guide ENTERPRISE SERVER ESSENTIAL/STANDARD/PRO

DESlock+ Basic Setup Guide ENTERPRISE SERVER ESSENTIAL/STANDARD/PRO DESlock+ Basic Setup Guide ENTERPRISE SERVER ESSENTIAL/STANDARD/PRO Contents Overview...1 System requirements...1 Enterprise Server:...1 Client PCs:...1 Section 1: Before installing...1 Section 2: Download

More information

MAPILab Reports for Hardware and Software Inventory Installation Guide. Document version 1.0

MAPILab Reports for Hardware and Software Inventory Installation Guide. Document version 1.0 MAPILab Reports for Hardware and Software Inventory Installation Guide Document version 1.0 MAPILab Ltd., January 2010 Table of Contents Introduction... 3 1. Product architecture and general explanations...

More information

6445A - Implementing and Administering Small Business Server 2008

6445A - Implementing and Administering Small Business Server 2008 6445A - Implementing and Administering Small Business Server 2008 Table of Contents Introduction Audience At Clinic Completion Prerequisites Microsoft Certified Professional Exams Student Materials Course

More information

Sage Timberline Enterprise Installation and Maintenance Guide

Sage Timberline Enterprise Installation and Maintenance Guide Sage Timberline Enterprise Installation and Maintenance Guide NOTICE This document and the Sage Timberline Enterprise software may be used only in accordance with the accompanying Sage Timberline Enterprise

More information

Enterprise Solution for Remote Desktop Services... 2. System Administration... 3. Server Management... 4. Server Management (Continued)...

Enterprise Solution for Remote Desktop Services... 2. System Administration... 3. Server Management... 4. Server Management (Continued)... CONTENTS Enterprise Solution for Remote Desktop Services... 2 System Administration... 3 Server Management... 4 Server Management (Continued)... 5 Application Management... 6 Application Management (Continued)...

More information

MCSA Security + Certification Program

MCSA Security + Certification Program MCSA Security + Certification Program 12 credit hours 270 hours to complete certifications Tuition: $4500 Information technology positions are high-demand occupations that support virtually all industries.

More information

NETWRIX ACCOUNT LOCKOUT EXAMINER

NETWRIX ACCOUNT LOCKOUT EXAMINER NETWRIX ACCOUNT LOCKOUT EXAMINER ADMINISTRATOR S GUIDE Product Version: 4.1 July 2014. Legal Notice The information in this publication is furnished for information use only, and does not constitute a

More information

2X SecureRemoteDesktop. Version 1.1

2X SecureRemoteDesktop. Version 1.1 2X SecureRemoteDesktop Version 1.1 Website: www.2x.com Email: info@2x.com Information in this document is subject to change without notice. Companies, names, and data used in examples herein are fictitious

More information

NetWrix Password Manager. Quick Start Guide

NetWrix Password Manager. Quick Start Guide NetWrix Password Manager Quick Start Guide Contents Overview... 3 Setup... 3 Deploying the Core Components... 3 System Requirements... 3 Installation... 4 Windows Server 2008 Notes... 4 Upgrade Path...

More information

Check Point FDE integration with Digipass Key devices

Check Point FDE integration with Digipass Key devices INTEGRATION GUIDE Check Point FDE integration with Digipass Key devices 1 VASCO Data Security Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document

More information

Networking Best Practices Guide. Version 6.5

Networking Best Practices Guide. Version 6.5 Networking Best Practices Guide Version 6.5 Summer 2010 Copyright: 2010, CCH, a Wolters Kluwer business. All rights reserved. Material in this publication may not be reproduced or transmitted in any form

More information

Windows XP Service Pack 2 Windows Firewall Group Policy Setup for Executive Software Products

Windows XP Service Pack 2 Windows Firewall Group Policy Setup for Executive Software Products Windows XP Service Pack 2 Windows Firewall Group Policy Setup for Executive Software Products 1.0 Overview By default, Windows XP Service Pack 2 (SP2) enables Windows Firewall, previously known as Internet

More information

NETWRIX PASSWORD MANAGER

NETWRIX PASSWORD MANAGER NETWRIX PASSWORD MANAGER ADMINISTRATOR S GUIDE Product Version: 6.1 February/2012 Legal Notice The information in this publication is furnished for information use only, and does not constitute a commitment

More information

NTP Software File Auditor for NAS, EMC Edition

NTP Software File Auditor for NAS, EMC Edition NTP Software File Auditor for NAS, EMC Edition Installation Guide June 2012 This guide provides a short introduction to the installation and initial configuration of NTP Software File Auditor for NAS,

More information

Windows 2000 Security Architecture. Peter Brundrett Program Manager Windows 2000 Security Microsoft Corporation

Windows 2000 Security Architecture. Peter Brundrett Program Manager Windows 2000 Security Microsoft Corporation Windows 2000 Security Architecture Peter Brundrett Program Manager Windows 2000 Security Microsoft Corporation Topics Single Sign-on Kerberos v5 integration Active Directory security Delegation of authentication

More information

INSTRUCTION MANUAL AND REFERENCE FOR IT DEPARTMENTS

INSTRUCTION MANUAL AND REFERENCE FOR IT DEPARTMENTS 1 INSTRUCTION MANUAL AND REFERENCE FOR IT DEPARTMENTS CLOCKWORK5 INSTALL GUIDE WITH SQL SERVER SETUP TechnoPro Computer Solutions, Inc. 2 Table of Contents Installation Overview... 3 System Requirements...

More information

SMALL BUSINESS OUTSOURCING

SMALL BUSINESS OUTSOURCING SMALL BUSINESS OUTSOURCING PCs on Lease 24X7 Remote Supports Professional Fees Service Level Agreement SMALL BUSINESS OUTSOURCING (SMO) CONNECTING YOUR BUSINESS TO THE TECHNOLOGY RESOURCES YOU NEED Implement

More information

Microsoft SharePoint 2010 Overview

Microsoft SharePoint 2010 Overview Course Code: M10174 Vendor: Microsoft Course Overview Duration: 5 RRP: 1,980 Configuring and Administering Microsoft SharePoint 2010 Overview This five day course teaches delegates how to install, configure

More information

Installing and Configuring vcenter Multi-Hypervisor Manager

Installing and Configuring vcenter Multi-Hypervisor Manager Installing and Configuring vcenter Multi-Hypervisor Manager vcenter Server 5.1 vcenter Multi-Hypervisor Manager 1.1 This document supports the version of each product listed and supports all subsequent

More information

MICROSOFT WINDOWS SERVER8 ADMINISTRATION

MICROSOFT WINDOWS SERVER8 ADMINISTRATION MICROSOFT WINDOWS SERVER8 ADMINISTRATION ESSENTIALS Tom Carpenter WILEY John Wiley & Sons, Inc. Contents Introduction xix Chapter 1 Windows Server Overview 1 Introducing Servers 1 Understanding Server

More information

AppSense Environment Manager. Enterprise Design Guide

AppSense Environment Manager. Enterprise Design Guide Enterprise Design Guide Contents Introduction... 3 Document Purpose... 3 Basic Architecture... 3 Common Components and Terminology... 4 Best Practices... 5 Scalability Designs... 6 Management Server Scalability...

More information

Getting Started with HC Exchange Module

Getting Started with HC Exchange Module Getting Started with HC Exchange Module HOSTING CONTROLLER WWW.HOSTINGCONROLLER.COM HOSTING CONTROLLER Contents Introduction...1 Minimum System Requirements for Exchange 2013...1 Hardware Requirements...1

More information

PLANNING AND DESIGNING GROUP POLICY, PART 1

PLANNING AND DESIGNING GROUP POLICY, PART 1 84-02-06 DATA SECURITY MANAGEMENT PLANNING AND DESIGNING GROUP POLICY, PART 1 Melissa Yon INSIDE What Is Group Policy?; Software Settings; Windows Settings; Administrative Templates; Requirements for Group

More information

Course: Fundamentals of Microsoft Server 2008 Active Directory

Course: Fundamentals of Microsoft Server 2008 Active Directory Page 1 of 5 Course: Fundamentals of Microsoft Server 2008 Active Directory Course 6424A Duration: 3 (days) Introduction Elements of this syllabus are subject to change. This three-day instructor-led course

More information

Symantec Endpoint Encryption Full Disk

Symantec Endpoint Encryption Full Disk Symantec Endpoint Encryption Full Disk Policy Administrator Guide Version 8.0.1 Copyright 2011 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks

More information

FMCS SINGLE SIGN ON Overview and Installation Guide. November 2014. SSO-MNL-v3.0

FMCS SINGLE SIGN ON Overview and Installation Guide. November 2014. SSO-MNL-v3.0 FMCS SINGLE SIGN ON Overview and Installation Guide November 2014 SSO-MNL-v3.0 CONTENTS Introduction... 3 About Single Sign On... 3 Application Architecture... 4 Implementation Checklist... 5 Component...

More information

Atempo, Inc. LIVE BACKUP DEPLOYMENT GUIDE PLANNING AND DEPLOYING LIVE BACKUP IN YOUR CORPORATE ENTERPRISE. Author: Amy Gracer,

Atempo, Inc. LIVE BACKUP DEPLOYMENT GUIDE PLANNING AND DEPLOYING LIVE BACKUP IN YOUR CORPORATE ENTERPRISE. Author: Amy Gracer, ... Atempo, Inc. LIVE BACKUP DEPLOYMENT GUIDE PLANNING AND DEPLOYING LIVE BACKUP IN YOUR CORPORATE ENTERPRISE Date: May 2011 Author: Amy Gracer, Version: alb.lbdg.333.3 en . Copyright 2006-11 Atempo Inc.

More information