YubiKey with Password Safe
|
|
|
- Reynold Wright
- 10 years ago
- Views:
Transcription
1 Authentication concepts Author: Felicia King Authentication concepts Single-factor authentication Single-factor authentication is inherently flawed. Hackers and criminals install keystroke loggers, screen capture devices, and remote access Trojans as part of their standard operating procedure. Therefore, anything that can be input through normal computer input which is on the compromised endpoint is also compromised. So imagine you are using a password storage application like Password Safe. If you have only your one password required to open the Password Safe, and your endpoint is compromised, then the hacker can download your Password Safe file and open your file. Then they have access to all of your passwords. Therefore, it would be prudent to have a second factor of authentication required to open your Password Safe. Two-factor authentication The best two-factor authentication is one that involves a physical piece of hardware that is not connected to the endpoint (your computer) or is read only. Since the YubiKey is easily removable, you can and should remove the device from your computer when you are not using it. Take it with you or lock it up elsewhere. This prevents the YubiKey being stolen or compromised if your computer is subjected to unauthorized physical access. YubiKeys are accessible and understandable to the average user, especially when combined with PasswordSafe and my common-sense recommendations in this document. YubiKey concepts Size YubiKey comes in a standard size and a nano size. The standard size is like a really tiny USB flash drive, and the nano doesn't hardly stick out of a USB port but a couple of millimeters. Both have a small metal plate that is responsive to human finger touch. It is not a fingerprint reader, but does require human finger. It cannot be activated with a pen, pencil, or similar non-electroconductive items. The nano device might be a good choice for laptops so that very little is sticking out of the USB port. Quality Plus Consulting Page 1
2 Programmability YubiKeys have two digital slots. That means that a single YubiKey could provide you with two unique types of authentication. Slot 1 is generally reserved for integration with YubiCloud-integrated apps like websites. Slot 1 comes pre-programmed from Yubico. Slot 2 is easily programmable by the end user to supply a variety of types of two-factor authentication. The software to install custom programming into slot 2 is freely downloadable from Yubico's site, but is not necessary for using YubiKey with Password Safe. Procurement Purchase YubiKeys directly from Yubico.com. Authentication method Password Safe normally uses a single, long, complex password to open the Password Safe. As a result, it is VERY important to choose an unlock password that is at least 15 characters long and contains significant complexity. Password Safe can be integrated with YubiKey such that both the standard unlock password AND the challenge-response method password from the YubiKey must both be entered in order to unlock the Password Safe. You can see how this would substantially increase the security around the Password Safe contents. Setup 1. If you don't already have Password Safe, download it from Sourceforge Since you are not browsing the internet and doing your normal activities as an administrator account, you will need to log off the computer and log onto it as an administrator level account. 3. Install Password Safe. 4. Savvy individuals will notice that Password Safe desktop icon and Start Menu options install into the user's profile. This is a problem because then it is not accessible to all users. Therefore, you will need to COPY (not move) the desktop icon from C:\Users\YourAdmin to C:\Users\Public\Desktop. Finally, delete the desktop icon in the YourAdmin profile so that you do not have a duplicate on the desktop. The reason you must COPY and not move is because of permissions. 5. Then COPY (not move) the Password Safe folder from C:\Users\YourAdmin\AppData\Roaming\Microsoft\Windows\Start Quality Plus Consulting Page 2
3 Menu\Programs to C:\ProgramData\Microsoft\Windows\StartMenu\Programs. Finally, delete the Password Safe folder in the YourAdmin profile so you do not have a duplicate. 6. Now you can log off and then log back into the computer as your regular user account and begin to use Password Safe. 7. Open Password Safe and create a new Password Safe. During the setup process you will be required to supply two VERY IMPORTANT pieces of information. 8. Specify for the psafe3 file to be stored into a location where those data files are backed up on a daily basis. Perhaps that is the Documents folder in your profile. 9. Specify a very complex unlock password that is at least 15 characters long. Make sure your Password Safe file is backed up to external media daily! General configuration recommendations Now that your Password Safe file is created, I suggest the following configuration settings be used. Quality Plus Consulting Page 3
4 In Manage, Password Policies, specify an appropriate password policy such as minimum of 12 chars with 2 of each type of complexity. Manage, Options. Display Manage, Options, Security: Specify an idle time you want. How many YubiKeys do I need to configure? This is probably the most important part of this document. Realize that if you lose your YubiKey, and you have no backup copy of it, you will never get into your Password Safe again. Therefore, I highly recommend you have at least three YubiKeys that are programmed to open your Password Safe. I suggest three because you likely need to use your Password Safe on your PC and laptop, and then you need one to be protected against loss due to fire. One for your main PC One for your laptop One for storage inside a fire safe Quality Plus Consulting Page 4
5 Configure Now that your Password Safe file is created and the master unlock password has been set, you can enable YubiKey as the challenge-response password second factor of authentication for your safe. NOTE: If you are working with a pre-existing Password Safe database that has content, I HIGHLY recommend you make a backup copy of the database before you attempt these changes. In that way, if anything goes wrong, you can roll back to using the unmodified psafe3 file. This procedure is provided to you for informational purposes. This procedure assumes that you have the skill to back up and restore your own files. 1. Insert YubiKey #1 into a USB port on your computer and wait for the driver to load. When the driver has finished loading, you will see the message that says that the device has installed. No special software is required. 2. In Password Safe, click on Manage, YubiKey. 3. In the YubiKey Configuration window, you will see the serial number for your YubiKey displayed. The Secret Key window should be blank. Click the Generate button. 4. As an added safeguard, you can optionally choose to copy the secret key into a notepad file and then print it. Note that I am not suggesting that you store the file on your computer. Perhaps it would be a better choice to store the printout of the Secret Key with YubiKey 3 in the fire safe. 5. Now that you have a Secret Key, click the button to program digital slot 2 in your YubiKey #1. Press the Set YubiKey button. 6. At this point, the Password Safe database psafe3 file is not yet configured to work with YubiKey. You must go through a password change process on the psafe3 file in order to fully integrate it. 7. In Password Safe, click on Manage, Change Safe Combination. 8. You must enter the existing unlock password, then enter the same password in the new combination boxes as well. Note that we are not really changing the password here, but really telling Password Safe to use YubiKey. After you have your unlock password entered into all three input boxes, click on the green Yubikey button on the screen. You will notice a countdown bar in the fourth box. Before the progress bar finishes, press the button on the Quality Plus Consulting Page 5
6 physical YubiKey. The Change Safe Combo screen should close. 9. After this is complete, close the Password Safe and reopen it with both the unlock password and the challenge-response from the YubiKey. IMPORTANT!!! It is critical that you test to make sure you have actually enabled YubiKey on your Password Safe by attempting to unlock it only with the unlock password. If the PSafe is correctly configured with YubiKey, it will not unlock the safe without the challenge-response. 10. You should have to click the YubiKey button on the screen and then touch the metal contact on the YubiKey with your finger in order to fully unlock the PSafe. Note that when you press the YubiKey button on the Safe Combination screen, that is the challenge. When you press the metal contact on the YubiKey, that is the response. That's why it's called challenge-response. 11. If you have successfully configured your Password Safe, remove YubiKey #1, then insert YubiKey #2 into the USB port. 12. Go back into Manage, YubiKey, but this time DO NOT click Generate. Instead, just click Set YubiKey to program YubiKey # Repeat steps 7 and 8 for YubiKey #3. Quality Plus Consulting Page 6
7 Limitations 14. Finally, I suggest you label your YubiKeys, test all three of them, and then put them where they belong. That means at least one of them goes into a fire safe with your paper printout that shows the Secret Key. Limitations Remote Desktop YubiKey cannot function in the challenge-response mechanism over Remote Desktop. Network and multi-user YubiKey works great in a multi-user environment that is connected via a LAN as long as all individuals with a YubiKey have the same slot 2 configuration to open the same Password Safe. This is often done in departments of individuals that have to share passwords because it is inappropriate to just put all the departmental passwords into some Word document that everyone can freely read, including unauthorized parties. Quality Plus Consulting Page 7
September 25, 2015. Programming YubiKeys for Okta Adaptive Multi-Factor Authentication
Programming YubiKeys for Okta Adaptive Multi-Factor Authentication September 25, 2015 Programming YubiKeys for Okta Adaptive Multi-Factor Authentication Page 1 of 14 Copyright 2015 Yubico Inc. All rights
VIP YubiKey Unlock Guide
VIP YubiKey Unlock Guide Unlocking the VIP YubiKey for YubiCloud OTP February 22, 2013 VIP YubiKey Unlock Guide 2012 Yubico. All rights reserved. Page 1 of 9 Introduction Yubico is the leading provider
YubiKey OSX Login. yubico. Via Yubico-PAM Challenge-Response. Version 1.6. October 24, 2015
YubiKey OSX Login Via Yubico-PAM Challenge-Response Version 1.6 October 24, 2015 YubiKey OSX Login 2015 Yubico. All rights reserved. Page 1 of 18 About Yubico Disclaimer As the inventors of the YubiKey,
Vess A2000 Series. NVR Storage Appliance. Windows Recovery Instructions. Version 1.0. 2014 PROMISE Technology, Inc. All Rights Reserved.
Vess A2000 Series NVR Storage Appliance Windows Recovery Instructions Version 1.0 2014 PROMISE Technology, Inc. All Rights Reserved. Contents Introduction 1 Different ways to backup the system disk 2 Before
Replacing a MealTime Point of Sale Computer
Meal service solutions that work! Replacing a MealTime Point of Sale Computer Overview Use these instructions only when you are replacing the MealTime Point of Sale computer that hosts the MealTime database
16.4.3 Lab: Data Backup and Recovery in Windows XP
16.4.3 Lab: Data Backup and Recovery in Windows XP Introduction Print and complete this lab. In this lab, you will back up data. You will also perform a recovery of the data. Recommended Equipment The
The following items are trademarks or registered trademarks of Kaba Mas in the United States and/or other countries. GITCON
The Gitcon Access Management Software Installation Guide is a publication of Kaba Mas LLC (hereinafter Kaba Mas). No part of this book may be reproduced or transmitted in any form or by any means, electronic
Configuring a YubiKey for the YubiCloud
Configuring a YubiKey for the YubiCloud With the YubiKey Cross-Platform Personalization Tool April 9, 2013 Configuring a YubiKey for the YubiCloud 2012 Yubico. All rights reserved. Page 1 of 8 Introduction
Interfacing PC ChargePayment Server with Focus
Interfacing PC ChargePayment Server with Focus When you have decided to use the PC Charge Payment Server software with Focus, this feature will allow you to process credit cards through your credit card
10.3.1.6 Lab - Data Backup and Recovery in Windows XP
5.0 10.3.1.6 Lab - Data Backup and Recovery in Windows XP Introduction Print and complete this lab. In this lab, you will back up data. You will also perform a recovery of the data. Recommended Equipment
How to enable Disk Encryption on a laptop
How to enable Disk Encryption on a laptop Skills and pre-requisites Intermediate IT skills required. You need to: have access to, and know how to change settings in the BIOS be confident that your data
The FlexiSchools Online Order Management System Installation Guide
The FlexiSchools Online Order Management System Installation Guide FlexiSchools May 2012 Page 1 of 16 Installation Pack Welcome to the FlexiSchools system. You will have received a disc containing: Sato
The FlexiSchools Online Order Management System Installation Guide
The FlexiSchools Online Order Management System Installation Guide Installation Pack Welcome to the FlexiSchools system. You will have received a disc containing: Zebra Drivers FlexiSchools Online Order
How To Set Up Dataprotect
How To Set Up Dataprotect This document will show you how to install and configure your computer for a Typical installation. If you have questions about configuring a Custom installation please contact
The FlexiSchools Online Order Management System Installation Guide
The FlexiSchools Online Order Management System Installation Guide FlexiSchools May 2012 Page 1 of 18 Installation Pack Welcome to the FlexiSchools system. You will have received a disc containing: Sato
GoldKey Software. User s Manual. Revision 7.12. WideBand Corporation www.goldkey.com. Copyright 2007-2014 WideBand Corporation. All Rights Reserved.
GoldKey Software User s Manual Revision 7.12 WideBand Corporation www.goldkey.com 1 Table of Contents GoldKey Installation and Quick Start... 5 Initial Personalization... 5 Creating a Primary Secure Drive...
YubiKey & OATH- TOTP Verification
YubiKey & OATH- TOTP Verification February 7, 2014 YubiKey & OATH-TOTP Verification 2014 Yubico. All rights reserved. Page 1 of 11 Introduction Disclaimer Yubico is the leading provider of simple, open
HP-1000 Powerline USB Adapter
HP-1000 Powerline USB Adapter User s manual BEFORE INSTALLATION Plan ahead the installation of your powerline network. Note: You will need at least two powerline adapters to create a powerline network.
HOW TO TRANSFER FILES BETWEEN EEN IDL7000 PVR AND USB2 DEVICE
HOW TO TRANSFER FILES BETWEEN EEN IDL7000 PVR AND USB2 DEVICE CONTENTS CONTENTS...2 FOREWORD...3 TRANSFERRING FILES BETWEEN IDL7000M PVR AND USB2 DEVICE...4 CONNECTING AN EXTERNAL USB2 DEVICE...4 COPYING
BitLocker To Go User Guide
BitLocker To Go User Guide 1. Introduction BitLocker To Go a new feature of Windows 7 is a full-disk encryption protection technology for removable storage devices that are connected to one of the USB
HP-1000 Powerline Ethernet Adapter
HP-1000 Powerline Ethernet Adapter User s manual BEFORE INSTALLATION Plan ahead the installation of your powerline network. Note: You will need at least two powerline adapters to create a powerline network.
Encrypt USB Drive to Protect Data
Encrypt USB Drive to Protect Data Enable BitLocker on USB Flash Drives to Protect Data Encryption is an effective method of protecting data stored on portable devices such as USB flash drives and external
How to setup Backup Anywhere on your local PC
This document provides the basic step-by-step process on how to setup Backup Anywhere on your local PC. Please note: This software will not back up your data if your computer is switched off, in hibernation
1. Open the License Manager either via the Start Menu or from C:\Keri\DoorsNET directory.
Doors.NET v3.5.1.21 includes a new automatic backup feature that allows you to quickly and easily schedule a full system backup. By default, this backup is performed every week on Friday at 23:00 hours
Congratulations on your purchase of a BPM Microsystems device programmer. Your new device programmer was designe d to provid e years of suppor t for
Congratulations on your purchase of a BPM Microsystems device programmer. Your new device programmer was designe d to provid e years of suppor t for thousand s of devices, with the use of optional socket
USING USB FLASH DISK WITH TCMS V2
1 USING USB FLASH DISK WITH TCMS V2 SUGGESTIONS & SOLUTIONS FOR TCMS V2 2 ADD REMOTE FINGERTEC TERMINAL(S) USING USB FLASH DISK FingerTec AC100 Plus and AC800 Plus both come with USB port. User may utilise
3. USB DRIVER. 3-1. Installation of USB driver. 3-1-1. Driver for Infinity SD Data Logger. INFINITY Series Acquisition Tools Manual
3. USB DRIVER 3-1. Installation of USB driver Before you launch this software, the driver should be once surely registered. Access between the instrument and a PC through the USB cable supplied by us as
NetMotion + YubiRADIUS Quick Start Guide
NetMotion + YubiRADIUS Quick Start Guide March 22, 2013 NetMotion + YubiRADIUS Quick Start Guide 2012 Yubico. All rights reserved. Page 1 of 7 Introduction Disclaimer Yubico is the leading provider of
Law School Computing Services User Memo
Law School Computing Services User Memo Accessing and Using Shared No. 37 7/28/2015 Email Accounts in Outlook Overview: Many Law School departments and organizations use shared email accounts. Shared email
www.nuvox.net, enter the administrator user name and password for that domain.
Page 1 of 7 Cute_FTP Server Names and Authentication Before connecting to an FTP site you need three pieces of information: the server name or the site you are connecting to and a user name and password.
Remote Viewer Recording Backup
Remote Viewer Recording Backup Introduction: In this tutorial we will explain how to retrieve your recordings using the Web Service online. Using this method you can backup videos onto your computer using
BitLocker to Go: Encryption for personal USB flash drives (Windows 7 and 8)
BitLocker to Go: Encryption for personal USB flash drives (Windows 7 and 8) Encryption is an effective method of protecting data stored on portable devices such as USB flash drives and external hard drives.
Simple Computer Backup
Title: Simple Computer Backup (Win 7 and 8) Author: Nancy DeMarte Date Created: 11/10/13 Date(s) Revised: 1/20/15 Simple Computer Backup This tutorial includes these methods of backing up your PC files:
Option nv, Gaston Geenslaan 14, B-3001 Leuven Tel +32 16 317 411 Fax +32 16 207 164 http://www.option.com Page 1 of 14
Page 1 of 14 ! " #!"#$ % &&' Page 2 of 14 1 INTRODUCTION One of the highly desirable features of the GlobeSurfer III device is the ability to network together Printers and External Hard Disk drives (aka
www.rohos.com Two-factor authentication Free portable encryption for USB drive Hardware disk encryption Face recognition logon
Two-factor authentication Free portable encryption for USB drive Hardware disk encryption Face recognition logon Secure Windows and Mac login by USB key www.rohos.com Rohos Logon Key Secure two-factor
SOFTWARE INSTALLATION INSTRUCTIONS
AUDITGARD LGA Electronic Combination Lock SOFTWARE INSTALLATION INSTRUCTIONS Implementation Package The AuditGard Software implementation package includes: 707013 AuditGard Software Install CD 42145 Programming/Audit
BUS-WATCH R1001/R4001 Quick Guide Series
Part 1: Video File Source Connection To Review stored video, you must first connect a PC to a video file source. There are 2 ways to connect to the stored video files: Through the Removable Hard Drive
Config software for D2 systems USER S MANUAL
DT-CONFIG SOFTWARE Config software for D2 systems USER S MANUAL CONTENTS 1. Introductions ------------------------------------------------------------------- 3 2. System Requirement and Connection ----------------------------------------
CODESOFT Installation Scenarios
CODESOFT Installation Scenarios NOTES: CODESOFT is a separate install from existing versions of CODESOFT. You will need to make note of your current settings (default directories, etc.) so you can duplicate
A. I do not have my own personal certificate I am a new client or want to download a new certificate
This user guide will help you to create your personal certificate in file/browser or smart card certificate. If you already own a personal certificate in file that you have saved on your computer, you
System Firmware Update Instructions for AVH-4000NEX
System Firmware Update Instructions for AVH-4000NEX IMPORTANT Please download and print these firmware update instructions before downloading and installing the firmware update. It is important that you
Using the enclosed installation diagram, drill three holes in the wall with the lower hole 1150mm from the floor.
Terminal Installation When choosing the location of the terminal, care should be taken to select an area with consistent light levels throughout the day and avoid areas where the unit may be subjected
Allworx Installation Course
VPN Hello and welcome. In the VPN section we will cover the steps for enabling the VPN feature on the Allworx server and how to set up a VPN connection to the Allworx System from your PC. Page 1 VPN The
ScoMIS Encryption Service
Introduction This guide explains how to install the ScoMIS Encryption Service Software onto a laptop computer. There are three stages to the installation which should be completed in order. The installation
FrontDesk Installation And Configuration
Chapter 2 FrontDesk Installation And Configuration FrontDesk v4.1.25 FrontDesk Software Install Online Software Activation Installing State Related Databases Setting up a Workstation Internet Transfer
Imation Clip USB 2.0 Flash Drive. Imation Drive Manager Software. User s Manual
Imation Clip USB 2.0 Flash Drive Imation Drive Manager Software User s Manual Contents Introduction... 3 Features... 3 System Requirements... 4 Handling and Operating Recommendations... 4 Driver Installation...
Getting Started User s Guide
Getting Started This short guide can help you to quickly start using Acronis True Image Home 2011. It describes just a few of the key features of Acronis True Image Home 2011. For detailed program information,
2. PMP New Computer Installation. & Networking Instructions
ONTARIO CHIROPRACTIC ASSOCIATION PATIENT MANAGEMENT PROGRAM PUTTING EXPERIENCE INTO PRACTICE PMP New Computer Installation & Networking Instructions This document provides installation instructions for
Print Server Application Guide
Print Server Application Guide TD W8968 TD W8970 / TD W8970B TD W8980 / TD W8980B Rev: 1.0.0 1910010772 Contents Overview...1 Installation for Windows OS...2 Application for Windows OS...7 How to launch/exit
COMBOGARDPRO. 39E Electronic Combination Lock SOFTWARE INSTALLATION INSTRUCTIONS
COMBOGARDPRO 39E Electronic Combination Lock SOFTWARE INSTALLATION INSTRUCTIONS IMPLEMENTATION PACKAGE The ComboGard Pro Software implementation package includes: 707012 ComboGard Pro Software Install
Magaya Software Installation Guide
Magaya Software Installation Guide MAGAYA SOFTWARE INSTALLATION GUIDE INTRODUCTION Introduction This installation guide explains the system requirements for installing any Magaya software, the steps to
Exchange 2003 Mailboxes
Exchange 2003 Mailboxes Microsoft will stop supporting Exchange 2003 mailboxes in 2014 as it comes to the end of it s life. To maintain our levels of support and performance of all our customers, we will
PC Angel. Recovery. Page 1
PC Angel Recovery Page 1 Table of Contents Introduction... 3 What is the purpose of PC Angel Recovery?... 3 What can you find in this manual?... 4 What should I do to get back my system?... 5 What should
How To Connect A300 To A300 Time Clock On A Pc Or Mac Computer
1 TABLE OF CONTENTS INTRODUCTION CHAPTER 1 ESTABLISHING A CONNECTION TO TIME CLOCK 1.1 INSTALLATION OF SOFTWARE 1.2 CONNECT TIME CLOCK TO PC 2 1.2.A..VIA USB CABLE CONNECTION 2-5 1.2.B... VIA TCP/IP NETWORK
INF-USB2 and SI-USB Quick Start Guide
INF-USB2 and SI-USB Quick Start Guide Please follow these instructions carefully. DO NOT connect the INF-USB2 or SI-USB module to your computer before running the setup program. After running Setup and
MCBDirect Corporate Logging on using a Soft Token
MCBDirect Corporate Logging on using a Soft Token Document issue: 2.1 Date of issue: September 2014 Contents About Soft Token authentication... 3 Logging onto MCBDirect Corporate online banking... 4 Soft
Password Protection Application for Verbatim USB Flash Drives
Introduction User Manual Verbatim EasyLock Password Protection Application for Verbatim USB Flash Drives Version 1.00 Copyright 2010 Verbatim Americas, LLC. All rights reserved. All other brands and product
WHAT IS VIRTUAL DESKTOP? WHAT YOU NEED LOG IN TO VIRTUAL DESKTOP SET UP CITRIX RECEIVER REMOTE ACCESS GUIDE
WHAT IS VIRTUAL DESKTOP? Virtual Desktop is an online environment that allows you to access NSF applications and a virtual desktop that mimics a Windows 7 environment. You can use Virtual Desktop to use
Samsung Drive Manager FAQ
Samsung Drive Manager FAQ Installation Q: My Samsung External Hard Drive is connected but nothing is happening. A: Check the USB cable connection. If your Samsung External Hard Drive is connected properly,
A. INSTALLATION. 4. START BOS 4.1 Start BOS (yellow icon on the Desktop) and open the "Demo" event.
Bridgesorter quick start guide A. INSTALLATION. INSTALL THE BOS PACKAGE Make sure that you select BridgeSorter and nothing else as your hardware, c.f. BOS Help for detailed advice. 2. CONNECT THE USB CABLE
Comodo Disk Encryption
Comodo Disk Encryption Version 2.0 User Guide Version 2.0.122010 Versi Comodo Security Solutions 525 Washington Blvd. Jersey City, NJ 07310 Table of Contents 1.Comodo Disk Encryption Introduction... 3
USB Flash Security Free Edition Quick Start
Quick Start [For USB Flash Security Free Edition] 1 / 18 USB Flash Security Free Edition Quick Start Before use USB Flash Security 1. Free edition can only be installed on the USB Flash Drive up to 4GB
Anchor End-User Guide
Table of Contents How to Access Your Account How to Upload Files How to Download the Desktop Sync Folder Sync Folder How to Share a File 3 rd Party Share from Web UI 3 rd Party Share from Sync Folder Team-Share
Guide to Installing BBL Crystal MIND on Windows 7
Guide to Installing BBL Crystal MIND on Windows 7 Introduction The BBL Crystal MIND software can not be directly installed on the Microsoft Windows 7 platform, however it can be installed and run via XP
MacScan. MacScan User Guide. Detect, Isolate and Remove Spyware
MacScan MacScan User Guide Detect, Isolate and Remove Spyware Part 1 1.1 Introduction MacScan is a spyware detection utility for Macintosh OS X that finds and removes spyware and other Internet files
To successfully initialize Microsoft Outlook (Outlook) the first time, email settings need to be verified.
TO: UAN CLIENTS FROM: UAN STAFF DATE: OCTOBER 8, 2008 SUBJECT: Steps for Initial Setup of Microsoft Outlook To successfully initialize Microsoft Outlook (Outlook) the first time, email settings need to
Xopero Backup Build your private cloud backup environment. Getting started
Xopero Backup Build your private cloud backup environment Getting started 07.05.2015 List of contents Introduction... 2 Get Management Center... 2 Setup Xopero to work... 3 Change the admin password...
Table of Contents. Rebit 5 Help
Rebit 5 Help i Rebit 5 Help Table of Contents Getting Started... 1 Making the First Recovery Point... 1 Don't Forget to Create a Recovery Media... 1 Changing Backup Settings... 1 What Does Rebit 5 Do?...
Migrating helpdesk to a new server
Migrating helpdesk to a new server Table of Contents 1. Helpdesk Migration... 2 Configure Virtual Web on IIS 6 Windows 2003 Server:... 2 Role Services required on IIS 7 Windows 2008 / 2012 Server:... 2
MSD IT High Compliance system Fact sheet
MSD IT High Compliance system Fact sheet The MSD IT High Compliance system is a service for Clinical Trials Units (CTUs) and Medical Division Departments or Units who need to securely access critical applications,
Print Server Application Guide. This guide applies to the following models.
Print Server Application Guide This guide applies to the following models. TL-WR842ND TL-WR1042ND TL-WR1043ND TL-WR2543ND TL-WDR4300 CONTENTS Chapter 1. Overview... 1 Chapter 2. Before Installation...
Installing LearningBay Enterprise Part 2
Installing LearningBay Enterprise Part 2 Support Document Copyright 2012 Axiom. All Rights Reserved. Page 1 Please note that this document is one of three that details the process for installing LearningBay
Steps for using MagicConnect
Getting Started Getting Started MagicConnect is a remote access service that allows you safe remote access to a target device from your remote device. What is a remote device? It is a Windows device, iphone/ipad,
Compuprint 4247 Serial Matrix Printers
Compuprint 4247 Serial Matrix Printers Remote Printer Management Utility for Serial Matrix Printers MAN10300-00.00 First edition (October 2011) This edition applies to the Compuprint 4247 printers and
16.4.3 Optional Lab: Data Backup and Recovery in Windows Vista
16.4.3 Optional Lab: Data Backup and Recovery in Windows Vista Introduction Print and complete this lab. In this lab, you will back up data. You will also perform a recovery of the data. Recommended Equipment
Using GIGABYTE Notebook for the First Time
P34 V6.0 Congratulations on your purchase of the GIGABYTE Notebook. This manual will help you to get started with setting up your notebook. The final product configuration depends on the model at the point
BounceBack User Guide
Table Of Contents 1. Table of Contents... 2 2. 1-0 Introduction... 3 2.1 1-0: Introduction... 4 2.2 1-1: BounceBack Software Overview... 6 3. 2-0 Navigating the BounceBack Control Center... 9 3.1 2-0:
Password Depot for Android
Password Depot for Android Table Of Contents Table Of Contents... 2 User interface... 3 Action Bar... 3 Overflow Menu... 4 Entry menu... 5 Context Bar... 6 Settings... 7 Creating a password file... 8 Opening
HP RDX Continuous Data Protection Software Quickstart Guide
HP RDX Continuous Data Protection Software Quickstart Guide *5697-3351* HP Part Number: 5697-3351 Published: May 2014 Edition: Fourth Copyright 2008 2014 Hewlett-Packard Development Company, L.P. Microsoft,
ZKTime5.0 Attendance Management Software User Manual
ZKTime5.0 Attendance Management Software User Manual Version: 1.4 Date: April. 2013 Software version: Build 149 About this Manual: This manual provides ZKTime5.0 software operation instruction, for example
Apple Mac VPN Service Setting up Remote Desktop
Apple Mac VPN Service Setting up Remote Desktop After you have successfully connected via the VPN client to the University network you will then need to make the connection to your machine. To do this
TPG MOBILE BROADBAND QUICK SETUP GUIDE
TPG MOBILE BROADBAND QUICK SETUP GUIDE TPG USB E1762 Modem Thank you for choosing TPG Mobile Broadband and USB E1762 modem. This User Guide provides step by step instructions that will take you through
HP MediaSmart Server Software Upgrade from v.2 to v.3
HP MediaSmart Server Software Upgrade from v.2 to v.3 Table of Contents Table of Contents Upgrade Your Server Software to HP MediaSmart Server v.3 2 Before You Begin 3 What's New 3 Features That Will
USB Driver Installation for Windows XP
USB Driver Installation for Windows XP USB Serial Converter Driver Installation for Windows XP CAUTION: You must use the drivers on the CD-ROM supplied with your USB Device. DO NOT download drivers from
Computer Backup Issues For Windows 8
Computer Backup Issues For Windows 8 Backup Basic information backup Copy your personal information from the hard drive to another media / location CD (700 MB) DVD (4.7 GB) Flash drive (16 GB ± $10) External
EasyLock. User Manual. Intuitive Encryption Application for portable Storage Devices
1 EasyLock User Manual Intuitive Encryption Application for portable Storage Devices User Manual Version 1.0.0.8 2004-2010 CoSoSys Ltd. 2 Table of Contents Table of Contents... 2 1. Introduction... 3 2.
Network DK2 DESkey Installation Guide
VenturiOne Getting Started Network DK2 DESkey Installation Guide PD-056-306 DESkey Network Server Manual Applied Cytometry CONTENTS 1 DK2 Network Server Overview... 2 2 DK2 Network Server Installation...
SecureLock. User Manual
SecureLock User Manual Encryption Application for portable Storage Devices User Manual Version 1.0.0.3 2004-2011 Integral Memory plc Table of Contents Table of Contents... 2 1. Introduction... 3 2. System
1 Warrior Software Installation
1 Warrior Software Installation 1.1 Distribution Media The Warrior Data Acquisition Software version 8.0 (XXXXXX) or latest is distributed on one DVD. A USB drive is installed in the panel that contains
HP ProtectTools User Guide
HP ProtectTools User Guide Copyright 2007 Hewlett-Packard Development Company, L.P. Microsoft and Windows are U.S. registered trademarks of Microsoft Corporation. Intel is a trademark or registered trademark
VisionMate Flat Bed Scanner 2D Tube Barcode Reader
VisionMate Flat Bed Scanner 2D Tube Barcode Reader User s Manual Page 1 Catalog #3111 MAN-21256 Rev G Contact Information North America: Tel: 800.345.0206 email: [email protected] Europe: Tel:
TrustKey Tool User Manual
TrustKey Tool User Manual 1 Table of Contents 1 Introduction... 5 2 TrustKey Product...6 2.1 TrustKey Tool... 6 2.2 TrustKey function modules...7 2.3 TrustKey using environment...7 3 TrustKey Tool Installation...
File Management and File Storage
File Management and File Storage http://training.usask.ca Information Technology Services Division Table of Contents File Management at the University of Saskatchewan...3 Introduction...3 Creating Files
How to use SURA in three simple steps:
How to use SURA in three simple steps: Most of SURA s functionality can be accessed through these three steps. 1) Download SURA to your computer Go to the SU Downloads page to obtain the SURA utility.
RSA SecurID TOKEN User Guide for Initial Setup and Use Secure Access to Andes Petroleum E-mail from Internet
GLOSSARY RSA SecurID TOKEN User Guide for Initial Setup and Use Secure Access to Andes Petroleum E-mail from Internet This guide applies, if you ve assigned a RSA SecureID TOKEN. For more information or
How can I protect against the loss of my ID if my device is lost or stolen?
How can I protect against the loss of my if my device is lost or stolen? If your mobile device is stolen or lost, you can reactivate your user on a new device and deactivate it on your stolen or lost device.
