Motion Computing Tablet PC
|
|
- Irene Carson
- 8 years ago
- Views:
Transcription
1 Motion Computing Tablet PC TRUSTED PLATFORM MODULE (TPM) ACTIVATION User Guide
2 Trusted Platform Module Activation With the Infineon Security Platform Tools and the built-in Trusted Computing Group compliant Trusted Platform Module (TPM), you can create and manage digital certificates for user and platform authentication. These features are most commonly used by enterprises and require system administrator action before the individual Tablet PC user can access the security features. For individual users, the TPM can be used as an authentication device within Motion OmniPass. This is useful if you want to lock a document to the Tablet PC. Routine archival and backup procedures within an enterprise is a highly recommended practice. This is essential when using the advanced security features provided by Motion TM OmniPass TM and the TPM. Using an effective backup procedure is the only way to recover your data if the TPM fails, is cleared, or you experience a failure of the motherboard. You should perform off-system archival and backup procedures on a routine basis in your organization. Off-system archival and backup procedures require that the backup be made to a device or media other than the Tablet PC that you are using. Remember, there is no possibility of recovering any TPM-protected data if a recovery archive has not been created. For more information, see the OmniPass Help and the Infineon Help. To access the OmniPass Help: 1. Open the Motion Dashboard. 2. Tap Motion OmniPass. 3. In the Action section, tap Help. To access the Infineon Help: 1. Open the Motion Dashboard. 2. Tap Infineon TPM. 3. Tap Getting Started Guide. 4. In the left panel, double-tap Welcome to the Infineon Security Platform. 5. In the left panel, double-tap Getting Started Guide. 6. In the left panel, double-tap the book icon to expand the main topic and access sub-topics. 2 Trusted Platform Module (TPM) Activation
3 **Print these instructions before beginning the set up** SET UP AND CONFIGURE THE TPM 1. Go to C:\WINDOWS\Motion\Infineon_TPM. 2. Run setup.exe. 3. When the Tablet PC reboots, stop at the BIOS screen. a. While the Tablet PC is booting, a white screen (BIOS screen) with the Motion and Intel logos appears. b. As soon as the BIOS screen appears, press the Rotate button to interrupt the boot process and enter the BIOS. 3. Use the arrow keys on a keyboard or the buttons on the front of the Tablet PC to go to the Security tab. 4. Make sure the TPM is Enabled. Tap Disabled to select it, then tap Disabled again to Enable the TPM. NOTE: To prevent unauthorized users from accidentally tampering with the TPM and destroying sensitive data, set a supervisor password in the BIOS. 5. At the bottom of the screen (shown in the figure below), tap F10 to Save and Exit the BIOS. Trusted Platform Module (TPM) Activation 3
4 INITIALIZE THE TPM If your TPM has not been initialized for your Tablet PC, perform the following procedure. Perform this procedure only once to initialize the TPM for your Tablet PC. To initialize the TPM for your Tablet PC, you must be logged on to the computer as an administrator. 1. Open the Infineon Security Platform Settings tool by opening the Motion Dashboard. To open the Motion Dashboard, press the Motion Dashboard button on the Tablet PC or go to the menu Start > All Programs > Motion Resources > Motion Dashboard. 2. In the Motion Dashboard, tap Infineon TPM. 3. Tap the User Settings tab. A dialog box opens showing Security Platform is not initialized. Do you want to start the Infineon Security platform Initialization Wizard? 4. Tap Yes. The Infineon Security Platform Initialization Wizard opens. 5. Tap Next to start the wizard. 6. Enter the owner password. The owner password is similar to the administrator password for a computer. However, unlike a computer, the TPM can have only one owner. NOTE: For improved security, the owner password and the administrator password should not be the same. 7. Tap Next. 8. Decide whether to create a new recovery archive, and then tap Next. NOTE: Motion strongly recommends that you create a new recovery archive. After creating your recovery archive, store it in a location other than on the same computer. 9. If you have chosen to create a new recovery archive, the next screen prompts you for a password. Enter a password and tap Next. 10. Browse to select the location for the recovery token, and then tap Next. 11. Confirm the actions that the wizard is about to perform and tap Next. 12. Before you finish using the Infineon Security platform Initialization Wizard, you have the option to select Start Security Platform User Initialization Wizard. If you intend to use the TPM for this account, put a check in the box and tap Finish. 4 Trusted Platform Module (TPM) Activation
5 SET UP THE USER To use the TPM on a Tablet PC, you must be designated as a user. If you are not designated as a user, you can manually add yourself using the Infineon Security Platform User Initialization Wizard. 1. Open the Infineon Security Platform Settings tool by opening the Motion Dashboard. To open the Motion Dashboard, press the Motion Dashboard button on the Tablet PC or go to the menu Start > All Programs > Motion Resources > Motion Dashboard. 2. In the Motion Dashboard, tap Infineon TPM. 3. Tap the User Settings tab. A dialog box opens showing Security Platform is not initialized for the current user. Do you want to start the Infineon Security Platform Initialization Wizard? 4. Tap Yes. The Security Platform User Initialization Wizard opens. 5. Tap Next to start the wizard. The next screen prompts you for a basic user key password that you create. 6. Enter a password and tap Next. 7. Confirm the actions that the wizard is about to take and tap Next. 8. Select the TPM features you want to enable and tap Next. The selections include: Secure - Check this selection to use digital certificates to secure . File and folder encryption (EFS) - TPM-protected encryption keys. Check this selection to use TPM within Windows EFS encryption. Personal secure drive - Check this selection to create an encrypted partition on your hard drive, which can be viewed and accessed only by you. To learn more about these features, go to Start > All Programs > Infineon Security Platform Tools > Getting Started Guide. Depending on the features you want to enable, the wizard guides you through the set-up of those features. Once you complete the wizard, you are required to restart the computer. Trusted Platform Module (TPM) Activation 5
6 Enrolling the TPM in OmniPass NOTE: Use the following procedure only if you are not already enrolled in OmniPass. If you are enrolled in OmniPass and want to enroll the TPM in OmniPass, you must make settings changes in the Motion Dashboard: In the Motion Dashboard, select Motion OmniPass > Manage OmniPass Users and Settings > Change User Setting > Enroll Authentication Devices. To use the TPM as an authentication device, you must enroll the device in OmniPass. 1. Open Motion OmniPass by opening the Motion Dashboard. To open the Motion Dashboard, press the Motion Dashboard button on the Tablet PC or go to the menu Start > All Programs > Motion Resources > Motion Dashboard. 2. In the Motion Dashboard, tap Motion OmniPass. Or, select the menu Start > All Programs > Motion OmniPass > Omnipass Control Center. 3. To enroll a device, go to Manage OmniPass Users and Settings > Add a new user to OmniPass. Enter your windows logon information. If you are not set up on a domain, Domain should be the computer name. 4. Tap Next. 5. Tap the TPM icon, and then tap Next. 6. Select Use the digital certificate that OmniPass has automatically created for me. Or, select a digital certificate that you have installed and tap Next. 7. In the dialog box, enter your user password and select the box to remember the password for all applications. Tap OK. Note: If you are following strong security practices, this step is not recommended. 8. A message opens stating the TPM has been successfully enrolled. Complete the enrollment wizard. 9. When a dialog box opens asking if you want OmniPass to log you on, tap Yes. 6 Trusted Platform Module (TPM) Activation
7 Setting up the authentication rules The TPM can be configured as a required authentication device within OmniPass. 1. In the main OmniPass window, go to Manage OmniPass Users and Settings > Change User Settings > Set user authentication rules and policies. You are asked to verify your identity with OmniPass. 2. To verify your identity, tap the TPM icon or key icon. The Set Authentication Rules window opens. 3. Select each box where you want TPM authentication to be a requirement. For example, if you selected File and Folder Encryption and Decryption, the TPM is required to decrypt any file that was encrypted on that Tablet PC. Trusted Platform Module (TPM) Activation 7
8 2006 Motion Computing, Inc. (March 2006) All Rights Reserved - TPM Activation Rev. TD-03 8 Trusted Platform Module (TPM) Activation
Table of Contents. TPM Configuration Procedure... 2. 1. Configuring the System BIOS... 2
Table of Contents TPM Configuration Procedure... 2 1. Configuring the System BIOS... 2 2. Installing the Infineon TPM Driver and the GIGABYTE Ultra TPM Utility... 3 3. Initializing the TPM Chip... 4 3.1.
More informationTPM. (Trusted Platform Module) Installation Guide V2.1
TPM (Trusted Platform Module) Installation Guide V2.1 Table of contents 1 Introduction 1.1 Convention... 4 1.2 TPM - An Overview... 5 2 Using TPM for the first time 2.1 Enabling TPM... 6 2.2 Installing
More informationTPM. (Trusted Platform Module) Installation Guide V3.3.0. for Windows Vista
TPM (Trusted Platform Module) Installation Guide V3.3.0 for Windows Vista Table of contents 1 Introduction 1.1 Convention... 4 1.2 TPM - An Overview... 5 2 Using TPM for the first time 2.1 Enabling TPM...
More informationHP ProtectTools User Guide
HP ProtectTools User Guide Copyright 2007 Hewlett-Packard Development Company, L.P. Microsoft and Windows are U.S. registered trademarks of Microsoft Corporation. Intel is a trademark or registered trademark
More informationEncrypting with BitLocker for disk volumes under Windows 7
Encrypting with BitLocker for disk volumes under Windows 7 Summary of the contents 1 Introduction 2 Hardware requirements for BitLocker Driver Encryption 3 Encrypting drive 3.1 Operating System Drive 3.1.1
More informationSmart TPM. User's Manual. Rev. 1001 12MD-STPM-1001R
Smart TPM User's Manual Rev. 1001 12MD-STPM-1001R We recommend that you download the latest version of the Smart TPM utility from GIGABYTE's website. If you have installed Ultra TPM earlier, you can install
More informationWindows BitLocker Drive Encryption Step-by-Step Guide
Windows BitLocker Drive Encryption Step-by-Step Guide Microsoft Corporation Published: September 2006 Abstract Microsoft Windows BitLocker Drive Encryption is a new hardware-enhanced feature in the Microsoft
More informationJoining an XP workstation to a domain Version 1.00
Joining an XP workstation to a domain Version 1.00 All Windows XP Professional workstations need to be joined to a domain to function as part of the domain security environment. Need to Know TM 1. To join
More informationUsing BitLocker to encrypt a Windows 8 device
Using BitLocker to encrypt a Windows 8 device 1. Before BitLocker can be used to encrypt the portable device, the Trusted Platform Module must be turned on via the BIOS. Boot the device and press F2, F10,
More informationHP ProtectTools Embedded Security Guide
HP ProtectTools Embedded Security Guide Document Part Number: 364876-001 May 2004 This guide provides instructions for using the software that allows you to configure settings for the HP ProtectTools Embedded
More informationArkay Remote Data Backup Client Quick Start Guide
Arkay Remote Data Backup Client Quick Start Guide Version 6.1.56.27 September 2005 Quick Start Guide It's easy to get started with Arkay Remote Data Backup and Recovery Service. To start using Arkay Remote
More informationDell ControlPoint Security Manager
Dell ControlPoint Security Manager www.dell.com support.dell.com Notes NOTE: A NOTE indicates important information that helps you make better use of your computer. Information in this document is subject
More informationHow To Create An Easybelle History Database On A Microsoft Powerbook 2.5.2 (Windows)
Introduction EASYLABEL 6 has several new features for saving the history of label formats. This history can include information about when label formats were edited and printed. In order to save this history,
More informationBitLocker/Active Directory Encryption Procedure Department: Information Security Office Version: 1.0 Last Revised: 09/26/2011
BitLocker/Active Directory Encryption Procedure Department: Information Security Office Version: 1.0 Last Revised: 09/26/2011 Purpose To provide a step-by-step procedure for encrypting installed laptop
More informationUpdates Click to check for a newer version of the CD Press next and confirm the disc burner selection before pressing finish.
Backup. If your computer refuses to boot or load Windows or if you are trying to restore an image to a partition the Reflect cannot lock (See here), and then you will have to start your PC using a rescue
More informationHP ProtectTools. Getting Started
HP ProtectTools Getting Started Copyright 2012 Hewlett-Packard Development Company, L.P. Bluetooth is a trademark owned by its proprietor and used by Hewlett-Packard Company under license. Intel is a trademark
More informationHow to enable Disk Encryption on a laptop
How to enable Disk Encryption on a laptop Skills and pre-requisites Intermediate IT skills required. You need to: have access to, and know how to change settings in the BIOS be confident that your data
More informationSTATISTICA VERSION 9 STATISTICA ENTERPRISE INSTALLATION INSTRUCTIONS FOR USE WITH TERMINAL SERVER
Notes: STATISTICA VERSION 9 STATISTICA ENTERPRISE INSTALLATION INSTRUCTIONS FOR USE WITH TERMINAL SERVER 1. These instructions focus on installation on Windows Terminal Server (WTS), but are applicable
More information5.6.3 Lab: Registry Backup and Recovery in Windows XP
5.6.3 Lab: Registry Backup and Recovery in Windows XP Introduction Print and complete this lab. In this lab, you will back up a computer registry. You will also perform a recovery of a computer registry.
More informationHP ProtectTools for Small Business Security Software, Version 5.10. User Guide
HP ProtectTools for Small Business Security Software, Version 5.10 User Guide Copyright 2010 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
More informationINSTALLING MÜSE UPDATES FOR ISTAN
INSTALLING MÜSE UPDATES FOR ISTAN System updates are available periodically and can be downloaded using any computer with an Internet connection. CAE Healthcare Instructor Workstations should NOT be connected
More information16.4.3 Lab: Data Backup and Recovery in Windows XP
16.4.3 Lab: Data Backup and Recovery in Windows XP Introduction Print and complete this lab. In this lab, you will back up data. You will also perform a recovery of the data. Recommended Equipment The
More informationAutomatic Setup... 1 Manual Setup... 2 Installing the Wireless Certificates... 18
Contents Automatic Setup... 1 Manual Setup... 2 Installing the Wireless Certificates... 18 Automatic Setup 1. Click on the Wireless icon in your system tray that looks like. 2. You will see a list of available
More informationIIS, FTP Server and Windows
IIS, FTP Server and Windows The Objective: To setup, configure and test FTP server. Requirement: Any version of the Windows 2000 Server. FTP Windows s component. Internet Information Services, IIS. Steps:
More informationHow to Install Microsoft Windows Server 2008 R2 in VMware ESXi
How to Install Microsoft Windows Server 2008 R2 in VMware ESXi I am not responsible for your actions or their outcomes, in any way, while reading and/or implementing this tutorial. I will not provide support
More informationeduc Office 365 email: Remove & create new Outlook profile
Published: 29/01/2015 If you have previously used Outlook the with the SCC/SWO service then once you have been moved into Office 365 your Outlook will need to contact the SCC/SWO servers one last time
More informationImage Backup and Recovery Procedures
Image Backup and Recovery Procedures Thank you for purchasing a Fujitsu computer. Fujitsu is committed to bringing you the best computing experience with your new system. It is very important that you
More informationConfiguration Guide. Remote Backups How-To Guide. Overview
Configuration Guide Remote Backups How-To Guide Overview Remote Backups allow you to back-up your data from 1) a ShareCenter TM to either a Remote ShareCenter or Linux Server and 2) Remote ShareCenter
More informationTransitioning from TurningPoint 5 to TurningPoint Cloud - LMS 1
Transitioning from TurningPoint 5 to TurningPoint Cloud - LMS 1 A Turning Account is a unique identifier that is used to tie together all software accounts and response devices. A Turning Account is required
More informationCruzNet Secure Set-Up Instructions for Windows Vista
CruzNet Secure Set-Up Instructions for Windows Vista 1. In order to start using CruzNet Secure, you'll first need to create a password at https://vpn.soe.ucsc.edu/. Click on the reset your password link.
More informationHow to Encrypt your Windows 7 SDS Machine with Bitlocker
How to Encrypt your Windows 7 SDS Machine with Bitlocker ************************************ IMPORTANT ******************************************* Before encrypting your SDS Windows 7 Machine it is highly
More information10.3.1.6 Lab - Data Backup and Recovery in Windows XP
5.0 10.3.1.6 Lab - Data Backup and Recovery in Windows XP Introduction Print and complete this lab. In this lab, you will back up data. You will also perform a recovery of the data. Recommended Equipment
More informationKETS Enterprise VPN. Client Installation and Configuration Guide. Version 2.3
KETS Enterprise VPN Client Installation and Configuration Guide Version 2.3 November 1, 2007 1 I. KETS Enterprise VPN Client Download, Installation and Configuration.... 2 II. Making the connection to
More informationUsing an Automatic Back Up for Outlook 2003 and Outlook 2007 Personal Folders
Using an Automatic Back Up for Outlook 2003 and Outlook 2007 Personal Folders Part 1 Install the Personal Folder Backup Utility Note: You should close Outlook and any other applications before installing
More information1. Set Daylight Savings Time... 3. 2. Create Migrator Account... 3. 3. Assign Migrator Account to Administrator group... 4
1. Set Daylight Savings Time... 3 a. Have client log into Novell/Local Machine with Administrator Account...3 b. Access Adjust Date/Time...3 c. Make sure the time zone is set to Central Time...3 2. Create
More informationSymantec PGP Whole Disk Encryption Hands-On Lab V 3.7
Symantec PGP Whole Disk Encryption Hands-On Lab V 3.7 Description This hands-on lab session covers the hard drive encryption technologies from PGP. Students will administer a typical Whole Disk Encryption
More information4 Backing Up and Restoring System Software
4 Backing Up and Restoring System Software In this Chapter... Planning a Backup Strategy, 4-3 Preparing for Disaster Recovery, 4-4 Creating Boot Recovery Diskettes, 4-5 Making a Full Backup Tape, 4-8 Restoring
More informationTournament Pairing Program Installation Instructions for Windows 7
Tournament Pairing Program Installation Instructions for Windows 7 Please refer to the installation instructions and follow the steps outlined. It is important that all instructions be followed in the
More informationCHARTER BUSINESS custom hosting faqs 2010 INTERNET. Q. How do I access my email? Q. How do I change or reset a password for an email account?
Contents Page Q. How do I access my email? Q. How do I change or reset a password for an email account? Q. How do I forward or redirect my messages to a different email address? Q. How do I set up an auto-reply
More informationTrusted Platform Module (TPM) Quick Reference Guide
Trusted Platform Module (TPM) Quick Reference Guide System builders/integrators should pass this Guide on to the system owner to assist them in enabling and activating the TPM. Warning of Potential Data
More informationContents. VPN Instructions. VPN Instructions... 1
VPN Instructions Contents VPN Instructions... 1 Download & Install Check Point VPN Software... 2 Connect to FPUA by VPN... 6 Connect to Your Computer... 8 Determine Your Machine Type... 10 Identify 32-bit
More informationTSM for Windows Installation Instructions: Download the latest TSM Client Using the following link:
TSM for Windows Installation Instructions: Download the latest TSM Client Using the following link: ftp://ftp.software.ibm.com/storage/tivoli-storagemanagement/maintenance/client/v6r2/windows/x32/v623/
More informationSafeWord Domain Login Agent Step-by-Step Guide
SafeWord Domain Login Agent Step-by-Step Guide Author Johan Loos Date January 2009 Version 1.0 Contact johan@accessdenied.be Table of Contents Table of Contents... 2 Why SafeWord Agent for Windows Domains?...
More informationUpgrading from MSDE to SQL Server 2005 Express Edition with Advanced Services SP2
Upgrading from MSDE to SQL Server 2005 Express Edition with Advanced Services SP2 Installation and Configuration Introduction This document will walk you step by step in removing MSDE and the setup and
More informationTo successfully initialize Microsoft Outlook (Outlook) the first time, email settings need to be verified.
TO: UAN CLIENTS FROM: UAN STAFF DATE: OCTOBER 8, 2008 SUBJECT: Steps for Initial Setup of Microsoft Outlook To successfully initialize Microsoft Outlook (Outlook) the first time, email settings need to
More informationZENworks 11 Support Pack 4 Full Disk Encryption Agent Reference. May 2016
ZENworks 11 Support Pack 4 Full Disk Encryption Agent Reference May 2016 Legal Notice For information about legal notices, trademarks, disclaimers, warranties, export and other use restrictions, U.S. Government
More informationHi-Speed USB Flash Disk User s Manual Guide
Hi-Speed USB Flash Disk User s Manual Guide System Requirements Windows 98, ME, 2000, XP, Mac OS 10.1, Linux 2.4 or above AMD or Intel Pentium 133MHz or better based computer USB 1.1, USB 2.0 or higher
More informationeadvantage Certificate Enrollment Procedures
eadvantage Certificate Enrollment Procedures Purpose: Instructions for members to obtain a digital certificate which is a requirement to conduct financial transactions with the Federal Home Loan Bank of
More informationSet up Outlook for your new student e mail with IMAP/POP3 settings
Set up Outlook for your new student e mail with IMAP/POP3 settings 1. Open Outlook. The Account Settings dialog box will open the first time you open Outlook. If the Account Settings dialog box doesn't
More informationNTI Backup Now EZ v2 User s Guide
NTI Backup Now EZ v2 User s Guide GMAA00423010 11/12 2 Copyright statement This guide is copyrighted by Toshiba Corporation with all rights reserved. Under the copyright laws, this guide cannot be reproduced
More informationMinimum Requirements... 2. New Firm Installation Instructions for the Software Delivery Manager...2. NEW Firms Installing for the First Time...
Release 2014.14.03 December, 2014 CCH, a part of Wolters Kluwer, welcomes you to ProSystem fx Practice Management. For first-time installations of ProSystem fx Practice Management the Installation Guide
More informationZanibal Plug-in For Microsoft Outlook Installation & User Guide Version 1.1
Zanibal Plug-in For Microsoft Outlook Installation & User Guide Version 1.1 Zanibal LLC Phone: +1-408-887-0480, +234-1-813-1744 Email: support@zanibal.com www.zanibal.com Copyright 2012, Zanibal LLC. All
More informationUser Guide. Version 3.0 April 2006
User Guide Version 3.0 April 2006 2006 Obvious Solutions Inc. All rights reserved. Dabra and Dabra Network are trademarks of Obvious Solutions Inc. All other trademarks owned by their respective trademark
More informationSymantec Endpoint Encryption (SEE Client) Installation Instructions. Version 8.2
Symantec Endpoint Encryption (SEE Client) Installation Instructions Version 8.2 Warning: This software is labor intensive, therefore it is important to validate that the hard drive is healthy by first
More informationApple Mail... 36 Outlook Web Access (OWA)... 38 Logging In... 38 Changing Passwords... 39 Mobile Devices... 40 Blackberry...
Contents Email Accounts... 3 Adding accounts... 3 Account Modifications... 6 Adding Aliases... 7 Primary E-mail Addresses... 10 Mailbox Quotas... 12 Removing accounts... 13 Mail Forwarding and Distribution
More informationCornerstone* New Activation Key Instructions Cornerstone Module Change Using Files on the Server to Reinstall the Software
Cornerstone* New Activation Key Instructions Cornerstone Module Change Using Files on the Server to Reinstall the Software Document Purpose The following instructions guide you through updating your IDEXX
More informationConfiguring Outlook 2013 For IMAP Connections
Configuring Outlook 2013 For IMAP Connections VERSION 1.0 1 P a g e U A C o n n e c t C o n f i g u r i n g O u t l o o k 2013 f o r I M A P 12/2013 Configuring Outlook 2013 for IMAP Connections Overview
More informationNEWTECH INFOSYSTEMS, INC. NTI Backup Now EZ. NTI Backup Now EZ User's Guide
NEWTECH INFOSYSTEMS, INC. NTI Backup Now EZ NTI Backup Now EZ User's Guide Backup Now EZ User's Guide 2009 NewTech Infosystems, Inc. i Table of Contents INTRODUCTION... 3 WELCOME TO NTI BACKUP NOW EZ...
More informationTM Online Storage: StorageSync
TM Online Storage: StorageSync 1 Part A: Backup Your Profile 1: How to download and install StorageSync? Where to download StorageSync? You may download StorageSync from your e-storage account. Please
More informationBounceBack User Guide
Table Of Contents 1. Table of Contents... 2 2. 1-0 Introduction... 3 2.1 1-0: Introduction... 4 2.2 1-1: BounceBack Software Overview... 6 3. 2-0 Navigating the BounceBack Control Center... 9 3.1 2-0:
More informationExchange 2003 Mailboxes
Exchange 2003 Mailboxes Microsoft will stop supporting Exchange 2003 mailboxes in 2014 as it comes to the end of it s life. To maintain our levels of support and performance of all our customers, we will
More informationProofpoint provides the capability for external users to send secure/encrypted emails to EBS-RMSCO employees.
Proofpoint provides the capability for external users to send secure/encrypted emails to EBS-RMSCO employees. To create a new email message to be sent securely to an EBS-RMSCO employee: 1. Click on the
More informationExchange 2010. Outlook Profile/POP/IMAP/SMTP Setup Guide
Exchange 2010 Outlook Profile/POP/IMAP/SMTP Setup Guide September, 2013 Exchange 2010 Outlook Profile/POP/IMAP/SMTP Setup Guide i Contents Exchange 2010 Outlook Profile Configuration... 1 Outlook Profile
More informationJumble for Microsoft Outlook
Jumble for Microsoft Outlook Jumble is a zero knowledge, end- to- end email encryption solution that integrates with existing email platforms. Jumble integrates at the email client level and removes the
More informationImage Backup and Recovery Procedures
Image Backup and Recovery Procedures Thank you for purchasing a Fujitsu computer. Fujitsu is committed to bringing you the best computing experience with your new system. It is very important that you
More informationOTS. The Samsung ATIV Smart PC. Quick Navigation Guide. Tablet Overview. Media & Classroom Services University of Baltimore.
The Samsung ATIV Smart PC Quick Navigation Guide Tablet Overview (Front View) (Side View) (Left View) (Top View) (Bottom View) (Back View) Your tablet also comes with an optional keyboard dock: Instructions
More informationInstallation and Configuration of VPN Software
Installation and Configuration of VPN Software for Remote Spat Systems These instructions help you install AT&T Global Services and VPN Client (Extranet Access) software on your Windows computer for accessing
More informationProjectWise Explorer V8i User Manual for Subconsultants & Team Members
ProjectWise Explorer V8i User Manual for Subconsultants & Team Members submitted to Michael Baker International Subconsultants & Team Members submitted by Michael Baker International ProjectWise Support
More informationSafeGuard Enterprise Web Helpdesk
SafeGuard Enterprise Web Helpdesk Product version: 5.60 Document date: April 2011 Contents 1 SafeGuard web-based Challenge/Response...3 2 Installation...5 3 Authentication...8 4 Select the Web Help Desk
More informationHosted Microsoft Exchange Client Setup & Guide Book
Hosted Microsoft Exchange Client Setup & Guide Book Section 1 Microsoft Outlook Web Access (OWA) access directions Section 2 Windows 10 Mail App setup & configuration Section 3 Windows Mobile Phone ActiveSync
More informationBankLink Books Clients
BankLink Books Clients This document is for those practices installing BankLink Books. The BankLink Service Agreement permits licensed BankLink practices to install the software in as many locations as
More informationTime Stamp. Instruction Booklet
Time Stamp Instruction Booklet Time Stamp Introductions Time stamp is a useful solution for backing up and restoring system, it backs up the entire computer system to the Backup Zone. Time Stamp is used
More information405-375-0786 1-800-375-8903 www.pldi.net HIGH-SPEED INTERNET Connection and Windows Mail Set Up for Windows Vista Users Page 1 Form # PLD 475 01-10 1. To set up a Pioneer High-Speed Internet connection
More informationBatch Eligibility Long Term Care claims
Hewlett Packard Enterprise Provider Electronic Solutions software lets Connecticut Medical Assistance Program providers verify patient s eligibility and submit and correct claims for services all electronically.
More informationSecure Perfect RAID Recovery Instructions
Secure Perfect RAID Recovery Instructions Contents Overview Dell PowerEdge 2500 RAID Level 1 Recovery Instructions Overview NOTE If you possess a previous version of this document, you may notice changes
More informationOutlook Profile Setup Guide Exchange 2010 Quick Start and Detailed Instructions
HOSTING Administrator Control Panel / Quick Reference Guide Page 1 of 9 Outlook Profile Setup Guide Exchange 2010 Quick Start and Detailed Instructions Exchange 2010 Outlook Profile Setup Page 2 of 9 Exchange
More information11.4.5 Optional Lab: Install, Configure, and Partition a Second Hard Drive in Windows Vista
11.4.5 Optional Lab: Install, Configure, and Partition a Second Hard Drive in Windows Vista Introduction Print and complete this lab. In this lab, you will change the boot order, install a second hard
More informationConnecting to eduroam using Windows 8
Connecting to eduroam using Windows 8 GUIDE User Services IT Services University of Malta 2013 User Services IT Services University of Malta Msida MSD 2080 Malta May only be reproduced with permission.
More informationInstallation Instruction STATISTICA Enterprise Small Business
Installation Instruction STATISTICA Enterprise Small Business Notes: ❶ The installation of STATISTICA Enterprise Small Business entails two parts: a) a server installation, and b) workstation installations
More informationUPS WorldShip Install on a Workgroup Remote
PRE-INSTALLATION INSTRUCTIONS: Install UPS WorldShip on the Workgroup Admin. Temporarily disable any virus scan software that you may have installed. Request access to the network share drive created by
More informationUser guide. Business Email
User guide Business Email June 2013 Contents Introduction 3 Logging on to the UC Management Centre User Interface 3 Exchange User Summary 4 Downloading Outlook 5 Outlook Configuration 6 Configuring Outlook
More informationSafeGuard Enterprise Web Helpdesk. Product version: 6 Document date: February 2012
SafeGuard Enterprise Web Helpdesk Product version: 6 Document date: February 2012 Contents 1 SafeGuard web-based Challenge/Response...3 2 Installation...5 3 Authentication...8 4 Select the Web Helpdesk
More informationTable of Contents. Online backup Manager User s Guide
Table of Contents Backup / Restore Windows System (WBAdmin)... 2 Requirements and recommendations... 2 Overview... 3 1.1 How to backup Microsoft Windows System (WBAdmin)... 5 How to restore Microsoft Windows
More informationSetting Up Monthly Reporter
Setting Up Monthly Reporter April 11, 2014 I. HOW IT WORKS A QUICK OVERVIEW A. AuditWare Development Company maintains a powerful, sophisticated server on which a portion of memory is assigned to each
More informationIdentity Finder: Managing Your Results
Identity Finder: Managing Your Results The most important part of running Identity Finder is determining the most effective and secure way of managing the search results. Be sure to carefully read and
More informationMaintaining the Content Server
CHAPTER 7 This chapter includes the following Content Server maintenance procedures: Backing Up the Content Server, page 7-1 Restoring Files, page 7-3 Upgrading the Content Server, page 7-5 Shutting Down
More informationPCLinq2 Hi-Speed USB Bridge-Network Cable. Quick Network Setup Guide
PCLinq2 Hi-Speed USB Bridge-Network Cable Congratulations! Quick Network Setup Guide For Windows 98/ME/2000/XP Congratulations for installing the PCLinq2 Hi-Speed USB Bridge-Network Cable. This Quick Network
More informationInstalling S500 Power Monitor Software and LabVIEW Run-time Engine
EigenLight S500 Power Monitor Software Manual Software Installation... 1 Installing S500 Power Monitor Software and LabVIEW Run-time Engine... 1 Install Drivers for Windows XP... 4 Install VISA run-time...
More informationDIGIPASS CertiID. Getting Started 3.1.0
DIGIPASS CertiID Getting Started 3.1.0 Disclaimer Disclaimer of Warranties and Limitations of Liabilities The Product is provided on an 'as is' basis, without any other warranties, or conditions, express
More informationSTATISTICA VERSION 12 STATISTICA ENTERPRISE SMALL BUSINESS INSTALLATION INSTRUCTIONS
STATISTICA VERSION 12 STATISTICA ENTERPRISE SMALL BUSINESS INSTALLATION INSTRUCTIONS Notes 1. The installation of STATISTICA Enterprise Small Business entails two parts: a) a server installation, and b)
More informationHow to set up Outlook Anywhere on your home system
How to set up Outlook Anywhere on your home system The Outlook Anywhere feature for Microsoft Exchange Server 2007 allows Microsoft Office Outlook 2007 and Outlook 2003 users to connect to their Outlook
More informationTrusted Platform Module (TPM) Quick Reference Guide
Trusted Platform Module (TPM) Quick Reference Guide System builders/integrators should give this Guide to the system owners to assist them in enabling and activating the Trusted Platform Module. Warning
More informationPC Angel. Recovery. Page 1
PC Angel Recovery Page 1 Table of Contents Introduction... 3 What is the purpose of PC Angel Recovery?... 3 What can you find in this manual?... 4 What should I do to get back my system?... 5 What should
More informationPCLaw Administration Guide. Version 13.0
PCLaw Administration Guide Version 13.0. Copyright and Trademark LexisNexis, Lexis, and the Knowledge Burst logo are registered trademarks of Reed Elsevier Properties Inc., used under license. PCLaw is
More informationSet Up E-mail Setup with Microsoft Outlook 2007 using POP3
Page 1 of 14 Help Center Set Up E-mail Setup with Microsoft Outlook 2007 using POP3 Learn how to configure Outlook 2007 for use with your 1&1 e-mail account using POP3. Before you begin, you will need
More informationVeriSign PKI Client Government Edition v 1.5. VeriSign PKI Client Government. VeriSign PKI Client VeriSign, Inc. Government.
END USER S GUIDE VeriSign PKI Client Government Edition v 1.5 End User s Guide VeriSign PKI Client Government Version 1.5 Administrator s Guide VeriSign PKI Client VeriSign, Inc. Government Copyright 2010
More informationOperating System Installation Guide
Operating System Installation Guide This guide provides instructions on the following: Installing the Windows Server 2008 operating systems on page 1 Installing the Windows Small Business Server 2011 operating
More informationWindows 7. Tips and Tricks. Scott Sekinger
Windows 7 Tips and Tricks By Scott Sekinger This article includes helpful Windows 7 tips and tricks. The topics discussed are: 1. Windows keyboard shortcuts 2. how to create a System Repair disk 3. how
More informationSafeGuard Enterprise Web Helpdesk. Product version: 6.1
SafeGuard Enterprise Web Helpdesk Product version: 6.1 Document date: February 2014 Contents 1 SafeGuard web-based Challenge/Response...3 2 Scope of Web Helpdesk...4 3 Installation...5 4 Allow Web Helpdesk
More informationInstallation Instruction STATISTICA. Concurrent Network License with Borrowing Domain Based Registration
Installation Instruction STATISTICA Concurrent Network License with Borrowing Domain Based Registration Notes: ❶ The installation of the Concurrent network version entails two parts: a) a server installation,
More information