1 Step-by-Step Guide to Securing Windows XP Professional with Service Pack 2 in Small and Medium Businesses
2 2004 Microsoft Corporation. All rights reserved. This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS SUMMARY. Microsoft, Active Directory, Windows, Windows Server, and Windows NT are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries. Any names of actual companies and products mentioned herein may be the trademarks of their respective owners.
3 Overview The ever-growing threat of malicious code such as worms, viruses, and Trojan horses makes it critical for all customers to take immediate action to help lock down their desktop and laptop systems. This guide explains how to implement the security measures recommended in the Microsoft Windows XP Security Guide in a small or medium business environment without an Active Directory directory service deployment. These recommendations help ensure that your desktop and laptop systems running Windows XP Professional Service Pack 2 (SP2) are more secure from the majority of current security threats. These recommendations also help ensure that users can continue to be efficient and productive with their computers. In addition to the advanced step-by-step guidance in this document, you will also find information on the top security recommendations that Microsoft is making to all customers, from home users to enterprise workers. These recommendations include: Use a firewall such as Windows Firewall, which is included in Windows XP SP2 (and replaces the Internet Connection Firewall). Use Microsoft Windows Update to get and keep your PC up-to-date. Install antivirus software and ensure it is up-to-date. This guide provides step-by-step deployment guidance and troubleshooting advice for information technology (IT) professionals and system administrators in a small to medium sized organization. For more information on the particular settings that are applied by following this guidance and their potential impact, please refer to the complete Windows XP Security Guide at To create customized security templates based on the specific needs of your organization, refer to the Threats and Countermeasures Guide at Who Should Read this Guide You should read this guide if you are planning to deploy Windows XP, or if you are currently administering a number of computers running Windows XP Professional and want to implement a base level of security and protect your desktops and laptops with minimal impact on end users. This guide is written for the average small or medium business administrator who may not have extensive training on Microsoft products but needs a quick, step by step guide to securing Windows XP in their organization. This guide does not address the wide variety of needs and configurations that may be required in a large organization. Additionally, it may not fully address the specific security needs of some organizations. For additional security options and customization information, please refer to the Windows XP Security Guide. What to Expect As with any security recommendations, this guidance strives to find the right balance between enhanced security and usability. The recommendations provided in this document will work successfully for Windows XP Professional deployments in a wide variety of environments. However, there are several key points that you should note before implementing these recommendations. 1
4 This guide should not be used to secure Windows XP desktops or laptops that are members of a domain. A domain is a networked set of computers that share a common account database and can be managed as a group. Additionally, this guide should not be used for computers running Windows XP Home Edition. This step-by-step guide is focused on organizations that manage individual user accounts on each Windows XP Professional computer. In organizations where all users share a common username and password, or organizations where users have multiple accounts on different computers that use the same password, additional steps must be taken prior to using this guidance. Such practices are not secure and the steps recommended in this guide will not work in these environments. Connectivity to Windows 98 and Windows NT If the recommendations in this guidance are used, your Windows XP desktops and laptops will be capable of communicating more securely with other computers running Windows XP, Windows 2000, and Windows Server However, Windows XP desktops and laptops may have difficulty sharing files, folders, or printers with Windows 98 or Windows NT 4.0 systems. Windows 98 and Windows NT 4.0 are older technologies that are more difficult to secure against today's security threats. The use of Windows XP, Windows 2000, and Windows Server 2003 provide small and medium businesses with a security solution that helps safeguard your important business documents from the threat of viruses and attackers while providing you with the most reliable Microsoft desktop to date. Windows XP Professional is the most reliable Windows operating system yet much more reliable than Windows 98 SE. Only Windows XP, Windows 2000, and Windows Server 2003 include the new security features and functions used in this guide. For additional reasons to consider upgrading Windows 98 and NT clients to Windows XP, see "Top 10 Reasons Windows XP Professional Is Right for Small Business" at For information regarding how to secure Windows XP systems that are members of a domain, or that need to communicate with Windows NT 4.0 workstations and servers or Windows 98 clients, please refer to the complete Windows XP Security Guide. Changes to Password Requirements After implementing this guidance, your users will be required to maintain a complex password of at least 8 characters and to change that password every 42 days. In addition to changing passwords frequently, the most productive security change that you can implement is encouraging your users to choose strong passwords. Weak passwords are one of the greatest security risks in any organization. Help your users by explaining that they can use "pass phrases" instead of passwords. An easy to remember phrase that includes numbers, uppercase and lowercase letters, and spaces or symbols is much more secure than a single word. Running Programs as a Local User A common issue in many organizations is the prevalence of users that log on to their laptop or desktop with administrative credentials. All user accounts should be members of the Users group. Users should not be allowed to log on routinely with accounts that are members of the Administrators group. By enforcing this change, users will not be able to install unapproved software that may contain viruses or other types of potentially dangerous code. 2
5 Implementing this requirement may be challenging, but Windows XP Professional with logo certified applications makes implementation easier. Applications that are not logocertified may not run correctly for users without administrative privileges. For a list of logo-certified applications, look for software labeled "Designed for Windows XP" in the Windows Catalog at An administrator must implement the recommendations in this guide, but the settings provide the necessary functionality to allow the laptop or desktop to be run by someone who is not a member of the Administrators group on a day-to-day basis. After the security settings recommended in this guide are implemented, they apply to all users logging on to the desktop or laptop computer, including the Local Administrator. Verifying Windows XP Service Pack 2 This guide is written for users of Windows XP with SP2 installed. Before following the steps in this guide, you should verify that you are running the correct version of Windows XP. To determine what version of Windows XP you're running 1. Log on to the Windows XP client. 2. Click Start, click Run, type Winver and then press ENTER. The version information that displays should indicate that you are running SP2. If you are not running SP2, you need to download and install it before proceeding. Windows XP SP2 can be obtained from the Windows XP Service Pack 2 page on Microsoft.com at Securing your Laptops and Desktops The following sections provide you with step by step instructions for downloading and installing the password and security tools and templates provided with the Windows XP Security Guide. Subsequent sections provide additional instructions to help you secure your Windows XP systems. The main tasks are: 1. Downloading the security tools and templates to your desktop or laptop computer. 2. Importing the password and security policy templates to your computer. 3. Applying the policies to your computer. 1. Downloading the Windows XP Security Tools and Templates A security template is a file that represents a recommended security configuration. Security templates are applied to a system by importing them to a desktop or laptop computer. This section shows you how to download the pre-built security tools and templates (detailed in the Windows XP Security Guide) to secure your desktop and laptop systems. To download the security tools and templates 1. Log on to the Windows XP client with an account that has administrative rights. 2. Open a Web browser and navigate to the Windows XP Security Guide page on the Microsoft Download Center at 3. Click the Download button on the page and follow the prompts to save the file to your computer. 3
6 4. If the Internet Explorer - Security Warning dialog displays, click Run. If the Security Warning dialog does not display, locate the downloaded file on your computer and double-click it. 5. Follow the WinZip Self-Extractor instructions to extract the files to your My Documents folder. 2. Importing the Password and Security Policies After you have downloaded and extracted the security tools and templates, perform the following steps to import the password and security policies to your stand-alone computer. The password policy template enforces the requirement that users choose complex passwords that are greater than 8 characters in length. In addition, it requires users to change their password every 42 days. The policy monitors for failed attempts to log on to the computer. If 50 failed logon attempts occur within 30 minutes, the account is locked for 30 minutes, or until an administrator manually unlocks it. The security policy template configures settings that ensure only valid users can connect to the computer, that only administrators can back up and restore files on the computer, and that only administrators can add new drivers to the computer. You will use the SA Enterprise XP Client - Desktop.cmd.txt or the SA Enterprise XP Client - Laptop.cmd.txt file (both are included with the Windows XP Security Guide) to perform this task. To import the recommended password and security policies 1. From My Documents, open the \Windows XP Security Guide\Tools and Templates\Security Guide\Stand Alone Clients folder. 2. On the Tools menu, click Folder Options. 3. Click the View tab, clear the Hide extensions for known file types checkbox, and then click OK. 4. Right-click the SA Enterprise XP Client - Desktop.cmd.txt file and select Rename. 5. Rename the file to SA Enterprise XP Client - Desktop.cmd, press ENTER, and click Yes in the Rename dialog box. 6. Double-click the SA Enterprise XP Client - Desktop.cmd file to import the password and security policies Note: If you are configuring a laptop, rename and double-click the SA Enterprise Client-Laptop.cmd.txt file instead of the SA Enterprise XP Client - Desktop.cmd.txt file. Important: Do not select the High Security scripts unless you have read the Windows XP Security Guide and understand the impact they may have on usability. 4
7 3. Applying the Policies To apply the password and security policies to your desktop or laptop computer, restart the computer. When it restarts, the new policies will be applied. If you encounter any problems, refer to the "Troubleshooting" section later in this document. Additional Recommendations Implementing the recommended security templates is a great start to securing your desktop or laptop computer. In addition, there are several other security measures that you should consider taking, including: Converting your file system to NTFS Using Windows Firewall Using antivirus software Keeping up-to-date with security patches These topics are discussed in the following sections. Converting your File Systems to NTFS A file system organizes directories and files on a computer. During the Windows XP setup process, computers could either be configured to use the FAT32 or the NTFS file system. FAT32 is an older technology used by previous versions of Windows. The NTFS file system is faster and more secure than previous file systems. For optimal performance and security of the operating system, you should use NTFS on all file system partitions on your computer. To check the file system type on your computer 1. On the Start menu, click My Computer. 2. Right-click the drive letter you want to check and select Properties from the menu. 3. The File System type should be NTFS. If it is not, you can use the Convert.exe utility to convert from FAT16 or FAT32 to NTFS. 5
8 Figure 1 Displaying drive properties Repeat this process for all disks on the computer. Even if the file system was configured as FAT32 when the operating system was installed, it can be easily converted to NTFS to provide additional security. To convert the file system to NTFS, take note of the name of the disk otherwise known as the volume label (C Drive in the preceding example) and complete the following steps. To convert the file system to NTFS 1. On the Start menu, click Run, type cmd, and then click OK. 2. At the command prompt, type the following, where drive letter is the drive you want to convert: Convert drive letter: /fs:ntfs 3. You will be prompted to enter the current volume label for the drive. Type the volume label that was identified earlier. Press ENTER. 4. When the conversion is complete, exit the command prompt by typing EXIT. Note: If you are attempting to convert the drive where the operating system is installed, you may be prompted to schedule the conversion to occur the next time the system is restarted. If this occurs, type Y and reboot the computer. Using Windows Firewall An Internet firewall can help prevent outsiders from accessing your computer through the Internet. Firewalls come in two forms, software and hardware, and they provide a protective boundary that helps screen out unwanted Internet invaders. A firewall can screen for malicious Internet traffic such as human attackers, worms, and certain types of viruses before they can cause problems on your system. In addition, some firewalls can help keep your computer from participating in attacks on others without your knowledge. A firewall is especially important if you are always connected to 6
9 the Internet, such as when you have a broadband cable or digital subscriber line (DSL or ADSL) connection. The Microsoft Windows Firewall (formerly called Internet Connection Firewall or ICF) is a feature included in SP2 to help protect your system or network connection to the Internet. Windows Firewall is on in most configurations and should be left on. To enable or verify the Windows Firewall settings, you can use the following steps. To enable Windows Firewall 1. On the Start menu, click Control Panel. 2. In the Control Panel, double-click Windows Firewall. 3. Select On (recommended). Figure 2 Turning on Windows Firewall 4. Click OK. These changes will take effect immediately and protect your network connection against many types of attacks. Windows Firewall is very powerful and it is highly recommended that you enable it. However, to protect the primary Internet connection of an organization, Windows Firewall is not a replacement for a true dedicated firewall. For more information 7
10 on protecting your network with a firewall, see the Internet Security and Acceleration page at Note that after you install SP2, some programs may seem not to work. By default, Windows Firewall is enabled and blocks unsolicited connections to your computer as well as unauthorized applications that open ports for inbound connections. For more information on this type of situation and how to fix it, see Microsoft Knowledge Base article , "Some programs seem to stop working after you install Windows XP Service Pack 2" at Using Antivirus Software An antivirus software program will help protect your computer against most viruses, worms, Trojan horses, and other malicious code. Many new computers come with antivirus software already installed. However, antivirus software requires a subscription to stay up-to-date. If you don't have a current subscription for these updates, your computer is probably vulnerable to new threats. Computer viruses are programs that are designed to replicate themselves and spread to as many computers as possible. Viruses and other forms of malicious software have been around for years. Today's viruses can replicate themselves and use the Internet and applications to spread across the world within hours. Antivirus software continually scans your computer for viruses and helps detect and remove them. It performs these scans based on identifying signatures of known viruses and malicious code. Installing antivirus software only solves part of the problem; keeping the antivirus signature files up-to-date is critical to maintain a secure desktop or laptop computer. User education regarding safe practices is another critical step in preventing virus attacks. Users should not open messages or take action on an attachment unless they are expecting the file and it is sent from a trusted source. All attachments should be scanned with antivirus software prior to its execution. Most antivirus software programs perform this type of scan automatically, but users should be made aware of this necessity. For a list of the software vendors who provide antivirus software that is compatible with Windows XP, see Microsoft Knowledge Base article 49500, "List of Antivirus Software Vendors" at For more information about complete antivirus solutions and strategies, see the Antivirus Defense-in-Depth Guide at Keeping Up-to-Date with Security Patches Your Windows XP operating system includes the Automatic Updates feature, which can automatically download the latest Microsoft security updates while your computer is on and connected to the Internet. To get the most out of Automatic Updates, run a Windows Update scan on your computer first. 8
11 To run a Windows Update scan 1. Click Start, click All Programs, and then click Windows Update. 2. Follow the directions on your screen. Windows Update will scan your computer and provide a pre-selected list of critical updates. Tip: To reduce download times, run Windows Update when you will not be using your computer for other tasks. Your download times will vary depending on how long it has been since you last updated your computer, the number and size of files being downloaded, and your modem speed. Slower modems may take several hours to download all recommended updates the first time you use Windows Update. 3. Install the updates. Tip: Some updates have prerequisites; therefore, you may be asked to install certain updates and then reboot your computer. Be sure to return to Windows Update after rebooting to check for any additional downloads. You may need to do this several times. Now that your Windows XP is up to date, establish a regular maintenance schedule with Automatic Updates. To configure your computer for automatic updates 1. On the Start menu, click Control Panel. 2. Double-click System. 3. Click the Automatic Updates tab, and then select Automatic (recommended). 4. Select the day and time for the updates to occur. 5. Click OK to close the System Properties window. 9
12 Figure 3 Configuring automatic updates After you enable Automatic Updates, a message will display above the Task Bar to notify you when new patches, fixes, and updates are available for download. The new updates will be automatically applied to the computer according to the schedule you specified. 10
13 Troubleshooting When implementing these recommendations you may encounter error messages or, in severe cases, applications that do not work after the policies have been applied. This section provides you with information about several of the common error messages you may encounter, as well as information on returning the security configuration of the computer to a default state. Common Error Messages The following error messages may appear during the application of these policies. Winzip Self-Extractor: Could not create When you attempt to extract the Windows XP Security Guide, you may see an error message that says, "Could not create "<Path Name>/Windows XP Security Guide" unzip operation cancelled." This message likely means that the account you are using does not have access to the path you have chosen. To correct this situation, log off and then log back on with an account that has administrative rights on the laptop or desktop. Security Configuration and Analysis snap-in: Access is denied. Import Failed This message may occur when using the Security Configuration and Analysis snap-in. It is usually an indication that the person performing the import of the template does not have administrative rights. Please ensure that the account you are using to apply the security templates has administrative permissions on the client computer. Security Configuration and Analysis snap-in: An unknown error occurred When attempting to open an existing database with the Security Configuration and Analysis snap-in, you may see the following error: "An unknown error occurred when attempting to open the database." This message means the database may be configured with read-only permissions. To resolve this error, either create a new database by specifying a different name or remove the read-only permissions on the existing database. If this error occurs when creating a new database, ensure that you are attempting to create the database in a location where you have adequate permissions to create new files. Dialog Box: It is an offense to continue This message is a generic, customizable statement that is used to deter unauthorized users from using your computer. Your legal advisor should approve this message for use on all of your desktop and laptop computers. For detailed information on how to modify this setting, please refer to page 61 of the Windows XP Security Guide. NTFS Conversion: Convert cannot gain exclusive access When trying to convert a FAT16 or FAT32 partition to NTFS, you may see the following message: "Convert cannot gain exclusive access to the drive letter drive, so it cannot convert it now. Would you like to schedule it to be converted the next time the system restarts? <Y/N>." 11
14 This situation occurs when the volume that you are attempting to convert is in use for example, if the drive that you want to convert is the same drive on which Windows XP is running. To resolve this issue, type Y at the command prompt. The volume or drive will be converted to NTFS the next time you start your computer. Returning to the Default Settings If you encounter problems after the security templates have been applied, you can reset the security settings to the operating system defaults. To restore the default security settings 1. On the Start menu, click Run, type cmd, and then click OK. 2. Type "secedit /configure /cfg %windir%\repair\secsetup.inf /db secsetup.sdb /verbose" (without the quotation marks), and then press ENTER. This process may take several minutes to complete. After completion, you should see a message that states: "Task is completed. Some files in the configuration are not found on this system so security cannot be set/queried. It's ok to ignore." This message is expected and does not require you to do anything. More Information The following information sources were the latest available on topics closely related to securing Windows XP Professional at the time this guide was released to the public. For more information about the extensive changes in SP2, see "Changes to Functionality in Microsoft Windows XP Service Pack 2" at For more information on the Windows XP Security Guide, see the Microsoft Windows XP Security Guide Overview at For more information on methods to help protect your PC, see the Protect Your PC page at For more information on security threats and countermeasures, see the Threats and Countermeasures Guide at For information on the Administrative Templates for Windows XP, see the article "The role of Administrative Templates" at windows/xp/all/proddocs/en-us/adminad.mspx. For more information on Windows Automatic Updates, see Microsoft Knowledge Base Article , "How to configure and use Automatic Updates in Windows XP" at For more information on upgrading to Windows XP, see the Windows XP Professional Upgrade Center at 12
Core Protection for Virtual Machines 1 Comprehensive Threat Protection for Virtual Environments. Installation Guide e Endpoint Security Trend Micro Incorporated reserves the right to make changes to this
PC Security and Maintenance by IMRAN GHANI PC Maintenance and Security-Forecast. Major sources of danger. Important steps to protect your PC. PC Security Tools. PC Maintenance Tools. Tips. PC Security-
Kaseya 2 Kaseya Server Setup Installation guide Version 7.0 English September 4, 2014 Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept
Operating System File and Printer Sharing with Microsoft Windows Microsoft Corporation Published: November 2003 Abstract File and printer sharing in Microsoft Windows allows you to share the contents of
StruxureWare Power Monitoring 7.0.1 Installation Guide 7EN02-0308-01 07/2012 Contents Safety information 5 Introduction 7 Summary of topics in this guide 7 Supported operating systems and SQL Server editions
McAfee.com Personal Firewall 1 Table of Contents Table of Contents...2 Installing Personal Firewall...3 Configuring Personal Firewall and Completing the Installation...3 Configuring Personal Firewall...
Setting up VPN and Remote Desktop for Home Use Contents I. Prepare Your Work Computer... 1 II. Prepare Your Home Computer... 2 III. Run the VPN Client... 3 IV. Remote Connect to Your Work Computer... 4
Operating System Troubleshooting File and Printer Sharing in Microsoft Windows XP Microsoft Corporation Published: November 2003 Updated: August 2004 Abstract File and printer sharing for Microsoft Windows
Page 1 of 16 Security How to Configure Windows Firewall in a Small Business Environment using Group Policy Introduction This document explains how to configure the features of Windows Firewall on computers
Trend Micro Incorporated reserves the right to make changes to this document and to the product described herein without notice. Before installing and using the product, review the readme files, release
Airtel PC Secure Trouble Shooting Guide Table of Contents Questions before installing the software Q: What is required from my PC to be able to use the Airtel PC Secure? Q: Which operating systems does
MGC WebCommander Web Server Manager Installation and Configuration Guide Version 8.0 Copyright 2006 Polycom, Inc. All Rights Reserved Catalog No. DOC2138B Version 8.0 Proprietary and Confidential The information
Windows Operating Systems Basic Security Objectives Explain Windows Operating System (OS) common configurations Recognize OS related threats Apply major steps in securing the OS Windows Operating System
Guide to Installing BBL Crystal MIND on Windows 7 Introduction The BBL Crystal MIND software can not be directly installed on the Microsoft Windows 7 platform, however it can be installed and run via XP
Version 4.61 or Later Copyright 2013 Interactive Financial Solutions, Inc. All Rights Reserved. ProviderPro Network Administration Guide. This manual, as well as the software described in it, is furnished
Setting up VPN and Remote Desktop for Home Use Contents I. Prepare Your Work Computer... 1 II. Prepare Your Home Computer... 2 III. Run the VPN Client... 3-4 IV. Remote Connect to Your Work Computer...
VERITAS Backup Exec 9.1 for Windows Servers Quick Installation Guide N109548 Disclaimer The information contained in this publication is subject to change without notice. VERITAS Software Corporation makes
ACTIVE DIRECTORY DEPLOYMENT CASAS Technical Support 800.255.1036 2009 Comprehensive Adult Student Assessment Systems. All rights reserved. Version 031809 CONTENTS 1. INTRODUCTION... 1 1.1 LAN PREREQUISITES...
Security How to Configure Windows Firewall on a Single Computer Introduction Windows Firewall is a new feature of Microsoft Windows XP Service Pack 2 (SP2) that is turned on by default. It monitors and
How To Configure CU*BASE Encryption Configuring encryption on an existing CU*BASE installation INTRODUCTION This booklet was created to assist CU*Answers clients with the configuration of encrypted CU*BASE
Inmagic Content Server Workgroup 10.00 Microsoft SQL Server 2005 Express Edition Installation Notes Introduction and Overview These installation notes are intended for the following scenarios: 1) New installations
Ascent Capture Internet Server 5 Getting Started with Ascent Capture Internet Server 5 10300260-000 Revision A Copyright Copyright 2001 Kofax Image Products. All Rights Reserved. Printed in USA. The information
Version 3.8 Installation Guide Copyright 2007 Jetro Platforms, Ltd. All rights reserved. This document is being furnished by Jetro Platforms for information purposes only to licensed users of the Jetro
Network Setup Instructions This document provides technical details for setting up the Elite Salon & Spa Management program in a network environment. If you have any questions, please contact our Technical
Installing the Microsoft Network Driver Interface Overview This guide explains how to install the PictureTel Live200 Microsoft Network Driver Interface (NDIS) software you have downloaded from PictureTel's
Getting started Corporate Edition Copyright 2005 Corporation. All rights reserved. Printed in the U.S.A. 03/05 PN: 10362873 and the logo are U.S. registered trademarks of Corporation. is a trademark of
GE Healthcare Life Sciences UNICORN 5.31 Administration and Technical Manual Table of Contents Table of Contents 1 Network setup... 1.1 Network terms and concepts... 1.2 Network environment... 1.3 UNICORN
Setup and Configuration Guide for Pathways Mobile Estimating Setup and Configuration Guide for Pathways Mobile Estimating Copyright 2008 by CCC Information Services Inc. All rights reserved. No part of
Verizon Wireless i730 Windows Mobile 5.0 Update Utility User's Guide Version Issue: Version 1.0 Last Update: 05/19/2006 Table of Contents 1. General Information:...3 2. About This Guide:...4 3. Installation
Welcome! CAREWare Quick Start guides will walk you through the basics of setting up, managing and using the main CAREWare functions. It is intended for non-technical users who just need to get basic information
MAS 90 Installation and System Administrator's Guide 4WIN1010-02/04 Copyright 1998-2004 Best Software, Inc. All rights reserved. Rev 02 Contents Chapter 1 Introduction 1 How to Use This Manual 1 Graphic
VERITAS Backup Exec TM 10.0 for Windows Servers Quick Installation Guide N134418 July 2004 Disclaimer The information contained in this publication is subject to change without notice. VERITAS Software
NetWrix USB Blocker Version 3.6 Administrator Guide Table of Contents 1. Introduction...3 1.1. What is NetWrix USB Blocker?...3 1.2. Product Architecture...3 2. Licensing...4 3. Operation Guide...5 3.1.
HP-1000 Powerline Ethernet Adapter User s manual BEFORE INSTALLATION Plan ahead the installation of your powerline network. Note: You will need at least two powerline adapters to create a powerline network.
HP-1000 Powerline USB Adapter User s manual BEFORE INSTALLATION Plan ahead the installation of your powerline network. Note: You will need at least two powerline adapters to create a powerline network.
Installation Guide Lenel OnGuard 2009 Installation Guide, product version 6.3. This guide is item number DOC-110, revision 1.038, May 2009 Copyright 1992-2009 Lenel Systems International, Inc. Information
Sophos Enterprise Console Help Product version: 5.1 Document date: June 2012 Contents 1 About Enterprise Console...3 2 Guide to the Enterprise Console interface...4 3 Getting started with Sophos Enterprise
Reporting for Contact Center Setup and Operations Guide BCM Contact Center Document Number: NN40040-302 Document Status: Standard Document Version: 04.00 Part Code: N0060637 Date: June 2006 Copyright 2005
Before you install ProSeries software for network use The following pages describe system requirements and other information you need to know before installing ProSeries software for network use. Important:
Scan to SMB(PC) Set up Guide Regarding Trade Names Windows is a registered trademark of Microsoft Corporation in the U.S.A. and/or other countries. Windows XP and Windows Vista are trademarks of Microsoft
Password Reset Server Installation Guide Windows 8 / 8.1 Windows Server 2012 / R2 Last revised: November 12, 2014 Table of Contents Table of Contents... 2 I. Introduction... 4 A. ASP.NET Website... 4 B.
This is a publication of Abila, Inc. Version 2015.x Copyright 2014 Abila, Inc. All rights reserved. Abila, the Abila logos, and the Abila product and service names mentioned herein are registered trademarks
: Managing, Maintaining, and Troubleshooting, 5e Chapter 3 Installing Windows Objectives How to plan a Windows installation How to install Windows Vista How to install Windows XP How to install Windows
Allworx OfficeSafe Operations Guide Release 6.0 No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, photocopy,
3Com exchange Call Center Quick Installation Guide Version 4.33 http://www.3com.com Part Number: 900-0150-01 Rev AA Published May 2004 3Com Corporation, 350 Campus Drive, Marlborough, MA 01752-3064 Copyright
Sage 100 ERP Installation and System Administrator s Guide This is a publication of Sage Software, Inc. Version 2014 Copyright 2013 Sage Software, Inc. All rights reserved. Sage, the Sage logos, and the
Spector 360 Deployment Guide Version 7.3 January 3, 2012 Table of Contents Deploy to All Computers... 48 Step 1: Deploy the Servers... 5 Recorder Requirements... 52 Requirements... 5 Control Center Server
Configuring the Windows XP SP2/Vista Firewall for UserLock Due to the modification of the Firewall s activation setting, that occurs when Service Pack 2 is deployed on a XP workstation, all incoming network
How To Install SQL Server 2014 Express Edition Updated: 2/4/2016 2016 Shelby Systems, Inc. All Rights Reserved Other brand and product names are trademarks or registered trademarks of the respective holders.
Hewlett Packard Enterprise Provider Electronic Solutions software lets Connecticut Medical Assistance Program providers verify patient s eligibility and submit and correct claims for services all electronically.
Test Note Phone Manager Deployment Windows Group Policy Sever 2003 and XP SPII Clients Note: I have only tested these procedures on Server 2003 SP1 (DC) and XP SPII client, in a controlled lab environment,
Installation Guide for Crossroads Software s Traffic Collision Database This guide will take you through the process of installing the Traffic Collision Database on a workstation and a network. Crossroads
Technical Brief for Windows Home Server Remote Access Microsoft Corporation Published: October, 2008 Version: 1.1 Abstract This Technical Brief provides an in-depth look at the features and functionality
Sage HRMS 2014 Sage Employee Self Service Pre-Installation Guide October 2013 This is a publication of Sage Software, Inc. Document version: October 17, 2013 Copyright 2013. Sage Software, Inc. All rights
. All right reserved. For more information about Specops Inventory and other Specops products, visit www.specopssoft.com Copyright and Trademarks Specops Inventory is a trademark owned by Specops Software.
Getting Started Symantec Mail Security for Domino About Symantec Mail Security for Domino Symantec Mail Security for Domino is a complete, customizable, and scalable solution that scans Lotus Notes database
This is a publication of Abila, Inc. Version 2014.x Copyright 2013 Abila, Inc. All rights reserved. Abila, the Abila logos, and the Abila product and service names mentioned herein are registered trademarks
Quick Install Guide Lumension Endpoint Management and Security Suite 7.1 Lumension Endpoint Management and Security Suite - 2 - Notices Version Information Lumension Endpoint Management and Security Suite
Brazosport College VPN Connection Installation and Setup Instructions Draft 2 March 24, 2005 Introduction This is an initial draft of these instructions. These instructions have been tested by the IT department
Contents Getting Started...1 Check your Computer meets the Minimum Requirements... 1 Ensure your Computer is Running in Normal Sized Fonts... 7 Ensure your Regional Settings are Correct... 9 Reboot your
1 Selected Windows XP Troubleshooting Guide To locate lost files: Compiled by: Jason M. Cohen Check these locations to locate lost files: The My Documents folder Click Start, and then click My Documents.
Hosting Users Guide 2011 eofficemgr technology support for small business Celebrating a decade of providing innovative cloud computing services to small business. Table of Contents Overview... 3 Configure
Adobe Acrobat 9 Deployment on Microsoft Windows Group Policy and the Active Directory service white paper TABLE OF CONTENTS 1. Document overview......... 1 2. References............. 1 3. Product overview..........
C ase Manag e m e n t by C l i e n t P rofiles Server & Workstation Installation of Client Profiles for Windows T E C H N O L O G Y F O R T H E B U S I N E S S O F L A W General Notes to Prepare for Installing
Accounts Production Installation Guide Copyright statement Sage (UK) Limited and Sage Hibernia Limited, 2014. All rights reserved. If this documentation includes advice or information relating to any matter
WavecrestCyBlock Client Version 2.1.13 Web-Access Security Solution UserGuide www.wavecrest.net Copyright Copyright 1996-2014, Wavecrest Computing, Inc. All rights reserved. Use of this product and this
Server Manager Diagnostics Page 653. Information. Audit Success. Audit Failure The view shows the total number of events in the last hour, 24 hours, 7 days, and the total. Each of these nodes can be expanded
VMWARE TECHNICAL NOTE VMware ACE Managing Remote Access This technical note explains how to use VMware ACE to manage remote access through VPN to a corporate network. This document contains the following
Getting started Symantec AntiVirus Corporate Edition Copyright 2004 Symantec Corporation. All rights reserved. Printed in the U.S.A. 03/04 10223881 Symantec and the Symantec logo are U.S. registered trademarks
Creating client-server setup with multiple clients Coffalyser.Net uses a SQL client server database model to store all project/experiment- related data. The client-server model has one main application
safend a w a v e s y s t e m s c o m p a n y SAFEND Data Protection Suite Installation Guide Version 3.4.5 Important Notice This guide is delivered subject to the following conditions and restrictions:
Getting started Symantec AntiVirus Business Pack Copyright 2004 Symantec Corporation. All rights reserved. Printed in the U.S.A. 03/04 Symantec and the Symantec logo are U.S. registered trademarks of Symantec
Release Notes for Websense Email Security v7.2 Websense Email Security version 7.2 is a feature release that includes support for Windows Server 2008 as well as support for Microsoft SQL Server 2008. Version
Getting Started - Client VPN Symantec Client VPN v9.0 This chapter includes the following topics: What is new in this release on page 2 System requirements on page 3 Documentation on page 3 Upgrading to
Getting started Symantec AntiVirus Corporate Edition 8.1 for Workstations and Network Servers Copyright 2003 Symantec Corporation. All rights reserved. Printed in the U.S.A. 03/03 Symantec and the Symantec
XStream Remote Control: Configuring DCOM Connectivity APPLICATION BRIEF March 2009 Summary The application running the graphical user interface of LeCroy Windows-based oscilloscopes is a COM Automation
Senior Systems Cloud Services In this guide... Senior Systems Cloud Services 1 Cloud Services User Guide 2 Working In Your Cloud Environment 3 Cloud Profile Management Tool 6 How To Save Files 8 How To
Quick Start Guide Copyright Wasp Barcode Technologies 2014 No part of this publication may be reproduced or transmitted in any form or by any means without the written permission of Wasp Barcode Technologies.
LifeCyclePlus Version 1 Last updated: 2014-04-25 Information in this document is subject to change without notice. Companies, names and data used in examples herein are fictitious unless otherwise noted.
Blackbaud FundWare Installation and Update Guide VERSION 7.60, JULY 2010 Blackbaud FundWare Installation and Update Guide USER GUIDE HISTORY Date Changes November 2000 June 2001 August 2001 January 2002
Connection and Printer Setup Guide For connection issues, see the following sections of this document: "Connection Requirements" on page 1 "Log on" on page 2 "Troubleshooting Your Connection" on page 4