FAQs for ProtexLocal Administrators
|
|
|
- Kristopher Craig
- 10 years ago
- Views:
Transcription
1 FAQs for ProtexLocal Administrators How do I set up a banned user group? Setting up a sin-bin group is straightforward as long as you remember a few key points. The sequence is: 1. Set up an AD group which will be banned. Users will be added to this group only when they are being denied Internet access. There is no need to remove users from their usual AD group - the profile given to this group will override their normal filter setting 2. In the Protex interface assign the E2BN:Banned profile to this group 3. Make sure this group/profile pair is at the top of the list. Filters are assigned from the top down: the profile assigned to the first group the user is a member of will be applied 4. Apply the changes and restart Protex We use Macs - is this a problem? No - the use of a proxy to make connections to the originating web site is completely transparent to the operating system. The only difference between Mac, Linux & Windows clients will be how to configure the browsers to use the Protex server on each desktop connected to the LAN: and this will also depend upon which network operating system and browser are being used. What about viruses? While Protex does have the facility to provide virus checking, and may do so in future, it is not currently implemented as this is a very resource-intensive operation which can have a marked impact on filtering performance. All files downloaded to a PC (whether via the Internet, or a USB stick) should be virus checked by the PC itself. In addition most webmail systems also perform virus and spam checking as do many Local Authorities and ISPs. Staff want pupils to use Blogger... Staff should set up the blogs for their students using the STAFF profile (which allows blogger/blogspot) then once they are all created give the network/filter manager a list of them. They should be of the form blogname.blogspot.com - then these individual blogs can be added 1 / 8
2 to the ContentCheck or Trusted sites lists to give pupils access to them. Trusting the whole of blogspot.com should be avoided as there are some very unsuitable blogs hosted under this domain. There are similar blogging sites (tumblr.com for example) where individual blogs may be made available but the whole site should not be listed as some of these blogs are certainly not suitable for students to view. Staff want pupils to use Flickr... The structure of the site makes it impossible to allow single accounts (e.g. a school or teacher account) to be unfiltered while still blocking the rest of the site. In order to make flickr.com available it must be added to a Trusted sites list. Which category it is added to will determine which users can access it: for example, adding it to Teaching will allow all users access while Post-16 will restrict access to users of the Sixth Form profile. Whether a site chooses to allow flickr.com to be un-filtered will depend on the ethos of the school, the level of supervision, etc. It can certainly be a useful resource and one that students may be using at home but if allowed the Academy or School's senior management must be aware that there are some images on the site which may be considered unsuitable for viewing in school. Students have used a Site Builder at home - why can't they work on their site in school? If your students have their created their own sites hosted on one one of the many free Site Builders which are currently blocked you can make it available in several ways. Preferably you should look at the URL of the site and see whether this particular site/account can be made available without unblocking the whole Site Builder. However, the way companies create and maintain accounts on such sites varies (and changes from time to time) so it is not always possible to unblock individual accounts and/or sites. In this case the whole site would need to be listed which will make all others sites built and hosted 2 / 8
3 there available as well. You will need to investigate the other sites' content and then decide whether making it available in school is appropriate. As an added complication most of these sites require some of all of it to be available over https which will require the site to be Trusted and not merely ContentChecked so that no filtering at all will be possible on any of the other hosted sites. Admin menu not working with IE9 The Protex menu is designed to work in IE9, Firefox and Chrome but it will not display correctly in IE9's compatibility mode. If IE9's Intranet Settings have been enabled previously then it is likely that the page is being displayed in compatibility mode as this is the IE9 default security setting for intranet sites. The exact setting to change depends to some extent on what setting have already been selected but the following options may help find one that works for you. (1) Go to the Tools -> Compatibility View dialog box to uncheck the item "Display intranet sites in Compatibility View" (2) Go to Tools -> Internet options -> Security. Click on Local Intranet then on Sites. In the dialog box uncheck the item "Include all sites that bypass the proxy server". You may need to reload the page and/or restart IE9 to enable the changes. Pupils cannot download files... Protex will prevent certain file types from being downloaded from non-trusted sites (see here for more about Trusted sites, etc.). Which file types are blocked is controlled by the filter profile in use - the STAFF profile is much less strict than the student profiles. 3 / 8
4 For sites listed as Trusted no filtering at all is applied and all file types can be downloaded by all profiles. If there are some file types you would like your pupils to be able to download that are currently blocked (.zip for example) you can create a Local Profile to allow this. See the Protex documentation for details on how to create and edit a Local Profile. How can staff see effect of student profile? If you are using AD/NTLM authentication then it is possible to allow any Group/Profile pair to change their current profile to another. This could be useful for staff to, for example, check that a site they want to use is available to their students. In the Documentation (v3) go to Profiles -> Assign by... -> NTLM based filtering for more details. Checking the "Override" box will cause a drop down menu of configured profiles to be available in the "Logged in" window. Selecting a profile here will swap the profile in use for subsequent requests. How do I block or allow a URL for a specific profile? There are age/profile specific categories to allow you to modify the URLs that specific profiles can access: - Pre-9 Block: block PRIMARY profile only - Pre-12 Block: block MIDDLE, PRIMARY profile - Pre-16 Block: block SECONDARY, MIDDLE, & PRIMARY - Pre-18 Block: block SIXTH FORM, SECONDARY, MIDDLE, & PRIMARY - Post-16 Only: allow for SIXTH FORM & STAFF only - Post-12 Only: allow for SECONDARY, SIXTH FORM & STAFF only - Post-9 Only: allow for MIDDLE, SECONDARY, SIXTH FORM & STAFF only As an example, suppose that you want to modify the sites that sixth formers can access. To do this, add the URL as normal in the appropriate category: To BLOCK a URL: Add the URL to block lists under category 'Pre-18 Block'. To ALLOW a URL: Add the URL to allow lists (Tusted or ContentChecked) under category 'Post-16 Only'. Then 4 / 8
5 restart Protex to confirm the list changes. For other profiles the process is similar but you must remember that the (un)blocking is cumulative. For example, blocking a URL to the MIDDLE profile will also block it to the PRIMARY one. Similarly, allowing a URL to MIDDLE will allow it for the SECONDARY, SIXTH FORM and STAFF ones but not the PRIMARY profile. How do I block a site (e.g facebook.com) to staff facebook.com is set up as a ContentChecked site for adults in the central lists. To block it for all users including staff put facebook.com in the 'LocalBlockAll' category. Restart to confirm the list change. How do I block BBC's iplayer The BBC site - bbc.co.uk - is listed centrally as a trusted site so no local changes to block parts of the BBC site will have any effect as its Trusted status will take precedence. As iplayer will fall back to running over port 80 (by default it uses port 1935 but will try 80 an 443 if it cannot connect over that one) blocking 1935 on the firewall will have no effect. It is possible to block iplayer but only by removing the BBC's Trusted status and having it subject to the normal Protex filter rules so parts of the site may be blocked depending upon the content of the page. Also some file downloads will be blocked in common with other untrusted sites. Whether you see this as an advantage or disadvantage will depend upon your school. If you still wish to block iplayer then: - go to 'Add items to lists' and add bbc.co.uk to a content check category - this will override the central "trusted" status. - go to 'Add items to lists' and add bbc.co.uk/iplayer to the 'to block' list in the appropriate category. For example, to block to students but allow staff access then add it to the Adult category 5 / 8
6 - Restart protex to confirm list changes Windows clients need to log in to protex By default these operating systems use NTLMv2 with NTLMv1 turned off. In order for these clients to communicate with the Protex server they must be able to use NTLMv1 when requested. WinXP(SP2) using AD Group Policy: Computer config > Policies > Security Settings > Local Policies > Security Options Find Network security: LAN Manager authentication level and set to Send LM & NTLM responses Find Network security: Minimum session security for NTLM SSP based (including secure RPC) Clients - check "define these policy settings" - uncheck all other options Windows 7 / Vista Click Start -> Run 6 / 8
7 In the Run field type: secpol.msc - that will bring you to Vista's security policy system. Then go to: Local Policies > Security Options Navigate to the policy Network Security: LAN Manager authentication level and open it. Then change the Setting from Send NTLMv2 response only to Send LM & NTLM -- use NTLMv2 session security if negotiated. Alternatively another very similar solution (Windows 7/Vista) appears to be: Control Panel -> Administrative Tools -> Local Security Policy Local Policies - Security Options Network security: LAN Manager authentication level Send LM & NTLM -- use NTLMv2 session security if negotiated set: Minimum session security for NTLM SSP and Disable Require 128-bit encryption 7 / 8
8 ENDFAQ {accordionfaq faqid=accordion2 faqclass="smoothnessfaq defaulticon headerbackground headerborder contentbackground contentborder round5"} 8 / 8
Name Services (DNS): This is Quick rule will enable the Domain Name Services on the firewall.
How to configure quick set up rules You can configure rules/policies using Quick setup to get the Firewall up and running in no time. To do this log in to the Firewall, browse to Firewall > Policies >
User Guide. Hosted Web Security. Copyright CensorNet Limited, 2007-2012
User Guide Hosted Web Security Copyright CensorNet Limited, 2007-2012 This document is designed to provide information about the first time configuration and administrator use of the Hosted Web Security
How-to: HTTP-Proxy and Radius Authentication and Windows IAS Server settings. Securepoint Security System Version 2007nx
Securepoint Security System Version 2007nx HTTP proxy authentication with radius to a Windows 2003 server The Remote Authentication Dial-In User Service (RADIUS) is a client-server-protocol which is used
How to configure your Windows PC post migrating to Microsoft Office 365
How to configure your Windows PC post migrating to Microsoft Office 365 1 Contents Purpose... 3 Document Support Boundaries... 3 Examples used in this document... 4 Several different Microsoft Office 365
Configuring your email client to connect to your Exchange mailbox
Configuring your email client to connect to your Exchange mailbox Contents Use Outlook Web Access (OWA) to access your Exchange mailbox... 2 Use Outlook 2003 to connect to your Exchange mailbox... 3 Add
Allworx OfficeSafe Operations Guide Release 6.0
Allworx OfficeSafe Operations Guide Release 6.0 No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, photocopy,
How to Join QNAP NAS to Microsoft Active Directory (AD)
How to Join QNAP NAS to Microsoft Active Directory (AD) What is Active Directory? Active Directory is a Microsoft directory used in Windows environments to centrally store, share, and manage the information
Movie Cube. User s Guide to Wireless Function
Movie Cube User s Guide to Wireless Function Table of Contents 1. WLAN USB Adapter Connection...3 2. Wireless Setup...4 2.1 Infrastructure (AP)...5 2.2 Peer to Peer (Ad Hoc)...7 2.3 Settings for PC...8
FAQ. How does the new Big Bend Backup (powered by Keepit) work?
FAQ How does the new Big Bend Backup (powered by Keepit) work? Once you establish which of the folders on your hard drive you ll be backing up, you ll log into myaccount.bigbend.net and from your control
isupplier PORTAL ACCESS SYSTEM REQUIREMENTS
TABLE OF CONTENTS Recommended Browsers for isupplier Portal Recommended Microsoft Internet Explorer Browser Settings (MSIE) Recommended Firefox Browser Settings Recommended Safari Browser Settings SYSTEM
Use the below instructions to configure your wireless settings to connect to the secure wireless network using Microsoft Windows Vista/7.
Use the below instructions to configure your wireless settings to connect to the secure wireless network using Microsoft Windows Vista/7. 1. Click the Windows Start button, then Control Panel How-To-WCC-Secure-Windows-7-11/4/2010-4:09
A Guide to New Features in Propalms OneGate 4.0
A Guide to New Features in Propalms OneGate 4.0 Propalms Ltd. Published April 2013 Overview This document covers the new features, enhancements and changes introduced in Propalms OneGate 4.0 Server (previously
Configuring SSL VPN on the Cisco ISA500 Security Appliance
Application Note Configuring SSL VPN on the Cisco ISA500 Security Appliance This application note describes how to configure SSL VPN on the Cisco ISA500 security appliance. This document includes these
Weston Public Schools Virtual Desktop Access Instructions
Instructions for connecting to the Weston Schools Virtual Desktop Environment Notes: You will have to have administrator permission on your computer in order to install a VMWare Client application which
Getting Started Guide
Getting Started Guide CensorNet Professional Copyright CensorNet Limited, 2007-2011 This document is designed to provide information about the first time configuration and testing of the CensorNet Professional
Configuration Manual English version
Configuration Manual English version Frama F-Link Configuration Manual (EN) All rights reserved. Frama Group. The right to make changes in this Installation Guide is reserved. Frama Ltd also reserves the
WINDOWS 7 & HOMEGROUP
WINDOWS 7 & HOMEGROUP SHARING WITH WINDOWS XP, WINDOWS VISTA & OTHER OPERATING SYSTEMS Abstract The purpose of this white paper is to explain how your computers that are running previous versions of Windows
Email client configuration guide. Business Email
Email client configuration guide Business Email August 2013 Contents 1. Mac Email Clients 1.1 Downloading Microsoft Outlook (Professional Plan Users) 1.2 Configuring Microsoft Outlook (Full Exchange Server
Introduction to the AirWatch Browser Guide
Introduction to the AirWatch Browser Guide The AirWatch Browser application provides a safe, accessible and manageable alternative to Internet browsing using native device browsers. The AirWatch Browser
Creating a User Profile for Outlook 2013
Creating a User Profile for Outlook 2013 This document tells you how to create a user profile for Outlook 2013 on your computer (also known as the Outlook client). This is necessary, for example, when
Exchange 2013 mailbox setup guide
Fasthosts Customer Support Exchange 2013 mailbox setup guide This article covers the setup of Exchange 2013 mailboxes in Microsoft Outlook 2013, 2010 and Outlook 2011 for Mac. Contents Exchange 2013 Mailbox
CC File Transfer. User Manual
CC File Transfer User Manual Youngzsoft 2008 0 1 Index 1 Introduction...2 2 Features...3 3 Installation...4 4 FAQs...11 5 Contact...12 1 2 Introduction CC File Transfer is web based file transfer software
Troubleshooting AVAYA Meeting Exchange
Troubleshooting AVAYA Meeting Exchange Is my browser supported? Avaya Web Conferencing supports the following browser clients for joining conferences (with the described limitations). The supported browsers
EZblue BusinessServer The All - In - One Server For Your Home And Business
EZblue BusinessServer The All - In - One Server For Your Home And Business Quick Start Guide Version 3.8 1 2 3 EZblue Server Overview EZblue Server Installation EZblue Server Configuration 4 EZblue Magellan
User Guide. You will be presented with a login screen which will ask you for your username and password.
User Guide Overview SurfProtect is a real-time web-site filtering system designed to adapt to your particular needs. The main advantage with SurfProtect over many rivals is its unique architecture that
Reason 8 Multi Licenses
MULTI LICENSES The information in this document is subject to change without notice and does not represent a commitment on the part of Propellerhead Software AB. The software described herein is subject
How To Set Up Dataprotect
How To Set Up Dataprotect This document will show you how to install and configure your computer for a Typical installation. If you have questions about configuring a Custom installation please contact
VPN Web Portal Usage Guide
VPN Web Portal Usage Guide Table of Contents WHAT IS VPN WEB CLIENT 4 SUPPORTED WEB BROWSERS 4 LOGGING INTO VPN WEB CLIENT 5 ESTABLISHING A VPN CONNECTION 6 KNOWN ISSUES WITH MAC COMPUTERS 6 ACCESS INTRANET
EZblue BusinessServer The All - In - One Server For Your Home And Business
EZblue BusinessServer The All - In - One Server For Your Home And Business Quick Start Guide Version 3.11 1 2 3 EZblue Server Overview EZblue Server Installation EZblue Server Configuration 4 EZblue Magellan
SCADA Security. Enabling Integrated Windows Authentication For CitectSCADA Web Client. Applies To: CitectSCADA 6.xx and 7.xx VijeoCitect 6.xx and 7.
Enabling Integrated Windows Authentication For CitectSCADA Web Client Applies To: CitectSCADA 6.xx and 7.xx VijeoCitect 6.xx and 7.xx Summary: What is the difference between Basic Authentication and Windows
Collax Web Security. Howto. This howto describes the setup of a Web proxy server as Web content filter.
Collax Web Security Howto This howto describes the setup of a Web proxy server as Web content filter. Requirements Collax Business Server Collax Security Gateway Collax Platform Server including Collax
Allworx Installation Course
VPN Hello and welcome. In the VPN section we will cover the steps for enabling the VPN feature on the Allworx server and how to set up a VPN connection to the Allworx System from your PC. Page 1 VPN The
MultiSite Manager. Setup Guide
MultiSite Manager Setup Guide Contents 1. Introduction... 2 How MultiSite Manager works... 2 How MultiSite Manager is implemented... 2 2. MultiSite Manager requirements... 3 Operating System requirements...
WA1791 Designing and Developing Secure Web Services. Classroom Setup Guide. Web Age Solutions Inc. Web Age Solutions Inc. 1
WA1791 Designing and Developing Secure Web Services Classroom Setup Guide Web Age Solutions Inc. Web Age Solutions Inc. 1 Table of Contents Part 1 - Minimum Hardware Requirements...3 Part 2 - Minimum Software
Hosted Microsoft Exchange Client Setup & Guide Book
Hosted Microsoft Exchange Client Setup & Guide Book Section 1 Microsoft Outlook Web Access (OWA) access directions Section 2 Windows 10 Mail App setup & configuration Section 3 Windows Mobile Phone ActiveSync
Infor Xtreme Browser References
Infor Xtreme Browser References This document describes the list of supported browsers, browser recommendations and known issues. Contents Infor Xtreme Browser References... 1 Browsers Supported... 2 Browser
QUANTIFY INSTALLATION GUIDE
QUANTIFY INSTALLATION GUIDE Thank you for putting your trust in Avontus! This guide reviews the process of installing Quantify software. For Quantify system requirement information, please refer to the
Citrix Access on SonicWALL SSL VPN
Citrix Access on SonicWALL SSL VPN Document Scope This document describes how to configure and use Citrix bookmarks to access Citrix through SonicWALL SSL VPN 5.0. It also includes information about configuring
The PostBase Connectivity Wizard
The PostBase Connectivity Wizard The PostBase Connectivity Wizard allows you to easily set up your PostBase postage machine to suit your organization s arrangements. This document will guide you through
Configuring a Softphone for Windows for Virtual Contact Center
Configuring Bria 3 for Virtual Contact Center Configuring a Softphone for Windows for Virtual Contact Center 8x8 issues softphone licenses to Virtual Contact Center customers allowing them to manage all
Download and Launch Instructions for WLC Client App Program
Download and Launch Instructions for WLC Client App Program Version 1.0 Contents Introduction... 1 Windows 7, IE9... 2 Windows 7 or XP, IE8... 3 Windows 7 or XP, Firefox... 4 Windows 7, Google Chrome...
8x8 Virtual Office Telephony Interface for Salesforce
8x8 Virtual Office Telephony Interface for Salesforce Administrator Guide May 2014 The Champion For Business Communications Table of Contents 8x8 Virtual Office Telephony Interface for Salesforce.... 3
USER GUIDE WWPass Security for Windows Logon
USER GUIDE WWPass Security for Windows Logon December 2015 TABLE OF CONTENTS Chapter 1 Welcome... 3 Introducing WWPass Security for Windows Logon... 4 Related Documentation... 4 Presenting Your PassKey
Professional Mailbox Email Software Setup Guide
Professional Mailbox Email Software Setup Guide Table of contents Download and Install Microsoft Outlook 2010 or 2011... 2 Enabling access from email software... 4 Setting up Outlook 2010... 6 Before you
ComTrader Technical Requirements
Technical Requirements 11. Februar 2011 Technical Requirements Change History Version Date Author Reason 1.0 07.01.2010 DBS Creation 1.1 06.10.2010 DBS Upgrade to 25.10.00 2.0 20.01.2011 DBS Adaptation
ENABLING RPC OVER HTTPS CONNECTIONS TO M-FILES SERVER
M-FILES CORPORATION ENABLING RPC OVER HTTPS CONNECTIONS TO M-FILES SERVER VERSION 2.3 DECEMBER 18, 2015 Page 1 of 15 CONTENTS 1. Version history... 3 2. Overview... 3 2.1. System Requirements... 3 3. Network
Dell SonicWALL SRA 7.5 Citrix Access
Dell SonicWALL SRA 7.5 Citrix Access Document Scope This document describes how to configure and use Citrix bookmarks to access Citrix through Dell SonicWALL SRA 7.5. It also includes information about
Sophos UTM Software Appliance
Sophos UTM Software Appliance Quick Start Guide Product version: 9.300 Document date: Monday, December 01, 2014 Sophos UTM Minimum Hardware Requirements Intel compatible CPU 1.5 GHz+ 1 GB RAM (2 GB recommended)
Release Notes. SonicOS 6.1.2.0 is the initial release for the Dell SonicWALL NSA 2600 network security appliance.
SonicOS SonicOS Contents Release Purpose... 1 Platform Compatibility... 1 Upgrading Information... 1 Browser Support... 1 Feature Information... 2 Known Issues... 2 Resolved Issues... 4 Release Purpose
The SSL device also supports the 64-bit Internet Explorer with new ActiveX loaders for Assessment, Abolishment, and the Access Client.
WatchGuard SSL v3.2 Release Notes Supported Devices SSL 100 and 560 WatchGuard SSL OS Build 355419 Revision Date January 28, 2013 Introduction WatchGuard is pleased to announce the release of WatchGuard
Quickstart guide to Configuring WebTitan
Quickstart guide to Configuring WebTitan 1. Install the License Once you have received the evaluation license by e-mail, you log on to WebTitan as follows using a browser as admin/hiadmin. Then navigate
How To Set Up A Vpn Tunnel Between Winxp And Zwall On A Pc 2 And Winxp On A Windows Xp 2 On A Microsoft Gbk2 (Windows) On A Macbook 2 (Windows 2) On An Ip
WINXP VPN to ZyWALL Tunneling 1. Setup WINXP VPN 2. Setup ZyWALL VPN This page guides us to setup a VPN connection between the WINXP VPN software and ZyWALL router. There will be several devices we need
F-Secure Internet Gatekeeper Virtual Appliance
F-Secure Internet Gatekeeper Virtual Appliance F-Secure Internet Gatekeeper Virtual Appliance TOC 2 Contents Chapter 1: Welcome to F-Secure Internet Gatekeeper Virtual Appliance.3 Chapter 2: Deployment...4
Web Security Service
Webroot Web Security Service Desktop Web Proxy Configuration Guide Webroot Software, Inc. 385 Interlocken Crescent Suite 800 Broomfield, CO 80021 www.webroot.com Desktop Web Proxy Configuration Guide September
How to Remotely View Security Cameras Using the Internet
How to Remotely View Security Cameras Using the Internet Introduction: The ability to remotely view security cameras is one of the most useful features of your EZWatch Pro system. It provides the ability
Introduction. Installation of SE S AM E BARCODE virtual machine distribution. (Windows / Mac / Linux)
Installation of SE S AM E BARCODE virtual machine distribution (Windows / Mac / Linux) Introduction A "virtual machine" is a fake computer within a true one. An underlying software (here VirtualBox) is
Configuring the WT-4 for ftp (Infrastructure Mode)
Introduction En Configuring the WT-4 for ftp (Infrastructure Mode) This document provides basic instructions on configuring the WT-4 wireless transmitter and a ftp server for transmission over an infrastructure
Version 1.0. 2012 Devolutions inc.
Version 1.0 2 Remote Desktop Manager Server (Version 1.0) Table of Contents Foreword Part I Getting Started 0 4 1 What is... Remote Desktop Manager Server? 4 2 Features... 5 3 System... Requirements 6
Secure Web Appliance. SSL Intercept
Secure Web Appliance SSL Intercept Table of Contents 1. Introduction... 1 1.1. About CYAN Secure Web Appliance... 1 1.2. About SSL Intercept... 1 1.3. About this Manual... 1 1.3.1. Document Conventions...
Introduction... 2. Requesting a VPN Account... 2. Accessing the Citrix Access Gateway (CAG)... 3. Tips and Tricks... 9
NWI Research VPN Basics Table of Contents Introduction... 2 Requesting a VPN Account... 2 Accessing the Citrix Access Gateway (CAG)... 3 Tips and Tricks... 9 Back up Your Favorites and Desktop Folders
SELF SERVICE RESET PASSWORD MANAGEMENT WEB INTERFACE GUIDE
SELF SERVICE RESET PASSWORD MANAGEMENT WEB INTERFACE GUIDE Copyright 1998-2015 Tools4ever B.V. All rights reserved. No part of the contents of this user guide may be reproduced or transmitted in any form
Network Connect Installation and Usage Guide
Network Connect Installation and Usage Guide I. Installing the Network Connect Client..2 II. Launching Network Connect from the Desktop.. 9 III. Launching Network Connect Pre-Windows Login 11 IV. Installing
HELP DOCUMENTATION SSRPM WEB INTERFACE GUIDE
HELP DOCUMENTATION SSRPM WEB INTERFACE GUIDE Copyright 1998-2013 Tools4ever B.V. All rights reserved. No part of the contents of this user guide may be reproduced or transmitted in any form or by any means
DESLock+ Basic Setup Guide Version 1.20, rev: June 9th 2014
DESLock+ Basic Setup Guide Version 1.20, rev: June 9th 2014 Contents Overview... 2 System requirements:... 2 Before installing... 3 Download and installation... 3 Configure DESLock+ Enterprise Server...
RMS Cloud - Setup Instructions for Windows Computers
RMS Cloud - Setup Instructions for Windows Computers Please follow these instructions on each windows computer that requires a connection to the RMS Cloud system. If you are using a Mac, please see the
Sharp Remote Device Manager (SRDM) Server Software Setup Guide
Sharp Remote Device Manager (SRDM) Server Software Setup Guide This Guide explains how to install the software which is required in order to use Sharp Remote Device Manager (SRDM). SRDM is a web-based
Hosted Microsoft Exchange Client Setup & Guide Book
Hosted Microsoft Exchange Client Setup & Guide Book Section 1 Microsoft Outlook Web Access (OWA) access directions Section 2 Windows Mobile Phone ActiveSync setup & configuration Section 3 - Apple iphone
CYAN SECURE WEB HOWTO. NTLM Authentication
CYAN SECURE WEB HOWTO June 2008 Applies to: CYAN Secure Web 1.4 and above NTLM helps to transparently synchronize user names and passwords of an Active Directory Domain and use them for authentication.
How to Configure Active Directory based User Authentication
How to Configure Active Directory based User Authentication You Must Have: Microsoft server with Active Directory configured. Windows 2000 Server is configured as Active Directory server in this example.
User Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream
User Manual Onsight Management Suite Version 5.1 Another Innovation by Librestream Doc #: 400075-06 May 2012 Information in this document is subject to change without notice. Reproduction in any manner
VNC User Guide. Version 5.0. June 2012
VNC User Guide Version 5.0 June 2012 Trademarks VNC is a registered trademark of RealVNC Ltd. in the U.S. and in other countries. Other trademarks are the property of their respective owners. Protected
2X Cloud Portal v10.5
2X Cloud Portal v10.5 URL: www.2x.com E-mail: [email protected] Information in this document is subject to change without notice. Companies, names, and data used in examples herein are fictitious unless otherwise
4-441-095-12 (1) Network Camera
4-441-095-12 (1) Network Camera SNC easy IP setup Guide Software Version 1.0 Before operating the unit, please read this manual thoroughly and retain it for future reference. 2012 Sony Corporation Table
SSL-VPN 200 Getting Started Guide
Secure Remote Access Solutions APPLIANCES SonicWALL SSL-VPN Series SSL-VPN 200 Getting Started Guide SonicWALL SSL-VPN 200 Appliance Getting Started Guide Thank you for your purchase of the SonicWALL SSL-VPN
If you have questions or find errors in the guide, please, contact us under the following e-mail address:
1. Introduction... 2 2. Remote Access via PPTP... 2 2.1. Configuration of the Astaro Security Gateway... 3 2.2. Configuration of the Remote Client...10 2.2.1. Astaro User Portal: Getting Configuration
Stealth OpenVPN and SSH Tunneling Over HTTPS
Stealth OpenVPN and SSH Tunneling Over HTTPS Contents Tunneling OpenVPN and SSH via HTTPS for Windows,MAC and Linux... 1 Benefits of HTTPS Tunneling:... 2 Pre-Requisites:... 3 Part A: Step by Step Instructions
DESKTOP CLIENT CONFIGURATION GUIDE BUSINESS EMAIL
DESKTOP CLIENT CONFIGURATION GUIDE BUSINESS EMAIL Version 2.0 Updated: March 2011 Contents 1. Mac Email Clients... 3 1.1 Configuring Microsoft Outlook 2011... 3 1.2 Configuring Entourage 2008... 4 1.3.
Instructions for Configuring Your Browser Settings and Online Security FAQ s. ios8 Settings for iphone and ipad app
Instructions for Configuring Your Browser Settings and Online Security FAQ s ios8 Settings for iphone and ipad app General Settings The following browser settings and plug-ins are required to properly
If you are not using a network environment (i.e. USB connection only) If you are using the printer in a network environment
This document describes how to setup the printer when you are using an operating system equipped with Windows Firewall such as Windows XP Service Pack 2. Make sure that you read the
Safe internet for business use: Getting Started Guide
Safe internet for business use: Getting Started Guide Table of Contents 1. Preface 1 2. Before You Install 2 2.1 Disabling Firewalls 2 2.2 About Accelerators 3 3. About Profiles 4 4. Installation and Initial
HomeNet. Gateway User Guide
HomeNet Gateway User Guide Gateway User Guide Table of Contents HomeNet Gateway User Guide Gateway User Guide Table of Contents... 2 Introduction... 3 What is the HomeNet Gateway (Gateway)?... 3 How do
MaaS360 Mobile Enterprise Gateway
MaaS360 Mobile Enterprise Gateway Administrator Guide Copyright 2013 Fiberlink Communications Corporation. All rights reserved. Information in this document is subject to change without notice. The software
Maintaining the Content Server
CHAPTER 7 This chapter includes the following Content Server maintenance procedures: Backing Up the Content Server, page 7-1 Restoring Files, page 7-3 Upgrading the Content Server, page 7-5 Shutting Down
USG40HE Content Filter Customization
USG40HE Content Filter Customization This guide is designed to help with the setup of the ZyWALL s content filtering feature. Supported Devices USG40HE Firmware version 4.10(AALA.0) or later Overview Content
Using a custom certificate for SSL inspection
Using a custom certificate for SSL inspection This recipe shows how use a FortiGate unit to generate a custom certificate signing request and to get this certificate signed by an enterprise root Certificate
XStream Remote Control: Configuring DCOM Connectivity
XStream Remote Control: Configuring DCOM Connectivity APPLICATION BRIEF March 2009 Summary The application running the graphical user interface of LeCroy Windows-based oscilloscopes is a COM Automation
Email Quick-Start Guide
For TradeMark Media s email system Thank you for choosing TradeMark Media for your email hosting. You ve made a wise choice. TradeMark Media offers comprehensive spam and virus protection, POP3 and WebMail
TROUBLESHOOTING INFORMATION
TROUBLESHOOTING INFORMATION VinNOW Support does not support Microsoft products to include SQL Server,.NET Framework, and also cannot assist with Windows User issues, Network or VPN issues. If installing
MaaS360 Mobile Enterprise Gateway
MaaS360 Mobile Enterprise Gateway Administrator Guide Copyright 2014 Fiberlink, an IBM Company. All rights reserved. Information in this document is subject to change without notice. The software described
Lytecube Technologies. EnCircle Automation. User Guide
Lytecube Technologies EnCircle Automation User Guide Lytecube Technologies 1/1/2009 Contents Installation... 3 Using Encircle... 3 Launching EnCircle as a desktop application... 3 Logon Screen... 3 EnCircle
SSL Intercept Mode. Certificate Installation Guide. Revision 1.0.0. Warning and Disclaimer
SSL Intercept Mode Certificate Installation Guide Revision 1.0.0 Warning and Disclaimer This document is designed to provide information about the configuration of CensorNet Professional. Every effort
OPC Server Machine Configuration
OPC Server Machine Configuration General Information For remote OPC Server operation, server must be running under Windows XP Pro, Windows Server 2003, Windows Vista (Business & Ultimate), Windows 7 (Professional
Docufide Client Installation Guide for Windows
Docufide Client Installation Guide for Windows This document describes the installation and operation of the Docufide Client application at the sending school installation site. The intended audience is
Cloud Help for Community Managers...3. About Jive Anywhere...4. Jive Anywhere System Requirements...5. Managing Jive Anywhere...6
Anywhere Contents 2 Contents Cloud Help for Community Managers...3 About Jive Anywhere...4 Jive Anywhere System Requirements...5 Managing Jive Anywhere...6 Installing the Extended API JAR File...6 Post-Installation
Wireless G Broadband quick install
Wireless G Broadband Router quick install guide Model 503693 INT-503693-QIG-0608-02 Thank you for purchasing the INTELLINET NETWORK SOLUTIONS Wireless G Broadband Router, Model 503693. This quick install
SecuraLive ULTIMATE SECURITY
SecuraLive ULTIMATE SECURITY Home Edition for Windows USER GUIDE SecuraLive ULTIMATE SECURITY USER MANUAL Introduction: Welcome to SecuraLive Ultimate Security Home Edition. SecuraLive Ultimate Security
Quick Installation Guide
V48.01 Model: FI8919W Quick Installation Guide Outdoor Pan/Tilt Wireless IP Camera For Windows OS ------- Page 1 For MAC OS ------- Page 15 ShenZhen Foscam Intelligent Technology Co., Ltd Quick Installation
Astaro Security Gateway V8. Remote Access via SSL Configuring ASG and Client
Astaro Security Gateway V8 Remote Access via SSL Configuring ASG and Client 1. Introduction This guide contains complementary information on the Administration Guide and the Online Help. If you are not
AVG Business SSO Partner Getting Started Guide
AVG Business SSO Partner Getting Started Guide Table of Contents Overview... 2 Getting Started... 3 Web and OS requirements... 3 Supported web and device browsers... 3 Initial Login... 4 Navigation in
