Setup process for a secure workstation

Size: px
Start display at page:

Download "Setup process for a secure workstation"

Transcription

1 Setup process for a secure workstation This is a work in progress. Version - 5/15/08 Billions of people use computers running Microsoft software. Microsoft has therefore made a quite understandable decision to set up its products so as to operate smoothly right out of the box for the majority of people. Many computer users don t know a great deal about the inner workings of computers and operating systems, nor do they need to. However, there are a few things that should be done to secure Microsoft Windows prior to putting into use. This guide is designed to let the average computer user make a home PC or personal laptop much more protected against penetration by a hacker. I have tried to make these instructions fairly comprehensive, but there is room for improvement in anything. If you have any suggestions, clarifications or corrections, please contact me at: infosec@uc.edu A few notes before we begin: Where you see (RC) it indicates that you should Right Click the indicated item vs. left clicking as usual. [#] The number in square brackets indicates the number of minutes this step took me in my trial. Your experience may differ. I do usually not give specific instruction steps for clicking Apply, Save or OK. These steps are implied by the instructions. One last thing: Remember one immutable law of security. Physical access trumps almost any technical protections you may put in place. If you have a laptop, never leave it unattended. If it is stolen, a hacker will have unlimited time to break through your security. Buy and use a locking cable. Install a strong encryption package. None of the below will protect your system or data if a technically-minded thief has possession of your computer. If you think you are safe, consider this: That being said, let s protect your machine from other types of attacks. All the steps below, including the clean install of Windows XP, took less than 4 hours. On with the process

2 1. If possible start with a Clean install of Windows XP SP2. I do not recommend using any earlier version. This version fixed many significant security issues. [~70 minutes] Go to Device Manager. Two of the ways to do this are: (Start > My Computer (RC) > Properties, Hardware Tab, Device Manager Button) Note: Some systems may say View System Information instead Properties above and make sure all your devices are working properly. Anything with a yellow exclamation point should be fixed. Consult your documentation or contact support if you need help to resolve these.

3 2. Customize Start Menu to add System Administrative Tools. [1] To get to Customize Start Menu, Right click Start > Properties If your PC does not have Start > Properties, go to Start > Control Panel. Switch to Classic view using the link on the left panel and then select Taskbar and Start Menu If you prefer the Category View of Control Panel, Taskbar and Start Menu is under the Appearance and Themes category Go to Advanced tab Configure Start Menu Items to taste and add System Administrative Tools to your menu as shown: 3. Create a non-administrator user account for normal use. [3] Start > Control Panel > User Accounts Enter the user name you desire and press Next Set to Limited Account and Click Create

4 Click on the new account Add a strong password. See for tips. 4. Go to Computer Management [3] Two ways to get to it: Click Start > My Computer (RC) > Manage Click Start > All Programs > Administrative Tools > Computer Management Secure the user accounts: Delete all unnecessary accounts (support, HelpAssistant, etc ) by right clicking each in turn and selecting Delete

5 The Guest account cannot be deleted, but it should already be disabled. (This is shown by the red x over the account.) Leave this account disabled. Set a strong password on all active accounts (including Administrator). For tips on how to select a strong password see: Click Disk Management in the left pane (green arrow) and verify that all disk partitions are formatted with NTFS (indicated by red arrow)

6 If the disk is not NTFS and you have the option of converting it, you should do so. NTFS has many more security options than any of the FAT versions. Note: Although the chance of corruption or data loss during the conversion is minimal, it is recommended that you perform a backup of the data on the volume that you want to convert before you start the conversion. To convert an existing FAT or FAT32 volume to NTFS, follow these steps: 1. Click Start > All Programs > Accessories > Command Prompt 2. At the command prompt, type the following, where drive letter is the drive that you want to convert: convert drive letter: /fs:ntfs For example, type the following command to convert drive E to NTFS: convert e: /fs:ntfs Note: If the operating system is on the drive that you are converting, you will be prompted to schedule the task when you restart the computer because the conversion cannot be completed while the operating system is running. When you are prompted, click YES 3. When you receive the following message at the command prompt, type the volume label of the drive that you are converting, and then press ENTER: The type of the file system is FAT. Enter the current volume label for drive drive letter 4. When the conversion to NTFS is complete, you receive the following message at the command prompt: Conversion complete 5. Quit the command prompt. 5. Set a screen saver and set the system to require a password upon resume. [1] Right Click anywhere on the desktop and select Properties Select the Screen Saver tab. Select your preferred Screen Saver. Be sure to check On resume, password protect as shown 6. Open your My Documents folder, then select Tools and Folder Options [1]

7 Under Hidden files and folders, set Show hidden files and folders for the time being (you can set this one back to hide after we are done) Scroll to the bottom and uncheck Use simple file sharing (this one you will want to keep this way) 7. Review and modify file permissions on your hard drives. [3] Open My Computer. Right click on your main hard drive and select Properties On the Sharing tab, remove the default share by clicking Do not share this folder

8 On the Security tab, remove the Everyone group from file permissions by selecting it and pressing the delete key. Repeat this for any other hard drives that might be connected to your computer More permission setting advice can be found here, but this may be more detail than most users need to worry about 8. Secure and optimize the network adapters. [10] There are a number of conceptual details involved in the following that I will not explain in detail, but the main point of these steps is to allow you to have networking between computers inside your home using a different protocol than the one used by your computer to communicate with the internet. These steps dramatically improve the security of your system in several ways. Details may be had be reviewing the references below.

9 Install NetBEUI (This is a protocol that will be used to allow file and print sharing on your local network without exposing your files to the internet by using TCP/IP) Insert the Windows XP CD-ROM into the CD-ROM drive. Navigate to the Valueadd\MSFT\Net\NetBEUI folder. Copy NBF.SYS to the %SYSTEMROOT%\System32\Drivers directory. Copy NETNBF.INF to the %SYSTEMROOT%\Inf hidden directory. Click Start > Control Panel and double-click Network Connections Right-click the adapter where NetBEUI is to be added (Local Area Connection) then click Properties On General tab, click Install Click Protocol then click Add Select NetBEUI Protocol from the list and then click OK

10 Restart computer if prompted. NetBEUI should be installed and functional Select Internet Protocol (TCP/IP) and click Properties On the General tab, click Advanced On the WINS tab, click the Add button and enter the address , click Disable NetBIOS over TCP/IP, and uncheck Enable LMHOST lookup as shown (This will have to be done for each connection with TCP/IP installed) Close out of all those windows so that you are back in Start > Control Panel > Network Connections, click the Advanced menu (to the right of Tools in the button bar) and select the Advanced Settings option

11 In the top window, set the order of connections. You should put the connection you use most at the top. For example start with LAN, then Wireless, then others. In the bottom window, uncheck Internet Protocol (TCP/IP) infile and Printer Sharing and Client for Microsoft Networks these two functions should be bound to NetBEUI only. (The below only shows one connection, but you will need to set these bindings for all connections listed in the top window.) Configure Windows Firewall. [3] Turn the firewall on and check the don't allow exceptions option (unless there is a good reason to have an exception)

12 Turn on the firewall log in the Advanced tab Security Logging Settings button 9. Change workgroup name if desired. [2] Click Start > My Computer (RC) > Properties, Computer Name Tab, Change Button (green arrow)

13 Change the computer and workgroup name to meet your needs (red arrows) 10. NOTE For computers on your local workgroup to properly communicate, they will all need to be set up to: Have the same workgroup name Have different computer names Be setup with NetBEUI as shown in the steps above 11. Disable Bluetooth if it is not being used. [1] 12. Disable Wireless if it is not being used. [1] Note: The steps in this document will help protect your PC from attack as wireless connectivity is currently not a secure technology. It is possible to break WEP encryption (the wireless encryption still used by most wireless access points if any is used at all) in less than 15 minutes using a tool that is freely available online. So, while wireless access is incredibly useful, it is not secure. Just something of which to be aware. 13. Connect your computer to your network via the network cable or wireless adapter. [1] 14. Install a reputable Anti-Virus package like McAfee or Panda. [5] 15. Update your Anti-Virus package. [7] 16. Install Internet Explorer 7. [15] (Requires reboot) 17. Secure Internet Explorer. [5]

14 Go to Internet Options Go to the Privacy tab and set cookie security to High. Once you have done this, you will need to explicitly add any site that you want to have cookies. This requires a little extra work on you part, but it will virtually eliminate the incredible proliferation of cookies that infect most computers and dramatically compromise your privacy. There are a relatively low number of sites that absolutely require cookies.

15 Go to the Security Tab and set to High for the Internet zone as shown. On the same tab, click the trusted Sites (green checkmark). Click the Sites button (red arrow) On the resulting screen, uncheck Require https (at the bottom) and then enter the following URLs as shown above. These will be required to run Windows update in the next step. update.microsoft.com *.update.microsoft.com download.windowsupdate.com windowsupdate.microsoft.com 18. Run Windows Update. [45] Click Start > All Programs > Windows Update You will be taken to the windows update website. Run the Express update. The first run will require a reboot. You will need to run the Windows Update again after the reboot. And perhaps a third time if some of the updates fail.

16 19. Set advanced security on your processor if available ( 20. Install ZoneAlarm. [4] ZoneAlarm is a free bi-directional firewall that is consistently one of the best reviewed and secure personal firewalls on the market Install any utilities that you may wish. [variable] Some of my favorites are: Eraser - TrueCrypt - WinRAR - CurrPorts Install & Configure an alternative browser if desired. (Firefox, Opera, etc.) [10] 23. Configure Local Security Policies. [15] Click Start > All Programs > Administrative Tools > Local Security Policies In the Account Policies > Password Policy section, set: Minimum password length - 10 Password must meet complexity requirements - Enable Store password in reversible encryption - Disable Set Account Lockout Policy Duration 60 minutes Threshold 5 attempts Reset lockout counter 60 min

17 Set Local Policies > Audit Policy as shown Under Security Options do the following. Accounts: Guest account Disable Accounts: Rename administrator account Rename this to something else. I chose HighLevel Accounts: Rename guest account Rename this to something else. I chose DoNotUse Domain member: Require strong (Windows 2000 or later) session key Enabled Interactive logon: Do not display last user name Enabled Interactive logon: Do not require CTRL+ALT+DEL Disabled Set a logon message if desired (Like This computer is the property of company X. Authorized use only. etc ) 1. Interactive logon: Message text for users attempting to log on 2. Interactive logon: Message title for users attempting to log on Microsoft network client: Send unencrypted password to third-party SMB servers Disabled Network access: Allow anonymous SID/Name translation Disabled Network access: Do not allow anonymous enumeration of SAM accounts Enabled Network access: Do not allow anonymous enumeration of SAM accounts and shares Enabled Network access: Do not allow storage of credentials or.net Passports for network authentication Enabled Network access: Let Everyone permissions apply to anonymous users Enabled These next three settings should have all their entries removed to prevent Null Session attacks: 1. Network access: Named Pipes that can be accessed anonymously 2. Network access: Remotely accessible registry path

18 3. Network access: Shares that can be accessed anonymously These are the default values for the above three keys. I am including them here in case you need them for future reference: o Named Pipes COMNAP,COMNODE,SQL\QUERY,SPOOLSS,LLSRPC,browser o Remotely accessible registry path System\CurrentControlSet\Control\ProductOptions,System\CurrentControlSet\Control\Print\Printers,System\CurrentControlSe t\control\server Applications,System\CurrentControlSet\Services\Eventlog,Software\Microsoft\OLAP Server,Software\Microsoft\Windows NT\CurrentVersion,System\CurrentControlSet\Control\ContentIndex,System\CurrentControlSet\Control\Terminal Server,System\CurrentControlSet\Control\Terminal Server\UserConfig,System\CurrentControlSet\Control\Terminal Server\DefaultUserConfiguration o Shares that can be accessed anonymously COMCFG,DFS$ Network access: Sharing and security model for local accounts Classic Network security: Do not store LAN Manager hash value on next password change Enabled Network security: LAN Manager authentication level Send NTLMv2 response only\refuse LM & NTLM Network security: Minimum session security for NTLM SSP based (including secure RPC) clients Check Require NTLMv2 and Require 128-bit encryption Network security: Minimum session security for NTLM SSP based (including secure RPC) servers Check Require NTLMv2 and Require 128-bit encryption Recovery console: Allow automatic administrative logon Disabled In User Rights Assignment, set the following. You will sometimes be removing groups (like Everyone ) and adding others (like SYSTEM ). Access this computer from the network Administrators (remove everyone and other groups) Bypass traverse checking Administrators, SERVICE, power users, users Deny access to this computer from the network ANONYMOUS LOGON Deny logon locally Guest Deny logon through terminal services Everyone Log on as a batch job <remove all> Log on as a service <remove all> Log on locally <remove Guest> 24. Registry Changes. [2] Open Notepad Paste the following text into Notepad Windows Registry Editor Version 5.00 [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\lanmanserver\parameters] "AutoShareServer"=dword: "AutoShareWks"=dword: "enablesecuritysignature"=dword: "requiresecuritysignature"=dword: "Lmannounce"=dword: [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\lanmanworkstation\parameters] "AutoShareServer"=dword: "AutoShareWks"=dword: "enableplaintextpassword"=dword: "enablesecuritysignature"=dword: "requiresecuritysignature"=dword:

19 Save the file as SecuritySettings.reg Run SecuritySettings.reg by double clicking it and confirming. This file sets a few security items that were not done by the settings above. It removes default administrative shares and requires security signatures 25. Shutdown and disable Services that are not required. [15] Start Services manager in one of two ways: Click Start > All Programs > Administrative Tools > Services Click Start > Settings > Control Panel > Services To stop a service: Select the service you want to modify (green arrow) Click the Stop button (red arrow) To set a service to Manual or Disable it: Double click the service you want to modify Stop the service (there are a few that will not stop until you reboot) Select Disabled or Manual under Startup Type Click Apply and OK Go through the Services manager and set the following services like this:

20 Alerter This service is only needed for sending administrative alerts. Used to notify admins when a server is in trouble. Set to Manual or Disable on a home PC. Application Layer Gateway Provides support for 3rd party plug-ins for Internet Connection Sharing/Internet Connection Firewall. Required if using Internet Connection Sharing/Internet Connection Firewall to connect to the internet. Automatic if using ICS, Disabled if not. Clipbook This service is a relic of NT3.x. Used to support Clipbook Viewer which allows remote viewing of the clipbook. Default for workstation is manual. Ensure it is set to manual or disabled. Com + System Disable. Computer Browser The browser service is used to maintain the list of PCs you see in Network Neighborhood. This is normally a server function. A home user can set this to Manual. Distributed Link Tracking Client Distributed Link Tracking Client sends notifications of files moving between NTFS volumes in a network domain. Disable on a home computer. Distributed Transaction Coordinator Coordinates transactions that are distributed across two or more databases, message queues, file systems, or other transaction-protected resource managers. Manual. DNS Client Resolves and caches Domain Name System (DNS) names. This is normally provided by your ISP. Disable and if you have name resolution problems, return it to Automatic. Error Reporting Disable. Fax Service Set to Manual if you don't need fax services. Indexing Fastfind functionality. Improves text searches. For day to day performance, disable it. Internet Connection Sharing If you are want to share an Internet connection for your home network, then set this to Automatic. If not, leave this set to Manual. MSFTPSVC FTP Service. Disable this if you see it and are not running an FTP server. Messenger This service can be used to send messages. You have for that now Disable. Net Logon Supports pass-through authentication of account logon events for computers in a domain. Logging onto a domain? Leave it. Otherwise set it to Manual. Network DDE Supports network transport of DDE (Dynamic Data Exchange) connections. Such connectivity is mostly a relic from the NT 3.x days. QoS RSVP Provides network signaling and local traffic control setup functionality for QoS-aware programs and control applets. A home user can set this to Manual. Remote Access Connection Manager Only needed if you are configuring a new network connection. Keep Disabled normally. Remote Desktop Help Session Manager Manages and controls Remote Assistance. If this service is stopped, Remote Assistance will be unavailable. Remote Registry Allows remote registry manipulation. A home user can set this to Manual. Routing and Remote Access Offers routing services to businesses in local area and wide area network environments. A home user can set this to Manual. RPC Manual. Runas Enables starting processes under alternate credentials. A home user can set this to Manual. Secondary Logon Manual. Security Accounts Manager Stores security information for local user accounts. A home user can set this to Manual unless you are using Local Security Policy Editor. Server Disable this service unless you are sharing files on your hard drive or your printer. Hackers will get nowhere if you do. Simple Mail Transport Protocol (SMTP) Not available on Windows XP Home. Not installed by default on Windows XP Pro. Transports across the network. Disable if you see it. SSDP Part of UpnP. Disable. TCP/IP NetBIOS Helper Provides support for name resolution via a lookup of the LMHosts file. If you are not using LMHOSTS name resolution, you can set it to Manual.

21 Telephony Provides Telephony API (TAPI) support for programs that control telephony devices and IP based voice connections on the local computer and, through the LAN, on servers that are also running the service. Normally set to Manual on workstations. Leave it on Manual. Telnet Allows a remote user to log on to the system and run programs using the command line. Disable! Terminal Services Disable unless you need it. Universal Plug and Play Device Host Provides support to host Universal Plug and Play devices. Disable unless installing new hardware. WebClient Provides HTTP services for applications on the Windows platform. Required if you are running a web server. Most common entry point for hackers! Disable it. Workstation Creates and maintains client network connections to remote servers. If this service is stopped, these connections will be unavailable. If this service is disabled, any services that explicitly depend on it will fail to start. Set this to Manual. May normally be left stopped. Reactivating Services If you want to run certain functions of Windows, you will have to turn some services back on: Enable local workgroup networking Workstation (set to auto) to be visible on local network Server (set to auto) to see others on local network Computer Browser (set to auto) If you install software that needs telephony, like Skype, you may need to re-enable Telephony and perhaps Remote Access Connection Manager. Test this by trying the software first and then enabling first one then the other. Others? 26. Disable Dump File Creation A dump file can be a useful troubleshooting tool when either the system or application crashes and causes the infamous "Blue Screen of Death". However, they also can provide a hacker with potentially sensitive information such as application passwords. You can disable the dump file by going to the My Computer (RC) > Properties, Advanced Tab > Startup and Recovery > Settings Change the options for Write Debugging Information" (bottom 1/3 of the page) to None.

22 If you need to troubleshoot unexplained crashes at a later date, you can re-enable this option until the issue is resolved but be sure to disable it again later and delete any stored dump files 27. Run GRC security tests. [5] UnPlug n Pray Shoot the Messager Leak Test MouseTrap SocketLock 28. Set up software restriction policies. [5] Click Start > My Computer (RC) > Manage Click Software Restriction Policies, click Action, click Create New Policy Double click on Enforcement and set it to All software files (vs not on libraries) Double click on Trusted Publishers and set it to Local computer administrators 29. Set up a share folder if desired If you want to share files with other computers on your home network you will need to set up a shared folder. Create a new folder for this purpose, then right click on it and click Properties. On the Sharing tab, click Share this folder. Provide the name of the share ( Share below). I recommend that you limit the number of computers that can connect to your computer to a realistic number for you network. I put 2 in the example below. Once that is set, click the Permissions button. On the Permissions for Share screen, remove the Everyone group and replace it with Authenticated Users. Finally, add the ANONYMOUS LOGON group and set all permissions for it to Deny as shown.

23 30. Install and run Microsoft Baseline Security Analyzer. [10] Take action on the results This step is incomplete: If the program won t download the update automatically, download it from and then place it in C:\Documents and Settings\<username>\Local Settings\Application Data\Microsoft\MBSA\2.1\Cache 31. Test your security. [4] Run GRC Sheilds-Up! found at If available, scan your system with a vulnerability scanner such as Nessus, ISS or NexPose 32. Change your boot sequence and set bios passwords. [6] Refer to your system documentation for instructions on how to do this Change the boot sequence to start with your hard drive For the slightly more paranoid, you can set the bios password so that the computer cannot be even started without entering a password. This will require you to enter two passwords to start up your system (bios and windows) and is normally not required. 33. Post Config Clean-up If desired, you may hide your Hidden files again. Open your My Documents folder, then select Tools and Folder Options Under Hidden files and folders, set Do not show hidden files and folders

24 To reset security if something gets fouled up (Reference - To reset Security Policies secedit /configure/cfg C:\WINDOWS\repair\secsetup.inf /areas securitypolicy /db secsetup.sdb /verbose To reset Services secedit /configure/cfg C:\WINDOWS\repair\secsetup.inf /areas services /db secsetup.sdb /verbose To reset User Rights secedit /configure/cfg C:\WINDOWS\repair\secsetup.inf /areas user_rights /db secsetup.sdb /verbose To reset All secedit /configure/cfg C:\WINDOWS\repair\secsetup.inf /db secsetup.sdb /verbose References General Services Registry Local Security Settings Networking & Folder and File Permissions

Windows Vista. Securing & Safe Computing PROTECTING YOUR PERSONAL COMPUTER FROM MALICIOUS THREATS

Windows Vista. Securing & Safe Computing PROTECTING YOUR PERSONAL COMPUTER FROM MALICIOUS THREATS Windows Vista Securing & Safe Computing PROTECTING YOUR PERSONAL COMPUTER FROM MALICIOUS THREATS Pre-Setup Notes As of August 12, 2009, all of the following procedures to secure the Windows Vista operating

More information

WINDOWS 7 RC build:7100

WINDOWS 7 RC build:7100 WINDOWS 7 RC build:7100 Securing & Safe Computing PROTECTING YOUR PERSONAL COMPUTER FROM MALICIOUS THREATS Pre-Setup Notes As of August 12, 2009, all of the following procedures to secure the Windows 7

More information

Windows Server 2003 default services

Windows Server 2003 default services Windows Server 2003 default services To view a description for a particular service, hover the mouse pointer over the service in the Name column. The descriptions included here are based on Microsoft documentation.

More information

SECURITY BEST PRACTICES FOR CISCO PERSONAL ASSISTANT (1.4X)

SECURITY BEST PRACTICES FOR CISCO PERSONAL ASSISTANT (1.4X) WHITE PAPER SECURITY BEST PRACTICES FOR CISCO PERSONAL ASSISTANT (1.4X) INTRODUCTION This document covers the recommended best practices for hardening a Cisco Personal Assistant 1.4(x) server. The term

More information

Windows Server 2008/2012 Server Hardening

Windows Server 2008/2012 Server Hardening Account Policies Enforce password history 24 Maximum Password Age - 42 days Minimum Password Age 2 days Minimum password length - 8 characters Password Complexity - Enable Store Password using Reversible

More information

Step-by-Step Guide to Securing Windows XP Professional with Service Pack 2 in Small and Medium Businesses

Step-by-Step Guide to Securing Windows XP Professional with Service Pack 2 in Small and Medium Businesses Step-by-Step Guide to Securing Windows XP Professional with Service Pack 2 in Small and Medium Businesses 2004 Microsoft Corporation. All rights reserved. This document is for informational purposes only.

More information

Installation Notes for Outpost Network Security (ONS) version 3.2

Installation Notes for Outpost Network Security (ONS) version 3.2 Outpost Network Security Installation Notes version 3.2 Page 1 Installation Notes for Outpost Network Security (ONS) version 3.2 Contents Installation Notes for Outpost Network Security (ONS) version 3.2...

More information

Securing Your Windows Laptop

Securing Your Windows Laptop Securing Your Windows Laptop Arindam Mandal (arindam.mandal@paladion.net) Paladion Networks (http://www.paladion.net) May 2004 Now-a-days laptops are part of our life. We carry laptops almost everywhere

More information

Activity 1: Scanning with Windows Defender

Activity 1: Scanning with Windows Defender Activity 1: Scanning with Windows Defender 1. Click on Start > All Programs > Windows Defender 2. Click on the arrow next to Scan 3. Choose Custom Scan Page 1 4. Choose Scan selected drives and folders

More information

1. Set Daylight Savings Time... 3. 2. Create Migrator Account... 3. 3. Assign Migrator Account to Administrator group... 4

1. Set Daylight Savings Time... 3. 2. Create Migrator Account... 3. 3. Assign Migrator Account to Administrator group... 4 1. Set Daylight Savings Time... 3 a. Have client log into Novell/Local Machine with Administrator Account...3 b. Access Adjust Date/Time...3 c. Make sure the time zone is set to Central Time...3 2. Create

More information

Agency Pre Migration Tasks

Agency Pre Migration Tasks Agency Pre Migration Tasks This document is to be provided to the agency and will be reviewed during the Migration Technical Kickoff meeting between the ICS Technical Team and the agency. Network: Required

More information

Windows Operating Systems. Basic Security

Windows Operating Systems. Basic Security Windows Operating Systems Basic Security Objectives Explain Windows Operating System (OS) common configurations Recognize OS related threats Apply major steps in securing the OS Windows Operating System

More information

Web. Security Options Comparison

Web. Security Options Comparison Web 3 Security Options Comparison Windows Server 2003 provides a number of Security Options that can be applied within the scope of managing a GPO. Most are the same as those available in Windows 2000.

More information

System Administration Training Guide. S100 Installation and Site Management

System Administration Training Guide. S100 Installation and Site Management System Administration Training Guide S100 Installation and Site Management Table of contents System Requirements for Acumatica ERP 4.2... 5 Learning Objects:... 5 Web Browser... 5 Server Software... 5

More information

DC Agent Troubleshooting

DC Agent Troubleshooting DC Agent Troubleshooting Topic 50320 DC Agent Troubleshooting Web Security Solutions v7.7.x, 7.8.x 27-Mar-2013 This collection includes the following articles to help you troubleshoot DC Agent installation

More information

Citrix Access Gateway Plug-in for Windows User Guide

Citrix Access Gateway Plug-in for Windows User Guide Citrix Access Gateway Plug-in for Windows User Guide Access Gateway 9.2, Enterprise Edition Copyright and Trademark Notice Use of the product documented in this guide is subject to your prior acceptance

More information

Advanced Event Viewer Manual

Advanced Event Viewer Manual Advanced Event Viewer Manual Document version: 2.2944.01 Download Advanced Event Viewer at: http://www.advancedeventviewer.com Page 1 Introduction Advanced Event Viewer is an award winning application

More information

Walton Centre. Document History Date Version Author Changes 01/10/04 1.0 A Cobain L Wyatt 31/03/05 1.1 L Wyatt Update to procedure

Walton Centre. Document History Date Version Author Changes 01/10/04 1.0 A Cobain L Wyatt 31/03/05 1.1 L Wyatt Update to procedure Page 1 Walton Centre Access and Authentication (network) Document History Date Version Author Changes 01/10/04 1.0 A Cobain L Wyatt 31/03/05 1.1 L Wyatt Update to procedure Page 2 Table of Contents Section

More information

A+ Guide to Software: Managing, Maintaining, and Troubleshooting, 5e. Chapter 3 Installing Windows

A+ Guide to Software: Managing, Maintaining, and Troubleshooting, 5e. Chapter 3 Installing Windows : Managing, Maintaining, and Troubleshooting, 5e Chapter 3 Installing Windows Objectives How to plan a Windows installation How to install Windows Vista How to install Windows XP How to install Windows

More information

Belarc Advisor Security Benchmark Summary

Belarc Advisor Security Benchmark Summary Page 1 of 5 The license associated with the Belarc Advisor product allows for free personal use only. Use on multiple computers in a corporate, educational, military or government installation is prohibited.

More information

About Microsoft Windows Server 2003

About Microsoft Windows Server 2003 About Microsoft Windows Server 003 Windows Server 003 (WinK3) requires extensive provisioning to meet both industry best practices and regulatory compliance. By default the Windows Server operating system

More information

Installing GFI MailSecurity

Installing GFI MailSecurity Installing GFI MailSecurity Introduction This chapter explains how to install and configure GFI MailSecurity. You can install GFI MailSecurity directly on your mail server or you can choose to install

More information

CHARON-VAX application note

CHARON-VAX application note CHARON-VAX application note AN-33 Required Windows Standard Services Author: Software Resources International Date: 16-Jan-2006 Software Resources International (SRI) recommends the use of the host operating

More information

2X SecureRemoteDesktop. Version 1.1

2X SecureRemoteDesktop. Version 1.1 2X SecureRemoteDesktop Version 1.1 Website: www.2x.com Email: info@2x.com Information in this document is subject to change without notice. Companies, names, and data used in examples herein are fictitious

More information

Advanced Diploma In Hardware, Networking & Server Configuration

Advanced Diploma In Hardware, Networking & Server Configuration Advanced Diploma In Hardware, Networking & Server Configuration Who should do this course? This course is meant for those persons who have a dream of getting job based on Computer Hardware, Networking

More information

File and Printer Sharing with Microsoft Windows

File and Printer Sharing with Microsoft Windows Operating System File and Printer Sharing with Microsoft Windows Microsoft Corporation Published: November 2003 Abstract File and printer sharing in Microsoft Windows allows you to share the contents of

More information

Objectives. At the end of this chapter students should be able to:

Objectives. At the end of this chapter students should be able to: NTFS PERMISSIONS AND SECURITY SETTING.1 Introduction to NTFS Permissions.1.1 File Permissions and Folder Permission.2 Assigning NTFS Permissions and Special Permission.2.1 Planning NTFS Permissions.2.2

More information

Hosting Users Guide 2011

Hosting Users Guide 2011 Hosting Users Guide 2011 eofficemgr technology support for small business Celebrating a decade of providing innovative cloud computing services to small business. Table of Contents Overview... 3 Configure

More information

Network Setup Instructions

Network Setup Instructions Network Setup Instructions This document provides technical details for setting up the Elite Salon & Spa Management program in a network environment. If you have any questions, please contact our Technical

More information

Movie Cube. User s Guide to Wireless Function

Movie Cube. User s Guide to Wireless Function Movie Cube User s Guide to Wireless Function Table of Contents 1. WLAN USB Adapter Connection...3 2. Wireless Setup...4 2.1 Infrastructure (AP)...5 2.2 Peer to Peer (Ad Hoc)...7 2.3 Settings for PC...8

More information

SATO Network Interface Card Configuration Instructions

SATO Network Interface Card Configuration Instructions SATO Network Interface Card Configuration Instructions Table of Contents 1. Reset of wired/wireless interface card... 3 2. Installing the All-In-One Utility (recommended)... 4 3. Configuring wired/wireless

More information

InventoryControl for use with QuoteWerks Quick Start Guide

InventoryControl for use with QuoteWerks Quick Start Guide InventoryControl for use with QuoteWerks Quick Start Guide Copyright 2013 Wasp Barcode Technologies 1400 10 th St. Plano, TX 75074 All Rights Reserved STATEMENTS IN THIS DOCUMENT REGARDING THIRD PARTY

More information

Installing GFI MailSecurity

Installing GFI MailSecurity Installing GFI MailSecurity Introduction This chapter explains how to install and configure GFI MailSecurity. You can install GFI MailSecurity directly on your mail server or you can choose to install

More information

Network Storage Link

Network Storage Link A Division of Cisco Systems, Inc. WIRED Network Storage Link for USB 2.0 Disk Drives User Guide Model No. NSLU2 Copyright and Trademarks Specifications are subject to change without notice. Linksys is

More information

TANDBERG MANAGEMENT SUITE 10.0

TANDBERG MANAGEMENT SUITE 10.0 TANDBERG MANAGEMENT SUITE 10.0 Installation Manual Getting Started D12786 Rev.16 This document is not to be reproduced in whole or in part without permission in writing from: Contents INTRODUCTION 3 REQUIREMENTS

More information

Setting Up Your FTP Server

Setting Up Your FTP Server Requirements:! A computer dedicated to FTP server only! Linksys router! TCP/IP internet connection Steps: Getting Started Configure Static IP on the FTP Server Computer: Setting Up Your FTP Server 1. This

More information

How To Use 1Bay 1Bay From Awn.Net On A Pc Or Mac Or Ipad (For Pc Or Ipa) With A Network Box (For Mac) With An Ipad Or Ipod (For Ipad) With The

How To Use 1Bay 1Bay From Awn.Net On A Pc Or Mac Or Ipad (For Pc Or Ipa) With A Network Box (For Mac) With An Ipad Or Ipod (For Ipad) With The 1-bay NAS User Guide INDEX Index... 1 Log in... 2 Basic - Quick Setup... 3 Wizard... 3 Add User... 6 Add Group... 7 Add Share... 9 Control Panel... 11 Control Panel - User and groups... 12 Group Management...

More information

Windows Domain Network Configuration Guide

Windows Domain Network Configuration Guide Windows Domain Network Configuration Guide Windows Domain Network Configuration Guide for CCC Pathways Copyright 2008 by CCC Information Services Inc. All rights reserved. No part of this publication may

More information

Setting Up Scan to SMB on TaskALFA series MFP s.

Setting Up Scan to SMB on TaskALFA series MFP s. Setting Up Scan to SMB on TaskALFA series MFP s. There are three steps necessary to set up a new Scan to SMB function button on the TaskALFA series color MFP. 1. A folder must be created on the PC and

More information

WINDOWS 7 & HOMEGROUP

WINDOWS 7 & HOMEGROUP WINDOWS 7 & HOMEGROUP SHARING WITH WINDOWS XP, WINDOWS VISTA & OTHER OPERATING SYSTEMS Abstract The purpose of this white paper is to explain how your computers that are running previous versions of Windows

More information

2. Using Notepad, create a file called c:\demote.txt containing the following information:

2. Using Notepad, create a file called c:\demote.txt containing the following information: Unit 4 Additional Projects Configuring the Local Computer Policy You need to prepare your test lab for your upcoming experiments. First, remove a child domain that you have configured. Then, configure

More information

Introduction p. 1 Approach to the Book p. 2 At Least Three Ways to Do It p. 2 Where to Find the Tools p. 3 Running Tools with Alternate Credentials

Introduction p. 1 Approach to the Book p. 2 At Least Three Ways to Do It p. 2 Where to Find the Tools p. 3 Running Tools with Alternate Credentials Preface p. xvii Introduction p. 1 Approach to the Book p. 2 At Least Three Ways to Do It p. 2 Where to Find the Tools p. 3 Running Tools with Alternate Credentials p. 3 A Brief Word on Windows Scripting

More information

A Roadmap for Securing IIS 5.0

A Roadmap for Securing IIS 5.0 This document was grafted together from various Web and other sources by Thomas Jerry Scott for use in his Web and other Security courses. Jerry hopes you find this information helpful in your quest to

More information

Quick Scan Features Setup Guide. Scan to E-mail Setup. See also: System Administration Guide: Contains details about E-mail setup.

Quick Scan Features Setup Guide. Scan to E-mail Setup. See also: System Administration Guide: Contains details about E-mail setup. Quick Scan Features Setup Guide XE3024EN0-2 This guide includes instructions for: Scan to E-mail Setup on page 1 Scan to Mailbox Setup on page 6 Network Scanning Setup on page 9 Scan to PC Setup on page

More information

3.5 EXTERNAL NETWORK HDD. User s Manual

3.5 EXTERNAL NETWORK HDD. User s Manual 3.5 EXTERNAL NETWORK HDD User s Manual Table of Content Before You Use Key Features H/W Installation Illustration of Product LED Definition NETWORK HDD Assembly Setup the Network HDD Home Disk Utility

More information

Setup and Configuration Guide for Pathways Mobile Estimating

Setup and Configuration Guide for Pathways Mobile Estimating Setup and Configuration Guide for Pathways Mobile Estimating Setup and Configuration Guide for Pathways Mobile Estimating Copyright 2008 by CCC Information Services Inc. All rights reserved. No part of

More information

MCSE TestPrep: Windows NT Server 4, Second Edition - 3 - Managing Resources

MCSE TestPrep: Windows NT Server 4, Second Edition - 3 - Managing Resources MCSE TestPrep: Windows NT Server 4, Second Edition - CH 3 - Managing Resources Page 1 of 36 [Figures are not included in this sample chapter] MCSE TestPrep: Windows NT Server 4, Second Edition - 3 - Managing

More information

Implementing, Managing, and Maintaining a Microsoft Windows Server 2003 Network Infrastructure

Implementing, Managing, and Maintaining a Microsoft Windows Server 2003 Network Infrastructure Question Number (ID) : 1 (wmpmsp_mngnwi-121) You are an administrator for an organization that provides Internet connectivity to users from the corporate network. Several users complain that they cannot

More information

Symantec PGP Whole Disk Encryption Hands-On Lab V 3.7

Symantec PGP Whole Disk Encryption Hands-On Lab V 3.7 Symantec PGP Whole Disk Encryption Hands-On Lab V 3.7 Description This hands-on lab session covers the hard drive encryption technologies from PGP. Students will administer a typical Whole Disk Encryption

More information

How To Use Senior Systems Cloud Services

How To Use Senior Systems Cloud Services Senior Systems Cloud Services In this guide... Senior Systems Cloud Services 1 Cloud Services User Guide 2 Working In Your Cloud Environment 3 Cloud Profile Management Tool 6 How To Save Files 8 How To

More information

StruxureWare Power Monitoring 7.0.1

StruxureWare Power Monitoring 7.0.1 StruxureWare Power Monitoring 7.0.1 Installation Guide 7EN02-0308-01 07/2012 Contents Safety information 5 Introduction 7 Summary of topics in this guide 7 Supported operating systems and SQL Server editions

More information

OPC Server Machine Configuration

OPC Server Machine Configuration OPC Server Machine Configuration General Information For remote OPC Server operation, server must be running under Windows XP Pro, Windows Server 2003, Windows Vista (Business & Ultimate), Windows 7 (Professional

More information

McAfee.com Personal Firewall

McAfee.com Personal Firewall McAfee.com Personal Firewall 1 Table of Contents Table of Contents...2 Installing Personal Firewall...3 Configuring Personal Firewall and Completing the Installation...3 Configuring Personal Firewall...

More information

GlobalSCAPE DMZ Gateway, v1. User Guide

GlobalSCAPE DMZ Gateway, v1. User Guide GlobalSCAPE DMZ Gateway, v1 User Guide GlobalSCAPE, Inc. (GSB) Address: 4500 Lockhill-Selma Road, Suite 150 San Antonio, TX (USA) 78249 Sales: (210) 308-8267 Sales (Toll Free): (800) 290-5054 Technical

More information

Windows XP Presentation By Bill Ball

Windows XP Presentation By Bill Ball Windows XP Presentation By Bill Ball Windows XP is built on the foundation that was used for Windows NT and Windows 2000. Anyone will tell you that NT and 2000 is more stable than other versions of Windows.

More information

Topaz Installation Sheet

Topaz Installation Sheet Topaz Installation Sheet P/N 460924001E ISS 08FEB12 Content Introduction... 3 Recommended minimum requirements... 3 Setup for Internet Explorer:... 4 Topaz installation... 10 Technical support... 14 Copyright

More information

Sophos Enterprise Console Help. Product version: 5.1 Document date: June 2012

Sophos Enterprise Console Help. Product version: 5.1 Document date: June 2012 Sophos Enterprise Console Help Product version: 5.1 Document date: June 2012 Contents 1 About Enterprise Console...3 2 Guide to the Enterprise Console interface...4 3 Getting started with Sophos Enterprise

More information

Jetico Central Manager. Administrator Guide

Jetico Central Manager. Administrator Guide Jetico Central Manager Administrator Guide Introduction Deployment, updating and control of client software can be a time consuming and expensive task for companies and organizations because of the number

More information

Core Protection for Virtual Machines 1

Core Protection for Virtual Machines 1 Core Protection for Virtual Machines 1 Comprehensive Threat Protection for Virtual Environments. Installation Guide e Endpoint Security Trend Micro Incorporated reserves the right to make changes to this

More information

WEBCONNECT INSTALLATION GUIDE. Version 1.96

WEBCONNECT INSTALLATION GUIDE. Version 1.96 WEBCONNECT INSTALLATION GUIDE Version 1.96 Copyright 1981-2015 Netop Business Solutions A/S. All Rights Reserved. Portions used under license from third parties. Please send any comments to: Netop Business

More information

WhatsUp Gold v16.3 Installation and Configuration Guide

WhatsUp Gold v16.3 Installation and Configuration Guide WhatsUp Gold v16.3 Installation and Configuration Guide Contents Installing and Configuring WhatsUp Gold using WhatsUp Setup Installation Overview... 1 Overview... 1 Security considerations... 2 Standard

More information

Click Studios. Passwordstate. Installation Instructions

Click Studios. Passwordstate. Installation Instructions Passwordstate Installation Instructions This document and the information controlled therein is the property of Click Studios. It must not be reproduced in whole/part, or otherwise disclosed, without prior

More information

Quick Scan Features Setup Guide

Quick Scan Features Setup Guide Xerox WorkCentre 7132 Quick Scan Features Setup Guide 701P45042 This guide includes instructions for: Scan to Email on page 1 Scan to Mailbox Setup (Optional) on page 5 Network Scanning Setup (Optional)

More information

Password Manager Windows Desktop Client

Password Manager Windows Desktop Client Password Manager Windows Desktop Client EmpowerID provides an extension that allows organizations to plug into Password Manager to customize the Windows logon experience beyond that supplied by the standard

More information

Troubleshooting File and Printer Sharing in Microsoft Windows XP

Troubleshooting File and Printer Sharing in Microsoft Windows XP Operating System Troubleshooting File and Printer Sharing in Microsoft Windows XP Microsoft Corporation Published: November 2003 Updated: August 2004 Abstract File and printer sharing for Microsoft Windows

More information

How To Install And Configure Windows Server 2003 On A Student Computer

How To Install And Configure Windows Server 2003 On A Student Computer Course: WIN310 Student Lab Setup Guide Microsoft Windows Server 2003 Network Infrastructure (70-291) ISBN: 0-470-06887-6 STUDENT COMPUTER SETUP Hardware Requirements All hardware must be on the Microsoft

More information

MN-700 Base Station Configuration Guide

MN-700 Base Station Configuration Guide MN-700 Base Station Configuration Guide Contents pen the Base Station Management Tool...3 Log ff the Base Station Management Tool...3 Navigate the Base Station Management Tool...4 Current Base Station

More information

TrueEdit Remote Connection Brief

TrueEdit Remote Connection Brief MicroPress Server Configuration Guide for Remote Applications Date Issued: February 3, 2009 Document Number: 45082597 TrueEdit Remote Connection Brief Background TrueEdit Remote (TER) is actually the same

More information

QBalance.com. We make QuickBooks work for you. Call Toll-Free: (800) 216-0763. Congratulations! You are using the best accounting software available!

QBalance.com. We make QuickBooks work for you. Call Toll-Free: (800) 216-0763. Congratulations! You are using the best accounting software available! QBalance.com We make QuickBooks work for you CPA Call Toll-Free: (800) 216-0763 Congratulations! You are using the best accounting software available! But: you may be one of the 75% of all QuickBooks installations

More information

Migrating From Bobcat Mail To Google Apps (Using Microsoft Outlook and Google Apps Sync)

Migrating From Bobcat Mail To Google Apps (Using Microsoft Outlook and Google Apps Sync) Migrating From Bobcat Mail To Google Apps (Using Microsoft Outlook and Google Apps Sync) This document is intended for those users moving from WVWC s Bobcat Mail system to the new Google Apps mail system

More information

Getting Started. Symantec Client Security. About Symantec Client Security. How to get started

Getting Started. Symantec Client Security. About Symantec Client Security. How to get started Getting Started Symantec Client Security About Security Security provides scalable, cross-platform firewall, intrusion prevention, and antivirus protection for workstations and antivirus protection for

More information

Tufts VPN Client User Guide for Windows

Tufts VPN Client User Guide for Windows Tufts VPN Client User Guide for Windows Introduction The Tufts Virtual Private Network (VPN) implementation is a service that is provided to the faculty and staff of Tufts University to enable secure access

More information

ms-help://ms.technet.2005mar.1033/security/tnoffline/security/smbiz/winxp/fwgrppol...

ms-help://ms.technet.2005mar.1033/security/tnoffline/security/smbiz/winxp/fwgrppol... Page 1 of 16 Security How to Configure Windows Firewall in a Small Business Environment using Group Policy Introduction This document explains how to configure the features of Windows Firewall on computers

More information

FortKnox Personal Firewall

FortKnox Personal Firewall FortKnox Personal Firewall User Manual Document version 1.4 EN ( 15. 9. 2009 ) Copyright (c) 2007-2009 NETGATE Technologies s.r.o. All rights reserved. This product uses compression library zlib Copyright

More information

NETWRIX PASSWORD MANAGER

NETWRIX PASSWORD MANAGER NETWRIX PASSWORD MANAGER ADMINISTRATOR S GUIDE Product Version: 6.1 February/2012 Legal Notice The information in this publication is furnished for information use only, and does not constitute a commitment

More information

Using Logon Agent for Transparent User Identification

Using Logon Agent for Transparent User Identification Using Logon Agent for Transparent User Identification Websense Logon Agent (also called Authentication Server) identifies users in real time, as they log on to domains. Logon Agent works with the Websense

More information

Server Configuration and Deployment (part 1) Lotus Foundations Essentials

Server Configuration and Deployment (part 1) Lotus Foundations Essentials Server Configuration and Deployment (part 1) Lab Manual Lotus Foundations Essentials Introduction: In this lab, students will configure an IBM Lotus Foundations server using a virtual image to perform

More information

How To Create An Easybelle History Database On A Microsoft Powerbook 2.5.2 (Windows)

How To Create An Easybelle History Database On A Microsoft Powerbook 2.5.2 (Windows) Introduction EASYLABEL 6 has several new features for saving the history of label formats. This history can include information about when label formats were edited and printed. In order to save this history,

More information

The SSL device also supports the 64-bit Internet Explorer with new ActiveX loaders for Assessment, Abolishment, and the Access Client.

The SSL device also supports the 64-bit Internet Explorer with new ActiveX loaders for Assessment, Abolishment, and the Access Client. WatchGuard SSL v3.2 Release Notes Supported Devices SSL 100 and 560 WatchGuard SSL OS Build 355419 Revision Date January 28, 2013 Introduction WatchGuard is pleased to announce the release of WatchGuard

More information

Addonics T E C H N O L O G I E S. NAS Adapter. Model: NASU2. 1.0 Key Features

Addonics T E C H N O L O G I E S. NAS Adapter. Model: NASU2. 1.0 Key Features 1.0 Key Features Addonics T E C H N O L O G I E S NAS Adapter Model: NASU2 User Manual Convert any USB 2.0 / 1.1 mass storage device into a Network Attached Storage device Great for adding Addonics Storage

More information

How To Set Up A Backupassist For An Raspberry Netbook With A Data Host On A Nsync Server On A Usb 2 (Qnap) On A Netbook (Qnet) On An Usb 2 On A Cdnap (

How To Set Up A Backupassist For An Raspberry Netbook With A Data Host On A Nsync Server On A Usb 2 (Qnap) On A Netbook (Qnet) On An Usb 2 On A Cdnap ( WHITEPAPER BackupAssist Version 5.1 www.backupassist.com Cortex I.T. Labs 2001-2008 2 Contents Introduction... 3 Hardware Setup Instructions... 3 QNAP TS-409... 3 Netgear ReadyNas NV+... 5 Drobo rev1...

More information

Getting Started with WebEx Access Anywhere

Getting Started with WebEx Access Anywhere Getting Started with WebEx Access Anywhere This guide provides basic instructions to help you start using WebEx Access Anywhere quickly. This guide assumes that you have a user account on your meeting

More information

Step-by-Step Configuration

Step-by-Step Configuration Step-by-Step Configuration Kerio Technologies Kerio Technologies. All Rights Reserved. Printing Date: August 15, 2007 This guide provides detailed description on configuration of the local network which

More information

How to Remotely View Security Cameras Using the Internet

How to Remotely View Security Cameras Using the Internet How to Remotely View Security Cameras Using the Internet Introduction: The ability to remotely view security cameras is one of the most useful features of your EZWatch Pro system. It provides the ability

More information

Windows Client/Server Local Area Network (LAN) System Security Lab 2 Time allocation 3 hours

Windows Client/Server Local Area Network (LAN) System Security Lab 2 Time allocation 3 hours Windows Client/Server Local Area Network (LAN) System Security Lab 2 Time allocation 3 hours Introduction The following lab allows the trainee to obtain a more in depth knowledge of network security and

More information

Kepware Technologies Remote OPC DA Quick Start Guide (DCOM)

Kepware Technologies Remote OPC DA Quick Start Guide (DCOM) Kepware Technologies Remote OPC DA Quick Start Guide (DCOM) March, 2013 Ref. 03.10 Kepware Technologies Table of Contents 1. Overview... 1 1.1 What is DCOM?... 1 1.2 What is OPCEnum?... 1 2. Users and

More information

Kaseya 2. Installation guide. Version 7.0. English

Kaseya 2. Installation guide. Version 7.0. English Kaseya 2 Kaseya Server Setup Installation guide Version 7.0 English September 4, 2014 Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept

More information

a) Network connection problems (check these for existing installations)

a) Network connection problems (check these for existing installations) How do I resolve issues with a Client not connecting to the Best Practice server instance? This FAQ is intended to answer common questions about resolving issues with a Best Practice client not connecting

More information

FileMaker Server 12. Getting Started Guide

FileMaker Server 12. Getting Started Guide FileMaker Server 12 Getting Started Guide 2007 2012 FileMaker, Inc. All Rights Reserved. FileMaker, Inc. 5201 Patrick Henry Drive Santa Clara, California 95054 FileMaker and Bento are trademarks of FileMaker,

More information

1. Installation Overview

1. Installation Overview Quick Install Guide 1. Installation Overview Thank you for selecting Bitdefender Business Solutions to protect your business. This document enables you to quickly get started with the installation of Bitdefender

More information

STIDistrict Server Replacement

STIDistrict Server Replacement STIDistrict Server Replacement Major Steps Defined This document addresses how to migrate data and applications from an existing STIDistrict (SQL) Server to a new machine. There will be 8 major steps:

More information

Airtel PC Secure Trouble Shooting Guide

Airtel PC Secure Trouble Shooting Guide Airtel PC Secure Trouble Shooting Guide Table of Contents Questions before installing the software Q: What is required from my PC to be able to use the Airtel PC Secure? Q: Which operating systems does

More information

Allworx OfficeSafe Operations Guide Release 6.0

Allworx OfficeSafe Operations Guide Release 6.0 Allworx OfficeSafe Operations Guide Release 6.0 No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, photocopy,

More information

Load Balancing for esafe Gateway 3.0 when using Alteon s AD2 or AD3

Load Balancing for esafe Gateway 3.0 when using Alteon s AD2 or AD3 Load Balancing for esafe Gateway 3.0 when using Alteon s AD2 or AD3 page 3 Load Balancing for esafe Gateway 3.0 when using Alteon s AD2 or AD3 This document describes how to setup and configure Alteon

More information

Microsoft Windows XP Professional: Guide to Creating a More Secure Operating System

Microsoft Windows XP Professional: Guide to Creating a More Secure Operating System Microsoft Windows XP Professional: Guide to Creating a More Secure Operating System Introduction This document contains specific guidelines for establishing a secure Microsoft Windows XP computing environment.

More information

WhatsUp Event Analyst v10.x Quick Setup Guide

WhatsUp Event Analyst v10.x Quick Setup Guide WhatsUp Event Analyst v10.x Quick Setup Guide Contents WhatsUp Event Analyst Quick Setup Guide WhatsUp Event Analyst Quick Setup Guide... 2 Installation Requirements... 3 Before You Begin... 4 Microsoft

More information

Web Security School Entrance Exam

Web Security School Entrance Exam Web Security School Entrance Exam By Michael Cobb 1) What is SSL used for? a. Encrypt data as it travels over a network b. Encrypt files located on a Web server c. Encrypt passwords for storage in a database

More information

WatchGuard Mobile User VPN Guide

WatchGuard Mobile User VPN Guide WatchGuard Mobile User VPN Guide Mobile User VPN establishes a secure connection between an unsecured remote host and a protected network over an unsecured network using Internet Protocol Security (IPSec).

More information

Sage HRMS 2014 Sage Employee Self Service

Sage HRMS 2014 Sage Employee Self Service Sage HRMS 2014 Sage Employee Self Service Pre-Installation Guide October 2013 This is a publication of Sage Software, Inc. Document version: October 17, 2013 Copyright 2013. Sage Software, Inc. All rights

More information

NETWRIX ACCOUNT LOCKOUT EXAMINER

NETWRIX ACCOUNT LOCKOUT EXAMINER NETWRIX ACCOUNT LOCKOUT EXAMINER ADMINISTRATOR S GUIDE Product Version: 4.1 July 2014. Legal Notice The information in this publication is furnished for information use only, and does not constitute a

More information