FREQUENTLY ASKED QUESTIONS
|
|
|
- Elvin Powers
- 10 years ago
- Views:
Transcription
1 FREQUENTLY ASKED QUESTIONS
2 Secure Bytes, October 2011 This document is confidential and for the use of a Secure Bytes client only. The information contained herein is the property of Secure Bytes and may not be copied, used or disclosed in whole or in part, stored in a retrieval system or transmitted in any form or by any means (electronic, mechanical, reprographic, recording or otherwise) without the prior written permission of Secure Bytes.
3 Note: Frequently asked questions are common problems which users encounter during Secure Auditor assessment. If you do not find answer(s) to your query in this document, then lookup the FAQ and KnowledgeBase section on Secure Bytes website. Q1: Which operating systems are compatible with Secure Auditor? Answer: Secure Auditor is compatible with Windows 2000 and above. Q2: I have identified a windows based machine on my network through discovery; can I add that machine again for audit? Answer: When you identified a machine through discovery process then that particular machine will be automatically added to audit machine window for authentication, when you choose windows from Select an Application tab. You do not need to add discovered machines instead you only need to provide their login credentials. Q3: I am unable to connect with remote Oracle machine, why? Answer: If you are unable to get connected with Oracle databases just check the default Oracle ports 1521 and 1526 to see if they are open or not. If following ports are closed then open them to resolve connectivity issue. If problem does not resolve then send an to [email protected]. Our technical representative will contact you shortly. Q4: How can I get maximum vulnerabilities in my windows machine? Answer: You can check your Windows machines for maximum vulnerabilities if you select SWA profile. By selecting the SWA profile within Profile Management you will be able to audit your machine against maximum number of vulnerabilities and will be able to identify largest number of security threats which can exploit to get control of your windows based machine. Q5: Can I archive Secure Auditor reports for future purposes? Answer: Yes, Reports provided by Secure Auditor are archived in multiple user friendly formats like PDF, MS Word, MS Excel, Rich Text format etc. Reports of Audits are saved in the database; so you can save them once you have closed the application. Q6: Can I add vulnerabilities in Secure Auditor? Answer: You can only work with vulnerabilities already embedded within Secure Auditor. It does not provide facility to add your own vulnerabilities for audit or enumeration but we are continuously upgrading Secure Auditor by adding new vulnerabilities as they are discovered by vendors, international bodies and other sources. Q7: Does Secure Auditor support any command line options? Answer: No, Secure Auditor does not support any command line options. Q8: I have conduct discovery now what should I do? Answer: Review the information assets produced after discovery, choose an audit profile and conducted audit.
4 Q9: Does Secure Auditor support the auditing of wireless networks? Answer: Yes, Secure Auditor does support auditing of wireless networks. Q10: How can I create my own profile according to my company policy? Answer: Click on Audit Profiles Manager, and then go to New Profile, type the name for the new profile. You can check and uncheck the vulnerabilities you want your new profile to contain. An option for selecting all vulnerabilities is also present. After selecting vulnerabilities for your profile click on save button present on top of new profile screen and then click close. Your created profile will be shown in profile list of Profile Manager and you will be able to use it for multiple audits until you delete your profile. Q11: What are different modules of Secure Auditor? Answer: Secured Auditor consists of the following four modules: Secure ORA Auditor Secure SQL Auditor Secure Win Auditor Secure CISCO Auditor Q12: Does Secure Auditor provide prove of existence of vulnerabilities? Answer: One of the best features of Secure Auditor is the ability to provide exact specifications of identified threats. It is only possible because Secure Auditor does not work on guessing and false positive. Secure Auditor provides exact instance and location of vulnerability, along with overview, description and solution. Q13: Why Secure Auditor does not offer fix it option? Answer: Secure Auditor does not offer fix it option because many solutions if implemented might conflict with existing configurations. For instance some patches might impair the working of some existing applications. Hence Secure Auditor offers solution of identified vulnerabilities and recommends users to analyze their current environment before implementing any solution. Q14: While I am trying to audit windows XP machine, trying to authentication to a machine getting an error (Invalid username & password) know provided the correct user name and password. Answer: You may come up with this issue with your windows up machine due to default setting of simple file sharing. By default simple file sharing is disabled on windows XP. In order to enable the simple file sharing setting, select a folder on any drive go to -- >tools -->folder options -->view -->look for ( use simple file sharing (recommended)) unselect it. If problem persist then send your query at [email protected]. Our technical support team will contact you shortly. Q15: Do I need to deploy any agent on the host machine while installing Secure Auditor? Answer: Secure Auditor is an agent less application. Only one instance of Secure Auditor is needed to be deployed on a host from where it will perform its functions throughout the network.
5 Q16: Can I run audit on multiple Windows machines? Answer: Yes you can run audit on single or multiple Windows machines in a single audit session. The procedure is simple. You either need to discover or add multiple Windows machines you wish to audit and then start an audit with Secure Win Auditor. You can select number of Windows machines you wish to audit, but audit will not be conducted simultaneously. Secure Auditor will audit multiple Windows machines one by one in a single session. Q17: Why can't we scan.0 and.255 addresses? Answer: By default, IP Address 0 is used for network address and IP Address 255 is used for broadcast addresses therefore Secure Auditor will not scan them. Q18: Can I run audit on multiple Oracle databases? Answer: Yes you can run audit on single or multiple Oracle databases in a single audit session. The procedure is simple. You either need to discover or add multiple Oracle databases you wish to audit and then start an audit with Secure Ora Auditor. You can select number of Oracle databases you wish to audit, but audit will not be conducted simultaneously. Secure Auditor will audit multiple Oracle databases one by one in a single session. Q19: What are the Secure Auditor Version 2.0 evaluation limitations? Answer: Secure Auditor is a suite of software specifically designed to facilitate multiple security concerns of an organization. Its evaluation version is having limited functionality. In the evaluation version you cannot access, view or print reports of the Audit, discovery or utilities. You cannot schedule an audit with Secure Auditor evaluation version. Q20: When I am trying to conduct audit on windows system, getting an error The RPC server is unavailable. (Exception from HRESULT: 0x800706BA) Answer: For a Windows system audit if you get an error message regarding RPC server unavailability then Please check whether the firewall on the target machine is on or not. If it is turned on then turn it off and try again to conduct audit on your Windows system. If problem persist then send your query at [email protected]. Our technical support team will contact you shortly. Our general suggestion to you before conducting audit is to either turn off firewall on target machine or open port number 135, 139, and 445. Q21: Can I get the number of software installed on a range of scanned Windows based machine? Answer: Definitely yes! You can get all software installed on a range of scanned windows based machine with the help of Windows software inventory viewer which is embedded in Secure Win Auditor. Q22: My Scheduled Scan with Secure Auditor doesn't seem to work? Answer: If your scheduled scan with Secure Auditor doesn t seem to work then most probably the machine you wish to audit was not up at the time of scan.
6 Q23: Do I need to deploy any agent on the machine while running Secure Auditor? Answer: Secure Auditor is an agent less application, it needs to be deployed on one host and it can scan the entire network. So while conducting audits on any machine you only need to get connected with remote machine and do not need to deploy any agent on them. Q24: Does Secure Cisco Auditor audit firewalls? Answer: Yes, Secure CISCO Auditor audits firewalls as well as Cisco routers and Switches. Q25: Does Secure Auditor scan machines running UNIX? Answer: Secure Auditor does not scan UNIX Operating systems, but it does scan Oracle database servers running on UNIX OS. Q26: Troubleshooting errors during installation? Answer: For troubleshooting errors you should be able to open the log file in notepad. Secure Auditor logs can be find in following directory C:\Program Files\Secure Bytes\Secure Auditor 2.0\Error_Logs. If you are still having the same problem then please the log file to [email protected] for further investigation. Kindly the screen shot of the error along with your as attachment. Q27: I am unable to audit MSSQL database server on my network. Answer: If you are having trouble in auditing MSSQL database server on your network then make sure that firewall is not blocking Secure Auditor to audit MSSQL database server on your network. Also check that you are using correct MSSQL authentication information and provided correct password. Q28: Why the installation of Secure Auditor fails to complete? Answer: If you encountered with an installation issue of this sort kindly make sure that you are login with Administrators privileges and then install the software. If you are reinstalling Secure Auditor make sure that you have uninstalled the previous version of the same software completely from your system. Also remove the Secure Bytes folder from program file and restart the system. After completing defined steps kindly start installation of Secure Auditor again on your system. Q29: I am unable to Audit Oracle database server on my network. Answer: It is possible Remote login is disabled on Oracle database in order to enable Remote login as Sysdba to Oracle database server do the following steps. Step 1: Log on the database machine and create a password file: For Unix (Shell):orapwd file=$oracle_home/dbs/orapw password=password_for_sys For Windows (Command Prompt): orapwdfile=%oracle_home%\database\pwdsid_name.orapassword=password_or_ sys Step 2: Add the following line to initservice_name.ora in UNIX, or init.ora in Windows: REMOTE_LOGIN_PASSWORDFILE=EXCLUSIVE Change it to SHARED
7 Step 3: Restart the Database and Test the Remote Login. Connect as Sysdba. Q30: In discovery report under high vulnerability heading there is an entry about Patch missing, but does not identify the missing patch number. Answer: In discovery process Secure Auditor does not show the detail information. It provides this information in audit. So if you want to see missing patch number you just need to conduct an audit on selected machine which will provide your desired information. Q31: Secure Auditor send an error message and closed its application, Why? Answer: If you encountered this problem then most probably your license file may be got corrupted. For new license file you may contact with sales department at com or if you are using trial version than you can download new version of Secure Auditor. Q32: I am unable to discover SQL Database Server on my network. Answer: Make sure that TCP/IP is enabled to match the server. It is recommended that you set TCP/IP above named pipes. If you are using MDAC (Drive={SQL Server} or SQLOLEDB.x) in your client application, you will want to run the cliconfg.exe program to enable TCP/IP and named pipes and to set the order so that TCP/IP is above named pipes. Make sure the "Hide server" checkbox in TCP/IP properties of Server in SQL Server Network Utility is not check because if it checked SQL Server will hide server and not send any announcements. MS SQL Server announces itself over network via UDP port1434. Tools like osql, isql, isqlw, ODBC Data Source Administrator, SQL-DMO powered programs send UDP packets to this port for discovery of SQL Server on host. Q33: How do I get Secure Auditor auto update functionality to work through my web proxy? Answer: You don t need to do anything if web proxy information is correctly configure in the internet properties option and http is enable out going on Web proxy then Secure Auditor update function will automatically start working. Q34: I am running a non-english version of Windows Can I install Secure Auditor on my operating system? Answer: No currently we do not support non-english version of Windows. End user must have English version of Windows in order to install and work with Secure Auditor. Q35: During installation, setup fails with the message that I do not have administrative rights? Answer: Before installing Secure Auditor make sure that you are login with Administrator privileges and then try to install the software on your system. If you are reinstalling Secure Auditor make sure that you uninstall the software completely from your system. Kindly remove the Secure Bytes folder from program file and then restart the system. Then try to install software again on your system.
8 Q36: How much performance overhead does Secure Auditor add to an audited server? Answer: On different systems Secure Auditor performs different check so the performance overheads Secure Auditor add to an audited server really depends on what a user is checking for example while it is checking windows system, Secure Auditor can take some performance hit but on other applications like Oracle databases, MSSQL databases and Cisco routers user will not face any performance overhead. Q37: Secure Auditor is showing error message that Router does not exist, why? Answer: Secure Auditor show defined message that the Router does not exist when Cisco Router in question may not be accessible. This sort of error is shown when user has selected the wrong port for audit or a firewall in blocking Secure Auditor. Q38: Do I have to reinstall Secure Auditor when moving to the paid version? Answer: Yes, you need to reinstall a new instance if you want to move from a trail version to paid version of Secure Auditor. Q39: Does Secure Cisco Auditor audit Cisco switches? Answer: Yes, Secure CISCO Auditor does audit Cisco switches. Q40: Can Secure Auditor run an audit on a machine across the network? Answer: Yes Secure Auditor is a network based tool and it can run audit on any machines across the network. From a single machine Secure Auditor can audit Windows machines, Oracle databases, MSSQL databases and Cisco Routers across the network with ease of use and without deploying any agent. Q41: What software components does Secure Auditor install and where? Answer: By default Secure Auditor installs instant of MSDE on the system at C:\Program Files\Microsoft SQL Server\MSSQL$SADATABASE and it also installed runtime version Crystal reports on the system at c:\program Files\Business Objects. Q42: What to do after conducting discovery? Answer: When you complete discovery process on your network than you will get enumeration results from your network. It provides a brief overview regarding possible and most visible exploitable system information on your network which could be used for simulating an attack on the network. After discovery you can save your session and view discovery report which could be archived in multiple formats for comparative and competency analyses. You can also conduct audit or select Profile manager to customized audit profile for an audit. Q43: Can I run audit on multiple Oracle databases? Answer: Definitely, you can run audit on single or multiple Oracle databases running on single or multiple machines. You can conduct audit on multiple Oracle databases in one instance or audit where you need to add multiple Oracle databases one by one or provide credentials of already discovered Oracle databases. You can add multiple Oracle databases deployed and running on Window, Solaris or any other platform.
9 Q44: Can Windows Event Log Viewer work if DCOM is disabled on remote systems? Answer: NO, Windows Event Log Viewer require DCOM in order to work properly, so please make sure that DCOM is enable on your remote windows machine or Oracle database before using their respective event log viewers. Q45: Question: Can I simultaneously run discovery on Windows, Oracle, MSSQL Server and Cisco router? Answer: Yes, Discovery process could be conducted simultaneously on single or multiple machines and applications. You can also conduct discovery of the Windows network in single session. Secure Auditor will display results regarding all discovered applications in a form of single report. Q46: Can I run audit on multiple Cisco Routers? Answer: Definitely, you can run audit on single or multiple Cisco Routers (only if you have license for all those IP s) due to the fact that Secure Auditor license is IP bounded. You can conduct audit on multiple Cisco Routers in one instance where you need to add multiple Cisco Routers one by one or provide credentials of already discovered Cisco Routers. You can add multiple Cisco Routers and do not conduct audit on switches or firewalls. Q47: Do I need any additional software installed in order to run Secure Auditor? Answer: Yes! Secure Auditor requires Windows Installer 3.1 and Dot Net Framework 2.0 as a pre-requisite before installing Secure Auditor. You need to install both the software before start installing Secure Auditor. You can download.net framework from the location prescribed in installation guide or you can also download Secure Auditor from installation CD. Q48: Can Secure Auditor be used with high transaction volume servers? Answer: Yes it will work fine but it is recommended to run any Security Assessment Tool during slow transaction time. Q49: Can I run an audit on Windows, Oracle, MSSQL Server and Cisco Router in a single audit session? Answer: No, you cannot run an audit on Oracle, Windows, MSSQL or Cisco Router in a single audit session. You need to create separate audit sessions to conduct audit on separate applications. Because before conducting an audit you first need to select an application which could be Cisco, Oracle, Windows or MSSQL. There is no option to select all applications during single audit session. Because when a user selects one application for audit he will able to view its related utilities which are embedded into the software. Q50: Does Secure Auditor audits Oracle Database on other operating systems? Answer: Yes. It has the ability to audit Oracle on Linux as well as Sun Solaris machines but it cannot run from a Linux or Sun Solaris platform. In other words Secure Auditor can only be installed on Windows Machines but it can audit Oracle databases deployed and running on Linux and Sun Solaris or any other platform. It is due to the fact that Oracle databases are audited via Oracle s listener capability hence Oracle can be deployed on
10 any operating system in order to be scanned by Secure Auditor Q51. On a machine where windows vista is installed, I logged on windows vista machine with a User account which belongs to Domain Administrators Group. I run secure auditor on my local machine and tried to Audit the Local Machine then a message appeared that You are currently login as Domain user this user doesn t have enough rights to perform full audit, therefore you may not be able to view all vulnerabilities on the system, to perform full audit please login again on the system with a administrative privilege user, or run the software with Run as Administrator.Do you still like to continue (Yes/ No) what is the solution. Answer: The Problem is due to the User Account Control (UAC) which is enabled on local machines in windows vista, windows 7 and windows 2008 Servers. This problem does not exist in XP and previous versions of window because User Account Control (UAC) was introduced in windows vista. Solution of this problem is that you right click on Secure Auditor icon, select ( Run as Administrator ) option that will work fine. Note: User Account Control (UAC) is a technology and security infrastructure introduced with Microsoft's Windows Vista and Windows Server 2008 operating system. It aims to improve the security of Microsoft Windows by limiting application software to standard user privileges until an administrator authorizes an increase or elevation. In this way, only applications trusted by the user may receive administrative privileges, and malware should be kept from compromising the operating system. In other words, a user account may have administrator privileges assigned to it, but applications that the user runs do not inherit those privileges unless they are approved beforehand or the user explicitly authorizes it. Q52. I am unable to connect to the SQL database for audit, All my credentials are correct. I receive an error Data source should be on the same machine. Answer: This problem should be solved if the 'Data Source' field is filled in the following manner : [IP-Address]\[InstanceName] Make sure that if you enter ServerName instead of IP-Address in the 'Host Name / IP' field, then the 'Data Source' field should be entered in the following format instead : [Server-Name]\[InstanceName] Also Note that if the 'SQL Server Browser' service is running on the Server [which has the SQL Instance], then the above format will be automatically inserted in the 'Data Source' drop down field by our appliciation.
Freshservice Discovery Probe User Guide
Freshservice Discovery Probe User Guide 1. What is Freshservice Discovery Probe? 1.1 What details does Probe fetch? 1.2 How does Probe fetch the information? 2. What are the minimum system requirements
User Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream
User Manual Onsight Management Suite Version 5.1 Another Innovation by Librestream Doc #: 400075-06 May 2012 Information in this document is subject to change without notice. Reproduction in any manner
DC Agent Troubleshooting
DC Agent Troubleshooting Topic 50320 DC Agent Troubleshooting Web Security Solutions v7.7.x, 7.8.x 27-Mar-2013 This collection includes the following articles to help you troubleshoot DC Agent installation
Konica Minolta s Optimised Print Services (OPS)
Konica Minolta s Optimised Print Services (OPS) Document Collection Agent (DCA) Detailed Installation Guide V1.6 Page 1 of 43 Table of Contents Notes... 4 Requirements... 5 Network requirements... 5 System
Spector 360 Deployment Guide. Version 7
Spector 360 Deployment Guide Version 7 December 11, 2009 Table of Contents Deployment Guide...1 Spector 360 DeploymentGuide... 1 Installing Spector 360... 3 Installing Spector 360 Servers (Details)...
Secret Server Qualys Integration Guide
Secret Server Qualys Integration Guide Table of Contents Secret Server and Qualys Cloud Platform... 2 Authenticated vs. Unauthenticated Scanning... 2 What are the Advantages?... 2 Integrating Secret Server
Table of Contents. Introduction...9. Installation...17. Program Tour...31. The Program Components...10 Main Program Features...11
2011 AdRem Software, Inc. This document is written by AdRem Software and represents the views and opinions of AdRem Software regarding its content, as of the date the document was issued. The information
Table of Contents. FleetSoft Installation Guide
FleetSoft Installation Guide Table of Contents FleetSoft Installation Guide... 1 Minimum System Requirements... 2 Installation Notes... 3 Frequently Asked Questions... 4 Deployment Overview... 6 Automating
Aradial Installation Guide
Aradial Technologies Ltd. Information in this document is subject to change without notice. Companies, names, and data used in examples herein are fictitious unless otherwise noted. No part of this document
LifeCyclePlus Version 1
LifeCyclePlus Version 1 Last updated: 2014-04-25 Information in this document is subject to change without notice. Companies, names and data used in examples herein are fictitious unless otherwise noted.
WhatsUp Gold v16.3 Installation and Configuration Guide
WhatsUp Gold v16.3 Installation and Configuration Guide Contents Installing and Configuring WhatsUp Gold using WhatsUp Setup Installation Overview... 1 Overview... 1 Security considerations... 2 Standard
Networking Best Practices Guide. Version 6.5
Networking Best Practices Guide Version 6.5 Summer 2010 Copyright: 2010, CCH, a Wolters Kluwer business. All rights reserved. Material in this publication may not be reproduced or transmitted in any form
Spector 360 Deployment Guide. Version 7.3 January 3, 2012
Spector 360 Deployment Guide Version 7.3 January 3, 2012 Table of Contents Deploy to All Computers... 48 Step 1: Deploy the Servers... 5 Recorder Requirements... 52 Requirements... 5 Control Center Server
TANDBERG MANAGEMENT SUITE 10.0
TANDBERG MANAGEMENT SUITE 10.0 Installation Manual Getting Started D12786 Rev.16 This document is not to be reproduced in whole or in part without permission in writing from: Contents INTRODUCTION 3 REQUIREMENTS
for Networks Installation Guide for the application on the server July 2014 (GUIDE 2) Lucid Rapid Version 6.05-N and later
for Networks Installation Guide for the application on the server July 2014 (GUIDE 2) Lucid Rapid Version 6.05-N and later Copyright 2014, Lucid Innovations Limited. All Rights Reserved Lucid Research
FireSIGHT User Agent Configuration Guide
Version 2.2 August 20, 2015 THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS, INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL
Setting up an MS SQL Server for IGSS
Setting up an MS SQL Server for IGSS Table of Contents Table of Contents...1 Introduction... 2 The Microsoft SQL Server database...2 Setting up an MS SQL Server...3 Installing the MS SQL Server software...3
SEER Enterprise Shared Database Administrator s Guide
SEER Enterprise Shared Database Administrator s Guide SEER for Software Release 8.2 SEER for IT Release 2.2 SEER for Hardware Release 7.3 March 2016 Galorath Incorporated Proprietary 1. INTRODUCTION...
for Networks Installation Guide for the application on the server August 2014 (GUIDE 2) Lucid Exact Version 1.7-N and later
for Networks Installation Guide for the application on the server August 2014 (GUIDE 2) Lucid Exact Version 1.7-N and later Copyright 2014, Lucid Innovations Limited. All Rights Reserved Lucid Research
Before deploying SiteAudit it is recommended to review the information below. This will ensure efficient installation and operation of SiteAudit.
SiteAudit Knowledge Base Deployment Check List June 2012 In This Article: Platform Requirements Windows Settings Discovery Configuration Before deploying SiteAudit it is recommended to review the information
TROUBLESHOOTING GUIDE
Lepide Software LepideAuditor Suite TROUBLESHOOTING GUIDE This document explains the troubleshooting of the common issues that may appear while using LepideAuditor Suite. Copyright LepideAuditor Suite,
HoneyBOT User Guide A Windows based honeypot solution
HoneyBOT User Guide A Windows based honeypot solution Visit our website at http://www.atomicsoftwaresolutions.com/ Table of Contents What is a Honeypot?...2 How HoneyBOT Works...2 Secure the HoneyBOT Computer...3
XIA Configuration Server
XIA Configuration Server XIA Configuration Server v7 Installation Quick Start Guide Monday, 05 January 2015 1 P a g e X I A C o n f i g u r a t i o n S e r v e r Contents Requirements... 3 XIA Configuration
DCA Local Print Agent Push Install
DCA Local Print Agent Push Install PageTrac Support DCA Local Print Agent Push Install System Requirements Each workstation on which you install Local Print Agent must have the following: Windows operating
Kaseya 2. Installation guide. Version 7.0. English
Kaseya 2 Kaseya Server Setup Installation guide Version 7.0 English September 4, 2014 Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept
Rebasoft Auditor Quick Start Guide
Copyright Rebasoft Limited: 2009-2011 1 Release 2.1, Rev. 1 Copyright Notice Copyright 2009-2011 Rebasoft Ltd. All rights reserved. REBASOFT Software, the Rebasoft logo, Rebasoft Auditor are registered
Security Correlation Server Quick Installation Guide
orrelogtm Security Correlation Server Quick Installation Guide This guide provides brief information on how to install the CorreLog Server system on a Microsoft Windows platform. This information can also
User Guide. Version 3.2. Copyright 2002-2009 Snow Software AB. All rights reserved.
Version 3.2 User Guide Copyright 2002-2009 Snow Software AB. All rights reserved. This manual and computer program is protected by copyright law and international treaties. Unauthorized reproduction or
Administrator s Upgrade Guide.
Administrator s Upgrade Guide. InfoRouter Version 6.0 to Version 7.0 1 T hank you for upgrading inforouter. This guide will take you through the step-by-step upgrade procedures required for a successful
enicq 5 System Administrator s Guide
Vermont Oxford Network enicq 5 Documentation enicq 5 System Administrator s Guide Release 2.0 Published November 2014 2014 Vermont Oxford Network. All Rights Reserved. enicq 5 System Administrator s Guide
How To Upgrade A Websense Log Server On A Windows 7.6 On A Powerbook (Windows) On A Thumbdrive Or Ipad (Windows 7.5) On An Ubuntu 7.3.2 (Windows 8) Or Windows
Websense v7.6 Install or Upgrade Checklist Greetings from Websense Technical Support. Most Websense upgrades complete successfully, and from my years of troubleshooting, I have learned a number of steps
Quick Start Guide. Cerberus FTP is distributed in Canada through C&C Software. Visit us today at www.ccsoftware.ca!
Quick Start Guide Cerberus FTP is distributed in Canada through C&C Software. Visit us today at www.ccsoftware.ca! How to Setup a File Server with Cerberus FTP Server FTP and SSH SFTP are application protocols
SyncThru TM Web Admin Service Administrator Manual
SyncThru TM Web Admin Service Administrator Manual 2007 Samsung Electronics Co., Ltd. All rights reserved. This administrator's guide is provided for information purposes only. All information included
WhatsUp Gold v16.1 Installation and Configuration Guide
WhatsUp Gold v16.1 Installation and Configuration Guide Contents Installing and Configuring Ipswitch WhatsUp Gold v16.1 using WhatsUp Setup Installing WhatsUp Gold using WhatsUp Setup... 1 Security guidelines
Remote Management System
RMS Copyright and Distribution Notice November 2009 Copyright 2009 ARTROMICK International, Inc. ALL RIGHTS RESERVED. Published 2009. Printed in the United States of America WARNING: ANY UNAUTHORIZED
DOCSVAULT Document Management System for everyone
Installation Guide DOCSVAULT Document Management System for everyone 9 v Desktop and Web Client v On Premises Solution v Intelligent Data Capture v Email Automation v Workflow & Record Retention Installing
Training module 2 Installing VMware View
Training module 2 Installing VMware View In this second module we ll install VMware View for an End User Computing environment. We ll install all necessary parts such as VMware View Connection Server and
Ajera 7 Installation Guide
Ajera 7 Installation Guide Ajera 7 Installation Guide NOTICE This documentation and the Axium software programs may only be used in accordance with the accompanying Axium Software License and Services
Reporting works by connecting reporting tools directly to the database and retrieving stored information from the database.
Print Audit 6 - Step by Step Walkthrough IMPORTANT: READ THIS BEFORE PERFORMING A PRINT AUDIT 6 INSTALLATION Print Audit 6 is a desktop application that you must install on every computer where you want
VeriCentre 3.0 Upgrade Pre-Installation and Post Installation Guidelines
VeriCentre 3.0 Upgrade Pre-Installation and Post Installation Guidelines * For actual installation steps, please refer to the VeriCentre 3.0 Installation guide that came with the VeriCentre 3.0 software.
Reconfiguring VMware vsphere Update Manager
Reconfiguring VMware vsphere Update Manager vsphere Update Manager 6.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a
Installing The SysAidTM Server Locally
Installing The SysAidTM Server Locally Document Updated: 17 October 2010 Introduction SysAid is available in two editions: a fully on-demand ASP solution and an installed, in-house solution for your server.
Smart Cloud Integration Pack. For System Center Operation Manager. v1.1.0. User's Guide
Smart Cloud Integration Pack For System Center Operation Manager v1.1.0 User's Guide Table of Contents 1. INTRODUCTION... 6 1.1. Overview... 6 1.2. Feature summary... 7 1.3. Supported Microsoft System
Immotec Systems, Inc. SQL Server 2005 Installation Document
SQL Server Installation Guide 1. From the Visor 360 installation CD\USB Key, open the Access folder and install the Access Database Engine. 2. Open Visor 360 V2.0 folder and double click on Setup. Visor
Quick Start Guide 0514US
Quick Start Guide Copyright Wasp Barcode Technologies 2014 No part of this publication may be reproduced or transmitted in any form or by any means without the written permission of Wasp Barcode Technologies.
System Administration Training Guide. S100 Installation and Site Management
System Administration Training Guide S100 Installation and Site Management Table of contents System Requirements for Acumatica ERP 4.2... 5 Learning Objects:... 5 Web Browser... 5 Server Software... 5
DS License Server. Installation and Configuration Guide. 3DEXPERIENCE R2014x
DS License Server Installation and Configuration Guide 3DEXPERIENCE R2014x Contains JAVA SE RUNTIME ENVIRONMENT (JRE) VERSION 7 Contains IBM(R) 64-bit SDK for AIX(TM), Java(TM) Technology Edition, Version
MAS 90. Installation and System Administrator's Guide 4WIN1010-02/04
MAS 90 Installation and System Administrator's Guide 4WIN1010-02/04 Copyright 1998-2004 Best Software, Inc. All rights reserved. Rev 02 Contents Chapter 1 Introduction 1 How to Use This Manual 1 Graphic
HP Client Automation Standard Fast Track guide
HP Client Automation Standard Fast Track guide Background Client Automation Version This document is designed to be used as a fast track guide to installing and configuring Hewlett Packard Client Automation
WhatsUp Gold v16.2 Installation and Configuration Guide
WhatsUp Gold v16.2 Installation and Configuration Guide Contents Installing and Configuring Ipswitch WhatsUp Gold v16.2 using WhatsUp Setup Installing WhatsUp Gold using WhatsUp Setup... 1 Security guidelines
Knowledge Base Article: Article 218 Revision 2 How to connect BAI to a Remote SQL Server Database?
Knowledge Base Article: Article 218 Revision 2 How to connect BAI to a Remote SQL Server Database? Date: January 11th, 2011 Last Update: January 21st, 2013 (see Section 2, C, 4) Problem: You want to create
SplendidCRM Deployment Guide
SplendidCRM Deployment Guide Version 5.x Last Updated: December 14, 2010 Category: Deployment This guide is for informational purposes only. SPLENDIDCRM SOFTWARE MAKES NO WARRANTIES, EXPRESS OR IMPLIED,
Server Application. ACTi NVR v2.2. Quick Installation Guide
Server Application ACTi NVR v2.2 Quick Installation Guide ACTi APP-2000 This document is copyrighted, 2003-2008 by ACTi Corporation. All rights are reserved. ACTi Corporation reserves the right to make
Embarcadero Performance Center 2.7 Installation Guide
Embarcadero Performance Center 2.7 Installation Guide Copyright 1994-2009 Embarcadero Technologies, Inc. Embarcadero Technologies, Inc. 100 California Street, 12th Floor San Francisco, CA 94111 U.S.A.
Sophos for Microsoft SharePoint startup guide
Sophos for Microsoft SharePoint startup guide Product version: 2.0 Document date: March 2011 Contents 1 About this guide...3 2 About Sophos for Microsoft SharePoint...3 3 System requirements...3 4 Planning
TROUBLESHOOTING GUIDE
TROUBLESHOOTING GUIDE (When using SQL Server 2008 R2) Third edition, (3 Dec 2013) This manual applies to these networked products: Lucid CoPS, Lucid Rapid, LASS 8-11, LASS 11-15 LADS, LADS Plus, Lucid
Cisco TelePresence Management Suite Provisioning
Cisco TelePresence Management Suite Provisioning Troubleshooting guide D14427.03 December 2010 Introduction Table of Contents Introduction... 3 Provisioning logs... 4 Cisco TMS provisioning directory logs...
Pearl Echo Installation Checklist
Pearl Echo Installation Checklist Use this checklist to enter critical installation and setup information that will be required to install Pearl Echo in your network. For detailed deployment instructions
SAS 9.2.2 Installation via the Client-Server Image (CAHNRS Site License)
Requirements and preliminary steps SAS 9.2.2 Installation via the Client-Server Image (CAHNRS Site License) SAS 9.2.2 will run on Windows XP Pro*, Vista Business/Ultimate**, Windows 7 Professional/Enterprise,
Intelligent Power Protector User manual extension for Microsoft Virtual architectures: Hyper-V 6.0 Manager Hyper-V Server (R1&R2)
Intelligent Power Protector User manual extension for Microsoft Virtual architectures: Hyper-V 6.0 Manager Hyper-V Server (R1&R2) Hyper-V Manager Hyper-V Server R1, R2 Intelligent Power Protector Main
Dell UPS Local Node Manager USER'S GUIDE EXTENSION FOR MICROSOFT VIRTUAL ARCHITECTURES Dellups.com
CHAPTER: Introduction Microsoft virtual architecture: Hyper-V 6.0 Manager Hyper-V Server (R1 & R2) Hyper-V Manager Hyper-V Server R1, Dell UPS Local Node Manager R2 Main Operating System: 2008Enterprise
Installation and configuration guide
Installation and Configuration Guide Installation and configuration guide Adding X-Forwarded-For support to Forward and Reverse Proxy TMG Servers Published: May 2010 Applies to: Winfrasoft X-Forwarded-For
BlackBerry Enterprise Service 10. Version: 10.2. Configuration Guide
BlackBerry Enterprise Service 10 Version: 10.2 Configuration Guide Published: 2015-02-27 SWD-20150227164548686 Contents 1 Introduction...7 About this guide...8 What is BlackBerry Enterprise Service 10?...9
Installation Guide: Delta Module Manager Launcher
Installation Guide: Delta Module Manager Launcher Overview... 2 Delta Module Manager Launcher... 2 Pre-Installation Considerations... 3 Hardware Requirements... 3 Software Requirements... 3 Virtualisation...
HELIX MEDIA LIBRARY INSTALL GUIDE FOR WINDOWS SERVER 2003 Helix Media Library Version 1.1. Revision Date: July 2011
HELIX MEDIA LIBRARY INSTALL GUIDE FOR WINDOWS SERVER 2003 Helix Media Library Version 1.1 Revision Date: July 2011 Summary of Contents Summary of Contents... 2 Pre Installation Checklist... 4 Prerequisites...
NeuralStar Installation Guide
NeuralStar Installation Guide Version 9.8 Release 2 October 2011 1st Edition Preface Software License Agreement Software is defined as the Kratos Technology & Training Solutions, Inc. computer programs
Kepware Technologies Remote OPC DA Quick Start Guide (DCOM)
Kepware Technologies Remote OPC DA Quick Start Guide (DCOM) March, 2013 Ref. 03.10 Kepware Technologies Table of Contents 1. Overview... 1 1.1 What is DCOM?... 1 1.2 What is OPCEnum?... 1 2. Users and
Release Notes for Websense Email Security v7.2
Release Notes for Websense Email Security v7.2 Websense Email Security version 7.2 is a feature release that includes support for Windows Server 2008 as well as support for Microsoft SQL Server 2008. Version
Introduction and Overview
Inmagic Content Server Workgroup 10.00 Microsoft SQL Server 2005 Express Edition Installation Notes Introduction and Overview These installation notes are intended for the following scenarios: 1) New installations
Installing and Configuring vcenter Multi-Hypervisor Manager
Installing and Configuring vcenter Multi-Hypervisor Manager vcenter Server 5.1 vcenter Multi-Hypervisor Manager 1.1 This document supports the version of each product listed and supports all subsequent
Portions of this product were created using LEADTOOLS 1991-2009 LEAD Technologies, Inc. ALL RIGHTS RESERVED.
Installation Guide Lenel OnGuard 2009 Installation Guide, product version 6.3. This guide is item number DOC-110, revision 1.038, May 2009 Copyright 1992-2009 Lenel Systems International, Inc. Information
LOCAL PRINT AGENT OVERVIEW
LOCAL PRINT AGENT OVERVIEW The Local Print Agent is used to collect information from local printing devices. The technology of the local device determines the information reported to the Local Print Agent
for Networks Installation Guide for the application on a server September 2015 (GUIDE 2) Memory Booster version 1.3-N and later
for Networks Installation Guide for the application on a server September 2015 (GUIDE 2) Memory Booster version 1.3-N and later Copyright 2015, Lucid Innovations Limited. All Rights Reserved Lucid Research
escan SBS 2008 Installation Guide
escan SBS 2008 Installation Guide Following things are required before starting the installation 1. On SBS 2008 server make sure you deinstall One Care before proceeding with installation of escan. 2.
AutoDownload: SQL Server and Network Trouble Shooting
AutoDownload: SQL Server and Network Trouble Shooting AutoDownload uses Microsoft s SQL Server database software. Since 2005 when AutoDownload was first released Microsoft have also released new versions
EMR Link Server Interface Installation
EMR Link Server Interface Installation Version 1.0 ** INTRODUCTION ** If you would like assistance with installation, please contact our preferred support provider at [email protected], or call
safend a w a v e s y s t e m s c o m p a n y
safend a w a v e s y s t e m s c o m p a n y SAFEND Data Protection Suite Installation Guide Version 3.4.5 Important Notice This guide is delivered subject to the following conditions and restrictions:
Welcome to the QuickStart Guide
QuickStart Guide Welcome to the QuickStart Guide This QuickStart Guide provides the information you need to install and start using Express Software Manager. For more comprehensive help on using Express
DS License Server V6R2013x
DS License Server V6R2013x DS License Server V6R2013x Installation and Configuration Guide Contains JAVA SE RUNTIME ENVIRONMENT (JRE) VERSION 7 Contains IBM(R) 64-bit SDK for AIX(TM), Java(TM) Technology
Deltek Costpoint 7.1.1. New Installation Guide for Microsoft SQL Server
Deltek Costpoint 7.1.1 New Installation Guide for Microsoft SQL Server March 28, 2016 While Deltek has attempted to verify that the information in this document is accurate and complete, some typographical
Security Correlation Server Quick Installation Guide
orrelog Security Correlation Server Quick Installation Guide This guide provides brief information on how to install the CorreLog Server system on a Microsoft Windows platform. This information can also
LockView 4.3.1 CompX Database & Network Configuration & Installation Manual
LockView 4.3.1 CompX Database & Network Configuration & Installation Manual Table of Contents CompX Database & Network Configuration & Installation Manual Introduction... 4 Installation Requirements...
Installation Notes for Outpost Network Security (ONS) version 3.2
Outpost Network Security Installation Notes version 3.2 Page 1 Installation Notes for Outpost Network Security (ONS) version 3.2 Contents Installation Notes for Outpost Network Security (ONS) version 3.2...
These notes are for upgrading the Linko Version 9.3 MS Access database to a SQL Express 2008 R2, 64 bit installations:
These notes are for upgrading the Linko Version 9.3 MS Access database to a SQL Express 2008 R2, 64 bit installations: This document substitutes for STEPS TWO and THREE of the upgrade Game Plan Webpage
ilaw Installation Procedure
ilaw Installation Procedure This guide will provide a reference for a full installation of ilaw Case Management Software. Contents ilaw Overview How ilaw works Installing ilaw Server on a PC Installing
Setting up FileMaker 10 Server
Setting up FileMaker 10 Server Note : If your current live Database folder is located in the default database folder ( C:\Program Files\FileMaker\FileMaker Server\Data\Databases ), move\copy this folder
Installation and Configuration Guide
Installation and Configuration Guide Overview This document is designed to provide a quick installation and configuration guide for WinGate using the client NAT connection. WinGate Internet Gateway and
Integrating LANGuardian with Active Directory
Integrating LANGuardian with Active Directory 01 February 2012 This document describes how to integrate LANGuardian with Microsoft Windows Server and Active Directory. Overview With the optional Identity
Advanced Event Viewer Manual
Advanced Event Viewer Manual Document version: 2.2944.01 Download Advanced Event Viewer at: http://www.advancedeventviewer.com Page 1 Introduction Advanced Event Viewer is an award winning application
Installing and Configuring Active Directory Agent
CHAPTER 2 Active Directory Agent is a software application that comes packaged as a Windows installer. You must install it on a Windows machine and configure it with client devices and AD domain controllers.
LockView 4.2 CompX Database & Network Configuration & Installation Manual
LockView 4.2 CompX Database & Network Configuration & Installation Manual Table of Contents CompX Database & Network Configuration & Installation Manual Introduction... 4 Installation Requirements... 5
Synchronization with Microsoft Team Foundation Server 2010
Synchronization with Microsoft Team Foundation Server 2010 How To Setup March 19, 2011 v. 2 INTRODUCTION 3 PREREQUISITES 3 INSTALLATION 3 DEPLOYMENT SCENARIOS 4 SINGLE SERVER SCENARIO 4 DISTRIBUTED SCENARIO
CIMHT_006 How to Configure the Database Logger Proficy HMI/SCADA CIMPLICITY
CIMHT_006 How to Configure the Database Logger Proficy HMI/SCADA CIMPLICITY Outline The Proficy HMI/SCADA CIMPLICITY product has the ability to log point data to a Microsoft SQL Database. This data can
Network/Floating License Installation Instructions
Network/Floating License Installation Instructions Installation steps: On the Windows PC that will act as License Manager (SERVER): 1. Install HASP Run-time environment, SERVER 2. Plug in the red USB hardware
Kaseya 2. User Guide. Version 7.0. English
Kaseya 2 Patch Management User Guide Version 7.0 English September 3, 2014 Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept EULATOS
Upgrading from MSDE to SQL Server 2005 Express Edition with Advanced Services SP2
Upgrading from MSDE to SQL Server 2005 Express Edition with Advanced Services SP2 Installation and Configuration Introduction This document will walk you step by step in removing MSDE and the setup and
How To Create An Easybelle History Database On A Microsoft Powerbook 2.5.2 (Windows)
Introduction EASYLABEL 6 has several new features for saving the history of label formats. This history can include information about when label formats were edited and printed. In order to save this history,
PROJECTIONS SUITE. Database Setup Utility (and Prerequisites) Installation and General Instructions. v0.9 draft prepared by David Weinstein
PROJECTIONS SUITE Database Setup Utility (and Prerequisites) Installation and General Instructions v0.9 draft prepared by David Weinstein Introduction These are the instructions for installing, updating,
Remote Console Installation & Setup Guide. November 2009
Remote Console Installation & Setup Guide November 2009 Legal Information All rights reserved. No part of this document shall be reproduced or transmitted by any means or otherwise, without written permission
InventoryControl for use with QuoteWerks Quick Start Guide
InventoryControl for use with QuoteWerks Quick Start Guide Copyright 2013 Wasp Barcode Technologies 1400 10 th St. Plano, TX 75074 All Rights Reserved STATEMENTS IN THIS DOCUMENT REGARDING THIRD PARTY
