enicq 5 System Administrator s Guide

Similar documents
How To Create An Easybelle History Database On A Microsoft Powerbook (Windows)

ilaw Installation Procedure

Creating client-server setup with multiple clients

InventoryControl for use with QuoteWerks Quick Start Guide

STATISTICA VERSION 12 STATISTICA ENTERPRISE SMALL BUSINESS INSTALLATION INSTRUCTIONS

Installation Instruction STATISTICA Enterprise Small Business

Sharp Remote Device Manager (SRDM) Server Software Setup Guide

User Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream

Immotec Systems, Inc. SQL Server 2005 Installation Document

Migrating TimeForce To A New Server

PigCHAMP Knowledge Software. Enterprise Edition Installation Guide

Installing SQL Express. For CribMaster 9.2 and Later

Lepide Active Directory Self Service. Installation Guide. Lepide Active Directory Self Service Tool. Lepide Software Private Limited Page 1

Magaya Software Installation Guide

Configuring Security Features of Session Recording

Setting up an MS SQL Server for IGSS

WhatsUp Gold v16.3 Installation and Configuration Guide

Quick Start Guide for VMware and Windows 7

safend a w a v e s y s t e m s c o m p a n y

Migrating MSDE to Microsoft SQL 2008 R2 Express

1. Set Daylight Savings Time Create Migrator Account Assign Migrator Account to Administrator group... 4

Bentley CONNECT Dynamic Rights Management Service

Installation & Configuration Guide

Installation Instruction STATISTICA Enterprise Server

Out n About! for Outlook Electronic In/Out Status Board. Administrators Guide. Version 3.x

Installation and Deployment

Setup and Configuration Guide for Pathways Mobile Estimating

Portions of this product were created using LEADTOOLS LEAD Technologies, Inc. ALL RIGHTS RESERVED.

Version 3.8. Installation Guide

Velocity Web Services Client 1.0 Installation Guide and Release Notes

Setup and configuration for Intelicode. SQL Server Express

QUANTIFY INSTALLATION GUIDE

4cast Client Specification and Installation

intertrax Suite resource MGR Web

for Networks Installation Guide for the application on the server July 2014 (GUIDE 2) Lucid Rapid Version 6.05-N and later

Remote Management System

Issue Tracking Anywhere Installation Guide

Pearl Echo Installation Checklist

Nexio Connectus with Nexio G-Scribe

DESLock+ Basic Setup Guide Version 1.20, rev: June 9th 2014

Quick Start Guide for Parallels Virtuozzo

OneStop Reporting 3.7 Installation Guide. Updated:

Installation Guide for Pulse on Windows Server 2012

2X ApplicationServer & LoadBalancer Manual

System Administration Training Guide. S100 Installation and Site Management

Getting Started. Symantec Client Security. About Symantec Client Security. How to get started

GlobalSCAPE DMZ Gateway, v1. User Guide

NETASQ SSO Agent Installation and deployment

Installation Guide for Pulse on Windows Server 2008R2

TANDBERG MANAGEMENT SUITE 10.0

Omgeo OASYS Workstation Installation Guide. Version 6.4 December 13, 2011

Advanced Event Viewer Manual

Portions of this product were created using LEADTOOLS LEAD Technologies, Inc. ALL RIGHTS RESERVED.

STATISTICA VERSION 9 STATISTICA ENTERPRISE INSTALLATION INSTRUCTIONS FOR USE WITH TERMINAL SERVER

How To Set Up Safetica Insight 9 (Safetica) For A Safetrica Management Service (Sms) For An Ipad Or Ipad (Smb) (Sbc) (For A Safetaica) (

Sophos for Microsoft SharePoint startup guide

Metalogix SharePoint Backup. Advanced Installation Guide. Publication Date: August 24, 2015

Table of Contents. CHAPTER 1 About This Guide CHAPTER 2 Introduction CHAPTER 3 Database Backup and Restoration... 15

Spector 360 Deployment Guide. Version 7

RSA Security Analytics

EntroWatch - Software Installation Troubleshooting Guide

Freshservice Discovery Probe User Guide

Quick Start Guide 0514US

IsItUp Quick Start Manual

FileMaker Server 12. FileMaker Server Help

Topaz Installation Sheet

MailStore Outlook Add-in Deployment

ACTIVE DIRECTORY DEPLOYMENT

with the ArchiveSync Add-On Evaluator s Guide 2015 Software Pursuits, Inc.

Installation and Connection Guide to the simulation environment GLOBAL VISION

Setting Up SSL on IIS6 for MEGA Advisor

Installing CaseMap Server User Guide

Getting started. Symantec AntiVirus Corporate Edition. About Symantec AntiVirus. How to get started

Install MS SQL Server 2012 Express Edition

for Networks Installation Guide for the application on the server August 2014 (GUIDE 2) Lucid Exact Version 1.7-N and later

How To Manage Storage With Novell Storage Manager 3.X For Active Directory

WhatsUp Gold v16.1 Installation and Configuration Guide

SOS Suite Installation Guide

Quickstart Guide. First Edition, Published September Remote Administrator / NOD32 Antivirus 4 Business Edition

Ajera 7 Installation Guide

Central Management System

NSi Mobile Installation Guide. Version 6.2

Kaseya Server Instal ation User Guide June 6, 2008

Video Administration Backup and Restore Procedures

Secret Server Installation Windows 8 / 8.1 and Windows Server 2012 / R2

Upgrade Guide BES12. Version 12.1

Administrators Help Manual

Tool Tip. SyAM Management Utilities and Non-Admin Domain Users

Galileo SSL Installation Guide Galileo SSL Client v

Installing GFI MailSecurity

DOCSVAULT Document Management System for everyone

Installing and Configuring WhatsUp Gold

User's Manual. Intego Remote Management Console User's Manual Page 1

Setting Up a Unisphere Management Station for the VNX Series P/N Revision A01 January 5, 2010

POLICY PATROL MFT. Manual

Download/Install IDENTD

Bosch ReadykeyPRO Unlimited Installation Guide, product version 6.5. This guide is item number DOC , revision 2.029, May 2012.

SIMS Multi-user Installation Instructions

Enterprise Manager. Version 6.2. Installation Guide

Embarcadero Performance Center 2.7 Installation Guide

Transcription:

Vermont Oxford Network enicq 5 Documentation enicq 5 System Administrator s Guide Release 2.0 Published November 2014 2014 Vermont Oxford Network. All Rights Reserved.

enicq 5 System Administrator s Guide Introduction enicq has been created to be a true client/server application using Microsoft SQL Server or SQL Server Express as a database back end. This requires that the client application enicq can communicate over the network to this back end database and that this back end database provides a service to the network. This document is intended to help Systems Administrators secure the enicq 5 installation and to help deploy enicq 5 in a more manageable way. There are 5 sections outlined below: Page 4 Chapter 1: Authentication and User Roles Guide to configuring authentication to the enicq 5 database Page 18 Chapter 2: Securing enicq 5 Data and Auditing Guide to securing enicq 5 Data Page 20 Chapter 3: enicq 5 Firewall Requirements Guide to the network communication requirements for enicq 5 Page 37 Chapter 4: SQL Server Service Listening Port Change Guide to changing the SQL Server listening port if WMI is disabled on your network or the installation fails to set this for you Page 41 Chapter 5: Deploying enicq 5 via Group Policy Guide to deploying enicq 5 via Group Policy for larger, managed deployments This guide is intended for System Administrators. It is intended to provide supplementary information necessary to install enicq 5 in diverse environments. Throughout this guide it is expected that the reader has a base level of technical knowledge required to implement Microsoft Windows networks, support Microsoft SQL Server, configure firewalls, perform network level scripting and make security related decisions. Copyright 2014 Vermont Oxford Network Release 1.0.8. All Rights Reserved. 1

Technical Assistance If any assistance is needed or if you have questions, you can contact Vermont Oxford Network s enicq Technical Support Team in one of the following ways: EMAIL: support@vtoxford.org Phone: 802-865-4814 (extension 240, or ask the operator for enicq Technical Support) Minimum System Requirements enicq 5 Client Software Windows XP SP3 or greater, including Windows Vista and Windows 7 Microsoft.NET Framework version 3.5 or higher At least 400 MB of free disk space At least 1 GB of RAM Installer and client require Internet connection open to vtoxford.org and all subdomains on ports 80 and 443. This connection must accommodate a WCF web service (.svc) Microsoft SQL Server Express 2005 -or- Windows XP SP3, Vista, or 7 workstation OS; Server 2003 or higher server OS Note: SQL Server Express 2005 is not compatible with Windows 8. If you intend to host the database on a Windows 8 machine, you will need to first install SQL Server Express 2008 SP3 or SQL Server Express 2012. Please contact the enicq Technical Support Team before proceeding. Microsoft.NET Framework version 3.5 or higher At least 1 GB of free disk space At least 1 GB of RAM For more information on SQL Server Express 2005, please visit the Microsoft site: http://technet.microsoft.com/en-us/library/ms143506(sql.90).aspx Microsoft SQL Server 2005 or higher Maximum anticipated database size of 1 GB Copyright 2014 Vermont Oxford Network Release 1.0.8. All Rights Reserved. 2

Protected Health Information and HIPAA Confidential patient data items are stored in your local enicq 5 database. Patient identifiers are protected health information as specified in the US Health Insurance Portability and Accountability Act of 1996 (HIPAA) and the regulations implementing HIPAA. enicq 5 has been designed to ensure that patient identifiers cannot be sent to Vermont Oxford Network ( VON ) unless the submitting member has the appropriate agreement(s) in place with VON. Hospitals in the US must implement measures to protect protected health information from unauthorized access, as specified in the HIPAA Privacy and Security regulations. Users of enicq software should be sure to comply with local hospital policies and good information security practices to protect data in the enicq database. Hospitals outside of the US should work with their legal and information security departments to determine the appropriate safeguards required in their jurisdiction(s). To avoid access to the enicq 5 tables by unauthorized personnel, system administrators should review the security options available in the enicq 5 System Administrator s Guide, available at www.vtoxford.org/enicq, and ensure that the application is implemented to be accessible only to hospital staff members who have permission to access the data. If you are unsure about the sufficiency of your information security safeguards, or have any difficulty implementing the instructions in the guide, please consult your IT department or a qualified information security professional for assistance, in order to avoid and prevent HIPAA violations and potential breaches of information security. Copyright 2014 Vermont Oxford Network Release 1.0.8. All Rights Reserved. 3

Chapter 1: Authentication and User Roles There are two levels of authentication to enicq 5: client authentication and database authentication. Application access depends on successful authentication at both levels. Client Authentication Authentication to the enicq 5 client can be managed in one of two ways. An enicq 5 Administrator can manually create unique logins for each application user from within the enicq 5 client. This process is described in detail in the enicq 5 Quick Start Guide, available at www.vtoxford.org/enicq. It is also possible to set up the enicq 5 client authentication to use your Active Directory. In order to use your Active Directory user or group accounts for login to enicq 5, create one or more of the following groups in your Active Directory: EnicqReadOnly This level of access allows users to view existing records and data submission history. EnicqUser This level of access provides users with all the functionality needed to enter new records, view existing records, and submit data to the Vermont Oxford Network. EnicqAdmin This level of access provides users with full application functionality, along with access to some additional tools. Alternately, you can rename the above groups to meet your own naming conventions. To rename the security level groups, please edit the existing entries in table tbllusecuritylevel, column ActiveDirectoryRole. Do not alter the SecurityLevelId values or make any additional entries to this table. Once you have created one or more of the enicq 5 Active Directory groups, add existing Active Directory users or user groups to provide the level of access appropriate for each of your enicq 5 application users. After you have completed this setup, when users who have been added to an enicq 5 Active Directory group launch enicq 5, they will be logged in based on their Active Directory credentials, and will not need to manually log in to enicq 5. If you use Active Directory to manage enicq 5 user accounts, be sure that enicq 5 application administrators are aware that deleting an enicq 5 user account from within the application will not prevent the user from accessing enicq 5. Removing access privileges requires removing the user s account from the enicq 5 Active Directory group. Database Authentication In enicq 5, the front end application communicates with the SQL Server or back end. This requires authentication. By default, the installation uses SQL Server authentication to Copyright 2014 Vermont Oxford Network Release 1.0.8. All Rights Reserved. 4

connect to the back end. The enicq 5 application is installed with a default SQL user account and password. Since this default user account is the same at every installation, it should be disabled before any data is entered. The authentication mechanisms should also be changed to take advantage of Microsoft Windows Authentication and the stronger encryption and policies that can be set. Please see the Microsoft documentation for more information or help with these features. There are many ways to secure authentication. This guide describes what needs to be secured and provides instructions for implementing security measures using standard practice in a pure Microsoft Windows environment. You may need to adjust these instructions to fit your environment. These instructions assume that all computers are in the same domain, or if multiple domains are used, it assumes that the domains have trust relationships that allow for authentication to cross domains. If you are running the full version of SQL Server 2005 or higher, these authentication settings may already be in place, but this documentation should still be reviewed by the SQL Server Administrator. Set SQL Server for Windows Only Authentication The first thing that we recommend is to set SQL Server to use only Windows Authentication. There are two possible authentication mechanisms for SQL: Windows Authentication, or SQL Authentication and Windows Authentication. By default, the SQL Server Express Database is set to use both SQL Authentication and Windows Authentication. If you set the authentication mode to Windows Authentication only, the system will use all of your Microsoft Windows domain settings to authenticate the user. When set properly, these settings can greatly enhance the security of any network. Please see the Microsoft knowledgebase for more information regarding authentication in a Microsoft Windows environment. To set the server to use only Windows Authentication, open the SQL Server Management Studio Express as an administrator and connect via Windows Authentication to the computer that runs the SQL Server Express Database. Copyright 2014 Vermont Oxford Network Release 1.0.8. All Rights Reserved. 5

Right-click on the database server (circled in red below), and select Properties. Within the Server Properties settings, choose Security from the left sidebar under Select a page: Copyright 2014 Vermont Oxford Network Release 1.0.8. All Rights Reserved. 6

Under Server authentication, select Windows Authentication mode. Click OK. You will get a message stating that you need to restart the SQL Server. Click OK. Restart the SQL Server to apply these changes. Since you are in the SQL Server Management Studio, the easiest way to do this is to right-click on the database server again Copyright 2014 Vermont Oxford Network Release 1.0.8. All Rights Reserved. 7

and select Restart. You will get a message asking if you really want to restart. Click Yes. The Service Control dialog will show the database restart progress: Wait until this task is done. Now the server will be set to use Windows Authentication only. Add Windows Account/Group Access to Database You must now add in the Windows accounts and/or groups that will use the enicq 5 client application and give them the enicqdbuser role permission. You may choose to have a group of users added to a Windows Group and assign them enicqdbuser role permissions instead. This may be a better design for your environment. Please check with your System Administrator for advice on Windows Groups. It also should be noted that administrative access to the database is now based on which users have administrative access to the local database machine. By default, this would mean that all Domain administrators and any users added to the local administrators account on the Copyright 2014 Vermont Oxford Network Release 1.0.8. All Rights Reserved. 8

database server machine will be administrators of the enicq 5 database and therefore have full control of the data. Inside SQL Server Management Studio Express, go to the Logins folder within the Security folder (the one that is under the Databases section will not work properly, as you will not be able to see Windows users from there, so make sure you are in the main security folder as shown below). Right-click on the Logins folder and select New Login. Click Search. Copyright 2014 Vermont Oxford Network Release 1.0.8. All Rights Reserved. 9

Now you need to find the user/group account that you want to give permissions to. You should note the Locations and Object Types buttons above; by default, the Select User or Group dialog box will query the machine you are logged in to for user accounts. You may have to select a domain instead of the local machine (as your accounts are most likely domain accounts). By default, it will be looking only at user accounts, but not groups. If you want it to look for groups as well you will have to click Object Types and check the box next to Groups. You can enter an object name within the textbox, or you can click Advanced and click Find Now to help you find the user(s) that you are looking for. You can choose only one user at a time, though you could select a group of users here as well. When you click OK, the system will verify that it can identify which user/group you are talking about. In this example we will be using a group called enicq Users that is part of the local machine s group accounts. Click OK. Copyright 2014 Vermont Oxford Network Release 1.0.8. All Rights Reserved. 10

On the following screen, select the enicq 5 database as the Default database. The enicq 5 database is named enicqdb by default, but your center may have given the database a custom name. Copyright 2014 Vermont Oxford Network Release 1.0.8. All Rights Reserved. 11

Click User Mapping under Select a page. Select enicqdb database (or use the custom name assigned to the database), and then the enicqdbuser role (see red circles below). Verify that it says Database role membership for enicqdb (or custom database name). Click OK. You must repeat these steps for every login/group that needs access to enicq 5. Copyright 2014 Vermont Oxford Network Release 1.0.8. All Rights Reserved. 12

Disabling the default account EnicqUser Now you should disable the default SQL user account named EnicqUser. You do this by going to the Logins folder within the Security folder (the one that is within the enicq 5 database will not work properly, as you will not be able to see Windows users from there, so make sure you are in the main security folder as shown below). Right click on the EnicqUser (circled in red above on the right) and choose Properties. Copyright 2014 Vermont Oxford Network Release 1.0.8. All Rights Reserved. 13

Once in the Properties dialog box, click Status under Select a page. In here you will see Enabled and Disabled radial buttons (circled in red below on the right). Click Disabled and then click OK. You have now disabled the EnicqUser account. Configure the enicq 5 clients to use Windows Authentication Configuring the enicq 5 clients to use Windows Authentication is done most easily by retrieving your copy of the enicq.connection file from the enicq 5 installer, using the installer to edit the connection file with information specific to your center, and distributing the connection file to each of the client software install directories. More detailed instructions for retrieving, editing and distributing your copy of the enicq.connection file are also located in the section of this document entitled Deploying enicq 5 via Group Policy. Retrieve your copy of the enicq.connection file by running the enicqinstaller.exe. When prompted, enter your Center Number and EDS password. If you do not have your password, Copyright 2014 Vermont Oxford Network Release 1.0.8. All Rights Reserved. 14

you will need to contact your Vermont Oxford Network Account Manager. Follow all prompts until you reach the Installation screen. On the installation screen you will see Advanced Install on the bottom left of the screen (circled in red). Click Advanced Install. Copyright 2014 Vermont Oxford Network Release 1.0.8. All Rights Reserved. 15

Now you will see the connection string editor. Click Edit. Once in editing mode, check that the server name is correct and that the database name is correct. Please note that the Server Name will have to be valid from the client s computer as well, so the Vermont Oxford Network recommends using a fully qualified domain name. Also, make sure that the box titled Windows Authentication is selected. Once this is done, click Save. Copyright 2014 Vermont Oxford Network Release 1.0.8. All Rights Reserved. 16

If the database is present, configured, and registered properly (all 4 items are checked with green check marks) you will see a button that says Copy Connection File To. Clicking this button will allow you to save your connection file to a location of your choice. Save that file as enicq.connection to a location that all of your clients can access, as each client will need to have that file saved to its enicq 5 installation folder. (By default, this is C:\Program Files\Vermont Oxford Network.) If you have changed the folder that enicq 5 is installed to, you will need to put the connection file in the same folder as the enicq.exe file. Do this for all enicq 5 clients in your organization. This will force the enicq 5 software to use your currently logged on user credentials to access SQL. This also forces enicq 5 to use Microsoft Windows Authentication as setup by your System Administrator. NOTE: If you have distributed this via Group Policy or are looking for a way to distribute this file automatically please see the section of this document entitled Deploying enicq 5 via Group Policy Copyright 2014 Vermont Oxford Network Release 1.0.8. All Rights Reserved. 17

Chapter 2: Properly Securing enicq 5 Data and Auditing enicq 5 was designed to be easy to install and maintain. We have included options in the enicq 5 software that allow you to secure it properly, but many of these options are not configured at the time of installation. These options require evaluation and implementation by a qualified IT technician to properly secure enicq 5 in a Microsoft Windows environment. This section will outline the available options and provide instructions for implementing the various security features. The security options are designed to allow you to enable only the components that you determine are appropriate for your environment This section assumes that you have a Microsoft Windows Domain, and that the installation has already been done for the enicq 5 client with a database called enicqdb. Your center may have assigned a custom name to the enicq 5 database, in which case you will use the custom name instead of enicqdb. Auditing: Data should be entered or edited only from within the enicq 5 application, never from within the database itself. enicq automatically logs time-stamped entries of events that take place within the application. The Audit log is stored in the table tbleventlog, and contains details about the date and time of each event. We have created a view to display the most relevant data. To see this data, open vwauditlog or run the query SELECT * FROM vwauditlog; against the enicq 5 database. This will bring up a table that includes the User Name, Event, Date, Center Number, Affected ID Number (Patient ID or User ID), and Form. It will look similar to this: Note that entries of zero (0) indicate Not Applicable. To fully audit enicq 5, the administrator should also use Microsoft Windows auditing to audit process open and close events for the enicq application, and follow Microsoft best Copyright 2014 Vermont Oxford Network Release 1.0.8. All Rights Reserved. 18

practices regarding auditing of Windows and SQL Server environments. Following these best practices will ensure end-to-end auditing of all aspects of the environment. Please see the Microsoft knowledgebase for more information regarding auditing in a Microsoft Windows environment. If you need additional assistance with this feature, please contact the enicq Technical Support Team. Data transmission to SQL Server back end Data is sent from the client to the server in standard SQL communication. If the communication must be secured, the Vermont Oxford Network recommends either an IPSEC connection be made between the computer running the front end software and the SQL server, or that you enable SSL encryption on the SQL Server back end. Please see the Microsoft knowledgebase for more information on either of these topics. Data transmission to Vermont Oxford Network Most data transferred to and from the Vermont Oxford Network through enicq 5 is encrypted via SSL. Data that is sent to Vermont Oxford Network from enicq 5 is de-identified, and contains no Protected Health Information unless the submitting member center has the appropriate agreements in place with the Vermont Oxford Network. Data such as version information may be transmitted without encryption, but all patient data or de-identified data is encrypted. Data Storage All data is stored in a SQL Server database and all backups are done via SQL Server. None of this data is encrypted by default, and must be secured properly. If encryption is required, the Vermont Oxford Network recommends that you use Microsoft SQL Server 2008 or higher and use the Transparent Data Encryption option. Please see the Microsoft knowledgebase for more information on setting this up. Securing access to the computer(s) The Vermont Oxford Network recommends that you physically restrict access to any computer with enicq data on it. Anyone who gains physical access to one of these computers may be able to gain access to the enicq data. This is especially important for the computer that holds the SQL installation, as administrative rights for the machine allows access to all the data in the database. Copyright 2014 Vermont Oxford Network Release 1.0.8. All Rights Reserved. 19

Chapter 3: enicq 5 Firewall Requirements This section outlines the requirements for communication from the enicq front end application to both the database back end and the Vermont Oxford Network web servers. NOTE: For all operating systems, enicq 5 requires that firewall settings allow the client to access the following types of web files: *.aspx, *.svc, *.htm and *.html. We have included instructions for Windows 7, Windows XP, and generic instructions for Third Party Firewalls. The Vermont Oxford Network has opted not to include instructions for Windows Vista, as it is nearly the same as Windows 7. Please refer to Windows 7 instructions for Windows Vista. The following sections are intended to be followed on the computer hosting the database if you installed the database using the SQL Server Express installation that came with enicq 5. If you are using an existing SQL Server then you should check with your system administrator to verify these settings. Windows 7: Configuring Your Firewall By default, the Windows 7 Firewall will allow communication to Vermont Oxford Network s web servers. The communication required to talk to Vermont Oxford Network s web servers for data submission is enabled by default in the Windows 7 firewall implementation. This document assumes that this functionality has not been removed. You will need administrative privileges to make these firewall changes. Step 1: Access Advanced Firewall Settings A. Open the Control Panel, and then click on Windows Firewall. If Windows Firewall isn t available, change the View by: option (in the upper right-hand corner) to Large icons or Small icons. First, determine whether your Windows Firewall is on. If the icons displayed are red, your Windows Firewall may be off, or it may be managed by another security vendor (as shown below). If the Windows Firewall is off or if the settings are disabled, you will need to contact your Systems Administrator to make the necessary changes. If your Windows Firewall is enabled and the settings are not being managed by another Copyright 2014 Vermont Oxford Network Release 1.0.8. All Rights Reserved. 20

application, the screen will look similar to the one below. If this is the case, you can use the following instructions to open the ports necessary for the enicq clients to communicate with the database server. B. Click on Advanced settings within the toolbar on the left. At this point, the system may prompt you for administrative credentials. Step 2: Create an Inbound Rule to allow TCP port 1433 for SQL Server Express to listen on. Note: There are two ways to do this, either through a Port rule or a Program rule. This documentation describes creating this firewall rule using a Port rule, as in order to use a Program rule you would have to have the program installed first. Depending on your environment, this may or may not be acceptable. Please consult your Systems Administrator to determine the correct implementation for your environment. If you choose to create a program rule, you will need to implement a program rule for both sqlservr.exe and sqlbrowser.exe after installing enicq 5. Copyright 2014 Vermont Oxford Network Release 1.0.8. All Rights Reserved. 21

A. Click on Inbound Rules to the top left. B. Click on New Rule on the right-hand side to create a new rule. Copyright 2014 Vermont Oxford Network Release 1.0.8. All Rights Reserved. 22

C. Select Port, then click Next. D. Define the Port number and the Protocol to be used. Select TCP. Then within the Specific local ports text box, enter 1433 and click Next. Copyright 2014 Vermont Oxford Network Release 1.0.8. All Rights Reserved. 23

E. To allow traffic on this port, select Allow the connection. Again, this may violate your security policy, so contact your Systems Administrator if you are unsure. F. Define where the new rule applies. The Vermont Oxford Network suggests defining the new rule for all three default profiles: Domain, Private, and Public. In the case of a desktop computer, these settings should be appropriate, as the computer will most likely not change networks (though this is not the most secure option). In the case of a laptop computer, check off only the profile attached to the network in which the enicq software is installed. The premise here is that when you are attached to that profile, this rule will be active. If you are unsure of what you should do here, contact your Systems Administrator for help. G. Once you have checked the applicable boxes, click Next. H. Choose a name for the new rule. The text here is arbitrary, but to help the enicq Copyright 2014 Vermont Oxford Network Release 1.0.8. All Rights Reserved. 24

Technical Support Team assist you during a technical support session, please name the new rule with the starting name of ENICQ 5 so it is easily found. I. Click Finish. Copyright 2014 Vermont Oxford Network Release 1.0.8. All Rights Reserved. 25

Step 3: Create an Inbound Rule to allow UDP port 1434 for the SQL Server Browser to listen on. A. Click on New Rule on the right-hand side to create a new rule. B. Select Port, then click Next. Copyright 2014 Vermont Oxford Network Release 1.0.8. All Rights Reserved. 26

C. Define the Port number and the Protocol to be used. Select UDP, then within the Specific local ports text box, enter 1434 and click Next. D. To allow traffic on this port, select Allow the connection. Again, this may violate your security policy, so contact your Systems Administrator if you are unsure. Click Next. Copyright 2014 Vermont Oxford Network Release 1.0.8. All Rights Reserved. 27

E. Define where the new rule applies. The Vermont Oxford Network suggests defining the new rule for all three default profiles: Domain, Private, and Public. In the case of a desktop computer, these settings should be appropriate, as the computer will most likely not change networks (though this is not the most secure option). In the case of a laptop computer, check off only the profile attached to the network in which the enicq software is installed. The premise here is that when you are attached to that profile, this rule will be active. If you are unsure of what you should do here, contact your Systems Administrator for help. Once you have checked the applicable boxes, click Next. Copyright 2014 Vermont Oxford Network Release 1.0.8. All Rights Reserved. 28

F. Choose a name for the new rule. The text here is arbitrary, but to help the enicq Technical Support Team assist you during technical support session, please name the new rule with the starting name of ENICQ 5 so it is easily found. G. Click Finish. Copyright 2014 Vermont Oxford Network Release 1.0.8. All Rights Reserved. 29

Windows XP: Configuring Your Firewall By default, the Windows 7 Firewall will allow communication to Vermont Oxford Network s web servers. The communication required to talk to Vermont Oxford Network s web servers for data submission is enabled by default in the Windows XP firewall implementation. This document assumes that this functionality has not been removed. Step 1: Access Firewall Settings A. Open the Control Panel and then click on Windows Firewall or Security Center and then Windows Firewall. This will display the Windows Firewall dialog. Tip: You can see if the Windows Firewall is turned on by looking at the icon at the top left corner of the Windows Firewall dialog. If the icon is a green shield, the Windows Firewall is on and the Port will need to be changed as instructed below. If the icon is a red shield, you will need to talk to your Systems Administrator. B. Verify that the Don t allow exceptions check box is unchecked. If the Windows Firewall settings are disabled, then they are managed by your Systems Administrator and you will need to talk to your Systems Administrator in order to get the necessary changes made. Copyright 2014 Vermont Oxford Network Release 1.0.8. All Rights Reserved. 30

C. Click on the Exceptions tab. Step 2: Define the New Rules Note: There are two ways to do this, either through a Port rule or a Program rule. This documentation describes creating this firewall rule using a Port rule, as in order to use a Program rule you would have to have the program installed first. Depending on your environment, this may or may not be acceptable. Please consult your Systems Administrator to determine the correct implementation for your environment. If you choose to create a program rule, you will need to implement a program rule for both sqlservr.exe and sqlbrowser.exe after installing enicq 5. D. Click Add Port. E. Choose a name for the new rule. The text here is arbitrary, but to help the enicq Technical Support Team assist you during a technical support session, please name the new rule with the starting name of ENICQ.Net so it is easily found. F. In the Name text box, enter ENICQ 5 Backend SQL Server. G. In the Port number text box, enter 1433. H. Select TCP. I. Click OK. Copyright 2014 Vermont Oxford Network Release 1.0.8. All Rights Reserved. 31

J. Once you click OK, the Windows Firewall dialog will be displayed again. K. Click Add Port. L. Choose a name for the new rule. The text here is arbitrary, but to help the enicq Technical Support Team assist you during a technical support session, please name the new rule with the starting name of ENICQ 5 so it is easily found. M. In the Name text box enter ENICQ 5 SQL Browser Service. N. In the Port number text box, enter 1434. O. Select UDP. P. Click OK. Copyright 2014 Vermont Oxford Network Release 1.0.8. All Rights Reserved. 32

Q. Once you click OK, the Windows Firewall dialog will be displayed again. R. Click OK once more to save your settings. Copyright 2014 Vermont Oxford Network Release 1.0.8. All Rights Reserved. 33

Third Party Firewall: Configuring Your Firewall This document cannot cover the settings of every type of firewall software on the market, but the basic requirements are applicable to any firewall software. First, the enicq client needs to be able to send data over HTTP (TCP port 80) and HTTPS (TCP port 443) to any of Vermont Oxford Network s websites. At the very least, each client must be able to communicate to offsite.vtoxford.org and www.vtoxford.org. Note: These settings are current at the time of writing, but are subject to change. Limiting network traffic to only these two sites may limit users abilities to access other services offered by the Vermont Oxford Network. It is recommended that the firewall settings allow HTTP/HTTPS traffic to www.vtoxford.org and all child domains so that as Vermont Oxford Network introduces new services, there is no maintenance that needs to be done by your center. Second, the enicq client needs to be able to communicate with the machine that is the DB Server. This machine either has SQL Server Express installed on it using the enicq 5 Installer or has SQL Server installed on it by the Systems Administrator in the center s datacenter. This traffic is sent over TCP port 1433. Third, the enicq installer needs to be able to locate the DB Server using the Scan for Database option. In order for this to happen, the UDP Port 1434 must be open and accessible on the DB Server. Without this port open, the Scan for Database option will not locate the database and you will have to enter the connection information manually. This may be desired, especially if your DB Server and your clients are on different networks. We have included some examples for your reference: Copyright 2014 Vermont Oxford Network Release 1.0.8. All Rights Reserved. 34

Diagram A - Non-routed flat network where clients and DB Server are in the same network: Copyright 2014 Vermont Oxford Network Release 1.0.8. All Rights Reserved. 35

Diagram B - Routed network where DB Server is in a separate network from the clients: Copyright 2014 Vermont Oxford Network Release 1.0.8. All Rights Reserved. 36

Chapter 4: SQL Server Service listening port change This section outlines how you would change the back end database network settings to ensure that the service is provided by a consistent TCP/IP port. Normally this is done automatically via the installer, but this can be done only via Windows Management Infrastructure. Some organizations have disabled Windows Management Infrastructure due to security concerns, so the installer would fail to set this static port. This section explains how to do this manually in the case that it is not done automatically. Configuring SQL Server Express Port Numbers Changing the SQL Server Express Port numbers from dynamic to static to ensure connectivity in an environment with host-based firewalls 1. You must have administrative privileges to complete this action. Once you have verified that you have administrative privileges, click on the Start menu button, then from Program Files, select Microsoft SQL Server 2005, and then Configuration Tools. Select SQL Server Configuration Manager. 2. If you are running Windows 7 or Windows Vista, you may be prompted by the User Account Control dialog as shown below to allow this action. If so, click Yes. 3. With SQL Server Configuration Manager open, please verify that you have selected the Protocols for VONENICQDB item. 4. Verify that the protocol TCP/IP has the status as Enabled. Copyright 2014 Vermont Oxford Network Release 1.0.8. All Rights Reserved. 37

5. Double-click on the enabled TCP/IP protocol. 6. Click on the IP Addresses tab. 7. Scroll to the bottom where the column it displays IPAll. Copyright 2014 Vermont Oxford Network Release 1.0.8. All Rights Reserved. 38

8. Set the TCP Dynamic Ports to be blank, and TCP Port to be 1433 as shown below. Click OK once these values are set as shown below. 9. You will then be notified that the service will need to be restarted in order for the changes to take effect. Click OK. To do this, go back to SQL Server Configuration Manager and select SQL Server 2005 Services. Copyright 2014 Vermont Oxford Network Release 1.0.8. All Rights Reserved. 39

Right-click on SQL Server (VONENICQDB) and choose Restart. Verifying that service is setup correctly 1. Once the service has restarted, open a command prompt. 2. Click on the Start menu button, and then All Programs. Select Accessories, then Command Prompt. Alternatively, you can open the Run program and type cmd within the Run dialog. 3. Now type netstat a and click Enter. 4. You will be looking for a line that says: TCP 0.0.0.0:1433 that is in the state of Listening. If the above information is displayed, then you have correctly configured the service and you now have the ENICQ SQL Server listening on TCP port 1433. You will want to ensure that this service is available as often as possible, as it is required for any of the clients to work properly. You should think of this computer as a server, as it provides a service. You will also want to refer to the documentation entitled enicq 5 Firewall Settings and Traffic Requirements to ensure that network communications will not be impeded by any firewalls. Copyright 2014 Vermont Oxford Network Release 1.0.8. All Rights Reserved. 40

Chapter 5: Deploying enicq 5 via Group Policy This section outlines how you could deploy enicq 5 via Group Policy. This would be done in environments where software is maintained only by System Administration staff or in environments where the software will be installed to many workstations. Before attempting to complete the steps described in this guide, please ensure that the database enicqdb has been created and is either being hosted by SQL Server Express (included with the enicq 5 installer), or is being hosted by your center s existing SQL Server. If your center has chosen a custom name for the database instead of enicqdb, use the custom database name in place of enicqdb when following the instructions below. For more information on installing enicq 5, see the enicq 5 Installation Guide. Once you have confirmed that the database has been created, request the enicq 5 MSI file from Vermont Oxford Network s Technical Support team at 802-865-4814, ext. 240, or email support@vtoxford.org. Retrieving the enicq.connection file Our software does not ship with the connection information pre-populated, as the connection information is encrypted and will be different for every installation. Your center will need to retrieve your copy of the enicq.connection file, then either distribute the file via a script (instructions will follow), or add it to the enicq 5 MSI file with an MSI utility such as Wise Installation Studio (MSI repackaging is beyond the scope of this document). To retrieve your copy of the connection file, open the installer. Log in with your Center ID and EDS Password, and then click Advanced Install. Now you will see the connection string editor. Click Edit. Ensure that you are entering the connection information from the point of view of the workstations that will be used to access the enicq 5 database. The Vermont Oxford Network recommends using a Fully Qualified Copyright 2014 Vermont Oxford Network Release 1.0.8. All Rights Reserved. 41

Domain Name for the Server Name. If your SQL Server uses dynamic ports, enter port 0. When you have finished, click Test. The connection status is displayed to the right of the editor. If green check marks appear beside all of the items, the option to Copy Connection File To will be available. If a red x is displayed to the left of any of the items, you will need to review your connection information and verify that you have a valid enicq 5 database present. If you are not the System Administrator who created the enicq 5 database, verify these settings with the person who created the database. For further assistance, contact the Vermont Oxford Network s enicq Technical Support Team. Copyright 2014 Vermont Oxford Network Release 1.0.8. All Rights Reserved. 42

Click Copy Connection File To. The installer will ask where you want to save the enicq.connection file. This is the file that contains the connection information. Save the enicq.connection file to a location that you can access easily. Now that you have a copy of the enicq.connection file, you can distribute the software via Group Policy. Creating a distribution point for enicq 5 and deploying via Group Policy The process of installing software via Group Policy is well documented within the Microsoft knowledgebase. The enicq 5 MSI works properly with Group Policy and can be distributed using the standard Microsoft protocol. The Vermont Oxford Network uses this process internally to release the software to our users. The workstation(s) that will have the enicq 5 client installed must have read permissions to the network location where the MSI is located. For most installations, this is a network share where Domain Computers have read access. Copyright 2014 Vermont Oxford Network Release 1.0.8. All Rights Reserved. 43

Creating a Group Policy Object that runs a script upon installation Create a Group Policy object that runs a computer script. (For more information on this, please consult the Microsoft knowledgebase.) This script will copy the enicq.connection file to the same location as the enicq.exe file. (In a typical installation this will be C:\Program Files\Vermont Oxford Network. ) A variety of languages and techniques may be used to write a script for distributing the enicq.connection file. (Consult the Microsoft knowledgebase to find out which languages can be executed via a Group Policy computer script.) We have included a sample batch file that you may choose to use as a template. First, you will need the UNC location of the enicq.connection file. The workstation computer account will need to have read permissions for this location. (This could easily be the same location as the MSI file referenced above.) In the sample below, the UNC location is \\enicqtestsrv\activedirectory. The first line is: pushd "\\enicqtestsrv\activedirectory" Pushd will assign an unused drive letter (starting at Z and working back up the alphabet until an unused drive letter is found) to the directory you specify. The next line is: xcopy /Z /I /E /Y "Z:\Vermont Oxford Network" "c:\program files\vermont Oxford Network" Xcopy is an enhanced copy utility that has some specific features. In this case we have used the following options: /Z copies files in restartable mode (so that a network error does not stop the copy operation, it is just tried again). /I tells Xcopy to assume that the destination must be a directory in case this script is run before enicq 5 is installed. /E copies directories and subdirectories. /Y suppresses prompting to confirm that you want to overwrite a destination file (so that if you change the file it will be changed on the client). Z:\Vermont Oxford Network is the location that is now mapped. This may differ in your environment. For instance, if z: is already mapped in your environment, another drive letter will be used. Change your script to reflect the appropriate location. The last line is: popd Popd removes the temporary drive mapping. This is done to be thorough. Copyright 2014 Vermont Oxford Network Release 1.0.8. All Rights Reserved. 44

The whole script would look like: pushd "\\enicqtestsrv\activedirectory" xcopy /Z /I /E /Y "Z:\Vermont Oxford Network" "c:\program files\vermont Oxford Network" popd These steps will need to be modified to match your environment. The script you create should be tested appropriately before deployment. In order to test this script, ensure that the batch file is working on a test machine. To run the script using your user profile, permissions to the source directory may need to be modified. After you have established appropriate permissions, deploy the script via a Group Policy Computer startup script and test it one more time. This will eliminate any Group Policy errors first, as you know you have a good running script. Once these two Group Policies are created and assigned to the users, enicq 5 will be installed and configured for them. The users still may have to go through the initial configuration process for enicq 5, but upgrades can now be handled via Group Policy by creating another Group Policy Software Deployment package. The installer technology used by enicq 5 will automatically uninstall the previous version. The installer does not remove the enicq.connection file. If moving the database is necessary, the process will be easier because you will then be able to just recreate the enicq.connection file and copy it over the existing one to get the clients to connect to the new location. Copyright 2014 Vermont Oxford Network Release 1.0.8. All Rights Reserved. 45