LAB 5 ANSWER KEY WORKING WITH FIREWALLS, ENCRYPTED FILE SYSTEMS (EFS) AND USER ACCOUNT CONTROL (UAC)

Size: px
Start display at page:

Download "LAB 5 ANSWER KEY WORKING WITH FIREWALLS, ENCRYPTED FILE SYSTEMS (EFS) AND USER ACCOUNT CONTROL (UAC)"

Transcription

1 LAB 5 ANSWER KEY WORKING WITH FIREWALLS, ENCRYPTED FILE SYSTEMS (EFS) AND USER ACCOUNT CONTROL (UAC) This lab contains the following exercises: Exercise 5.1 Exercise 5.2 Exercise 5.3 Exercise 5.4 Exercise 5.5 Exercise 5.6 Installing Internet Information Server Testing IIS Connectivity Allowing a Program through the Firewall Creating Windows Firewall Rules Using NTFS Compression Using EFS Encryption Estimated lab time: 85 minutes Exercise 5.1 Installing Internet Information Server Overview Because this is only a test deployment, you will be using a Windows 7 computer to function as the web server. In Exercise 5.1 you install Internet Information Services on your workstation and configure it to host two web sites. Completion time 10 minutes 1. Click VM > Settings and change Network Adapter settings to bridged.

2 Configuring Windows 7

3 Working with Firewalls, Encrypted File Systems (EFS) and User Account Control (UAC) 2. Turn on the Workstation## computer and log on using your Student## account and the password 3. Click Start and then click Control Panel. The Control Panel window appears. 4. Click Programs > Program and Features. The Uninstall or change a program window appears.

4 Configuring Windows 7 5. Click Turn Window features on or off. The Windows Features dialog box appears.

5 Working with Firewalls, Encrypted File Systems (EFS) and User Account Control (UAC) 6. Browse to the Internet Information Services\World Wide Web Services. 7. Select the Common HTTP Features, Health and Diagnostics, and Security check boxes. 8. Expand the Web Management Tools folder and select the IIS Management Console check box. Then click OK. Windows 7 installs the selected components.

6 Configuring Windows 7 9. Close the Programs and Features control panel window. 10. Click Start, and click Control Panel. The Control Panel window appears. 11. Click System and Security > Administrative Tools. The Administrative Tools window appears. 12. Double click Internet Information Services (IIS) Manager. The Internet Information Services (IIS) Manager console appears.

7 Working with Firewalls, Encrypted File Systems (EFS) and User Account Control (UAC) 13. Expand the Workstation container, and then expand the Sites folder.

8 Configuring Windows Right click the sites folder and, from the context menu, select Add Web Site. The Add Web Site dialog box appears. 15. In the Site name text box, type Intranet. 16. In the Physical path text box, type c:\intepub\wwwroot. 17. Change the value in the Port text box to Click OK. The new intranet Web site appears in the Sites folder. 19. Take a screen shot of the Internet Information Services (IIS) Manager console, showing the new site you created, by pressing Alt+ Prt Scr, and then paste the resulting image into the Lab05_worksheet file in the page provided by pressing Ctrl + V. 20. The URL for your new intranet Web site will be (where IP Address is the IP Address of your virtual machine). 21. Close the Internet Information Services (IIS) Manager console. 22. Leave the computer logged on for the next exercise.

9 Working with Firewalls, Encrypted File Systems (EFS) and User Account Control (UAC) Exercise 5.2 Overview Testing IIS Connectivity In Exercise 5.2, you test the functionality of the web server you just installed. Completion time 20 minutes 1. Click Start and then click All Programs > Internet Explorer. An Internet Explorer window appears. 2. In the address box, type and press Enter. Question 1 What is the result, and what does the result indicate? Answer: IIS is functioning.

10 Configuring Windows 7 3. Next, test the intranet Web site by using the URL you specified in Exercise 5.1. Question 2 What is the result, and what does it indicate? Answer: The web site that was created is functioning. 4. On the host computer (NOT YOUR VIRTUAL MACHINE) open Internet Explorer and attempt to access the IIS web server running on your workstation by typing (where IP Address is the IP Address of your virtual machine) and pressing Enter.

11 Working with Firewalls, Encrypted File Systems (EFS) and User Account Control (UAC) Question 3 What is the result? Answer: Internet Explorer cannot display the webpage.

12 Configuring Windows 7 5. Now, try to connect to the intranet Web site from the host computer. Question 4 What is the result? Answer: Internet Explorer cannot display the webpage. Question 5 List three possible reasons why you might be unable to connect to your computers web server using a browser on another computer. Answer: Firewall, Antivirus, improperly configured network connections, permissions etc.

13 Working with Firewalls, Encrypted File Systems (EFS) and User Account Control (UAC) 6. Back on your virtual machine, click Start, and the click Control Panel > System and Security > Windows Firewall. The Windows Firewall control panel appears.

14 Configuring Windows 7 7. Click Turn Windows Firewall on or off. The Customize settings for each type of network window appears.

15 Working with Firewalls, Encrypted File Systems (EFS) and User Account Control (UAC) 8. Under Home or work (private) network location setting, select the Turn off Windows Firewall (not recommended) option and click OK.

16 Configuring Windows 7 9. Return to your host computer (NOT YOUR VIRTUAL MACHINE) and Clear the Internet Explorer cache by clicking Tools >Internet Options. The Internet Options dialog box appears. 10. Under Browsing History, click the Delete button. The Delete Browsing History dialog box appears.

17 Working with Firewalls, Encrypted File Systems (EFS) and User Account Control (UAC) 11. Click Delete all. Then click OK to close the Internet Options dialog box. Question 6 Why is it necessary to clear the cache before you retest the web server connections? Answer: Because the cache will point to the previous URL that was not functioning correctly. 12. Attempt to access both of the sites on the web server using Internet Explorer.

18 Configuring Windows 7

19 Working with Firewalls, Encrypted File Systems (EFS) and User Account Control (UAC) Question 7 What are the results, and what do the results indicate? Answer: The web page is displayed. Question 8 What other test could you perform to prove that it was your computer s firewall that was blocking the connection and not the firewall on the computer you are using as a client? Answer: Disabling the clients firewall, enabling the firewall on the Virtual Machine and opening the port, use netstat to determine if the port is open etc. 13. Back on your virtual machine in the Windows Firewall control panel, open the Customize settings for each type of network window again. 14. Under Home or work (private) network location settings, select the Turn on Windows Firewall option and click OK.

20 Configuring Windows 7 Question 9 Why can you not simply leave Windows Firewall turned off when you deploy an actual web server? Answer: Because the machine would be open to attack from external sources 15. Leave the Windows Firewall control panel open and the workstation logged on for the next exercise. Exercise 5.3 Overview Completion time Allowing a Program Through the Firewall Windows Firewall is preventing clients from connecting to the web server. In Exercise 5.3 to enable client access, you will use the Windows Firewall control panel to allow access to the web server. 10 minutes 1. On your workstation, in the Windows Firewall control panel, click Allow a program or feature through Windows Firewall. The Allow programs to communicate through Windows Firewall window appears.

21 Working with Firewalls, Encrypted File Systems (EFS) and User Account Control (UAC) 2. Click Change settings, scroll down in the Allowed programs and features list, select the World Wide Web Services (HTTP) check box, and click OK. 3. Return to your host computer (NOT YOUR VIRTUAL MACHINE) and try to access the web server again using Internet Explorer and trying to connect to (where IP Address is the IP Address of your virtual machine) and pressing Enter. Question 10 Why are you now able to connect to the Web site from the client? Answer: The HTTP port is open. 4. Now test the connection to the intranet Web site. Question 11 Why are you unable to connect to the intranet site from the client? Answer: The port the intranet site uses was not open.

22 Configuring Windows 7 5. Open the Allow programs to communicate through Windows Firewall window again and clear the World Wide Web Services (HTTP) check box. Then, click OK. 6. Leave the remaining windows open and the workstations logged on for the next exercise.

23 Working with Firewalls, Encrypted File Systems (EFS) and User Account Control (UAC) Exercise 5.4 Overview Completion time Creating Windows Firewall Rules The port you opened in Exercise 5.3 enables clients to access the default Web site hosted by your web server, but not the intranet Web site. In this exercise, you use the Windows Firewall with Advanced Security console to create rules that will enable clients to access both Web sites. 15 minutes 1. On your workstation, click Start. Then click Control Panel > System and Security > Administrative Tools. The Administrative Tools window appears. 2. Double click Windows Firewall with Advanced Security. The Windows Firewall with Advanced Security console appears.

24 Configuring Windows 7 3. Select the Inbound Rules container. The list of default inbound rules appears.

25 Working with Firewalls, Encrypted File Systems (EFS) and User Account Control (UAC) 4. Scroll down to the bottom of the list and locate the rules for World Wide Web Services (HTTP Traffic-In). Question 12 Why are there two separate rules for the World Wide Web Services? Answer: One is for the Domain profile and one is for the Public and Private profiles. 5. Double click each of the two rules and examine their properties.

26 Configuring Windows 7 Question 13 How do the properties of the two rules differ? Answer: They are exactly the same except for the profile assignments. Question 14 How would the opening of the port you performed in Exercise 5.3 affect the World Wide Web Services (HTTP Traffic-In) rules you just examined? Answer: Opening the port activates the rule for the Domain profile, causing its check mark to appear red in the console. 6. Select the Inbound Rules container and, from the Action menu, select Filter By Profile > Filter By Private Profile. Question 15 What happens to the list of rules? Answer: It changes to display only the rules that apply to the Private profile.

27 Working with Firewalls, Encrypted File Systems (EFS) and User Account Control (UAC) 7. Right click the Inbound Rules container and, from the context menu, select New Rule. The New Inbound Rule Wizard launches, displaying the Rule Type page.

28 Configuring Windows 7 8. Select the Port option and click Next. The Protocol and Ports page appears.

29 Working with Firewalls, Encrypted File Systems (EFS) and User Account Control (UAC) 9. Leave the default TCP and Specific local ports options selected. In the Specific local ports text box, type 80, 4444 and click Next. The Action page appears.

30 Configuring Windows Leave the default Allow the connection option selected and click Next. The Profile page appears.

31 Working with Firewalls, Encrypted File Systems (EFS) and User Account Control (UAC) 11. Clear the Public check box, leaving only the Private and Domain check box selected, and then click Next. The Name page appears.

32 Configuring Windows In the Name text box, type Lab Web Server Ports 80 & 4444 and click Finish. The wizard creates and enables the new rule and then adds it to the Inbound Riles list.

33 Working with Firewalls, Encrypted File Systems (EFS) and User Account Control (UAC) Question 16 How would the rule creation procedure you just performed differ if you wanted to restrict client access to the intranet Web site to computers on the local network only? Answer: You would have to create separate rules for ports 80 and In the rule for port 4444, you would specify a scope limiting access to your local network address.

34 Configuring Windows Click Clear All Filters on the Action pain in order to view the new rule. Double click the rule you just created. The Lab Web Server Ports 80 & 4444 Properties sheet appears. 14. Take a screen shot of the Properties sheet for the new rule by pressing Alt+ Prt Scr, and then paste the resulting image into the Lab05_worksheet file in the page provided by pressing Ctrl + V.

35 Working with Firewalls, Encrypted File Systems (EFS) and User Account Control (UAC) 15. Return to your host computer (NOT YOUR VIRTUAL MACHINE) and Clear the Internet Explorer cache by clicking Tools >Internet Options. The Internet Options dialog box appears. 16. Under Browsing History, click the Delete button. The Delete Browsing History dialog box appears.

36 Configuring Windows Click Delete all. Then click OK to close the Internet Options dialog box. 18. Attempt to access both of the sites on the web server using Internet Explorer. Question 17 What are the results, and why are they different from the results you experienced with the program exception? Answer: The client successfully connects to both websites. This occurs because the rule you created opens up both port 80 and port Click VM > Settings and change Network Adapter settings back to Host-only. 20. Close all windows and leave the computer logged on for the next exercise.

37 Working with Firewalls, Encrypted File Systems (EFS) and User Account Control (UAC) Exercise 5.5 Overview Completion time Using NTFS Compression The graphic design department uses lots of image files, which are quite large. To save room, they have been saving images as.jpg files, but they are starting to notice degradation in the images when they are printed. They have therefore decided to use Windows bitmap (.bmp) files to store images, which are uncompressed. You need to implement NTFS compression, to save space, on a folder in which they store the.bmp images. 15 minutes 1. On your workstation, click Start and select Computer. 2. In the Computer windows, browse to C:\Users\Public\Public Documents.

38 Configuring Windows 7 3. In the Public Documents folder click New Folder in the toolbar. 4. Name the folder Brochure Images. 5. Right click the Brochure Images folder, and then select Properties.

39 Working with Firewalls, Encrypted File Systems (EFS) and User Account Control (UAC) 6. In the Brochure Images Properties dialog box, on the General tab, click Advanced.

40 Configuring Windows 7 7. In the Advanced Attributes dialog box, select the Compress contents to save disk space check box and click OK. 8. In the Brochure Images Properties dialog box, click OK. Question 18 What color is the font for the Brochure Images folder? Answer: Blue 9. In the Public Documents folder, right click blank space, point to New > Bitmap Image. 10. Name the image Picture1.

41 Working with Firewalls, Encrypted File Systems (EFS) and User Account Control (UAC) 11. Right click Picture1, and then select Edit.

42 Configuring Windows In Microsoft Paint click the Microsoft Paint File menu tab and select Properties. 13. In the Properties dialog box, in the Width and Height text boxes, type 2048, and then click OK.

43 Working with Firewalls, Encrypted File Systems (EFS) and User Account Control (UAC) 14. From the Microsoft Paint File menu tab and select Save. 15. Close Microsoft Paint. 16. In the Public Documents folder, right click Picture1 and then select Properties.

44 Configuring Windows 7 Question 19 How large is the Picture1file on the disk? Answer: 12.0 MB (but could vary) 17. Close the Picture1 Properties dialog box. 18. In the Public Documents folder, move the Picture1 file into the Brochure Images folder by dragging the file into the folder. 19. Open the Brochures Images folder.

45 Working with Firewalls, Encrypted File Systems (EFS) and User Account Control (UAC) 20. In the Brochure Images folder, right click Picture1 and then select Properties.

46 Configuring Windows 7 Question 20 The image file has been moved into a folder using NTFS compression. Why isn t the file any smaller? Answer: Because the file was moved it did not inherit the properties of the Brochure Images folder. 21. Close the Picture1 Properties dialog box. 22. Right click Picture1, and then select Cut. 23. Click the Back icon in the standard buttons toolbar. 24. In the Public Documents folder, right click blank space, and select Paste.

47 Working with Firewalls, Encrypted File Systems (EFS) and User Account Control (UAC) 25. Right click Picture1, and then select copy. 26. Open the Brochure Images folder. 27. In the Brochure Images folder, right click blank space, and select Paste.

48 Configuring Windows Right click Picture1, and then select Properties.

49 Working with Firewalls, Encrypted File Systems (EFS) and User Account Control (UAC) Question 21 What is the size on disk of the Picture1 file now? Answer: 1.75 MB (but could vary) Question 22 Why did the file shrink, when it remained full size when it was moved? Answer: Because the file was copied, it inherited the properties of the Brochure Images folder. 29. Close the Picture1 Properties dialog box.

50 Configuring Windows Take a screen shot of the Brochure Images folder showing Picture1 by pressing Alt+ Prt Scr, and then paste the resulting image into the Lab05_worksheet file in the page provided by pressing Ctrl + V. 31. Click the Back icon in the standard buttons toolbar to return to the Public Documents folder for the next exercise. Exercise 5.6 Overview Completion time Using EFS Encryption The graphic design team is working on a brochure for proprietary software that Contoso is going to use. The software is expected to give the company an edge over other companies, and management is very paranoid about keeping the new concepts secret. To help protect this data, you need to create an encrypted data store using EFS on the computers of all the members in the graphic design team who are assigned to the project. 15 minutes 1. In the Public Documents folder click New Folder in the toolbar. 2. Name the folder Sensitive Data. 3. Right click the Sensitive Data folder, and then select Properties.

51 Working with Firewalls, Encrypted File Systems (EFS) and User Account Control (UAC) 4. In the Sensitive Data Properties dialog box, on the General tab, click Advanced. 5. In the Advanced Attributes dialog box, select the Encrypt contents to secure data check box and click OK.

52 Configuring Windows 7 6. In the Sensitive Data Properties dialog box, click OK. Question 23 What color is the font for the Sensitive Data folder? Answer: Green 7. In the Public Documents folder, right click blank space, point to New > Text Document. 8. Name the document Sensitive Text.

53 Working with Firewalls, Encrypted File Systems (EFS) and User Account Control (UAC) 9. Open the Sensitive Text file. 10. In Notepad type Encrypted Data. 11. Exit Notepad, when asked if you want to save changes, click Yes. 12. In the Public Documents folder, move the Sensitive Data file into the Sensitive Data folder by dragging the file into the folder.

54 Configuring Windows Open the Sensitive Data folder. 14. Open the Sensitive Data text file. Question 24 Can you read the Sensitive Text file? Answer: Yes 15. Close Notepad. 16. Minimize the Sensitive Data folder. 17. Click Start, and in the Search programs and files box, type mmc and press Enter. A blank Microsoft Management Console window appears.

55 Working with Firewalls, Encrypted File Systems (EFS) and User Account Control (UAC) 18. Click File > Add/Remove Snap-in. The Add or Remove Snap-ins dialog box appears. 19. In the Available snap-ins list, select Certificates and click Add. The This snap-in will always manage certificates for: dialog box appears. 20. Select My user account, and click Finish.

56 Configuring Windows Click OK. The snap-in appears in the MMC console. 22. In the console tree, expand Certificates > Personal > Certificates.

57 Working with Firewalls, Encrypted File Systems (EFS) and User Account Control (UAC) 23. In the Details pane, on the right hand side, right click the certificate and then select Delete. 24. In the Certificates message box, click Yes to delete the certificate.

58 Configuring Windows Close the Console1 console, and click No when asked if you want to save changes. 26. Log off Workstation## and log back on using your Student## account and the password P@ssw0rd. 27. Open the Sensitive Data folder (C:\Users\Public\Public Documents\Sensitive Data)

59 Working with Firewalls, Encrypted File Systems (EFS) and User Account Control (UAC) 28. In the Sensitive Data folder, open Sensitive Text. Question 25 What occurs when you try to open the Sensitive Text file? Answer: Access is denied 29. Take a screen shot of the Sensitive Data folder showing the Sensitive Text document by pressing Alt+ Prt Scr, and then paste the resulting image into the Lab05_worksheet file in the page provided by pressing Ctrl + V. 30. Close all open windows and log off the computer.

LAB 8 ANSWER KEY CONFIGURING A WINDOWS SERVER 2008 MACHINE

LAB 8 ANSWER KEY CONFIGURING A WINDOWS SERVER 2008 MACHINE LAB 8 ANSWER KEY CONFIGURING A WINDOWS SERVER 2008 MACHINE This lab contains the following exercises: Exercise 8.1 Exercise 8.2 Exercise 8.3 Installing Active Directory Creating Users and Groups Joining

More information

Using the Terminal Services Gateway Lesson 10

Using the Terminal Services Gateway Lesson 10 Using the Terminal Services Gateway Lesson 10 Skills Matrix Technology Skill Objective Domain Objective # Deploying a TS Gateway Server Configure Terminal Services Gateway 2.2 Terminal Services (TS) Web

More information

5.5.3 Lab: Managing Administrative Settings and Snap-ins in Windows XP

5.5.3 Lab: Managing Administrative Settings and Snap-ins in Windows XP 5.5.3 Lab: Managing Administrative Settings and Snap-ins in Windows XP Introduction Print and complete this lab. In this lab, you will use administrative tools to monitor system resources. You will also

More information

Lab - System Utilities in Windows

Lab - System Utilities in Windows Introduction In this lab, you will use Windows utilities to configure operating system settings. Recommended Equipment The following equipment is required for this exercise: A computer running Windows

More information

BROWSER-BASED SUPPORT CONSOLE USER S GUIDE. 31 January 2017

BROWSER-BASED SUPPORT CONSOLE USER S GUIDE. 31 January 2017 BROWSER-BASED SUPPORT CONSOLE USER S GUIDE 31 January 2017 Contents 1 Introduction... 2 2 Netop Host Configuration... 2 2.1 Connecting through HTTPS using Certificates... 3 2.1.1 Self-signed certificate...

More information

LAB 2 WORKSHEET WORKING WITH DISKS AND DEVICES

LAB 2 WORKSHEET WORKING WITH DISKS AND DEVICES LAB 2 WORKSHEET WORKING WITH DISKS AND DEVICES Exercise 2.1 Creating a Basic Disk Partition In Exercise 2.1, you create a new basic partition for Alice where she can store her data. 10 minutes 7. Based

More information

CompTIA Network+ Lab Series Network Concepts. Lab 2: Types of Networks

CompTIA Network+ Lab Series Network Concepts. Lab 2: Types of Networks CompTIA Network+ Lab Series Network Concepts Objective 1.5: Identify common TCP and UDP default ports Objective 1.6: Explain the function of common networking protocols Document Version: 2015-09-18 otherwise

More information

Lab B: Configuring Disk Compression and Quotas

Lab B: Configuring Disk Compression and Quotas Module 6: Managing Data by Using NTFS 33 Lab B: Configuring Disk Compression and Quotas Topic Objective To introduce the lab. Lead-in In this lab, you will configure disk compression and quotas. *****************************ILLEGAL

More information

Creating a Web Presentation

Creating a Web Presentation LESSON 9 Creating a Web Presentation 9.1 After completing this lesson, you will be able to: Create an agenda slide or home page. Create a hyperlink to a slide. Create a Web presentation with the AutoContent

More information

Step-by-step installation guide for monitoring untrusted servers using Operations Manager

Step-by-step installation guide for monitoring untrusted servers using Operations Manager Step-by-step installation guide for monitoring untrusted servers using Operations Manager Most of the time through Operations Manager, you may require to monitor servers and clients that are located outside

More information

Hands-On Lab. Windows Azure Virtual Machine Roles. Lab version: Last updated: 12/14/2010. Page 1

Hands-On Lab. Windows Azure Virtual Machine Roles. Lab version: Last updated: 12/14/2010. Page 1 Hands-On Lab Windows Azure Virtual Machine Roles Lab version: 2.0.0 Last updated: 12/14/2010 Page 1 CONTENTS OVERVIEW... 3 EXERCISE 1: CREATING AND DEPLOYING A VIRTUAL MACHINE ROLE IN WINDOWS AZURE...

More information

IT Essentials v6.0 Windows 10 Software Labs

IT Essentials v6.0 Windows 10 Software Labs IT Essentials v6.0 Windows 10 Software Labs 5.2.1.7 Install Windows 10... 1 5.2.1.10 Check for Updates in Windows 10... 10 5.2.4.7 Create a Partition in Windows 10... 16 6.1.1.5 Task Manager in Windows

More information

Module 3 Remote Desktop Gateway Estimated Time: 90 minutes

Module 3 Remote Desktop Gateway Estimated Time: 90 minutes Module 3 Remote Desktop Gateway Estimated Time: 90 minutes A. Datum Corporation provided access to web intranet web applications by implementing Web Application Proxy. Now, IT management also wants to

More information

Implementing Messaging Security for Exchange Server Clients

Implementing Messaging Security for Exchange Server Clients Implementing Messaging Security for Exchange Server Clients Objectives Scenario At the end of this lab, you will be able to: Protect e-mail messages using S/MIME signing and encryption Manage e-mail attachment

More information

VMware Horizon FLEX Client User Guide

VMware Horizon FLEX Client User Guide Horizon FLEX 1.10 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of this

More information

Lab - Task Manager in Windows 7 and Vista

Lab - Task Manager in Windows 7 and Vista Lab - Task Manager in Windows 7 and Vista Introduction In this lab, you will explore Task Manager and manage processes from within Task Manager. Recommended Equipment The following equipment is required

More information

ms-help://ms.technet.2004apr.1033/ad/tnoffline/prodtechnol/ad/windows2000/howto/mapcerts.htm

ms-help://ms.technet.2004apr.1033/ad/tnoffline/prodtechnol/ad/windows2000/howto/mapcerts.htm Page 1 of 8 Active Directory Step-by-Step Guide to Mapping Certificates to User Accounts Introduction The Windows 2000 operating system provides a rich administrative model for managing user accounts.

More information

PEAP under Unified Wireless Networks with ACS 5.1 and Windows 2003 Server

PEAP under Unified Wireless Networks with ACS 5.1 and Windows 2003 Server PEAP under Unified Wireless Networks with ACS 5.1 and Windows 2003 Server Document ID: 112175 Contents Introduction Prerequisites Requirements Components Used Conventions Configure Network Diagram Windows

More information

10ZiG Technology. Thin Desktop Quick Start Guide

10ZiG Technology. Thin Desktop Quick Start Guide 10ZiG Technology Thin Desktop Quick Start Guide 2010 05 20 Introduction This document is intended as a quick start guide for installing Thin Desktop. After reading this document, you will know how to:

More information

Ekran System High Availability Deployment Guide

Ekran System High Availability Deployment Guide Ekran System High Availability Deployment Guide Table of Contents About... 3 System Requirements... 4 Program Structure... 5 Deployment Process... 6 About... 6 Prerequisites... 6 General Prerequisites...

More information

VMware Horizon FLEX Client User Guide. 26 SEP 2017 Horizon FLEX 1.12

VMware Horizon FLEX Client User Guide. 26 SEP 2017 Horizon FLEX 1.12 26 SEP 2017 Horizon FLEX 1.12 You can find the most up-to-date technical documentation on the VMware Web site at: https://docs.vmware.com/ The VMware Web site also provides the latest product updates.

More information

USER GUIDE PowerPhoto CRM

USER GUIDE PowerPhoto CRM USER GUIDE PowerPhoto CRM 2013 2015 Contents CONFIGURING POWERPHOTO Add, Remove, Set Default, Set Record Image, Thumbnail & View Text Display Original File Save Original File Resize Photo Resize Height

More information

ms-help://ms.technet.2004apr.1033/win2ksrv/tnoffline/prodtechnol/win2ksrv/howto/efsguide.htm

ms-help://ms.technet.2004apr.1033/win2ksrv/tnoffline/prodtechnol/win2ksrv/howto/efsguide.htm Page 1 of 14 Windows 2000 Server Step-by-Step Guide to Encrypting File System (EFS) Abstract This document provides sample procedures that demonstrate the end-user and administrative capabilities of the

More information

EM L23 - Implementing Client and Server Management with Site Services Hands-On Lab

EM L23 - Implementing Client and Server Management with Site Services Hands-On Lab EM L23 - Implementing Client and Server Management with Site Services Hands-On Lab Description If you are new to the Symantec Management Technologies or are just looking to reinforce your existing knowledge

More information

Module 9. Configuring IPsec. Contents:

Module 9. Configuring IPsec. Contents: Configuring IPsec 9-1 Module 9 Configuring IPsec Contents: Lesson 1: Overview of IPsec 9-3 Lesson 2: Configuring Connection Security Rules 9-11 Lesson 3: Configuring IPsec NAP Enforcement 9-21 Lab: Configuring

More information

202 Lab Introduction Connecting to the Lab Environment

202 Lab Introduction Connecting to the Lab Environment 202 Lab Introduction Connecting to the Lab Environment Objectives During this v7.1 Deployment lab, each student (from the Blue group or Green group) must verify access (and permissions) to their assigned

More information

LAB 5 IMPLEMENTING WINDOWS IN AN ENTERPRISE ENVIRONMENT

LAB 5 IMPLEMENTING WINDOWS IN AN ENTERPRISE ENVIRONMENT LAB 5 IMPLEMENTING WINDOWS IN AN ENTERPRISE ENVIRONMENT THIS LAB CONTAINS THE FOLLOWING EXERCISES AND ACTIVITIES: Exercise 5.1 Exercise 5.2 Exercise 5.3 Lab Challenge Installing the Windows Assessment

More information

Supporting Networked Computers

Supporting Networked Computers CHAPTER 7 Supporting Networked Computers After completing this chapter, you will be able to: Define the main concepts of networking, including the roles of TCP/IP, IP addresses, and subnet masks. Set up

More information

A D S S G o > S i g n D e s k t o p. I n s t a l l a t i o n G u i d e. D o c u m e n t V e r s i o n

A D S S G o > S i g n D e s k t o p. I n s t a l l a t i o n G u i d e. D o c u m e n t V e r s i o n A D S S G o > S i g n D e s k t o p I n s t a l l a t i o n G u i d e A S C E R T I A LTD A p r i l 2 0 1 8 D o c u m e n t V e r s i o n - 5.7. 0. 1 Ascertia Limited. All rights reserved. This document

More information

KASPERSKY LAB. Kaspersky Administration Kit version 6.0. Reference Book

KASPERSKY LAB. Kaspersky Administration Kit version 6.0. Reference Book KASPERSKY LAB Kaspersky Administration Kit version 6.0 Reference Book KASPERSKY ADMINISTRATION KIT VERSION 6.0 Reference Book Kaspersky Lab Ltd. Visit our website: http://www.kaspersky.com/ Revision date:

More information

KeyNexus Hyper-V Deployment Guide

KeyNexus Hyper-V Deployment Guide v1.0 09/2018 . Copyright Notice Copyright 2018 KeyNexus Inc. All rights reserved. Information in this document is subject to change without notice. The software described in this document is furnished

More information

BSc Year 2 Data Communications Lab - Using Wireshark to View Network Traffic. Topology. Objectives. Background / Scenario

BSc Year 2 Data Communications Lab - Using Wireshark to View Network Traffic. Topology. Objectives. Background / Scenario BSc Year 2 Data Communications Lab - Using Wireshark to View Network Traffic Topology Objectives Part 1: (Optional) Download and Install Wireshark Part 2: Capture and Analyze Local ICMP Data in Wireshark

More information

CENTAUR S REAL-TIME GRAPHIC INTERFACE V4.0 OPERATOR S MANUAL

CENTAUR S REAL-TIME GRAPHIC INTERFACE V4.0 OPERATOR S MANUAL CENTAUR S REAL-TIME GRAPHIC INTERFACE V4.0 OPERATOR S MANUAL TABLE OF CONTENTS Installation... 6 Introduction to Centaur s real-time Graphic Interface... 6 Computer Requirements... 7 Operating System

More information

Section 2 Getting Started

Section 2 Getting Started Section 2 Getting Started ECDL Section 2 Getting Started By the end of this section you should be able to: Start, restart and close down a device Log on and log off Windows Recognise and use the Desktop

More information

Workstation Configuration

Workstation Configuration Workstation Configuration Version 8.2 May 2, 2014 For the most recent version of this document, visit our documentation website. Table of Contents 1 Workstation configuration 3 1.1 Custom level Internet

More information

OrgPublisher Web Administration Guide for Windows Server 2012

OrgPublisher Web Administration Guide for Windows Server 2012 OrgPublisher Web Administration Guide for Windows Server 2012 Table of Contents OrgPublisher Web Administration Guide for Windows Server 2012 Table of Contents Introduction... 3 Role Requirements for Installation...

More information

INF204x Module 1, Lab 3 - Configure Windows 10 VPN

INF204x Module 1, Lab 3 - Configure Windows 10 VPN INF204x Module 1, Lab 3 - Configure Windows 10 VPN Estimated Time: 40 minutes Your organization plans to allow Windows 10 users to connect to the internal network by using the VPN client built into the

More information

Recent Operating System Class notes 04 Managing Users on Windows XP March 22, 2004

Recent Operating System Class notes 04 Managing Users on Windows XP March 22, 2004 Recent Operating System Class notes 04 Managing Users on Windows XP March 22, 2004 You log into a system to notify the system who you are. When you log off, any files you have opened are cleaned up, and

More information

HTML Exercise 20 Linking Pictures To Other Documents Or Web Sites

HTML Exercise 20 Linking Pictures To Other Documents Or Web Sites HTML Exercise 20 Linking Pictures To Other Documents Or Web Sites Turning pictures into hyperlinks is nearly the same as what you learned in Exercises 4 and 5. If a picture is essential to a Web page,

More information

Chapter. Accessing Files and Folders MICROSOFT EXAM OBJECTIVES COVERED IN THIS CHAPTER

Chapter. Accessing Files and Folders MICROSOFT EXAM OBJECTIVES COVERED IN THIS CHAPTER Chapter 10 Accessing Files and Folders MICROSOFT EXAM OBJECTIVES COVERED IN THIS CHAPTER Monitor, manage, and troubleshoot access to files and folders. Configure, manage, and troubleshoot file compression

More information

SQL Server Reporting Services (SSRS) is one of SQL Server 2008 s

SQL Server Reporting Services (SSRS) is one of SQL Server 2008 s Chapter 9 Turning Data into Information with SQL Server Reporting Services In This Chapter Configuring SQL Server Reporting Services with Reporting Services Configuration Manager Designing reports Publishing

More information

20411D D Enayat Meer

20411D D Enayat Meer Lab A Module 8: Implementing Direct Access by Using the Getting Started Wizard Scenario: Recommended lab time is 240 Minutes {a complete class session is dedicated for this lab} Many users at A. Datum

More information

Workstation Configuration Guide

Workstation Configuration Guide Workstation Configuration Guide August 13, 2018 Version 9.6.134.78 For the most recent version of this document, visit our documentation website. Table of Contents 1 Workstation configuration 4 1.1 Considerations

More information

Installation Manual. Fleet Maintenance Software. Version 6.4

Installation Manual. Fleet Maintenance Software. Version 6.4 Fleet Maintenance Software Installation Manual Version 6.4 6 Terri Lane, Suite 700 Burlington, NJ 08016 (609) 747-8800 Fax (609) 747-8801 Dossier@dossiersystemsinc.com www.dossiersystemsinc.com Copyright

More information

Microsoft Windows Encrypting File System (EFS) Certificate Migration from XP to VISTA (also works with Windows 7) Instruction Guide

Microsoft Windows Encrypting File System (EFS) Certificate Migration from XP to VISTA (also works with Windows 7) Instruction Guide Microsoft Windows Encrypting File System (EFS) Certificate Migration from XP to VISTA (also works with Windows 7) Instruction Guide Army Information Assurance CAC/PKI Division 2530 Crystal Drive Arlington,

More information

WhatsUp Gold 2016 Installation and Configuration Guide

WhatsUp Gold 2016 Installation and Configuration Guide WhatsUp Gold 2016 Installation and Configuration Guide Contents Installing and Configuring WhatsUp Gold using WhatsUp Setup 1 Installation Overview 1 Overview 1 Security considerations 2 Standard WhatsUp

More information

Azure 209x Practical Exercises Overview

Azure 209x Practical Exercises Overview Azure 209x Practical Exercises Overview This course includes optional exercises where you can try out the techniques demonstrated in the course for yourself. This guide lists the steps for the individual

More information

Toolkit Activity Installation and Registration

Toolkit Activity Installation and Registration Toolkit Activity Installation and Registration Installing the Toolkit activity on the Workflow Server Install the Qfiche Toolkit workflow activity by running the appropriate SETUP.EXE and stepping through

More information

Ekran System v.6.1 Deployment Guide

Ekran System v.6.1 Deployment Guide Ekran System v.6.1 Deployment Guide Table of Contents About... 6 System Requirements... 7 Program Structure... 10 Deployment Process... 12 Server and Database... 13 About... 13 Database Types Comparison...

More information

Developing Intelligent Apps

Developing Intelligent Apps Developing Intelligent Apps Lab 1 Creating a Simple Client Application By Gerry O'Brien Overview In this lab you will construct a simple client application that will call an Azure ML web service that you

More information

Securexam Mac User Guide

Securexam Mac User Guide Securexam Mac User Guide Unlike previous versions, Securexam for Mac now functions much like the PC version where it integrates with PlanetSSI to retrieve a user s exams and licenses via the web and upon

More information

Sage Pastel Accounting

Sage Pastel Accounting Sage Pastel Accounting Status 94 Pervasive Error Code 94 Status 94 also known as Pervasive Error Code 94 is a permissions error and usually caused by incorrectly configured or blocked settings on either

More information

Practice Labs User Guide

Practice Labs User Guide Practice Labs User Guide This page is intentionally blank Contents Introduction... 3 Overview... 3 Accessing Practice Labs... 3 The Practice Labs Interface... 4 Minimum Browser Requirements... 5 The Content

More information

StarWind Native SAN Configuring HA File Server for SMB NAS

StarWind Native SAN Configuring HA File Server for SMB NAS Hardware-less VM Storage StarWind Native SAN Configuring HA File Server for SMB NAS DATE: FEBRUARY 2012 TECHNICAL PAPER Trademarks StarWind, StarWind Software and the StarWind and the StarWind Software

More information

VMware AirWatch Certificate Authentication for EAS with ADCS

VMware AirWatch Certificate Authentication for EAS with ADCS VMware AirWatch Certificate Authentication for EAS with ADCS For VMware AirWatch Have documentation feedback? Submit a Documentation Feedback support ticket using the Support Wizard on support.air-watch.com.

More information

Inserting Information into PowerPoint

Inserting Information into PowerPoint LESSON 6 6.1 Inserting Information into PowerPoint After completing this lesson, you will be able to: Change the layout of a slide. Insert a clip art image. Scale an image. Insert and format a table. Insert

More information

Managing Applications, Services, Folders, and Libraries

Managing Applications, Services, Folders, and Libraries 4 LESSON Managing Applications, Services, Folders, and Libraries EXAM OBJECTIVE MATRIX SKILLS/CONCEPTS EXAM OBJECTIVE DESCRIPTION EXAM OBJECTIVE NUMBER Installing and Managing Applications Understand application

More information

Workstation Configuration

Workstation Configuration Workstation Configuration December 15, 2017 - Version 9.3 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

More information

WebConnect Through the Internet

WebConnect Through the Internet WebConnect Through the Internet WebConnect Table of Contents i Chapter 1. Table of Contents Page INTRODUCTION...1 Chapter 2. ACCESSING DataLink SM...2 Chapter 3. FEATURES OF WebConnect...10 File Menu Options...10

More information

QuestionPoint chat The Guide to IE browser setup Last updated: 2009 June 23

QuestionPoint chat The Guide to IE browser setup Last updated: 2009 June 23 QuestionPoint chat The Guide to IE browser setup Last updated: 2009 June 23 This guide provides a procedure for initially configuring your Internet Explorer (IE) browser to use Flash Chat. Note: If you

More information

Workstation Configuration

Workstation Configuration Workstation Configuration December 12, 2017 - Version 9.4 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

More information

Libraries. Multi-Touch. Aero Peek. Sema Foundation 10 Classes 2 nd Exam Review ICT Department 5/22/ Lesson - 15

Libraries. Multi-Touch. Aero Peek. Sema Foundation 10 Classes 2 nd Exam Review ICT Department 5/22/ Lesson - 15 10 Classes 2 nd Exam Review Lesson - 15 Introduction Windows 7, previous version of the latest version (Windows 8.1) of Microsoft Windows, was produced for use on personal computers, including home and

More information

Aspera Connect Windows XP, 2003, Vista, 2008, 7. Document Version: 1

Aspera Connect Windows XP, 2003, Vista, 2008, 7. Document Version: 1 Aspera Connect 2.6.3 Windows XP, 2003, Vista, 2008, 7 Document Version: 1 2 Contents Contents Introduction... 3 Setting Up... 4 Upgrading from a Previous Version...4 Installation... 4 Set Up Network Environment...

More information

Wavecrest Certificate SHA-512

Wavecrest Certificate SHA-512 Wavecrest InstallationGuide Wavecrest Certificate SHA-512 www.wavecrest.net Copyright Copyright 1996-2018, Wavecrest Computing, Inc. All rights reserved. Use of this product and this manual is subject

More information

Windows 7 Professional 64 bit Configuration for MassLynx Security

Windows 7 Professional 64 bit Configuration for MassLynx Security Windows 7 Professional 64 bit Configuration for MassLynx Security 1. Purpose This document outlines the procedure to configure Microsoft Windows 7 Professional 64 bit operating system in order for installations

More information

8 MANAGING SHARED FOLDERS & DATA

8 MANAGING SHARED FOLDERS & DATA MANAGING SHARED FOLDERS & DATA STORAGE.1 Introduction to Windows XP File Structure.1.1 File.1.2 Folder.1.3 Drives.2 Windows XP files and folders Sharing.2.1 Simple File Sharing.2.2 Levels of access to

More information

Windows Server 2003 Installation and Configuration Lab Manual Presented by

Windows Server 2003 Installation and Configuration Lab Manual Presented by Windows Server 2003 Installation and Configuration Lab Manual Presented by Table of Contents Module 2 - Installing Windows Server 2003 R2 and Configuration 3 Module 3 - Installing Hardware, Devices and

More information

Windows Me Navigating

Windows Me Navigating LAB PROCEDURE 11 Windows Me Navigating OBJECTIVES 1. Explore the Start menu. 2. Start an application. 3. Multi-task between applications. 4. Moving folders and files around. 5. Use Control Panel settings.

More information

Cisco Unified Serviceability

Cisco Unified Serviceability Cisco Unified Serviceability Introduction, page 1 Installation, page 5 Introduction This document uses the following abbreviations to identify administration differences for these Cisco products: Unified

More information

StarWind Virtual SAN Configuring HA Shared Storage for Scale-Out File Servers in Windows Server 2016

StarWind Virtual SAN Configuring HA Shared Storage for Scale-Out File Servers in Windows Server 2016 One Stop Virtualization Shop StarWind Virtual SAN Configuring HA Shared Storage for Scale-Out File Servers in Windows Server 2016 FEBRUARY 2018 TECHNICAL PAPER Trademarks StarWind, StarWind Software and

More information

Direct Certification FTP Setup Instructions

Direct Certification FTP Setup Instructions Direct Certification FTP Setup Instructions Rev. 13-000 FOOD & NUTRITION MANAGEMENT SYSTEMS This instruction sheet provides instructions for installing our Direct Certification Automated FTP software to

More information

IBM Aspera Connect User Guide 3.8.0

IBM Aspera Connect User Guide 3.8.0 IBM Aspera Connect User Guide 3.8.0 Windows Revision: 255 Generated: 06/11/2018 12:25 Contents Introduction... 3 Setting Up Connect...3 Installation...3 Network Environment...4 Basic Configuration... 7

More information

Configuration of Microsoft Live Communications Server for Partitioned Intradomain Federation

Configuration of Microsoft Live Communications Server for Partitioned Intradomain Federation Configuration of Microsoft Live Communications Server for Partitioned Intradomain Federation Domain Verification for LCS Servers, page 1 Enable Port 5060 on LCS Server, page 1 Configure a LCS Static Route

More information

Forms/Distribution Acrobat X Professional. Using the Forms Wizard

Forms/Distribution Acrobat X Professional. Using the Forms Wizard Forms/Distribution Acrobat X Professional Acrobat is becoming a standard tool for people and businesses to use in order to replicate forms and have them available electronically. If a form is converted

More information

Workstation Configuration

Workstation Configuration Workstation Configuration September 22, 2015 - Version 9 & 9.1 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

More information

StarWind Virtual SAN Configuring HA SMB File Server in Windows Server 2016

StarWind Virtual SAN Configuring HA SMB File Server in Windows Server 2016 One Stop Virtualization Shop StarWind Virtual SAN Configuring HA SMB File Server in Windows Server 2016 APRIL 2018 TECHNICAL PAPER Trademarks StarWind, StarWind Software and the StarWind and the StarWind

More information

Wanos on Hyper-V. Complete Lab Setup Guide

Wanos on Hyper-V. Complete Lab Setup Guide Wanos on Hyper-V Complete Lab Setup Guide This guide explains how to deploy a complete Wanos lab on Hyper-V. The step-by-step guide includes steps to create Head Office and Branch Wanos VM instances on

More information

Table of Contents. Section 1: DocSTAR WebView v1.0 Requirements & Installation CD... 1 Section 2: DocSTAR WebView v1.

Table of Contents. Section 1: DocSTAR WebView v1.0 Requirements & Installation CD... 1 Section 2: DocSTAR WebView v1. WebView v1.0 Installation Guide Revision 3 7/29/2003 WebView v1.0 Installation GuG ide Revision 3 7/29/2003 u Introduction Table of Contents Section 1: DocSTAR WebView v1.0 Requirements & Installation

More information

Browser Settings. Updated 4/30/ SSF

Browser Settings. Updated 4/30/ SSF Browser Settings Updated 4/30/2014 - SSF Contents How to Locate the Online Banking URL... 3 Initial Steps for Browser Settings... 8 Internet Explorer... 9 Firefox... 13 Chrome... 18 Safari 6.0.5 and up...

More information

Installation & Administration Guide

Installation & Administration Guide Installation & Administration Guide Valerus SmartAnalytics ver. 5.4 XX306-00-00 Vicon Industries Inc. does not warrant that the functions contained in this equipment will meet your requirements or that

More information

The Windows GUI and Control Panel

The Windows GUI and Control Panel The Windows GUI and Control Panel Windows Desktop, Tools, and Applications After the OS has been installed, you can customize the computer desktop to suit individual needs. A computer desktop is a graphical

More information

AX Enterprise

AX Enterprise AX Enterprise Axxess Identification Ltd 27-28 Shrivenham Hundred Business Park, Watchfield, Swindon, Wiltshire SN6 8TZ United Kingdom Tel: +44 (0)1793 784002 Fax: +44 (0)1793 784005 Email: info@axxessid.com

More information

Ekran System v.5.2 Deployment Guide

Ekran System v.5.2 Deployment Guide Ekran System v.5.2 Deployment Guide Table of Contents About... 6 System Requirements... 7 Program Structure... 9 Deployment Process... 10 Server and Database... 11 About... 11 Database Types Comparison...

More information

Overview of Cisco UCS Manager GUI

Overview of Cisco UCS Manager GUI Overview of Cisco UCS Manager GUI This chapter includes the following sections: Overview of Cisco UCS Manager GUI, page 1 Logging in to Cisco UCS Manager GUI through HTTPS, page 6 Logging in to Cisco UCS

More information

Lesson 3: Identifying Key Characteristics of Workgroups and Domains

Lesson 3: Identifying Key Characteristics of Workgroups and Domains 1-16 Chapter 1 Introduction to Windows XP Professional Lesson 3: Identifying Key Characteristics of Workgroups and Domains Windows XP Professional supports two types of network environments in which users

More information

PERFORMING A CUSTOM INSTALLATION

PERFORMING A CUSTOM INSTALLATION PERFORMING A CUSTOM INSTALLATION OF OBSERVEIT ObserveIT Performing a Custom Installation of ObserveIT 1 of 46 TABLE OF CONTENTS TABLE OF CONTENTS... 2 OVERVIEW... 4 DOCUMENT VERSIONS... 4 PRODUCT VERSION...

More information

KNOXPLANS for New Users

KNOXPLANS for New Users KNOXPLANS for New Users Version 9.1, October 2018 Contents KNOXPLANS for New Users... 1 Welcome to KnoxPlans, Version 9.1... 2 Recommended Client Hardware and O/S Specifications... 2 Browser Requirements...

More information

Kaspersky Security for Windows Server

Kaspersky Security for Windows Server Kaspersky Security for Windows Server User's Guide Application version: 10.1.0.622 Dear User, Thank you for choosing Kaspersky Lab as your security software provider. We hope that this document helps you

More information

CHAPTER 4: RECORD LINKS

CHAPTER 4: RECORD LINKS Chapter 4: Record Links CHAPTER 4: RECORD LINKS Objectives The objectives are: Use Microsoft Dynamics NAV as the bridge to the company document management system. Create a link from a Microsoft Dynamics

More information

VMware vsphere: What s New Lab Manual ESXi 5.5 and vcenter Server 5.5

VMware vsphere: What s New Lab Manual ESXi 5.5 and vcenter Server 5.5 VMware vsphere: What s New Lab Manual ESXi 5.5 and vcenter Server 5.5 VMware Education Services VMware, Inc. www.vmware.com/education VMware vsphere: What s New ESXi 5.5 and vcenter Server 5.5 Part Number

More information

ILTA HAND 6A. Implementing and Using. Windows Server In the Legal Environment

ILTA HAND 6A. Implementing and Using. Windows Server In the Legal Environment ILTA 2013 - HAND 6A Implementing and Using Windows Server 2012 In the Legal Environment Table of Contents Purpose of This Lab... 3 Lab Environment... 3 Presenter... 3 Exercise 1 Getting Familiar with Windows

More information

Installing and Configuring vcenter Multi-Hypervisor Manager

Installing and Configuring vcenter Multi-Hypervisor Manager Installing and Configuring vcenter Multi-Hypervisor Manager vcenter Server 5.1 vcenter Multi-Hypervisor Manager 1.1.2 This document supports the version of each product listed and supports all subsequent

More information

Overview of Cisco UCS Manager GUI

Overview of Cisco UCS Manager GUI Overview of Cisco UCS Manager GUI This chapter includes the following sections: Overview of Cisco UCS Manager GUI, page 1 Logging in to Cisco UCS Manager GUI through HTTPS, page 6 Logging in to Cisco UCS

More information

2 Administering Microsoft Windows Server 2003

2 Administering Microsoft Windows Server 2003 2 Administering Microsoft Windows Server 2003 Exam Objectives in this Chapter: Manage servers remotely Manage a server by using Remote Assistance Manage a server by using Terminal Services remote administration

More information

NiceForm User Guide. English Edition. Rev Euro Plus d.o.o. & Niceware International LLC All rights reserved.

NiceForm User Guide. English Edition. Rev Euro Plus d.o.o. & Niceware International LLC All rights reserved. www.nicelabel.com, info@nicelabel.com English Edition Rev-0910 2009 Euro Plus d.o.o. & Niceware International LLC All rights reserved. www.nicelabel.com Head Office Euro Plus d.o.o. Ulica Lojzeta Hrovata

More information

Printing Specification Document for Explorer 8 browsers. Version

Printing Specification Document for Explorer 8 browsers. Version Printing Specification Document for Explorer 8 browsers Version 01.00.02 Document Change History Issue/Revision Date Author Description V 01.00.00 2009-04-23 Documentation department Creation V 01.00.01

More information

FactSet 2016 (Breithorn) Framework Rev 10

FactSet 2016 (Breithorn) Framework Rev 10 Table of Contents FactSet Troubleshooting Utility (FTU)... 3 How do I access the FactSet Troubleshooting Utility?... 4 CITRIX XENAPP WITH NO PUBLISHED INTERNET BROWSER... 4 FactSet Connectivity Issues...

More information

Optional Lab: Customize Settings in Windows Vista

Optional Lab: Customize Settings in Windows Vista 12.2.4 Optional Lab: Customize Settings in Windows Vista Introduction Print and complete this lab. This lab is comprised of five parts. This lab is designed to be completed in multiple lab sessions. Part

More information

COPYRIGHTED MATERIAL. Contents. Assessment Test

COPYRIGHTED MATERIAL. Contents. Assessment Test Contents Introduction Assessment Test xxvii xxxvii Chapter 1 Installing Windows 7 1 Introducing Windows 7 2 Windows 7 Architecture 5 Preparing to Install Windows 7 6 Windows 7 Starter 7 Windows 7 Home

More information

Workshop on Windows Server 2012

Workshop on Windows Server 2012 Workshop on Windows Server 2012 Topics covered on Workshop DHCP Scope Splitting. A Dynamic Host Configuration Protocol (DHCP) split-scope configuration using multiple DHCP servers allows for increased

More information