Kaseya 2. User Guide. Version 1.0

Size: px
Start display at page:

Download "Kaseya 2. User Guide. Version 1.0"

Transcription

1 Kaseya 2 Imaging & Deployment User Guide Version 1.0 August 16, 2011

2 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private Sector IT organizations. Kaseya's IT Automation Framework allows IT Professionals to proactively monitor, manage and maintain distributed IT infrastructure remotely, easily and efficiently with one integrated Web based platform. Kaseya's technology is licensed on over three million machines worldwide. Copyright Kaseya International Limited. All Rights Reserved.

3 Contents Imaging & Deployment Overview... 1 Imaging & Deployment System Requirements... 3 Image Deployment to Machines with Agents... 3 Image Deployment to Machines without Agents... 4 Creating and Deploying Backups... 5 Enabling NIC Bootup on a Machine... 5 Deactivation/Activation... 6 Uninstalling Imaging & Deployment... 6 Status... 7 Schedule... 7 Schedule Deploy... 8 New Image... 9 New Backup Deploy Image Repositories Creating a New Repository Editing a Repository Create or Edit an Image Folder Application Settings Application Logging Glossary of Terms Index i

4

5 Imaging & Deployment Overview Images PXE Imaging & Deployment (KID) is an addon module that clones an image of a computer software environment and deploys it to multiple machines remotely through the network. This capability is particularly useful for school and training organizations that need to reset entire classrooms of computers back to a standard "known state" on a recurring basis. IT administrators can also use the module to install images that are customized to reflect their organization's configuration preferences, simply by plugging the machines into the network. The images created and deployed by KID are "generalized" by running a utility called sysprep just prior to creating the image. When a target machine boots up using a sysprepped image, an XML file provides the information required to create a unique installation of the image on that machine. A KID created image only contains one disk drive per computer, including all volumes (drive letters) on it. This disk drive is always the disk drive the computer uses to boot up. KID uses Preboot execution Environment (PXE) technology to create and deploy images. PXE is an open industry standard for booting computers using the computer's network interface card to load an image from a network location, instead of booting from a local storage device like a hard disk or CD-ROM. Enabling NIC Bootup The system setup, or BIOS, of each KID target computer must be configured to bootup using the network interface card (NIC) option at startup, regardless of whether an agent is installed or not. Most computers built within the last 5 years have the NIC bootup option enabled by default. The NIC bootup option must be sequenced before the hard disk (HDD) option. KID requires this for both image and backup deployment. Repositories Creating a repository on a specified agent machine creates a VirtualBox VM on that same machine. The VirtualBox VM contains a PXE server. A PXE server manages the bootups of machines that have the NIC bootup option enabled. No configuration of the VirtualBox or PXE server is required after the repository is created. A second VSA agent is installed inside the VirtualBox VM to communicate instructions between the VSA and the PXE server. You do not have to monitor or configure this second agent. The naming convention for a KID VirtualBox agent is imgsrv1-xxx, so it's easy to recognize these agents in the VSA. Creating a repository on an agent machine also creates a storage folder on its hard disk. This folder stores all the images and backups created for deployment from this repository agent machine. Only local paths are supported. UNC paths are not supported. The Physical Network The physical network, in the context of KID, refers to any part of the network that can receive a broadcast message. NIC bootup machines use broadcast messages to communicate with the PXE server. Switches and routers may be set to prevent a broadcast message from being passed from one subnet to the next. The repository agent machine, the source machines used for creating images and backups and any target machines should be able to "see" each other using broadcast messages. Deploying Images to Agent Machines Images can be deployed to either agent machines or non-agent machines. Image deployment to agent managed machines is highly recommended. Machines can be individually selected and scheduled for image deployment. 1

6 The status of machines using Live Connect can be assessed at any time. Agent managed machines can be easily rebooted from the VSA console. Machine specific pre-deployment and post-deployment agent procedures can be run. Agent managed machines can be backed up using Imaging & Deployment. Deploying Images to Non-Agent Machines (Auto Deploy) To deploy images to non-agent machines, a repository specifies a range of IP addresses and "Auto Deploy" is enabled for that repository. Auto Deploy deploys the repository's default image to any "unknown" computer that boots up, has the NIC bootup option enabled, and connects to the same physical network as the repository. An "unknown" computer is a computer that does not have an agent on it and has not had an image deployed to it since Auto Deploy was last enabled. Auto Deploy is primarily designed to facilitate image deployment to new or reformatted machines, booted up in a controlled, isolated range of IP addresses. Typically, the image created for a "first time" deployment should include an installed agent. When the installed agent is detected on the target machine the first time it boots up, the agent is reconfigured as a "new" agent and a new VSA agent account is created for the machine in the VSA. From then on the agent method of deploying images and backups to that machine is used. When Auto Deploy is used and the target computer boots up for the first time, a Microsoft Windows program known as MiniSetup displays. The administrator manually enters the computer's name, credentials, and other settings. Note: If Auto Deploy is enabled for a repository, that same repository cannot be used to create images or backups or schedule deployments to agent machines. Backups In KID a backup can also be created for any agent machine. Sysprep is not performed on a backup, meaning the unique settings of that machine are included in the restore. A backup is not intended to be cloned to multiple machines. Rather it serves the traditional purpose of disaster recovery for a specific agent machine. Additional Topics KID System Requirements (page 3) Image Deployment to Machines with Agents (page 3) Image Deployment to Machines without Agents (page 4) Creating and Deploying Backups (page 5) Enabling NIC Bootup on a Machine (page 5) Deactivation/Activation (page 6) Uninstalling Imaging & Deployment (page 6) Functions Status (page 7) Schedule (page 7) Deploy Image (page 10) Repositories (page 12) Application Settings (page 16) Application Logging (page Description Provides a dashboard view of deployments using Imaging & Deployment. Schedules image deployments to managed machines and schedules the creation of images and backups for managed machines. Schedules image deployments by selected machine. Sets the properties of repositories and organizes the images and backups used for image and backup deployment. Specifies default settings for the entire Imaging & Deployment module. Displays a log of Imaging & Deployment module activity. 2

7 16) Imaging & Deployment System Requirements KServer The Imaging & Deployment module installs on VSA 6.1, with all hotfixes applied, and later. Note: See general System Requirements ( ). Minimum Requirements for Each Repository Machine A Kaseya agent must be installed. Only physical machines are supported, not virtual machines. Microsoft Windows XP (SP3), 2003, 2003 R2, Vista, 2008, 2008 R2, 7 Linux and Macintosh are not supported. 1 GB RAM for XP and 2003, and 2 GB or more for Vista and above. 100 GB disk space. Image sizes can range between 300MB and several GBs. At least one connected, physical ethernet adapter. Wireless adapters are not supported. Network access to a DHCP server. The repository agent machine can have a static IP address, but the Virtual Server running on the repository machine must to be able to obtain a DHCP address. Image Creation and Deployment Machines Supported operating systems: Microsoft Windows 2000, XP, 2003, 2003 R2, Vista, 2008, 2008 R2, 7 Both physical machines and virtual machines are supported. The destination drive must be equal or larger than the source drive. Software RAID/fake RAID is not supported. At least one connected, physical ethernet adapter. Wireless adapters are not supported. The Windows directory must be called "Windows" and be located on the first or second partition of the boot disk drive. The system setup, or BIOS, of each KID target computer must be configured to bootup using the network interface card (NIC) option at startup, regardless of whether an agent is installed or not. Most computers built within the last 5 years have the NIC bootup option enabled by default. The NIC bootup option must be sequenced before the hard disk (HDD) option. KID requires this for both image and backup deployment. An installed Kaseya agent is highly recommended. Image Deployment to Machines with Agents 1. If an agent does not already exist, install an agent on the physical machine you intend to serve as the repository machine. Virtual machines are not supported. Only one repository is required for each physical network. 2. Create a new repository on the agent machine using the Repositories (page 12) page. 3

8 3. Create an image of a selected agent machine using the Schedule (page 7) page. The image is stored on the hard drive of the agent repository machine. Note: Whether an agent exists in the source image or not, if an agent is installed on the target machine before deployment, after deployment the agent is re-created on that machine. The re-created agent uses the same GUID, agent configuration and log history that it had before deployment. 4. If necessary, enable the NIC bootup option in the BIOS of each target computer. Note: The system setup, or BIOS, of each KID target computer must be configured to bootup using the network interface card (NIC) option at startup, regardless of whether an agent is installed or not. Most computers built within the last 5 years have the NIC bootup option enabled by default. The NIC bootup option must be sequenced before the hard disk (HDD) option. KID requires this for both image and backup deployment. 5. Schedule the deployment of the source image to target agent machines using the Deploy Image (page 10) page. Image Deployment to Machines without Agents 1. For Auto Deploy, installing an agent on the source machine used to create an image is highly recommended. If, after deployment using Auto Deploy, KID recognizes an agent is installed on a target machine, KID reconfigures the installed agent as a "new" agent and creates a new machine ID account for that agent in the VSA. 2. If an agent does not already exist, install an agent on the physical machine you intend to serve as the repository machine. Virtual machines are not supported. Only one repository is required for each physical network. 3. Create a new repository on the agent machine using the Repositories (page 12) page. 4. Create an image in the repository using the machine you configured in step 1 as the source. The image is stored on the hard drive of the agent repository machine. Edit the repository. Specify a PXE range of IP addresses that the default image will be deployed to. Ensure the range of IP addresses you specify are not used by your regular network. For example, if your regular, internal network uses a x range of IP addresses but no other x.x IP addresses, you could use a starting address of x for auto deploy. KID only lets you specify the three octets of the starting address. It assumes all IP addresses between 2 and 252 in the last octet are available for auto deploy. Enable Auto Deploy for that repository. Specify the image to be auto deployed. The image specified for auto deploy is called the "default" image of the repository. 5. If necessary, enable the NIC bootup option in the BIOS of each target computer. Note: The system setup, or BIOS, of each KID target computer must be configured to bootup using the network interface card (NIC) option at startup, regardless of whether an agent is installed or not. Most computers built within the last 5 years have the NIC bootup option enabled by default. The NIC bootup option must be sequenced before the hard disk (HDD) option. KID requires this for both image and backup deployment. 6. Bootup target machines. 4

9 If auto deploy to a machine succeeds - You should see a Clonzilla startup screen similar to the one for image create and backup. If auto deploy to machine fails - De-activate and reactivate the repository, as the Repository Server thinks the machine has been imaged. 7. When Auto Deploy is used and the target computer boots up for the first time, a Microsoft Windows program known as MiniSetup displays. The administrator manually enters the computer's name, credentials, and other settings. Note: Once the image is deployed to a machine, the image cannot be re-deployed to that same machine unless Auto Deploy is disabled, then re-enabled, or the repository is deactivated, then re-activated. Creating and Deploying Backups 1. If an agent does not already exist, install an agent on the physical machine you intend to serve as the repository machine. Virtual machines are not supported. Only one repository is required for each physical network. 2. Create a new repository on the agent machine using the Repositories (page 12) page. 3. Create a backup of a selected agent machine using the Schedule (page 7) page. The backup is stored on the hard drive of the agent repository machine. 4. If necessary, enable the NIC bootup option in the BIOS of each target computer. Note: The system setup, or BIOS, of each KID target computer must be configured to bootup using the network interface card (NIC) option at startup, regardless of whether an agent is installed or not. Most computers built within the last 5 years have the NIC bootup option enabled by default. The NIC bootup option must be sequenced before the hard disk (HDD) option. KID requires this for both image and backup deployment. 5. Schedule the deployment of the backup to a target agent machine using the Deploy Image (page 10) page. Enabling NIC Bootup on a Machine The following is a general explanation for configuring the NIC bootup option on a machine. The specifics may differ for each machine and BIOS you configure. 5

10 Procedure Note: The system setup, or BIOS, of each KID target computer must be configured to bootup using the network interface card (NIC) option at startup, regardless of whether an agent is installed or not. Most computers built within the last 5 years have the NIC bootup option enabled by default. The NIC bootup option must be sequenced before the hard disk (HDD) option. KID requires this for both image and backup deployment. 1. Power up the machine. If your system is already on, reboot the machine. 2. Press the <F2> key immediately after the bootup to display the system setup screen. Some computers may require a different key to display the system setup screen. If you wait too long and the operating system begins to load, reboot the computer and try again. 3. Locate the Boot Sequence menu, or similarly named menu, in the system setup screen. Sometimes these boot options are located in a general sub-menu, such as Advanced BIOS Features. 4. Enable bootup using the network interface controller (NIC) option. Sometimes this is called the Onboard NIC option. The NIC bootup option must be sequenced before the hard disk (HDD) option. This is the only sequence requirement. Ensure the other boot options are sequenced in the order you prefer, should the NIC bootup option not be used. 5. Save your system settings. The machine is now PXE boot enabled. Deactivation/Activation There may be times when you need to deactivate a repository, then reactivate it. Reasons can include: Imaging & Deployment is placed on hold for billing purposes. Preventing the deployment of images to machines that were unintentionally booted up in the range specified for Auto Deployment. Unexpected repository behavior that needs to be investigated. Whatever the reason, you should be aware that: Reactivation resumes the scheduled deployment of all images to agent machines that may have been placed on hold during deactivation. No agent machine image deployments are canceled by deactivation/activation. Deactivation resets the "deploy status" of all non-agent machines specified in a PXE range for Auto Deploy. If the repository is re-activated and Auto Deploy is turned on, images will be re-deployed to all machines specified by the PXE range of IP addresses. Normally, once an image is deployed using Auto Deploy, the image is not re-deployed unless Auto Deploy is disabled, then re-enabled. Uninstalling Imaging & Deployment Should you decide to uninstall the Imaging & Deployment addon module, please perform the uninstall in the following order. 1. Manually uninstall all agents installed to communicate with the VirtualBox VMs created on repository agent machines. These agents are named imgsrv1-xxx so it's easy to identify them. 6

11 2. Delete all repositories using the Repositories (page 12) page. Deleting a repository in the VSA does not delete the storage folder of images and backup on the repository agent machine. If you want to delete images and backups from the repository agent machine you can: Delete each image and backup using the Repositories page before you delete the repository, or Log on to the repository agent machine and manually delete images and backups from the hard disk. 3. Uninstall the Imaging & Deployment addon module. Status Imaging & Deployment > Status The Status page provides a dashboard view of Imaging & Deployment activities, including: Deployments - Last 24 Hours - Displays the percentage of successful KID deployments over the last 24 hours. Alerts - Lists KID configuration and operational alerts. Schedule Actions Imaging & Deployment > Schedule The Schedule page schedules KID tasks using names defined by the user. For example, a single scheduled task called "Refresh training room" may involve deploying an image to 50 target machines. All the required machines can be associated with this single named task, and referenced later using the task's schedule history. This page can schedule: Image or backup deployments Image creation Backup creation Scheduled tasks typically display in the order scheduled. Note: The Deploy Image (page 10) page schedules image deployments by selected machine. New Deployment Schedule (page 8) - Schedules the deployment of an image or backup. Image (page 9) - Creates an image. Backup (page 10) - Creates a backup. Reschedule - If a task has been scheduled, but not yet started, click Reschedule to change the schedule. Delete - Deletes a scheduled task. Schedule History - Displays all schedule changes for a task, including the list of machines affected by the schedule. Refresh - Refreshes the page. Table Columns (Object Icons) - The most common icons displayed in this table are: 7

12 - Create Image - Deploy Image - Delete Image - Create Repository - Delete Repository - Create Backup - Deploy Backup - Delete Backup - Deactivate Repository - Activate Repository (Status Icons) - In Process - The task has started but has not yet completed. - Completed - The task has been completed. - Error - An error has occurred performing this task. - Pending - The task is scheduled but not yet started. Schedule Name - The name of the scheduled task. Repository Name - The name of the repository. Image Folder - The name of the folder. Image Name - The name of the image. Agent Host - The target machine ID / group ID. Image Source - The source machine used to create the image. Percent Complete - The percent complete for the task. Recurrence - The recurring pattern for running the task. Target Machines - The number of target machines affected by this task. Clicking a count displays the list of affected machines. Last Deployed - The date/time the task was last scheduled. Next Deploy - The date/time the task is next scheduled to run. Schedule Deploy Schedule > New > Deployment Schedule Deploy Image > Schedule Deploy Image > Deploy Now The Schedule tab does not display if Deploy Now is selected to display this dialog. Schedule > Reschedule Reschedule can only be used to display this dialog if a previously scheduled deployment has not yet started. The Schedule Deploy dialog schedules image or backup deployments. Dialog Fields Schedule Name - Enter a name for the new deployment schedule. Select a source image. Repository - Select the repository of the source image or backup. Folder - Select the folder of the source image or backup. Image - Select the source image. The image source can be either an image or backup. 8

13 Image Description - Displays the description of the selected image or backup. Note: The domain and credential fields display only if an image is selected, not a backup. Enter a credential for the target machine to rejoin the domain after the image is deployed. Note: All the attributes of the target agent machine can be restored after the image is deployed, except for rejoining the domain, so a credential must be provided. Join a domain - If checked, the target machine will be added to a domain after the image is created, using the following domain credential. If unchecked, the user is only asked to supply the administrator password. The computer will be added to the workgroup called Workgroup. Domain - The name of the domain to join. Username - The domain user name. Password - The domain user password. Confirm Password - Re-enter the domain user password. Optionally select agent procedures that run before and after image deployment. Run Selected Procedure before OS Image Deployment - If checked, select an agent procedure from the Pre Procedure drop-down list. Run Selected Procedure after OS Image Deployment - If checked, select an agent procedure from the Post Procedure drop-down list. Select and schedule the machines. Machines tab - Select the agent machines the image or backup will be deployed to. Note: The Schedule tab does not display if Deploy Now is selected to display this dialog. Schedule tab - Schedule image deployment once or periodically. Each type of recurrence Once, Daily, Weekly, Monthly, Yearly displays additional options appropriate for that type of recurrence. Periodic scheduling includes setting start and end dates for the recurrence. Not all options are available for each task scheduled. New Image Schedule > New > Image Repository > (select a repository folder) > New > Image The New Image dialog schedules the creation of an image from a source machine. Dialog Fields Image Name - Enter a name for the new image. Select a source image. Repository - Select the repository to create the image in. Folder - Select the folder to create the image in. Image Source - Select the source image. Image Description - Displays the description of the selected image. Enter a credential for the source machine to rejoin the domain after the image is created. Note: The source machine is "sysprepped" it's identity wiped prior to the image being taken. All the attributes of the source machine can be restored after the image is recreated, except for rejoining the domain, so a credential must be provided. 9

14 Join a domain - If checked, the source machine will be added to a domain after the image is created, using the following domain credential. If unchecked, the user is only asked to supply the administrator password. The computer will be added to the workgroup called Workgroup. Domain - The name of the domain to join. Username - The domain user name. Password - The domain user password. Confirm Password - Re-enter the domain user password. Schedule image creation. Create Now - Create the image immediately. Schedule For - Enabled if Create Now is not checked. Schedule the creation of an image for a specific date and time. New Backup Schedule > New > Backup Repository > (select a repository folder) > New > Backup The New Backup dialog schedules the creation of a backup from a source machine. Dialog Fields Backup Name - Enter a name for the backup. Repository - Select the repository to store the backup in. Folder - Select the image folder to store the backup in. Backup Source - Select the machine to back up. Backup Description - Enter a description for this backup. Schedule - Schedule the creation of the image once or periodically. Each type of recurrence Once, Daily, Weekly, Monthly, Yearly displays additional options appropriate for that type of recurrence. Periodic scheduling includes setting start and end dates for the recurrence. Not all options are available for each task scheduled. Deploy Image Imaging & Deployment > Deploy Image The Deploy Image page schedules image deployments by selected machine. You can identify target machines to deploy to using any of the 60+ audit columns of information collected by the agent.the list of machines displayed can be filtered using the machine ID/group ID filter. This page can schedule: Image deployments Backup deployments The list of machine IDs displayed depends on the Machine ID / Group ID filter and machine groups the user is authorized to see using System > User Security > Scopes. Note: The Schedule (page 7) page also schedules image and backup deployments and the creation of images and backups. Actions Schedule - Schedules the deployment of an image or backup. (page 8) Deploy Now - Schedules the deployment of an image or backup immediately. (page 8) Machine Status - Displays Live Connect for a selected machine. 10

15 Limited Machine Status - Displays static Live Connect data for a selected machine. Table Columns Machine ID - The name identifying the machine within the VSA. Typically based on the computer name. Current User - Logon name of the machine user currently logged into the machine (if any). Last Reboot Time - Time of the last known reboot of the machine. Last Checkin Time - Most recent time when a machine checked into the KServer. Group ID - The group ID portion of the machine ID. First Checkin Time - Time when a machine first checked into the KServer. Time Zone - The time zone used by the machine. Computer Name - The name assigned the machine by users of the machine. Domain/Workgroup - The workgroup or domain the computer belongs to. DNS Computer Name - The fully qualified DNS computer name identifying the machine on the network. The DNS computer name typically comprises the computer name plus the domain name. For example: jsmithxp.acme.com. Displays only the computer name if the machine is a member of a workgroup. Operating System - Operation system type the machine is running. OS Version - Operation system version string. CPU Type - Processor make and model. CPU Speed - Clock speed of the processor. CPU Count - The number of CPUs. RAM (MB) - Megabytes of RAM on the machine. Agent Version - Version number of the Kaseya agent loaded on the machine. Last Logged In User - Logon name of the last person to log into the machine. Primary/Secondary KServer - IP address / name the machine uses to communicate with the KServer. Quick Checkin Period - Quick check in time setting in seconds. Contact Name - Machine user name entered in Edit Profile. Contact - address entered in Edit Profile. Contact Phone - Phone number entered in Edit Profile. Manufacturer - System manufacturer. Product Name - System product name. System Version - Product version number. System Serial Number - System serial number. Chassis Serial Number - Serial number on the enclosure. Chassis Asset Tag - Asset tag number on the enclosure. External Bus Speed - Motherboard bus speed. Max Memory Size - Max memory size the motherboard can hold. Max Memory Slots - Total number of memory module slots available. Chassis Manufacturer - Manufacturer of the enclosure. Chassis Type - Enclosure type. Chassis Version - Enclosure version number. Motherboard Manufacturer - Motherboard manufacturer. Motherboard Product - Motherboard product ID. Motherboard Version - Motherboard version number. Motherboard Serial Num - Motherboard serial number. Processor Family - Processor type installed. Processor Manufacturer - Processor manufacturer. Processor Version - Processor version ID. 11

16 CPU Max Speed - Max processor speed supported. CPU Current Speed - Speed processor is currently running at. IPv4 Address - IP address assigned to the machine, in version 4 format. IPv6 Address - IP address assigned to the machine, in version 6 format. Subnet Mask - Networking subnet assigned to the machine. Default Gateway - Default gateway assigned to the machine. Connection Gateway - IP address seen by the KServer when this machine checks in. If the machine is behind a DHCP server, this is the public IP address of the subnet. Country - The country associated with the Connection Gateway. MAC Address - MAC address of the LAN card used to communicate with the KServer. DNS Server - IP address of the DNS server assigned to the machine. DHCP Server - The IP address of the DHCP server used by this machine. Primary/Secondary WINS - WINS settings. Free Space - The free data storage space in gigabytes. Used Space - The used data storage space in gigabytes. Total Size - The total data storage space in gigabytes. Number of Drives - The number of drives on the machine. Portal Access Logon - Logon name given to a machine user for logging into the KServer. Portal Access Remote Control - Enabled if this machine user can log in and get remote control access to their own machine from another machine. Disabled if access is denied. Portal Access Ticketing - Enabled if this machine user can log in and enter trouble tickets. Disabled if access is denied. Portal Access Chat - Enabled if this machine user can initiate chat sessions with a VSA user. Disabled if access is denied. Repositories Imaging & Deployment > Repositories The Repositories page sets the properties of repositories and organizes the images and backups used for image and backup deployment. You can also create images and backups using this page. Once an image is created, it can be deployed to one or more agent machines, using the Schedule (page 7) page or Deploy Image (page 10) page. Alternatively, a repository can be used to deploy a default image to one or more non-agent machines. Repositories are organized using a folder tree in the middle pane. The Repositories cabinet expands to show individual repositories. Each repository expands to show individual image folders. Each image folder expands to show individual images and backups. Use the following options to manage objects in this folder tree. Repositories The following action displays when the Repositories cabinet is selected. Repository Actions New Repository - See Creating a New Repository (page 14) The following actions display when a repository is selected. New 12

17 Repository - Creates a new repository (page 14). Image Folder - Creates a new image folder (page 16). Edit Repository - Edits an existing repository (page 15). Delete Repository - Deletes a repository. See Uninstalling Imaging & Deployment (page 6) for more information. Refresh/Import Images - Updates the VSA with any changes made directly to the repository folders and images stored on the host agent machine. Activate Repository - Activates a repository, enabling image and backup creation and deployment to agent machines and auto deployment of a default image to non-agent machines. Note: Re-activation clears the list of "known" non-agent machines that have already had an image deployed to them. An "unknown" computer is a computer that does not have an agent on it and has not had an image deployed to it since Auto Deploy was last enabled. Deactivate Repository - Deactivates the repository, preventing image deployment to agent machines and auto deployment of a default image to non-agent machines. Displayed Data The following data displays when a repository is selected. Name - The name of the repository. Description - A longer description of repository. Agent Host - The agent machine hosting the PXE server. PXE Start Address - The PXE starting address for auto deployment. Ensure the range of IP addresses you specify are not used by your regular network. For example, if your regular, internal network uses a x range of IP addresses but no other x.x IP addresses, you could use a starting address of x for auto deploy. KID only lets you specify the three octets of the starting address. It assumes all IP addresses between 2 and 252 in the last octet are available for auto deploy. PXE End Address - The PXE ending address for auto deployment. Deploy default image on reboot - If checked, auto deploy is enabled for this repository. Auto Deploy deploys the repository's default image to any "unknown" computer that boots up, has the NIC bootup option enabled, and connects to the same physical network as the repository. An "unknown" computer is a computer that does not have an agent on it and has not had an image deployed to it since Auto Deploy was last enabled. Free Space - The free hard disk space available on the repository agent machine. Used Space - The used hard disk space available on the repository agent machine. Total Size - The total hard disk space available on the repository agent machine. Status - The status of the repository: Active or Inactive. Repository Events - Displays a history of all activities for this repository. Schedule History - Displays the details of a scheduled event. Refresh - Refreshes the list of events. Note: See the Schedule (page 7) page for the definitions for all columns displayed in the Repository Events list. Image Folder Actions The following actions display when a image folder is selected. New Image Folder - Creates a new image folder (page 16). 13

18 Image - Creates a new image (page 9). Backup - Creates a new backup (page 10). Edit Image Folder - Edits an existing image folder (page 15). Refresh/Import Images - Updates the VSA with any changes made directly to the repository folders and images stored on the host agent machine. Displayed Data The following data displays when a image folder is selected. Image Folder Name - The name of the folder on the repository agent machine used to store images and backups. Path - The drive and path on the repository agent machine that corresponds to this image folder in the KID module. Description - A longer description of the image folder. Image or Backup The following actions display when an image or backup is selected. Actions New New Image - Creates a new image (page 9). New Backup - Creates a new backup (page 10). Edit Image - Edits an existing image. Image Name - The name of the image. Repository - The name of the repository. Folder - The folder location of the image. Image Source - The source machine used to create the image. Image Description - A longer description of the image. Delete Image - Deletes the image. Displayed Data The following data displays when a image or backup is selected. Name - The name of the image or backup Auto Deploy Image - If checked, this image is selected for auto deploy. Description - A longer description of the image or backup. Image Source - The source machine used to create the image. Image Size - The size of the image file. Is Backup - If checked, a backup is selected. Status - The status of the selected image or backup. For example: - Image Created - Backup Created Creating a New Repository Repositories > New Repository Enter the following in the New Repository dialog. 14

19 Name - The name of the repository. Description - A description of repository. Agent Host - The agent machine hosting the repository. The repository comprises: One or more folders on the hard disk of the agent host machine to store the images and backups for that repository. A virtual machine that contains a PXE server. A second VSA agent is installed inside the VirtualBox VM to communicate instructions between the VSA and the PXE server. You do not have to monitor or configure this second agent. The naming convention for a KID VirtualBox agent is imgsrv1-xxx, so it's easy to recognize these agents in the VSA. PXE Start Address - The PXE starting address for auto deployment. Ensure the range of IP addresses you specify are not used by your regular network. For example, if your regular, internal network uses a x range of IP addresses but no other x.x IP addresses, you could use a starting address of x for auto deploy. KID only lets you specify the three octets of the starting address. It assumes all IP addresses between 2 and 252 in the last octet are available for auto deploy. PXE End Address - The PXE ending address for auto deployment. Image Folder Name - The image folder name created with this repository. Path - The drive and path of the image folder created with this repository. Note: If no drive letters display after selecting a machine ID in the Agent Host field, then audit for that machine ID has not been run yet, or the disk space for any drive on that machine ID is too small. The minimum disk space required for an agent host is set using the Application Settings (page 16) page. Deploy Now - If checked, repository is created immediately. Schedule For - If Deploy Now is not checked, enter a date and time to schedule the creation of the repository. Editing a Repository Repositories > Edit Repository You can change the following when editing an existing repository in the Edit Repository dialog. Description - A description of repository. PXE Start Address - The PXE starting address for auto deployment. Ensure the range of IP addresses you specify are not used by your regular network. For example, if your regular, internal network uses a x range of IP addresses but no other x.x IP addresses, you could use a starting address of x for auto deploy. KID only lets you specify the three octets of the starting address. It assumes all IP addresses between 2 and 252 in the last octet are available for auto deploy. PXE End Address - The PXE ending address for auto deployment. Set Auto Deploy On - If checked, auto deploy is enabled. Auto Deploy deploys the repository's default image to any "unknown" computer that boots up, has the NIC bootup option enabled, and connects to the same physical network as the repository. An "unknown" computer is a computer that does not have an agent on it and has not had an image deployed to it since Auto Deploy was last enabled. Image - If Set Auto Deploy On is checked, select the default image to use for auto deploy. 15

20 Create or Edit an Image Folder Repositories > (select a repository or image folder> New > Image Folder Repositories > (select a repository or image folder> Edit Image Folder Use this dialog to create a new image folder on the repository agent machine. Each individual image folder in KID can point to a different drive and path location on its corresponding repository agent machine. When editing an existing image folder, you can only change the description. Image Folder Name - The name of the folder on the repository agent machine used to store images and backups. Path - The drive and path on the repository agent machine that corresponds to this image folder in the KID module. Description - A longer description of the image folder. Application Settings Actions Imaging & Deployment > Application Settings The Application Settings page specifies default settings for the entire Imaging & Deployment module. Edit Logs Saved For - The default number of days machine history logs are saved. Allow Auto Deploy - If checked, allows Auto Deploy to be selected for a repository. Minimum Drive Letter Space - The minimum disk space allowed for an image folder in a repository. PXE Starting Address - The default PXE starting address for auto deployment. Ensure the range of IP addresses you specify are not used by your regular network. For example, if your regular, internal network uses a x range of IP addresses but no other x.x IP addresses, you could use a starting address of x for auto deploy. KID only lets you specify the three octets of the starting address. It assumes all IP addresses between 2 and 252 in the last octet are available for auto deploy. Pre Procedure - The default procedure to run before deploying an image to agent managed machine. Post Procedure - The default procedure to run after deploying an image to agent managed machine. Application Logging Imaging & Deployment > Application Logging The Application Logging page displays a log of Imaging & Deployment module activity by: Event Name Message Admin Event Date This table supports selectable columns, column sorting, column filtering and flexible columns widths (link.asp?vsa-online?6875.htm). 16

21 17

22

23 Glossary of Terms Glossary of Terms Managed Machine A monitored machine with an installed agent and active machine ID / group ID account on the KServer. Each managed machine uses up one agent license. myorg myorg is the organization (page 19) of the service provider using the VSA. All other organizations in the VSA are second party organizations doing business with myorg. The default name of myorg, called My Organization, should be renamed to match the service provider's company or organization name. This name displays at the top of various reports to brand the report. Agents installed to internally managed machines can be assigned to this organization. VSA user logons are typically associated with staff records in the myorg organization. Org The VSA supports three different kinds of business relationships: Organizations - Supports machine groups and manages machines using agents. Customers - Supports the billing of customers using Service Billing. Vendors - Supports the procurement of materials using Service Billing. The Org table is a support table shared by organizations, customers and vendors. Each record in the Org table is identified by a unique orgid. The Org table contains basic information you'd generally need to maintain about any kind of business relationship: mailing address, primary phone number, duns number, yearly revenue, etc. Because the Org table is shared, you can easily convert: A customer into an organization or vendor. A vendor into an organization or customer. An organization into a customer or vendor. Note: myorg (page 19) is the organization of the service provider using the VSA. PXE The Preboot execution Environment (PXE) is an open industry standard for booting computers using the computer's network interface card to load an image from a network location, instead of booting from a local storage device like a hard disk or CD-ROM. For KID 1.0, implementation of the PXE standard includes the following: The BIOS of a PXE client computer is configured to communicate with a PXE server at bootup to obtain the instructions required to boot. Those instructions include specifying the network location of an image to boot from, as well as providing values for creating a unique machine environment. Configuring the BIOS of a client machine must be done manually, regardless of whether an agent is installed or not. Creating a repository on an agent machine creates a VirtualBox on that machine. A PXE server runs from inside the VirtualBox and must share the same physical network as the PXE client machines it manages. No additional configuration of the PXE server is required outside of the Repository page of the KID module. The VirtualBox on the agent machine also serves as the storage location for all the images and backups created for that repository. Sysprep Microsoft's System Preparation Utility, or sysprep, prepares an operating system for disk cloning and restoration via a disk image. Many unique elements of an installation need to be "generalized" before creating a source image that can be deployed to multiple computers. 19

24 Glossary of Terms In KID 1.0 creating an image means sysprep was performed, making the image applicable to restoring on multiple machine using a PXE boot. During the PXE boot, a clone machine is provide with all of the unique elements that were removed when the image was sysprepped and captured. Note: In KID 1.0, after an image is created from a source machine, the source machine's original settings are all restored to their unique state, just prior to running sysprep. In KID 1.0 a backup can also be created for any machine. Sysprep is not performed on a backup, meaning the unique settings of that machine are included in the restore. A backup is not intended to be cloned to multiple machines. Rather it serves the traditional purpose of disaster recovery for a specific machine. 20

25 Index Index A Application Logging 16 Application Settings 16 C Create or Edit an Image Folder 16 Creating a New Repository 14 Creating and Deploying Backups 5 D Deactivation/Activation 6 Deploy Image 10 E Editing a Repository 15 Enabling NIC Bootup on a Machine 5 I Image Deployment to Machines with Agents 3 Image Deployment to Machines without Agents 4 Imaging & Deployment Overview 1 Imaging & Deployment System Requirements 3 M Managed Machine 19 myorg 19 N New Backup 10 New Image 9 O Org 19 P PXE 19 R Repositories 12 S Schedule 7 Schedule Deploy 8 Status 7 Sysprep 19 U Uninstalling Imaging & Deployment 6 21

Kaseya 2. User Guide. for VSA 6.2

Kaseya 2. User Guide. for VSA 6.2 Kaseya 2 Audit User Guide for VSA 6.2 April 16, 2012 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private Sector IT organizations. Kaseya's

More information

Audit Table of Contents:

Audit Table of Contents: Table of Contents: Collect Data View Group Data View Individual Data Protection 2 Chapter 3 - Sadjadi et al. Introduction Comprehensive accurate understanding of the configuration of every managed machine

More information

User Guide. Version R95. English

User Guide. Version R95. English Audit User Guide Version R95 English November 28, 2017 Copyright Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept EULATOS as updated

More information

Kaseya 2. User Guide. Version 1.0

Kaseya 2. User Guide. Version 1.0 Kaseya 2 Online Backup User Guide Version 1.0 August 10, 2011 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private Sector IT organizations.

More information

User Guide. Version R9. English

User Guide. Version R9. English Discovery User Guide Version R9 English March 5, 2015 Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept EULATOS as updated from

More information

User Guide. Version R95. English

User Guide. Version R95. English Discovery User Guide Version R95 English September 18, 2017 Copyright Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept EULATOS

More information

Agents Table of Contents:

Agents Table of Contents: Table of Contents: Machine Status Install LAN Discovery Configure Upgrade Version 2 Chapter 2 - Sadjadi et al. Introduction Kaseya Virtual System Administrator (hereafter VSA) allows for remote and automatic

More information

User Guide. Version 2.1

User Guide. Version 2.1 Kaseya Backup and Disaster Recovery User Guide Version 2.1 August 11, 2008 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private Sector IT

More information

Managed Service Edition - G1

Managed Service Edition - G1 Managed Service Edition - G1 Audit User Guide for VSA 5.2.0.0 June 7, 2010 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private Sector IT

More information

Kaseya 2. User Guide. Version 1.1

Kaseya 2. User Guide. Version 1.1 Kaseya 2 Anti-Malware User Guide Version 1.1 July 11, 2011 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private Sector IT organizations. Kaseya's

More information

Kaseya 2. User Guide. for VSA 6.0

Kaseya 2. User Guide. for VSA 6.0 Kaseya 2 Patch Management User Guide for VSA 6.0 July 19, 2010 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private Sector IT organizations.

More information

Quick Start Guide. Kaseya 2

Quick Start Guide. Kaseya 2 LiveConnect Quick Start Guide Kaseya 2 February 13, 2010 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private Sector IT organizations. Kaseya's

More information

Quick Start Guide. Kaseya 2009

Quick Start Guide. Kaseya 2009 Agent Configuration and Deployment Quick Start Guide Kaseya 2009 February 13, 2010 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private Sector

More information

Kaseya 2. User Guide. Version 6.5 and 1.1

Kaseya 2. User Guide. Version 6.5 and 1.1 Kaseya 2 System Backup and Recovery User Guide Version 6.5 and 1.1 December 18, 2014 Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept

More information

User Guide. Version R94. English

User Guide. Version R94. English Agent User Guide Version R94 English February 16, 2017 Copyright Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept EULATOS as updated

More information

User Guide. Version R93. English

User Guide. Version R93. English Agent User Guide Version R93 English February 9, 2017 Copyright Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept EULATOS as updated

More information

Farstone TotalDeploy User Guide

Farstone TotalDeploy User Guide Farstone TotalDeploy User Guide 1 Introduction to TotalDeploy...3 1.1 Overview...3 1.1.1 What is TotalDeploy...3 1.1.2 Who needs TotalDeploy?...3 1.1.3 TotalDeploy infrastructure...3 1.2 What you can do

More information

Kaseya 2. User Guide. Version 7.0. English

Kaseya 2. User Guide. Version 7.0. English Kaseya 2 Desktop Management User Guide Version 7.0 English September 3, 2014 Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept

More information

Remote Control Table of Contents:

Remote Control Table of Contents: Table of Contents: Desktop Control Configure Notification Policy Files/Processes Message with Users vpro 2 Chapter 4 - Sadjadi et al. Introduction System administrators frequently need to directly work

More information

Kaseya 2. Quick Start Guide. for VSA 6.1

Kaseya 2. Quick Start Guide. for VSA 6.1 Kaseya 2 Agent Configuration and Deployment Quick Start Guide for VSA 6.1 May 16, 2011 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private

More information

User Guide. Version R95. English

User Guide. Version R95. English Data Backup User Guide Version R95 English July 20, 2017 Copyright Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept EULATOS as

More information

Live Connect. Live Connect

Live Connect. Live Connect 2 Chapter 9 - Introduction Fig. 9.1 Brief Overview Pop-up Window provides single machine interface to give you full control over your endpoints with minimal end user interruption. It is built to help you

More information

DeploymentManager Ver6.6

DeploymentManager Ver6.6 DeploymentManager Ver6.6 Operation Guide -First Edition- Rev.001 Contents Introduction... 4 Target Audience and Purpose... 4 Document Structure... 4 Documentation Guidelines for DeploymentManager Manuals...

More information

User Guide. Version R92. English

User Guide. Version R92. English Policy Management User Guide Version R92 English June 23, 2016 Copyright Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept EULATOS

More information

Dell Flexible Computing Solutions: Deploying On-Demand Desktop Streaming

Dell Flexible Computing Solutions: Deploying On-Demand Desktop Streaming Dell Flexible Computing Solutions: Deploying On-Demand Desktop Streaming Product Group November 2007 Dell White Paper November 2007 Contents Introduction... 3 Overview... 4 Planning the Deployment... 5

More information

Kaseya 2. User Guide. Version 1.1

Kaseya 2. User Guide. Version 1.1 Kaseya 2 Antivirus User Guide Version 1.1 June 29, 2011 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private Sector IT organizations. Kaseya's

More information

Device Manager. Managing Devices CHAPTER

Device Manager. Managing Devices CHAPTER 2 CHAPTER This chapter describes how to perform routine device management tasks using the Administrator Console. It provides information on managing the devices within your Cisco VXC Manager environment.

More information

Quick Start Guide. Version R94. English

Quick Start Guide. Version R94. English Backup Quick Start Guide Version R94 English December 12, 2016 Copyright Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept EULATOS

More information

Comodo Network Center Software Version 1.1

Comodo Network Center Software Version 1.1 Comodo Network Center Software Version 1.1 User Guide Guide Version 2.3.112311 Comodo Security Solutions 1255 Broad Street STE 100 Clifton, NJ 07013 Table of Contents Comodo Network Center - Introduction...

More information

User Guide. Version R95. English

User Guide. Version R95. English Cloud Backup User Guide Version R95 English September 11, 2017 Copyright Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept EULATOS

More information

System Table of Contents:

System Table of Contents: Table of Contents: User Settings Preferences User Security Orgs / Groups / Depts Customize Database Access 2 Chapter 9 - Sadjadi et al. Introduction True automated system administration is only possible

More information

Virtual System Administrator

Virtual System Administrator Virtual System Administrator 4.5.0.0 HELP System Documentation Copyright 2000-2005 Kaseya, All rights reserved. Names and products mentioned may be trademarks or registered trademarks of their respective

More information

Application Notes for Ardence Desktop Edition with Avaya Interaction Center Issue 1.0

Application Notes for Ardence Desktop Edition with Avaya Interaction Center Issue 1.0 . Avaya Solution & Interoperability Test Lab Application Notes for Ardence Desktop Edition with Avaya Interaction Center Issue 1.0 Abstract These Application Notes describe the configuration steps required

More information

User Guide. Version R94. English

User Guide. Version R94. English Patch Management User Guide Version R94 English July 19, 2017 Copyright Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept EULATOS

More information

Dell Edge Device Manager Version R15. Administrator s Guide

Dell Edge Device Manager Version R15. Administrator s Guide Dell Edge Device Manager Version R15 Administrator s Guide Notes, cautions, and warnings NOTE: A NOTE indicates important information that helps you make better use of your product. CAUTION: A CAUTION

More information

KACE Systems Deployment Appliance 5.0. Administrator Guide

KACE Systems Deployment Appliance 5.0. Administrator Guide KACE Systems Deployment Appliance 5.0 Administrator Guide Table of Contents About the KACE Systems Deployment Appliance...10 Getting started... 11 Tasks for getting started using the KACE SDA... 11 About

More information

Kaseya 2. User Guide. Version 7.0. English

Kaseya 2. User Guide. Version 7.0. English Kaseya 2 AntiMalware User Guide Version 7.0 English January 6, 2015 Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept EULATOS as

More information

User Guide. Version R95. English

User Guide. Version R95. English Anti-Malware (Classic) User Guide Version R95 English July 20, 2017 Copyright Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept

More information

DeploymentManager Ver6.1

DeploymentManager Ver6.1 DeploymentManager Ver6.1 Operation Guide -Third Edition- Rev.001 Contents Introduction... 3 Target Audience and Purpose... 3 Document Structure... 3 DeploymentManager Manual Organization... 3 Documentation

More information

ARCSERVE UDP CLOUD DIRECT DISASTER RECOVERY APPLIANCE VMWARE

ARCSERVE UDP CLOUD DIRECT DISASTER RECOVERY APPLIANCE VMWARE ARCSERVE UDP CLOUD DIRECT DISASTER RECOVERY APPLIANCE VMWARE [COMPANY NAME] [Company address] Table of Contents Arcserve UDP Cloud Direct Disaster Recovery Appliance for VMware... 2 Download the Arcserve

More information

Magic Card NET. User s Manual

Magic Card NET. User s Manual Magic Card NET User s Manual Table of Contents Notice Before Installation:... 2 System Requirements... 3 1. First Installation... 4 2. Hardware Setup... 4 3. Express Installation... 6 4. How to setup FDISK...

More information

DeploymentManager Ver6.5

DeploymentManager Ver6.5 DeploymentManager Ver6.5 Tool Reference Guide - Second Edition - Rev.001 Contents Introduction... 4 Target Audience and Purpose... 4 Document Structure... 4 Documentation Guidelines for DeploymentManager

More information

Virtual Appliance User s Guide

Virtual Appliance User s Guide Cast Iron Integration Appliance Virtual Appliance User s Guide Version 4.5 July 2009 Cast Iron Virtual Appliance User s Guide Version 4.5 July 2009 Copyright 2009 Cast Iron Systems. All rights reserved.

More information

ADS/ADX Turnkey User's Guide Code No. LIT Software Release 6.0 Issued June 17, 2013 Supersedes May 10, 2013

ADS/ADX Turnkey User's Guide Code No. LIT Software Release 6.0 Issued June 17, 2013 Supersedes May 10, 2013 Code No. LIT-12011177 Software Release 6.0 Issued June 17, 2013 Supersedes May 10, 2013 Refer to the QuickLIT Web site for the most up-to-date version of this document. Introduction...3 Naming Conventions...3

More information

Create a pfsense router for your private lab network template

Create a pfsense router for your private lab network template Create a pfsense router for your private lab network template Some labs will require a private network where you can deploy services like DHCP. Here are instructions for setting up an uplink router for

More information

3 INSTALLING WINDOWS XP PROFESSIONAL

3 INSTALLING WINDOWS XP PROFESSIONAL INSTALLING WINDOWS XP PROFESSIONAL.1 Preparing for installation Objectives.1.1 Windows XP Professional Hardware Requirements.1.2 Hardware Compatibility List (HCL) check.1. Hard Disk Partition.1.4 Required

More information

Intel Server RAID Controller U2-1 Integration Guide For Microsoft* Windows NT* 4.0

Intel Server RAID Controller U2-1 Integration Guide For Microsoft* Windows NT* 4.0 Intel Server RAID Controller U2-1 Integration Guide For Microsoft* Windows NT* 4.0 Revision 1.0 February 2000 Revision History Revision Revision History Date 1.0 Initial Release 02/10/00 Intel Corporation

More information

Backup Table of Contents:

Backup Table of Contents: Table of Contents: Manage Tickets Configure Ticketing 362 Chapter 10 - Sadjadi et al. Introduction The need for an accurate, easy to use and secure backup and recovery system is well recognized. The success

More information

Understanding UCS Server Configuration Utility User Interface

Understanding UCS Server Configuration Utility User Interface CHAPTER 3 Understanding UCS Server Configuration Utility User Interface The UCS-SCU GUI is a web-based management interface that allows you to perform tasks such as operating system installation, RAID

More information

Active System Manager Version 8.0 User s Guide

Active System Manager Version 8.0 User s Guide Active System Manager Version 8.0 User s Guide Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your product. CAUTION: A CAUTION indicates either

More information

Automating the Windows 2000 Installation

Automating the Windows 2000 Installation Chapter 2 Automating the Windows 2000 Installation MICROSOFT EXAM OBJECTIVES COVERED IN THIS CHAPTER Perform an unattended installation of Windows 2000 Professional. Install Windows 2000 Professional by

More information

EML10 Best Practces for Implementing Deployment Solution Hands-On Lab

EML10 Best Practces for Implementing Deployment Solution Hands-On Lab EML10 Best Practces for Implementing Deployment Solution Hands-On Lab Description This hands-on lab demonstrates the steps necessary to configure and use the latest version of Deployment Solution. You

More information

Getting Started with the Deployment Console and Deploying the Clients Per PXE Network Booting using their MAC address. Quick Guide

Getting Started with the Deployment Console and Deploying the Clients Per PXE Network Booting using their MAC address. Quick Guide Getting Started with the Deployment Console and Deploying the Clients Per PXE Network Booting using their MAC address Quick Guide Deployment Manager 2 Quick Guide 1 Introduction...3 1.1 Installing the

More information

This option lets you reset the password that you use to log in if you do not remember it. To change the password,

This option lets you reset the password that you use to log in if you do not remember it. To change the password, User s Guide Overview IDrive offers the most cost effective BMR functionality with onsite disk image backup for SMBs. Store entire data of hard disks including the operating system (OS) and application

More information

Installation Guide. for 6.5 and all add-on modules

Installation Guide. for 6.5 and all add-on modules Kaseya Server Setup Installation Guide for 6.5 and all add-on modules February 11, 2014 Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept

More information

Kaseya 2. User Guide. Version 6.0

Kaseya 2. User Guide. Version 6.0 Kaseya 2 Kaseya Server Installation User Guide Version 6.0 June 21, 2010 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private Sector IT organizations.

More information

Installation Guide. EventTracker Enterprise. Install Guide Centre Park Drive Publication Date: Aug 03, U.S. Toll Free:

Installation Guide. EventTracker Enterprise. Install Guide Centre Park Drive Publication Date: Aug 03, U.S. Toll Free: EventTracker Enterprise Install Guide 8815 Centre Park Drive Publication Date: Aug 03, 2010 Columbia MD 21045 U.S. Toll Free: 877.333.1433 Abstract The purpose of this document is to help users install

More information

DeploymentManager Ver6.3

DeploymentManager Ver6.3 DeploymentManager Ver6.3 Operation Guide -First Edition- Rev.001 Contents Introduction... 4 Target Audience and Purpose... 4 Document Structure... 4 DeploymentManager Manual Organization... 4 Documentation

More information

Quick Start Guide. Version R95. English

Quick Start Guide. Version R95. English Live Connect, Kaseya Remote Control, Quick View, User Portal Quick Start Guide Version R95 English September 11, 2017 Copyright Agreement The purchase and use of all Software and Services is subject to

More information

Getting Started with ESX Server 3i Installable Update 2 and later for ESX Server 3i version 3.5 Installable and VirtualCenter 2.5

Getting Started with ESX Server 3i Installable Update 2 and later for ESX Server 3i version 3.5 Installable and VirtualCenter 2.5 Getting Started with ESX Server 3i Installable Update 2 and later for ESX Server 3i version 3.5 Installable and VirtualCenter 2.5 Getting Started with ESX Server 3i Installable Revision: 20090313 Item:

More information

Lab Determining Data Storage Capacity

Lab Determining Data Storage Capacity Lab 1.3.2 Determining Data Storage Capacity Objectives Determine the amount of RAM (in MB) installed in a PC. Determine the size of the hard disk drive (in GB) installed in a PC. Determine the used and

More information

Intel Platform Administration Technology Quick Start Guide

Intel Platform Administration Technology Quick Start Guide Intel Platform Administration Technology Quick Start Guide 320014-003US This document explains how to get started with core features of Intel Platform Administration Technology (Intel PAT). After reading

More information

1. Initial Setting and Installation of ActiveVisor... 1

1. Initial Setting and Installation of ActiveVisor... 1 ActiveVisor Startup Guide 1 st Edition August, 2018 Contents 1. Initial Setting and Installation of ActiveVisor... 1 1.1 System Requirements... 1 1.2 Installation of ActiveVisor... 2 1.3 Initial Settings

More information

dctrack Quick Setup Guide (Recommended) Obtain a dctrack Support Website Username and Password

dctrack Quick Setup Guide (Recommended) Obtain a dctrack Support Website Username and Password dctrack 5.0.0 Quick Setup Guide This guide walks you through installing dctrack for the first time. In other words, this is a clean install - it is not an integration of dctrack and Power IQ, and it is

More information

This option lets you reset the password that you use to log in if you do not remember it. To change the password,

This option lets you reset the password that you use to log in if you do not remember it. To change the password, User s Guide Overview IDrive offers the most cost-effective BMR functionality with onsite disk image backup for SMBs. You can store entire data of hard disks including the operating system (OS) and application

More information

Managing the VM Lifecycle

Managing the VM Lifecycle This chapter contains the following sections:, page 1 Managing VM Power, page 2 Resizing a VM, page 3 Resizing a VM Disk, page 4 Managing VM Snapshots, page 5 Managing Other VM Actions, page 7 You can

More information

Parallels Containers for Windows 6.0

Parallels Containers for Windows 6.0 Parallels Containers for Windows 6.0 Deploying Microsoft Clusters June 10, 2014 Copyright 1999-2014 Parallels IP Holdings GmbH and its affiliates. All rights reserved. Parallels IP Holdings GmbH Vordergasse

More information

DeploymentManager Ver6.2

DeploymentManager Ver6.2 DeploymentManager Ver6.2 First Step Guide -First Edition- Rev.001 Contents Introduction... 4 Target Audience and Purpose... 4 Document Structure... 4 DeploymentManager Manual Organization... 4 Documentation

More information

Configuring Virtual Blades

Configuring Virtual Blades CHAPTER 14 This chapter describes how to configure virtual blades, which are computer emulators that reside in a WAE or WAVE device. A virtual blade allows you to allocate WAE system resources for use

More information

Table of Contents. D-Link SharePort Plus... 4 Introduction...4 System Requirements...4 Features...5. Installation... 6

Table of Contents. D-Link SharePort Plus... 4 Introduction...4 System Requirements...4 Features...5. Installation... 6 Table of Contents D-Link SharePort Plus... 4 Introduction...4 System Requirements...4 Features...5 Installation... 6 SharePort Plus Utility... 11 Utility Overview... 11 Device Server View... 12 Utility

More information

ElasterStack 3.2 User Administration Guide - Advanced Zone

ElasterStack 3.2 User Administration Guide - Advanced Zone ElasterStack 3.2 User Administration Guide - Advanced Zone With Advance Zone Configuration TCloud Computing Inc. 6/22/2012 Copyright 2012 by TCloud Computing, Inc. All rights reserved. This document is

More information

Kaseya 2. Quick Start Guide. for VSA 6.3

Kaseya 2. Quick Start Guide. for VSA 6.3 Kaseya 2 LiveConnect, Portal Access and Quick View Quick Start Guide for VSA 6.3 September 24, 2013 Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in

More information

KYOCERA Net Admin User Guide

KYOCERA Net Admin User Guide KYOCERA Net Admin User Guide Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held liable

More information

Reborn Card NET. User s Manual. Ver /01/20

Reborn Card NET. User s Manual. Ver /01/20 Reborn Card NET User s Manual Ver 1.1 2015/01/20 Table of Contents Notice Before Installation:... 2 System Requirements... 2 1. First Installation... 3 2. Hardware Setup... 3 3. Express Installation...

More information

Parallels Virtuozzo Containers 4.6 for Windows

Parallels Virtuozzo Containers 4.6 for Windows Parallels Parallels Virtuozzo Containers 4.6 for Windows Deploying Microsoft Clusters Copyright 1999-2010 Parallels Holdings, Ltd. and its affiliates. All rights reserved. Parallels Holdings, Ltd. c/o

More information

Creating Application Containers

Creating Application Containers This chapter contains the following sections: General Application Container Creation Process, page 1 Creating Application Container Policies, page 2 About Application Container Templates, page 5 Creating

More information

HP Device Manager 4.x User Manual

HP Device Manager 4.x User Manual HP Device Manager 4.x User Manual Copyright 2009 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. Microsoft and Windows are trademarks of

More information

User Guide. Version R94. English

User Guide. Version R94. English Cloud Backup User Guide Version R94 English March 30, 2017 Copyright Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept EULATOS

More information

USB2.0 IDE & LANDISK External Enclosure

USB2.0 IDE & LANDISK External Enclosure USB2.0 IDE & LANDISK External Enclosure CONTENT User s Manual 1. Product Information.....................1 2. Product Specifications....................2 3. System requirements....................3 4.

More information

Configuring and Using AMT on TS130. Lenovo ThinkServer

Configuring and Using AMT on TS130. Lenovo ThinkServer Lenovo ThinkServer August 31, 2011 Contents Overview... 3 Enabling and Configuring AMT on TS130... 3 Provisioning AMT on TS130 Using Manual Configuration Method... 4 AMT Configuration with Web Interface...

More information

Deployment Guide: Routing Mode with No DMZ

Deployment Guide: Routing Mode with No DMZ Deployment Guide: Routing Mode with No DMZ March 15, 2007 Deployment and Task Overview Description Follow the tasks in this guide to deploy the appliance as a router-firewall device on your network with

More information

USER GUIDE. CTERA Agent for Windows. June 2016 Version 5.5

USER GUIDE. CTERA Agent for Windows. June 2016 Version 5.5 USER GUIDE CTERA Agent for Windows June 2016 Version 5.5 Copyright 2009-2016 CTERA Networks Ltd. All rights reserved. No part of this document may be reproduced in any form or by any means without written

More information

KeyNexus Hyper-V Deployment Guide

KeyNexus Hyper-V Deployment Guide v1.0 09/2018 . Copyright Notice Copyright 2018 KeyNexus Inc. All rights reserved. Information in this document is subject to change without notice. The software described in this document is furnished

More information

Comodo One Software Version 3.3

Comodo One Software Version 3.3 rat Comodo One Software Version 3.3 Patch Management Module Administrator Guide Guide Version 2.2.101316 Comodo Security Solutions 1255 Broad Street STE 100 Clifton, NJ 07013 Table of Contents 1 Introduction

More information

DeploymentManager Ver6.1

DeploymentManager Ver6.1 DeploymentManager Ver6.1 First Step Guide -Third Edition- Rev.001 Contents Introduction... 4 Target Audience and Purpose... 4 Document Structure... 4 DeploymentManager Manual Organization... 4 Documentation

More information

LevelOne FNS bay/1usb Soho NAS. User s Manual

LevelOne FNS bay/1usb Soho NAS. User s Manual LevelOne FNS-1000 1- bay/1usb Soho NAS User s Manual Table of Contents Introduction... 2 The FNS-1000 NAS Server... 2 FNS-1000 Features... 2 Package Contents... 2 System Requirements... 2 Disclaimer...

More information

Veritas System Recovery 18 Management Solution Administrator's Guide

Veritas System Recovery 18 Management Solution Administrator's Guide Veritas System Recovery 18 Management Solution Administrator's Guide Documentation version: 18 Legal Notice Copyright 2018 Veritas Technologies LLC. All rights reserved. Veritas and the Veritas Logo are

More information

Creating a 2 node virtual SQL Server 2008 Cluster Configuration Using Windows 2003 MSCS

Creating a 2 node virtual SQL Server 2008 Cluster Configuration Using Windows 2003 MSCS Creating a 2 node virtual SQL Server 2008 Cluster Configuration Using Windows 2003 MSCS Reference No: Date: 10/08/2010 File Name: Creating a 2 node SQL Server 2008 Cluster Configuration using Windows 2003

More information

Installing the Operating System or Hypervisor

Installing the Operating System or Hypervisor If you purchased E-Series Server or NCE Option 1 (E-Series Server or NCE without a preinstalled operating system or hypervisor), you must install an operating system or hypervisor. This chapter includes

More information

User Guide. Version R93. English

User Guide. Version R93. English Anti-Malware User Guide Version R93 English March 17, 2017 Copyright Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept EULATOS

More information

Configuration Manager

Configuration Manager CHAPTER 7 This chapter describes how to perform routine Cisco VXC Manager configuration management tasks using the Administrator Console. It provides information on managing the configuration settings

More information

Monitoring Table of Contents:

Monitoring Table of Contents: Table of Contents: Dashboard Status Edit Agent External SNMP Log 2 Chapter 6 - Sadjadi et al. Introduction Proactive and preventive system maintenance is only possible with accurate and easily accessible

More information

Kaseya 2. Quick Start Guide. for VSA 6.0

Kaseya 2. Quick Start Guide. for VSA 6.0 Kaseya 2 Monitoring Configuration Quick Start Guide for VSA 6.0 August 5, 2010 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private Sector

More information

Installing VMware vsphere 5.1 Components

Installing VMware vsphere 5.1 Components Installing VMware vsphere 5.1 Components Module 14 You Are Here Course Introduction Introduction to Virtualization Creating Virtual Machines VMware vcenter Server Configuring and Managing Virtual Networks

More information

Getting Started with ESX Server 3i Embedded ESX Server 3i version 3.5 Embedded and VirtualCenter 2.5

Getting Started with ESX Server 3i Embedded ESX Server 3i version 3.5 Embedded and VirtualCenter 2.5 Getting Started with ESX Server 3i Embedded ESX Server 3i version 3.5 Embedded and VirtualCenter 2.5 Title: Getting Started with ESX Server 3i Embedded Revision: 20071022 Item: VMW-ENG-Q407-430 You can

More information

Quick Start Guide. Version R94. English

Quick Start Guide. Version R94. English Network Monitor Quick Start Guide Version R94 English December 12, 2016 Copyright Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept

More information

Introduction. How Does it Work with Autodesk Vault? What is Microsoft Data Protection Manager (DPM)? autodesk vault

Introduction. How Does it Work with Autodesk Vault? What is Microsoft Data Protection Manager (DPM)? autodesk vault Introduction What is Microsoft Data Protection Manager (DPM)? The Microsoft Data Protection Manager is a member of the Microsoft System Center family of management products. DPM provides continuous data

More information

Lab - Connect to a Router for the First Time

Lab - Connect to a Router for the First Time Introduction In this lab, you will configure basic settings on a wireless router. Recommended Equipment A computer with Windows installed An Ethernet NIC installed Wireless router Ethernet patch cable

More information

Edge Device Manager Quick Start Guide. Version R15

Edge Device Manager Quick Start Guide. Version R15 Edge Device Manager Quick Start Guide Version R15 Notes, cautions, and warnings NOTE: A NOTE indicates important information that helps you make better use of your product. CAUTION: A CAUTION indicates

More information

Southern Maine Community College Information Technology Professor Howard Burpee. Installing Windows Server 2012

Southern Maine Community College Information Technology Professor Howard Burpee. Installing Windows Server 2012 Southern Maine Community College Information Technology Installing Windows Server 2012 Objectives: Planning an installation for a new LAN Pre installation aspects of Server 2012 How-to install and configure

More information