Updating The Operating System & User Accounts

Size: px
Start display at page:

Download "Updating The Operating System & User Accounts"

Transcription

1 U Updating he perating ystem & User Accounts P

2 PAG YM UPA Update A minor revision to a software product, usually intended to address specific performance issues rather than add new features Upgrade A major revision to a product that might include new features as well as all of the existing patches for the previous version of the product P

3 C PACK A collection of patches and other updates that are tested and packaged as a single unit ervice packs are cumulative: P contains all updates from P and P ervice pack releases are not on a schedule P

4 C PACK LA C-M ntire service pack on C xpress download Analyzes system and downloads only required components etwork download ntire service pack in a single file P

5 UALLG C PACK equires considerable disk space ervice packs can be uninstalled through Add/emove Programs in Control Panel hould be done only if the service pack installation is causing new issues P

6 HFX esigned to address a specific issue ownloadable as a single executable ormally directly associated with a Knowledge Base article P

7 hen hould You Update? P

8 BAL CUY AALYZ P

9 UG UPA P

10 AUMAC UPA Available in indows erver, indows XP (ervice Pack ), indows (ervice Pack ). efault is to automatically download updates and prompt the user to install them. Configured via the Automatic Updates tab in ystem Properties. n indows, it is configured via the Automatic Updates control panel. P

11 nstalling Updates Manual installation LPAMG lipstreaming a service pack lipstreaming hotfixes Chaining Use Qchain.exe to install multiple hotfixes Use /Z switch to prevent restarts. Group Policies software installation capability P

12 GUP PLCY UPA P

13 FA UPA C U Allows software updates to be downloaded once for the entire organization Provides administrative control over what updates are applied to clients educes nternet usage P

14 ALLG U P

15 YCHZG U P

16 APPG UPA P

17 BULG U PLGY Multiple-server topology trict parent/child topology Loose parent/child topology P

18 U MG n the server, information can be viewed through: Monitor erver page ynchronization Log, Approval Log, wutrack.bin file n the client, information can be viewed through: indows Update Log U-generated events are written to ystem log of the vent iewer: ach time a synchronization is performed hen updates are approved P

19 UBLHG U eloading the memory cache estarting the synchronization service estarting P

20 FA LC he nd-user License Agreement (ULA) is a binding contract that gives you the legal right to use a piece of software. n an enterprise environment, managing software licenses is critically important. P

21 P LCG ach server permits a certain number of concurrent connections. nce the limit is reached, connections are refused. Usually only practical in environments with a single server. P

22 P C P U A Client Access License (CAL) is required for each user or device that will connect to the server. CALs are normally obtained in bundles (5,, 5, 5, ). CALs are not a physical object, but an entitlement to connect to a indows network. P

23 LC GUP A license group is a collection of users who share one or more CALs. License groups are created when: A single user uses more than one device, such as a computer. More than one user uses a single device, such as a computer. P

24 LCG L Licensing in Control Panel Manages licensing for a single computer running indows erver Licensing in Administrative ools Centralized control of licensing and license replication in a site-based model P

25 LCG License Logging service assigns and tracks licenses. Licensing information is replicated to a centralized licensing database. Use the Licensing tool in the Administrative ools program group to view and manage licensing for an entire site. P

26 User Accounts P

27 efinitions User - individual granted access to the system Groups - logical collection of users Accounts - Logical construct containing all information that defines a user to the environment esources - All equipment attached to the workstation or network P

28 efinitions Home irectories - dedicated locations on a file server for a specific user to store files Policy - a set of configurations that allows an administrator to restrict a user s access and rights Profile - file containing a user s environmental settings and preferences P

29 Create Copy elete isable ename Account perations P

30 User/Group ame ules he name must be unique to the machine for local accounts (or unique to the domain in the case of domain accounts). he username cannot be the same as a group name he name may be up to characters, upper or lowercase or a combination of both. P

31 User/Group ame ules o avoid confusion with special syntax characters, names may not include any of the following: " / \ [ ] : ; =, + *? < > he name may include spaces and periods, but may not consist entirely of spaces or periods. : ames including spaces have to be enclosed in quotes for both scripting or command-line use. Better to avoid using spaces. P

32 Users ach user must have an account to access a computer running the windows operating system User properties Groups associated with the user Profile path Login script Home directory P

33 Passwords Case sensitive ptional Accounts Complexity rules enforced by default Accounts live in the %systemroot%:\winnt\system\config directory in the AM file or stored in the active directory database P

34 User Account ptions User Must Change Password at ext Logon - Forces a user to change their password the next time they log on and afterward the box will be unchecked. User Cannot Change Password - f checked, prevents the user from changing the account s password. P

35 User Account ptions Password ever xpires - f checked, the user account ignores the password expiration policy, and the password for the account never expires Account s isabled - f checked, the account is disabled and no one can log on to it until it is enabled (it is not, however, removed from the database). P

36 AUHCA Active irectory Authentication Process esources Access oken User identification Group memberships Privileges assigned to user (also named system rights) P

37 U ACCU Local User Accounts tored in the ecurity Accounts Manager (AM) Built-in user accounts (administrator and guest) omain user accounts (.dit) omain local Built-in user accounts are automatically created during the install P

38 AMA Full control of computer, domain or forest depending on the context Used to establish administrative structure and create other accounts hould be renamed hould be secured with a complex password Can be disabled, but cannot be deleted hould not be used for every day user tasks P

39 GU ACCU esigned to allow temporary access to the network isabled by default, but cannot be deleted hould be secured with a complex password if enabled P

40 User Account emonstration P

41 User Profiles P

42 User Profile A profile is a napshot of a user s desktop environmental settings stored in the ntuser.dat file Can exist on single a computer or on the network on a domain controller he profiles are stored in c:\ocuments and ettings directory P

43 Profile ypes Local - stored on the local machine and applies to the local machine oaming - stored on the server and applies to any machine that the user is allowed to logon locally Mandatory - a read only copy of the user s profile with a.man extension. he user can change some settings in indows but cannot save the changes. P

44 Account Policies Use the Local ecurity Policy tool (CPL.MC) to set such as lockout restrictions or auditing, or the Group Policy snap-in (GP.MC). he process is very similar to configuring Group Policy with the Active irectory tools except that, since the machine is not a domain controller, changes will apply to the local policy for the machine. P

45 Account Policies he policies created will be local policies, which will live in the local machine s egistry database. P

46 Account Policy ettings Maximum Password Age - time period until password change is required -999 days or never default = 4 days Minimum Password Age - time period when password change is prevented -999 days or immediately efault = immediately P

47 Account Policy ettings Minimum Password Length -4, or blank efault = Permit blank nforce password History - prevents password reuse -4 history list or none efault = o history P

48 Account Policy ettings Passwords must meet complexity rules efault = disabled tore passwords using reversible encryption efault = disabled Account lockout efault = not defined efault time = minutes P

49 Account Policy ettings Account lockout threshold (Account lockout must be enabled) efault = invalid attempts ange is to 999 eset lockout counter after (Account lockout must be enabled) efault = not defined ange to 99,999 minutes P

50 Audit Policy ettings Account Logon events - tracks account logon, logoff Logon events - network connection bject access - tracks files directories and print access Audit Privilege Use - tracks when user exercises a user right Account management - tracks creation, deletion and management of users and groups P

51 User ights P

52 User ights User rights define what a user can and cannot do on the system P

53 efault User ights Log on locally on a workstation Administrators Account operators Power users Print operators eplicators Backup perators erver operators Guests Users P

54 efault User ights Backup and estore Files and directories Administrators Backup operators erver perators Access this computer from the etwork Administrators veryone Create and manage user and groups Administrators Account perators P

55 efault User ights Change system time Administrators Power users erver perators Force remote shutdown Administrators Power users erver operators Lock and Unlock the server console Administrators erver perators P

56 efault User ights nly Administrators can perform these tasks Format the server s hard disk Load and unload device drivers Assign user rights Manage auditing and security log Manage auditing and security policy Create common program groups Keep a local profile hare and stop sharing directories ncrease the priority of a process P

57 efault User ights ake ownership of objects Administrators hut down the system Administrators Account operators Power users Backup perators erver operators Users P

Introduction to Active Directory

Introduction to Active Directory UT ntroduction to Active irectory 5-1 Topics for this Unit irectory ervices Active irectory Forests omains rganizational Units Groups A features ites Accounts 5-1 irectory ervice A directory service is

More information

C UNIT 4. Active Directory User Accounts

C UNIT 4. Active Directory User Accounts UN 4 Active irectory User Accounts 2005-2010 efinitions User individual granted access to the system with the following User properties Groups associated with the user Profile path Login script Home directory

More information

Administering Windows Server 2003 & Data Backup

Administering Windows Server 2003 & Data Backup U Administering indows erver & ata Backup P oday s opics Manage a indows erver system using MMC Access a remote computer using an MMC console Configure a server to enable emote esktop for Administration

More information

Windows Server 2008 Security

Windows Server 2008 Security UT 11 indows erver ecurity 5-1 hat is Group Policy? A group of policies applied directly to Active irectory bjects Policies can be linked to: ites omains Us Policies are applied by assigning them to the

More information

Windows 7 Users, Groups and Security

Windows 7 Users, Groups and Security U indows Users, Groups and ecurity P P onna arren nstalling opics for this Unit Homegroups, workgroups, and domains reate user and group accounts User Account ontrol panel User authentication and authorization

More information

Managing & Supporting Windows XP

Managing & Supporting Windows XP UI 9 Managing & Supporting Windows X Definitions User - individual granted access to the system roups - logical collection of users Accounts - ogical construct containing all information that defines a

More information

Windows Server 2012 r2

Windows Server 2012 r2 indows erver r P P onna arren 5- onna P. arren ducation A Accounting B lectrical ngineering M Computer cience ork xperience years as Telecommunications etwork ngineer and owner of a small T consulting

More information

C UNIT 7. Using Group Policy

C UNIT 7. Using Group Policy UN 7 Using Group Policy 2005-2010 opics for this Unit Group policy security settings Audit policies in Windows Server 2008 Folder redirection Managing software using Group Policy he software life cycle

More information

File and Print Services

File and Print Services UT 5 File and Print ervices onna arren 5-1 Topics for this Unit File ervers File ystems Physical Hard isks irtual Hard disks istributed File system Printing ervices onna arren 5-1 TF File ystem onna arren

More information

MANAGING LOCAL AUTHENTICATION IN WINDOWS

MANAGING LOCAL AUTHENTICATION IN WINDOWS MANAGING LOCAL AUTHENTICATION IN WINDOWS Credentials Manager Windows OS has a set of tools that help remedy some of the authentication challenges. For example, the Credential Manager in Windows 7 and newer

More information

Networks: Access Management Windows NT Server Class Notes # 10 Administration October 24, 2003

Networks: Access Management Windows NT Server Class Notes # 10 Administration October 24, 2003 Networks: Access Management Windows NT Server Class Notes # 10 Administration October 24, 2003 In Windows NT server, the user manager for domains is the primary administrative tool for managing user accounts,

More information

How To Reset Local Group Policy Objects To Default Settings Windows 7

How To Reset Local Group Policy Objects To Default Settings Windows 7 How To Reset Local Group Policy Objects To Default Settings Windows 7 more information. Group policy unable to apply firewall change on Windows 7 cilent - blocked Try to reset GPO settings to default values

More information

CISNTWK-11. Microsoft Network Server. Chapter 4

CISNTWK-11. Microsoft Network Server. Chapter 4 CISNTWK-11 Microsoft Network Server Chapter 4 User and Group Accounts 1 Usage Notes Throughout these slides, the term Active Directory Domain implies Domains Based on Windows Server 2008 Based on Windows

More information

C UNIT 3. Global Catalog & Flexible Single Master Operations (FSMO)

C UNIT 3. Global Catalog & Flexible Single Master Operations (FSMO) UN 3 Global atalog & Flexible Single Master perations (FSM) PW PW onna Warren 2005-2010 opics for this Unit Functions of the Global atalog Functions of Universal Group Membership aching he Five FSM roles

More information

AIR FORCE ASSOCIATION S CYBERPATRIOT NATIONAL YOUTH CYBER EDUCATION PROGRAM UNIT FIVE. Microsoft Windows Security.

AIR FORCE ASSOCIATION S CYBERPATRIOT NATIONAL YOUTH CYBER EDUCATION PROGRAM UNIT FIVE. Microsoft Windows Security. AIR FORCE ASSOCIATION S CYBERPATRIOT NATIONAL YOUTH CYBER EDUCATION PROGRAM UNIT FIVE Microsoft Windows Security www.uscyberpatriot.org AIR FORCE ASSOCIATION S CYBERPATRIOT NATIONAL YOUTH CYBER EDUCATION

More information

User Guide. Version R94. English

User Guide. Version R94. English AuthAnvil User Guide Version R94 English March 8, 2017 Copyright Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept EULATOS as updated

More information

Copyright

Copyright This video will look at configuring the default password policy in Active Directory. These setting determines setting like how long a user password will be, if the password needs to complex, and how many

More information

User Guide. Version R92. English

User Guide. Version R92. English AuthAnvil User Guide Version R92 English October 9, 2015 Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept EULATOS as updated from

More information

Lesson 3: Identifying Key Characteristics of Workgroups and Domains

Lesson 3: Identifying Key Characteristics of Workgroups and Domains 1-16 Chapter 1 Introduction to Windows XP Professional Lesson 3: Identifying Key Characteristics of Workgroups and Domains Windows XP Professional supports two types of network environments in which users

More information

M C I T P UNIT 9 W I N D O W S. Virtualization S E R V E R. DPW Donna Warren DPW

M C I T P UNIT 9 W I N D O W S. Virtualization S E R V E R. DPW Donna Warren DPW U 9 irtualization onna arren 5-1 opics for this Unit erver virtualization Advantages and disadvantages of virtual servers Features and requirements of Microsoft Hyper- nstall Hyper- Guest operating systems

More information

Windows Server 2003 Network Administration Goals

Windows Server 2003 Network Administration Goals Objectives Differentiate between the different editions of Windows Server 2003 Explain Windows Server 2003 network models and server roles Identify concepts relating to Windows Server 2003 network management

More information

SQL Server Hardening Considerations, on page 1 SQL Server 2014 Security Considerations, on page 3

SQL Server Hardening Considerations, on page 1 SQL Server 2014 Security Considerations, on page 3 Considerations, on page 1 SQL Server 2014 Security Considerations, on page 3 Considerations Top SQL Hardening Considerations Top SQL Hardening considerations: 1. Do not install SQL Server on an Active

More information

Lab Configure Windows Local Security Policy

Lab Configure Windows Local Security Policy Introduction In this lab, you will configure Windows Local Security Policy. Windows Local Security Policy is used to configure a variety of security requirements for stand-alone computers that are not

More information

SERVER HARDENING CHECKLIST

SERVER HARDENING CHECKLIST SERVER HARDENING CHECKLIST WINDOWS 2003 SERVER CHECKLIST This checklist contains server hardening procedures for Windows 2003 Server. The procedures listed in this document are a balance of industry best

More information

Unified CCE Security Compliance for Windows Server 2012 R2

Unified CCE Security Compliance for Windows Server 2012 R2 Unified CCE Security Compliance for Windows Server 2012 R2 This topic contains the security baseline for hardening Windows Server 2012 R2 Servers running Unified CCE. This baseline is essentially a collection

More information

NetWrix Group Policy Change Reporter

NetWrix Group Policy Change Reporter NetWrix Group Policy Change Reporter Version 7 Enterprise Edition Quick Start Guide Contents NetWrix Group Policy Change Reporter Quick Start Guide 1. INTRODUCTION... 3 1.1 KEY FEATURES... 4 1.2 LICENSING...

More information

5 MANAGING USER ACCOUNTS AND GROUPS

5 MANAGING USER ACCOUNTS AND GROUPS MANAGING USER ACCOUNTS AND GROUPS.1 Introduction to user accounts Objectives.2 Types of User Accounts.2.1 Local User Account.2.2 Built-in User Account.2.3 Domain User Account.3 User Profile.3.1 Content

More information

User Databases. ACS Internal Database CHAPTER

User Databases. ACS Internal Database CHAPTER CHAPTER 12 The Cisco Secure Access Control Server Release 4.2, hereafter referred to as ACS, authenticates users against one of several possible databases, including its internal database. You can configure

More information

Privileged Identity App Launcher and Session Recording

Privileged Identity App Launcher and Session Recording Privileged Identity App Launcher and Session Recording 2018 Bomgar Corporation. All rights reserved worldwide. BOMGAR and the BOMGAR logo are trademarks of Bomgar Corporation; other trademarks shown are

More information

ZENworks 2017 Full Disk Encryption Pre-Boot Authentication Reference. December 2016

ZENworks 2017 Full Disk Encryption Pre-Boot Authentication Reference. December 2016 ZENworks 2017 Full Disk Encryption Pre-Boot Authentication Reference December 2016 Legal Notice For information about legal notices, trademarks, disclaimers, warranties, export and other use restrictions,

More information

10ZiG Technology. Thin Desktop Quick Start Guide

10ZiG Technology. Thin Desktop Quick Start Guide 10ZiG Technology Thin Desktop Quick Start Guide 2010 05 20 Introduction This document is intended as a quick start guide for installing Thin Desktop. After reading this document, you will know how to:

More information

BEETLE /mopos Tablet Mobile POS solution

BEETLE /mopos Tablet Mobile POS solution BEETLE /mopos Tablet Mobile POS solution Windows 8.1 Security Advice (July 2015) We would like to know your opinion on this publication. Please send us a copy of this page if you have any constructive

More information

29 March 2017 SECURITY SERVER INSTALLATION GUIDE

29 March 2017 SECURITY SERVER INSTALLATION GUIDE 29 March 2017 SECURITY SERVER INSTALLATION GUIDE Contents 1. Introduction... 2 1.1 Assumptions... 2 1.2 Prerequisites... 2 2. Required setups prior the Security Server Installation... 3 1.1 Create domain

More information

Password policy settings control the complexity and lifetime for passwords. This section discusses each specific password policy setting

Password policy settings control the complexity and lifetime for passwords. This section discusses each specific password policy setting Windows Security Reference This document is a checklist of the security options with reference material (provided by Microsoft) for a Windows server implementation. The options are based on Windows 2003

More information

System Table of Contents:

System Table of Contents: Table of Contents: User Settings Preferences User Security Orgs / Groups / Depts Customize Database Access 2 Chapter 9 - Sadjadi et al. Introduction True automated system administration is only possible

More information

Windows Server 2008 Training

Windows Server 2008 Training Windows Server 2008 Training Day -4 Vijay Bhalerao BCS, MCM, CISA, DCL,MCTS, ISO 27001 LA univijay2001@yahoo.com 1 Day-4 Troubleshooting AD & issues- Solutions Server Security Measures - Installation &

More information

Access Gateway 9.3, Enterprise Edition

Access Gateway 9.3, Enterprise Edition Access Gateway 9.3, Enterprise Edition 2015-05-03 05:23:10 UTC 2015 Citrix Systems, Inc. All rights reserved. Terms of Use Trademarks Privacy Statement Contents Access Gateway 9.3, Enterprise Edition...

More information

SMEC ASSET MANAGEMENT SYSTEM PMS Version 5.5. System Administrator s Guide

SMEC ASSET MANAGEMENT SYSTEM PMS Version 5.5. System Administrator s Guide SMEC ASSET MANAGEMENT SYSTEM PMS Version 5.5 System Administrator s Guide January 2015 PREPARATION, REVIEW AND AUTHORISATION Revision # Date Prepared by Reviewed by Approved for Issue by 1 21-Jan-2015

More information

Computer Networks Lab Lab 3 Managing User and Computer Accounts. Prepared By: Eng.Ola M. Abd El-Latif

Computer Networks Lab Lab 3 Managing User and Computer Accounts. Prepared By: Eng.Ola M. Abd El-Latif Islamic University of Gaza College of Engineering Computer Department Computer Networks Lab Lab 3 Prepared By: Eng.Ola M. Abd El-Latif Mar. /2010 0 :D Objectives Define user and computer account. Describe

More information

NetSupport ServiceDesk Product Manual Version 3.10

NetSupport ServiceDesk Product Manual Version 3.10 NetSupport ServiceDesk Product Manual Version 3.10 Manual COPYRIGHT (C) 2013 NetSupport Ltd. All rights reserved. The Information in this document is subject to change without notice. NetSupport Ltd. reserves

More information

Authentication Manager Self Service Password Request Administrator s Guide

Authentication Manager Self Service Password Request Administrator s Guide Authentication Manager Self Service Password Request 9.0.2 Copyright 2017 One Identity LLC. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described

More information

a. UTRGV owned, leased or managed computers that fall within the regular UTRGV Computer Security Standard

a. UTRGV owned, leased or managed computers that fall within the regular UTRGV Computer Security Standard Kiosk Security Standard 1. Purpose This standard was created to set minimum requirements for generally shared devices that need to be easily accessible for faculty, staff, students, and the general public,

More information

Advanced Security Measures for Clients and Servers

Advanced Security Measures for Clients and Servers Advanced Security Measures for Clients and Servers Wayne Harris MCSE Senior Consultant Certified Security Solutions Importance of Active Directory Security Active Directory creates a more secure network

More information

Sophos Enterprise Console advanced startup guide

Sophos Enterprise Console advanced startup guide Sophos Enterprise Console advanced startup guide For distributed installations Product version: 5.3 Document date: April 2015 Contents 1 About this guide...4 2 Planning installation...5 2.1 Planning the

More information

enicq 5 Installation Guide

enicq 5 Installation Guide Vermont Oxford Network enicq 5 Documentation enicq 5 Installation Guide Release 2.2 Published August 2016 2016 Vermont Oxford Network. All Rights Reserved. enicq 5 Installation Guide Introduction Welcome

More information

FILESIGNER PLUS V7.3.1 USER GUIDE

FILESIGNER PLUS V7.3.1 USER GUIDE FLGR PLU V7.3.1 UR GUD o n t e n t s... 2 1 G G ARD... 1 1.1 nstalling Fileigner Plus... 1 1.2 ystem Requirements... 1 2 A B U FLGR PLU... 2 2.1 About Fileigner Plus... 2 2.2 onfiguration manager... 2

More information

Install Certificate on the Cisco Secure ACS Appliance for PEAP Clients

Install Certificate on the Cisco Secure ACS Appliance for PEAP Clients Install Certificate on the Cisco Secure ACS Appliance for PEAP Clients Document ID: 64067 Contents Introduction Prerequisites Requirements Components Used Conventions Microsoft Certificate Service Installation

More information

LiveNX Upgrade Guide from v5.1.2 to v Windows

LiveNX Upgrade Guide from v5.1.2 to v Windows LIVEACTION, INC. LiveNX Upgrade Guide from v5.1.2 to v5.1.3 - Windows UPGRADE LiveAction, Inc. 3500 Copyright WEST BAYSHORE 2016 LiveAction, ROAD Inc. All rights reserved. LiveAction, LiveNX, LiveUX, the

More information

Sophos Enterprise Console

Sophos Enterprise Console secure network quick startup guide Product Version: 5.5 Contents About this guide... 1 Limitations on the secure network...2 What do I install?...3 What are the key steps?... 4 Download the installers...5

More information

Server based Networking & Security IS375 Group 5 Project. The purpose of this project is to put into practice what we learned in classroom.

Server based Networking & Security IS375 Group 5 Project. The purpose of this project is to put into practice what we learned in classroom. Server based Networking & Security IS375 Group 5 Project The purpose of this project is to put into practice what we learned in classroom. Beatris M., Zim Y., Lawton P., Mike S. 12/13/2011 Document: Steps

More information

Application User Setup

Application User Setup This chapter provides information on managing application user information. About, page 1 Add Application User, page 2 Application User Deletion, page 3 Application User Settings, page 3 Add Administrator

More information

Application User Configuration

Application User Configuration CHAPTER 87 The following topics contain information on managing application user information: Settings, page 87-1 Adding an Administrator User to Cisco Unity or Cisco Unity Connection, page 87-6 Changing

More information

How to Configure Authentication and Access Control (AAA)

How to Configure Authentication and Access Control (AAA) How to Configure Authentication and Access Control (AAA) Overview The Barracuda Web Application Firewall provides features to implement user authentication and access control. You can create a virtual

More information

SolidWorks Enterprise PDM Installation Guide

SolidWorks Enterprise PDM Installation Guide SolidWorks Enterprise PDM Installation Guide Contents Legal Notices...vi 1 SolidWorks Enterprise PDM Installation Guide...7 2 Installation Overview...8 Required Installation Components...8 Optional Installation

More information

Sophos Enterprise Console

Sophos Enterprise Console advanced startup guide Product Version: 5.5 Contents About this guide... 1 Planning installation... 2 Planning the installation of Enterprise Console... 2 Planning database security... 4 Planning the computer

More information

Information Technology Resource Management Council (ITRMC) ENTERPRISE GUIDELINES G950 SECURITY PROCEDURES

Information Technology Resource Management Council (ITRMC) ENTERPRISE GUIDELINES G950 SECURITY PROCEDURES Information Technology Resource Management Council (ITRMC) ENTERPRISE GUIDELINES G950 SECURITY PROCEDURES Category: G950A Server Operating System; Initial Security Requirements CONTENTS: I. Definition

More information

COPYRIGHTED MATERIAL. Contents. Assessment Test

COPYRIGHTED MATERIAL. Contents. Assessment Test Contents Introduction Assessment Test xxvii xxxvii Chapter 1 Installing Windows 7 1 Introducing Windows 7 2 Windows 7 Architecture 5 Preparing to Install Windows 7 6 Windows 7 Starter 7 Windows 7 Home

More information

Configure advanced audit policies

Configure advanced audit policies 7 LESSON Configuring Advanced Audit Policies 70-411 EXAM OBJECTIVE Objective 2.4 Configure advanced audit policies. This objective may include but is not limited to: implement auditing using Group Policy

More information

Sophos Enterprise Console

Sophos Enterprise Console quick startup guide Product Version: 5.5 Contents About this guide... 1 What do I install?...2 What are the key steps?... 3 Download the Enterprise Console installer...4 If you have a Sophos license...

More information

Application Launcher & Session Recording

Application Launcher & Session Recording Installation and Configuration Guide Application Launcher & Session Recording 5.5.3.0 Copyright 2003 2017 Lieberman Software Corporation. All rights reserved. The software contains proprietary information

More information

Online documentation: Novell Documentation Web site. (http://www.novell.com/ documentation/securelogin70/index.html)

Online documentation: Novell Documentation Web site. (http://www.novell.com/ documentation/securelogin70/index.html) Novell SecureLogin 7.0 Readme September 18, 2009 Novell 1 Documentation The following sources provide information about Novell SecureLogin 7.0: Online documentation: Novell Documentation Web site. (http://www.novell.com/

More information

LastPass Enterprise Recommended Policies Guide

LastPass Enterprise Recommended Policies Guide LastPass Enterprise Recommended Policies Guide This document will help guide you through common scenarios and selecting policies to enable on your LastPass Enterprise account. We will not cover all policies

More information

Avaya Event Processor Release 2.2 Operations, Administration, and Maintenance Interface

Avaya Event Processor Release 2.2 Operations, Administration, and Maintenance Interface Avaya Event Processor Release 2.2 Operations, Administration, and Maintenance Interface Document ID: 13-603114 Release 2.2 July 2008 Issue No.1 2008 Avaya Inc. All Rights Reserved. Notice While reasonable

More information

Table of Contents. Table of Figures. 2 Wave Systems Corp. Client User Guide

Table of Contents. Table of Figures. 2 Wave Systems Corp. Client User Guide 2 Wave Systems Corp. Client User Guide Table of Contents Overview... 3 What is the Trusted Drive Manager?... 3 Key Features of Trusted Drive Manager... 3 Getting Started... 4 Required Components... 4 Configure

More information

Symantec ediscovery Platform

Symantec ediscovery Platform Symantec ediscovery Platform Native Viewer (ActiveX) Installation Guide 7.1.5 Symantec ediscovery Platform : Native Viewer (ActiveX) Installation Guide The software described in this book is furnished

More information

Symantec Drive Encryption Evaluation Guide

Symantec Drive Encryption Evaluation Guide Symantec Drive Encryption Evaluation Guide Getting Started Installing Symantec Encryption Management Server is the first product deployment step for any Symantec Encryption evaluation (also known as a

More information

Remote Administration

Remote Administration Windows Remote Desktop, on page 1 pcanywhere, on page VNC, on page 6 Windows Remote Desktop Remote Desktop permits users to remotely execute applications on Windows Server 2012 R2 from a range of devices

More information

DigitalPersona Pro Enterprise

DigitalPersona Pro Enterprise DigitalPersona Pro Enterprise Quick Start Guide Version 5 DATA PROTECTION REMOTE ACCESS SECURE COMMUNICATION STRONG AUTHENTICATION ACCESS RECOVERY SINGLE SIGN-ON DigitalPersona Pro Enterprise DigitalPersona

More information

Microsoft Dynamics AX 2012 Installation Guide

Microsoft Dynamics AX 2012 Installation Guide 2012 Installation Guide Microsoft Corporation Published: November 2012 Note: Some of the information in this guide applies only to Microsoft Dynamics AX 2012 R2 installations, and some information applies

More information

Privacy and Security Features. Kroll Windows

Privacy and Security Features. Kroll Windows Privacy and Security Features Kroll Windows January 2019 Table of Contents Privacy/Security Features in Kroll...2 User Groups...2 User Group Permissions...3 Associating/Disassociating a Pharmacist...4

More information

Integration of Agilent UV-Visible ChemStation with OpenLAB ECM

Integration of Agilent UV-Visible ChemStation with OpenLAB ECM Integration of Agilent UV-Visible ChemStation with OpenLAB ECM Compliance with Introduction in Title 21 of the Code of Federal Regulations includes the US Federal guidelines for storing and protecting

More information

VMware Mirage Web Manager Guide

VMware Mirage Web Manager Guide Mirage 5.3 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of this document,

More information

Copyright

Copyright Active Directory allows multiple password policies to be created in the same domain. This is referred to as fine grained password policy. This video looks at how to use multiple passwords policies applying

More information

COACH Installation Guide

COACH Installation Guide Installation Guide Copyright 2014 Honeywell GmbH All Rights Reserved EN1Z-0909GE51 R0414 EN1Z0909GE51 R0414 COACH COACH 3.00.01 Software License Advisory Trademark Information This document supports software

More information

Asset Management Migration Guide

Asset Management Migration Guide www.novell.com/documentation Asset Management Migration Guide ZENworks 11 Support Pack 2 March 20, 2012 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or

More information

Protected EAP (PEAP) Application Note

Protected EAP (PEAP) Application Note to users of Microsoft Windows 7: Cisco plug-in software modules such as EAP-FAST and PEAP are compatible with Windows 7. You do not need to upgrade these modules when you upgrade to Windows 7. This document

More information

BACKUP APP V7 QUICK START GUIDE FOR SYNOLOGY NAS

BACKUP APP V7 QUICK START GUIDE FOR SYNOLOGY NAS BACKUP APP V7 QUICK START GUIDE FOR SYNOLOGY NAS Revision History Date Descriptions Type of modification 29 Jun 2016 First Draft New 25 Nov 2016 Modified Ch 3 Download Backup App, Ch 3 Install Backup App

More information

MU2b Authentication, Authorization and Accounting Questions Set 2

MU2b Authentication, Authorization and Accounting Questions Set 2 MU2b Authentication, Authorization and Accounting Questions Set 2 1. You enable the audit of successful and failed policy changes. Where can you view entries related to policy change attempts? Lesson 2

More information

End User Setup. About End User Setup

End User Setup. About End User Setup This chapter provides information about managing end user directory information. About, on page 1 End User Deletion, on page 3 End User Settings, on page 4 Create Cisco Unity Connection Voice Mailbox,

More information

ChromQuest 4.2 Chromatography Data System

ChromQuest 4.2 Chromatography Data System ChromQuest 4.2 Chromatography Data System Installation Guide CHROM-97200 Revision A April 2005 2006 Thermo Electron Corporation. All rights reserved. Surveyor is a registered trademark and ChromQuest is

More information

Colligo Console. Administrator Guide

Colligo Console. Administrator Guide Colligo Console Administrator Guide Contents About this guide... 6 Audience... 6 Requirements... 6 Colligo Technical Support... 6 Introduction... 7 Colligo Console Overview... 8 Colligo Console Home Page...

More information

Ekran System v.6.0 Privileged User Accounts and Sessions (PASM)

Ekran System v.6.0 Privileged User Accounts and Sessions (PASM) Ekran System v.6.0 Privileged User Accounts and Sessions (PASM) Table of Contents About... 3 Using Privileged User Accounts... 4 Password Vault Configuration... 5 Defining Domain Administrator Credentials...

More information

FTD MERCURY X2 IMPLEMENTATION GUIDE FOR PA-DSS

FTD MERCURY X2 IMPLEMENTATION GUIDE FOR PA-DSS FTD MERCURY X2 IMPLEMENTATION GUIDE FOR PA-DSS FTD Mercury X2 Implementation Guide for PA-DSS 2010 Florists Transworld Delivery, Inc. All Rights Reserved. Last Updated: March 1, 2010 Last Reviewed: February

More information

Installing Sentry-go Quick Monitors, Sentry-go Plus!, Client Tools & Enterprise Reporting

Installing Sentry-go Quick Monitors, Sentry-go Plus!, Client Tools & Enterprise Reporting Installing Sentry-go Quick Monitors, Sentry-go Plus!, Client Tools & Enterprise Reporting 3Ds (UK) Limited, November, 2013 http://www.sentry-go.com Be Proactive, Not Reactive! This guide gives full details

More information

Novell. NetWare 6. NETWARE LICENSING FREQUENTLY ASKED QUESTIONS

Novell. NetWare 6.   NETWARE LICENSING FREQUENTLY ASKED QUESTIONS Novell NetWare 6 www.novell.com NETWARE LICENSING FREQUENTLY ASKED QUESTIONS Legal Notices Novell, Inc. makes no representations or warranties with respect to the contents or use of this documentation,

More information

VMware vcloud Air SOC 1 Control Matrix

VMware vcloud Air SOC 1 Control Matrix VMware vcloud Air SOC 1 Control Objectives/Activities Matrix VMware vcloud Air goes to great lengths to ensure the security and availability of vcloud Air services. In this effort, we have undergone a

More information

Upgrading Workstations To Maximizer CRM Summer 2013

Upgrading Workstations To Maximizer CRM Summer 2013 This document provides guidance for the update of individual workstation computers to Maximizer CRM Summer 2013 edition. This guide is into sections: 1. update of Maximizer Windows desktop software (and

More information

Specops Password Policy

Specops Password Policy Specops Software. All right reserved. For more information about Specops Password Policy and other Specops products, visit www.specopssoft.com Copyright and Trademarks Specops Password Policy is a trademark

More information

LepideAuditor. Compliance Reports

LepideAuditor. Compliance Reports Compliance Compliance Table of Contents 1. Introduction... 2 2. Purpose of this Document... 2 3. FISMA Compliance... 3 4. GLBA Compliance... 4 5. HIPAA Compliance... 5 6. PCI Compliance... 6 7. SAS Compliance...

More information

DefendX Software Control-Audit for Hitachi Installation Guide

DefendX Software Control-Audit for Hitachi Installation Guide DefendX Software Control-Audit for Hitachi Installation Guide Version 4.1 This guide details the method for the installation and initial configuration of DefendX Software Control-Audit for NAS, Hitachi

More information

Implementing and Troubleshooting Account Lockout

Implementing and Troubleshooting Account Lockout Page 1 of 7 Implementing and Troubleshooting Account Lockout Launched: Aug 31, 2004 Updated: Nov 18, 2004 Section: Articles :: Authentication, Access Control & Encryption Author: Mitch Tulloch Rating:

More information

Extreme Management Center Secure Deployment Guide

Extreme Management Center Secure Deployment Guide Extreme Management Center Secure Deployment Guide 9035094 Published June 2017 Copyright 2017 All rights reserved. Legal Notice Extreme Networks, Inc. reserves the right to make changes in specifications

More information

MOC 6232A: Implementing a Microsoft SQL Server 2008 Database

MOC 6232A: Implementing a Microsoft SQL Server 2008 Database MOC 6232A: Implementing a Microsoft SQL Server 2008 Database Course Number: 6232A Course Length: 5 Days Course Overview This course provides students with the knowledge and skills to implement a Microsoft

More information

Compliance Matrix for 21 CFR Part 11: Electronic Records

Compliance Matrix for 21 CFR Part 11: Electronic Records Compliance Matrix for 21 CFR Part 11: Electronic Records Philip E. Plantz, PhD, Applications Manager David Kremer, Senior Software Engineer Application Note SL-AN-27 Revision B Provided By: Microtrac,

More information

Message Networking 5.2 Administration print guide

Message Networking 5.2 Administration print guide Page 1 of 421 Administration print guide This print guide is a collection of system topics provided in an easy-to-print format for your convenience. Please note that the links shown in this document do

More information

ZENworks 2017 Update 1 Full Disk Encryption Pre-Boot Authentication Reference. July 2017

ZENworks 2017 Update 1 Full Disk Encryption Pre-Boot Authentication Reference. July 2017 ZENworks 2017 Update 1 Full Disk Encryption Pre-Boot Authentication Reference July 2017 Legal Notice For information about legal notices, trademarks, disclaimers, warranties, export and other use restrictions,

More information

Agilent OpenLAB Chromatography Data System

Agilent OpenLAB Chromatography Data System Agilent OpenLAB Chromatography Data System EZChrom Edition EZChrom Elite and ICM Migration Guide Agilent Technologies Notices Agilent Technologies, Inc. 2011 No part of this manual may be reproduced in

More information

Centrify Infrastructure Services

Centrify Infrastructure Services Centrify Infrastructure Services Evaluation Guide for Windows November 2017 (release 2017.2) Centrify Corporation Legal notice This document and the software described in this document are furnished under

More information

Activity 1: Using Windows XP Professional Security Checklist

Activity 1: Using Windows XP Professional Security Checklist Activity 1: Using Windows XP Professional Security Checklist Verify that all Disk partitions are Formatted with NTFS NTFS partitions offer access controls and protections that aren't available with the

More information

KYOCERA Net Admin User Guide

KYOCERA Net Admin User Guide KYOCERA Net Admin User Guide Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held liable

More information