Pearl Database Access User Level Security Administration
|
|
- Marcus McCormick
- 6 years ago
- Views:
Transcription
1 Before You Begin These instructions presume your Pearl Access User Level Security is already set up. There are two standard groups in Access that cannot be deleted, Admins (to which the default user Admin belongs) and Users (to which EVERY user belongs). Remember: Your permissions are the sum of all rights for all groups to which you belong. o o Make permissions by groups, never by individual users. This makes security easier to administer as new users join the workgroup. Also, try to establish security ONLY on tables, because Pearl will automatically prevent forms and reports from opening if they use protected tables. Essential Skill: Know How to Open the User and Group Accounts Dialog Box 1) Access XP/2003: Go to the menu Tools, Security, User and Group Accounts 2) Access 2007: Go to the Database Tools tab of the Ribbon, go to the Users and Permissions command group and select the User and Group Accounts command 3) Access 2010: Go to the File tab of the Ribbon, go to the Users and Permissions command group and select the User and Group Accounts command Page 1 of 9
2 Why Users Get Disconnected from the Workgroup File Pearl users will become disconnected from Pearl.mdw any time they open an Access database and the Pearl.mdw file is not available. Common situations include: Opening and working on an off-line copy of Pearl at home over the weekend Change or reinstall Windows or Office software on the computer How to Reconnect a User to the Workgroup File 1) Press F11 to reveal the Navigation Pane. 2) Scroll down to the Macros 3) Find the macro Pearl WorkgroupAdministrator. Double-click on it. 4) Click Join, then Browse and then navigate to Pearl\System\Pearl.mdw. 5) Select Pearl.mdw and click Open. 6) Click OK. You should get a message that you have successfully joined the workgroup. How to Disconnect a User from the Pearl Workgroup 1) Every user is initially connected to the default System.MDW file. For a user who does not need to be connected to the Pearl security group, use the same process to connect the user back to the System.MDW file. 2) For each user, it will be in their \AppData\Roaming\Microsoft\Access\ folder. For example: C:\Users\administrator.ILARTS\AppData\Roaming\Microsoft\Access\System.MDW. Page 2 of 9
3 How to Clear a User Password CRITICAL: Never clear the user password for Admin. The Admin user must have a non-blank password in order for users connected to the secured workgroup to be prompted to logon. 1) Logon to Pearl as the SecurityManager 2) Open the User and Group Accounts dialog box 3) On the User tab, select the Name of the user from the drop list 4) Click Clear Password, then click OK and close How to Set or Change a User Password: 1) Logon to Pearl as the User (if you have cleared their password, leave the password field blank) 2) Open the User and Group Accounts Dialog Box 3) On the Change Logon Password tab, fill in the Old Password (if cleared, leave blank) 4) Fill in the New Password then enter it again in the Verify box 5) Click OK and close Page 3 of 9
4 How to Print the List of Users and Groups: 1) Open Pearl 2) Go to File Info Users and Permissions User and Group Accounts 3) In the bottom right, click on the "Print Users and Groups" button Page 4 of 9
5 How to Add/Delete Users or Groups: 1. Open Pearl and logon as SecurityManager when prompted for logon. Enter SecurityManager password. Notes: If you don't see the prompt to logon with a user name, proceed to step 2. If you don't know your SecurityManager password, contact Bromelkamp Company. 2. Confirm you are joined to the PEARL.MDW workgroup (instructions below work for Pearl 4.25 and later) Access XP/2003: Press F11 to unhide the Database Window. Then go to the menu Tools, Security, Workgroup Administrator Access 2007/2010: Press F11 to open the Navigation Pane. Then scroll down to Macros and double-click on Pearl WorkgroupAdministrator Note: If you are not connected to the PEARL.MDW file in the System subfolder of your main Pearl folder, click Join, Browse to that location, then OK and click OK again. Access will restart go back to Step Open the User and Group Accounts dialog box. 4. From the Users tab, (User>New) add the names of the each User who will have special security (or each User you want to logon to Pearl with a password). You will need to assign random ID numbers to these users, assign any unique 8-10 digit number (each User must have a different number).tip: use date and time. 5. Once the users have been added, assign them to the group(s) to which they need to belong. By default each user is a part of the group Users. 6. Each User who has been added to User and Group Accounts needs to join the PEARL.MDW workgroup on their workstation if they haven t already (see Note to Step 2). 7. Restart Access and Pearl. Any user attached to the Pearl.MDW is asked to provide a logon and password when they open Access. They will be required to logon each time they enter Access. All others can stay members of the SYSTEM.MDW. They will not be required to enter a logon name. Page 5 of 9
6 How to Set Up Permissions for Objects 1. Open the Pearl Permissions table to edit which rights should be assigned to which groups. 2. Once you're done editing the table, go back to the Navigator, go to Utilities, Prepare Objects for Pearl and choose <prepare permissions>. 3. When the PreparePermissions function has been run, Pearl automatically updates the Pearl Permissions table to reflect the permissions assigned to each group. WARNING: A Pearl Update often edits properties of tables and forms; you will need to logon as SecurityManager in order to have full ability to install the update. WARNING: If you create a new.mdb file and import all the objects from Pearl.mdb, they will not include their previous User and Group permissions. Remember this if you copy objects from one.mdb to another. WARNING: If the database owner is not changed from the default Admin to the Pearl SecurityManager, the database may be vulnerable to access from unauthorized persons. For assistance changing the database owner, contact Bromelkamp Company. By default, Pearl assigns the following rights: Note: As you see in the example below, wildcards such as *,?, and # are available: * matches any number or characters # matches any single numeric character? matches any single alphabetic character Group Name Object Name Object Type Read Data Update Data Insert Data Delete Data Modify Design Explanation Users Query * Pearl added this, you can only change ModifyDesign. (To restrict data, put restrictions on tables not queries.) Users Query <new> Pearl added this, you can only change ModifyDesign. (To restrict data, put restrictions on tables not queries.) Users Query Qry* Pearl added this, you can change it. (To restrict data, put restrictions on tables not queries.) Users Report <new> Pearl added this, you can change it Users Table Pearl Settings Pearl always protects this object this way. Changes made here will be ignored. Page 6 of 9
7 Translation of table: Anyone belonging to the Users groups has the following permissions when in Pearl: o ALL (*) existing queries except those with names that start qry all rights (read, change, add, delete, modify design) o New (<new>) queries that are created in the session - all rights (read, change, add, delete, modify design) o Existing queries with names that start qry (qry*) read, change, add, delete but NOT modify design o New (<new>) reports that are created in the session read and modify design rights (the other rights are not relevant to reports). o The table called Pearl Settings read, change, add, delete but NOT modify design You may have noticed that read design (which is a permission option in Access) is not a column in the table Pearl Permissions. That s because our assumption is there s no reason to NOT give anyone read design permission. Also, the permission administer is not a column, because our assumption is that NO ONE except SecurityManager should have administer rights. For any object (table, query, form, report) or any group not mentioned in the Pearl Settings table, ReadData only rights are assigned. For example, in the default Pearl Permissions setup, the Users group will only be able to read the data in Clist, Contacts, Grants Management, etc. If you have a Grants group set up, they will have read-only rights to these same objects until/unless you add more rights for the group. In a standard Pearl Permissions set up, the most restricted group is the Users group. In this setup, anyone can read data, but you d only assign change, add, delete rights to other groups. Individuals who will have these most restricted rights do not have to join the Pearl.mdw. Access design specifies that anyone going into a secured database that is not part of the assigned MDW file, will belong to two standard groups Admins and Users. That means these users will have the standard USERS group rights as assigned in Pearl. (The Admins group which isn t normally mentioned in the Pearl Permissions table will be set to read-only rights.) Again, the default for any object is read-only, so if everyone SHOULD be able to change reports, queries, etc., give the Users group those rights in this table (EVERY user is a member of Users group). If ANY user needs to be ruled out of even seeing data (read data permission), then you have to reduce both the Users group and add and reduce the Admins group permissions to remove read data permission. Then add back rights to another group for those who can see the data. Normally you will set the Admins groups rights to be the same as the Users group rights. Page 7 of 9
8 Following is an example of a Pearl Permissions table that does not let the Users or Admins groups read data from the accounting tables (LedgerXX and General Journal including associated subtables notice the use of the * and # wildcard characters). Nor can these groups run existing reports or create new ones. GroupNam ObjectTyp ObjectName ReadD UpdateDat InsertDat DeleteDat ModifyDesig Explanation admins report * admins report <new> Admins admins table table General *Ledger##* Add to restrict Users query * Pearl added this, Users query <new> Pearl added this, Users query qry* Pearl added this, Users report * Users report <new> Pearl added this, *General Grants table *Ledger##* Users table Pearl Settings Pearl always protects this object When you re restricting the Users group rights, remember this group MUST have at least read-only this rights way. Changes to the Pearl License table and read, change, add and delete rights to the Pearl Settings table in order for made them here to open will be Pearl at all. ignored. Page 8 of 9
9 Following is a typical Pearl Permissions table, including several groups with varying rights. GroupName ObjectType ObjectName ReadData Up Inser DeleteDat ModifyDesign Explanation Contacts table CLIST Contacts table CONTACTS Donors table Donor Donors table General Journal Donors table Gifts Donors table Subtable general journal* Donors table Subtable Gifts* Grants table General Journal Grants table Requests grants table Subtable General Journal* Grants table Subtable Requests* Posting table Budget## Posting table General Journal Posting table Ledger## Posting table Subtable General Journal* Posting table Subtable* Payments Users query * Pearl added Users query <new> this, Pearl you added can Users query qry* only this, Pearl you change added can Users report <new> ModifyDesig change this, Pearl you added it. can Users table *Chronicle* n. New change this, (To you Tables it. can Users table Pearl Settings restrict get (To change Pearl the restrict always it. same data, protects put rights this In this case, anyone who is a part of either the Grants, Donor or Posting Group should also be part of the as restrictions object new this Contacts group and all should be part of the Users group. queries. on way. tables not Changes By default, the Users group has read rights to all tables. They ve been given change, add and delete rights queries.) made to any here Chronicle table. will be ignored. The Contacts group has been given the additional rights to add, change and delete data in the Contacts and Clist tables. The Donors group has been given permissions to add, change and delete data in the Donor table, the Gifts table and any Gifts subtable. They ve also been given insert rights to the General Journal and Subtable General Journal* tables. This is required if the fiscal transfer is being used. They are automatically given Read rights to the General Journal tables as well. The Grants group has been given permissions to add, change and delete data in the Requests table and any Requests subtable. They ve also been given insert rights to the General Journal and Subtable General Journal* tables. This is required if the fiscal transfer is being used. They are automatically given Read rights to the General Journal tables as well. The Posting Group has been given the rights to the Budget tables, the General Journal tables and to the Ledger tables. Additionally they ve been given rights to any Payment subtables. This is required if the fiscal transfer is being used. Page 9 of 9
USING PEARL WITH THE WINDOWS VISTA OR WINDOWS 7 OPERATING SYSTEM
USING PEARL WITH THE WINDOWS VISTA OR WINDOWS 7 OPERATING SYSTEM Summary: All changes must be made by an Administrative user. Before opening Pearl for the first time, you must change the Owner and set
More informationR9.7 erwin License Server:
R9.7 erwin License Server: Installation and Setup This is a quick guide to setting-up a erwin DM License Server. NOTES: - Concurrent licensing is available for only erwin r8.2 and later releases! - Concurrent
More informationPST for Outlook Admin Guide
PST for Outlook 2013 Admin Guide Document Revision Date: Sept. 25, 2015 PST Admin for Outlook 2013 1 Populating Your Exchange Mailbox/Importing and Exporting.PST Files Use this guide to import data (Emails,
More informationQuickBooks 2006 Network Installation Guide
QuickBooks 2006 Network Installation Guide Intuit 2/28/06 QuickBooks 2006 has a new way of managing company data that may require some changes in the way you install and configure the software for network
More informationAll About Mapped Drives
All About Mapped Drives All About Mapped Drives Intro to Mapped Hard Drives Mapped drives can be very useful when it comes to moving data around on an office or home network and they do have their usefulness.
More informationThis is a GENERAL Servant Keeper Network Installation help sheet. If you need further assistance, please contact your network administrator.
SK Help Network Help Sheets - Workstation Installation This is a GENERAL Servant Keeper Network Installation help sheet. If you need further assistance, please contact your network administrator. Due to
More informationSage Installation and Administration Guide. May 2018
Sage 300 2019 Installation and Administration Guide May 2018 This is a publication of Sage Software, Inc. 2018 The Sage Group plc or its licensors. All rights reserved. Sage, Sage logos, and Sage product
More informationCraig Pelkie Bits & Bytes Programming, Inc.
Craig Pelkie Bits & Bytes Programming, Inc. craig@web400.com Configure iseries NetServer and work with Folders in the IFS Edition NETSERVER_20020219 Published by Bits & Bytes Programming, Inc. Valley Center,
More informationNetworks: Access Management Windows NT Server Class Notes # 10 Administration October 24, 2003
Networks: Access Management Windows NT Server Class Notes # 10 Administration October 24, 2003 In Windows NT server, the user manager for domains is the primary administrative tool for managing user accounts,
More informationIntroduction. Opening and Closing Databases. Access 2010 Managing Databases and Objects. Video: Working with Databases in Access 2010
Access 2010 Managing Databases and Objects Introduction Page 1 Each Access database consists of multiple objects that let you interact with data. Databases can include forms for entering data, queries
More informationMS Word MS Outlook Mailbox Maintenance
MS Word 2007 MS Outlook 2013 Mailbox Maintenance INTRODUCTION... 1 Understanding the MS Outlook Mailbox... 1 BASIC MAILBOX MAINTENANCE... 1 Mailbox Cleanup... 1 Check Your Mailbox Size... 1 The Quota
More informationQuickBooks 2008 Software Installation Guide
12/11/07; Ver. APD-1.2 Welcome This guide is designed to support users installing QuickBooks: Pro or Premier 2008 financial accounting software, especially in a networked environment. The guide also covers
More informationLab - Share Resources in Windows
Introduction In this lab, you will create and share a folder, set permissions for the shares, create a Homegroup and a Workgroup to share resources, and map a network drive. Due to Windows Vista lack of
More informationINSTALLATION AND USER S GUIDE OfficeCalendar for Microsoft Outlook
INSTALLATION AND USER S GUIDE OfficeCalendar for Microsoft Outlook Sharing Microsoft Outlook Calendar and Contacts without Exchange Server Contents What is OfficeCalendar? Sharing Microsoft Outlook Calendars
More informationAbila MIP DrillPoint Reports. Installation Guide
Abila MIP DrillPoint Reports This is a publication of Abila, Inc. Version 16.1 2015 Abila, Inc. and its affiliated entities. All rights reserved. Abila, the Abila logos, and the Abila product and service
More informationPrint Manager Plus 2010 Workgroup Print Tracking and Control
INTRODUCTION: This is intended to assist in the initial installation or evaluation of Print Manager Plus 2010 Workgroup Edition. This will guide you through tracking your printing whether your workgroup
More informationRWT Network System Installation Guide
RWT Network System Installation Guide Copyright 2003, Talking Fingers, Inc. Page 1 of 48 This document is Copyright 2003 by Talking Fingers, Inc. All rights are reserved. This document may not be copied
More informationAbila MIP. Human Resource Management Installation Guide
Human Resource Management Installation Guide This is a publication of Abila, Inc. Version 2017.2 2017 Abila, Inc. and its affiliated entities. All rights reserved. Abila, the Abila logos, and the Abila
More informationUser Group Configuration
CHAPTER 90 The role and user group menu options in the Cisco Unified Communications Manager Administration User Management menu allow users with full access to configure different levels of access for
More informationUSE WINDOWS FILE HISTORY TO BACK UP YOUR DATA
USE WINDOWS FILE HISTORY TO BACK UP YOUR DATA File History is Windows 10 s main backup tool, originally introduced in Windows 8. Despite the name, File History isn t just a way to restore previous versions
More informationDealing with Event Viewer
Dealing with Event Viewer Event Viewer is a troubleshooting tool in Microsoft Windows 2000.This how-to article will describe how to use Event Viewer. Event Viewer displays detailed information about system
More informationCan Delete Shared Folder Windows 7 In User. Password >>>CLICK HERE<<<
Can Delete Shared Folder Windows 7 In User Password Later versions of Windows (Vista, 7, 8 and 8.1) have the Security tab visible at In Windows XP Home Edition, you can still make your own user profile
More informationINSTALLATION AND USER S GUIDE OfficeCalendar for Microsoft Outlook
INSTALLATION AND USER S GUIDE OfficeCalendar for Microsoft Outlook Sharing Microsoft Outlook Calendar and Contacts without Exchange Server 1 Table of Contents What is OfficeCalendar? Sharing Microsoft
More informationAccessing Personnel Info & Payslips
Accessing Personnel Info & Payslips Agresso web services Contents 1. Logging In... 1 2. Viewing Personnel Information... 3 3. Viewing Payslips... 4 4. Printing Payslips... 6 1. Logging In 1. In the Internet
More informationBasic Query for Human Resources
Basic Query for Human Resources Open browser Log into PeopleSoft Human Resources: Go to: https://cubshr9.clemson.edu/psp/hpprd/?cmd=login Enter your Novell ID and Password Click Sign In Navigation into
More informationDatabase Sharing of the Smartcard Lock System With Two Computers (no router)
Database Sharing of the Smartcard Lock System With Two Computers (no router) If you have multiple computers that are using a Property Management System these configurations may affect those settings. Have
More informationChancellor s Office Information Technology Services Corporate Information Management FIRMS Budget Review Hyperion Process
Step Open Internet Explorer and type in the following URL: http://peterson.calstate.edu:8080/hyperion/browse/login The Hyperion Login screen will display. Enter your User Id and Password > click on the
More informationNew Finance Officer & Staff Training
New Finance Officer & Staff Training Overview MUNIS includes many programs and tools to allow for the management of the District financials. As newer finance officers and staff, you are charged with understanding,
More informationINTRODUCTION ACCESS 2010
INTRODUCTION ACCESS 2010 Overview of Ms. Access 2010 Microsoft Access is a computer application used to create and manage databases. Access Databases can store any type of information: numbers, text, and
More informationSage Pastel Accounting
Sage Pastel Accounting Status 94 Pervasive Error Code 94 Status 94 also known as Pervasive Error Code 94 is a permissions error and usually caused by incorrectly configured or blocked settings on either
More informationSan Jacinto College. Secure SSL VPN Instruction Manual. Contents
1 San Jacinto College Secure SSL VPN Instruction Manual The new Secure SSL VPN provides a more secure and convenient method of accessing San Jacinto College resources remotely. This document provides an
More informationChapter 6: Connecting Windows Workstations
Chapter 6: Connecting Windows Workstations 153 Chapter 6 Connecting Windows Workstations Because this is a book about using Linux on a Microsoft Windows-based network, this chapter shows you how to connect
More informationLab 11-1 Lab User Profiles and Tracking
In the following lab instructions, you will be setting up groups, users, and passwords to require password-protected login to Kofax Capture modules. Rights will be assigned to the groups and users that
More informationhttps://support.office.com/en-us/article/create-a-list-in-sharepoint-0d d95f-41eb-addd- 5e6eff41b083
Site Owners Guide Table of Contents Site Owners Guide... 1 Create a list in SharePoint Server 2016... 2 Add a list to a page in SharePoint Server 2016... 3 Minimize or restore a list or library on a SharePoint
More informationINSTALLATION GUIDE Spring 2017
INSTALLATION GUIDE Spring 2017 Copyright and Disclaimer This document, as well as the software described in it, is furnished under license of the Instant Technologies Software Evaluation Agreement and
More informationIBM i Version 7.2. Connecting to your system Connecting to Your system with IBM Navigator for i IBM
IBM i Version 7.2 Connecting to your system Connecting to Your system with IBM Navigator for i IBM IBM i Version 7.2 Connecting to your system Connecting to Your system with IBM Navigator for i IBM Note
More informationLab - Remote Assistance in Windows
Lab - Remote Assistance in Windows Introduction In this lab, you will remotely connect to a computer, examine device drivers, and provide remote assistance. Recommended Equipment Two Windows 7, Windows
More informationRemote Process Explorer
Remote Process Explorer Getting Started LizardSystems 2 Table of Contents Introduction 5 Installing Remote Process Explorer 5 Before starting the application 5 Starting the application 6 Main window 7
More informationResource Account Instructions. Contents
Resource Account Instructions Instructions for Managing a Resource Account in Exchange 2010 As the owner of an e-mail resource, you have full rights and send as permission for this mailbox. You can access
More information8 MANAGING SHARED FOLDERS & DATA
MANAGING SHARED FOLDERS & DATA STORAGE.1 Introduction to Windows XP File Structure.1.1 File.1.2 Folder.1.3 Drives.2 Windows XP files and folders Sharing.2.1 Simple File Sharing.2.2 Levels of access to
More informationInstallation Guide Version May 2017
Installation Guide Version 2017 5 May 2017 GeoCue Group, Inc 9668 Madison Blvd. Suite 202 Madison, AL 35758 1-256-461-8289 www.geocue.com NOTICES The material in GeoCue Group, Inc. documents is protected
More informationSharePoint Online for Site Administrators
SharePoint Online for Site Administrators Contents SharePoint Online for Site Administrators... 1 Access Your Office 365 SharePoint Website... 2 Make a New Subsite... 4 Permissions... 5 Edit the members
More informationThe University of New Orleans PeopleSoft 9.0: Working with the List Page for Reports
2010 The University of New Orleans PeopleSoft 9.0: Working with the List Page for Reports Training Group List Page The list page shows reports that have been processed and not purged. The list page allows
More informationSetting Access Controls on Files, Folders, Shares, and Other System Objects in Windows 2000
Setting Access Controls on Files, Folders, Shares, and Other System Objects in Windows 2000 Define and set DAC policy (define group membership, set default DAC attributes, set DAC on files systems) Modify
More informationOBIEE. Oracle Business Intelligence Enterprise Edition. Rensselaer Business Intelligence Finance Author Training
OBIEE Oracle Business Intelligence Enterprise Edition Rensselaer Business Intelligence Finance Author Training TABLE OF CONTENTS INTRODUCTION... 1 USER INTERFACE... 1 HOW TO LAUNCH OBIEE... 1 TERMINOLOGY...
More informationSetting up FT3000 and version on Windows 7. This is a step by step guide for setting up the FT3000 on a new Windows 7 or 8 PC
Setting up FT3000 and version 3.0.1 on Windows 7 This is a step by step guide for setting up the FT3000 on a new Windows 7 or 8 PC PROBLEM: Computer being updated from XP to WIN 7 or 8. New PC does not
More informationOutlook tips for road warriors
Outlook 2000/2002: Tips for road warriors You use Outlook to send and receive e-mail and access your calendar and contacts when you re at the office, but what about when you re on the road? Don t worry
More informationHow to Archive s: Windows PC
To archive email items on a Windows computer you will need to create a Personal Folder file (PST) that is saved on your local hard drive. To avoid potential data loss, do not save the PST file in your
More informationBDM Hyperion Workspace Basics
BDM Hyperion Workspace Basics Contents of this Guide - Toolbars & Buttons Workspace User Interface 1 Standard Toolbar 3 Explore Toolbar 3 File extensions and icons 4 Folders 4 Browsing Folders 4 Root folder
More informationLab - Configure Users and Groups in Windows
Lab - Configure Users and Groups in Windows Introduction In this lab, you will create users and groups and delete users using the Local Users and Groups Manager. You will also assign group and user permission
More informationIFS Data Migration Excel Add-In
IFS Data Migration Excel Add-In User Manual for IFS Data Migration Excel Add-In Contents Figures... 2 1 IFS Data Migration Excel Add-In... 2 1.1 Overview... 3 2 User Interface... 3 2.1 Ribbon... 3 2.2
More informationTrimble Building Data plugin for Autodesk Fabrication CADmep and Fabrication ESTmep. Setup Instructions
Trimble Building Data plugin for Autodesk Fabrication CADmep and Fabrication ESTmep Setup Instructions *Note: Prior to starting, click on the link below and browse to the appropriate BD Fabrication installer
More informationClient Configuration Guide
Email Client Configuration Guide Contents Prerequisites... 1 Microsoft Outlook 2007... 2 Microsoft Outlook 2002/XP and 2003... 7 Microsoft Windows Mail (available with Vista only)... 11 Microsoft Outlook
More informationSmartLock Pro Plus Photo View OPERATOR GUIDE
SmartLock Pro Plus Photo View OPERATOR GUIDE February 2018 Cutting edge simplicity Page 2 of 25 Table of Contents Sharing the Pro Plus Data Folder... 6 Mapping A Network Drive... 12 Installing the Photo
More informationINSTALLATION AND USER S GUIDE OfficeCalendar for Microsoft Outlook
INSTALLATION AND USER S GUIDE OfficeCalendar for Microsoft Outlook Sharing Microsoft Outlook Calendar and Contacts without Exchange Server Table of Contents What is OfficeCalendar? Sharing Microsoft Outlook
More informationCourse CLD211.5x Microsoft SharePoint 2016: Search and Content Management
Course CLD211.5x Microsoft SharePoint 2016: Search and Content Management Module 1 Lab - Configure Enterprise Search Introduction This document contains the detailed, step-by-step lab instructions for
More informationHow to work a workbook
CHAPTER 7 How to work a workbook Managing multiple workbooks...173 Opening multiple windows for the same workbook....178 Hiding and protecting workbooks...182 In early versions of Microsoft Excel, worksheets,
More informationPastel Evolution BIC Web Reporting User Guide
Pastel Evolution BIC Web Reporting User Guide Prerequisites: Pastel Evolution Business Intelligence Centre.NET Framework 3.5 Internet Information Services (version 6 and upwards) Microsoft Excel 2003 /
More information8.0 Help for Community Managers About Jive for Google Docs...4. System Requirements & Best Practices... 5
for Google Docs Contents 2 Contents 8.0 Help for Community Managers... 3 About Jive for Google Docs...4 System Requirements & Best Practices... 5 Administering Jive for Google Docs... 6 Understanding Permissions...6
More informationCIFS Permissions Best Practices Nasuni Corporation Boston, MA
Nasuni Corporation Boston, MA Overview You use permissions to control user access to data. There are two basic considerations when using permissions to control user access to data: Which users have access
More informationWIFI MEDIA PLAYER QUICK SETUP GUIDE
WIFI MEDIA PLAYER QUICK SETUP GUIDE CONNECTING MEDIA PLAYER TO WIRELESS NETWORK: (*11n Wireless router is highly recommended) Connect the Media Player to TV with supplied A/V or HDMI (Not Supplied) cable.
More informationUser Guide. BlackBerry Workspaces for Windows. Version 5.5
User Guide BlackBerry Workspaces for Windows Version 5.5 Published: 2017-03-30 SWD-20170330110027321 Contents Introducing BlackBerry Workspaces for Windows... 6 Getting Started... 7 Setting up and installing
More informationMicrosoft Access 2013
Microsoft Access 2013 Chapter 1 Databases and Database Objects: An Introduction Objectives Describe the features of the Access window Create a database Create tables in Datasheet and Design views Add records
More informationNetwork DK2 DESkey Installation Guide
VenturiOne Getting Started Network DK2 DESkey Installation Guide PD-061.2.306 DESkey Network Server Manual Rev A Applied Cytometry CONTENTS 1 DK2 Network Server Overview... 2 2 DK2 Network Server Installation...
More informationConfiguring the WebDAV Folder for Adding Multiple Files to the Content Collection and Editing Them
Configuring the WebDAV Folder for Adding Multiple Files to the Content Collection and Editing Them The Content Collection should be the repository for all of the files used in Blackboard. The Content Collection
More informationClient Installation and User's Guide
IBM Tivoli Storage Manager FastBack for Workstations Version 7.1.1 Client Installation and User's Guide SC27-2809-04 IBM Tivoli Storage Manager FastBack for Workstations Version 7.1.1 Client Installation
More informationWhite Paper. Project-Specific Tool Palettes. Introduction. Procedures. AutoCAD P&ID Add New Tool Palettes and Populate them with Tools
White Paper Project-Specific Tool Palettes AutoCAD P&ID 2009 Introduction Audience: Administrators responsible for setting up project-specific tool palettes An engineering company can be working on a single
More informationBusiness Insights Dashboard
Business Insights Dashboard Sage 500 ERP 2000-2013 Sage Software, Inc. All rights reserved. Sage, the Sage logos, and the Sage product and service names mentioned herein are registered trademarks or trademarks
More informationRecent Operating System Class notes 04 Managing Users on Windows XP March 22, 2004
Recent Operating System Class notes 04 Managing Users on Windows XP March 22, 2004 You log into a system to notify the system who you are. When you log off, any files you have opened are cleaned up, and
More informationInstalling CHART To simplify the process, we have included the software with this guide.
Setting up CHART This procedure provides a step by step guide to installing and updating the Primis CHART tool which is used for the Diabetes Deep Dive project. Prerequisites 1. Local admin account for
More informationWorking with Database & Objects
Working with Database & Objects Working with Database & Objects Introduction Each Access database consists of multiple objects that let you interact with data. Databases can include forms for entering
More informationMetastorm BPM Release 7.6
Metastorm BPM Release 7.6 Administration Guide May 2008 Metastorm Inc. email: inquiries@metastorm.com http://www.metastorm.com Metastorm BPM Release 7.6 Copyrights and Trademarks 1996-2008 Metastorm Inc.
More informationHow to Upgrade Your Site to the New User Interface
How to Upgrade Your Site to the New User Interface Site Administrators can preview their existing site in the new user interface. We recommend that you do this first to make sure that all of the elements
More information8.0 Help for End Users About Jive for Google Docs...4. System Requirements & Best Practices Using Jive for Google Docs...
for Google Docs Contents 2 Contents 8.0 Help for End Users... 3 About Jive for Google Docs...4 System Requirements & Best Practices... 5 Using Jive for Google Docs... 6 Do I Have Jive for Google Docs?...6
More informationApplied ICT Skills MS Windows
Applied ICT Skills MS Windows Lesson 1 - How to install an operating system into computer? Windows 7 is perhaps the best Microsoft operating system and is very easy to install compared to other windows.
More informationPassword Reset Utility. Configuration
Password Reset Utility Configuration 1 Table of Contents 1. Uninstalling Legacy Password Reset... 2 2. Password Reset Utility: How to deploy and configure via Group Policy... 2 3. Configuring Group Policy
More informationAn Integrated Solution for Nonprofits
An Integrated Solution for Nonprofits 100411 2011 Blackbaud, Inc. This publication, or any part thereof, may not be reproduced or transmitted in any form or by any means, electronic, or mechanical, including
More informationInstallation and Configuration Guide
Installation and Configuration Guide 2013 DataNet Quality Systems. All rights reserved. Printed in U.S.A. WinSPC and QualTrend are registered trademarks of DataNet Quality Systems. All other trademarks
More informationBasic Query for Financials
Basic Query for Financials Open browser Log into PeopleSoft Financials: Go to: https://cubsfs.clemson.edu/psp/fpprd/?cmd=login Enter your Novell ID and Password Click Sign In Navigation into Query Tools:
More informationVersion 6.0. User and Reference Manual
Version 6.0 User and Reference Manual FundVision 6.0 All rights reserved. No parts of this work may be reproduced in any form or by any means - graphic, electronic, or mechanical, including photocopying,
More informationWeb Console Setup & User Guide. Version 7.1
Web Console Setup & User Guide Version 7.1 1 Contents Page Number Chapter 1 - Installation and Access 3 Server Setup Client Setup Windows Client Setup Mac Client Setup Linux Client Setup Interoperation
More information9.0 Help for Community Managers About Jive for Google Docs...4. System Requirements & Best Practices... 5
for Google Docs Contents 2 Contents 9.0 Help for Community Managers... 3 About Jive for Google Docs...4 System Requirements & Best Practices... 5 Administering Jive for Google Docs... 6 Quick Start...6
More informationTutorial 1. Creating a Database
Tutorial 1 Creating a Database Microsoft Access 2010 Objectives Learn basic database concepts and terms Explore the Microsoft Access window and Backstage view Create a blank database Create and save a
More informationScheduling Module Client Booking Quick Guide Online-Scheduling
Scheduling Module Last Updated: November 26, 2009 System Administration Contact: Colin Bryant Phone: 604-822-7374 E-mail: PsychIT@exchange.ubc.ca Logon to Book King Enter the following URL into your address
More informationDiscovering Computers & Microsoft Office Office 2010 and Windows 7: Essential Concepts and Skills
Discovering Computers & Microsoft Office 2010 Office 2010 and Windows 7: Essential Concepts and Skills Objectives Perform basic mouse operations Start Windows and log on to the computer Identify the objects
More informationSend the Ctrl-Alt-Delete key sequence to the Guest OS one of two ways: Key sequence: Ctlr-Alt-Ins Menu Sequence: VM / Guest / Send Ctrl-Alt-Delete
CIS 231 Windows 2008 Server Install Lab #1 (Virtual Machines) Keys to Remember when using the vsphere client. Send the Ctrl-Alt-Delete key sequence to the Guest OS one of two ways: Key sequence: Ctlr-Alt-Ins
More informationSage Installation and Administration Guide
Sage 300 2016 Installation and Administration Guide This is a publication of Sage Software, Inc. Copyright 2015. Sage Software, Inc. All rights reserved. Sage, the Sage logos, and the Sage product and
More informationInstallation and Configuration Guide
Installation and Configuration Guide Copyright 2009 DataNet Quality Systems. All rights reserved. Printed in U.S.A. WinSPC and QualTrend are registered trademarks of DataNet Quality Systems. All other
More informationWindows NT Server Printer Driver Upgrade Instructions
Windows NT Server Printer Driver Upgrade Instructions The steps detailed below describe the most reliable method to upgrade printer driver versions after v1.6.0227a on a Windows NT 4.0 Server that is shared
More informationThe Quick Access Toolbar can be either just below the Title Bar or, as in this case, just above the ruler.
Table of Contents Ribbon... 3 Customizing the Ribbon and Quick Access Toolbars... 3 File Tab... 5 Print and Print Preview... 7 Working in Protected Mode... 8 Accessibility Checker... 9 Compatibility Changes
More informationFile systems security: Shared folders & NTFS permissions, EFS Disk Quotas
File systems security: Shared folders & NTFS permissions, EFS Disk Quotas (March 23, 2016) Abdou Illia, Spring 2016 1 Learning Objective Understand Shared Folders Assign Shared Folder permissions NTFS
More informationLocal Area Networks (LAN s)
Local Area Networks (LAN s) Local area networks are computers connected together in a single location. They vary in size from two computers connected together to share a printer, to hundreds of computers
More informationSIMATIC. STEP 7 PLUS TIA Portal Teamcenter Gateway. Introduction to TIA Portal Teamcenter Gateway 1. System requirements 2
Introduction to TIA Portal Teamcenter Gateway 1 System requirements 2 SIMATIC STEP 7 PLUS Basics of working with TIA Portal Teamcenter Gateway 3 Notes on the installation sequence for the TIA Portal and
More informationAcronis Backup & Recovery 11 Beta Advanced Editions
Acronis Backup & Recovery 11 Beta Advanced Editions Quick Start Guide Table of contents 1 Main components... 3 2 Supported operating systems... 3 3 Where do I install the components?... 3 4 What you need
More informationSage Installation and System Administrator s Guide. October 2016
Sage 100 2017 Installation and System Administrator s Guide October 2016 2016 The Sage Group plc or its licensors. All rights reserved. Sage, Sage logos, and Sage product and service names mentioned herein
More informationInstalling Intellicus DotNet Client on Windows. Version: 16.0
Installing Intellicus DotNet Client on Windows Version: 16.0 Copyright 2015 Intellicus Technologies This document and its content is copyrighted material of Intellicus Technologies. The content may not
More informationInstalling the Is2 Onsite Version - HVAC Office System
Installing the Is2 Onsite Version - HVAC Office System This document describes the full onsite server installation of the Is2 database files, the database server, and the application server. The full program
More informationConfiguring Directories in an ICVERIFY Master / Substation Setup
Configuring Directories in an ICVERIFY Master / Substation Setup An ICVERIFY, Inc. Technical Document June 16, 2006 Disclaimer: The information contained herein is intended to apply to the ICVERIFY, Inc.
More informationSTATISTICA VERSION 10 STATISTICA MONITORING AND ALERTING SERVER (MAS) INSTALLATION INSTRUCTIONS
Pre-requisites: STATISTICA VERSION 10 STATISTICA MONITORING AND ALERTING SERVER (MAS) INSTALLATION INSTRUCTIONS 1. The installation of the STATISTICA Monitoring And Alerting Server (MAS) network version
More informationODBC Setup MS Access 2007 Overview Microsoft Access 2007 can be utilized to create ODBC connections. This page will show you the steps to create an
ODBC Setup MS Access 2007 Overview Microsoft Access 2007 can be utilized to create ODBC connections. This page will show you the steps to create an ODBC connection. 1. To open Access 2007, click Start
More information