UNIVERSITY OF EXETER BITLOCKER USER GUIDE
|
|
- Veronica Hawkins
- 6 years ago
- Views:
Transcription
1 Exeter IT Technical Planning & Development UNIVERSITY OF EXETER BITLOCKER USER GUIDE BitLocker is an encryption system which allows the University to secure sensitive information on University owned laptops, thus preventing Hard drives from being interrogated in the event of the laptop being lost or stolen. New or re-imaged laptops using Windows 7 in our managed group will have already been encrypted; however no personal security has been set to lock the hard drive with the owner. This document is to inform you of what to expect and what you should do in order to set a security PIN. USEFUL INFORMATION The Exeter IT BitLocker Recovery Portal, Use this feature to recover you PIN code if you forget it in future: For further information on University of Exeter Security Policy and why it is necessary to make this change, please visit: Any issues during the process please contact the University of Exeter SID Helpdesk on: or University of Exeter BitLocker User Guide.pdf Page 1 of 8
2 BITLOCKER PIN SETUP WIZARD BitLocker Encryption 1. A policy is set on your computer which will mean that at some point a pop up window will appear in the middle of your desktop similar to the image below. The whole process will only take a few minutes, if you see it please click Start. N.B. in a few cases the message in the box below may be blank, if the title of the box is Microsoft BitLocker Administration and Monitoring, please continue as normal and click start. 2. Next, set a PIN of at least 8 numbers no letters, confirm this and click Create PIN. University of Exeter BitLocker User Guide.pdf Page 2 of 8
3 3. And then click Exit. 4. Each time you restart your computer will require you to type this PIN code prior to booting into Windows. When you see this screen, enter your PIN and press 'Enter' to Continue. University of Exeter BitLocker User Guide.pdf Page 3 of 8
4 Your PC should now be secure and the process is complete. END. N.B. Further information in this document provides guidance on recovery when you forget your PIN code. Please peruse but it is not necessary to take these further steps unless the PIN code no longer works. PIN CODE RECOVERY University of Exeter BitLocker User Guide.pdf Page 4 of 8
5 If in the event you forget your PIN code you can access recovery information from our Recovery portal. To do this you will need to have access to a separate device that is capable of viewing webpages alongside your locked PC, the process should take about 5 minutes. If you don t have access to a separate device you will have to contact ExeterIT Helpdesk. Make sure you have your PC to hand to provide them the Recovery Key ID. 1. To obtain a Recovery Key you should take note of the first 8 characters of the Recovery Key ID from your locked PC. 2. Press the Esc key instead of entering your Pin code to enter the Recovery mode (here you will be prompted to type in a Recovery Key). An example of the Recovery Key ID is highlighted below. 3. Then from a separate device you can use the ExeterIT BitLocker Recovery Portal, accessed via the webpage: University of Exeter BitLocker User Guide.pdf Page 5 of 8
6 4. If asked, login using your University credentials, and follow the instructions. 5. Type into the BitLocker Recovery Portal the first 8 characters of the Recovery Password ID as noted from section 2. Then select a reason, most cases Lost/Stolen PIN CODE, then and click Get Key. University of Exeter BitLocker User Guide.pdf Page 6 of 8
7 6. You will be presented with your BitLocker Recovery Key, type this in to your locked device still in the Recovery mode. As you enter the last character the PC will resume the boot up process. 7. To change your PIN code, log onto your PC as usual, click the Start button, and then select the Control Panel, Select System and Security, and then select BitLocker Encryption Options. Select Manage your PIN and type in your new PIN code into both fields. This should now work next time you reboot. University of Exeter BitLocker User Guide.pdf Page 7 of 8
8 University of Exeter BitLocker User Guide.pdf Page 8 of 8
BitLocker Encryption for non-tpm laptops
BitLocker Encryption for non-tpm laptops Contents 1.0 Introduction... 2 2.0 What is a TPM?... 2 3.0 Users of non-tpm University laptops... 2 3.1 Existing Windows 7 laptop users... 2 3.2 Existing Windows
More informationProtecting your data with Windows 10 BitLocker
Microsoft IT Showcase Protecting your data with Windows 10 BitLocker Microsoft BitLocker Drive Encryption technology uses the strongest publicly available encryption to protect your computer s data. It
More informationHOWTO Make an Initial Connection to the Office Anywhere Desktop using a Windows 7 based PC v1
HOWTO Make an Initial Connection to the Office Anywhere Desktop using a Windows 7 based PC v1 1. Web browse to the Office Anywhere Portal: http://hosted.gg (as shown below) 2. Click the Access Office Anywhere
More informationSophos Central Device Encryption. Administrator Guide
Sophos Central Device Encryption Administrator Guide Contents About... 1 Manage BitLocker Drive Encryption... 2 Migrate to...2 Prepare Device Encryption...3 Device Encryption step by step... 3 Device Encryption
More informationHow To Encrypt a Windows 7, 8.1 or 10 laptop or tablet
How To Encrypt a Windows 7, 8.1 or 10 laptop or tablet Introduction College sensitive information stored on a mobile computing device is at risk for unauthorized access and disclosure if appropriate security
More informationBitLocker to Go: Encryption for personal USB
BitLocker to Go: Encryption for personal USB [Windows 10] Encryption is an effective method of protecting data stored on portable USB devices such as flash drives and external hard drives. Encryption encodes
More informationInstall VMware Horizon Client
Install VMware Horizon Client to run on your personal PC or laptop: 1. Open Internet Explorer. 2. In the address bar type in https://desktop.cascadia.edu/ 3. If you haven t made use of the client from
More informationBitLocker Drive Encryption Guide
BitLocker Drive Encryption Guide How to create a virtual hard drive and encrypt it with BitLocker... 2 How to Mount and Open your VHD after you restart your Computer... 11 Encrypting removable drives (Flash
More informationTable of Contents. Table of Figures. 2 Wave Systems Corp. Client User Guide
2 Wave Systems Corp. Client User Guide Table of Contents Overview... 3 What is the Trusted Drive Manager?... 3 Key Features of Trusted Drive Manager... 3 Getting Started... 4 Required Components... 4 Configure
More informationSophos Central Self Service Portal help
Sophos Central Self Service Portal help Contents 1 About this Help...3 2 Email...4 2.1 Manage Quarantined Email...4 2.2 Emergency Inbox...4 3 Mobile Control...5 3.1 Set up Sophos Mobile Control on your
More informationEncrypting Removable Media
For security reasons all removable media must be encrypted with BitLocker to Go on Windows 7 workstations. The following will show you how to use a flash drive with BitLocker to Go. Please note that data
More informationSymantec Encryption (PGP) Installation Guide
System Requirements Symantec Encryption (PGP) Installation Guide Windows 8 (32 and 64 bit versions) Windows 7 (32 and 64 bit versions)] Windows Vista (32- and 64-bit editions) Additional Requirements Boot
More informationCloud Compute. Backup Portal User Guide
Cloud Compute Backup Portal User Guide Contents Service Overview... 4 Gaining Access... 5 Operational Guide... 6 Landing Page... 6 Profile View... 6 Detailed View... 8 Overview... 8 Cloud Backup... 8
More informationModeChanger
35020808-02 2015.11 ModeChanger ModeChanger is a software utility that can switch the drive between normal mode and encrypted mode. Operating in encrypted mode will help protect your data. While the drive
More informationExpert Reference Series of White Papers. BitLocker: Is It Really Secure? COURSES.
Expert Reference Series of White Papers BitLocker: Is It Really Secure? 1-800-COURSES www.globalknowledge.com BitLocker: Is It Really Secure? Mark Mizrahi, Global Knowledge Instructor, MCSE, MCT, CEH Introduction:
More informationFix Three Common Accounting Firm Data Vulnerabilities
Fix Three Common Accounting Firm Data Vulnerabilities Fix Three Common Accounting Firm Data Vulnerabilities Use these step-by-step guides to protect your business from data thieves Brought to you by: Encyro
More informationWINDOWS 7 BITLOCKER DRIVE ENCRYPTION
ComputerFixed.co.uk Page: 1 Email: info@computerfixed.co.uk WINDOWS 7 BITLOCKER DRIVE ENCRYPTION There are so many ways in which you can stop unauthorized access to your computer but what if someone steals
More informationDemo Lab Guide Data Protection Encryption DDP
Demo Lab Guide Data Protection Encryption DDP Product Domain: Cloud Client Computing Author: David Aherne Version: 1.01 Table of Contents 1 Product Overview... 3 1.1 Lab Preparation Considerations and
More information(B) Execute SMS TCP MODBUS Interface Application
Security Management System software generates notifications which indicate the state of various health parameters eg disk failure, one or more cameras offline etc. These notifications can be exposed as
More informationCloud Services. Mobile . BlackBerry (BES) Set Up Guide
Cloud Services Mobile Email BlackBerry (BES) Set Up Guide 10/22/2014 CONTENTS Important Information about Setting up Your BlackBerry after the Mail Migration... 2 Setup Instructions for BlackBerry Connection
More informationWindows 10 First Login Guide (Laptops) Version 1.0
31T Uhttp://onedrive.lboro.ac.ukU31T. Windows 10 First Login Guide (Laptops) Version 1.0 Introduction The first time you login to any Windows 10 PC you will see several messages and boxes. This guide will
More informationLenovo Imaging Checklist
*Note: If this is a re-image, it s recommended getting into setup and clearing the Security Chip. PRE-INSTALLATION BIOS (When powering up, hit F1 at the Lenovo Logo screen) For all Lenovo Laptop models:
More informationEasy Attendant Instructions
NUMBER: PIN: 7890 TELEPHONE ACCESS To log into your auto-attendant: 1. Dial 877-377-9677 2. Press * to reach the login prompt. 3. Enter your auto attendant number when prompted followed by the # key. 4.
More informationConnecting to ehoundnet-fsa
Connecting to ehoundnet-fsa Encrypted Wi-Fi at Loyola for Faculty, Administrators, Staff, & other Employees Contents Connecting with a Loyola-Issued PC... 2 Connecting with a Non-Loyola Issued PC... 4
More informationSecurity Management System SNMP Trap Interface
Security Management System software generates various alarms on events. SMS SNMP trap Interface application connects to one or more SMS Servers and receives all the alarms generated by the SMS application.
More information2016 TaxSlayer Pro Desktop. Logging in to the Program Usernames/Passwords
2016 TaxSlayer Pro Desktop Logging in to the Program Usernames/Passwords Contents Logging in to the Program... 2 First Time Logging In... 2 Forgot Username/Password Preparer... 4 Logging in as ADMIN...
More informationSafeGuard Enterprise. user help. Product Version: 8.1
SafeGuard Enterprise user help Product Version: 8.1 Contents About SafeGuard Enterprise...1 Modules... 2 Full disk encryption with BitLocker...2 Full disk encryption with SafeGuard Power-on Authentication...
More informationCreate MedicCoin Master Node Instruction Rev2
Create MedicCoin Master Node Instruction Rev2 1. Download MedicCoin wallet using below link https://mediccoin.com/mediccoin-window.zip 2. Unzip/extract MedicCoin-Window.zip to C:\coins\MedicCoin folder.
More informationSuper USB. User Manual. 2007, March
Super USB User Manual 2007, March Windows98 Driver Install/Uninstall Driver Install: 1. Execute Win 98 UFD driver, then restart PC. 2. Plug Super USB into an available USB port. A new Removable Disk drive
More informationOneSecure VPN Remote User Installation & Configuration Guide
OneSecure VPN Remote User Installation & Configuration Guide 3/11/2015 CONTENTS Download Client Software 02 Install Client Software 03 Enable Client Software 07 Configure the Connection 08 WELCOME Welcome
More informationVWR Protocole Builder Software User manual Summary
VWR Protocole Builder Software User manual Summary 1. Introduction... 2 1.1. What is VWR Protocole Builder Software?... 2 1.2. Passwords and User information... 2 1.3. Forgotten password... 2 2. Home screen...
More informationDesktop Configuration Guide for NHSmail
Desktop Configuration Guide for NHSmail Version 4 Published October 2017 Copyright 2017Health and Social Care Information Centre. The Health and Social Care Information Centre is a non-departmental body
More informationRemote Access. Application Viewer User Guide
Remote Access Application Viewer User Guide Page Logging into Application Viewer... 3 Logging off Application Viewer... 9 Lost or stolen tokens... 9 Application Viewer User Guide October 11, 2011 2 of
More informationWebEx- Enabled Telepresence Scheduling Guide
WebEx- Enabled Telepresence Scheduling Guide NOTE: In order to use this service, you will need to have a WebEx account and a TMS account. Your TMS account is your Harvard Key login, and soon the WebEx
More informationUnit 4 Agresso. Introduction to Desktop
Unit 4 Agresso Introduction to 5.7.1 Desktop Author S J Price June 2018 CONTENTS Installation - Agresso Desktop (formerly known as Smart Client or Back Office)... 3 For Users on a Supported (centrally
More informationInstallation Guide. Research Computing Team V2.0 RESTRICTED
Installation Guide Research Computing Team V2.0 RESTRICTED Document History This document relates to the BEAR DataShare service which is based on the product Power Folder, version 10.3.232 ( some screenshots
More informationPC-Security Service. Installation Guide. Version 1.0 (SA-PC14.2)
PC-Security Service Installation Guide Version 1.0 (SA-PC14.2) Table of Content 1 System Requirements... 3 2 Installation... 4 Appendix A License Key Retrieval (for administrator only)... 8 Appendix B
More informationREMOTE ACCESS TO HUSKY S COMPUTER NETWORKS TWO WAYS TO CONNECT IN EUROPE
REMOTE ACCESS TO HUSKY S COMPUTER NETWORKS TWO WAYS TO CONNECT IN EUROPE If you have access to the Internet (via net cable, wireless or phone line, hotel, airport, IPass), you need to change your proxy
More informationGetting View Client File
Getting View Client File 1. Launch Internet Explorer 2. At address bar enter this URL https://viewvdi.tp.edu.sg/ and press [Enter]. 3. Please click on More information and click on Go on to the webpage
More informationTint Tek 20/20 Cloud Software Installation Guide
Tint Tek 20/20 Cloud Software Installation Guide Page 1 of 9 Software Installation In your inbox, you will have received an email from us (it may show up in your junk mail). (Figure 1) This email contains
More informationOnce a USB drive has been inserted into an encrypted machine, the Dell Data Protection software will recognize the unencrypted device.
Dell Data Protection USB Drive Encryption Introduction To further protect PC s that have access to sensitive data, the Dell Data Protection (DDP) client detects and encrypts USB/Flash drives when they
More informationMicrosoft Off ice 365 from Vodafone
Vodafone Administrator Guide - Enterprise Microsoft Off ice 365 from Vodafone Your step by step guide to getting started with Microsoft Office 365 from Vodafone Vodafone Group 2011. Vodafone and the Vodafone
More informationTPM 1.2 Firmware Update Guidance. for Infineon SLB9655 and SLB9660
TPM 1.2 Firmware Update Guidance for Infineon SLB9655 and SLB9660 Rev. 05 Toshiba Client Solutions Co., Ltd. Document Number: 3600xxxxx 1. Introduction This guidance described about in-field firmware update
More informationHDD Recovery Information for Your Toshiba Computer
HDD Recovery Information for Your Toshiba Computer The following information supersedes the information documented in the relevant sections of the electronic User s Guide that shipped with your Hard Drive
More informationTelstraClear Technical Document
(C) Copyright Page 1 of 5 SUBJECT: Outlook Express 4.5 and Above PLATFORM: Windows 95 THE PARADISE.NET HELPDESK DOES NOT TECHNICALLY SUPPORT WINDOWS 95 AND WINDOWS NT OR APPLE MACINTOSH SYSTEMS LOWER THAN
More informationVPN/RDP Laptop Usage instructions:
VPN/RDP Laptop Usage instructions: This document details how to use the laptops provided to users which connect to the secure NEST environment using VPN connectivity. Note that these instructions do not
More informationDocument for connecting an ipad/iphone to the University VPN System
Document for connecting an ipad/iphone to the University VPN System The University of Exeter provides a number of ways for you to connect securely to the network to access your data using an ipad/ iphone.
More informationPatient Portal Guide
Patient Portal Guide Please navigate to www.coendo.com. In the upper right hand portion of the screen, you will notice a link to the patient portal: From there, you will be brought to the Portal login
More informationConfiguring WPA2 for Windows XP
Configuring WPA2 for Windows XP Requirements for wireless using WPA2 on Windows XP Your wireless card must support 802.1x, AES, and WPA2. Your computer must have Windows XP service pack 2 installed and
More informationStart Up and Shutdown Procedures (Unix)
Start Up and Shutdown Procedures (Unix) Start Up On Main Console 1. Press the Server main power button ON 2. The system will automatically go through the start-up procedures, which will be displayed on
More informationNeurOptimal Upgrade Guide 2.0 to 3.0
NeurOptimal Upgrade Guide 2.0 to 3.0 ATTENTION NO2 PERSONAL USERS: YOU MUST LOG ON FOR A ZENCONNECT SESSION (FORMERLY MOUSECALL) PRIOR TO YOUR UPGRADE OR ALL OF YOUR REMAINING SESSIONS WILL BE LOST. Please
More informationHow can I Clear a TPM module or Recover from Authorisation Lockout?
How can I Clear a TPM module or Recover from Authorisation Lockout? Scenario TPM Modules can become locked when too many incorrect PIN attempts are made to access the information stored on the module.
More informationIndustry Access Portal MUNICIPALITY MODULE User Guide
2017 Industry Access Portal MUNICIPALITY MODULE User Guide LOUISIANA DEPARTMENT OF INSURANCE INDUSTRY ACCESS Contents Register for Industry Access... 2 Sign Up... 4 Log into Industry Access... 8 Access
More informationShareSync Get Started Guide for Mac
ShareSync Get Started Guide for Mac ShareSync Overview ShareSync is a file backup and sharing service. It allows you to: Back up your files in real-time to protect against data loss from ransomware, accidental
More informationSwitch 1 Instructions Utility Telecom Easy Attendant Instructions
Switch 1 Instructions Utility Telecom Easy Attendant Instructions This guide is intended to help you understand the Easy Attendant Instructions used in Switch 1. Not sure if you re in Switch 1 or Switch
More informationInstruction Guide! VERITEXT VAULT - ONLINE DEPOSITORY
Veritext Vault Instruction Guide 1 Logging In 1. Visit www.veritext.com/vault 2. Click Vault Login 3. Enter your user name and password. (Ensure you have @veritext at the end of your user name.) Be sure
More information2012 Lenovo Server Client Performs All Steps from ISP Machine 1. Check the ISP CD/DVD drive and remove any disks that are currently loaded.
2012 Lenovo Server Client Performs All Steps from ISP Machine 1. Check the ISP CD/DVD drive and remove any disks that are currently loaded. 2. Log onto the Windows side of the ISP and go to the QsrSoft
More informationWÜRTH ITensis BÜCHI - New computer infrastructure. User guide version 1.0
WÜRTH ITensis BÜCHI - New computer infrastructure User guide version 1.0 Table of contents 1 About 3 2 Operating system 3 3 Microsoft Office 2013 3 3.1 Microsoft Dynamics CRM for Outlook 3 3.2 Changing
More informationNew Dropbox Users (don t have a Dropbox account set up with your Exeter account)
The setup process will determine if you already have a Dropbox account associated with an Exeter email address, and if so, you'll be given a choice to move those contents to your Phillips Exeter Dropbox
More informationImportant! You receive back whatever you turned in during ipad collection, including cables, chargers, cover, and case.
ipad Setup and Use Important! ipads are to remain in the protective cases at all times. Only computer techs are permitted to remove the case. You receive back whatever you turned in during ipad collection,
More informationCreate and Configure a VM in the Azure Step by Step Basic Lab (V2.0)
Basic Lab (V2.0) Ahmed Abdelwahed Microsoft Certified Trainer Ahmed_abdulwahed@outlook.com Contents Create Windows Server 2016 VM On Microsoft Azure... 3 Create Windows Server 2016 Data Center VM step
More informationInstrument Software Update Instructions. X-Series Multi-touch instruments
Purpose Instrument Software Update Instructions X-Series Multi-touch instruments The purpose of this document is to outline the instrument software update procedure for the touchscreen or B model instrument
More informationLab - Install Windows 7 or Vista
Introduction In this lab, you will install the Windows 7 or Vista operating system. Recommended Equipment A computer with a blank hard disk drive Windows 7 or Vista installation DVD or USB flash drive
More informationOxleas NHS Foundation Trust
Oxleas NHS Foundation Trust Title: NHSMail - Security Questions Scope Trust wide Owner IT Department Contact Service Desk Supervisor Version 1 Issue date 22/03/2017 Review date 21/03/2018 Search summary:
More informationWDC RDS Connection for Android Users
WDC RDS Connection for Android Users Introduction The WDC Remote Desktop Service (RDS) can be connected to most personal computer devices, including Android Smartphones and tablets, even though the RD
More informationUser Self-Administrative Web Guide
User Self-Administrative Web Guide NotifyMDM Version 3.x The User Self-Administrative Web 1 Table of Contents The User Self-Administrative Web 3 Accessing the Mobile User Self-Administrative Portal...
More informationThinkPrint a User Guide for Staff. The Latest Print Management System
ThinkPrint a User Guide for Staff The Latest Print Management System 1 ThinkPrint Agenda What is ThinkPrint for Staff? Printing on Campus Resetting your password Features of your ThinkPrint account How
More informationU3 Encryption Utility User Guide
Contents 1. U3 ENCRYPTION UTILITY RELEASE NOTES... 2 1.1 FEATURES... 2 1.2 REMARKS... 2 1.3 GENERAL DESCRIPTION OF THE U3 VOICE ENCRYPTION... 3 1.4 CUSTOMIZATION... 5 2. INSTALLING THE U3 & P3 ENCRYPTION
More informationBefore you start you must ensure that you have your most recent backup available and it can be read by the computer that you are restoring RMS to.
RMS Server Crash Recovery Procedure Overview Important Information Step One - Regional Settings Step Two - Windows Updates Step Three - Install SQL Express 2008 Step Four - Create RMSWIN folder Step Five
More informationCitrix Remote Access
Citrix Remote Access User Guide 30 Churchill Place Canary Wharf London E14 5EU United Kingdom Telephone +44 (0)20 3660 6000 Facsimile +44 (0)20 3660 5555 Send a question via our website www.ema.europa.eu/contact
More informationNexiDesktop. Quick User Guide
NexiDesktop Quick User Guide May, 2015 NexiDesktop enables you to easily join Nexi conference calls, either as a guest or as a registered user, make point-to-point calls, invite others to your meetings,
More informationInstrument Software Update Instructions
Purpose Instrument Software Update Instructions Keysight X-Series Signal Analyzers, Non-Touch (N9000A, N9010A, N9020A, N9030A) With either WES7 or Windows 10 operating systems The purpose of this document
More informationRemotely accessing GPH ICT systems
Remotely accessing GPH ICT systems Version: 1.6 FINAL CONTENTS 1. Background and Support... 2 2. Setting up remote access... 3 2.1 Installing the Symantec VIP MOBILE App... 3 2.2 Registering your device...
More informationSecuriSync Get Started Guide for Windows
SecuriSync Get Started Guide for Windows Intermedia Backup and File Sharing - SecuriSync SecuriSync is a file backup and sharing service. It allows you to: Back up your files in real-time to protect against
More informationMFA (Multi-Factor Authentication) Enrollment Guide
MFA (Multi-Factor Authentication) Enrollment Guide Morristown Medical Center 1. Open Internet Explorer (Windows) or Safari (Mac) 2. Go to the URL: https://aka.ms/mfasetup enter your AHS email address and
More informationYour Own Virtual Playground. CS 1585 :: Doug McGeehan
Your Own Virtual Playground CS 1585 :: Doug McGeehan Overview Follow these steps on your personal laptop or home PC. 1. 2. 3. 4. 5. Open this URL in your browser: http://tiny.cc/dsl-vm Download and Install
More informationSafeStick/SafeXs. User Guide. Created by BSO ITS Security Team Version 1.4
SafeStick/SafeXs User Guide Created by BSO ITS Security Team Version 1.4 Version Control V0.1 Initial draft 23/09/2009 V1.0 Version 1 Approved 28/09/2009 V1.1 Updated for HSCNI Safeconsole 03/11/2011 V1.2
More informationMOZILLA FIREFOX (Version 52) EXTENDED SUPPORT RELEASE (ESR) Guidance for Windows PC Patient Portal End Users
MOZILLA FIREFOX (Version 52) EXTENDED SUPPORT RELEASE (ESR) Guidance for Windows PC Patient Portal End Users 1 Downloading/ Installing Firefox Extended Support Release (ESR) Version 52 As of version 52,
More informationImage Backup and Recovery Procedures For Windows 7
Image Backup and Recovery Procedures For Windows 7 Thank you for purchasing a Fujitsu computer. Fujitsu is committed to bringing you the best computing experience with your new system. It is very important
More informationConfiguring your MikroTik as a Standard LucidView Enforcer
MANUAL Configuring your MikroTik as a Standard LucidView Enforcer Version 6 Table of Contents STANDARD LUCIDVIEW ENFORCER 2 Guide version 2 About 2 Standard vs. Bolt-On Enforcer 2 GENERATING & DOWNLOADING
More informationAccessing the Console and Re-Installing your VPS Manually
Accessing the Console and Re-Installing your VPS Manually This guide will walk you through the necessary steps to access your VPS console and re-install your VPS OS manually. Step 1 Access your VPS information
More informationSymbianGuru.com Your guru in mobile software. Phone Wallet v 3.0. by Symbian Guru.
Phone Wallet v 3.0 by Symbian Guru User Manual Index Index...2 General description...3 How to install Phone Wallet...4 How to register Phone Wallet...4 Working with Phone Wallet...4 How to start...4 General
More informationQuick Reference Guide Hosting WebEx Meetings
Quick Reference Guide Hosting WebEx Meetings You can schedule meetings in advance, or start an instant meeting and invite participants to join you. They do not have to subscribe to WebEx. They simply click
More informationNextMD Patient Portal Guide
Internet Security Below are some suggestions to help keep your health information secure: Use a password that is easy to remember but difficult for others to guess. Some web browsers will ask you to save
More informationEngiBOX system User Manual
EngiBOX system User Manual Contents 1. EngiBOX system introduction 2 1.1. System capabilities 2 1.2. System advantages for the engine owner 3 1.3. Needed Equipment 3 2. EngiBOX App 4 2.1. First time EngiBOX
More informationExplore Windows 8.1 Update
Work Smart by Microsoft IT Explore Windows 8.1 Update This guide provides a high-level overview of many new exciting features in the Windows 8.1 Update user interface. Windows 8.1 Update includes improvements
More informationFinding information on your computer
Important Be sure to create recovery discs immediately after your computer is ready for use because there are no recovery discs provided with the computer. For instructions on how to create the recovery
More informationHow to use VicNet: A guide for GROUPS
How to use VicNet: A guide for GROUPS VicNet is an online portal that allows your volunteer group to access the Volgistics database used by Three Rivers Volunteer Office. You can log onto VicNet from any
More informationSMEC ASSET MANAGEMENT SYSTEM PMS Version 5.5. System Administrator s Guide
SMEC ASSET MANAGEMENT SYSTEM PMS Version 5.5 System Administrator s Guide January 2015 PREPARATION, REVIEW AND AUTHORISATION Revision # Date Prepared by Reviewed by Approved for Issue by 1 21-Jan-2015
More informationSafeGuard Enterprise user help. Product version: 8.0
SafeGuard Enterprise user help Product version: 8.0 Contents 1 About SafeGuard Enterprise...4 2 SafeGuard Enterprise modules...5 3 Security recommendations...7 4 Full disk encryption...9 4.1 Encryption
More informationParallels Desktop 4.0 Switch to Mac Edition. Migrate your PC Tutorial.
Parallels Desktop 4.0 Switch to Mac Edition Migrate your PC Tutorial www.parallels.com Migrate Your PC with Parallels Transporter Tutorial The enhanced Parallels Transporter included in Parallels Desktop
More informationConnecting to the Cloud
Connecting to the Cloud Step 1. Log off the current Outlook client. Step 2. Shutdown Lync (if used): Left click the Show Hidden Icons button on the taskbar. (For most PCs this is the bottom right corner.)
More informationHP Visual Collaboration Desktop. User Guide
HP Visual Collaboration Desktop User Guide HP Visual Collaboration Desktop v2.0 First edition: November 2010 Legal notices Copyright 2010 Hewlett-Packard Development Company, L.P. The information contained
More informationUnipass Secur Client User Guide v1.5
Unipass Securemail Client User Guide v1.5 This document provides a step by step illustrated user guide for the Unipass Securemail desktop software client / plug-in. UIdP Project Team May 2018 Contents
More informationFujitsu STYLISTIC Q Series
Fujitsu STYLISTIC Q Series BIOS Guide STYLISTIC Q Series Model: Q552 Document Date: 5252012 Document Part Number: FPC58-3061-01 FUJITSU AMERICA, INC. 1 STYLISTIC Q552 BIOS Q Series BIOS BIOS SETUP UTILITY
More informationConfiguring Passwords and Privileges
Configuring Passwords and Privileges Using passwords and assigning privilege levels is a simple way of providing terminal access control in your network. This chapter describes the following topics and
More informationSAS Installation Instructions Windows 2003, XP, 2000, NT. Workstation Installation Guidelines
UCit Instructional and Research Computing, Software Distribution Office, 303B Zimmer Hall, Cincinnati, OH 45221-0088. Phone: (513) 556 9068 Email: Software@uc.edu SAS 9.1.3 Installation Instructions Windows
More informationTrusted Platform Module (TPM) Quick Reference Guide
Trusted Platform Module (TPM) Quick Reference Guide System builders/integrators should give this Guide to the system owners to assist them in enabling and activating the Trusted Platform Module. Warning
More information>> EJREYNOLDS GUIDE ON HOW TO FILE YOUR FORM 5500
>> EJREYNOLDS GUIDE ON HOW TO FILE YOUR FORM 5500 FEBRUARY, 2014 > For Plan Years beginning on or after January 1, 2009, the Form 5500 must be filed electronically through the Department of Labor s EFAST2
More informationHandbook: Carbonite Safe
1 Welcome to Carbonite! Important Things to Know...4 Carbonite Features...5 Advanced/Add-On Features... 5 Setting Up and Installing...6 Starting a Trial... 7 Installing Carbonite for the First Time...
More information