SHAREMONITOR SETUP GUIDE
|
|
- Evangeline Floyd
- 5 years ago
- Views:
Transcription
1 SHAREMONITOR A ransomware encryption monitor for server shared folders. SETUP GUIDE Page 1 of 22 Copyright ABit Consulting 2016
2 TABLE OF CONTENTS Document Revisions... 4 Installation... 5 Registration... 5 How does it work?... 6 Actions... 8 Stop File and Printing Sharing and Volume Shadow Copy... 8 Rename / Delete File Share Message Event Log Configuration General Service Control Actions Options Monitor Options Action Options Lists Ignored Shares Blacklist Filenames Whitelist Filenames Terminate Applications Terminate Services SMTP Server Threat Recover Starting Services Page 2 of 22 Copyright ABit Consulting 2016
3 Renaming shares Page 3 of 22 Copyright ABit Consulting 2016
4 DOCUMENT REVISIONS Revision Changes Reviewer 1 Original Version TM 2 Version changes TM 3 Version changes TM 4 Version changes TM 5 Version changes TM 6 Version changes TM 7 Version changes TM 8 Version changes TM 9 Version changes TM Page 4 of 22 Copyright ABit Consulting 2016
5 INSTALLATION Follow the installation prompts to install ShareMonitor and any prerequisites. The Configuration tool will be launched after installation. REGISTRATION Please provide ABit Consulting with your activation key and contact details. We will provide a registration key. Your registration and expiry date will appear in the about dialog. Page 5 of 22 Copyright ABit Consulting 2016
6 HOW DOES IT WORK? Sharemonitor enumerates all windows shares present on a Windows File Server A honeypot folder and file is placed in the root of each share. When these files and folders are created they are given EVERYONE permission to ensure it could be infected. Page 6 of 22 Copyright ABit Consulting 2016
7 If the file is modified or renamed. ShareMonitor will notice this modification and react according to its setup. ShareMonitor does not just react to any modification but will monitor that the change did not change the GUID value. If the file is renamed (eg sharemonitor.doc.encrypted) this will also trigger alert actions. ShareMonitor also inspects know file types and checks they are valid. Upon a specified number of failures within a time frame an alert will be triggered. Page 7 of 22 Copyright ABit Consulting 2016
8 ACTIONS STOP FILE AND PRINTING SHARING AND VOLUME SHADOW COPY If configured ShareMonitor will stop File and Printer sharing and Volume Shadow Copy. Shares will become unavailable. Page 8 of 22 Copyright ABit Consulting 2016
9 RENAME / DELETE FILE SHARE If the option to rename / delete a share is enable the following will occur: File shares are monitored. Upon detection of an issue, the share is renamed or removed. The share has been removed and is no longer available. The share is appended with specific suffix if rename option is selected. This allows other file shares to remain active. If ShareMonitor fails to remove the share is will fall back to stopping all shares. Page 9 of 22 Copyright ABit Consulting 2016
10 MESSAGE ShareMonitor can also send alerts. The alert will provide: - File and share details - Stopped services and processes - List of open shared files on the server sorted by username. Page 10 of 22 Copyright ABit Consulting 2016
11 EVENT LOG ShareMonitor creates entries in the Windows Event Lot Page 11 of 22 Copyright ABit Consulting 2016
12 CONFIGURATION GENERAL SERVICE CONTROL Share Monitor File and Printer Sharing Volume Shadow Copy Controls the Share Monitor Service. Settings will be saved prior to starting. Control the Microsoft Windows Server service (LanmanServer and Browser services) Control the Microsoft Windows VSS service. ACTIONS Stop file sharing Stop Volume Shadow Copy Send Alerts Terminate Applications Terminate Services File shares will be renamed, deleted or stopped upon threat detection. Upon threat detection, the Volume Shadow Copy service will be stopped to prevent previous version from being corrupt. alerts will be sent. Listed applications will be terminated on threat detection. (eg dropbox.exe) Listed services will be terminated on threat detection. Any service dependencies will also be terminated. Page 12 of 22 Copyright ABit Consulting 2016
13 OPTIONS A unique monitor folder and filename is recommended. MONITOR OPTIONS Ignore Hidden Shares Ignore Windows Folders Monitor Folder Hidden shares (eg SHARE$) will not be monitored. This depends how hidden shares are utilised or mapped in your company setup. Shares based in the Windows folder (eg C:\Windows\system32) are not monitor. Generally, these shares are for system use and read-only. The name of the folder placed in the root directory of each share. This is Monitor Filename generated randomly after installation. Use the button to generate a new name or create your own. This name of the honeypot file placed in monitor folder. This is generated randomly after installation. Use the generate a new name or create your own. button to Page 13 of 22 Copyright ABit Consulting 2016
14 Inspect known file content Know file types (eg Word / Excel) content is inspected, if it appears invalid encryption is suspected. Eg If 5 (fail count) files are modified / created and appear encrypted within 30 seconds, encryption is suspected and actions specified will be executed. Inspect know file renames Know file types (eg Word / Excel) file renames are monitored. If the extension changes for the specified max count, within the time frame specified in reset seconds, encryption is suspected and actions specified will be executed. Page 14 of 22 Copyright ABit Consulting 2016
15 ACTION OPTIONS Rename / delete shares Shares will be renamed if a suffix is supplier otherwise share will be removed. Files are not removed. Uncheck this option to stop file share services. Set renamed max users to 1 When a share is renamed the max user value will be set to 1. Rename suffix String to append to shared folder (eg \\server\share will become \\server\share_sm$) Leave suffix empty to just remove share. Page 15 of 22 Copyright ABit Consulting 2016
16 LISTS IGNORED SHARES A list of Shared Folders that are ignored. It is recommended to also keep the default variable {default}. BLACKLIST FILENAMES A list of blacklisted filenames with wildcards. If a new variant has been detected update the list here. It is recommended to also keep the default variable {default}. WHITELIST FILENAMES TERMINATE APPLICATIONS TERMINATE SERVICES A location or file that can contain blacklisted filenames. Generally this should not be used but if a software products creates files with the same extension as black listed files a location could be ignored. It is recommended to also keep the default variable {default}. Listed executable names will be terminated. (eg dropbox.exe, onedrive.exe, owncloud.exe) Stopping cloud upload application to stop encrypted files being uploaded. It is recommended to also keep the default variable {default}. Listed service names will be stopped along with any dependencies.it is recommended to also keep the default variable {default}. Page 16 of 22 Copyright ABit Consulting 2016
17 SMTP SERVER Server Server or IP address of SMTP server Port SMTP server port, generally 25 or 587 Username / Password From Address Recipients Subject Specify a username and password SMTP authentication is required. The address the alert message are sent from. List of alert recipients separated by the ; character. Eg fred@company.com;joe@company.com Alert subject, allows you to enter the server name or another identifier in the event you are running ShareMonitor on multiple sites. Page 17 of 22 Copyright ABit Consulting 2016
18 THREAT RECOVER After a threat detection or false positive some steps will need to be taken, depending on the actions configured. By default, ShareMonitor performs the following actions in the event of a detected threat. Renames share folder (default _SM$) appended Stops File and Printer sharing (if repeated detections for rename share fails) If file and printer sharing is stopped; you may not be able RDP without using admin (console) depending how long the service has been stopped. To start Remote Desktop in Admin mode. Run mstsc /admin The reason is stopping Windows File and Printer sharing also stops some other services (starting Server (LammanService) will start these dependencies) Page 18 of 22 Copyright ABit Consulting 2016
19 STARTING SERVICES Before enabling the services; we would strongly advise to check event log and suspected folders to ensure it is a false positive before starting file and printer sharing. Once you are prepared to start the services again; start share monitor and click start in File and Printer Sharing. Page 19 of 22 Copyright ABit Consulting 2016
20 RENAMING SHARES Locate and shares renamed by share monitor. Open the folder location and select properties -> sharing -> advanced settings Page 20 of 22 Copyright ABit Consulting 2016
21 Click Add Create a new share and update permissions as required. Page 21 of 22 Copyright ABit Consulting 2016
22 Remove the SM$ share Page 22 of 22 Copyright ABit Consulting 2016
This Quick Start describes how to use Bocconi Cloud Service, called Filr in the rest of the document, from your Windows desktop.
Quick Start Bocconi Cloud Service, based on Novell Filr, allows you to easily access all your files and folders from your desktop, browser, or a mobile device. In addition, you can promote collaboration
More informationAnchor User Guide. Presented by: Last Revised: August 07, 2017
Anchor User Guide Presented by: Last Revised: August 07, 2017 TABLE OF CONTENTS GETTING STARTED... 1 How to Log In to the Web Portal... 1 How to Manage Account Settings... 2 How to Configure Two-Step Authentication...
More informationUser Guide. Version R94. English
AuthAnvil User Guide Version R94 English March 8, 2017 Copyright Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept EULATOS as updated
More informationAdministrator Guide. Find out how to set up and use MyKerio to centralize and unify your Kerio software administration.
Administrator Guide Find out how to set up and use MyKerio to centralize and unify your Kerio software administration. The information and content in this document is provided for informational purposes
More informationCloud Compute. Backup Portal User Guide
Cloud Compute Backup Portal User Guide Contents Service Overview... 4 Gaining Access... 5 Operational Guide... 6 Landing Page... 6 Profile View... 6 Detailed View... 8 Overview... 8 Cloud Backup... 8
More informationCryptoSafeGuard User Guide: Beta
: Beta BackupAssist 10.1.0 will introduce CryptoSafeGuard, a new tool that protects your backups from ransomware attack and prevents ransomware-encrypted files from being backed up. CryptoSafeGuard will
More informationNETWRIX PASSWORD EXPIRATION NOTIFIER
NETWRIX PASSWORD EXPIRATION NOTIFIER ADMINISTRATOR S GUIDE Product Version: 3.3 January 2013 Legal Notice The information in this publication is furnished for information use only, and does not constitute
More informationEnd User Manual. December 2014 V1.0
End User Manual December 2014 V1.0 Contents Getting Started... 4 How to Log into the Web Portal... 5 How to Manage Account Settings... 6 The Web Portal... 8 How to Upload Files in the Web Portal... 9 How
More informationSync User Guide. Powered by Axient Anchor
Sync Powered by Axient Anchor TABLE OF CONTENTS End... Error! Bookmark not defined. Last Revised: Wednesday, October 10, 2018... Error! Bookmark not defined. Table of Contents... 2 Getting Started... 7
More informationGRS Enterprise Synchronization Tool
GRS Enterprise Synchronization Tool Last Revised: Thursday, April 05, 2018 Page i TABLE OF CONTENTS Anchor End User Guide... Error! Bookmark not defined. Last Revised: Monday, March 12, 2018... 1 Table
More informationDSS User Guide. End User Guide. - i -
DSS User Guide End User Guide - i - DSS User Guide Table of Contents End User Guide... 1 Table of Contents... 2 Part 1: Getting Started... 1 How to Log in to the Web Portal... 1 How to Manage Account Settings...
More informationThis guide details the deployment and initial configuration necessary to maximize the value of JetAdvantage Insights.
HP JetAdvantage Insights Deployment Guide This guide details the deployment and initial configuration necessary to maximize the value of JetAdvantage Insights. 1. Overview HP JetAdvantage Insights provides
More informationWorkspace ios Content Locker. UBC Workspace 2.0: VMware Content Locker v4.12 for ios. User Guide
UBC Workspace 2.0: VMware Content Locker v4.12 for ios User Guide Navigating Content Locker Content Locker centralizes all your enterprise data in a single container and integrates existing content repositories
More informationHow SMART (Secure Malware Alert and Removal Tool) Works
FAQ How SMART (Secure Malware Alert and Removal Tool) Works 1. SMART downloads a copy of the files from your server to ours. 2. SMART scans a file for any malicious code on our end. 3. From here, there
More informationComodo SecureBox Management Console Software Version 1.9
6. Comodo SecureBox Management Console Software Version 1.9 Quick Start Guide Guide Version 1.9.041918 Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013 Comodo SecureBox Management Console
More informationUser Guide. BlackBerry Workspaces for Windows. Version 5.5
User Guide BlackBerry Workspaces for Windows Version 5.5 Published: 2017-03-30 SWD-20170330110027321 Contents Introducing BlackBerry Workspaces for Windows... 6 Getting Started... 7 Setting up and installing
More informationVersion June 2016
HOSTING GUIDE Version 3.2.3 June 2016 This guide is sold in conjunction with the VETtrak Hosting Serv ice and is current at the time of purchase. Later v ersions are av ailable for download from www.v
More informationComodo Antispam Gateway Software Version 2.12
Comodo Antispam Gateway Software Version 2.12 User Guide Guide Version 2.12.112017 Comodo Security Solutions 1255 Broad Street Clifton, NJ, 07013 Table of Contents 1 Introduction to Comodo Antispam Gateway...3
More informationComodo Comodo Dome Antispam MSP Software Version 2.12
Comodo Comodo Dome Antispam MSP Software Version 2.12 User Guide Guide Version 2.12.111517 Comodo Security Solutions 1255 Broad Street Clifton, NJ, 07013 Table of Contents 1 Introduction to Comodo Dome
More informationInstallation Manual. and User Guide
Installation Manual and User Guide ESET Mobile Antivirus For Windows Mobile Copyright 2009 by ESET, spol. s r. o. ESET Mobile Antivirus For Windows Mobile was developed by ESET, spol. s r.o. For more information
More informationms-help://ms.technet.2004apr.1033/ad/tnoffline/prodtechnol/ad/windows2000/howto/mapcerts.htm
Page 1 of 8 Active Directory Step-by-Step Guide to Mapping Certificates to User Accounts Introduction The Windows 2000 operating system provides a rich administrative model for managing user accounts.
More informationNew Dropbox Users (don t have a Dropbox account set up with your Exeter account)
The setup process will determine if you already have a Dropbox account associated with an Exeter email address, and if so, you'll be given a choice to move those contents to your Phillips Exeter Dropbox
More informationUser Guide. Version R92. English
AuthAnvil User Guide Version R92 English October 9, 2015 Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept EULATOS as updated from
More information10.2 Running process checklist Contacting TEMASOFT Support... 30
2018 User manual Contents Table of Figures... 3 1. Introduction... 4 1.1. About TEMASOFT Ranstop... 4 1.2. How TEMASOFT Ranstop works... 5 1.3. TEMASOFT Ranstop components... 5 2. Installing TEMASOFT Ranstop...
More informationPointsec Protector v4.91 Training Manual. This document is to be used as a guide to the Pointsec Protector training course
Pointsec Protector v4.91 Training Manual This document is to be used as a guide to the Pointsec Protector training course Check Point Software Technologies Ltd 2008 1. Server Installation... 8 1.1 Splash
More informationBarracuda NextGen Report Creator
The creates customized reports using statistics and logs collected on Barracuda NextGen F-Series Firewalls. Each report can be configured to use multiple appliances, custom or predefined report data templates,
More informationComodo Antispam Gateway Software Version 2.1
Comodo Antispam Gateway Software Version 2.1 User Guide Guide Version 2.1.010215 Comodo Security Solutions 1255 Broad Street Clifton, NJ, 07013 Table of Contents 1 Introduction to Comodo Antispam Gateway...
More informationWORKFLOW BUILDER TM FOR MICROSOFT ACCESS
WORKFLOW BUILDER TM FOR MICROSOFT ACCESS Application Guide Version 06.05.2008 This document is copyright 2007-2008 OpenGate Software. The information contained in this document is subject to change without
More informationESET Mobile Security for Windows Mobile. Installation Manual and User Guide - Public Beta
ESET Mobile Security for Windows Mobile Installation Manual and User Guide - Public Beta Contents...3 1. Installation of ESET Mobile Security 1.1 Minimum...3 system requirements 1.2 Installation...3 1.2.1
More informationSharePoint General Instructions
SharePoint General Instructions Table of Content What is GC Drive?... 2 Access GC Drive... 2 Navigate GC Drive... 2 View and Edit My Profile... 3 OneDrive for Business... 3 What is OneDrive for Business...
More informationSharePoint: Fundamentals
SharePoint: Fundamentals This class will introduce you to SharePoint and cover components available to end users in a typical SharePoint site. To access SharePoint, you will need to log into Office 365.
More informationForeScout Extended Module for Carbon Black
ForeScout Extended Module for Carbon Black Version 1.0 Table of Contents About the Carbon Black Integration... 4 Advanced Threat Detection with the IOC Scanner Plugin... 4 Use Cases... 5 Carbon Black Agent
More informationVMware AirWatch Chrome OS Platform Guide Managing Chrome OS Devices with AirWatch
VMware AirWatch Chrome OS Platform Guide Managing Chrome OS Devices with AirWatch Workspace ONE UEM v9.4 Have documentation feedback? Submit a Documentation Feedback support ticket using the Support Wizard
More informationLUCITY SECURITY. This manual covers managing users, groups, and permissions for Lucity. Version: 2017r2
LUCITY SECURITY This manual covers managing users, groups, and permissions for Lucity. Version: 2017r2 CONTENTS SECURITY... 1 Security Program... 2 Getting Started... 3 Setting up a Security Admin User...
More informationBVA LLP Web Portal User Guide
BVA LLP Web Portal User Guide Opening the Web Portal Website The Web Portal is accessed from the link found on the BVA website homepage: http://www.bvateam.com Web Portal Users Each portal user requires
More informationSharePoint: Fundamentals
SharePoint: Fundamentals This class will introduce you to SharePoint and cover components available to end users in a typical SharePoint site. To access SharePoint, you will need to log into Office 365.
More informationHCP Anywhere. By Storage & Cloud Services. Quick Start Guide Nov 2017 HCP ANYWHERE
HCP Anywhere By Storage & Cloud Services Quick Start Guide Nov 2017!1 Getting Connected HCP Anywhere - Update Password Step 1 Login to A*CRC Storage and Cloud Service website to update your password. https://profiler.acrc.a-star.edu.sg/admin/passwd.php!2
More information[Type here] ID Capture V1.0
ID CAPTURE USER GUIDE V 1.0 03/02/2016 Contents Installing... 2 Installation Requirements... 2 Installation... 3 Installing USB Camera... 3 Getting Started... 4 Orientation... 5 Configuring... 6 System...
More informationNotifyMDM Device Application User Guide Installation and Configuration for Android
NotifyMDM Device Application User Guide Installation and Configuration for Android NotifyMDM for Android, Version 3.x NotifyMDM for Android 1 Table of Contents NotifyMDM for Android 3 Installation Instructions
More informationProtection Blocking. Inspection. Web-Based
Protection Blocking Inspection Web-Based Anti-Virus & removal of dangerous attachments. Prevent your server from being used as open-relay. Stop mail-loops. Blocks open relay sources. Isolate known spam
More informationQuest Desktop Authority Full Build Update Release Notes
Quest Desktop Authority Full Build Update 10.1.0.1006 Release Notes January 5, 2018 Version 10.1.0.1006 Importance: Mandatory Contents Readme Resolved Issues Compatibility of This Update Installing This
More informationCLOUD MAIL Administrator User Guide. (Version 1.0)
Administrator User Guide () Table of Contents 1. How to Login the Administration Panel... 3 2. How to Update Administrator Information... 4 3. How to Check the Cloud Mail Account Information... 4 4. How
More informationComodo Antispam Gateway Software Version 2.11
Comodo Antispam Gateway Software Version 2.11 User Guide Guide Version 2.11.041917 Comodo Security Solutions 1255 Broad Street Clifton, NJ, 07013 Table of Contents 1 Introduction to Comodo Antispam Gateway...3
More informationEnterprise Vault.cloud CloudLink Google Account Synchronization Guide. CloudLink to 4.0.3
Enterprise Vault.cloud CloudLink Google Account Synchronization Guide CloudLink 4.0.1 to 4.0.3 Enterprise Vault.cloud: CloudLink Google Account Synchronization Guide Last updated: 2018-06-08. Legal Notice
More informationPrint Manager Plus 2010 Workgroup Print Tracking and Control
INTRODUCTION: This is intended to assist in the initial installation or evaluation of Print Manager Plus 2010 Workgroup Edition. This will guide you through tracking your printing whether your workgroup
More informationAT&T Business Messaging Account Management
Account Management Administrator User Guide July 2016 1 Copyright 2016 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks contained herein are trademarks of AT&T
More informationAdministration Manual
Administration Manual Enterprise Edition V 2018.04.27 @2018 Call2Unlock http://www.call2unlock.com Page1 Content SYSTEM OVERVIEW... 3 Introduction... 3 INSTALLATION AND CONFIGURATION... 6 1. Updating the
More informationMicrosoft Windows SharePoint Services
Microsoft Windows SharePoint Services SITE ADMIN USER TRAINING 1 Introduction What is Microsoft Windows SharePoint Services? Windows SharePoint Services (referred to generically as SharePoint) is a tool
More informationCitraNet. User Guide & Frequently Asked Questions. Rev. 12/14 T:\Citranet\Citranet Documentation\cnguide.pdf
CitraNet User Guide & Frequently Asked Questions Rev. 12/14 T:\Citranet\Citranet Documentation\cnguide.pdf Figure 1 Citranet.net Home Page 1. Enter your (4) digit Supplier ID # obtained from the FDACS.
More informationInterface Reference. McAfee Application Control Windows Interface Reference Guide. Add Installer page. (McAfee epolicy Orchestrator)
McAfee Application Control 8.1.0 - Windows Interface Reference Guide (McAfee epolicy Orchestrator) Interface Reference Add Installer page Add an existing installer to the McAfee epo repository. Table 1
More informationPRODUCT MANUAL. idashboards Reports Admin Manual. Version 9.1
PRODUCT MANUAL idashboards Reports Admin Manual Version 9.1 idashboards Reports Admin Manual Version 9.1 No part of the computer software or this document may be reproduced or transmitted in any form or
More information271 Waverley Oaks Rd. Telephone: Suite 206 Waltham, MA USA
Contacting Leostream Leostream Corporation http://www.leostream.com 271 Waverley Oaks Rd. Telephone: +1 781 890 2019 Suite 206 Waltham, MA 02452 USA To submit an enhancement request, email features@leostream.com.
More informationNTP Software VFM Administration Web Site
NTP Software VFM Administration Web Site User Manual Version 7.1 This guide details the method for using NTP Software VFM Administration Web Site, from an administrator s perspective. Upon completion of
More informationSafeConsole On-Prem Install Guide. version DataLocker Inc. July, SafeConsole. Reference for SafeConsole OnPrem
version 5.2.2 DataLocker Inc. July, 2017 SafeConsole Reference for SafeConsole OnPrem 1 Contents Introduction................................................ 2 How do the devices become managed by SafeConsole?....................
More informationNETWRIX INACTIVE USER TRACKER
NETWRIX INACTIVE USER TRACKER QUICK-START GUIDE Product Version: 3.0.106 March 2014. Legal Notice The information in this publication is furnished for information use only, and does not constitute a commitment
More information29 March 2017 SECURITY SERVER INSTALLATION GUIDE
29 March 2017 SECURITY SERVER INSTALLATION GUIDE Contents 1. Introduction... 2 1.1 Assumptions... 2 1.2 Prerequisites... 2 2. Required setups prior the Security Server Installation... 3 1.1 Create domain
More informationSophos Mobile SaaS startup guide. Product version: 7.1
Sophos Mobile SaaS startup guide Product version: 7.1 Contents 1 About this guide...4 2 What are the key steps?...5 3 Change your password...6 4 Change your login name...7 5 Activate SMC Advanced licenses...8
More informationSophos Enterprise Console help. Product version: 5.5
Sophos Enterprise Console help Product version: 5.5 Contents 1 About Sophos Enterprise Console...6 2 Guide to the Enterprise Console interface...7 2.1 User interface layout...7 2.2 Toolbar buttons...7
More informationTable of Contents. User Manual
USER MANUAL 5.0 Table of Contents Introduction... 2 Features and Benefits... 2 Overview... 3 Standard User... 3 Administrator... 3 Unconnected... 3 Connect or Connected... 4 Configuration... 5 Settings...
More informationShipStation Connect. Which scenario works for you?
ShipStation Connect Which scenario works for you? ShipStation Connect. what is it? ShipStation Connect is an application that is installed on the computer with the Printers and/or Scales directly connected
More informationVMware AirWatch Chrome OS Platform Guide Managing Chrome OS Devices with AirWatch
VMware AirWatch Chrome OS Platform Guide Managing Chrome OS Devices with AirWatch AirWatch v9.3 Have documentation feedback? Submit a Documentation Feedback support ticket using the Support Wizard on support.air-watch.com.
More informationFrom using an External Harddrive, to a Google Cloud Drive; there is no one way to backup data.
Mac (OS X): Data Backup Guide 6/14/2016 Why: Backing up data should be done on a regular basis, not just when you think it is necessary, as a failure can happen at any time. While there are no set intervals
More informationSophos Enterprise Console
Sophos Enterprise Console Help Product Version: 5.5 Contents About Sophos Enterprise Console...1 Guide to the Enterprise Console interface... 2 User interface layout... 2 Toolbar buttons...2 Dashboard
More information8 MANAGING SHARED FOLDERS & DATA
MANAGING SHARED FOLDERS & DATA STORAGE.1 Introduction to Windows XP File Structure.1.1 File.1.2 Folder.1.3 Drives.2 Windows XP files and folders Sharing.2.1 Simple File Sharing.2.2 Levels of access to
More informationINSTALLATION INSTRUCTIONS
INSTALLATION INSTRUCTIONS The DPA program must be updated annually for tax, law, and system changes. We recommend that you always back up and/or copy the program s folder to another location prior to installation.
More informationUser Guide. Version R95. English
Cloud Backup User Guide Version R95 English September 11, 2017 Copyright Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept EULATOS
More informationShareSync Get Started Guide for Mac
ShareSync Get Started Guide for Mac ShareSync Overview ShareSync is a file backup and sharing service. It allows you to: Back up your files in real-time to protect against data loss from ransomware, accidental
More informationWorkspace ONE Chrome OS Platform Guide. VMware Workspace ONE UEM 1811
Workspace ONE Chrome OS Platform Guide VMware Workspace ONE UEM 1811 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ If you have comments about
More informationBarracuda Firewall Release Notes 6.6.X
Please Read Before Upgrading Before installing the new firmware version, back up your configuration and read all of the release notes that apply to the versions that are more current than the version that
More informationKernel Migrator. for SharePoint. Configuration Guide
Kernel Migrator for SharePoint Table of Contents 1. System Requirements... 4 1.1 Minimum System Requirements... 4 1.2 Required Operating Systems... 4 1.3 Supported Virtual Environment... 4 1.4 Supported
More informationManagement Console User s Guide (AST 2500 Chipset)
Management Console User s Guide (AST 2500 Chipset) Version: 1.2 Table of Contents Using Your Management Console... 2 Management Console Key Features and Functions... 3 Software Install... 4 Prerequisites
More informationPort Forwarding Technical Support Guide
Port Forwarding Technical Support Guide Copyright Copyright 2015 NetComm Wireless Limited. All rights reserved. The information contained herein is proprietary to NetComm Wireless. No part of this document
More informationIT Support Documentation
Table of Contents Introduction to OneDrive... 2 Accessing OneDrive via Office 365... 3 Uploading a File to OneDrive... 7 Sharing a File Within OneDrive... 10 Working with the OneDrive Desktop App... 15
More informationInstalling and Configuring Citrix XenApp 6.5 (Part 1)
Installing and Configuring Citrix XenApp 6.5 (Part 1) Introduction The first part of this series describes the installation steps of the first server (which will create the XenApp environment) and the
More informationQUICK START GUIDE PRINT MANAGER PLUS RELEASE STATION Software Shelf Computer Software. Take Control of Your Network Printing
Software Shelf Computer Software QUICK START GUIDE PRINT MANAGER PLUS RELEASE STATION 2008 Take Control of Your Network Printing United States 601 Cleveland Street, Suite 710 Clearwater, FL 33755 Sales:
More informationOneDrive. Office 365
OneDrive Office 365 What s covered? What is OneDrive? (slide 2-3) Is OneDrive like Microsoft Office? (slide 4) How do I get started? (slide 5-6) File types in the documents list (slide 7) How do I get
More informationHow to use OneDrive in the Cloud. Access OneDrive
How to use OneDrive in the Cloud Access OneDrive 1. Log into my.scranton.edu 2. Select the envelope icon to access your Office 365 applications 3. In the left corner, click on the app launcher 4. Select
More informationGFI WebMonitor 4.0 ReportPack. Manual. By GFI Software Ltd.
GFI WebMonitor 4.0 ReportPack Manual By GFI Software Ltd. GFI SOFTWARE Ltd. http://www.gfi.com E-mail: info@gfi.com Information in this document is subject to change without notice. Companies, names, and
More informationClient Configuration Guide
Email Client Configuration Guide Contents Prerequisites... 1 Microsoft Outlook 2007... 2 Microsoft Outlook 2002/XP and 2003... 7 Microsoft Windows Mail (available with Vista only)... 11 Microsoft Outlook
More informationUser Manual. User Manual. AnyShare 1/ 16
AnyShare 1/ 16 Catalog All Rights Reserved... 3 Perface... 4 Chapter 1 About AnyShare5.0... 5 1.1 Role Introduction... 5 1.2 Module Introduction... 5 Chapter 2 QuickStart... 6 2.1 PC Client... 6 2.1.1
More informationFairfield University Using Xythos for File Storage
Fairfield University Using Xythos for File Storage Version 7.0 Table of Contents I: Accessing your Account...2 II: Uploading Files via the Web...2 III: Manage your Folders and Files via the Web...4 IV:
More informationSophos Enterprise Console Help. Product version: 5.3
Sophos Enterprise Console Help Product version: 5.3 Document date: September 2015 Contents 1 About Sophos Enterprise Console 5.3...6 2 Guide to the Enterprise Console interface...7 2.1 User interface layout...7
More informationInstalling the WinSCP Secure FTP Client
Draft 0.9 Page 1 of 6 Installing the WinSCP Secure FTP Client This document will instruct you to install the WinSCP application that will provide Secure FTP (SFTP) access to your website folder. So why
More informationCauseway ECM Team Notifications. Online Help. Online Help Documentation. Production Release. February 2016
Causeway ECM Team Notifications Online Help Production Release February 2016 Causeway Technologies Ltd Comino House, Furlong Road, Bourne End, Buckinghamshire SL8 5AQ Phone: +44 (0)1628 552000, Fax: +44
More informationVSkyBox User Guide. Document Revision: v1.01 April 10, VSkyBox User Portal Guide i
VSkyBox User Guide Document Revision: v1.01 April 10, 2017 VSkyBox User Portal Guide i Table of Contents 1 Getting Started with VSkyBox... 1 1.1 Setting Up VSkyBox... 1 1.2 Opening VSkyBox... 3 1.3 Logging
More informationVMware AirWatch Database Migration Guide A sample procedure for migrating your AirWatch database
VMware AirWatch Database Migration Guide A sample procedure for migrating your AirWatch database For multiple versions Have documentation feedback? Submit a Documentation Feedback support ticket using
More informationSupplier Directory User Guide: Procurement Support Centre
Supplier Directory User Guide: Procurement Support Centre Procurement Support Centre December 30, 2015 Contents Supplier Directory Goal:... 2 Login Screen... 2 Approvals menu button... 3 Supplier Accounts
More informationApple Exam 9L0-412 OS X Support Essentials 10.8 Exam Version: 6.3 [ Total Questions: 86 ]
s@lm@n Apple Exam 9L0-412 OS X Support Essentials 10.8 Exam Version: 6.3 [ Total Questions: 86 ] Question No : 1 You are logged into a MacBook Pro as a standard user. How can you display the OS X Mountain
More informationNTP Software VFM Administration Web Site For Microsoft Azure
NTP Software VFM Administration Web Site For Microsoft Azure User Manual Revision 1.1. - July 2015 This guide details the method for using NTP Software VFM Administration Web Site, from an administrator
More informationSophos Mobile as a Service
startup guide Product Version: 8 Contents About this guide... 1 What are the key steps?... 2 Change your password... 3 Change your login name... 4 Activate Mobile Advanced licenses...5 Check your licenses...6
More informationLockout PRO Online User Guide
Lockout PRO Online User Guide February 2009 Copyright Wizmo Inc. 2006-2009 Page 1 Contents Setting up the hosted environment... 3 Logging into the Hosted Desktop... 8 Directories... 14 Logging off the
More informationBACKUP APP V7 QUICK START GUIDE FOR SYNOLOGY NAS
BACKUP APP V7 QUICK START GUIDE FOR SYNOLOGY NAS Revision History Date Descriptions Type of modification 29 Jun 2016 First Draft New 25 Nov 2016 Modified Ch 3 Download Backup App, Ch 3 Install Backup App
More informationOUTLOOK ATTACHMENT EXTRACTOR 3
OUTLOOK ATTACHMENT EXTRACTOR 3 PROGRAM HELP GILLMEISTER SOFTWARE WWW.GILLMEISTER-SOFTWARE.COM 1 TABLE OF CONTENTS 1 Table of contents... 1 2 Start... 4 3 Main menu... 4 3.1 Menu entries of the group Menu...
More informationEthernet/Network Communications Module. Installation and Programming Manual. LINQ2 - Two (2) Port Connectivity Module. More than just power.
Ethernet/Network Communications Module Installation and Programming Manual LINQ2 - Two (2) Port Connectivity Module DOC#: LINQ2 Rev. 060514 More than just power. Overview: Altronix LINQ2 network module
More informationDecision Support Software (DSS)
Decision Support Software (DSS) 2017.1 March 11, 2017 2017 Tyler Technologies. All Rights Reserved. All rights reserved. Information within this document is the sole property of Tyler Technologies and
More informationWorkspace Administrator Help File
Workspace Administrator Help File Table of Contents HotDocs Workspace Help File... 1 Getting Started with Workspace... 3 What is HotDocs Workspace?... 3 Getting Started with Workspace... 3 To access Workspace...
More informationWeb Console Setup & User Guide. Version 7.1
Web Console Setup & User Guide Version 7.1 1 Contents Page Number Chapter 1 - Installation and Access 3 Server Setup Client Setup Windows Client Setup Mac Client Setup Linux Client Setup Interoperation
More information6.1. Getting Started Guide
6.1 Getting Started Guide Netmon Getting Started Guide 2 Contents Contents... 2 Appliance Installation... 3 IP Address Assignment (Optional)... 3 Logging In For the First Time... 5 Initial Setup... 6 License
More informationNTP Software VFM. Administration Web Site for EMC Atmos User Manual. Version 6.1
NTP Software VFM Administration Web Site for EMC Atmos User Manual Version 6.1 This guide details the method for using NTP Software VFM Administration Web Site, from an administrator s perspective. Upon
More informationSpaceShuttle User guide v3
SpaceShuttle User guide v3 1.Get Started with SpaceShuttle p2 1.1 For Windows p2 How to download and install Aspera Connect p2 1.2 For Mac p4 How to download and install Aspera Connect p4 2. Accessing
More information