Networks: Access Management Windows NT Server Class Notes # 10 Administration October 24, 2003
|
|
- Millicent Thomas
- 5 years ago
- Views:
Transcription
1 Networks: Access Management Windows NT Server Class Notes # 10 Administration October 24, 2003 In Windows NT server, the user manager for domains is the primary administrative tool for managing user accounts, groups, and security policies for domains and computers on the network. User manager for domains only run on NT server machines. If you run the user manager on an NT workstation or an NT server that is not a domain controller, then you get the cut down version simply called the user manager rather than the user manager for domains. The NT workstation creates and manages user accounts with a program called simply user manager. The job of the user manager on machine XYZ is to create user accounts that are only relevant and useful on machine XYZ. If a user on machine ABC wants to get access to data on machine XYZ, the owner of machine XYZ would have to create an account for the user on ABC on the XYZ machine with the user manager on machine XYZ. On NT servers, the primary domain controller holds a shared database of all users known to the machines that have all agreed to constitute a domain. That way, if a user needs access to servers in a domain, then all you ve got to do is build a single domain wide account for that user and build a domain wide account with the user manager for domains. User accounts contain information like the user name, the password, and a description. All of that data sits in a file called SAM in the primary domain controller s \winnt\system32\config directory. SAM (Security Access Manager) lives in the PDC s registry, in an area that s grayed out if you try to peek into it. Whenever you run the user manager for domains, you re directly manipulating that part of the registry on the PDC. No matter what machine you run the user manager for domains from, your changes get stored in the PDC s registry. User manager for domains provides the network administrator with the means to: Create, modify, and delete user accounts in the domain Define a user s desktop environment and network connections Assign logon scripts to user accounts Manage groups and group membership within the accounts in a domain Manage trust relationships between different domains in the network Manage a domain s security policies If you are logged on as an administrator and you start up the user manager for domains, all of its features are available to you. If you log on as a member of the account operators group, you won t be able to use some of the user manager for domain s capabilities; you can manage most user accounts, but you cannot implement any of the security policies. If you log on as a mere mortal user, you can only look at user names with the user 1
2 manager for domains; the user manager for domains won t let you make any changes to those accounts. In NT server, a user account contains information such as the user s name, password, group membership, and rights and privileges the user has for accessing resources on the network. These details are shown in table one. Table 1: Information in a user account Part of user account Description Account type The particular type of user account; i.e. a local or global account. Expiration date A future date when the user account automatically becomes disabled. Full name The user s full name. Home directory A directory on the server that is private to the user, the user controls access to this directory. Logon hours The hours during which the user is allowed to log on to and access network services. Logon script A batch or executable file that runs automatically when the user logs on. Logon workstations The computer names of the NT workstations that the user is allowed to work from (by default, the user can work from any workstation) Password The user s secret password for logging on to his or her account. Profile A file containing a record of the user s desktop environment (program group, network connections, screen color, and settings that determine what aspects of the environment the user can change) on NT workstations. Username A unique name the user types when logging on. Pre-built Accounts If you re creating a new domain, you ll notice that two accounts called administrator and guest are built already. The administrator account is an account with complete power over a domain. You can t delete it, but you can rename it. You assigned the password for the domain s administrator account when you installed NT server on the machine that became the primary domain controller for the domain. The other account is the guest account. Guest means anyone that the domain doesn t recognize. By default, this account is disabled, and it should stay that way. The guest account is pretty restricted in the things it can do. If the guest account is enabled on the server, then a user logged on to an NT workstation can have access to a domain resource even thou that user does not have a domain account. The mere fact that there is an enabled guest account pretty much says to NT, leave the back door open, okay? So be careful when enabling the guest account. 2
3 Predefined Groups A number of predefined groups, both local and global, are built into NT server to aid network administration and management. The local groups are: Administrator Server operator Account operator Print operator Backup operator Everyone Users Guests Replicator Administrator Members of the administrators local group have more control over the domain than any other users, and they are granted all of the rights necessary to manage the overall configuration of the domain and the domain s servers. Within the administrator group is a built-in administrator user account that cannot be deleted. By default, the domain administrators global group is also a member of the administrator group, but it can be removed. Server operator The server operators local group has all of the rights needed to manage the domain s servers. Members of the server operations group can create, manage, and delete printer shares at servers; create, manage, and delete network shares at servers; back up and restore files on servers; format a server s fixed disk; lock and unlock servers; and change the system time. In addition, server operators can log on the network from the domain s servers as well as shut down the servers. Account operator Members of the account operators local group are allowed to use user manager for domains to create user accounts and groups for the domain, and to modify or delete most of the domain s user accounts and groups. An account operator cannot modify or delete the following groups: Administrators Domain admins Account operators Backup operators Print operators Server operators Likewise, members of this group cannot modify or delete user accounts of administrator. They cannot administer the security policies, but they can use the server manager to add computers to a domain, log on at servers, and shut down servers 3
4 Print operator Members of this group can create, manage, and delete printer shares for an NT server server. Additionally, they can log on at and shut down servers. Backup operator The backup operator local group provides its members the rights necessary to back up directories and files from a server and to restore directories and files to a server. Like the print operators, they can log on at and shut down servers. Everyone Everyone is not actually a group, and it doesn t appear in the user management list, but you can assign rights and permissions to it. Anyone who has a user account in the domain, including all local and remote users, is automatically a member of the everyone local group. Not only are members of this group allowed to connect over the network to a domain s servers, but they are also granted the advanced right to change directories and travel through a directory tree that they may not have permission on. Members of the everyone group also have the right to lock the server, but won t be able to unless they ve been granted the right to log on locally at the server. Users Members of the group simply called users have minimal rights at servers running NT server. They are granted the right to create and manage local groups, but unless they have access to the user manager for domains tool (such as by being allowed to log on locally at the server), they can t perform this task. Members of the users group do posses certain rights at their local NT workstations. Guests This is NT server s built-in local group for occasional or one time users to log on. Members of this group are granted very limited abilities. Guests have no rights at the NT server servers, but they do possess certain rights at their own individual workstations. The built-in guest user account is automatically a member of the guest group. Replicator This local group, different from the others, supports directory replication functions. The only member of a domain s replicator local group should be a single domain user account, which is used to log on to the replicator services of the domain controller and to the other servers in the domain. User accounts of actual users should not be added to this group at all. Table two through nine summarizes the user rights and special abilities granted to NT server s predefined local groups. Table 2: Rights/Special abilities granted to the administrators group None none 4
5 Table 3: Rights/Special abilities granted to the administrators group Create and manage user accounts Access this computer from the network Create and manage global groups Take ownership of files Assign user rights Manage auditing and security log Lock the server & override the server s lock Change the system time Create common groups Format the server s hard disk Force shutdown from a remote system Keep a local profile Backup files and directories Share and stop sharing directories and printers Table 4: Rights/Special abilities granted to the server operators Lock the server & override the server s lock Change the system time Create common groups Format the server s hard disk Force shutdown from a remote system Keep a local profile Backup files and directories Share and stop sharing directories and printers Restore files and directories Table 5: Rights/Special abilities granted to the account operator Create and manage user accounts, global groups, and local groups Keep a local profile Table 6: Rights/Special abilities granted to the print operators Keep a local profile Share and stop sharing printers Table 7: Rights/Special abilities granted to the backup operators Keep a local profile Backup files and directories Restore files and directories Table 8: Rights/Special abilities granted to the everyone group Access this computer from the network Lock the server Table 9: Rights/Special abilities granted to the Users group None Create and manage local groups 5
6 Global groups NT server has only three built-in global groups: Domain Administrator Domain Users Domain Guests Domain Administrator By placing a user account into this global group, you provide administrative level abilities to that user. Members of domain administrator can administer the home domain, the workstations of the domain, and any other trusted domains that have added the domain administrator global group to their own administrator local group. By default, the built-in domain administrator group is a member of both the domain s administrators local group and the administrators local group for every NT workstation in the domain. The built-in administrator user account for the domain is automatically a member of the domain administrator global group. Domain Users Members of the domain users global group have normal user access to, and abilities for, both the domain itself and for any NT workstation in the domain. This group contains all domain user accounts, and is by default a member of the users local groups for both the domain and for every Windows NT workstation on the domain. Domain Guests This group allows guest accounts to access resources across domain boundaries, if they ve been allowed that by the domain administrators. In addition to the built-in local and global groups, a few special groups appear now and again when viewing certain lists of groups: Interactive: Anyone using the computer locally Network: All users connected over the network to a computer System: The operating system Creator owner: The creator and /or owner of subdirectories, files, and print jobs. The interactive and network groups combined form the everyone local group. 6
7 Adding computers to a Domain Members of the Administrators, Domain Admins, and Account Operators groups can grant computers membership in a domain. It is the computers that are acknowledged as members of the domain and not the users. Adding a computer to a domain is a two-stop process. First, the machine account for the computer must be created in the domain. Then, the computer must actually join the domain a separate step, performed at the computer itself during installation of NT or afterwards in its Control Panel. You can create a machine account for an NT machine by: 1. Launch Server Manager at the Windows NT Server. 2. From the computer menu, choose add to domain. You will see the add computer to domain dialog box. 3. Under Computer type, choose the option Windows NT Workstation or Server. 4. Type the computer name, and choose Add. 5. You can continue adding other computers and close when you are finished. Joining a Workgroup or Domain with Windows NT workstation 4.0 You can join a workgroup or a Windows NT server domain from the Network dialog box. To join a workgroup, you must log on as a member of the administrator group or the Domain Admins global group. Make sure you specify a workgroup name that is not the same as the computer name. When joining a domain, check with the system administrator to make sure you re using the correct domain name and that you have a user account on that domain. To join a workgroup or domain, follow these steps: 1. In the network dialog box, choose the identification tab and choose change. The identification changes dialog box appears. 2. In the Member of area, choose either Workgroup or Domain. In the text box, enter the exact name of the workgroup or domain. 3. If you choose Domain and you re the domain administrator, enter the user name and password of your account. This is not required if you have created an account for the computer in the server manager of the domain controller. 4. Choose OK to close the dialog box. If you joined a domain, a welcome dialog box appears; choose OK to close the box. Joining a Workgroup or Domain with Windows 9X To configure Windows 9X to join a domain, perform the following steps: 1. Click start, Control Panel, and Networking. You will see the Network dialog box. 2. Select the Configuration tab and double click the Client for Microsoft Networks. 3. In the Logon Validation section, check the box labeled Log on to Windows NT domain and fill in the domain s name. Click OK to return to the Network applet and OK again to tell the Control Panel that you re finished. It will load some files and reboot. 4. Once the computer reboots, you ll see a new login dialog box, one field is the domain field. 7
5 MANAGING USER ACCOUNTS AND GROUPS
MANAGING USER ACCOUNTS AND GROUPS.1 Introduction to user accounts Objectives.2 Types of User Accounts.2.1 Local User Account.2.2 Built-in User Account.2.3 Domain User Account.3 User Profile.3.1 Content
More informationChapter 6: Connecting Windows Workstations
Chapter 6: Connecting Windows Workstations 153 Chapter 6 Connecting Windows Workstations Because this is a book about using Linux on a Microsoft Windows-based network, this chapter shows you how to connect
More informationLesson 3: Identifying Key Characteristics of Workgroups and Domains
1-16 Chapter 1 Introduction to Windows XP Professional Lesson 3: Identifying Key Characteristics of Workgroups and Domains Windows XP Professional supports two types of network environments in which users
More informationFaculty of Engineering Computer Engineering Department Islamic University of Gaza Network Lab # 5 Managing Groups
Faculty of Engineering Computer Engineering Department Islamic University of Gaza 2012 Network Lab # 5 Managing Groups Network Lab # 5 Managing Groups Objective: Learn about groups and where to create
More information8 Administering Groups
8 Administering Groups Exam Objectives in this Chapter: Plan a security group hierarchy based on delegation requirements. Plan a security group strategy. Why This Chapter Matters As an administrator, you
More information29 March 2017 SECURITY SERVER INSTALLATION GUIDE
29 March 2017 SECURITY SERVER INSTALLATION GUIDE Contents 1. Introduction... 2 1.1 Assumptions... 2 1.2 Prerequisites... 2 2. Required setups prior the Security Server Installation... 3 1.1 Create domain
More informationWindows Server 2003 Network Administration Goals
Objectives Differentiate between the different editions of Windows Server 2003 Explain Windows Server 2003 network models and server roles Identify concepts relating to Windows Server 2003 network management
More informationRecent Operating System Class notes 04 Managing Users on Windows XP March 22, 2004
Recent Operating System Class notes 04 Managing Users on Windows XP March 22, 2004 You log into a system to notify the system who you are. When you log off, any files you have opened are cleaned up, and
More informationSelect the Akeni Pro Server installation file that matches your operating system and double-click on the file.
Akeni Pro Server Administration Guide (Version 2) Contents Chapter 1 Chapter 2 Chapter 3 Getting Started.: 1 Pro Server Installation.: 2 Launching Akeni Pro Server.: 3 Pro Client Installation.: 4 Launching
More informationContents. Why You Should Read This Manual...ix. 1. Introduction... 1
Contents Why You Should Read This Manual...ix 1. Introduction... 1 Understanding Security... 2 Group and User Accounts... 2 Application Features... 3 Security Areas... 3 Using Windows Security... 7 Synchronizing
More informationEbook : Overview of application development. All code from the application series books listed at:
Ebook : Overview of application development. All code from the application series books listed at: http://www.vkinfotek.com with permission. Publishers: VK Publishers Established: 2001 Type of books: Develop
More informationHP OpenVMS CIFS Version 1.2 Migration Guide
HP OpenVMS CIFS Version 1.2 Migration Guide Copyright 2010 Hewlett-Packard Development Company, L.P. Confidential computer software. Valid license from HP required for possession, use or copying. Consistent
More informationIntroduction to Active Directory
UT ntroduction to Active irectory 5-1 Topics for this Unit irectory ervices Active irectory Forests omains rganizational Units Groups A features ites Accounts 5-1 irectory ervice A directory service is
More informationHow to create a System Logon Account in Backup Exec for Windows Servers
How to create a System Logon Account in Backup Exec for Windows Servers Problem How to create a System Logon Account in Backup Exec for Windows Servers Solution The Backup Exec System Logon Account (SLA)
More informationConfigure advanced audit policies
7 LESSON Configuring Advanced Audit Policies 70-411 EXAM OBJECTIVE Objective 2.4 Configure advanced audit policies. This objective may include but is not limited to: implement auditing using Group Policy
More informationx CH03 2/26/04 1:24 PM Page
03 078973107x CH03 2/26/04 1:24 PM Page 45 3............................................. Setting Up, Managing, and Troubleshooting Security Accounts and Policies 1. You re a help desk technician for your
More informationAs a first-time user, when you log in you won t have any files in your directory yet.
Welcome to Xythos WFS. This program allows you to share files with others over the Internet. When you store a file within your WFS account, you can make it selectively available to be viewed, edited, deleted,
More informationChapter. Accessing Files and Folders MICROSOFT EXAM OBJECTIVES COVERED IN THIS CHAPTER
Chapter 10 Accessing Files and Folders MICROSOFT EXAM OBJECTIVES COVERED IN THIS CHAPTER Monitor, manage, and troubleshoot access to files and folders. Configure, manage, and troubleshoot file compression
More informationRWT Network System Installation Guide
RWT Network System Installation Guide Copyright 2003, Talking Fingers, Inc. Page 1 of 48 This document is Copyright 2003 by Talking Fingers, Inc. All rights are reserved. This document may not be copied
More informationSetting Access Controls on Files, Folders, Shares, and Other System Objects in Windows 2000
Setting Access Controls on Files, Folders, Shares, and Other System Objects in Windows 2000 Define and set DAC policy (define group membership, set default DAC attributes, set DAC on files systems) Modify
More informationFilesharing. Jason Healy, Director of Networks and Systems
Filesharing Jason Healy, Director of Networks and Systems Last Updated Mar 18, 2008 2 Contents 1 Name of Project Here 5 1.1 Introduction.............................. 5 1.2 Initial Setup..............................
More informationCOPYRIGHTED MATERIAL. Configuring, Deploying, and Troubleshooting Security Templates. Chapter MICROSOFT EXAM OBJECTIVES COVERED IN THIS CHAPTER:
Chapter 1 Configuring, Deploying, and Troubleshooting Security Templates MICROSOFT EXAM OBJECTIVES COVERED IN THIS CHAPTER: Configure security templates. Configure registry and file system permissions.
More informationLocal Area Networks (LAN s)
Local Area Networks (LAN s) Local area networks are computers connected together in a single location. They vary in size from two computers connected together to share a printer, to hundreds of computers
More informationIDEVWORKS TECHNOLOGIES. SurfStation 9.0 Cyber Café Timer Software. SurfStation 9.0 User Guide
IDEVWORKS TECHNOLOGIES SurfStation 9.0 Cyber Café Timer Software SurfStation 9.0 User Guide S U R F S T A T I O N 9.0 C Y B E R C A F É T I M E R A N D M A N A G E R SurfStation 9.0 Installation Guide
More informationCar Park Control System Software User Manual
Disclaimer Information in this document is subject to change without notice. Companies, names, and data used in examples herein are fictitious unless otherwise noted. No part of this document may be reproduced
More informationCODESOFT uses NT security. The network administrator will need to set up the users as needed per the requirements of 21 CFR Part 11.
Healthcare and Pharmaceutical Label Printing Tools for 21 CFR Part 11 Compliance This applies to versions 7.x or greater of CODESOFT Enterprise CODESOFT Enterprise label design software provides features
More informationPrivileged Identity App Launcher and Session Recording
Privileged Identity App Launcher and Session Recording 2018 Bomgar Corporation. All rights reserved worldwide. BOMGAR and the BOMGAR logo are trademarks of Bomgar Corporation; other trademarks shown are
More informationCISNTWK-11. Microsoft Network Server. Chapter 4
CISNTWK-11 Microsoft Network Server Chapter 4 User and Group Accounts 1 Usage Notes Throughout these slides, the term Active Directory Domain implies Domains Based on Windows Server 2008 Based on Windows
More informationWESTAT REMOTE ACCESS (WRA)
WESTAT REMOTE ACCESS (WRA) SET UP INSTRUCTIONS The following instructions will allow you to access Westat s Citrix XenApp Web Interface (WXA). This document will teach you how to access Westat s At Home
More informationPrint Audit 6. Print Audit 6 Documentation Apr :07. Version: Date:
Print Audit 6 Version: Date: 37 21-Apr-2015 23:07 Table of Contents Browse Documents:..................................................... 3 Database Documentation.................................................
More informationPassword Changer User Guide
Active@ Password Changer User Guide Copyright 1999-2017, LSOFT TECHNOLOGIES INC. All rights reserved. No part of this documentation may be reproduced in any form or by any means or used to make any derivative
More informationUser Guide. Version R94. English
AuthAnvil User Guide Version R94 English March 8, 2017 Copyright Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept EULATOS as updated
More informationUnified CCE Security Compliance for Windows Server 2012 R2
Unified CCE Security Compliance for Windows Server 2012 R2 This topic contains the security baseline for hardening Windows Server 2012 R2 Servers running Unified CCE. This baseline is essentially a collection
More informationWelcome to ncrypted Cloud!... 4 Getting Started Register for ncrypted Cloud Getting Started Download ncrypted Cloud...
Windows User Manual Welcome to ncrypted Cloud!... 4 Getting Started 1.1... 5 Register for ncrypted Cloud... 5 Getting Started 1.2... 7 Download ncrypted Cloud... 7 Getting Started 1.3... 9 Access ncrypted
More informationWindows User Manual 1
Windows User Manual 1 Creating and Installing a Dropbox Account... 3 How to Create a Dropbox Account... 3 How to Install Dropbox... 3 How to Register and Sign into Dropbox... 3 Install and Register for
More informationUser Guide. Version R92. English
AuthAnvil User Guide Version R92 English October 9, 2015 Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept EULATOS as updated from
More informationData Privilege Adding or Removing Members
Data Privilege allows you to add or remove Members, aka Users, (individuals permitted to access all or portions of a group s resources) from any security group for which you are an Owner or an Authorizer.
More informationA NETWORK PRIMER. An introduction to some fundamental networking concepts and the benefits of using LANtastic.
A NETWORK PRIMER An introduction to some fundamental networking concepts and the benefits of using LANtastic. COPYRIGHT 1996 Artisoft, Inc. All Rights Reserved. This information file is copyrighted with
More informationSmart Access Control System Software User Manual (Client Version)
Disclaimer Information in this document is subject to change without notice. Companies, names, and data used in examples herein are fictitious unless otherwise noted. No part of this document may be reproduced
More informationBackup using Quantum vmpro with Symantec Backup Exec release 2012
Backup using Quantum vmpro with Symantec Backup Exec release 2012 Step 1) If the vmpro appliance name and IP address are not resolved through DNS, update the Windows hosts file to include the IP address
More informationUser Profile Manager 2.0
User Profile Manager 2.0 User Guide ForensiT Limited, 75 Riverside III, Sir Thomas Longley Road, Rochester, Kent, ME2 4BH England. Tel: US 1-877-224-1721 (Toll Free) Intl. +44 (0) 845 838 7122 Fax: +44
More informationFile systems security: Shared folders & NTFS permissions, EFS Disk Quotas
File systems security: Shared folders & NTFS permissions, EFS Disk Quotas (March 23, 2016) Abdou Illia, Spring 2016 1 Learning Objective Understand Shared Folders Assign Shared Folder permissions NTFS
More informationC UNIT 4. Active Directory User Accounts
UN 4 Active irectory User Accounts 2005-2010 efinitions User individual granted access to the system with the following User properties Groups associated with the user Profile path Login script Home directory
More informationNetworks: Access Management Windows 2000 Server Class Notes # 22 Building an Active Directory February 26, 2004
Networks: Access Management Windows 2000 Server Class Notes # 22 Building an Active Directory February 26, 2004 Windows 2000 separates the process of installing Windows 2000 server from the process of
More informationUSE QUICK ASSIST TO REMOTELY TROUBLESHOOT A FRIEND S COMPUTER
USE QUICK ASSIST TO REMOTELY TROUBLESHOOT A FRIEND S COMPUTER Windows 10 s Anniversary Update brings a new Quick Assist feature. Built into Windows 10, Quick Assist allows you to take remote control of
More information8 MANAGING SHARED FOLDERS & DATA
MANAGING SHARED FOLDERS & DATA STORAGE.1 Introduction to Windows XP File Structure.1.1 File.1.2 Folder.1.3 Drives.2 Windows XP files and folders Sharing.2.1 Simple File Sharing.2.2 Levels of access to
More informationROCK-POND REPORTING 2.1
ROCK-POND REPORTING 2.1 Installation and Setup Guide Revised on 09/25/2014 TABLE OF CONTENTS ROCK-POND REPORTING 2.1... 1 SUPPORT FROM ROCK-POND SOLUTIONS... 2 ROCK-POND REPORTING OVERVIEW... 2 INFRASTRUCTURE
More informationAretics T7 Installation Manual
Aretics T7 Installation Manual 1(24) Aretics T7 Installation Manual This document describes how to manage Aretics T7 in your IT environment. Here you will find information about installing the system,
More informationAll About Mapped Drives
All About Mapped Drives All About Mapped Drives Intro to Mapped Hard Drives Mapped drives can be very useful when it comes to moving data around on an office or home network and they do have their usefulness.
More informationRemote Support 19.1 Web Rep Console
Remote Support 19.1 Web Rep Console 2003-2019 BeyondTrust Corporation. All Rights Reserved. BEYONDTRUST, its logo, and JUMP are trademarks of BeyondTrust Corporation. Other trademarks are the property
More information2015 Optima Healthcare Solutions Page 2
Viewing Documents Logging into Rehab Optima 1. To log onto Rehab Optima, go to www.rehaboptima.com. To place an icon on your desktop for future use, right click in the light blue box and choose create
More informationAbila MIP DrillPoint Reports. Installation Guide
Abila MIP DrillPoint Reports This is a publication of Abila, Inc. Version 16.1 2015 Abila, Inc. and its affiliated entities. All rights reserved. Abila, the Abila logos, and the Abila product and service
More informationContents 1 INITIAL CONFIGURATION BEFORE CHANGING THE CONFIGURATION NETWORK SETUP PROCEDURE... 3
Network Guide Imation Matchprint Professional Server Contents 1 INITIAL CONFIGURATION... 2 2 BEFORE CHANGING THE CONFIGURATION... 2 3 NETWORK SETUP PROCEDURE... 3 4 ADDING SPOOLER AND HOT FOLDERS FOR NETWORK
More informationSAS 9.4 Management Console: Guide to Users and Permissions
SAS 9.4 Management Console: Guide to Users and Permissions SAS Documentation The correct bibliographic citation for this manual is as follows: SAS Institute Inc 2015. SAS 9.4 Management Console: Guide
More informationFiles.Kennesaw.Edu. Kennesaw State University Information Technology Services. Introduces. Presented by the ITS Technology Outreach Team
Kennesaw State University Information Technology Services Introduces Files.Kennesaw.Edu Presented by the ITS Technology Outreach Team Last Updated 08/12/13 Powered by Xythos Copyright 2006, Xythos Software
More informationATX Document Manager. User Guide
ATX Document Manager User Guide ATX DOCUMENT MANAGER User Guide 2008 CCH Small Firm Services. All rights reserved. 6 Mathis Drive NW Rome, GA 30165 No part of this manuscript may be copied, photocopied,
More informationLive Connect. Live Connect
2 Chapter 9 - Introduction Fig. 9.1 Brief Overview Pop-up Window provides single machine interface to give you full control over your endpoints with minimal end user interruption. It is built to help you
More informationRemote Support Web Rep Console
Remote Support Web Rep Console 2017 Bomgar Corporation. All rights reserved worldwide. BOMGAR and the BOMGAR logo are trademarks of Bomgar Corporation; other trademarks shown are the property of their
More informationUsing the Fiery WebTools
16 Using the Fiery WebTools The Fiery utilities enable remote users to view server functions. Users may also have the ability to manage jobs remotely if the system administrator has assigned them such
More informationPDS OnDemand. Getting Started Guide for Windows
PDS OnDemand Getting Started Guide for Windows Copyright Copyright 2009 ACS Technologies Group, Inc. All rights reserved. Reproduction of any part of this publication by mechanical or electronic means,
More informationData Manager. Scheduling Data Backup CHAPTER
CHAPTER 9 To access Data management tasks, log into the system (see Logging In section on page 2-1). Then, from the Home page, click the Tools tab. The Tools page appears. From the Tools page, click. The
More informationAvigilon Control Center 6 System Integration Guide
Avigilon Control Center 6 System Integration Guide for Paxton Net2 Access Control Systems 2018, Avigilon Corporation. All rights reserved. AVIGILON, the AVIGILON logo, AVIGILON CONTROL CENTER and ACC are
More informationidocvault Administrator Guide
idocvault Administrator Guide Administrative Features INTRODUCTION This book will cover the administrative features of idocvault including changing a password, adding a new user, and deleting a user. CONTENTS
More informationSecurity Essentials. Working with Systems Management Server (SMS) 2.0 to maximize SMS security and avoid security-related problems.
Security Essentials Working with Systems Management Server (SMS) 2.0 to maximize SMS security and avoid security-related problems. 2000 Microsoft Corporation. All rights reserved. The information contained
More informationClonePrincipal User Guide
ClonePrincipal User Guide Document version 2.1 November 9, 1999 Customers deploying Microsoft Windows 2000 might want to migrate users and resources incrementally to a new Windows 2000 environment in order
More informationSecurity Administrator System Technical Bulletin Code No. LIT Software Release 9.0 Issued December 2017
Code. LIT-1201528 Software Release 9.0 Issued December 2017 Refer to the QuickLIT website for the most up-to-date version of this document. Document Introduction...4 Summary of Changes...4 Related Documentation...4
More informationCommand Center Access Control Software
Command Center Access Control Software System Administration and User Guide Version 2.0 Mailing Address: NextgenID, Ltd. 10226 San Pedro, Suite 100 San Antonio, TX 78216 USA Contacts: Phone: (210) 530-9991
More informationQuickBooks 2006 Network Installation Guide
QuickBooks 2006 Network Installation Guide Intuit 2/28/06 QuickBooks 2006 has a new way of managing company data that may require some changes in the way you install and configure the software for network
More informationUsing BlueStep Data Vault with WebDAV
Using BlueStep Data Vault with WebDAV New BlueStep Functionality In order to meet our client s needs and expand our capabilities and services, BlueStep has implemented the use of the WebDAV Internet standard
More informationwindream Client Installation windream GmbH, Bochum
windream Client Installation windream GmbH, Bochum Copyright 2001 2004 by windream GmbH / winrechte GmbH Wasserstr. 219 44799 Bochum Issue: 06/04-3.6.1.0 All rights reserved. No part of the contents of
More informationUser Agent Preparing the Windows Environment and Installing the User Agent. How-To
User Agent 1.1.5 Preparing the Windows Environment and Installing the User Agent How-To CONTENTS Introduction to the User Agent... 2 Selecting the User Account to Run the User Agent... 3 Setting Access
More informationLABEL ARCHIVE Administrator s Guide
LABEL ARCHIVE Administrator s Guide DOC-LAS2015_25/05/2015 The information in this manual is not binding and may be modified without prior notice. Supply of the software described in this manual is subject
More informationRequired privileges and permissions
Required privileges and permissions Table of contents Document summary ADSelfService Plus overview Required permissions Configuring permissions To delegate full control in ADUC to access all ADSelfService
More information10ZiG Technology. Thin Desktop Quick Start Guide
10ZiG Technology Thin Desktop Quick Start Guide 2010 05 20 Introduction This document is intended as a quick start guide for installing Thin Desktop. After reading this document, you will know how to:
More informationAdministrator for Enterprise Clients: User s Guide. Second Edition
Administrator for Enterprise Clients: User s Guide Second Edition The correct bibliographic citation for this manual is as follows: SAS Institute Inc. 2002. Administrator for Enterprise Clients: User s
More informationNortel Contact Center Routine Maintenance NN
NN44400-514 Document status: Standard Document issue: 01.03 Document date: 26 February 2010 Product release: Release 7.0 Job function: Administration Type: Technical Document Language type: English Copyright
More informationUser s Guide Before operating the unit, please read this manual thoroughly and retain it for future reference.
4-672-781-11 (1) Network File Server User s Guide Before operating the unit, please read this manual thoroughly and retain it for future reference. FSV-M3 2003 Sony Corporation. All rights reserved. Table
More informationPolicy Settings for Windows Server 2003 (including SP1) and Windows XP (including SP2)
Web 2 Policy Settings for (including SP1) and XP (including SP2) This document was written by Conan Kezema. and XP together introduce more than 270 new administrative template policy settings for you to
More informationLepideAuditor. Installation and Configuration Guide
Installation and Configuration Guide Table of Contents 1. Introduction... 6 2. Requirements and Prerequisites... 6 2.1 System Requirements... 6 2.2 Supported Servers for Auditing... 7 2.3 Prerequisites
More informationEnable the Always Offline Mode to Provide Faster Access to Files
Enable the Always Offline Mode to Provide Faster Access to Files 13 out of 16 rated this helpful - Rate this topic Published: April 18, 2012 Updated: July 3, 2013 Applies To: Windows 8, Windows 8.1, Windows
More informationDefendX Software Control-Audit for Hitachi Installation Guide
DefendX Software Control-Audit for Hitachi Installation Guide Version 4.1 This guide details the method for the installation and initial configuration of DefendX Software Control-Audit for NAS, Hitachi
More information271 Waverley Oaks Rd. Telephone: Suite 206 Waltham, MA USA
Contacting Leostream Leostream Corporation http://www.leostream.com 271 Waverley Oaks Rd. Telephone: +1 781 890 2019 Suite 206 Waltham, MA 02452 USA To submit an enhancement request, email features@leostream.com.
More informationDSS User Guide. End User Guide. - i -
DSS User Guide End User Guide - i - DSS User Guide Table of Contents End User Guide... 1 Table of Contents... 2 Part 1: Getting Started... 1 How to Log in to the Web Portal... 1 How to Manage Account Settings...
More informationR9.7 erwin License Server:
R9.7 erwin License Server: Installation and Setup This is a quick guide to setting-up a erwin DM License Server. NOTES: - Concurrent licensing is available for only erwin r8.2 and later releases! - Concurrent
More informationPaperClip32. Revision 2.0
PaperClip32 Quick Start Guide Revision 2.0 Copyright Information Copyright 2003, PaperClip Software, Inc. The PaperClip32 product name and PaperClip Logo are registered trademarks of PaperClip Software,
More informationUser Profile Central Management Center User guide User Profile Central - User guide for remote backup and restore of user profiles.
User Profile Central - User guide for remote backup and restore of user profiles. What is User Profile Central or UPC as we call it? UPC is an easy way to manage User Profiles over network. Simply put
More informationOutline. Security. Security Ratings. TCSEC Rating Levels. Key Requirements for C2. Met B-Level Requirements
Outline Ausgewählte Betriebssysteme Institut Betriebssysteme Fakultät Informatik Ratings System Components 2 Ratings TCSEC Rating Levels National Computer Center (NCSC) part of US Department of Defense
More informationGuide to Deploy the AXIGEN Outlook Connector via Active Directory
Guide to Deploy the AXIGEN Outlook Connector via Active Directory Active Directory contains a very useful feature which allows system administrators to automatically deploy software onto machines or users
More informationEvaluation Guide Host Access Management and Security Server 12.4 SP1 ( )
Evaluation Guide Host Access Management and Security Server 12.4 SP1 (12.4.10) Legal Notice For information about legal notices, trademarks, disclaimers, warranties, export and other use restrictions,
More informationManual - TeamViewer 3.5
Manual - TeamViewer 3.5 Revision TV3.5-3895-g Table of Contents Table of Contents 1 Introduction... 1 1.1.1 About TeamViewer... 1 1.1.2 New in version 3.5... 1 1.1.3 About this manual... 1 2 Installation...
More informationLab 11-1 Lab User Profiles and Tracking
In the following lab instructions, you will be setting up groups, users, and passwords to require password-protected login to Kofax Capture modules. Rights will be assigned to the groups and users that
More informationManage Administrators and Admin Access Policies
Manage Administrators and Admin Access Policies Role-Based Access Control, on page 1 Cisco ISE Administrators, on page 1 Cisco ISE Administrator Groups, on page 3 Administrative Access to Cisco ISE, on
More informationMITEL. Live Content Suite. Mitel Live Content Suite Installation and Administrator Guide Release 1.1
MITEL Live Content Suite Mitel Live Content Suite Installation and Administrator Guide Release 1.1 NOTICE The information contained in this document is believed to be accurate in all respects but is not
More informationPrint Manager Plus 2010 Workgroup Print Tracking and Control
INTRODUCTION: This is intended to assist in the initial installation or evaluation of Print Manager Plus 2010 Workgroup Edition. This will guide you through tracking your printing whether your workgroup
More informationSetup Smart Login for Windows V2
Setup Smart Login for Windows V2 Smart Login allows workstations to login to a Smart-Net server without having to join a domain. Smart Login is suitable for both laptops and desktop PC s. Features Users
More informationVirtual CD TS 1 Introduction... 3
Table of Contents Table of Contents Virtual CD TS 1 Introduction... 3 Document Conventions...... 4 What Virtual CD TS Can Do for You...... 5 New Features in Version 10...... 6 Virtual CD TS Licensing......
More informationSecurity. Outline. Security Ratings. Ausgewählte Betriebssysteme Institut Betriebssysteme Fakultät Informatik
Ausgewählte Betriebssysteme Institut Betriebssysteme Fakultät Informatik Outline Ratings System Components Logon Object (File) Access Impersonation Auditing 2 Ratings National Computer Center (NCSC) part
More informationEMC ApplicationXtender Reports Management 6.0
EMC ApplicationXtender Reports Management 6.0 Administrator s Guide 300-008-283 REV A01 EMC Corporation Corporate Headquarters: Hopkinton, MA 01748-9103 1-508-435-1000 www.emc.com Copyright 1994-2009 EMC
More informationWinSCP. Author A.Kishore/Sachin
WinSCP WinSCP is a freeware windows client for the SCP (secure copy protocol), a way to transfer files across the network using the ssh (secure shell) encrypted protocol. It replaces other FTP programs
More informationLasso CDP. Lasso. Administration Tool Guide. August 2005, Version Lasso CDP Administration Tool Guide Page 1 of All Rights Reserved.
Lasso CDP Administration Tool Guide August 2005, Version 1.6.1 Lasso CDP Administration Tool Guide Page 1 of 41 Copyright Copyright 2005 Lasso Logic, LLC. All Rights Reserved. No part of this publication
More information