Networks: Access Management Windows NT Server Class Notes # 10 Administration October 24, 2003

Size: px
Start display at page:

Download "Networks: Access Management Windows NT Server Class Notes # 10 Administration October 24, 2003"

Transcription

1 Networks: Access Management Windows NT Server Class Notes # 10 Administration October 24, 2003 In Windows NT server, the user manager for domains is the primary administrative tool for managing user accounts, groups, and security policies for domains and computers on the network. User manager for domains only run on NT server machines. If you run the user manager on an NT workstation or an NT server that is not a domain controller, then you get the cut down version simply called the user manager rather than the user manager for domains. The NT workstation creates and manages user accounts with a program called simply user manager. The job of the user manager on machine XYZ is to create user accounts that are only relevant and useful on machine XYZ. If a user on machine ABC wants to get access to data on machine XYZ, the owner of machine XYZ would have to create an account for the user on ABC on the XYZ machine with the user manager on machine XYZ. On NT servers, the primary domain controller holds a shared database of all users known to the machines that have all agreed to constitute a domain. That way, if a user needs access to servers in a domain, then all you ve got to do is build a single domain wide account for that user and build a domain wide account with the user manager for domains. User accounts contain information like the user name, the password, and a description. All of that data sits in a file called SAM in the primary domain controller s \winnt\system32\config directory. SAM (Security Access Manager) lives in the PDC s registry, in an area that s grayed out if you try to peek into it. Whenever you run the user manager for domains, you re directly manipulating that part of the registry on the PDC. No matter what machine you run the user manager for domains from, your changes get stored in the PDC s registry. User manager for domains provides the network administrator with the means to: Create, modify, and delete user accounts in the domain Define a user s desktop environment and network connections Assign logon scripts to user accounts Manage groups and group membership within the accounts in a domain Manage trust relationships between different domains in the network Manage a domain s security policies If you are logged on as an administrator and you start up the user manager for domains, all of its features are available to you. If you log on as a member of the account operators group, you won t be able to use some of the user manager for domain s capabilities; you can manage most user accounts, but you cannot implement any of the security policies. If you log on as a mere mortal user, you can only look at user names with the user 1

2 manager for domains; the user manager for domains won t let you make any changes to those accounts. In NT server, a user account contains information such as the user s name, password, group membership, and rights and privileges the user has for accessing resources on the network. These details are shown in table one. Table 1: Information in a user account Part of user account Description Account type The particular type of user account; i.e. a local or global account. Expiration date A future date when the user account automatically becomes disabled. Full name The user s full name. Home directory A directory on the server that is private to the user, the user controls access to this directory. Logon hours The hours during which the user is allowed to log on to and access network services. Logon script A batch or executable file that runs automatically when the user logs on. Logon workstations The computer names of the NT workstations that the user is allowed to work from (by default, the user can work from any workstation) Password The user s secret password for logging on to his or her account. Profile A file containing a record of the user s desktop environment (program group, network connections, screen color, and settings that determine what aspects of the environment the user can change) on NT workstations. Username A unique name the user types when logging on. Pre-built Accounts If you re creating a new domain, you ll notice that two accounts called administrator and guest are built already. The administrator account is an account with complete power over a domain. You can t delete it, but you can rename it. You assigned the password for the domain s administrator account when you installed NT server on the machine that became the primary domain controller for the domain. The other account is the guest account. Guest means anyone that the domain doesn t recognize. By default, this account is disabled, and it should stay that way. The guest account is pretty restricted in the things it can do. If the guest account is enabled on the server, then a user logged on to an NT workstation can have access to a domain resource even thou that user does not have a domain account. The mere fact that there is an enabled guest account pretty much says to NT, leave the back door open, okay? So be careful when enabling the guest account. 2

3 Predefined Groups A number of predefined groups, both local and global, are built into NT server to aid network administration and management. The local groups are: Administrator Server operator Account operator Print operator Backup operator Everyone Users Guests Replicator Administrator Members of the administrators local group have more control over the domain than any other users, and they are granted all of the rights necessary to manage the overall configuration of the domain and the domain s servers. Within the administrator group is a built-in administrator user account that cannot be deleted. By default, the domain administrators global group is also a member of the administrator group, but it can be removed. Server operator The server operators local group has all of the rights needed to manage the domain s servers. Members of the server operations group can create, manage, and delete printer shares at servers; create, manage, and delete network shares at servers; back up and restore files on servers; format a server s fixed disk; lock and unlock servers; and change the system time. In addition, server operators can log on the network from the domain s servers as well as shut down the servers. Account operator Members of the account operators local group are allowed to use user manager for domains to create user accounts and groups for the domain, and to modify or delete most of the domain s user accounts and groups. An account operator cannot modify or delete the following groups: Administrators Domain admins Account operators Backup operators Print operators Server operators Likewise, members of this group cannot modify or delete user accounts of administrator. They cannot administer the security policies, but they can use the server manager to add computers to a domain, log on at servers, and shut down servers 3

4 Print operator Members of this group can create, manage, and delete printer shares for an NT server server. Additionally, they can log on at and shut down servers. Backup operator The backup operator local group provides its members the rights necessary to back up directories and files from a server and to restore directories and files to a server. Like the print operators, they can log on at and shut down servers. Everyone Everyone is not actually a group, and it doesn t appear in the user management list, but you can assign rights and permissions to it. Anyone who has a user account in the domain, including all local and remote users, is automatically a member of the everyone local group. Not only are members of this group allowed to connect over the network to a domain s servers, but they are also granted the advanced right to change directories and travel through a directory tree that they may not have permission on. Members of the everyone group also have the right to lock the server, but won t be able to unless they ve been granted the right to log on locally at the server. Users Members of the group simply called users have minimal rights at servers running NT server. They are granted the right to create and manage local groups, but unless they have access to the user manager for domains tool (such as by being allowed to log on locally at the server), they can t perform this task. Members of the users group do posses certain rights at their local NT workstations. Guests This is NT server s built-in local group for occasional or one time users to log on. Members of this group are granted very limited abilities. Guests have no rights at the NT server servers, but they do possess certain rights at their own individual workstations. The built-in guest user account is automatically a member of the guest group. Replicator This local group, different from the others, supports directory replication functions. The only member of a domain s replicator local group should be a single domain user account, which is used to log on to the replicator services of the domain controller and to the other servers in the domain. User accounts of actual users should not be added to this group at all. Table two through nine summarizes the user rights and special abilities granted to NT server s predefined local groups. Table 2: Rights/Special abilities granted to the administrators group None none 4

5 Table 3: Rights/Special abilities granted to the administrators group Create and manage user accounts Access this computer from the network Create and manage global groups Take ownership of files Assign user rights Manage auditing and security log Lock the server & override the server s lock Change the system time Create common groups Format the server s hard disk Force shutdown from a remote system Keep a local profile Backup files and directories Share and stop sharing directories and printers Table 4: Rights/Special abilities granted to the server operators Lock the server & override the server s lock Change the system time Create common groups Format the server s hard disk Force shutdown from a remote system Keep a local profile Backup files and directories Share and stop sharing directories and printers Restore files and directories Table 5: Rights/Special abilities granted to the account operator Create and manage user accounts, global groups, and local groups Keep a local profile Table 6: Rights/Special abilities granted to the print operators Keep a local profile Share and stop sharing printers Table 7: Rights/Special abilities granted to the backup operators Keep a local profile Backup files and directories Restore files and directories Table 8: Rights/Special abilities granted to the everyone group Access this computer from the network Lock the server Table 9: Rights/Special abilities granted to the Users group None Create and manage local groups 5

6 Global groups NT server has only three built-in global groups: Domain Administrator Domain Users Domain Guests Domain Administrator By placing a user account into this global group, you provide administrative level abilities to that user. Members of domain administrator can administer the home domain, the workstations of the domain, and any other trusted domains that have added the domain administrator global group to their own administrator local group. By default, the built-in domain administrator group is a member of both the domain s administrators local group and the administrators local group for every NT workstation in the domain. The built-in administrator user account for the domain is automatically a member of the domain administrator global group. Domain Users Members of the domain users global group have normal user access to, and abilities for, both the domain itself and for any NT workstation in the domain. This group contains all domain user accounts, and is by default a member of the users local groups for both the domain and for every Windows NT workstation on the domain. Domain Guests This group allows guest accounts to access resources across domain boundaries, if they ve been allowed that by the domain administrators. In addition to the built-in local and global groups, a few special groups appear now and again when viewing certain lists of groups: Interactive: Anyone using the computer locally Network: All users connected over the network to a computer System: The operating system Creator owner: The creator and /or owner of subdirectories, files, and print jobs. The interactive and network groups combined form the everyone local group. 6

7 Adding computers to a Domain Members of the Administrators, Domain Admins, and Account Operators groups can grant computers membership in a domain. It is the computers that are acknowledged as members of the domain and not the users. Adding a computer to a domain is a two-stop process. First, the machine account for the computer must be created in the domain. Then, the computer must actually join the domain a separate step, performed at the computer itself during installation of NT or afterwards in its Control Panel. You can create a machine account for an NT machine by: 1. Launch Server Manager at the Windows NT Server. 2. From the computer menu, choose add to domain. You will see the add computer to domain dialog box. 3. Under Computer type, choose the option Windows NT Workstation or Server. 4. Type the computer name, and choose Add. 5. You can continue adding other computers and close when you are finished. Joining a Workgroup or Domain with Windows NT workstation 4.0 You can join a workgroup or a Windows NT server domain from the Network dialog box. To join a workgroup, you must log on as a member of the administrator group or the Domain Admins global group. Make sure you specify a workgroup name that is not the same as the computer name. When joining a domain, check with the system administrator to make sure you re using the correct domain name and that you have a user account on that domain. To join a workgroup or domain, follow these steps: 1. In the network dialog box, choose the identification tab and choose change. The identification changes dialog box appears. 2. In the Member of area, choose either Workgroup or Domain. In the text box, enter the exact name of the workgroup or domain. 3. If you choose Domain and you re the domain administrator, enter the user name and password of your account. This is not required if you have created an account for the computer in the server manager of the domain controller. 4. Choose OK to close the dialog box. If you joined a domain, a welcome dialog box appears; choose OK to close the box. Joining a Workgroup or Domain with Windows 9X To configure Windows 9X to join a domain, perform the following steps: 1. Click start, Control Panel, and Networking. You will see the Network dialog box. 2. Select the Configuration tab and double click the Client for Microsoft Networks. 3. In the Logon Validation section, check the box labeled Log on to Windows NT domain and fill in the domain s name. Click OK to return to the Network applet and OK again to tell the Control Panel that you re finished. It will load some files and reboot. 4. Once the computer reboots, you ll see a new login dialog box, one field is the domain field. 7

5 MANAGING USER ACCOUNTS AND GROUPS

5 MANAGING USER ACCOUNTS AND GROUPS MANAGING USER ACCOUNTS AND GROUPS.1 Introduction to user accounts Objectives.2 Types of User Accounts.2.1 Local User Account.2.2 Built-in User Account.2.3 Domain User Account.3 User Profile.3.1 Content

More information

Chapter 6: Connecting Windows Workstations

Chapter 6: Connecting Windows Workstations Chapter 6: Connecting Windows Workstations 153 Chapter 6 Connecting Windows Workstations Because this is a book about using Linux on a Microsoft Windows-based network, this chapter shows you how to connect

More information

Lesson 3: Identifying Key Characteristics of Workgroups and Domains

Lesson 3: Identifying Key Characteristics of Workgroups and Domains 1-16 Chapter 1 Introduction to Windows XP Professional Lesson 3: Identifying Key Characteristics of Workgroups and Domains Windows XP Professional supports two types of network environments in which users

More information

Faculty of Engineering Computer Engineering Department Islamic University of Gaza Network Lab # 5 Managing Groups

Faculty of Engineering Computer Engineering Department Islamic University of Gaza Network Lab # 5 Managing Groups Faculty of Engineering Computer Engineering Department Islamic University of Gaza 2012 Network Lab # 5 Managing Groups Network Lab # 5 Managing Groups Objective: Learn about groups and where to create

More information

8 Administering Groups

8 Administering Groups 8 Administering Groups Exam Objectives in this Chapter: Plan a security group hierarchy based on delegation requirements. Plan a security group strategy. Why This Chapter Matters As an administrator, you

More information

29 March 2017 SECURITY SERVER INSTALLATION GUIDE

29 March 2017 SECURITY SERVER INSTALLATION GUIDE 29 March 2017 SECURITY SERVER INSTALLATION GUIDE Contents 1. Introduction... 2 1.1 Assumptions... 2 1.2 Prerequisites... 2 2. Required setups prior the Security Server Installation... 3 1.1 Create domain

More information

Windows Server 2003 Network Administration Goals

Windows Server 2003 Network Administration Goals Objectives Differentiate between the different editions of Windows Server 2003 Explain Windows Server 2003 network models and server roles Identify concepts relating to Windows Server 2003 network management

More information

Recent Operating System Class notes 04 Managing Users on Windows XP March 22, 2004

Recent Operating System Class notes 04 Managing Users on Windows XP March 22, 2004 Recent Operating System Class notes 04 Managing Users on Windows XP March 22, 2004 You log into a system to notify the system who you are. When you log off, any files you have opened are cleaned up, and

More information

Select the Akeni Pro Server installation file that matches your operating system and double-click on the file.

Select the Akeni Pro Server installation file that matches your operating system and double-click on the file. Akeni Pro Server Administration Guide (Version 2) Contents Chapter 1 Chapter 2 Chapter 3 Getting Started.: 1 Pro Server Installation.: 2 Launching Akeni Pro Server.: 3 Pro Client Installation.: 4 Launching

More information

Contents. Why You Should Read This Manual...ix. 1. Introduction... 1

Contents. Why You Should Read This Manual...ix. 1. Introduction... 1 Contents Why You Should Read This Manual...ix 1. Introduction... 1 Understanding Security... 2 Group and User Accounts... 2 Application Features... 3 Security Areas... 3 Using Windows Security... 7 Synchronizing

More information

Ebook : Overview of application development. All code from the application series books listed at:

Ebook : Overview of application development. All code from the application series books listed at: Ebook : Overview of application development. All code from the application series books listed at: http://www.vkinfotek.com with permission. Publishers: VK Publishers Established: 2001 Type of books: Develop

More information

HP OpenVMS CIFS Version 1.2 Migration Guide

HP OpenVMS CIFS Version 1.2 Migration Guide HP OpenVMS CIFS Version 1.2 Migration Guide Copyright 2010 Hewlett-Packard Development Company, L.P. Confidential computer software. Valid license from HP required for possession, use or copying. Consistent

More information

Introduction to Active Directory

Introduction to Active Directory UT ntroduction to Active irectory 5-1 Topics for this Unit irectory ervices Active irectory Forests omains rganizational Units Groups A features ites Accounts 5-1 irectory ervice A directory service is

More information

How to create a System Logon Account in Backup Exec for Windows Servers

How to create a System Logon Account in Backup Exec for Windows Servers How to create a System Logon Account in Backup Exec for Windows Servers Problem How to create a System Logon Account in Backup Exec for Windows Servers Solution The Backup Exec System Logon Account (SLA)

More information

Configure advanced audit policies

Configure advanced audit policies 7 LESSON Configuring Advanced Audit Policies 70-411 EXAM OBJECTIVE Objective 2.4 Configure advanced audit policies. This objective may include but is not limited to: implement auditing using Group Policy

More information

x CH03 2/26/04 1:24 PM Page

x CH03 2/26/04 1:24 PM Page 03 078973107x CH03 2/26/04 1:24 PM Page 45 3............................................. Setting Up, Managing, and Troubleshooting Security Accounts and Policies 1. You re a help desk technician for your

More information

As a first-time user, when you log in you won t have any files in your directory yet.

As a first-time user, when you log in you won t have any files in your directory yet. Welcome to Xythos WFS. This program allows you to share files with others over the Internet. When you store a file within your WFS account, you can make it selectively available to be viewed, edited, deleted,

More information

Chapter. Accessing Files and Folders MICROSOFT EXAM OBJECTIVES COVERED IN THIS CHAPTER

Chapter. Accessing Files and Folders MICROSOFT EXAM OBJECTIVES COVERED IN THIS CHAPTER Chapter 10 Accessing Files and Folders MICROSOFT EXAM OBJECTIVES COVERED IN THIS CHAPTER Monitor, manage, and troubleshoot access to files and folders. Configure, manage, and troubleshoot file compression

More information

RWT Network System Installation Guide

RWT Network System Installation Guide RWT Network System Installation Guide Copyright 2003, Talking Fingers, Inc. Page 1 of 48 This document is Copyright 2003 by Talking Fingers, Inc. All rights are reserved. This document may not be copied

More information

Setting Access Controls on Files, Folders, Shares, and Other System Objects in Windows 2000

Setting Access Controls on Files, Folders, Shares, and Other System Objects in Windows 2000 Setting Access Controls on Files, Folders, Shares, and Other System Objects in Windows 2000 Define and set DAC policy (define group membership, set default DAC attributes, set DAC on files systems) Modify

More information

Filesharing. Jason Healy, Director of Networks and Systems

Filesharing. Jason Healy, Director of Networks and Systems Filesharing Jason Healy, Director of Networks and Systems Last Updated Mar 18, 2008 2 Contents 1 Name of Project Here 5 1.1 Introduction.............................. 5 1.2 Initial Setup..............................

More information

COPYRIGHTED MATERIAL. Configuring, Deploying, and Troubleshooting Security Templates. Chapter MICROSOFT EXAM OBJECTIVES COVERED IN THIS CHAPTER:

COPYRIGHTED MATERIAL. Configuring, Deploying, and Troubleshooting Security Templates. Chapter MICROSOFT EXAM OBJECTIVES COVERED IN THIS CHAPTER: Chapter 1 Configuring, Deploying, and Troubleshooting Security Templates MICROSOFT EXAM OBJECTIVES COVERED IN THIS CHAPTER: Configure security templates. Configure registry and file system permissions.

More information

Local Area Networks (LAN s)

Local Area Networks (LAN s) Local Area Networks (LAN s) Local area networks are computers connected together in a single location. They vary in size from two computers connected together to share a printer, to hundreds of computers

More information

IDEVWORKS TECHNOLOGIES. SurfStation 9.0 Cyber Café Timer Software. SurfStation 9.0 User Guide

IDEVWORKS TECHNOLOGIES. SurfStation 9.0 Cyber Café Timer Software. SurfStation 9.0 User Guide IDEVWORKS TECHNOLOGIES SurfStation 9.0 Cyber Café Timer Software SurfStation 9.0 User Guide S U R F S T A T I O N 9.0 C Y B E R C A F É T I M E R A N D M A N A G E R SurfStation 9.0 Installation Guide

More information

Car Park Control System Software User Manual

Car Park Control System Software User Manual Disclaimer Information in this document is subject to change without notice. Companies, names, and data used in examples herein are fictitious unless otherwise noted. No part of this document may be reproduced

More information

CODESOFT uses NT security. The network administrator will need to set up the users as needed per the requirements of 21 CFR Part 11.

CODESOFT uses NT security. The network administrator will need to set up the users as needed per the requirements of 21 CFR Part 11. Healthcare and Pharmaceutical Label Printing Tools for 21 CFR Part 11 Compliance This applies to versions 7.x or greater of CODESOFT Enterprise CODESOFT Enterprise label design software provides features

More information

Privileged Identity App Launcher and Session Recording

Privileged Identity App Launcher and Session Recording Privileged Identity App Launcher and Session Recording 2018 Bomgar Corporation. All rights reserved worldwide. BOMGAR and the BOMGAR logo are trademarks of Bomgar Corporation; other trademarks shown are

More information

CISNTWK-11. Microsoft Network Server. Chapter 4

CISNTWK-11. Microsoft Network Server. Chapter 4 CISNTWK-11 Microsoft Network Server Chapter 4 User and Group Accounts 1 Usage Notes Throughout these slides, the term Active Directory Domain implies Domains Based on Windows Server 2008 Based on Windows

More information

WESTAT REMOTE ACCESS (WRA)

WESTAT REMOTE ACCESS (WRA) WESTAT REMOTE ACCESS (WRA) SET UP INSTRUCTIONS The following instructions will allow you to access Westat s Citrix XenApp Web Interface (WXA). This document will teach you how to access Westat s At Home

More information

Print Audit 6. Print Audit 6 Documentation Apr :07. Version: Date:

Print Audit 6. Print Audit 6 Documentation Apr :07. Version: Date: Print Audit 6 Version: Date: 37 21-Apr-2015 23:07 Table of Contents Browse Documents:..................................................... 3 Database Documentation.................................................

More information

Password Changer User Guide

Password Changer User Guide Active@ Password Changer User Guide Copyright 1999-2017, LSOFT TECHNOLOGIES INC. All rights reserved. No part of this documentation may be reproduced in any form or by any means or used to make any derivative

More information

User Guide. Version R94. English

User Guide. Version R94. English AuthAnvil User Guide Version R94 English March 8, 2017 Copyright Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept EULATOS as updated

More information

Unified CCE Security Compliance for Windows Server 2012 R2

Unified CCE Security Compliance for Windows Server 2012 R2 Unified CCE Security Compliance for Windows Server 2012 R2 This topic contains the security baseline for hardening Windows Server 2012 R2 Servers running Unified CCE. This baseline is essentially a collection

More information

Welcome to ncrypted Cloud!... 4 Getting Started Register for ncrypted Cloud Getting Started Download ncrypted Cloud...

Welcome to ncrypted Cloud!... 4 Getting Started Register for ncrypted Cloud Getting Started Download ncrypted Cloud... Windows User Manual Welcome to ncrypted Cloud!... 4 Getting Started 1.1... 5 Register for ncrypted Cloud... 5 Getting Started 1.2... 7 Download ncrypted Cloud... 7 Getting Started 1.3... 9 Access ncrypted

More information

Windows User Manual 1

Windows User Manual 1 Windows User Manual 1 Creating and Installing a Dropbox Account... 3 How to Create a Dropbox Account... 3 How to Install Dropbox... 3 How to Register and Sign into Dropbox... 3 Install and Register for

More information

User Guide. Version R92. English

User Guide. Version R92. English AuthAnvil User Guide Version R92 English October 9, 2015 Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept EULATOS as updated from

More information

Data Privilege Adding or Removing Members

Data Privilege Adding or Removing Members Data Privilege allows you to add or remove Members, aka Users, (individuals permitted to access all or portions of a group s resources) from any security group for which you are an Owner or an Authorizer.

More information

A NETWORK PRIMER. An introduction to some fundamental networking concepts and the benefits of using LANtastic.

A NETWORK PRIMER. An introduction to some fundamental networking concepts and the benefits of using LANtastic. A NETWORK PRIMER An introduction to some fundamental networking concepts and the benefits of using LANtastic. COPYRIGHT 1996 Artisoft, Inc. All Rights Reserved. This information file is copyrighted with

More information

Smart Access Control System Software User Manual (Client Version)

Smart Access Control System Software User Manual (Client Version) Disclaimer Information in this document is subject to change without notice. Companies, names, and data used in examples herein are fictitious unless otherwise noted. No part of this document may be reproduced

More information

Backup using Quantum vmpro with Symantec Backup Exec release 2012

Backup using Quantum vmpro with Symantec Backup Exec release 2012 Backup using Quantum vmpro with Symantec Backup Exec release 2012 Step 1) If the vmpro appliance name and IP address are not resolved through DNS, update the Windows hosts file to include the IP address

More information

User Profile Manager 2.0

User Profile Manager 2.0 User Profile Manager 2.0 User Guide ForensiT Limited, 75 Riverside III, Sir Thomas Longley Road, Rochester, Kent, ME2 4BH England. Tel: US 1-877-224-1721 (Toll Free) Intl. +44 (0) 845 838 7122 Fax: +44

More information

File systems security: Shared folders & NTFS permissions, EFS Disk Quotas

File systems security: Shared folders & NTFS permissions, EFS Disk Quotas File systems security: Shared folders & NTFS permissions, EFS Disk Quotas (March 23, 2016) Abdou Illia, Spring 2016 1 Learning Objective Understand Shared Folders Assign Shared Folder permissions NTFS

More information

C UNIT 4. Active Directory User Accounts

C UNIT 4. Active Directory User Accounts UN 4 Active irectory User Accounts 2005-2010 efinitions User individual granted access to the system with the following User properties Groups associated with the user Profile path Login script Home directory

More information

Networks: Access Management Windows 2000 Server Class Notes # 22 Building an Active Directory February 26, 2004

Networks: Access Management Windows 2000 Server Class Notes # 22 Building an Active Directory February 26, 2004 Networks: Access Management Windows 2000 Server Class Notes # 22 Building an Active Directory February 26, 2004 Windows 2000 separates the process of installing Windows 2000 server from the process of

More information

USE QUICK ASSIST TO REMOTELY TROUBLESHOOT A FRIEND S COMPUTER

USE QUICK ASSIST TO REMOTELY TROUBLESHOOT A FRIEND S COMPUTER USE QUICK ASSIST TO REMOTELY TROUBLESHOOT A FRIEND S COMPUTER Windows 10 s Anniversary Update brings a new Quick Assist feature. Built into Windows 10, Quick Assist allows you to take remote control of

More information

8 MANAGING SHARED FOLDERS & DATA

8 MANAGING SHARED FOLDERS & DATA MANAGING SHARED FOLDERS & DATA STORAGE.1 Introduction to Windows XP File Structure.1.1 File.1.2 Folder.1.3 Drives.2 Windows XP files and folders Sharing.2.1 Simple File Sharing.2.2 Levels of access to

More information

ROCK-POND REPORTING 2.1

ROCK-POND REPORTING 2.1 ROCK-POND REPORTING 2.1 Installation and Setup Guide Revised on 09/25/2014 TABLE OF CONTENTS ROCK-POND REPORTING 2.1... 1 SUPPORT FROM ROCK-POND SOLUTIONS... 2 ROCK-POND REPORTING OVERVIEW... 2 INFRASTRUCTURE

More information

Aretics T7 Installation Manual

Aretics T7 Installation Manual Aretics T7 Installation Manual 1(24) Aretics T7 Installation Manual This document describes how to manage Aretics T7 in your IT environment. Here you will find information about installing the system,

More information

All About Mapped Drives

All About Mapped Drives All About Mapped Drives All About Mapped Drives Intro to Mapped Hard Drives Mapped drives can be very useful when it comes to moving data around on an office or home network and they do have their usefulness.

More information

Remote Support 19.1 Web Rep Console

Remote Support 19.1 Web Rep Console Remote Support 19.1 Web Rep Console 2003-2019 BeyondTrust Corporation. All Rights Reserved. BEYONDTRUST, its logo, and JUMP are trademarks of BeyondTrust Corporation. Other trademarks are the property

More information

2015 Optima Healthcare Solutions Page 2

2015 Optima Healthcare Solutions Page 2 Viewing Documents Logging into Rehab Optima 1. To log onto Rehab Optima, go to www.rehaboptima.com. To place an icon on your desktop for future use, right click in the light blue box and choose create

More information

Abila MIP DrillPoint Reports. Installation Guide

Abila MIP DrillPoint Reports. Installation Guide Abila MIP DrillPoint Reports This is a publication of Abila, Inc. Version 16.1 2015 Abila, Inc. and its affiliated entities. All rights reserved. Abila, the Abila logos, and the Abila product and service

More information

Contents 1 INITIAL CONFIGURATION BEFORE CHANGING THE CONFIGURATION NETWORK SETUP PROCEDURE... 3

Contents 1 INITIAL CONFIGURATION BEFORE CHANGING THE CONFIGURATION NETWORK SETUP PROCEDURE... 3 Network Guide Imation Matchprint Professional Server Contents 1 INITIAL CONFIGURATION... 2 2 BEFORE CHANGING THE CONFIGURATION... 2 3 NETWORK SETUP PROCEDURE... 3 4 ADDING SPOOLER AND HOT FOLDERS FOR NETWORK

More information

SAS 9.4 Management Console: Guide to Users and Permissions

SAS 9.4 Management Console: Guide to Users and Permissions SAS 9.4 Management Console: Guide to Users and Permissions SAS Documentation The correct bibliographic citation for this manual is as follows: SAS Institute Inc 2015. SAS 9.4 Management Console: Guide

More information

Files.Kennesaw.Edu. Kennesaw State University Information Technology Services. Introduces. Presented by the ITS Technology Outreach Team

Files.Kennesaw.Edu. Kennesaw State University Information Technology Services. Introduces. Presented by the ITS Technology Outreach Team Kennesaw State University Information Technology Services Introduces Files.Kennesaw.Edu Presented by the ITS Technology Outreach Team Last Updated 08/12/13 Powered by Xythos Copyright 2006, Xythos Software

More information

ATX Document Manager. User Guide

ATX Document Manager. User Guide ATX Document Manager User Guide ATX DOCUMENT MANAGER User Guide 2008 CCH Small Firm Services. All rights reserved. 6 Mathis Drive NW Rome, GA 30165 No part of this manuscript may be copied, photocopied,

More information

Live Connect. Live Connect

Live Connect. Live Connect 2 Chapter 9 - Introduction Fig. 9.1 Brief Overview Pop-up Window provides single machine interface to give you full control over your endpoints with minimal end user interruption. It is built to help you

More information

Remote Support Web Rep Console

Remote Support Web Rep Console Remote Support Web Rep Console 2017 Bomgar Corporation. All rights reserved worldwide. BOMGAR and the BOMGAR logo are trademarks of Bomgar Corporation; other trademarks shown are the property of their

More information

Using the Fiery WebTools

Using the Fiery WebTools 16 Using the Fiery WebTools The Fiery utilities enable remote users to view server functions. Users may also have the ability to manage jobs remotely if the system administrator has assigned them such

More information

PDS OnDemand. Getting Started Guide for Windows

PDS OnDemand. Getting Started Guide for Windows PDS OnDemand Getting Started Guide for Windows Copyright Copyright 2009 ACS Technologies Group, Inc. All rights reserved. Reproduction of any part of this publication by mechanical or electronic means,

More information

Data Manager. Scheduling Data Backup CHAPTER

Data Manager. Scheduling Data Backup CHAPTER CHAPTER 9 To access Data management tasks, log into the system (see Logging In section on page 2-1). Then, from the Home page, click the Tools tab. The Tools page appears. From the Tools page, click. The

More information

Avigilon Control Center 6 System Integration Guide

Avigilon Control Center 6 System Integration Guide Avigilon Control Center 6 System Integration Guide for Paxton Net2 Access Control Systems 2018, Avigilon Corporation. All rights reserved. AVIGILON, the AVIGILON logo, AVIGILON CONTROL CENTER and ACC are

More information

idocvault Administrator Guide

idocvault Administrator Guide idocvault Administrator Guide Administrative Features INTRODUCTION This book will cover the administrative features of idocvault including changing a password, adding a new user, and deleting a user. CONTENTS

More information

Security Essentials. Working with Systems Management Server (SMS) 2.0 to maximize SMS security and avoid security-related problems.

Security Essentials. Working with Systems Management Server (SMS) 2.0 to maximize SMS security and avoid security-related problems. Security Essentials Working with Systems Management Server (SMS) 2.0 to maximize SMS security and avoid security-related problems. 2000 Microsoft Corporation. All rights reserved. The information contained

More information

ClonePrincipal User Guide

ClonePrincipal User Guide ClonePrincipal User Guide Document version 2.1 November 9, 1999 Customers deploying Microsoft Windows 2000 might want to migrate users and resources incrementally to a new Windows 2000 environment in order

More information

Security Administrator System Technical Bulletin Code No. LIT Software Release 9.0 Issued December 2017

Security Administrator System Technical Bulletin Code No. LIT Software Release 9.0 Issued December 2017 Code. LIT-1201528 Software Release 9.0 Issued December 2017 Refer to the QuickLIT website for the most up-to-date version of this document. Document Introduction...4 Summary of Changes...4 Related Documentation...4

More information

Command Center Access Control Software

Command Center Access Control Software Command Center Access Control Software System Administration and User Guide Version 2.0 Mailing Address: NextgenID, Ltd. 10226 San Pedro, Suite 100 San Antonio, TX 78216 USA Contacts: Phone: (210) 530-9991

More information

QuickBooks 2006 Network Installation Guide

QuickBooks 2006 Network Installation Guide QuickBooks 2006 Network Installation Guide Intuit 2/28/06 QuickBooks 2006 has a new way of managing company data that may require some changes in the way you install and configure the software for network

More information

Using BlueStep Data Vault with WebDAV

Using BlueStep Data Vault with WebDAV Using BlueStep Data Vault with WebDAV New BlueStep Functionality In order to meet our client s needs and expand our capabilities and services, BlueStep has implemented the use of the WebDAV Internet standard

More information

windream Client Installation windream GmbH, Bochum

windream Client Installation windream GmbH, Bochum windream Client Installation windream GmbH, Bochum Copyright 2001 2004 by windream GmbH / winrechte GmbH Wasserstr. 219 44799 Bochum Issue: 06/04-3.6.1.0 All rights reserved. No part of the contents of

More information

User Agent Preparing the Windows Environment and Installing the User Agent. How-To

User Agent Preparing the Windows Environment and Installing the User Agent. How-To User Agent 1.1.5 Preparing the Windows Environment and Installing the User Agent How-To CONTENTS Introduction to the User Agent... 2 Selecting the User Account to Run the User Agent... 3 Setting Access

More information

LABEL ARCHIVE Administrator s Guide

LABEL ARCHIVE Administrator s Guide LABEL ARCHIVE Administrator s Guide DOC-LAS2015_25/05/2015 The information in this manual is not binding and may be modified without prior notice. Supply of the software described in this manual is subject

More information

Required privileges and permissions

Required privileges and permissions Required privileges and permissions Table of contents Document summary ADSelfService Plus overview Required permissions Configuring permissions To delegate full control in ADUC to access all ADSelfService

More information

10ZiG Technology. Thin Desktop Quick Start Guide

10ZiG Technology. Thin Desktop Quick Start Guide 10ZiG Technology Thin Desktop Quick Start Guide 2010 05 20 Introduction This document is intended as a quick start guide for installing Thin Desktop. After reading this document, you will know how to:

More information

Administrator for Enterprise Clients: User s Guide. Second Edition

Administrator for Enterprise Clients: User s Guide. Second Edition Administrator for Enterprise Clients: User s Guide Second Edition The correct bibliographic citation for this manual is as follows: SAS Institute Inc. 2002. Administrator for Enterprise Clients: User s

More information

Nortel Contact Center Routine Maintenance NN

Nortel Contact Center Routine Maintenance NN NN44400-514 Document status: Standard Document issue: 01.03 Document date: 26 February 2010 Product release: Release 7.0 Job function: Administration Type: Technical Document Language type: English Copyright

More information

User s Guide Before operating the unit, please read this manual thoroughly and retain it for future reference.

User s Guide Before operating the unit, please read this manual thoroughly and retain it for future reference. 4-672-781-11 (1) Network File Server User s Guide Before operating the unit, please read this manual thoroughly and retain it for future reference. FSV-M3 2003 Sony Corporation. All rights reserved. Table

More information

Policy Settings for Windows Server 2003 (including SP1) and Windows XP (including SP2)

Policy Settings for Windows Server 2003 (including SP1) and Windows XP (including SP2) Web 2 Policy Settings for (including SP1) and XP (including SP2) This document was written by Conan Kezema. and XP together introduce more than 270 new administrative template policy settings for you to

More information

LepideAuditor. Installation and Configuration Guide

LepideAuditor. Installation and Configuration Guide Installation and Configuration Guide Table of Contents 1. Introduction... 6 2. Requirements and Prerequisites... 6 2.1 System Requirements... 6 2.2 Supported Servers for Auditing... 7 2.3 Prerequisites

More information

Enable the Always Offline Mode to Provide Faster Access to Files

Enable the Always Offline Mode to Provide Faster Access to Files Enable the Always Offline Mode to Provide Faster Access to Files 13 out of 16 rated this helpful - Rate this topic Published: April 18, 2012 Updated: July 3, 2013 Applies To: Windows 8, Windows 8.1, Windows

More information

DefendX Software Control-Audit for Hitachi Installation Guide

DefendX Software Control-Audit for Hitachi Installation Guide DefendX Software Control-Audit for Hitachi Installation Guide Version 4.1 This guide details the method for the installation and initial configuration of DefendX Software Control-Audit for NAS, Hitachi

More information

271 Waverley Oaks Rd. Telephone: Suite 206 Waltham, MA USA

271 Waverley Oaks Rd. Telephone: Suite 206 Waltham, MA USA Contacting Leostream Leostream Corporation http://www.leostream.com 271 Waverley Oaks Rd. Telephone: +1 781 890 2019 Suite 206 Waltham, MA 02452 USA To submit an enhancement request, email features@leostream.com.

More information

DSS User Guide. End User Guide. - i -

DSS User Guide. End User Guide. - i - DSS User Guide End User Guide - i - DSS User Guide Table of Contents End User Guide... 1 Table of Contents... 2 Part 1: Getting Started... 1 How to Log in to the Web Portal... 1 How to Manage Account Settings...

More information

R9.7 erwin License Server:

R9.7 erwin License Server: R9.7 erwin License Server: Installation and Setup This is a quick guide to setting-up a erwin DM License Server. NOTES: - Concurrent licensing is available for only erwin r8.2 and later releases! - Concurrent

More information

PaperClip32. Revision 2.0

PaperClip32. Revision 2.0 PaperClip32 Quick Start Guide Revision 2.0 Copyright Information Copyright 2003, PaperClip Software, Inc. The PaperClip32 product name and PaperClip Logo are registered trademarks of PaperClip Software,

More information

User Profile Central Management Center User guide User Profile Central - User guide for remote backup and restore of user profiles.

User Profile Central Management Center User guide User Profile Central - User guide for remote backup and restore of user profiles. User Profile Central - User guide for remote backup and restore of user profiles. What is User Profile Central or UPC as we call it? UPC is an easy way to manage User Profiles over network. Simply put

More information

Outline. Security. Security Ratings. TCSEC Rating Levels. Key Requirements for C2. Met B-Level Requirements

Outline. Security. Security Ratings. TCSEC Rating Levels. Key Requirements for C2. Met B-Level Requirements Outline Ausgewählte Betriebssysteme Institut Betriebssysteme Fakultät Informatik Ratings System Components 2 Ratings TCSEC Rating Levels National Computer Center (NCSC) part of US Department of Defense

More information

Guide to Deploy the AXIGEN Outlook Connector via Active Directory

Guide to Deploy the AXIGEN Outlook Connector via Active Directory Guide to Deploy the AXIGEN Outlook Connector via Active Directory Active Directory contains a very useful feature which allows system administrators to automatically deploy software onto machines or users

More information

Evaluation Guide Host Access Management and Security Server 12.4 SP1 ( )

Evaluation Guide Host Access Management and Security Server 12.4 SP1 ( ) Evaluation Guide Host Access Management and Security Server 12.4 SP1 (12.4.10) Legal Notice For information about legal notices, trademarks, disclaimers, warranties, export and other use restrictions,

More information

Manual - TeamViewer 3.5

Manual - TeamViewer 3.5 Manual - TeamViewer 3.5 Revision TV3.5-3895-g Table of Contents Table of Contents 1 Introduction... 1 1.1.1 About TeamViewer... 1 1.1.2 New in version 3.5... 1 1.1.3 About this manual... 1 2 Installation...

More information

Lab 11-1 Lab User Profiles and Tracking

Lab 11-1 Lab User Profiles and Tracking In the following lab instructions, you will be setting up groups, users, and passwords to require password-protected login to Kofax Capture modules. Rights will be assigned to the groups and users that

More information

Manage Administrators and Admin Access Policies

Manage Administrators and Admin Access Policies Manage Administrators and Admin Access Policies Role-Based Access Control, on page 1 Cisco ISE Administrators, on page 1 Cisco ISE Administrator Groups, on page 3 Administrative Access to Cisco ISE, on

More information

MITEL. Live Content Suite. Mitel Live Content Suite Installation and Administrator Guide Release 1.1

MITEL. Live Content Suite. Mitel Live Content Suite Installation and Administrator Guide Release 1.1 MITEL Live Content Suite Mitel Live Content Suite Installation and Administrator Guide Release 1.1 NOTICE The information contained in this document is believed to be accurate in all respects but is not

More information

Print Manager Plus 2010 Workgroup Print Tracking and Control

Print Manager Plus 2010 Workgroup Print Tracking and Control INTRODUCTION: This is intended to assist in the initial installation or evaluation of Print Manager Plus 2010 Workgroup Edition. This will guide you through tracking your printing whether your workgroup

More information

Setup Smart Login for Windows V2

Setup Smart Login for Windows V2 Setup Smart Login for Windows V2 Smart Login allows workstations to login to a Smart-Net server without having to join a domain. Smart Login is suitable for both laptops and desktop PC s. Features Users

More information

Virtual CD TS 1 Introduction... 3

Virtual CD TS 1 Introduction... 3 Table of Contents Table of Contents Virtual CD TS 1 Introduction... 3 Document Conventions...... 4 What Virtual CD TS Can Do for You...... 5 New Features in Version 10...... 6 Virtual CD TS Licensing......

More information

Security. Outline. Security Ratings. Ausgewählte Betriebssysteme Institut Betriebssysteme Fakultät Informatik

Security. Outline. Security Ratings. Ausgewählte Betriebssysteme Institut Betriebssysteme Fakultät Informatik Ausgewählte Betriebssysteme Institut Betriebssysteme Fakultät Informatik Outline Ratings System Components Logon Object (File) Access Impersonation Auditing 2 Ratings National Computer Center (NCSC) part

More information

EMC ApplicationXtender Reports Management 6.0

EMC ApplicationXtender Reports Management 6.0 EMC ApplicationXtender Reports Management 6.0 Administrator s Guide 300-008-283 REV A01 EMC Corporation Corporate Headquarters: Hopkinton, MA 01748-9103 1-508-435-1000 www.emc.com Copyright 1994-2009 EMC

More information

WinSCP. Author A.Kishore/Sachin

WinSCP. Author A.Kishore/Sachin WinSCP WinSCP is a freeware windows client for the SCP (secure copy protocol), a way to transfer files across the network using the ssh (secure shell) encrypted protocol. It replaces other FTP programs

More information

Lasso CDP. Lasso. Administration Tool Guide. August 2005, Version Lasso CDP Administration Tool Guide Page 1 of All Rights Reserved.

Lasso CDP. Lasso. Administration Tool Guide. August 2005, Version Lasso CDP Administration Tool Guide Page 1 of All Rights Reserved. Lasso CDP Administration Tool Guide August 2005, Version 1.6.1 Lasso CDP Administration Tool Guide Page 1 of 41 Copyright Copyright 2005 Lasso Logic, LLC. All Rights Reserved. No part of this publication

More information