INF204x Module 2 Lab 2: Using Encrypting File System (EFS) on Windows 10 Clients
|
|
- Henry Burns
- 6 years ago
- Views:
Transcription
1 INF204x Module 2 Lab 2: Using Encrypting File System (EFS) on Windows 10 Clients Estimated Time: 30 minutes You have a standalone Windows 10 client computer that you share with your colleagues. You plan to take advantage of the Encrypting File System to control access to selected files on the local computer. Objectives After completing this lab, students will be able to: Encrypt files and folders by using EFS Share access to encrypted files Lab Environment The lab consists of two virtual machines: LON-WIN10 - Windows 10 Enterprise client (Adatum.com Active Directory domain member) with IPv4 address of LON-DC1 Windows Server 2012 R2 Datacenter server (Adatum.com Active Directory domain controller) with IPv4 address of Exercise 1: Encrypt local files and folders by using EFS In this exercise, you will create two local user accounts on a Windows 10 computer, you will log on as the first user and encrypt a file by using EFS, and log on as the second user and ensure that the file is not accessible. The main tasks for this exercise are as follows: 1. Create two Windows 10 local user accounts 2. Encrypt a file by using EFS as the first user. 3. Attempt to access the encrypted file as the second user. Task 1: Create two Windows 10 local user accounts 1. Sign in to the lab virtual machine LON-WIN10 with the following credentials (note that these are local, rather than domain, credentials): USERNAME:.\Admin PASSWORD: Pa$$w0rd 2. On your lab virtual machine, click the Windows logo in the lower left corner and click Settings in the Start menu. 3. In the Settings app, click Accounts 4. Click Other users
2 5. Click Add someone else to this PC 6. On the Create an account for this PC page, specify the following information: User name: luser1 Enter password: luser1pa$$ Re-enter password: luser1pa$$ Password hint: Default 7. Click Next 8. Click again Add someone else to this PC 9. On the How will this person sign in? page, click I don t have this person s sign-in information 10. On the Let s create your account page, click Add a user without a Microsoft account. 11. On the Create an account for this PC page, specify the following information: User name: luser2 Enter password: luser2pa$$ Re-enter password: luser2pa$$ Password hint: Default 12. Click Next 13. Launch File Explorer 14. Create folder C:\Data 15. Sign out from the lab virtual machine. Task 2: Encrypt a file by using EFS as the first user 1. Sign in to the lab virtual machine (LON-WIN10) with the following credentials (note that these are local, rather than domain, credentials): USERNAME:.\luser1 PASSWORD: luser1pa$$ 2. Launch File Explorer and navigate to C:\Data folder. 3. Create a file named File1.txt, type a random text in it, and save it in the C:\Data folder. 4. Right-click on File1.txt and select Properties from the context-sensitive menu. 5. In the Properties dialog box, click Advanced. 6. In the Advanced Attributes dialog box, enable the checkbox next to Encrypt contents to secure data. 7. Click OK. 8. Back in the Properties dialog box, click OK.
3 9. When prompted with the Encryption Warning dialog box, select Encrypt the file only and click OK. Note that, in general, you should choose the option to Encrypt the file and its parent folder (recommended). In some cases, if the file is modified, the editing software might create a temporary, unencrypted copy of the file in the same folder. By using this option, you ensure that such files are also encrypted. We use the option to Encrypt the file only for demo purposes only. Keep in mind that you should back up encryption keys, so you can recover encrypted files if the encryption key stored in your user profile is lost or damaged. The encryption key is part of the EFS certificate and is generated automatically when you encrypt a file for the first time. You will receive at that point notification to Back up file encryption certificate and key giving you the option to back up certificate to removable media. Selecting this option will automatically trigger Certificate Export Wizard, guiding you through the process of exporting the certificate. Alternatively, you can also use the option to Back up keys appearing in the User Access to filename dialog box, accessible via Details command button on the Advanced Attributes dialog box of any encrypted file. 10. Note that the file is displayed in green color. Right-click on it again and select Properties from the context-sensitive menu. 11. In the Properties dialog box, click Advanced again. 12. In the Advanced Attributes dialog box, click Details next to Encrypt contents to secure data label. 13. In the User Access to File1.txt, note that the current user account (luser1) is the only one who can access this file. 14. Click Add. 15. In the Encrypting File System dialog box, you should see only the single certificate for luser1. Effectively, at this point, you cannot grant access to the encrypted file to other users. 16. Click Cancel three times to close all dialog boxes. Task 3: Attempt to access the encrypted file as the second user. 2. Sign in to the lab virtual machine with the following credentials (note that these are local, rather than domain, credentials): USERNAME:.\luser2 PASSWORD: luser2pa$$ 3. Launch File Explorer and navigate to C:\Data folder. 4. Double click the File1.txt file. 5. Verify that you get the Access is denied message.
4 6. Click OK and close Notepad. Results: After completing this exercise, you will have created two Windows 10 local user accounts, encrypted a file by using the first of them, and verified that the second one does not have access to the encrypted file. Exercise 2: Share access to encrypted files In this exercise, you will first encrypt a file as the second user, grant access to the previously encrypted file to the second user, and verify that the second user at that point can access the file. The main tasks for this exercise are as follows: 1. Encrypt a file by using EFS as the second user. 2. Grant shared access to the previously encrypted file. 3. Verify that the second user can access the shared encrypted file. Task 1: Encrypt a file by using EFS as the second user 1. While signed on as the second user, create a file named File2.txt, type a random text in it, and save it in the C:\Data folder. 2. Right-click on File2.txt and select Properties from the context-sensitive menu. 3. In the Properties dialog box, click Advanced. 4. In the Advanced Attributes dialog box, enable the checkbox next to Encrypt contents to secure data. 5. Click OK. 6. Back in the Properties dialog box, click OK. 7. When prompted with the Encryption Warning dialog box, select Encrypt the file only and click OK. By encrypting a file as the second user, you generate an EFS certificate that now can be used by the first use to provide shared access to File1.txt. Task 2: Grant shared access to the previously encrypted file. 2. Sign in to the lab virtual machine with the following credentials: USERNAME:.\luser1 PASSWORD: luser1pa$$ 3. In the File Explorer and navigate to C:\Data folder. 4. Right-click on File1.txt and select Properties from the context-sensitive menu. 5. In the Properties dialog box, click Advanced. 6. In the Advanced Attributes dialog box, click Details next to Encrypt contents to secure data label.
5 7. In the User Access to File1.txt, click Add. 8. Note that you can see at this point an additional EFS certificate for luser2. Make sure it is selected and click OK. 9. Back in the User Access to File1.txt dialog box, you should at this point see both luser1 and luser2 as the users who can access the file. 10. Click OK three times to close all dialog boxes. Task 3: Verify that the second user can access the shared encrypted file. 2. Sign in to the lab virtual machine with the following credentials: USERNAME:.\luser2 PASSWORD: luser2pa$$ 3. Launch File Explorer and navigate to C:\Data folder. 4. Double click the File1.txt file. 5. Verify that you can successfully open the file. 6. Click OK and close Notepad. Results: After completing this exercise, you will have encrypted a file as the second user to generate an EFS certificate, grant shared access to the previously encrypted file as the first user, and verify that you can access that file successfully as the second user.
INF204x Module 1, Lab 3 - Configure Windows 10 VPN
INF204x Module 1, Lab 3 - Configure Windows 10 VPN Estimated Time: 40 minutes Your organization plans to allow Windows 10 users to connect to the internal network by using the VPN client built into the
More informationINF204x Module 1 Lab 2: Configuring and Troubleshooting Networking Part 2
INF204x Module 1 Lab 2: Configuring and Troubleshooting Networking Part 2 Estimated Time: 60 minutes Your organization plans to expand the use of IPv6 in its existing Windows Server 2012 R2 Active Directory
More informationModule 3 Remote Desktop Gateway Estimated Time: 90 minutes
Module 3 Remote Desktop Gateway Estimated Time: 90 minutes A. Datum Corporation provided access to web intranet web applications by implementing Web Application Proxy. Now, IT management also wants to
More informationThis course comes with a virtual lab environment where you can practice what you learn.
INF220x Security Practical Exercises Overview This course comes with a virtual lab environment where you can practice what you learn. In most cases, the userid is Adatum\Administrator and the password
More informationINF204x Module 1 Lab 1: Configuring and Troubleshooting Networking Part 1
INF204x Module 1 Lab 1: Configuring and Troubleshooting Networking Part 1 Estimated Time: 90 minutes Your organization plans to implement IPv6 in their existing Active Directory environment including Windows
More informationLAB 5 IMPLEMENTING WINDOWS IN AN ENTERPRISE ENVIRONMENT
LAB 5 IMPLEMENTING WINDOWS IN AN ENTERPRISE ENVIRONMENT THIS LAB CONTAINS THE FOLLOWING EXERCISES AND ACTIVITIES: Exercise 5.1 Exercise 5.2 Exercise 5.3 Lab Challenge Installing the Windows Assessment
More informationModule 4 Network Controller Estimated Time: 90 minutes
Module 4 Network Controller Estimated Time: 90 minutes A. Datum Corporation intends to deploy and use Network Controller to manage network services and devices. You need to test a deployment of Network
More informationList of Virtual Machines Used in This Lab
INF204x Module 3 Lab1: Deploying Windows 10 to a New Computer by Using Microsoft Deployment Toolkit Lab: Using Microsoft Deployment Toolkit 2013 Update 1 Preview to Deploy Operating Systems Overview of
More informationStudent Lab Manual MS101.1x: Microsoft 365 Security Management
Student Lab Manual MS101.1x: Microsoft 365 Security Management Lab Scenario You are the system administrator for Adatum Corporation, and you have Microsoft 365 deployed in a virtualized lab environment.
More information20411D D Enayat Meer
Lab A Module 8: Implementing Direct Access by Using the Getting Started Wizard Scenario: Recommended lab time is 240 Minutes {a complete class session is dedicated for this lab} Many users at A. Datum
More informationModule 1 Web Application Proxy (WAP) Estimated Time: 120 minutes
Module 1 Web Application Proxy (WAP) Estimated Time: 120 minutes The remote access deployment is working well at A. Datum Corporation, but IT management also wants to enable access to some internal applications
More informationCourse CLD211.5x Microsoft SharePoint 2016: Search and Content Management
Course CLD211.5x Microsoft SharePoint 2016: Search and Content Management Module 1 Lab - Configure Enterprise Search Introduction This document contains the detailed, step-by-step lab instructions for
More informationDOCUMENT SECURITY IN WORD 2010
DOCUMENT SECURITY IN WORD 2010 http://www.tutorialspoint.com/word/word_document_security.htm Copyright tutorialspoint.com Microsoft Word provides a high level of security for your word generated documents.
More informationBitLocker to Go: Encryption for personal USB
BitLocker to Go: Encryption for personal USB [Windows 10] Encryption is an effective method of protecting data stored on portable USB devices such as flash drives and external hard drives. Encryption encodes
More informationOutlook Desktop Application for Windows
Access Your Email There are two common ways to access your mail: via the Outlook Desktop Application and the Outlook Web Application. This document focuses on how to use the Outlook Desktop Application
More informationLab: Configuring and Troubleshooting DNS
Lab: Configuring and Troubleshooting DNS A. Datum is a global engineering and manufacturing company with its head office in London, UK. An IT office and a data center are located in London to support the
More informationLab - System Restore in Windows 8
Lab - System Restore in Windows 8 Introduction In this lab, you will create a restore point and use it to restore your computer. Recommended Equipment A computer running Windows 8 Step 1: Create a restore
More informationUsing Attix5 Pro with EFS
Using Attix5 Pro with EFS Windows has a built-in Encrypting File System (EFS), which is a component of NTFS. It allows users to encrypt files on disk, so that only they, and users who they provide keys
More informationCLD206x Compliance in Office 365: Data Governance
CLD206x Compliance in Office 365: Data Governance Student Lab Manual WARNING Be prepared for Office 365 UI changes Given the dynamic nature of Microsoft cloud tools, you may experience Office 365 user
More informationLab - Share Resources in Windows
Introduction In this lab, you will create and share a folder, set permissions for the shares, create a Homegroup and a Workgroup to share resources, and map a network drive. Due to Windows Vista lack of
More information8 MANAGING SHARED FOLDERS & DATA
MANAGING SHARED FOLDERS & DATA STORAGE.1 Introduction to Windows XP File Structure.1.1 File.1.2 Folder.1.3 Drives.2 Windows XP files and folders Sharing.2.1 Simple File Sharing.2.2 Levels of access to
More informationCourse CLD221x: Enabling Office 365 Clients
Course CLD221x: Enabling Office 365 Clients Student Lab Manual Lab Design There are five exercises in this lab, each of which contains one or more tasks. For a successful outcome to the lab, the exercises
More informationInstalling the WinSCP Secure FTP Client
Draft 0.9 Page 1 of 6 Installing the WinSCP Secure FTP Client This document will instruct you to install the WinSCP application that will provide Secure FTP (SFTP) access to your website folder. So why
More informationIT Essentials v6.0 Windows 10 Software Labs
IT Essentials v6.0 Windows 10 Software Labs 5.2.1.7 Install Windows 10... 1 5.2.1.10 Check for Updates in Windows 10... 10 5.2.4.7 Create a Partition in Windows 10... 16 6.1.1.5 Task Manager in Windows
More informationLab - Remote Assistance in Windows
Lab - Remote Assistance in Windows Introduction In this lab, you will remotely connect to a computer, examine device drivers, and provide remote assistance. Recommended Equipment Two Windows 7, Windows
More informationINF220x Security Practical Exercises
INF220x Security Practical Exercises This course comes with a virtual lab environment where you can practice what you learn. In most cases, the userid is Adatum\Administrator and the password is Pa55w.rd,
More informationLab - System Restore in Windows 7 and Vista
Lab - System Restore in Windows 7 and Vista Introduction In this lab, you will create a restore point and then use it to restore your computer. Recommended Equipment A computer running Windows 7 or Vista
More informationAspera Connect Windows XP, 2003, Vista, 2008, 7. Document Version: 1
Aspera Connect 2.6.3 Windows XP, 2003, Vista, 2008, 7 Document Version: 1 2 Contents Contents Introduction... 3 Setting Up... 4 Upgrading from a Previous Version...4 Installation... 4 Set Up Network Environment...
More informationDownloading & Installing Audacity
Downloading Audacity 1. Open your web browser. 2. Navigate to the following URL: http://audacity.sourceforge.net/download/ 3. The system displays the Download page for Audacity. 4. Select your operating
More informationLab B: Configuring Disk Compression and Quotas
Module 6: Managing Data by Using NTFS 33 Lab B: Configuring Disk Compression and Quotas Topic Objective To introduce the lab. Lead-in In this lab, you will configure disk compression and quotas. *****************************ILLEGAL
More informationLab 11-1 Lab User Profiles and Tracking
In the following lab instructions, you will be setting up groups, users, and passwords to require password-protected login to Kofax Capture modules. Rights will be assigned to the groups and users that
More informationStudent Lab Manual MS100.1x: Office 365 Management
Student Lab Manual MS100.1x: Office 365 Management Lab Scenario You are the system administrator for Adatum Corporation, and you have Office 365 deployed in a virtualized lab environment. In this lab,
More informationLab 3-1 Lab Installing Kofax Capture 10
In the following lab instructions, you re going to install and license Kofax Capture, turn on User Tracking, review the product documentation, and prepare your system for the lab exercises in this course.
More information8x8 Virtual Office Salesforce Call Center Interface User Guide
8x8 Virtual Office User Guide August 2012 The Champion For Business Communications Table of Contents 8x8 Virtual Office Salesforce Call Center App... 3 System Requirements...3 Installation... 4 Uninstalling
More informationVMware AirWatch - Workspace ONE, Single Sign-on and VMware Identity Manager
VMware AirWatch - Workspace ONE, Single Sign-on and VMware Identity Table of Contents Lab Overview - HOL-1857-03-UEM - Workspace ONE UEM with App & Access Management... 2 Lab Guidance... 3 Module 1 - Workspace
More informationComputer Setup Guide for SEC301
Computer Setup Guide for SEC301 This document identifies the steps you need to take to make sure that your computer is ready for the lab exercises for SEC301. Prior to coming to class you need to ensure
More informationAzure for On-Premises Administrators Practice Exercises
Azure for On-Premises Administrators Practice Exercises Overview This course includes optional practical exercises where you can try out the techniques demonstrated in the course for yourself. This guide
More informationByte Classic Miracle Integration Guide 7/19/07
Miracle Integration Guide 1 Byte Classic Miracle Integration Guide 7/19/07 Byte Classic interfaces data to Miracle Online using an application provided by MRG called MRGIFace. MRGIFace is available for
More informationFile systems security: Shared folders & NTFS permissions, EFS Disk Quotas
File systems security: Shared folders & NTFS permissions, EFS Disk Quotas (March 23, 2016) Abdou Illia, Spring 2016 1 Learning Objective Understand Shared Folders Assign Shared Folder permissions NTFS
More informationEnd User Manual. December 2014 V1.0
End User Manual December 2014 V1.0 Contents Getting Started... 4 How to Log into the Web Portal... 5 How to Manage Account Settings... 6 The Web Portal... 8 How to Upload Files in the Web Portal... 9 How
More information1) Log on to the computer using your PU net ID and password.
CS 150 Lab Logging on: 1) Log on to the computer using your PU net ID and password. Connecting to Winter: Winter is the computer science server where all your work will be stored. Remember, after you log
More information5. A small dialog window appears; enter a new password twice (this is different from Dori!) and hit Go.
Installing Wordpress from JMA Lab to JMA Server 1. Take note these instructions are streamlined for the JMA lab they can t be performed in this fashion from home! 2. Wordpress is a database driven web
More informationManual UCSFwpa Configuration for Windows 7
Image not found https://it.ucsf.edu/sites/it.ucsf.edu/themes/custom/it_new/logo.png it.ucsf.edu Published on it.ucsf.edu (https://it.ucsf.edu) Home > Manual UCSFwpa Configuration for Windows 7 Manual UCSFwpa
More informationWireless Setup Instructions for Windows 7
Wireless Setup Instructions for Windows 7 1. Make sure that your wireless feature is turned on. (You may need to flip a switch or press a button on your laptop.) On most laptops you should see a light
More informationSharePoint General Instructions
SharePoint General Instructions Table of Content What is GC Drive?... 2 Access GC Drive... 2 Navigate GC Drive... 2 View and Edit My Profile... 3 OneDrive for Business... 3 What is OneDrive for Business...
More informationSIU s Secure App (XenMobile) Migration for Android
SIU s Secure App (XenMobile) Migration for Android The version of the XenMobile we are currently using has reached its end of support lifespan. In order to maintain support for XenMobile and the associated
More informationSharePoint 2013 Power User EVALUATION COPY. (SHP version 1.0.1) Copyright Information. Copyright 2013 Webucator. All rights reserved.
SharePoint 2013 Power User (SHP2013.2 version 1.0.1) Copyright Information Copyright 2013 Webucator. All rights reserved. The Authors Bruce Gordon Bruce Gordon has been a Microsoft Certified Trainer since
More informationStatus Web Evaluator s Guide Software Pursuits, Inc.
Status Web Evaluator s Guide 2018 Table of Contents Introduction... 2 System Requirements... 2 Contact Information... 2 Installing Microsoft IIS... 2 Verifying Microsoft IIS Features... 9 Installing the
More informationWindows 2000 Disk Management
LAB PROCEDURE 25 Windows 2000 Disk Management OBJECTIVES 1. Use Disk Cleanup. 2. Backup a file. 3. Restore a backup. 4. Compress a file. 5. Encrypt a file. Troubleshooting RESOURCES 1. Marcraft 8000 Trainer
More informationModule 10: Denial of Service
Module 10: Denial of Service Objective The objective of this lab is to help students learn to perform Denial of Service attacks and to test network for Denial of Service flaws. In this lab, you will: Create
More informationHow to make a Work Profile for Windows 10
How to make a Work Profile for Windows 10 Setting up a new profile for Windows 10 requires you to navigate some screens that may lead you to create the wrong type of account. By following this guide, we
More informationAzure 209x Practical Exercises Overview
Azure 209x Practical Exercises Overview This course includes optional exercises where you can try out the techniques demonstrated in the course for yourself. This guide lists the steps for the individual
More informationGetting Started with Cisco WebEx Meeting Applications
CHAPTER 6 Getting Started with Cisco WebEx Meeting Applications Revised: September, 2010, Contents Modifying Your Provisioned Cisco WebEx Account, page 6-1 Setting Proxy Permissions, page 6-5 Productivity
More informationVMware AirWatch: Directory and Certificate Authority
Table of Contents Lab Overview - HOL-1857-06-UEM - VMware AirWatch: Directory and Certificate Authority Integration... 2 Lab Guidance... 3 Module 1 - Advanced AirWatch Configuration, AD Integration/Certificates
More informationFleet Manager 2002 Professional Network Configuration Guide
Handling a complex world. Fleet Manager 2002 Professional Network Configuration Guide Overview The VDO Fleet Manager Professional utilises an advanced three-tier client-server model and is designed to
More informationAbila MIP DrillPoint Reports. Installation Guide
Abila MIP DrillPoint Reports This is a publication of Abila, Inc. Version 16.1 2015 Abila, Inc. and its affiliated entities. All rights reserved. Abila, the Abila logos, and the Abila product and service
More informationModule Overview. Instructor Notes (PPT Text)
Module 12 - Deploying and Configuring SSIS Packages Page 1 Module Overview Instructor Notes (PPT Text) Microsoft SQL Server Integration Services (SSIS) provides tools that make it easy to deploy packages
More informationPontem Check for Updates Guide
Pontem Check for Updates Guide STEP ONE: Back Up Your Database Log into your Pontem database as usual.. Next, select File Maintenance Backup for the Pontem application you wish to back up from the menu.
More informationLAB MANUAL. Craig Zacker.
Free ebooks ==> www.ebook777.com LAB MANUAL Craig Zacker www.ebook777.com Free ebooks ==> www.ebook777.com www.ebook777.com This page is intentionally left blank Free ebooks ==> www.ebook777.com Installing
More informationMyNIC Team Site - Document Sharing
Table of Contents Create a Document...2 Upload a Document...3 Rename Document...4 Edit a Document...6 Check-out a Document...6 Edit a Document...7 Check-in a Document...9 Check-in Someone Else s Document...
More informationYou can also check the videos at the bottom of this page:
This document is provided to give you an idea what R-Tag Version Control can do and how you can use it. If you decide that you need more information or you prefer to see a demo of the software please do
More informationWindows quick start instructions Pg. 1. OS X quick start instructions Pg. 4. ios quick start instructions Pg. 6
Page 1 of 12 Windows quick start instructions Pg. 1 OS X quick start instructions Pg. 4 ios quick start instructions Pg. 6 Android quick start instructions Pg. 9 Windows Quick Start Instructions STEP 1
More informationPST for Outlook Admin Guide
PST for Outlook 2013 Admin Guide Document Revision Date: Sept. 25, 2015 PST Admin for Outlook 2013 1 Populating Your Exchange Mailbox/Importing and Exporting.PST Files Use this guide to import data (Emails,
More informationBROWSER-BASED SUPPORT CONSOLE USER S GUIDE. 31 January 2017
BROWSER-BASED SUPPORT CONSOLE USER S GUIDE 31 January 2017 Contents 1 Introduction... 2 2 Netop Host Configuration... 2 2.1 Connecting through HTTPS using Certificates... 3 2.1.1 Self-signed certificate...
More informationDemonstration Instructions
Demonstration Instructions Digital Defence Ltd. Secure Mobile Version 10.2.1 19 th July 2010 Table of Contents TABLE OF CONTENTS... 2 1. DEMONSTRATION INSTRUCTIONS... 3 1.1 PREREQUISITES... 3 1.2 PROCEDURE...
More informationDetailed Installation Guide
Detailed Installation Guide ShopOps is a human resource, process management, and organizational system. As an easy to use web-based application, focused on the infrastructure of your business. ShopOps
More informationIn most cases, the userid is Adatum\Administrator and the password is Pa55w.rd, but read the instructions carefully.
INF219x Advanced Virtualization Practical Exercises Overview This course comes with a virtual lab environment where you can practice what you learn. Launch the lab environment from the Welcome > Getting
More informationConnecting to the NJITSecure wireless network.
Connecting to the NJITSecure wireless network. 1. Start by going to the Start menu and selecting Control Panel 2. Your control Panel will most likely be in Category view, you will need to change it to
More informationConfiguring File Server Resource Manager (FSRM)
Configuring File Server Resource Manager (FSRM) LESSON 5 70-411 EXAM OBJECTIVE Objective 2.2 Configure File Server Resource Manager (FSRM). This objective may include but is not limited to: install the
More informationHow to Install, Configure and Use sftp (Windows Version)
How to Install, Configure and Use sftp (Windows Version) The sftp secure File Transfer Protocol allows you to transfer patient datasets to and from IDT s server securely. All data transfers are encrypted
More informationConnect to Wireless, certificate install and setup Citrix Receiver
Connect to Wireless, certificate install and setup Citrix Receiver This document explains how to connect to the Wireless Network and access applications using Citrix Receiver on a Bring Your Own Device
More informationKG-TOWER Software Download and Installation Instructions
KG-TOWER Software Download and Installation Instructions Procedures are provided for three options to download and install KG-TOWER software version 5.1. Download to a temporary folder and install immediately.
More informationUser Guide. BlackBerry Workspaces for Windows. Version 5.5
User Guide BlackBerry Workspaces for Windows Version 5.5 Published: 2017-03-30 SWD-20170330110027321 Contents Introducing BlackBerry Workspaces for Windows... 6 Getting Started... 7 Setting up and installing
More informationGetting Started with BarTender
Getting Started with BarTender MANUAL Contents Getting Started with BarTender 3 Installation 4 Choosing What to Install 4 Automation Editions (Automation and Enterprise Automation) 4 Installing BarTender
More informationMobile Inventory Tracking & Sales Management Software. Installation Procedure
Mobile Inventory Tracking & Sales Management Software Installation Procedure Tecom Group, Inc. 2016 Hello! Thank you for choosing HandiFox an award-winning Inventory Tracking and Sales Management solution.
More informationAPP NOTES Onsight Rugged Smart Camera Wireless Network Configuration
APP NOTES Onsight Rugged Smart Camera Wireless Network Configuration July 2016 Table of Contents 1. Overview... 4 1.1 Onsight Setup Wizard... 4 1.2 Onsight Wireless Manual Setup... 4 1.3 Hotspot Login...
More informationASSA ABLOY. CLIQ Connect PC Application User Manual
ASSA ABLOY CLIQ Connect PC Application User Manual Table of Contents 1 INTRODUCTION... 3 2 VERSIONS... 3 2.1 CLIQ Web Manager/Remote... 3 2.2 Key Firmware... 3 2.3 Microsoft Windows... 3 3 INSTALLATION...
More informationPlease click on the appropriate link to navigate through the available solutions:
Error with your Java/UCF configuration: User Guide Updated: 08/11/2015 **NOTE: The limit is 8 Files/200MB for Import/Checkin and 20 Files/400MB for Export/Checkout. This File Transfer solution is Java-free
More informationms-help://ms.technet.2004apr.1033/win2ksrv/tnoffline/prodtechnol/win2ksrv/howto/efsguide.htm
Page 1 of 14 Windows 2000 Server Step-by-Step Guide to Encrypting File System (EFS) Abstract This document provides sample procedures that demonstrate the end-user and administrative capabilities of the
More informationThis course comes with a virtual lab environment where you can practice what you learn.
INF220x Security Practical Exercises Overview This course comes with a virtual lab environment where you can practice what you learn. In most cases, the userid is Adatum\Administrator and the password
More informationDSS User Guide. End User Guide. - i -
DSS User Guide End User Guide - i - DSS User Guide Table of Contents End User Guide... 1 Table of Contents... 2 Part 1: Getting Started... 1 How to Log in to the Web Portal... 1 How to Manage Account Settings...
More informationWindows Server 2012 Immersion Experience Enabling Secure Remote Users with RemoteApp, DirectAccess, and Dynamic Access Control
Windows Server 2012 Immersion Experience Enabling Secure Remote Users with RemoteApp, DirectAccess, and Dynamic Access Control Windows Server 2012 Hands-on lab In this experience, you will configure a
More informationOTC Student Wireless Network
OTC Student Wireless Network (Connection Instructions for Windows 8, Windows 7, MAC OSX, ios and Kindle) Note: The OTC student wireless network conforms to the IEEE 802.11 a/b/g protocol and standards.
More informationInstallation Guide. Last Revision: Oct 03, Page 1-
Installation Guide Last Revision: Oct 03, 2005 -Page 1- Contents Before You Begin... 2 Installation Overview... 2 Installation for Microsoft Windows 2000, Windows 2003, and Windows XP Professional... 3
More informationGIAC Introduction to Security Fundamentals. Laptop and External Drive Configuration Guide Version 1.1 SEC301
GIAC Introduction to Security Fundamentals Laptop and External Drive Configuration Guide Version 1.1 SEC301 SEC301 - Hands-on Exercises Addendum Page 1 Table of Contents Background... 3 Create a local
More informationUsing Expressions Web to Edit an FCNet Department Web Site
Using Expressions Web to Edit an FCNet Department Web Site Here are the steps to open and edit a site on the new FcWebDept shared department web site server using Microsoft Expression Web 4. The steps
More informationPacific Premier Bank s Business e- Banking Getting Started Guide With QuickBooks for Mac
Pacific Premier Bank s Business e- Banking Getting Started Guide With QuickBooks 2013-2015 for Mac Table of Contents SET UP AN ACCOUNT FOR ONLINE BANKING (DIRECT CONNECT)... 2 SET UP AN ACCOUNT FOR ONLINE
More informationPractice and Review Activities Software
Practice and Review Activities Software Installation and Setup Procedure Reading Mastery Signature Edition Corrective Reading Installation Insert the Practice and Review Activities CD-ROM into the CD/DVD
More informationStoring Your Exercise Files
Storing Your Exercise Files This appendix contains an overview for using this book with various file storage media, such as a USB flash drive or hard drive. Detailed instructions for downloading and unzipping
More informationApplication Notes for Telephonetics IP Messaging Utility with Avaya IP Office 9.0 using Avaya Voic Pro Issue 1.0
Avaya Solution & Interoperability Test Lab Application Notes for Telephonetics IP Messaging Utility with Avaya IP Office 9.0 using Avaya Voicemail Pro Issue 1.0 Abstract These Application Notes describe
More informationms-help://ms.technet.2004apr.1033/ad/tnoffline/prodtechnol/ad/windows2000/howto/mapcerts.htm
Page 1 of 8 Active Directory Step-by-Step Guide to Mapping Certificates to User Accounts Introduction The Windows 2000 operating system provides a rich administrative model for managing user accounts.
More informationLiveNX Upgrade Guide from v5.1.2 to v Windows
LIVEACTION, INC. LiveNX Upgrade Guide from v5.1.2 to v5.1.3 - Windows UPGRADE LiveAction, Inc. 3500 Copyright WEST BAYSHORE 2016 LiveAction, ROAD Inc. All rights reserved. LiveAction, LiveNX, LiveUX, the
More informationImplementing Messaging Security for Exchange Server Clients
Implementing Messaging Security for Exchange Server Clients Objectives Scenario At the end of this lab, you will be able to: Protect e-mail messages using S/MIME signing and encryption Manage e-mail attachment
More informationHow to use Microsoft OneDrive
How to use Microsoft OneDrive Instructions for Saint Paul College Students Table of Content What is OneDrive?... 2 How do I access OneDrive?... 2 How do I upload documents to OneDrive?... 3 How do I create
More informationDesktop & Laptop Edition
Desktop & Laptop Edition USER MANUAL For Mac OS X Copyright Notice & Proprietary Information Redstor Limited, 2016. All rights reserved. Trademarks - Mac, Leopard, Snow Leopard, Lion and Mountain Lion
More informationRemote Deposit. Getting Started Guide
Remote Deposit Getting Started Guide Table of Contents Introduction... 3 Minimum System Requirements... 3 Direct Merchant Smart Deposit Installation Instructions... 6 Multi-Factor Authentication Enrollment...
More informationBusiness Insights Dashboard
Business Insights Dashboard Sage 500 ERP 2000-2013 Sage Software, Inc. All rights reserved. Sage, the Sage logos, and the Sage product and service names mentioned herein are registered trademarks or trademarks
More informationHill s Pet Nutrition Admin Center Guide
Table of Contents 1 Introduction... 3 1.1 Background... 3 1.2 User Types/Roles... 3 1.3 General Navigation... 3 1.3.1 Sign In... 3 1.3.2 Sign Out... 5 1.3.3 Role Navigation... 5 2 Supervisor Role... 7
More informationCreate MedicCoin Master Node Instruction Rev2
Create MedicCoin Master Node Instruction Rev2 1. Download MedicCoin wallet using below link https://mediccoin.com/mediccoin-window.zip 2. Unzip/extract MedicCoin-Window.zip to C:\coins\MedicCoin folder.
More informationFiles.Kennesaw.Edu. Kennesaw State University Information Technology Services. Introduces. Presented by the ITS Technology Outreach Team
Kennesaw State University Information Technology Services Introduces Files.Kennesaw.Edu Presented by the ITS Technology Outreach Team Last Updated 08/12/13 Powered by Xythos Copyright 2006, Xythos Software
More information