Skandocs Installation and Connectivity Guide What you need to know to successfully utilise the Internet connectivity in Skandocs
|
|
- Kerry Turner
- 5 years ago
- Views:
Transcription
1 Skandocs Installation and Connectivity Guide What you need to know to successfully utilise the Internet connectivity in Skandocs Intended Audience This document is aimed at IT technical support professionals for client networks where it is intended that the Skandocs client will be used to remotely access a Skandocs database hosted by Skanska UK via the public Internet. Background Skandocs is a document control system written and implemented by Skanska UK. Authentication servers are hosted by Skanska UK and are available on the public Internet. Access is granted by Skanska UK who issue usernames and passwords to invited users. Desktop functionality is provided by a Windows based client program which needs to be deployed on the client PC. Scope This document contains the information required to deploy the Skandocs client on a non- Skanska network as well as how to configure border security to allow access to the Skandocs server. Architecture The Skandocs system is client-server based. The client program is deployed on the User s PC, with servers hosted by Skanska on the public Internet. Communication between the client component and the server is conducted entirely via the HTTP protocol on TCP port 80. This communication may be provided by HTTP CERN-style proxies, including Netscape Proxy 3.6, Squid 2.x, and Microsoft ISA. Client PC Requirements The Skandocs client software runs on Windows 2000 or later. The program itself is a single binary executable, and therefore does not require installation on the PC which will host it; one simply downloads and executes the binary. Therefore on NT based Systems (Windows 2000 and Windows XP) there is no requirement for the user to have Administrator privileges on the host PC to download and run the executable. However the Skandocs executable does utilise client libraries from Microsoft Internet Explorer (5.0 minimum 6.0 SP1 recommended) and Microsoft Data Access Components 2.6 or later, both or which must be installed on the machine which will host the Skandocs client application in order for it to function correctly. In most cases Internet Explorer and MDAC are already installed under Windows 2000 or later. Client Internet Access Requirements All communication with the Skandocs servers is done by means of the HTTP protocol with a destination port of 80. Both servers, either or can respond to requests. This means that in most cases existing security will permit access to Skandocs, provided that Internet Explorer on the host machine is configured correctly. The client PC must either be able to resolve the hostnames or and open a TCP connection to port 80 on that server (Fig. 5 example a), or be configured to pass the request to an HTTP proxy server which is capable of doing so (Fig. 5 example b). Page 1 of 5
2 Proxy Server Configuration and Authentication If a proxy server is used which requires user authentication, this is also supported within Skandocs. In the case of a Microsoft ISA server which is configured to permit NTLM style authentication, then this should be transparent, and Skandocs will use the proxy server in the context of the logged in user on the Host PC. In the event that the current user on the host PC does not hold sufficient privileges to the proxy for the operation, or that a proxy which uses basic authentication is in place, then Skandocs will prompt for a username, password (and domain where appropriate) in order to authenticate the user through the proxy (Fig. 1). Figure 1. Skandocs login screen showing prompt for proxy authentication credentials. These credentials are for proxy authentication, and are distinct to the Skandocs credentials supplied by Skanska to log in to the application (Fig. 2). Figure 2. Skandocs login screen following successful contact with or, awaiting entry of Skandocs user credentials Page 2 of 5
3 It is possible to override the proxy and authentication settings from Internet Explorer in order to configure Skandocs to use different settings from those used by the browser. In order to override the proxy configuration, when you get to the Skandocs main screen click on System configuration in the left pane tree. Then in the top right pane select Proxy settings (Fig. 3). In order to override the Internet Explorer settings, tick the enabled box and enter the hostname or IP address of your proxy server in the host field and the TCP port that the proxy server listens on in the port field. Click on the Save changes button in the middle bar. You must now close and re-open Skandocs in order for the changes to be effected. In the event that you wish to return Skandocs to using the Internet Explorer proxy configuration, then re-enter the screen shown in Figure 3 and click the Enabled field again to turn the tick into a cross. Then click the Save Changes button and close and re-open Skandocs. Figure 3. Skandocs main screen showing the proxy configuration override. Note the Save changes button which is indicated by the mouse pointer. Page 3 of 5
4 A similar procedure is undertaken for setting manual authentication settings. You may wish to configure Skandocs to automatically provide credentials to your proxy server, rather than prompting the user. In this case on the Skandocs main screen select System Configuration in the left pane tree and then Authentication Settings in the top right pane. Tick the Authentication box and enter the proxy credentials in the username and password fields (Fig. 4). Ensure that the Save Changes button is clicked before closing and restarting the Skandocs client to invoke the changes. In order to remove the stored credentials and return to a prompt for proxy credentials, return to the screen shown in Figure 4 and click the Authentication box until it shows a cross. Click the Save Changes button and close and re-start the Skandocs client to invoke the change. Figure 4. Entering the proxy authentication credentials. Note the Save Changes button indicated by the mouse pointer. Page 4 of 5
5 ( ) ( ) ( ) ( ) Internet Internet Client s network to ISP router Client s network to ISP router Client s Firewall Must allow client workstation to open TCP port 80 to Client s Firewall Must allow client proxy server to open TCP port 80 to Client's Proxy Server Must allow client workstation to make web requests to Client s workstation hosting Skandocs client program All communication with Skandocs Server transported by HTTP protocol. HTTP servers are :80 :80 Example (a) - Workstation running Skandocs client is permitted to make direct TCP port 80 connections to Internet hosts. Client s workstation hosting Skandocs client program All communication with Skandocs Server transported by HTTP protocol. HTTP server is :80 Example (b) - Workstation running Skandocs client is required to use an HTTP proxy to connect to Internet hosts. Figure 5. Two examples of Skandocs deployed on a non-skanska Network For Skandocs assistance please contact the Skanska IT Helpdesk on +44(0) (0800 to 1800hrs Mon-Fri) or mailto:it.support@skanska.co.uk Page 5 of 5
How to open ports in the DSL router firmware version 2.xx and above
How to open ports in the DSL router firmware version 2.xx and above This example shows how to open port 3389 (which is used by Remote Desktop service) in the DSL router running firmware version 2.xx or
More informationRev. 06 Nov User Guide: Downloading and Logging into Skandocs
Rev. 06 Nov. 2007 User Guide: Downloading and Logging into Skandocs Introduction Skandocs (Skanska Document Online Collaboration System) is a purpose-built document management & control system built by
More informationBusiness Connect Secure Remote Access Service (SRAS) Customer Information Package
Business Connect Secure Remote Access Service (SRAS) Customer Information Package Table of Contents 1.0 Introduction... 1 1.1 Overview... 1 1.2 Scope and Audience... 1 1.3 Design Deliverables... 1 1.4
More informationLab Configuring and Verifying Extended ACLs Topology
Topology 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 1 of 8 Addressing Table Objectives Device Interface IP Address Subnet Mask Default Gateway R1 G0/1 192.168.10.1
More informationImplementing DVN. directpacket Product Guide
Implementing DVN directpacket Product Guide directpacket Research www.directpacket.com 2 1 DVN and the IPC Community The Secure Dedicated Versatile Network (DVN) Server is a hardened internet facing device
More informationConfiguring Remote Access using the RDS Gateway
Configuring Remote Access using the RDS Gateway Author: AC, SNE Contents Introduction... 3 Pre-requisites... 3 Supported Operating Systems... 3 Installing the I.T. Services Certificate Authority Root Certificate...
More informationHow to Configure Guest Access with the Ticketing System
How to Configure Guest Access with the Ticketing System Set up a login or ticketing system to temporarily grant access to guest users. Ticketing admins assign guest tickets to the users. The user credentials
More informationInternet. NetSupport. Implementing and using the. Connectivity Server
Internet Implementing and using the Connectivity Server Summary With the increased use of the internet, common questions asked by customers using Manager are: Can I connect to and remote control a machine
More informationParallels Remote Application Server
Parallels Remote Application Server Parallels Client for Mac User's Guide v16 Parallels International GmbH Vordergasse 59 8200 Schaffhausen Switzerland Tel: + 41 52 672 20 30 www.parallels.com Copyright
More informationMediCal QAWeb Relay installation instructions
MediCal QAWeb Relay installation instructions Table of contents Minimum system requirements...2 Gathering important information...2 Configuring network devices...4 Installing MediCal QAWeb Relay...8 Reinstalling/updating
More informationLink Gateway Initial Configuration Manual
Link Gateway Initial Configuration Manual Copyright 2016 NetLinkz. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system, or translated
More informationAuthlogics Forefront TMG and UAG Agent Integration Guide
Authlogics Forefront TMG and UAG Agent Integration Guide With PINgrid, PINphrase & PINpass Technology Product Version: 3.0.6230.0 Publication date: January 2017 Authlogics, 12 th Floor, Ocean House, The
More informationManaging Authentication and Identity Services
You can create access policies based on user identity rather than IP addresses. To enable identity-based services, you configure policies and options to obtain user identity, and then use identity objects
More informationParallels Remote Application Server
Parallels Remote Application Server Parallels Client for Windows User's Guide v15.5 Parallels International GmbH Vordergasse 59 8200 Schaffhausen Switzerland Tel: + 41 52 672 20 30 www.parallels.com Copyright
More informationInstallation guide for Choic Multi User Edition
Installation guide for ChoiceMail Multi User Edition March, 2004 Version 2.1 Copyright DigiPortal Software Inc., 2002 2004 All rights reserved ChoiceMail Multi User Installation Guide 1. Go to the URL
More informationStep-by-Step Configuration
Step-by-Step Configuration Kerio Technologies C 2001-2004 Kerio Technologies. All Rights Reserved. Printing Date: April 25, 2004 This guide provides detailed description on configuration of the local network
More informationConfiguring Proxy Settings. STEP 1: (Gathering Proxy Information) Windows
This guide is provided to Elluminate Live! users to assist them to make a successful connection to an Elluminate Live! session through a proxy firewall. In some cases settings discussed in this document
More informationConfiguring Request Authentication and Authorization
CHAPTER 15 Configuring Request Authentication and Authorization Request authentication and authorization is a means to manage employee use of the Internet and restrict access to online content. This chapter
More informationHow to Configure a Remote Management Tunnel for an F-Series Firewall
How to Configure a Remote Management Tunnel for an F-Series Firewall If the managed NextGen Firewall F-Series cannot directly reach the NextGen Control Center, it must connect via a remote management tunnel.
More informationWINDOWS HOST GUIDE. Remote Support & Management PC Mac Tablet Smartphone Embedded device. WiseMo Host module on your PC or Server
WINDOWS HOST GUIDE Remote Support & Management PC Mac Tablet Smartphone Embedded device WiseMo Guest module for example on your Windows PC WiseMo Host module on your PC or Server WiseMo develops software
More informationStep-by-Step Guide to Ansur Executive 3.0 With or without Electronic Signatures
Step-by-Step Guide to Ansur Executive 3.0 With or without Electronic Signatures Table of Contents Background...3 Set up Central PC:...4 Configuring SQL Server 2005:... 11 Ansur Executive Server Installation:...
More informationHow to Configure a Remote Management Tunnel for Barracuda NG Firewalls
How to Configure a Remote Management Tunnel for Barracuda NG Firewalls If the managed NG Firewall can not directly reach the NG Control Center it must connect via a remote management tunnel. The remote
More informationParallels Remote Application Server
Parallels Remote Application Server Parallels Client for Windows User's Guide v16.1 Parallels International GmbH Vordergasse 59 8200 Schaffhausen Switzerland Tel: + 41 52 672 20 30 www.parallels.com Copyright
More informationCisco IOS Firewall Authentication Proxy
Cisco IOS Firewall Authentication Proxy This feature module describes the Cisco IOS Firewall Authentication Proxy feature. It includes information on the benefits of the feature, supported platforms, configuration
More informationInstallation Guide. 3CX CRM Plugin for ConnectWise. Single Tenant Version
Installation Guide 3CX CRM Plugin for ConnectWise Single Tenant Version "Copyright VoIPTools, LLC 2011-2016" Information in this document is subject to change without notice. No part of this document may
More informationWebSpray TM. User Guide. Web Server Stress-Testing Tool. Version 2.0
WebSpray TM Web Server Stress-Testing Tool User Guide Version 2.0 Copyright Copyright 2006 CAI Networks, Inc. All Rights Reserved. The information contained in this document is the property of CAI Networks,
More informationInstalling Authoring Manager
Installing Authoring Manager Installing Authoring Manager v5.2 (PC only) System Requirements: Before you install Authoring Manager, you should ensure that your system meets the minimum software and hardware
More informationConfiguring Actinic with ISA Server 2000
Configuring Actinic with ISA Server 2000 Actinic Software Ltd. Author: Gordon Camley Date: 26 January 2004 Revision: 1.0 Introduction As of release 6.1.4, Actinic can be configured to work with an ISA
More informationecopy ShareScan v4.2 for ecopy ScanStation Pre-Installation Checklist
ecopy ShareScan v4.2 for ecopy ScanStation Pre-Installation Checklist This document is used to gather data about your environment in order to ensure a smooth product implementation. The Network Communication
More informationPremium Pro Enterprise Local Installation Guide for Database Installation on a desktop PC (Cloudscape)
Premium Pro Enterprise Local Installation Guide for Database Installation on a desktop PC (Cloudscape) This guide is to be used if you intend on installing enterprise as a stand alone application on one
More informationTaskbar for Windows. Contents. Overview. Prerequisites. Versions. PositiveID Support. Installer
Taskbar for Windows Contents 1 Overview 1.1 Versions 1.2 PositiveID Support 1.3 Installer 2 Prerequisites 3 Architecture 4 Swivel Server Configuration 4.1 Enabling Session creation with username 5 Taskbar
More informationScan-to- . Copytech s guide to setting up Scan-to- on Konica Minolta M FDs
Scan-to-Email Copytech s guide to setting up Scan-to- Email on Konica Minolta MFDs Time required for set up: Approximately 20 minutes Engineer required: No Copytech s guide to setting up Scan-to-Email
More informationIntel Small Business Extended Access. Deployment Guide
Intel Small Business Extended Access Deployment Legal Notices and Disclaimers Disclaimers INTEL CORPORATION MAKES NO WARRANTY OF ANY KIND WITH REGARD TO THIS MATERIAL, INCLUDING, BUT NOT LIMITED TO, THE
More informationWebthority can provide single sign-on to web applications using one of the following authentication methods:
Webthority HOW TO Configure Web Single Sign-On Webthority can provide single sign-on to web applications using one of the following authentication methods: HTTP authentication (for example Kerberos, NTLM,
More informationOutlook 2003 Desktop Configuration for Remote Access User Guide
Outlook 2003 Desktop Configuration for Remote Access User Guide Outlook 2003 Desktop Configuration for Remote Access 1 of 9 Transferring Microsoft Outlook Data How to Export Personal Folders (.pst) File
More informationNETOP GUEST FOR ANDROID GUIDE
31.01.2017 NETOP GUEST FOR ANDROID GUIDE Contents 1 Introduction... 2 1.1 Document Scope... 2 2 Installing the Netop Guest... 3 2.1 Enter the Netop Guest license key... 3 3 Using the Netop Guest... 5 3.1
More informationSonicWALL Security Appliances. SonicWALL SSL-VPN 200 Getting Started Guide
SonicWALL Security Appliances SonicWALL SSL-VPN 200 Getting Started Guide SonicWALL SSL-VPN 200 Appliance Getting Started Guide This Getting Started Guide contains installation procedures and configuration
More informationMAC HOST GUIDE. Remote Support & Management PC Mac Tablet Smartphone Embedded device. WiseMo Host module on your Mac computer
MAC HOST GUIDE Remote Support & Management PC Mac Tablet Smartphone Embedded device WiseMo Guest module for example on your Windows PC WiseMo Host module on your Mac computer WiseMo develops software for
More informationFarin Foresight/Insight RemoteApp Access Document last updated: 2/7/2017
1 P a g e Farin Foresight/Insight RemoteApp Access Document last updated: 2/7/2017 In the event of any questions or issues, please contact our Farin Client Care team: Farin Financial Risk Management: 866-230-2161
More informationDeployment Guide Installing WhatsUp Gold Distributed Edition to Central and Remote Sites
Deployment Guide Installing WhatsUp Gold Distributed Edition to Central and Remote Sites This guide provides information about installing and configuring WhatsUp Gold Central and Remote Sites. Contents
More informationTwo-Factor Authentication for Q-Port
Two-Factor Authentication for Q-Port Installation Guide Date: 2017-06-21 Document Version: 1.1 LEGAL DISCLAIMER Neither Nasdaq Inc. or any of its affiliates or subsidiaries (collectively Nasdaq ) assumes
More informationAccess Gateway 9.3, Enterprise Edition
Access Gateway 9.3, Enterprise Edition 2015-05-03 05:23:10 UTC 2015 Citrix Systems, Inc. All rights reserved. Terms of Use Trademarks Privacy Statement Contents Access Gateway 9.3, Enterprise Edition...
More informationinfoxpert Support Article
infoxpert Support Article Version Date: March 2011 infoxpert Version: infoxpert Version 8.0.43 and above. Document Distribution This document is of a technical nature and is targeted to I.T. staff. Details
More information10ZiG Technology. Thin Desktop Quick Start Guide
10ZiG Technology Thin Desktop Quick Start Guide 2010 05 20 Introduction This document is intended as a quick start guide for installing Thin Desktop. After reading this document, you will know how to:
More informationNBAR2 HTTP-Based Visibility Dashboard
The NBAR2 HTTP-based Visibility Dashboard provides a web interface displaying network traffic data and related information. The information is presented in an intuitive, interactive graphical format. Finding
More informationNetExtender for SSL-VPN
NetExtender for SSL-VPN Document Scope This document describes how to plan, design, implement, and manage the NetExtender feature in a SonicWALL SSL-VPN Environment. This document contains the following
More informationECS Service USER GUIDE
ECS Service USER GUIDE TABLE OF CONTENTS 1. Preface... 3 2. Prerequisites... 4 2.1. Compatible platforms:... 4 2.2. Connection to Volvo... 4 2.2.1. Antivirus and Firewall... 4 2.2.2. Firewall Configuration...
More informationMicrosoft Outlook Setting up an account
Microsoft Outlook 2010 Setting up an email account In order to be able to send and receive emails from and to your new email account you will need to first set up the account in your Outlook software.
More informationChecklist. Version 2.0 October 2015
Version 2.0 October 2015 Checklist Table of Contents Setup Issues 3 Virtual Services Platform 3 Device LinkUp 5 Desktop LP 6 VPN LP 6 Usage 7 Virtual Services Platform 7 VPN LP 7 Migration 8 AppDirect
More informationPrivileged Identity App Launcher and Session Recording
Privileged Identity App Launcher and Session Recording 2018 Bomgar Corporation. All rights reserved worldwide. BOMGAR and the BOMGAR logo are trademarks of Bomgar Corporation; other trademarks shown are
More informationDell SupportAssist Version 1.0 For Microsoft System Center Operations Manager User's Guide
Dell SupportAssist Version 1.0 For Microsoft System Center Operations Manager User's Guide Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your
More informationNetBrain Enterprise Server 5.0 Edition 4 Steps to Setup NetBrain
Overview The NetBrain system has four components: Customer License Server, Workspace Server, Network Server and Workstation. Customer License Server manages workspaces and license Workspace Server holds
More informationThe following topics provide more information on user identity. Establishing User Identity Through Passive Authentication
You can use identity policies to collect user identity information from connections. You can then view usage based on user identity in the dashboards, and configure access control based on user or user
More informationTwo-Factor Authentication for Q-Port
Two-Factor Authentication for Q-Port Installation Guide Date: 2017-05-24 Document Version: 1.0 LEGAL DISCLAIMER Neither Nasdaq Inc. or any of its affiliates or subsidiaries (collectively Nasdaq ) assumes
More informationLab Capturing and Analyzing Network Traffic
Lab 1.2.2 Capturing and Analyzing Network Traffic Host Name IP Address Fa0/0 Subnet Mask IP Address S0/0/0 Subnet Mask Default Gateway RouterA 172.17.0.1 255.255.0.0 192.168.1.1 (DCE) 255.255.255.0 N/A
More informationProxyCap Help. Table of contents. Configuring ProxyCap Proxy Labs
ProxyCap Help 2016 Proxy Labs Table of contents Configuring ProxyCap The Ruleset panel Loading and saving rulesets Delegating ruleset management The Proxies panel The proxy list view Adding, removing and
More informationTROUBLESHOOTING GUIDE FOR WAIS LEVEL 2
TROUBLESHOOTING GUIDE FOR WAIS LEVEL 2 29 June 2017 Troubleshooting Connection NOTE: You can click Send Log File button on the VPN connection program, and inform the Secretariat (wais@wassenaar.org or
More informationPrintSuperVision.net Features and Installation
Features and Installation INTRODUCTION FEATURES ACCESS LEVELS REAL-TIME STATUS PrintSuperVision 2.0 (.net) is a powerful, easy-to-use web-based application for monitoring, reporting data, and managing
More informationNewcomers & Leavers EMIS WEB
Newcomers & Leavers EMIS WEB DXS How-to-Guides A guide to what steps you need to take to register new users and delete any leavers DXS How-To-Guides 1 How-to-guides: Newcomers & Leavers Introduction It
More informationCopyright and Trademarks
Copyright and Trademarks Specops Password Reset is a trademark owned by Specops Software. All other trademarks used and mentioned in this document belong to their respective owners. 2 Contents Key Components
More informationLab - Using Wireshark to Examine a UDP DNS Capture
Topology Objectives Part 1: Record a PC s IP Configuration Information Part 2: Use Wireshark to Capture DNS Queries and Responses Part 3: Analyze Captured DNS or UDP Packets Background / Scenario If you
More informationRealms and Identity Policies
The following topics describe realms and identity policies: Introduction:, page 1 Creating a Realm, page 5 Creating an Identity Policy, page 11 Creating an Identity Rule, page 15 Managing Realms, page
More informationCompuCal Version 6 Installation Guide (Windows 2008/R2) Release
CompuCal Version 6 Installation Guide (Windows 2008/R2) Release 6.3.0.4 Copyright CompuCal Calibration Solutions 2015 Page 1 of 17 Table of Contents 1. MINIMUM SPECIFICATIONS... 3 1.1 Client Server Spec...
More informationNetDespatch Velocity Connector User Guide
NetDespatch Velocity Connector User Guide XML version Customised guide specifically for use with XML Integrations Guide refers to Microsoft Windows 7 Requirements before Proceeding You will need to have:
More informationReconfiguring VMware vsphere Update Manager. 17 APR 2018 VMware vsphere 6.7 vsphere Update Manager 6.7
Reconfiguring VMware vsphere Update Manager 17 APR 2018 VMware vsphere 6.7 vsphere Update Manager 6.7 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/
More informationIntegrated Information Technology Services (IITS)
Integrated Information Technology Services (IITS) User Guide for Laptops with Windows 7 Network Configuration & Software Installation Version 1.4 Updated as at 15-Aug-11 Table of Contents How to verify
More informationNetBrain OE System Quick Start Guide
NetBrain Technologies Inc. NetBrain OE System Quick Start Guide For Operator Edition Administrators Table of Contents 1. Install NetBrain OE System... 3 1.1 Install Gateway Server... 4 1.2 Install Network
More informationConfiguring Caching Services
CHAPTER 8 This chapter describes how to configure conventional caching services (HTTP, FTP [FTP-over-HTTP caching and native FTP caching], HTTPS, and DNS caching) for centrally managed Content Engines.
More informationStep-by-Step Configuration
Step-by-Step Configuration Kerio Technologies C 2001-2006 Kerio Technologies. All Rights Reserved. Printing Date: May 3, 2006 This guide provides detailed description on configuration of the local network
More information3.1. Administrator s Guide TNT SOFTWARE. ELM Log Manager. Version
Version 3.1 TNT SOFTWARE ELM Log Manager Administrator s Guide TNT SOFTWARE ELM Log Manager 3.1 Administrator s Guide Copyright 1997-2003 TNT Software All Rights Reserved 2001 Main Street Vancouver, WA
More informationCitrix SCOM Management Pack 1.4 for ShareFile
Citrix SCOM Management Pack 1.4 for ShareFile Nov 27, 2017 Citrix SCOM Management Pack for ShareFile is an availability and performance management solution that extends end-toend service monitoring capabilities
More informationBlackberry Enterprise Server Pre-installation and Checklist Guide
1 Blackberry Enterprise Server Pre-installation and Checklist Guide Before installing the Blackberry Enterprise Server (BES) Server software, you must: 1. Check System Requirements 2. Configuring required
More informationWhatsUp Gold 2016 Installation and Configuration Guide
WhatsUp Gold 2016 Installation and Configuration Guide Contents Installing and Configuring WhatsUp Gold using WhatsUp Setup 1 Installation Overview 1 Overview 1 Security considerations 2 Standard WhatsUp
More informationReceiver Updater for Windows 3.0
Receiver Updater for Windows 3.0 2012 Citrix Systems, Inc. All rights reserved. Terms of Use Trademarks Privacy Statement Contents Receiver Updater for Windows 3.0 3 About this Release 4 System Requirements
More informationISA 2006 and OWA 2003 Implementation Guide
ISA 2006 and OWA 2003 Implementation Guide Copyright Copyright 2006, CRYPTOCard Corp. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval
More informationGetting Started Using Cisco License Manager
CHAPTER 5 This chapter provides information about the initial setup of Cisco License Manager and an overview of recommended steps to quickly add users and devices and obtain and deploy licenses. This chapter
More informationImplementing, Managing, and Maintaining a Microsoft Windows Server 2003 Network Infrastructure
Question Number (ID) : 1 (jaamsp_mngnwi-088) You are the administrator for medium-sized network with many users who connect remotely. You have configured a server running Microsoft Windows Server 2003,
More informationCRM Connect. Hosted VoIP Services. Administrator Guide. Document Version 1.3. GCI Ltd. Global House. 2 Crofton Close. Lincoln. Lincolnshire LN3 4NT
Hosted VoIP Services CRM Connect Administrator Guide Document Version 1.3 GCI Ltd Global House 2 Crofton Close Lincoln Lincolnshire LN3 4NT www.gcicom.net Copyright Notice Copyright 2014 GCI. All rights
More informationTable of Contents WELCOME... INSTALLATION OVERVIEW SERVER PROGRAM CONFIGURATION... SECURITY LEVELS... WORKSTATION BROWSER SETUP.
Table of Contents WELCOME... INSTALLATION OVERVIEW SERVER PROGRAM CONFIGURATION... SECURITY LEVELS... WORKSTATION BROWSER SETUP. FEATURES AT A GLANCE.. REPORTS. DISPLAYS IP ADDRESS AND PORT NUMBERS SPECIFICATIONS..
More informationSAP e-academy. Quick Reference Sheet
SAP e-academy Quick Reference Sheet Table of Contents 1. Getting Started... 3 1.1. Minimum System Requirements... 3 1.1.1. Hardware Requirements... 3 1.1.2. Operating System... 3 1.1.3. Software... 3 1.1.4.
More informationBarwon Medical Imaging. PACS Installation Instructions
Barwon Medical Imaging PACS Installation Instructions PACS (Synapse) will be installed and can be accessed via an icon on your desktop 1 Accessing Synapse using the External BMI Secure Website: Installing
More informationConfiguration Guide. BlackBerry UEM Cloud
Configuration Guide BlackBerry UEM Cloud Published: 2018-04-18 SWD-20180411125526296 Contents About this guide... 7 Getting started... 8 Configuring BlackBerry UEM Cloud for the first time... 8 Administrator
More informationSoftware Installation Manual
Software Installation Manual Page 1 of 5 Hardware Requirements The ProxnetPro application is installed on a single, dedicated* Host PC, that will then provide Web Server access to any number of connected
More informationPre-Installation Checklist v5.0
Pre-Installation Checklist v5.0 November 2010 Table of Contents Introduction 3 Network infrastructure 4 ShareScan Manager PC 5 Devices 7 ecopy Connectors 8 Network Communication 13 Document Management
More informationIdentity Policies. Identity Policy Overview. Establishing User Identity through Active Authentication
You can use identity policies to collect user identity information from connections. You can then view usage based on user identity in the dashboards, and configure access control based on user or user
More informationSetting Up Windows 2K VPN Connection Through The Symantec Raptor Firewall Firewall
Setting Up Windows 2K VPN Connection Through The Symantec Raptor Firewall Firewall By: Loc Huynh Date: 24 March 2003 Table of Contents 1.0 Foreword...2 2.0 Setting VPN on VPN Server...2 3.0 Setting Symantec
More informationCalendar updated presence
Calendar updated presence Setting up MiCloud and Microsoft Exchange Server Table of Contents Copyright 2016 Mitel Networks Corporation 1. Preconditions and assumptions... 1 2. Presence synchronization
More informationFirewall Authentication Proxy for FTP and Telnet Sessions
Firewall Authentication Proxy for FTP and Telnet Sessions Last Updated: January 18, 2012 Before the introduction of the Firewall Authentication Proxy for FTP and Telnet Sessions feature, users could enable
More informationPurpose. Target Audience. Windows Machine Requirements. Windows Server Core (No Desktop) Nagios XI. Monitoring Windows Using WMI
Purpose This document describes how to monitor Windows machines with Nagios XI using Windows Management Instrumentation (WMI). WMI allows for agentless monitoring of Windows machines which without having
More informationHelp Document Series: Connecting to your Exchange mailbox via Outlook from off-campus
Help Document Series: Connecting to your Exchange mailbox via Outlook from off-campus This document will take you through setting up your Clark Exchange mailbox in Outlook 2003 from off-campus. This will
More informationFUJITSU Cloud Service S5. Introduction Guide. Ver. 1.3 FUJITSU AMERICA, INC.
FUJITSU Cloud Service S5 Introduction Guide Ver. 1.3 FUJITSU AMERICA, INC. 1 FUJITSU Cloud Service S5 Introduction Guide Ver. 1.3 Date of publish: September, 2011 All Rights Reserved, Copyright FUJITSU
More informationManaging User Roles and Users in LMS
7 CHAPTER This chapter explains the following: Managing Roles Managing Users Managing Roles A role is a collection of privileges that dictate the type of system access you have. The Manage User Roles workflow
More informationConfiguration Guide for Exchange Reporter Plus
Configuration Guide for Exchange Reporter Plus Table of Contents Welcome to Exchange Reporter Plus 3 Getting Started 4 System Requirements 4 Hardware Requirements Software Requirements Supported Platforms
More informationReceiver (Updater) for Mac 2.1
Receiver (Updater) for Mac 2.1 2014-10-28 12:49:20 UTC 2014 Citrix Systems, Inc. All rights reserved. Terms of Use Trademarks Privacy Statement Contents Receiver (Updater) for Mac 2.1... 3 About... 4 System
More informationMicrosoft ISA 2006 Integration. Microsoft Internet Security and Acceleration Server (ISA) Integration Notes Introduction
Microsoft ISA 2006 Integration Contents 1 Microsoft Internet Security and Acceleration Server (ISA) Integration Notes 2 Introduction 3 Prerequisites 3.1 ISA 2006 Filter 3.2 TMG Filter 4 Baseline 5 Architecture
More informationManagement Server Recommendation for Entercept 4.0 looks like this:
created by: Rainer Bemsel Version 1.0 Dated: May/10/2003 The purpose of this document is to provide you with all necessary steps to install Entercept Server and Entercept Console. I ve used a 45 days evaluation
More informationebob v5.2 Operator s Manual
ebob v5.2 Operator s Manual BinMaster Division of Garner Industries 7201 North 98 th Street Lincoln, NE 68507 402-434-9102 info@binmaster.com www.binmaster.com 925-0267 Rev E 10/1/2013 (this page intentionally
More informationPrivileged Remote Access Jumpoint Guide
Privileged Remote Access Jumpoint Guide 2003-2018 BeyondTrust, Inc. All Rights Reserved. BEYONDTRUST, its logo, and JUMP are trademarks of BeyondTrust, Inc. Other trademarks are the property of their respective
More informationDEPLOYMENT GUIDE DEPLOYING F5 WITH ORACLE ACCESS MANAGER
DEPLOYMENT GUIDE DEPLOYING F5 WITH ORACLE ACCESS MANAGER Table of Contents Table of Contents Introducing the F5 and Oracle Access Manager configuration Prerequisites and configuration notes... 1 Configuration
More informationConfiguring Authentication Proxy
Configuring Authentication Proxy Last Updated: January 18, 2012 The Cisco IOS Firewall Authentication Proxy feature provides dynamic, per-user authentication and authorization, authenticating users against
More information