This course comes with a virtual lab environment where you can practice what you learn.
|
|
- Gabriella Richardson
- 5 years ago
- Views:
Transcription
1 INF220x Security Practical Exercises Overview This course comes with a virtual lab environment where you can practice what you learn. In most cases, the userid is Adatum\Administrator and the password is Pa55w.rd, but read the instructions carefully. Remember in the lab environment you can copy information to the virtual machines by using the Actions > Paste Content window. Before you paste the content, be sure your cursor is where you want the copied data. And, be sure to check the hyphens (dashes) in PowerShell code. Those characters may not copy correctly. NOTE: These practical exercises are designed to provide you experience as a working System Administrator. The lab steps are not written to be prescriptive, because as part of your day to day tasks you will need to troubleshoot and test different configurations. No one set of steps will be applicable in all cases, you will need to adjust for your situation. These steps were tested when the course was released. You may find changes to the interface as well as changes in how procedures are implemented.
2 2 Implementing Active Directory Rights Management Services Configure AD RMS prerequisites In this exercise, you will create a service account for AD RMS, create groups for later use, and create the DNS record for the AD RMS service. Create the AD RMS service account 1. Sign in to LON-DC1 by using the account Adatum\Administrator with the password Pa55w.rd. 2. Start Active Directory Administrative Center. 3. In the navigation pane, click Adatum (local), and in the content pane, double-click Users. 4. In the tasks pane, in the Users section, click New, and then click User. 5. In the Create User dialog box, provide the following details, and then click OK: First name: ADRMSService User UPN logon: ADRMSService User SamAccountName logon: Adatum\ADRMSService Password: Pa55w.rd Confirm Password: Pa55w.rd Password never expires: Enabled (you should select the Other password options option first) User cannot change password: Enabled Create groups for AD RMS 1. In the tasks pane, in the Users section, click New, and then click Group. 2. In the Create Group dialog box, type the following details, and then click OK: Group name: ADRMS_SuperUsers
3 3. In the tasks pane, in the Users section, click New, and then click Group. 4. In the Create Group dialog box, type the following details, and then click OK: Group name: Management 5. In the navigation pane, click Adatum (local), and then in the content pane, double-click Managers. 6. Ctrl+click the following users: Abigail Rees Adam Hobbs 7. In the Tasks pane, click Add to group. 8. In the Select Groups dialog box, type Management, and then click OK. 9. In the content pane, double-click Abigail Rees. 10. In the Abigail Rees window, in the box, type 11. Close the Active Directory Administrative Center. Create DNS host record for the AD RMS service 1. Start DNS Manager. 2. In the DNS Manager console, expand LON-DC1, expand Forward Lookup Zones, and then click Adatum.com. 3. Right-click Adatum.com, and then click New Host (A or AAAA). 4. In the New Host window, in the Name box, type adrms. 5. In the IP address box, type , and then click Add Host. 6. In the DNS window, click OK. 7. Click Done. 8. Close DNS Manager.
4 Install AD RMS In this exercise, you will install and configure the AD RMS role service. Note: In this exercise, you configure ADRMS to use unencrypted http and enable anonymous authentication. This should not be done in a production environment. Install the AD RMS role service 1. Sign in to LON SVR1 by using the account Adatum\Administrator with the password Pa55w.rd. 2. Start an administrative Windows PowerShell window. 3. In Windows PowerShell, run the following command: Install-WindowsFeature ADRMS-Server -IncludeManagementTools Configure the AD RMS role service 1. Start Server Manager. 2. In Server Manager, click the Notifications ( ) icon, and then click Perform additional configuration. 3. In the AD RMS configuration wizard, on the AD RMS page, click Next. 4. On the AD RMS Cluster page, ensure that Create a new AD RMS root cluster is selected, and then click Next. 5. On the Configuration Database page, click Use Windows Internal Database on this server, and then click Next. 6. On the Service Account page, click Specify. 7. In the Windows Security dialog box, type the following details, click OK, and then click Next: User name: ADRMSService Password: Pa55w.rd
5 8. On the Cryptographic Mode page, ensure that Cryptographic Mode 2 is selected, and then click Next. 9. On the Cluster Key Storage page, ensure that Use AD RMS centrally managed key storage is selected, and then click Next. 10. On the Cluster Key Password page, in both password boxes, type Pa55w.rd, and then click Next. 11. On the Cluster Web Site page, ensure that Default Web Site is selected, and then click Next. 12. On the Cluster Address page, provide the following information, and then click Next: Connection Type: Use an unencrypted connection ( Fully Qualified Domain Name: adrms.adatum.com Port: On the Licensor Certificate page, type Adatum RMS, and then click Next. 14. On the SCP Registration page, ensure that Register the SCP now is selected, and then click Next. 15. On the Confirmation page, click Install. 16. When installation finishes, click Close. 17. Open Internet Information Services (IIS) Manager. 18. In the Internet Information Services (IIS) Manager console, expand LON-SVR1 (ADATUM\Administrator), expand Sites, expand Default Web Site, and then click _wmcs. 19. In the content pane, in the IIS section, double-click Authentication, click Anonymous Authentication, and then, in the Actions pane, click Enable. 20. In the Connections pane, expand _wmcs, and then click licensing. 21. In the content pane, in the IIS section, double-click Authentication, click Anonymous Authentication, and then, in the Actions pane, click Enable. 22. Close the Internet Information Services (IIS) Manager console. 23. Sign out.
6 Configure AD RMS In this exercise, you will configure rights protection using AD RMS rights policy templates and their distribution. You will also configure the Super Users group for disaster recovery scenarios, and an exclusion policy to prevent an application from using AD RMS. Configure AD RMS templates 1. Sign in to LON SVR1 by using the account Adatum\Administrator with the password Pa55w.rd. 2. Open Active Directory Rights Management Services. 3. In the AD RMS console, expand the lon-svr1 (Local) node, and then click the Rights Policy Templates node. 4. In the Actions pane, click Create Distributed Rights Policy Template. 5. In the Create Distributed Rights Policy Template Wizard, on the Add Template Identification information page, click Add. 6. On the Add New Template Identification Information page, provide the following information, click Add, and then click Next: Language: English (United States) Name: ManagementReadOnly Description: Management read access only. No copy or print. 7. Language: English (United States) 8. Name: ManagementReadOnly 9. Description: Management read access only. No copy or print. 10. On the Add User Rights page, click Add. 11. On the Add User or Group page, type and then click OK.
7 12. When is selected, under Rights for click View. Ensure that Grant owner (author) full control right with no expiration is selected, and then click Next. 13. On the Specify Expiration Policy page, select the following settings, and then click Next: Content Expiration: Expires after the following duration (days): 7 Use license expiration: Expires after the following duration (days): On the Specify Extended Policy page, click Require a new use license every time content is consumed (disable client-side caching), and then click Next. 15. On the Specify Revocation Policy page, click Finish. Configure distribution of rights policy templates 1. On LON-SVR1, open Windows PowerShell. 2. At the Windows PowerShell command prompt, execute the following four commands: New-Item c:\rms -ItemType Directory New-SmbShare -Name RMS -Path c:\rms -FullAccess ADATUM\ADRMSService New-Item c:\documents -ItemType Directory New-SmbShare -Name Documents -Path c:\documents -FullAccess Everyone 3. Close Windows PowerShell. 4. In the AD RMS console, in the navigation pane, click the Rights Policy Templates node, and then, in the Distributed Rights Policy Template Information area, click Change distributed rights policy templates file location. 5. In the Rights Policy Templates dialog box, click Enable export. 6. In the Specify templates file location (UNC) box, type \\LON-SVR1\RMS, and then click OK. 7. Open File Explorer.
8 8. Navigate to the C:\RMS folder, and verify that ManagementReadOnly.xml is present. 9. Close the File Explorer window. Configure AD RMS Super Users group 1. In the AD RMS console, in the navigation pane, click Security Policies. 2. In the Security Policies area, in the Super Users section, click Change super user settings. 3. In the Actions pane, click Enable Super Users. 4. In the Super Users area, click Change super user group. 5. In the Super Users dialog box, in the Super user group box, type and then click OK. Configure exclusion policies 1. In the AD RMS console, in the navigation pane, expand the Exclusion Policies node, and then click Applications. 2. In the Actions pane, click Enable Application Exclusion. 3. In the Actions pane, click Exclude Application. 4. In the Exclude Application dialog box, type the following information, and then click Finish: Application File name: Powerpnt.exe Minimum version: Maximum version: Close the AD RMS console.
9 Protect content using AD RMS In this exercise, you will protect content with the ManagementReadOnly template using Microsoft Word. Protect content using Microsoft Word 1. Sign in to LON-CL1 by using the account Adatum\Administrator with the password Pa55w.rd. 2. Open Internet Explorer. 3. In Internet Explorer, click the Gear ( )icon, and then click Internet Options. 4. In the Internet Properties window, click the Security tab. 5. On the Security tab, click Local intranet, and then click Sites. 6. In the Local intranet window, click Advanced. 7. In the Local intranet window, in the Add this website to the zone box, type and then click Add. 8. Click Close. 9. Click OK twice. 10. Close Internet Explorer. 11. Sign out. 12. Sign in to LON-CL1 by using the account Adatum\Adam with the password Pa55w.rd. 13. Open Word If the Microsoft Office Activation Wizard appears, click Close. If the First things first window appears, click Ask me later, and then click Accept. If the Welcome to your new Office window appears, close it. 15. In Microsoft Word 2016, click Blank document. 16. In the Word document, type the following text: This information is for management only, and it should not be modified. Click File, click Protect
10 Document, click Restrict Access, and then click Connect to Rights Management Servers and get templates. 17. In the Windows Security dialog box, sign in as Adatum\Adam with the password Pa55w.rd. 18. Click Protect Document, click Restrict Access, and then click ManagementReadOnly. 19. Click Save, and then click Browse. 20. In the Save As dialog box, save the document in the \\lon-svr1\documents share with the name Management Only.docx. 21. Close Word Sign out.
This course comes with a virtual lab environment where you can practice what you learn.
INF220x Security Practical Exercises Overview This course comes with a virtual lab environment where you can practice what you learn. In most cases, the userid is Adatum\Administrator and the password
More informationModule 3 Remote Desktop Gateway Estimated Time: 90 minutes
Module 3 Remote Desktop Gateway Estimated Time: 90 minutes A. Datum Corporation provided access to web intranet web applications by implementing Web Application Proxy. Now, IT management also wants to
More informationModule 1 Web Application Proxy (WAP) Estimated Time: 120 minutes
Module 1 Web Application Proxy (WAP) Estimated Time: 120 minutes The remote access deployment is working well at A. Datum Corporation, but IT management also wants to enable access to some internal applications
More informationModule 4 Network Controller Estimated Time: 90 minutes
Module 4 Network Controller Estimated Time: 90 minutes A. Datum Corporation intends to deploy and use Network Controller to manage network services and devices. You need to test a deployment of Network
More informationINF220x Security Practical Exercises
INF220x Security Practical Exercises This course comes with a virtual lab environment where you can practice what you learn. In most cases, the userid is Adatum\Administrator and the password is Pa55w.rd,
More informationLab: Configuring and Troubleshooting DNS
Lab: Configuring and Troubleshooting DNS A. Datum is a global engineering and manufacturing company with its head office in London, UK. An IT office and a data center are located in London to support the
More informationINF204x Module 1, Lab 3 - Configure Windows 10 VPN
INF204x Module 1, Lab 3 - Configure Windows 10 VPN Estimated Time: 40 minutes Your organization plans to allow Windows 10 users to connect to the internal network by using the VPN client built into the
More informationIn most cases, the userid is Adatum\Administrator and the password is Pa55w.rd, but read the instructions carefully.
INF219x Advanced Virtualization Practical Exercises Overview This course comes with a virtual lab environment where you can practice what you learn. Launch the lab environment from the Welcome > Getting
More information20411D D Enayat Meer
Lab A Module 8: Implementing Direct Access by Using the Getting Started Wizard Scenario: Recommended lab time is 240 Minutes {a complete class session is dedicated for this lab} Many users at A. Datum
More informationINF204x Module 2 Lab 2: Using Encrypting File System (EFS) on Windows 10 Clients
INF204x Module 2 Lab 2: Using Encrypting File System (EFS) on Windows 10 Clients Estimated Time: 30 minutes You have a standalone Windows 10 client computer that you share with your colleagues. You plan
More informationCourse CLD221x: Enabling Office 365 Clients
Course CLD221x: Enabling Office 365 Clients Student Lab Manual Lab Design There are five exercises in this lab, each of which contains one or more tasks. For a successful outcome to the lab, the exercises
More informationLAB 5 IMPLEMENTING WINDOWS IN AN ENTERPRISE ENVIRONMENT
LAB 5 IMPLEMENTING WINDOWS IN AN ENTERPRISE ENVIRONMENT THIS LAB CONTAINS THE FOLLOWING EXERCISES AND ACTIVITIES: Exercise 5.1 Exercise 5.2 Exercise 5.3 Lab Challenge Installing the Windows Assessment
More informationINF204x Module 1 Lab 1: Configuring and Troubleshooting Networking Part 1
INF204x Module 1 Lab 1: Configuring and Troubleshooting Networking Part 1 Estimated Time: 90 minutes Your organization plans to implement IPv6 in their existing Active Directory environment including Windows
More informationCourse CLD209.1x Microsoft Exchange Server 2016 Hybrid Topologies
Course CLD209.1x Microsoft Exchange Server 2016 Hybrid Topologies Getting a lab for the lab exercises The lab exercises in this course require you to log on to the Microsoft Labs Online environment to
More informationStudent Lab Manual MS100.1x: Office 365 Management
Student Lab Manual MS100.1x: Office 365 Management Lab Scenario You are the system administrator for Adatum Corporation, and you have Office 365 deployed in a virtualized lab environment. In this lab,
More informationList of Virtual Machines Used in This Lab
INF204x Module 3 Lab1: Deploying Windows 10 to a New Computer by Using Microsoft Deployment Toolkit Lab: Using Microsoft Deployment Toolkit 2013 Update 1 Preview to Deploy Operating Systems Overview of
More informationCourse CLD211.5x Microsoft SharePoint 2016: Search and Content Management
Course CLD211.5x Microsoft SharePoint 2016: Search and Content Management Module 1 Lab - Configure Enterprise Search Introduction This document contains the detailed, step-by-step lab instructions for
More informationOverview. Directory Services Practical Exercises
Directory Services Practical Exercises Overview This course comes with a virtual lab environment where you can practice what you learn. Launch the lab environment from the Welcome > Getting Started > Practice
More informationWorking with AD RMS Clients
Chapter 18: Active Directory Rights Management Services 721 Figure 18-6 Modifying the SCP registration. Working with AD RMS Clients After the AD RMS cluster is deployed and the SCP configured, your next
More informationStep-by-step installation guide for monitoring untrusted servers using Operations Manager
Step-by-step installation guide for monitoring untrusted servers using Operations Manager Most of the time through Operations Manager, you may require to monitor servers and clients that are located outside
More informationIn most cases, the userid is Adatum\Administrator and the password is Pa55.w0rd, but read the instructions carefully.
Advanced Storage Practical Exercises Overview This course comes with a virtual lab environment where you can practice what you learn. Launch the lab environment from the Welcome > Getting Started > Practice
More informationMicrosoft ADRMS Integration Guide for Windows Server 2012 Integration Guide
www.ncipher.com Microsoft ADRMS Integration Guide for Windows Server 2012 Integration Guide Contents Chapter 1: Introduction 3 Product configuration 3 Supported ncipher nshield functionality 3 Requirements
More informationINF204x Module 1 Lab 2: Configuring and Troubleshooting Networking Part 2
INF204x Module 1 Lab 2: Configuring and Troubleshooting Networking Part 2 Estimated Time: 60 minutes Your organization plans to expand the use of IPv6 in its existing Windows Server 2012 R2 Active Directory
More informationPEAP under Unified Wireless Networks with ACS 5.1 and Windows 2003 Server
PEAP under Unified Wireless Networks with ACS 5.1 and Windows 2003 Server Document ID: 112175 Contents Introduction Prerequisites Requirements Components Used Conventions Configure Network Diagram Windows
More informationINF214x Basic Networking Practical Exercises
INF214x Basic Networking Practical Exercises Overview This course includes practical exercises where you can try out the techniques demonstrated in the course for yourself. This guide lists the steps for
More informationms-help://ms.technet.2004apr.1033/ad/tnoffline/prodtechnol/ad/windows2000/howto/mapcerts.htm
Page 1 of 8 Active Directory Step-by-Step Guide to Mapping Certificates to User Accounts Introduction The Windows 2000 operating system provides a rich administrative model for managing user accounts.
More informationConfiguring Claims-based Authentication for Microsoft Dynamics CRM Server. Last updated: May 2015
Configuring Claims-based Authentication for Microsoft Dynamics CRM Server Last updated: May 2015 This document is provided "as-is". Information and views expressed in this document, including URL and other
More informationOFFICIAL MICROSOFT LEARNING PRODUCT 10135B Lab Instructions and Lab Answer Key: Configuring, Managing and Troubleshooting Microsoft Exchange Server
OFFICIAL MICROSOFT LEARNING PRODUCT 10135B Lab Instructions and Lab Answer Key: Configuring, Managing and Troubleshooting Microsoft Exchange Server 2010 Service Pack 2 Information in this document, including
More informationWindows Server 2012 Immersion Experience Enabling Secure Remote Users with RemoteApp, DirectAccess, and Dynamic Access Control
Windows Server 2012 Immersion Experience Enabling Secure Remote Users with RemoteApp, DirectAccess, and Dynamic Access Control Windows Server 2012 Hands-on lab In this experience, you will configure a
More informationDell Storage Compellent Integration Tools for VMware
Dell Storage Compellent Integration Tools for VMware Version 4.0 Administrator s Guide Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your
More information29 March 2017 SECURITY SERVER INSTALLATION GUIDE
29 March 2017 SECURITY SERVER INSTALLATION GUIDE Contents 1. Introduction... 2 1.1 Assumptions... 2 1.2 Prerequisites... 2 2. Required setups prior the Security Server Installation... 3 1.1 Create domain
More informationDeploying Windows 8.1 with ConfigMgr 2012 R2 and MDT 2013
Deploying Windows 8.1 with ConfigMgr 2012 R2 and MDT 2013 Windows 8.1 Hands-on lab In this lab, you will learn how to deploy a Windows 8.1 image with ConfigMgr 2012 R2 and MDT 2013. Produced by Deployment
More informationDell Storage Integration Tools for VMware
Dell Storage Integration Tools for VMware Version 4.1 Administrator s Guide Notes, cautions, and warnings NOTE: A NOTE indicates important information that helps you make better use of your product. CAUTION:
More informationImplementing Messaging Security for Exchange Server Clients
Implementing Messaging Security for Exchange Server Clients Objectives Scenario At the end of this lab, you will be able to: Protect e-mail messages using S/MIME signing and encryption Manage e-mail attachment
More informationStudent Lab Manual MS101.1x: Microsoft 365 Security Management
Student Lab Manual MS101.1x: Microsoft 365 Security Management Lab Scenario You are the system administrator for Adatum Corporation, and you have Microsoft 365 deployed in a virtualized lab environment.
More informationAvePoint Governance Automation 2. Release Notes
AvePoint Governance Automation 2 Release Notes Service Pack 2, Cumulative Update 1 Release Date: June 2018 New Features and Improvements In the Create Office 365 Group/Team service > Governance Automation
More informationCourse Content of MCSA ( Microsoft Certified Solutions Associate )
Course Content of MCSA 2012 - ( Microsoft Certified Solutions Associate ) Total Duration of MCSA : 45 Days Exam 70-410 - Installing and Configuring Windows Server 2012 (Course 20410A Duration : 40 hrs
More informationSymantec Managed PKI. Integration Guide for ActiveSync
Symantec Managed PKI Integration Guide for ActiveSync ii Symantec Managed PKI Symantec Managed PKI Integration Guide for ActiveSync The software described in this book is furnished under a license agreement
More informationUser Account Manager
CHAPTER 4 Note User accounts can be accessed only when operating in Internal Directory mode. To access User tasks, log in to the system (see Logging In section on page 2-1). Then, from the Home page, click
More informationOpenText RightFax 10.0 Connector for Microsoft SharePoint 2007 Administrator Guide
OpenText RightFax 10.0 Connector for Microsoft SharePoint 2007 Administrator Guide OpenText RightFax 10.0 Connector for Microsoft SharePoint 2007 Administrator Guide ii Edition OpenText RightFax 10.0 Connector
More informationDealing with Event Viewer
Dealing with Event Viewer Event Viewer is a troubleshooting tool in Microsoft Windows 2000.This how-to article will describe how to use Event Viewer. Event Viewer displays detailed information about system
More informationCLIQ Web Manager. User Manual. The global leader in door opening solutions V 6.1
CLIQ Web Manager User Manual V 6.1 The global leader in door opening solutions Program version: 6.1 Document number: ST-003478 Date published: 2016-03-31 Language: en-gb Table of contents 1 Overview...9
More informationInstalling and Configuring vcenter Multi-Hypervisor Manager
Installing and Configuring vcenter Multi-Hypervisor Manager vcenter Server 5.1 vcenter Multi-Hypervisor Manager 1.1.2 This document supports the version of each product listed and supports all subsequent
More informationConfigure DHCP for Failover Step-by-Step.
Configure DHCP for Failover Step-by-Step https://technet.microsoft.com/en-us/library/hh831385.aspx Dynamic Host Configuration Protocol (DHCP) failover in Windows Server 2012 is a new method for ensuring
More informationTest Lab Guide: Windows Server 2012 Base Configuration
Test Lab Guide: Windows Server 2012 Base Configuration Microsoft Corporation Published: September 10, 2012 Abstract This Microsoft Test Lab Guide (TLG) provides step- by- step instructions to create the
More informationVMware AirWatch Certificate Authentication for EAS with ADCS
VMware AirWatch Certificate Authentication for EAS with ADCS For VMware AirWatch Have documentation feedback? Submit a Documentation Feedback support ticket using the Support Wizard on support.air-watch.com.
More informationConfigure the IM and Presence Service to Integrate with the Microsoft Exchange Server
Configure the IM and Presence Service to Integrate with the Microsoft Exchange Server Configure a Presence Gateway for Microsoft Exchange Integration, page 1 SAN and Wildcard Certificate Support, page
More informationConfiguring Claims-based Authentication for Microsoft Dynamics CRM Server. Last updated: June 2014
Configuring Claims-based Authentication for Microsoft Dynamics CRM Server Last updated: June 2014 This document is provided "as-is". Information and views expressed in this document, including URL and
More informationInstall and Configure Windows Server 2016 Core on Hyper-V Step by Step (V1.1)
Install and Configure Windows Server 2016 Core on Hyper-V 2016 Step by Step (V1.1) Ahmed Abdelwahed Microsoft Certified Trainer Ahmed_abdulwahed@outlook.com Contents Lab Scenario... 3 Working with Hyper-V...
More informationSAS Viya 3.3 Administration: Mobile
SAS Viya 3.3 Administration: Mobile Mobile: Overview The SAS Mobile BI app enables mobile device users to view and interact with reports that can contain a variety of charts, graphs, gauges, tables, and
More informationVMware AirWatch Certificate Authentication for EAS with NDES-MSCEP
VMware AirWatch Certificate Authentication for EAS with NDES-MSCEP For VMware AirWatch Have documentation feedback? Submit a Documentation Feedback support ticket using the Support Wizard on support.air-watch.com.
More informationUsing Hypertext Transfer Protocol over Secure Sockets Layer (HTTPS)
CHAPTER 2 Using Hypertext Transfer Protocol over Secure Sockets Layer (HTTPS) This chapter contains information on the following topics: HTTPS Overview, page 2-1 HTTPS for Cisco Unified IP Phone Services,
More informationWorkspace ONE UEM Certificate Authority Integration with Microsoft ADCS Using DCOM. VMware Workspace ONE UEM 1811
Workspace ONE UEM Certificate Authority Integration with Microsoft ADCS Using DCOM VMware Workspace ONE UEM 1811 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/
More informationVMware AirWatch Certificate Authentication for EAS with NDES-MSCEP. For VMware AirWatch
VMware AirWatch Certificate Authentication for EAS with NDES-MSCEP For VMware AirWatch H a v e d o c u m e n t a t io n f e e d b a c k? S u b m it a D o c u m e n t a t io n F e e d b a c k s u p p o
More informationCopyright 2017 Trend Micro Incorporated. All rights reserved.
Information in this document is subject to change without notice. The names of companies, products, people, characters, and/or data mentioned herein are fictitious and are in no way intended to represent
More informationHypertext Transfer Protocol over Secure Sockets Layer (HTTPS)
Hypertext Transfer Protocol over Secure Sockets Layer (HTTPS) This chapter provides information about Hypertext Transfer Protocol over Secure Sockets Layer. HTTPS, page 1 HTTPS for Cisco Unified IP Phone
More informationLepideAuditor for File Server. Installation and Configuration Guide
LepideAuditor for File Server Installation and Configuration Guide Table of Contents 1. Introduction... 4 2. Requirements and Prerequisites... 4 2.1 Basic System Requirements... 4 2.2 Supported Servers
More informationZL UA Exchange 2013 Archiving Configuration Guide
ZL UA Exchange 2013 Archiving Configuration Guide Version 8.0 January 2014 ZL Technologies, Inc. Copyright 2014 ZL Technologies, Inc.All rights reserved ZL Technologies, Inc. ( ZLTI, formerly known as
More informationPST for Outlook Admin Guide
PST for Outlook 2013 Admin Guide Document Revision Date: Sept. 25, 2015 PST Admin for Outlook 2013 1 Populating Your Exchange Mailbox/Importing and Exporting.PST Files Use this guide to import data (Emails,
More informationHOL122 Lab 1: Configuring Microsoft Windows Server 2003 RPC Proxy
HOL122 Lab 1: Configuring Microsoft Windows Server 2003 RPC Proxy Objectives After completing this lab, you will be able to: Install remote procedure call (RPC) over Hypertext Transfer Protocol (HTTP)
More informationTenant Administration. vrealize Automation 6.2
vrealize Automation 6.2 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ If you have comments about this documentation, submit your feedback to
More informationConfiguring and Troubleshooting Windows Server 2008 Active Directory Domain Services
6425 - Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services Duration: 5 days Course Price: $2,975 Software Assurance Eligible Course Description Microsoft Windows Server
More informationVMware AirWatch Integration with Microsoft ADCS via DCOM
VMware AirWatch Integration with Microsoft ADCS via DCOM For VMware AirWatch Have documentation feedback? Submit a Documentation Feedback support ticket using the Support Wizard on support.air-watch.com.
More informationCDP Data Center Console User Guide CDP Data Center Console User Guide Version
CDP Data Center Console User Guide CDP Data Center Console User Guide Version 3.18.2 1 README FIRST Welcome to the R1Soft CDP Data Center Console User Guide The purpose of this manual is to provide you
More informationConfiguring Remote Access using the RDS Gateway
Configuring Remote Access using the RDS Gateway Author: AC, SNE Contents Introduction... 3 Pre-requisites... 3 Supported Operating Systems... 3 Installing the I.T. Services Certificate Authority Root Certificate...
More informationAssureon Installation Guide Client Certificates. for Version 6.4
Client Certificates for Version 6.4 Publication info 2011 Nexsan Technologies Canada Inc. All rights reserved. Published by: Nexsan Technologies Canada Inc. 1405 Trans Canada Highway, Suite 300 Dorval,
More informationENTRUST CONNECTOR Installation and Configuration Guide Version April 21, 2017
ENTRUST CONNECTOR Installation and Configuration Guide Version 0.5.1 April 21, 2017 2017 CygnaCom Solutions, Inc. All rights reserved. Contents What is Entrust Connector... 4 Installation... 5 Prerequisites...
More informationDell Storage Compellent Integration Tools for VMware
Dell Storage Compellent Integration Tools for VMware Administrator s Guide Version 3.1 Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your
More informationSQL AlwaysOn - Skype for Business
2018 SQL AlwaysOn - Skype for Business DINESH SINGH Contents Before Starting... 2 Windows Failover Clustering... 2 IPs Address and DNS... 2 SQL AlwaysOn... 2 Service Accounts... 2 Network Configuration...
More informationCourse CLD211.5x Microsoft SharePoint 2016: Search and Content Management
Course CLD211.5x Microsoft SharePoint 2016: Search and Content Management Module 2 Lab 1 - Plan and configure Service Applications Introduction This document contains the detailed, step-by-step lab instructions
More informationEnterprise Vault.cloud CloudLink Google Account Synchronization Guide. CloudLink to 4.0.3
Enterprise Vault.cloud CloudLink Google Account Synchronization Guide CloudLink 4.0.1 to 4.0.3 Enterprise Vault.cloud: CloudLink Google Account Synchronization Guide Last updated: 2018-06-08. Legal Notice
More informationHypertext Transfer Protocol Over Secure Sockets Layer (HTTPS)
Hypertext Transfer Protocol Over Secure Sockets Layer (HTTPS) This chapter provides information about Hypertext Transfer Protocol over Secure Sockets Layer. HTTPS, page 1 HTTPS for Cisco Unified IP Phone
More informationSend the Ctrl-Alt-Delete key sequence to the Guest OS one of two ways: Key sequence: Ctlr-Alt-Ins Menu Sequence: VM / Guest / Send Ctrl-Alt-Delete
CIS 231 Windows 2008 Server Install Lab #1 (Virtual Machines) Keys to Remember when using the vsphere client. Send the Ctrl-Alt-Delete key sequence to the Guest OS one of two ways: Key sequence: Ctlr-Alt-Ins
More information'phred dist acd.tar.z'
Phred is free for academic use but does require registration and for you to obtain a licence. Please visit http://www.phrap.org/consed/consed.html#howtoget and follow the instructions. A copy of the Phred
More informationNBC-IG Installation Guide. Version 7.2
Installation Guide Version 7.2 2017 Nuance Business Connect 7.2 Installation Guide Document Revision History Revision Date August 8, 2017 Revision List Updated supported SQL Server versions June 14, 2017
More informationCraig Pelkie Bits & Bytes Programming, Inc.
Craig Pelkie Bits & Bytes Programming, Inc. craig@web400.com Configure iseries NetServer and work with Folders in the IFS Edition NETSERVER_20020219 Published by Bits & Bytes Programming, Inc. Valley Center,
More informationConnect to Wireless, certificate install and setup Citrix Receiver
Connect to Wireless, certificate install and setup Citrix Receiver This document explains how to connect to the Wireless Network and access applications using Citrix Receiver on a Bring Your Own Device
More information10ZiG Manager Cloud Setup Guide
10ZiG Manager Cloud Setup Guide Welcome to the 10ZiG Manager Cloud Setup guide. This guide will help you install all of the components within the 10ZiG Management suite. Please take note of the following
More informationIntegration Guide. SafeNet Authentication Manager. SAM using RADIUS Protocol with Microsoft DirectAccess
SafeNet Authentication Manager Integration Guide SAM using RADIUS Protocol with Microsoft DirectAccess Technical Manual Template Release 1.0, PN: 000-000000-000, Rev. A, March 2013, Copyright 2013 SafeNet,
More informationPublication date: December 17, 2012, updated Feb. 10, Product version: Windows Server 2003, Windows Server 2008, Windows Server 2012
Certificates rely on certification authorities to maintain an updated list of revoked certificates issued by the public key infrastructure. Certificates are revoked for a number of reasons not all revocations
More informationLasso Continuous Data Protection Lasso CDP Client Guide August 2005, Version Lasso CDP Client Guide Page 1 of All Rights Reserved.
Lasso CDP Client Guide August 2005, Version 1.6.8 Lasso CDP Client Guide Page 1 of 32 Copyright Copyright 2005 Lasso Logic, LLC. All Rights Reserved. No part of this publication may be reproduced, stored
More informationUsing ZENworks with Novell Service Desk
www.novell.com/documentation Using ZENworks with Novell Service Desk Novell Service Desk 7.1 April 2015 Legal Notices Novell, Inc. makes no representations or warranties with respect to the contents or
More informationActivIdentity 4TRESS AAA Web Tokens and F5 BIG-IP Access Policy Manager. Integration Handbook
ActivIdentity 4TRESS AAA Web Tokens and F5 BIG-IP Access Policy Manager Integration Handbook Document Version 1.1 Released July 11, 2012 ActivIdentity 4TRESS AAA Web Tokens and F5 APM Integration Handbook
More informationPerceptive Content Licensing
Perceptive Content Licensing Advanced Design and Setup Guide Perceptive Content, Version: 7.1.x Written by: Product Knowledge, R&D Date: August 2015 2015 Lexmark International Technology, S.A. All rights
More informationInstallation Guide. 3CX CRM Plugin for ConnectWise. Single Tenant Version
Installation Guide 3CX CRM Plugin for ConnectWise Single Tenant Version "Copyright VoIPTools, LLC 2011-2016" Information in this document is subject to change without notice. No part of this document may
More informationTenant Administration
vcloud Automation Center 6.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions
More informationAzure for On-Premises Administrators Practice Exercises
Azure for On-Premises Administrators Practice Exercises Overview This course includes optional practical exercises where you can try out the techniques demonstrated in the course for yourself. This guide
More informationStorage Manager 2018 R1. Installation Guide
Storage Manager 2018 R1 Installation Guide Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your product. CAUTION: A CAUTION indicates either
More informationZENworks Service Desk 8.0 Using ZENworks with ZENworks Service Desk. November 2018
ZENworks Service Desk 8.0 Using ZENworks with ZENworks Service Desk November 2018 Legal Notices For information about legal notices, trademarks, disclaimers, warranties, export and other use restrictions,
More informationLab: Implementing SMS 2003 SP1 Features
Lab: Implementing SMS 2003 SP1 Features Objectives After completing this lab, you will be able to: Identify an SMS 2003 SP1 site. Implement SMS 2003 SP1 folders. Implement a configurable HTTP port in SMS
More informationInstallation on Windows Server 2008
USER GUIDE MADCAP PULSE 4 Installation on Windows Server 2008 Copyright 2018 MadCap Software. All rights reserved. Information in this document is subject to change without notice. The software described
More informationedp 8.2 Info Sheet - Integrating the ediscovery Platform 8.2 & Enterprise Vault
edp 8.2 Info Sheet - Integrating the ediscovery Platform 8.2 & Enterprise Vault 12.0.1 Date: December 2017 Author: Technical Field Enablement (II-TEC@veritas.com) Applies to: ediscovery Platform 8.x and
More informationPassword Reset Utility. Configuration
Password Reset Utility Configuration 1 Table of Contents 1. Uninstalling Legacy Password Reset... 2 2. Password Reset Utility: How to deploy and configure via Group Policy... 2 3. Configuring Group Policy
More informationInstalling and Configuring vcloud Connector
Installing and Configuring vcloud Connector vcloud Connector 2.6.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new
More informationAnonymous Group Manager GUI Tool
This chapter provides details on the Anonymous Group Manager GUI tool and how to manager Anonymous Groups using the Cisco SCA BB. This chapter describes how to use the Anonymous Group Manager graphical
More informationAventail Connect Client with Smart Tunneling
Aventail Connect Client with Smart Tunneling User s Guide Windows v8.9.0 1996-2007 Aventail Corporation. All rights reserved. Aventail, Aventail Cache Control, Aventail Connect, Aventail Connect Mobile,
More informationCLD206x Compliance in Office 365: Data Governance
CLD206x Compliance in Office 365: Data Governance Student Lab Manual WARNING Be prepared for Office 365 UI changes Given the dynamic nature of Microsoft cloud tools, you may experience Office 365 user
More informationPrivileged Access Agent on a Remote Desktop Services Gateway
Privileged Access Agent on a Remote Desktop Services Gateway IBM SECURITY PRIVILEGED IDENTITY MANAGER User Experience and Configuration Cookbook Version 1.0 November 2017 Contents 1. Introduction 5 2.
More informationILTA HAND 6A. Implementing and Using. Windows Server In the Legal Environment
ILTA 2013 - HAND 6A Implementing and Using Windows Server 2012 In the Legal Environment Table of Contents Purpose of This Lab... 3 Lab Environment... 3 Presenter... 3 Exercise 1 Getting Familiar with Windows
More informationEnabling Smart Card Logon for Mac OS X Using Centrify Suite
DoD Public Key Enablement (PKE) Reference Guide Enabling Smart Card Logon for Mac OS X Using Centrify Suite 2012.4 Contact: dodpke@mail.mil URL: http://iase.disa.mil/pki-pke/ URL: http://iase.disa.smil.mil/pki-pke/
More information