Likewise Enterprise Administrators Guide

Size: px
Start display at page:

Download "Likewise Enterprise Administrators Guide"

Transcription

1 Likewise Enterprise Administrators Guide v4 Information Services University of Oregon December 2010

2 Table of Contents Definitions... 4 opt/likewise... 4 AD... 4 Domain... 4 DuckID... 4 GPO... 4 UNIX Attributes... 4 WGM... 4 Prerequisites... 5 Setup Windows Admin workstation... 5 Setup Mac Admin workstation... 6 Administrative Tasks... 7 Install Likewise Enterprise on a Mac/Linux/Unix host... 7 Pre-create a Mac/Linux/Unix computer object in Active Directory... 7 Join a Mac 10.x computer to the domain using the GUI tools... 8 Join a Mac 10.x computer to the domain using the terminal... 9 Join a Linux computer to the domain using the shell... 9 Remove a Likewise Enterprise client from the domain... 9 Uninstall Likewise Enterprise Upgrade from Likewise Open to Likewise Enterprise Check domain membership of a likewise installed system Login to a Likewise Enterprise client with domain credentials Force a group policy refresh (i.e. GPUPDATE /force) Create a GPO for Likewise clients on a Windows Admin workstation Mark a GPO for editing on a Mac Admin workstation Edit a GPO with Workgroup Manager on a Mac Admin workstation Migrate a local user profile into a domain user profile Verify an object has UNIX attributes Mac-only Policy Examples Grant admin access to a user or group Enable Mac firewall Apply a Pre-logon warning message to a Mac OS host Show Hard Disks and Connected Servers on Desktop by default

3 Universal File Vault settings Configure login options Configure Energy Saver options Universal Linux/Unix/Mac Policy Examples Allow cached logins Restrict login to a user or group Grant a domain group sudo access to a Linux host Deploy Sudoers file Set Default Login Shell to /bin/bash Target a specific non-windows platform Enable Loopback processing on a GPO Deploy a File

4 Definitions /opt/likewise /opt/likewise refers to the folder path that the Likewise agent is installed by default. Likewise tools are generally found in /opt/likewise/bin/ AD AD refers to the consolidated ad.uoregon.edu Active Directory domain Domain Domain refers to an Active Directory domain in the uoregon.edu forest. DuckID DuckID refers to the user s UO username. This is used throughout the document as <duckid> and should be replaced with the actual username anywhere used. This document also uses adm-<duckid> to refer to an OU admin account. GPO GPO refers to an Active Directory Group Policy Object. UNIX Attributes 1. Refers to values for key RFC 2307 attributes on user and group objects. These attributes are a requirement on Users and Groups for use on a Likewise Enterprise client and in Likewise Enterprise policies. 2. Users: a. To login to a Likewise Enterprise client workstation or to be used in a Likewise Enterprise GPO, a user must have valid uid, uidnumber and gidnumber attributes. b. All managed user objects have these attributes mapped from the central campus LDAP service. c. Unmanaged accounts are generally unsupported beyond OU Admin accounts. OU Admin accounts have been populated with the required Unix Attributes. 3. Groups: a. To be used in a Likewise Enterprise GPO, a group must have a valid gidnumber UNIX attribute. b. All *.OU.ADMIN groups have been assigned values for gidnumber. c. Other groups may be provisioned on request by ing adhelp@ithelp.uoregon.edu. WGM WGM refers to Apple s Workgroup Manager. This can be downloaded at no cost from apple and is required to inject Apple MCX policies into Active Directory Group Policy Objects. 4

5 Prerequisites Setup Windows Admin workstation 1. Description: This section details the steps required to setup your Windows XP/7 Admin workstation to manage Likewise Enterprise clients. Note that this only differs from configuring a standard AD Admin workstation by installing the Likewise Enterprise admin console. This simply extends the Active Directory User and Computers and Group Policy Management Console MMCs. a. Identify a Windows workstation currently joined to the AD domain to run the AD Administrative tools with the Likewise add-on. b. Install the Active Directory User & Computers Console: i. Windows XP: 1. Download adminpak.msi from Microsoft: a. ii. Windows 7 1. Download Remote Server Administration Tools for Windows 7 a Enable Group Policy Management Console a. Open Control Panel b. Open Programs and Features c. Click Turn Windows Features on or off d. In the Windows Features window e. Expand Remote Server Administration Tools f. Expand Role Administration Tools g. Expand AD DS Tools h. Check Active Directory Administrative Center i. Check AD DS Snap-ins and Command-line Tools c. Install the Group Policy Management Console (gpmc.msc) i. Windows XP: 1. Download gpmc.msc from Microsoft: a. ii. Windows 7: a Enable Group Policy Management Console a. Open Control Panel b. Open Programs and Features c. Click Turn Windows Features on or off d. In the Windows Features window, browse to Remote Server Administration Tools then Feature Administration Tools e. Check Group Policy Management Tools d. Install the appropriate Likewise Console on your Windows Admin workstation i. SetupLikewise-<version>.exe - for 32bit hosts ii. SetupLikewise64-<version>.exe - for 64bit hosts a. IMPORTANT: Select Only Basic Management Components during the install wizard. 5

6 Setup Mac Admin workstation 1. Description: This section details the steps required to setup your Mac 10.6 Admin workstation to manage Likewise Enterprise clients with Workgroup Manager. a. Identify a Mac OS workstation to use as an Admin workstation with Apple Workgroup Manager. b. Follow the steps in section Join a Mac 10.x computer to the AD domain using the GUI tools c. Install the Mac Server admin tools from Apple. i. Server Admin Tools : d. Login with credentials: i. Username: ad\adm-<duckid> ii. Password: (Your adm-<duckid> password) a. If you are unable to login with you adm-<duckid> account, it may not have UNIX attributes. Follow the steps in Verify an object has UNIX attributes to confirm. If it does not, submit a ticket to adhelp@ithelp.uoregon.edu to have this enabled. b. IMPORTANT: Do not attempt to setup Workgroup Manager after installation. Unlike using WGM in an OpenDirectory environment, you will not configure WGM to connect directly to one of the directory servers. The proper steps are covered in more depth in section Edit a GPO with Workgroup Manager on a Mac Admin workstation. 6

7 Administrative Tasks Install Likewise Enterprise on a Mac/Linux/Unix host 1. Description: This section details the process of installing Likewise Enterprise on a Mac/Linux/Unix host. a. Download the newest Likewise Enterprise installation media or the appropriate installer: i. \\files.uoregon.edu\public\likewise\isos ii. \\files.uoregon.edu\public\likewise\installers b. Mac: i. Run the dmg image. For most modern Mac systems, this will be: 1. LikewiseEntDpy-5\agents\darwin\x86_64\dmg\LikewiseIdentityServiceEnterprise OSX10.6-universal.dmg ii. From the mounted DMG, double-click LikewiseIdentityServiceEnterprise OSX10.6- universal.mpkg iii. In the Install Likewise Identity Server *Enterprise window, click Continue. iv. Click Continue v. Click Continue, then click Agree vi. Select the installation location and click Continue vii. Click Install c. Linux/Unix: i. Insert the Likewise 5.3 installation media or mount a share containing the installation files and run install.sh 1. CIFS Share example: a. mkdir /mnt/likewise b. mount -t cifs //DEPT-SERVERNAME/SHARE /mnt/likewise -o username=ad\\<duckid> c. <Enter user password> d. sudo /mnt/likewise/install.sh 2. cdrom Example: a. sudo /mnt/cdrom/install.sh ii. Hit Enter to view License Agreement. iii. Continue hitting enter until Do you accept this license *y/n+ is shown. iv. Enter y, then hit Enter. v. If using a 64bit OS, enter 1/2/3 at the 32-bit Compatibility Libraries prompt. Auto *1+ is default. vi. At the Setup is now ready to begin installing Likewise Identify prompt, select Y then hit Enter. a. Mac installation must use the DMG installer from the GUI. Command-line installation is not possible. Pre-create a Mac/Linux/Unix computer object in Active Directory 1. Description: This section details the steps to pre-create a computer object in Active Directory. This is an optional step when using Likewise Enterprise to join a computer to the domain, though the most common method. 7

8 a. On the Windows Admin workstation, open the Active Directory Users & Computers mmc console i. Start > Run > dsa.msc, or b. Browse to your unit s Computers OU i. Ad.uoregon.edu \ Units \ <unit> \ Computer c. Right-click > New > Computer d. Enter a name of the computer object i. ex: ad.uoregon.edu\units\is\computers\sys\is-mac-2385fh3 a. IMPORTANT: The computer name must begin with your departments prefix (ex: is-mac-2385fh3) and be 15 characters or less. Join a Mac 10.x computer to the domain using the GUI tools 1. Description: This section details the process of domain joining a Mac computer to the domain with the GUI Likewise Enterprise application. a. Follow the steps in Install Likewise Enterprise on a Mac/Linux/Unix host. b. Follow the steps in Pre-create a Mac/Linux/Unix computer object in Active Directory to create the computer object. c. Configure the Mac to use this computer name i. Apple Menu > System Preferences > Sharing > Computer Name ii. Enter the name from step b in the Computer Name field. d. Open Directory Utility. i. Mac OS 10.6.x: 1. Open System Preferences 2. Open Accounts 3. Click Login Options 4. Click Join to the right of Network Account Server 5. Click Open Directory Utility ii. Mac OS 10.5.x: 1. Open Applications 2. Open Utilities 3. Open Directory Utility e. Double-click Likewise - Active Directory to open the Likewise Domain Join app. i. This will require you to unlock Directory Utility page and enter admin credentials. f. Enter the following in the Likewise Domain Join app: i. Computer name: (confirm this matches name set in step 1) ii. Domain to join: ad.uoregon.edu iii. At Specify an Organizational Unit, leave as Computers container or existing iv. Click Join v. Enter your adm-<duckid> username\password. g. Restart the Mac system. h. Follow the steps in Login to a Likewise Enterprise client with domain credentials to test login. a. When joining the Mac computer to the domain, enter your adm-<duckid> username (not ad\adm- <duckid>). b. When logging into the computer with domain credentials, the username entered must be in the format ad\<duckid>. The ad\ prefix is required. 8

9 c. The user used to login must have valid Unix Attributes. d. The default computer name displayed in step g may not match the name you set in step b. This is because Likewise performs a reverse DNS lookup for the workstation s IP address. If a DNS record is found, Likewise will default to this DNS name. You may either fix the DNS entry or ignore the incorrect DNS entry and change the Computer Name field in the Likewise Domain Join app to the correct name. e. If the computer object for the Mac workstation has not been pre-created or was misspelled, the domain join operation will fail. Join a Mac 10.x computer to the domain using the terminal 1. Description: This section details the steps to run the Likewise domain join command from the terminal after installation. a. Perform steps A through C from Join a Mac 10.x computer to the AD domain using the GUI tools b. Run the following from the terminal: i. sudo /opt/likewise/bin/domainjoin-cli join ad.uoregon.edu adm-<duckid> c. Follow the steps in Login to a Likewise Enterprise client with domain credentials to test login. a. If the computer object has not been pre-created or does not match, the domain join operation will fail. Join a Linux computer to the domain using the shell 1. Description: This section details the steps to install Likewise Enterprise on a supported host and join the domain. a. Follow the steps in Pre-create a Mac/Linux/Unix computer object in Active Directory to create the computer object. b. Configure an appropriate hostname that follows the AD domain naming conventions i. RedHat: 1. /etc/sysconfig/network 2. Enter the short name of the host (IS-RH-NAME) 3. Reboot the system c. sudo domainjoin-cli join ad.uoregon.edu adm-<duckid> d. Enter the adm-<duckid> user password when prompted. e. Reboot f. Follow the steps in Login to a Likewise Enterprise client with domain credentials to test login. a. If the computer object has not been pre-created or does not match, the domain join operation will fail. Remove a Likewise Enterprise client from the domain 1. Description: This section details the steps to remove a domain-joined Likewise Enterprise client from the domain a. Login to the host with the local root / admin account. b. Leave the domain: i. sudo /opt/likewise/bin/domainjoin-cli leave (adm-<duckid>) 9

10 a. The (adm-<duckid>) argument is optional. If you do not enter provide a username, the computer will simply drop from the domain. If you enter a username, you will be prompted for credentials. If the user has sufficient permissions to the computer object in AD, the object will be disabled as well. Uninstall Likewise Enterprise 1. Description: This section details the steps to uninstall Likewise Enterprise from a workstation/server. a. Check for domain-joined status by following the steps in Check domain membership of a Likewise Enterprise client. b. If the workstation/server I domain-joined, follow the steps in Remove a Likewise Enterprise client from the domain. c. Run the Likewise Enterprise Uninstaller: i. Mac OS: sudo /opt/likewise/bin/macuninstall.sh ii. Other Linux/Unix: sudo /opt/likewise/setup/lwise/uninstall a. IMPORTANT: The uninstall process is different on a Mac than on other Linux/Unix systems. Upgrade from Likewise Open to Likewise Enterprise 1. Description: This section details the steps to upgrade an installation of Likewise Open, the free version of Likewise, to Likewise Enterprise. a. Login to the host with the local root / admin account. b. Follow the steps from Uninstall Likewise Enterprise to remove the computer form the domain and uninstall Likewise Open. c. Follow the steps in Join a Linux Computer to the Domain using the Shell to install Likewise Enterprise and re-join the domain. Check domain membership of a likewise installed system 1. Description: This section shows the command to get a host s current domain status. This can be useful when troubleshooting failed login attempts. a. Run the following command: /opt/likewise/bin/lw-get-current-domain 3. NOTES: a. Result indicating the system is domain-joined: Current Domain = AD.UOREGON.EDU b. Result indicating the system is not domain-joined: Failed communication with the LWNET Agent. Error code 136 (ERROR_NOT_JOINED) 10

11 Login to a Likewise Enterprise client with domain credentials 1. Description: This section provides the steps to login to a Likewise Enterprise client from the console and ssh. a. Console login: i. Username: AD\<duckid> ii. Password: <duckid password> b. SSH: i. Username: AD\\<duckid> ii. Password: <duckid password> 3. NOTES: a. If unable to login to a host through a service with AD\<duckid>, try entering AD\\<duckid>. Force a group policy refresh (i.e. GPUPDATE /force) 1. Description: This section shows the command to force a Likewise Enterprise client to update it s set of Group Policies. This is similar to the Windows command gpupdate /force a. Confirm Likewise Enterprise is installed by navigating to the Likewise installation directory (/opt/likewise). b. From the terminal, run the following command: sudo /opt/likewise /bin/gporefresh a. You must run this command with sudo privilege or as root or it will fail with the error This program requires super-user privileges Error: Access Denied b. Group Policy will automatically refresh at the default interval of 30 minutes unless otherwise set by GPO. c. Restarting a computer while plugged into the network will also prompt a GPO refresh on startup. Create a GPO for Likewise clients on a Windows Admin workstation 1. Description: This section details the steps to create a GPO from the Windows Admin workstation as well as where to look for Likewise-specific policies. a. Follow the steps in Windows Admin workstation to prepare your Windows Admin workstation. b. Open Group Policy Management Console i. Start Menu > Run > gpmc.msc ii. Or, Start > Administrative Tools > Group Policy Management c. Create a GPO for your unit and attach to the OU required. d. Name the GPO to include your department prefix, the user/comp target, and the purpose. i. E.g. IS-COMP-Linux_Sudoer_Access e. Edit the GPO. f. Expand Computer Configuration or User Configuration. g. Expand Policies. h. You will now see a new section named Unix and Linux Settings. a. All Likewise settings are stored under Unix and Linux Settings. 11

12 Mark a GPO for editing on a Mac Admin workstation 1. Description: This section details the steps to mark an Active Directory GPO for management by a Mac admin workstation with Workgroup Manager. Workgroup Manager can only see GPOs that have been marked in this manner and can only embed User and/or Computer policies if the appropriate switch is set on the User and/or Computer policy side of the GPO. a. Follow the steps in Create a GPO for Likewise clients on a Windows Admin workstation b. Right-click > Edit c. Expand Computer Configuration or User Configuration d. Expand Unix and Linux Policies e. Expand Mac Settings f. Click Workgroup Manager Settings g. Double-click Enable Workgroup Manager to configure settings for computers. h. Check the box Define this policy setting. a. Workgroup Manager on the Admin Mac workstation is only able to see policies when the Enable Workgroup Manager. Option is selected from either the Computer Configuration or User Configuration node. b. Workgroup manager can only inject Computer policies into the GPO when the Computer Configuration option is enabled. Similarly, User policies may only be injected when the User Configuration option is enabled. c. Once you have published a Mac policy to this GPO, the XML values of the policy will appear in the box Current file content. Edit a GPO with Workgroup Manager on a Mac Admin workstation 1. Description: This section provides the basic steps to edit a GPO with Workgroup manager. This assumes the policy has been properly tagged for editing per section Mark a GPO for editing on a Mac Admin workstation. a. Follow the steps in Mark a GPO for editing on a Mac Admin workstation to enable a GPO for policy injection. b. Open Workgroup Manager. i. Applications \ Server \ Workgroup Manager ii. Ignore initial popup window Workgroup Manager Connect c. Click the Server drop down, then View Directories. d. Click OK at the local configuration database warning prompt. e. Click on the left top where it says Viewing local directory: /Local/Default, this will popup several options. Select Other from this list. f. Select Likewise irectory > Select AD.UOREGON.EDU. You will see a list of Mac enabled policies in the 3rd column. g. Select the policy you wish to edit and click OK. h. At the top right, there should be a small picture of a lock. This may show as locked. Click this lock to authenticate against this policy. i. Enter ad\adm-<username> with the appropriate password. If successful, the lock will change to a picture of an opened lock. a. There are 4 icons on the top left of the Workgroup Manager window. These correspond to Users, User Groups, Computers and Computer Groups. The group icons are the only that are used for Likewise (Users and Computers). 12

13 b. Depending on the purpose of the policy, click either the Users or Computers icon. You should see an entry show up for Group of Users/Computers managed by GPO. These groups are used by likewise to apply the GPO settings to any computer in the OU that the GPO is attached to. Migrate a local user profile into a domain user profile 1. Description: This section details the steps to migrate an existing local user profile on a Mac workstation or server into a domain user profile. This can simplify the transition of a user into a domain account. a. Follow the steps in Join a Mac 10.x computer to the AD domain using the GUI tools b. Once joined, re-open Directory Utility. c. Mac OS 10.6.x: i. Open System Preferences ii. Open Accounts iii. Click Login Options iv. Click Join to the right of Network Account Server v. Click Open Directory Utility d. Mac OS 10.5.x: i. Open Applications ii. Open Utilities iii. Open Directory Utility e. Double-click Likewise - Active Directory to open the Likewise Domain Join app. i. This will require you to unlock Directory Utility page and enter admin credentials. f. Click Migrate g. In the Source - Local Account section, click the dropdown list and find the local user account. h. Enter the DOMAIN\USERNAME of the user from the domain you wish to have this profile. (ex: ad\jdoe) i. Click the button shaped like a check mark. j. Select Copy Profile. k. Click Migrate. l. At the Likewise Migrate User Profile popup, click Yes. a. This process will take up to several minutes to complete as the local user profile is copied to a new profile for the domain user. b. The log file for this migration can be found at /tmp/lw-migrate.<source_account_username>.log c. IMPORTANT: Make sure enough disk space is available on the OS drive to allow the copy operation to complete successfully. The Migration wizard does not report on a failure of this type. Verify an object has UNIX attributes 1. Description: a. Follow the steps in Join a Mac 10.x computer to the AD domain using the GUI tools b. Once joined, re-open Directory Utility. a. 13

14 Mac-only Policy Examples Grant admin access to a user or group 1. Description: This section details the steps to allow specified users or groups Administrator access to a Mac workstation or server. Without this policy, all domain users are only standard users. a. Follow the steps in Create/Edit GPOs for Likewise clients on a Windows Admin workstation b. Right-click > Edit c. Expand Computer Configuration d. Expand Unix and Linux Policies e. Expand Mac Settings f. Click DS Plugin Settings g. Double-click Allow administration by i. Add the group you would like to grant local admin access. h. Double-click Allow admins group local entries > Select True. a. *IMPORTANT*: The groups and users selected must have UNIX attributes to function. If you are intending to use a group that does not currently have UNIX attributes, contact Systems via the adhelp@ithelp.uoregon.edu RT queue to have this setup. Enable Mac firewall 1. Description: This section details the steps to enable and configure the Mac firewall. a. Follow the steps in Create a GPO for Likewise clients on a Windows Admin workstation b. Right-click > Edit c. Expand Computer Configuration d. Expand Unix and Linux Policies e. Expand Mac Settings f. Expand Mac System Preferences g. Click Firewall h. Double-click Use firewall protection i. Check Define this policy settings j. Select Enabled k. (Optional) Enable firewall logging i. Double-click Turn on firewall logging ii. Check Define this policy settings iii. Select Enabled l. (Optional) Block UDP traffic i. Double-click Block UDP traffic usage ii. Check Define this policy settings iii. Select Enabled m. (Optional) Enable firewall stealth mode i. Double-click Use firewall stealth mode ii. Check Define this policy settings iii. Select Enabled n. Click Apply Now. o. Any Mac in the OU that the GPO is attached will now receive these settings on next gpupdate. N/A 14

15 Apply a Pre-logon warning message to a Mac OS host 1. Description: This section details the steps to apply a pre-logon warning message to users of a workstation or server. A common warning would display Authorized use only along with any laws, regulation, and warnings about acceptable use as required. This is a recommended practice for both Windows and Mac hosts. a. Follow the steps in Using Workgroup Manager to edit tagged GPOs from your Mac Admin workstations. b. Select Group of Computers managed by GPO. c. At the top of the Workgroup Manager window, click Preferences. This will show you all of the Computer-related settings you may set in this policy by category. d. Select Login e. Select the Window tab. f. Choose Always at the top of the new Login settings window. g. Enter any text into the Message: field. h. Click Apply Now. i. Any Mac in the OU that the GPO is attached will now receive these settings on next gpupdate. N/A Show Hard Disks and Connected Servers on Desktop by default 1. Description: This section details the steps to force a Mac workstation or server to show network, external and local drives on the user s desktop. a. Follow the steps in Using Workgroup Manager to edit tagged GPOs from your Mac Admin workstations. b. Select Group of Computers managed by GPO. c. At the top of the Workgroup Manager window, click Preferences. This will show you all of the Computer-related settings you may set in this policy by category. d. Select Finder. e. Select the Preferences tab. f. Check Hard Disks, External Drives, CDs, DVDs, and ipods, and Connected Servers under Show these items on the Desktop. g. Click Apply Now. h. Any Mac in the OU that the GPO is attached will now receive this pre-logon message. N/A Universal File Vault settings 1. Description: This section provides an example usage of the Likewise file deployment mechanism to control FileVault settings across manages Mac workstations. This should be done with extreme caution and testing. a. On a Mac workstation without FileVault setup, setup the master FileVault password you intend to use on every system. b. Follow the steps in Deploy a File to a Mac workstation to deploy: i. /Library/Keychains/FileVaultMaster.cer ii. /Library/Keychains/FileVaultMaster.keychain c. Match the ACL settings on each file in the GPO to those set on the Mac. 15

16 d. Uncheck Delete when policy is removed, or these files will be removed from the system if it removed from scope of the policy. a. Be sure to read the following article for more information on this strategy: FileVaultintheEnterprisePart1/index.html Configure login options 1. Description: This section details the steps to configure login options, such as Automatic login, Fast User Switching, Guest account, and screensaver timeouts. a. Follow the steps in Edit a GPO with Workgroup Manager on the Mac Admin workstation. b. Select Group of Computers managed by GPO. c. At the top of the Workgroup Manager window, click Preferences. This will show you all of the Computer-related settings you may set in this policy by category. d. Select Login. e. Select the Options tab. f. Uncheck Enable automatic login. g. Uncheck Enable Fast User Switching. h. Uncheck Enable Guest Account. i. Check Start screen saver after XX minutes. j. Enter a number of minutes to start screen saver. k. Click the button to the right of Use module at path: l. Browse to the desired screensaver (/System/Library/Screen Savers/*.saver m. Click Apply Now. n. Any Mac in the OU that the GPO is attached will now receive these settings. a. Mac MCX policies are not as granular as many Windows GPO settings. In this example, you must decide what settings you want to use for *all* options in the Login\Options configuration section as all will be enforced. You cannot decide to set any as undefined as you would in a GPO (allowing local override). Configure Energy Saver options 1. Description: This section details the steps to apply managed Energy Saver options to Mac workstations. This is typically used to force workstation to sleep and disable displays after a fixed amount of time. a. Follow the steps in Edit a GPO with Workgroup Manager on the Mac Admin workstation. b. Select Group of Computers managed by GPO. c. At the top of the Workgroup Manager window, click Preferences. This will show you all of the Computer-related settings you may set in this policy by category. d. Select Energy Saver. e. Select Manage: Always f. Select Sleep from the Settings dropdown list. g. Select a time for Put the computer to sleep when it is inactive for: h. Select a time for Put the display(s) to sleep when the computer is inactive for: i. Check/Uncheck Put the hard disk(s) to sleep when possible. j. Select Options from the Settings dropdown list. k. Uncheck Wake when modem detects a ring l. Check Wake for Ethernet network administrator access 16

17 m. Check/Uncheck Allow power button to sleep the computer n. Check/Uncheck Restart automatically after a power failure o. Click Apply Now. p. Any Mac in the OU that the GPO is attached will now receive these settings. N/A 17

18 Universal Linux/Unix/Mac Policy Examples Allow cached logins 1. Description: This section details the steps to enable cached logins. Cached logins allows a user to login to a host even when it is offline, as long as a successful login event has occurred previously. This is common to set on workstations and laptops. a. Follow the steps in Create a GPO for Likewise clients on a Windows Admin workstation b. Expand Computer Configuration c. Expand Unix and Linux Policies d. Expand Likewise Settings e. Select Logon f. Double-click Allow cached logons (cached_login) g. Check Define this Policy Settings. h. Select Authorization and Identification i. Double-click Allow offline logon support j. Check Define this Policy Settings. k. Select Enable a. For this policy to be effective, a user must successfully logon at least one time after this policy is applied to the host. Restrict login to a user or group 4. Description: This section details the steps to restrict login to a workstation or server. Example of this usage would be to to only allow staff from a particular department to login to a workstation, or deny login to a server system by anyone other than an admin group/user. 5. Steps: a. Follow the steps in Create a GPO for Likewise clients on a Windows Admin workstation b. Right-click > Edit c. Expand Computer Configuration d. Expand Unix and Linux Policies e. Expand Likewise Settings f. Select Logon g. Double-click Allow logon rights h. Check Define this Policy Settings. i. Click the button resembling a pencil. j. Find the group you would like to grant local logon rights. k. (Optional): Enter a message to be displayed when logon is denied. l. Double-click Denied logon rights message Properties. m. Check Define this Policy Settings. n. Edit text in the Logon error message box as required. The default text may work for your purposes. 6. Notes: a. You may select multiple groups to grant logon rights. These must be entered in a comma separated list, though this is done automatically when searching and selecting a group. b. *IMPORTANT*: The groups and users selected must have UNIX attributes to function. If you are intending to use a group that does not currently have UNIX attributes, contact Systems via the adhelp@ithelp.uoregon.edu RT queue to have this setup. 18

19 Grant a domain group sudo access to a Linux host 1. Description: This section details the steps to allow a domain group or user sudo privileges on a Linux host. These steps allow any member of the group specified to perform admin operations. a. Follow the steps in Join a Linux computer to the domain using the shell. b. Edit the sudoers file on the Linux system i. sudo nano /etc/sudoers c. Look for the entry: root ALL=(ALL) ALL or root ALL=ALL d. Directly beneath this, enter the following: %AD\\GROUPNAME ALL=(ALL) ALL e. Reboot the system f. Login with a domain user that is a member of the group you added to the sudoers file. g. Confirm sudo access by running an elevated command a. GROUPNAME must be replaced with a valid domain group. All members of this group will be granted sudo access to the Linux host. b. The group selected must have valid UNIX attributes. Deploy Sudoers file 1. Description: This section details the steps to deploy a working sudoers file to Linux hosts in order to standardize your sudoers user list across managed servers. You may also create multiple GPO with different sudoers files as necessary. a. Follow the steps in section Grant a domain group sudo access to a Linux host b. Copy the sudoers file from this host to a network location. (e.g. \\fileserver\share\sudoers) c. Follow the steps in Create a GPO for Likewise clients on a Windows Admin workstation d. Right-click > Edit e. Expand Computer Configuration f. Expand Unix and Linux Policies g. Expand Security Settings h. Select SUDO command i. Double-click Define Sudoers file j. Check Define this Policy Settings. k. Click Import l. Browse to the network location (e.g. \\fileserver\share\sudoers) and select the file. m. Confirm the information imported into the Current file content is correct. n. Click OK. a. The sudoers file should be prepared for each class of host and thoroughly tested before mass deployment to protect against version or platform specific settings. Set Default Login Shell to /bin/bash 1. Description: This section details the steps required to set the default login shell on a Linux/Unix/Mac host. This is commonly used to set the default shell to /bin/bash as many platforms will default to /bin/sh. a. Follow the steps in Create a GPO for Likewise clients on a Windows Admin workstation 19

20 b. Right-click > Edit c. Expand Computer Configuration d. Expand Unix and Linux Policies e. Expand Likewise Settings f. Select Authorization and Identification' g. Double-click Login shell template h. Check Define this policy setting i. In the Shell: field, enter /bin/bash j. Click OK. a. This policy should be put in place *before* a user logs in. If a user has already logged in and has another shell set, you may need to restart the host Target a specific non-windows platform 1. Description: This section details the steps to target a specific Linux/Unix/Mac platform. This is used to assign policies to only a particular platform, such as Mac OS or Redhat. In conjunction with OU structure, this can be used to define GPO assignment at a granular level. a. Follow the steps in Create a GPO for Likewise clients on a Windows Admin workstation b. Expand Computer Configuration c. Expand Unix and Linux Policies d. Select Target Platform Filter e. Double-click Target platforms f. Check Define this policy setting g. Select Select from the List h. Check all platforms to which this policy should apply. i. Click OK. a. N/A Enable Loopback processing on a GPO 1. Description: This section details the steps required to enable Loopback processing. This feature allows User GPO settings to be attached to Computer GPOs. Settings then merge into or replace the policy settings normally assigned by User GPOs. This is common when creating policies for kiosk stations where an admin intends to override and user GPO settings. Additionally, this is a common method to assign User GPOs in the campus Active Directory environment due to the architecture and IDM integration. a. Follow the steps in Create a GPO for Likewise clients on a Windows Admin workstation b. Expand Computer Configuration c. Expand Unix and Linux Policies d. Expand Likewise Settings e. Click Group Policy Agent f. Double-click User policy loopback processing mode g. Check Define this Policy Setting h. Select Replace or Merge as required. 20

21 a. Standard loopback processing set for Windows workstations will not work on non-windows workstations. You must enable loopback processing for Likewise clients through the Unix and Linux Settings node. b. Merge is the most common setting for loopback processing in our environment. This enables any GPOs assigned to the workstation that contain user-specific settings to overwrite any conflicting settings, but leave others. c. Replace is typically used with kiosk systems that require the user-specific settings to be completely ignored. This setting overwrites and conflicts, but also removes any other settings set by any user GPOs. Deploy a File 1. Description: This section details the steps to deploy a file to managed Linux/Unix/Mac hosts. This is targeted at the deployment of small configuration files for applications and should not be used for large file deployment. a. Follow the steps in Create a GPO for Likewise clients on a Windows Admin workstation b. Expand Computer Configuration c. Expand Unix and Linux Policies d. Expand File System Settings e. Select Files, Directories and Links f. Double-click Create Directories, Install Files, Configure Links g. Check the Define this policy setting box h. Click Add i. Select File j. Browse to the file location k. Enter the patch the file should be deployed to. l. Set file ACL values (read/write/execute for User/Group/Other) m. Select an AD User/Group if desired n. Check/Uncheck Delete when policy is removed as necessary o. Click OK a. IMPORTANT: This file deployment method is intended for small files. Do not deploy large files using this method as this can directly impact the performance of Active Directory. b. Deployed files are stored inside the GPO and distributed to clients from there. Unlike a GPO Preferences policy for Windows, the UNC path (e.g. \\server\shared\file.ext) is not used. 21

PowerBroker Identity Services. Mac OS X Administration Guide

PowerBroker Identity Services. Mac OS X Administration Guide PowerBroker Identity Services Mac OS X Administration Guide Revision/Update Information: February 2016 Corporate Headquarters 5090 N. 40th Street Phoenix, AZ 85018 Phone: 1 818-575-4000 COPYRIGHT NOTICE

More information

Click Studios. Passwordstate. Password Discovery, Reset and Validation. Requirements

Click Studios. Passwordstate. Password Discovery, Reset and Validation. Requirements Passwordstate Password Discovery, Reset and Validation Requirements This document and the information controlled therein is the property of Click Studios. It must not be reproduced in whole/part, or otherwise

More information

Enabling Smart Card Logon for Linux Using Centrify Suite

Enabling Smart Card Logon for Linux Using Centrify Suite DoD Public Key Enablement (PKE) Reference Guide Enabling Smart Card Logon for Linux Using Centrify Suite 2012.4 Contact: dodpke@mail.mil URL: http://iase.disa.mil/pki-pke/ URL: http://iase.disa.smil.mil/pki-pke/

More information

Installing and Configuring VMware Identity Manager Connector (Windows) OCT 2018 VMware Identity Manager VMware Identity Manager 3.

Installing and Configuring VMware Identity Manager Connector (Windows) OCT 2018 VMware Identity Manager VMware Identity Manager 3. Installing and Configuring VMware Identity Manager Connector 2018.8.1.0 (Windows) OCT 2018 VMware Identity Manager VMware Identity Manager 3.3 You can find the most up-to-date technical documentation on

More information

Enabling Smart Card Logon for Mac OS X Using Centrify Suite

Enabling Smart Card Logon for Mac OS X Using Centrify Suite DoD Public Key Enablement (PKE) Reference Guide Enabling Smart Card Logon for Mac OS X Using Centrify Suite 2012.4 Contact: dodpke@mail.mil URL: http://iase.disa.mil/pki-pke/ URL: http://iase.disa.smil.mil/pki-pke/

More information

How to create a System Logon Account in Backup Exec for Windows Servers

How to create a System Logon Account in Backup Exec for Windows Servers How to create a System Logon Account in Backup Exec for Windows Servers Problem How to create a System Logon Account in Backup Exec for Windows Servers Solution The Backup Exec System Logon Account (SLA)

More information

PROXY Pro Deployment Tool v10.0. User Guide October 2017

PROXY Pro Deployment Tool v10.0. User Guide October 2017 PROXY Pro Deployment Tool v10.0 User Guide October 2017 Table of contents 1. System Requirements...3 2. Target Computer Requirements...4 3. Deployment Tool Operation...5 3.1 Loading a Host Install File...6

More information

USER GUIDE. CTERA Agent for Windows. June 2016 Version 5.5

USER GUIDE. CTERA Agent for Windows. June 2016 Version 5.5 USER GUIDE CTERA Agent for Windows June 2016 Version 5.5 Copyright 2009-2016 CTERA Networks Ltd. All rights reserved. No part of this document may be reproduced in any form or by any means without written

More information

QuickStart Guide for Managing Computers. Version

QuickStart Guide for Managing Computers. Version QuickStart Guide for Managing Computers Version 10.6.0 copyright 2002-2018 Jamf. All rights reserved. Jamf has made all efforts to ensure that this guide is accurate. Jamf 100 Washington Ave S Suite 1100

More information

NetIQ Advanced Authentication Framework. FIDO U2F Authentication Provider Installation Guide. Version 5.1.0

NetIQ Advanced Authentication Framework. FIDO U2F Authentication Provider Installation Guide. Version 5.1.0 NetIQ Advanced Authentication Framework FIDO U2F Authentication Provider Installation Guide Version 5.1.0 Table of Contents 1 Table of Contents 2 Introduction 3 About This Document 3 System Requirements

More information

Freshservice Discovery Probe User Guide

Freshservice Discovery Probe User Guide Freshservice Discovery Probe User Guide 1. What is Freshservice Discovery Probe? 1.1 What details does Probe fetch? 1.2 How does Probe fetch the information? 2. What are the minimum system requirements

More information

Realms and Identity Policies

Realms and Identity Policies The following topics describe realms and identity policies: Introduction:, page 1 Creating a Realm, page 5 Creating an Identity Policy, page 11 Creating an Identity Rule, page 15 Managing Realms, page

More information

Authentication Services ActiveRoles Integration Pack 2.1.x. Administration Guide

Authentication Services ActiveRoles Integration Pack 2.1.x. Administration Guide Authentication Services ActiveRoles Integration Pack 2.1.x Administration Guide Copyright 2017 One Identity LLC. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright.

More information

Migrating vrealize Automation 6.2 to 7.2

Migrating vrealize Automation 6.2 to 7.2 Migrating vrealize Automation 6.2 to 7.2 vrealize Automation 7.2 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition.

More information

User Guide. Version R92. English

User Guide. Version R92. English AuthAnvil User Guide Version R92 English October 9, 2015 Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept EULATOS as updated from

More information

Welcome to Centrify DirectControl Agent for Mac, Centrify Endpoint Services

Welcome to Centrify DirectControl Agent for Mac, Centrify Endpoint Services Welcome to Centrify DirectControl Agent for Mac, Centrify Endpoint Services Release Notes for Centrify DirectControl Agent for Mac, Centrify Endpoint Services macos Suite 2017.3 Edition Centrify DirectControl

More information

Windows Server 2003 Network Administration Goals

Windows Server 2003 Network Administration Goals Objectives Differentiate between the different editions of Windows Server 2003 Explain Windows Server 2003 network models and server roles Identify concepts relating to Windows Server 2003 network management

More information

Microsoft Exchange Proxy Settings Outlook 2010 Gpo

Microsoft Exchange Proxy Settings Outlook 2010 Gpo Microsoft Exchange Proxy Settings Outlook 2010 Gpo Cloud App Encryption supports Microsoft Outlook 2010 and 2013 for Windows. accounts for each user in Microsoft Office 365 and the Outlook proxy settings

More information

MITEL. Live Content Suite. Mitel Live Content Suite Installation and Administrator Guide Release 1.1

MITEL. Live Content Suite. Mitel Live Content Suite Installation and Administrator Guide Release 1.1 MITEL Live Content Suite Mitel Live Content Suite Installation and Administrator Guide Release 1.1 NOTICE The information contained in this document is believed to be accurate in all respects but is not

More information

User Guide. Version R94. English

User Guide. Version R94. English AuthAnvil User Guide Version R94 English March 8, 2017 Copyright Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept EULATOS as updated

More information

User Guide. Version R95. English

User Guide. Version R95. English Discovery User Guide Version R95 English September 18, 2017 Copyright Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept EULATOS

More information

Print Manager Plus 2010 Workgroup Print Tracking and Control

Print Manager Plus 2010 Workgroup Print Tracking and Control INTRODUCTION: This is intended to assist in the initial installation or evaluation of Print Manager Plus 2010 Workgroup Edition. This will guide you through tracking your printing whether your workgroup

More information

QuickStart Guide for Managing Computers. Version

QuickStart Guide for Managing Computers. Version QuickStart Guide for Managing Computers Version 10.2.0 copyright 2002-2018 Jamf. All rights reserved. Jamf has made all efforts to ensure that this guide is accurate. Jamf 100 Washington Ave S Suite 1100

More information

Joining a workstation to the agnet.tamu.edu Domain and Profile Migration

Joining a workstation to the agnet.tamu.edu Domain and Profile Migration Joining a workstation to the agnet.tamu.edu Domain and Profile Migration Contents Migration Prerequisites... 1 Firewalls... 1 Run As and Other Alternate Credentialing Methods... 1 File and Print Sharing

More information

Sophos Central Device Encryption. Administrator Guide

Sophos Central Device Encryption. Administrator Guide Sophos Central Device Encryption Administrator Guide Contents About... 1 Manage BitLocker Drive Encryption... 2 Migrate to...2 Prepare Device Encryption...3 Device Encryption step by step... 3 Device Encryption

More information

Remote Support 19.1 Web Rep Console

Remote Support 19.1 Web Rep Console Remote Support 19.1 Web Rep Console 2003-2019 BeyondTrust Corporation. All Rights Reserved. BEYONDTRUST, its logo, and JUMP are trademarks of BeyondTrust Corporation. Other trademarks are the property

More information

Your Mission: Connect to a remote Apple target(s) disk using F-Response Enterprise Edition.

Your Mission: Connect to a remote Apple target(s) disk using F-Response Enterprise Edition. Your Mission: Connect to a remote Apple target(s) disk using F-Response Enterprise Edition. Note: This guide assumes you have installed F-Response Enterprise Edition, your F-Response licensing dongle is

More information

QuickStart Guide for Managing Computers. Version 9.73

QuickStart Guide for Managing Computers. Version 9.73 QuickStart Guide for Managing Computers Version 9.73 JAMF Software, LLC 2015 JAMF Software, LLC. All rights reserved. JAMF Software has made all efforts to ensure that this guide is accurate. JAMF Software

More information

Cisco CTL Client setup

Cisco CTL Client setup Cisco CTL Client setup This chapter provides information about Cisco CTL client setup. About Cisco CTL Client setup, page 2 Remove etoken Run Time Environment 3.00 for CTL Client 5.0 plug-in, page 2 Cisco

More information

Automating the Windows 2000 Installation

Automating the Windows 2000 Installation Chapter 2 Automating the Windows 2000 Installation MICROSOFT EXAM OBJECTIVES COVERED IN THIS CHAPTER Perform an unattended installation of Windows 2000 Professional. Install Windows 2000 Professional by

More information

Installing and Configuring vcloud Connector

Installing and Configuring vcloud Connector Installing and Configuring vcloud Connector vcloud Connector 2.6.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new

More information

Centrify Infrastructure Services

Centrify Infrastructure Services Centrify Infrastructure Services Administrator s Guide for Mac September 2017 (release 2017.2) Centrify Corporation Legal notice This document and the software described in this document are furnished

More information

VMware Mirage Web Manager Guide

VMware Mirage Web Manager Guide Mirage 5.3 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of this document,

More information

LepideAuditor. Installation and Configuration Guide

LepideAuditor. Installation and Configuration Guide Installation and Configuration Guide Table of Contents 1. Introduction... 6 2. Requirements and Prerequisites... 6 2.1 System Requirements... 6 2.2 Supported Servers for Auditing... 7 2.3 Prerequisites

More information

VII. Corente Services SSL Client

VII. Corente Services SSL Client VII. Corente Services SSL Client Corente Release 9.1 Manual 9.1.1 Copyright 2014, Oracle and/or its affiliates. All rights reserved. Table of Contents Preface... 5 I. Introduction... 6 Chapter 1. Requirements...

More information

Distributed Rendering Setup Guide

Distributed Rendering Setup Guide 1 Shake Distributed Rendering Setup Guide This document takes you through the basic steps involved in the creation of two different sample setups for Shake distributed rendering with Shake Qmaster. You

More information

Movithere Server edition Guide. Guide to using Movithere to perform a Microsoft Windows Server data migration quickly and securely.

Movithere Server edition Guide. Guide to using Movithere to perform a Microsoft Windows Server data migration quickly and securely. Movithere Server edition Guide Guide to using Movithere to perform a Microsoft Windows Server data migration quickly and securely. Copyright 2017 V7 Software Group LLC Contents Introduction to Movithere

More information

Enable the Always Offline Mode to Provide Faster Access to Files

Enable the Always Offline Mode to Provide Faster Access to Files Enable the Always Offline Mode to Provide Faster Access to Files 13 out of 16 rated this helpful - Rate this topic Published: April 18, 2012 Updated: July 3, 2013 Applies To: Windows 8, Windows 8.1, Windows

More information

Autodesk DirectConnect 2010

Autodesk DirectConnect 2010 Autodesk DirectConnect 2010 Contents Chapter 2 Installing and Licensing...................... 3 Installing Autodesk DirectConnect..................... 3 Software deployment using group policies for Windows.........

More information

A D S S G o > S i g n D e s k t o p. I n s t a l l a t i o n G u i d e. D o c u m e n t V e r s i o n

A D S S G o > S i g n D e s k t o p. I n s t a l l a t i o n G u i d e. D o c u m e n t V e r s i o n A D S S G o > S i g n D e s k t o p I n s t a l l a t i o n G u i d e A S C E R T I A LTD A p r i l 2 0 1 8 D o c u m e n t V e r s i o n - 5.7. 0. 1 Ascertia Limited. All rights reserved. This document

More information

Managing Windows Environments with Group Policy

Managing Windows Environments with Group Policy Managing Windows Environments with Group Policy 50255D; 5 Days, Instructor-led Course Description In this course, you will learn how to reduce costs and increase efficiencies in your network. You will

More information

SolidWorks Enterprise PDM Installation Guide

SolidWorks Enterprise PDM Installation Guide SolidWorks Enterprise PDM Installation Guide Contents Legal Notices...vi 1 SolidWorks Enterprise PDM Installation Guide...7 2 Installation Overview...8 Required Installation Components...8 Optional Installation

More information

QuickStart Guide for Managing Computers. Version 9.32

QuickStart Guide for Managing Computers. Version 9.32 QuickStart Guide for Managing Computers Version 9.32 JAMF Software, LLC 2014 JAMF Software, LLC. All rights reserved. JAMF Software has made all efforts to ensure that this guide is accurate. JAMF Software

More information

Dell Wyse Management Suite. Version 1.1 Migration Guide

Dell Wyse Management Suite. Version 1.1 Migration Guide Dell Wyse Management Suite Version 1.1 Migration Guide Notes, cautions, and warnings NOTE: A NOTE indicates important information that helps you make better use of your product. CAUTION: A CAUTION indicates

More information

Click Studios. Passwordstate. Password Discovery, Reset and Validation. Requirements

Click Studios. Passwordstate. Password Discovery, Reset and Validation. Requirements Passwordstate Password Discovery, Reset and Validation Requirements This document and the information controlled therein is the property of Click Studios. It must not be reproduced in whole/part, or otherwise

More information

Remote Support Jump Client Guide: Unattended Access to Systems in Any Network 3. Recommended Steps for Implementing Bomgar Jump Technology 4

Remote Support Jump Client Guide: Unattended Access to Systems in Any Network 3. Recommended Steps for Implementing Bomgar Jump Technology 4 Jump Client Guide 2017 Bomgar Corporation. All rights reserved worldwide. BOMGAR and the BOMGAR logo are trademarks of Bomgar Corporation; other trademarks shown are the property of their respective owners.

More information

Welcome to Centrify DirectControl Agent for Mac, Centrify Endpoint Services

Welcome to Centrify DirectControl Agent for Mac, Centrify Endpoint Services Welcome to Centrify DirectControl Agent for Mac, Centrify Endpoint Services Release Notes for Centrify DirectControl Agent for Mac, Centrify Endpoint Services macos Suite 2018 Edition Centrify DirectControl

More information

Bomgar Remote Support Representative Guide 16.1

Bomgar Remote Support Representative Guide 16.1 Bomgar Remote Support Representative Guide 16.1 2016 Bomgar Corporation. All rights reserved worldwide. BOMGAR and the BOMGAR logo are trademarks of Bomgar Corporation; other trademarks shown are the property

More information

Windows Server 2003 { Domain Controller Installation and Configuration}

Windows Server 2003 { Domain Controller Installation and Configuration} Windows Server 2003 { Domain Controller Installation and } Benedikt Riedel MCSE + Messaging www.go-unified.com www.siemens.com/open Benedikt.riedel@siemens.com Start up the prepared Windows Server 2003

More information

Configuring SAP Targets and Runtime Users

Configuring SAP Targets and Runtime Users CHAPTER 4 Before you can create or run processes in your SAP environment, you must create the targets on which the processes will run. Targets are used to define specific environments where activities,

More information

VMware Mirage Web Management Guide. VMware Mirage 5.9.1

VMware Mirage Web Management Guide. VMware Mirage 5.9.1 VMware Mirage Web Management Guide VMware Mirage 5.9.1 VMware Mirage Web Management Guide You can find the most up-to-date technical documentation on the VMware Web site at: https://docs.vmware.com/ The

More information

Remote Support Web Rep Console

Remote Support Web Rep Console Remote Support Web Rep Console 2017 Bomgar Corporation. All rights reserved worldwide. BOMGAR and the BOMGAR logo are trademarks of Bomgar Corporation; other trademarks shown are the property of their

More information

Privileged Access Agent on a Remote Desktop Services Gateway

Privileged Access Agent on a Remote Desktop Services Gateway Privileged Access Agent on a Remote Desktop Services Gateway IBM SECURITY PRIVILEGED IDENTITY MANAGER User Experience and Configuration Cookbook Version 1.0 November 2017 Contents 1. Introduction 5 2.

More information

Aspera Connect Windows XP, 2003, Vista, 2008, 7. Document Version: 1

Aspera Connect Windows XP, 2003, Vista, 2008, 7. Document Version: 1 Aspera Connect 2.6.3 Windows XP, 2003, Vista, 2008, 7 Document Version: 1 2 Contents Contents Introduction... 3 Setting Up... 4 Upgrading from a Previous Version...4 Installation... 4 Set Up Network Environment...

More information

IBM Endpoint Manager Version 9.0. Software Distribution User's Guide

IBM Endpoint Manager Version 9.0. Software Distribution User's Guide IBM Endpoint Manager Version 9.0 Software Distribution User's Guide IBM Endpoint Manager Version 9.0 Software Distribution User's Guide Note Before using this information and the product it supports,

More information

PROXY Pro Web Console Operations v10.0. User Guide October 2017

PROXY Pro Web Console Operations v10.0. User Guide October 2017 PROXY Pro Web Console Operations v10.0 User Guide October 2017 Table of contents 1. Intro and Overview...5 Web Console Landing Page...6 Definitions...7 Account Users...9 Common Header Fields...10 Menu

More information

Altiris Client Management Suite 7.1 from Symantec User Guide for Mac Management

Altiris Client Management Suite 7.1 from Symantec User Guide for Mac Management Altiris Client Management Suite 7.1 from Symantec User Guide for Mac Management Contents Chapter 1 Introducing the Mac in Altiris Client Management Suite 7.1 from Symantec... 9 About managing the Mac

More information

Dell Storage Compellent Integration Tools for VMware

Dell Storage Compellent Integration Tools for VMware Dell Storage Compellent Integration Tools for VMware Version 4.0 Administrator s Guide Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your

More information

HORTICOPIA Professional

HORTICOPIA Professional HORTICOPIA Professional Networking User Guide Horticopia, Inc. www.horticopia.com October 2017 Table of Contents I. Quick Start 2 II. System Requirements 3 III. Installing HORTICOPIA Professional 4 1.

More information

GSS Administration and Troubleshooting

GSS Administration and Troubleshooting CHAPTER 9 GSS Administration and Troubleshooting This chapter covers the procedures necessary to properly manage and maintain your GSSM and GSS devices, including login security, software upgrades, GSSM

More information

VMware Identity Manager Cloud Deployment. Modified on 01 OCT 2017 VMware Identity Manager

VMware Identity Manager Cloud Deployment. Modified on 01 OCT 2017 VMware Identity Manager VMware Identity Manager Cloud Deployment Modified on 01 OCT 2017 VMware Identity Manager You can find the most up-to-date technical documentation on the VMware Web site at: https://docs.vmware.com/ The

More information

Windows Server 2012 Immersion Experience Enabling Secure Remote Users with RemoteApp, DirectAccess, and Dynamic Access Control

Windows Server 2012 Immersion Experience Enabling Secure Remote Users with RemoteApp, DirectAccess, and Dynamic Access Control Windows Server 2012 Immersion Experience Enabling Secure Remote Users with RemoteApp, DirectAccess, and Dynamic Access Control Windows Server 2012 Hands-on lab In this experience, you will configure a

More information

Enterprise Vault.cloud CloudLink Google Account Synchronization Guide. CloudLink to 4.0.3

Enterprise Vault.cloud CloudLink Google Account Synchronization Guide. CloudLink to 4.0.3 Enterprise Vault.cloud CloudLink Google Account Synchronization Guide CloudLink 4.0.1 to 4.0.3 Enterprise Vault.cloud: CloudLink Google Account Synchronization Guide Last updated: 2018-06-08. Legal Notice

More information

VMware Horizon FLEX Client User Guide

VMware Horizon FLEX Client User Guide Horizon FLEX 1.10 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of this

More information

DSS User Guide. End User Guide. - i -

DSS User Guide. End User Guide. - i - DSS User Guide End User Guide - i - DSS User Guide Table of Contents End User Guide... 1 Table of Contents... 2 Part 1: Getting Started... 1 How to Log in to the Web Portal... 1 How to Manage Account Settings...

More information

Installation and configuration guide

Installation and configuration guide Winfrasoft HAS Installation and Configuration Guide Installation and configuration guide Winfrasoft HAS for Microsoft Forefront UAG 2010 Published: October 2011 Applies to: Winfrasoft HAS (Build 2.0.2300.4)

More information

Kaseya 2. Installation guide. Version R8. English

Kaseya 2. Installation guide. Version R8. English Kaseya 2 Kaseya Server Setup Installation guide Version R8 English October 24, 2014 Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept

More information

NBC-IG Installation Guide. Version 7.2

NBC-IG Installation Guide. Version 7.2 Installation Guide Version 7.2 2017 Nuance Business Connect 7.2 Installation Guide Document Revision History Revision Date August 8, 2017 Revision List Updated supported SQL Server versions June 14, 2017

More information

ModeChanger

ModeChanger 35020808-02 2015.11 ModeChanger ModeChanger is a software utility that can switch the drive between normal mode and encrypted mode. Operating in encrypted mode will help protect your data. While the drive

More information

DigitalPersona Pro Enterprise

DigitalPersona Pro Enterprise DigitalPersona Pro Enterprise Quick Start Guide Version 5 DATA PROTECTION REMOTE ACCESS SECURE COMMUNICATION STRONG AUTHENTICATION ACCESS RECOVERY SINGLE SIGN-ON DigitalPersona Pro Enterprise DigitalPersona

More information

10ZiG Technology. Thin Desktop Quick Start Guide

10ZiG Technology. Thin Desktop Quick Start Guide 10ZiG Technology Thin Desktop Quick Start Guide 2010 05 20 Introduction This document is intended as a quick start guide for installing Thin Desktop. After reading this document, you will know how to:

More information

Technology Services Group Procedures. IH Anywhere guide. 0 P a g e

Technology Services Group Procedures. IH Anywhere guide. 0 P a g e VDI Pilot Technology Services Group Procedures IH Anywhere guide 0 P a g e Installation Disable Apple Security Table of Contents IH Anywhere for Apple OSX (MAC)...2 1. Installation...2 Disable Apple Security...8

More information

IT Essentials v6.0 Windows 10 Software Labs

IT Essentials v6.0 Windows 10 Software Labs IT Essentials v6.0 Windows 10 Software Labs 5.2.1.7 Install Windows 10... 1 5.2.1.10 Check for Updates in Windows 10... 10 5.2.4.7 Create a Partition in Windows 10... 16 6.1.1.5 Task Manager in Windows

More information

Realms and Identity Policies

Realms and Identity Policies The following topics describe realms and identity policies: About, page 1 Create a Realm, page 8 Create an Identity Policy, page 14 Create an Identity Rule, page 15 Manage a Realm, page 17 Manage an Identity

More information

EventTracker: Virtual Appliance

EventTracker: Virtual Appliance EventTracker: Virtual Appliance Quick Start Guide Version 8.1 Build 9 Publication Date: Feb. 8, 2016 EventTracker 8815 Centre Park Drive Columbia MD 21045 www.eventtracker.com Abstract The EventTracker

More information

The GoPrint Solution Web Client for Macintosh

The GoPrint Solution Web Client for Macintosh The GoPrint Solution Web Client for Macintosh Version 4.1 4.2 Updated: July 2017 Copyright 2016 ITC SYSTEMS. All rights reserved. No part of this publication may be reproduced, distributed, copied, or

More information

SMS 2.0 SSO / LDAP Launch Kit

SMS 2.0 SSO / LDAP Launch Kit SMS 2.0 SSO / LDAP Launch Kit Table of Contents What options are available in SMS 2.0 for Single Sign On?... 4 LDAP (Lightweight Directory Access Protocol)... 4 SkySSO (Skyward Single Sign On)... 4 SkySTS

More information

Installing and Configuring Xitron RIP Software and Ohio GT RIP Plug-In

Installing and Configuring Xitron RIP Software and Ohio GT RIP Plug-In TECHNICAL DOCUMENTATION Installing and Configuring Xitron RIP Software and Ohio GT RIP Plug-In For Xitron Navigator RIP version 10.1r2 and Windows 10 Introduction This document gives instructions for installing

More information

Installing and Configuring vcloud Connector

Installing and Configuring vcloud Connector Installing and Configuring vcloud Connector vcloud Connector 2.5.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new

More information

Recent Operating System Class notes 04 Managing Users on Windows XP March 22, 2004

Recent Operating System Class notes 04 Managing Users on Windows XP March 22, 2004 Recent Operating System Class notes 04 Managing Users on Windows XP March 22, 2004 You log into a system to notify the system who you are. When you log off, any files you have opened are cleaned up, and

More information

Installation Guide Version May 2017

Installation Guide Version May 2017 Installation Guide Version 2017 5 May 2017 GeoCue Group, Inc 9668 Madison Blvd. Suite 202 Madison, AL 35758 1-256-461-8289 www.geocue.com NOTICES The material in GeoCue Group, Inc. documents is protected

More information

Setting Up Resources in VMware Identity Manager. VMware Identity Manager 2.8

Setting Up Resources in VMware Identity Manager. VMware Identity Manager 2.8 Setting Up Resources in VMware Identity Manager VMware Identity Manager 2.8 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ If you have comments

More information

Dell PowerVault Best Practices Series. Deploying the Dell PowerVault NX3500 in a CIFS Environment A Dell Technical White Paper

Dell PowerVault Best Practices Series. Deploying the Dell PowerVault NX3500 in a CIFS Environment A Dell Technical White Paper Dell PowerVault Best Practices Series Deploying the Dell PowerVault NX3500 in a CIFS Environment A Dell Technical White Paper Enterprise Storage Solutions Engineering Dell Product Group June 2012 THIS

More information

EventTracker: Virtual Appliance

EventTracker: Virtual Appliance Quick Start Guide Version 7.6 Publication Date: Sep 18, 2014 EventTracker 8815 Centre Park Drive Columbia MD 21045 www.eventtracker.com Abstract The EventTracker Virtual Appliance enables you to capture

More information

VMware Identity Manager Cloud Deployment. DEC 2017 VMware AirWatch 9.2 VMware Identity Manager

VMware Identity Manager Cloud Deployment. DEC 2017 VMware AirWatch 9.2 VMware Identity Manager VMware Identity Manager Cloud Deployment DEC 2017 VMware AirWatch 9.2 VMware Identity Manager You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/

More information

ForeScout Extended Module for MobileIron

ForeScout Extended Module for MobileIron Version 1.8 Table of Contents About MobileIron Integration... 4 Additional MobileIron Documentation... 4 About this Module... 4 How it Works... 5 Continuous Query Refresh... 5 Offsite Device Management...

More information

Installation Guide. 3CX CRM Plugin for ConnectWise. Single Tenant Version

Installation Guide. 3CX CRM Plugin for ConnectWise. Single Tenant Version Installation Guide 3CX CRM Plugin for ConnectWise Single Tenant Version "Copyright VoIPTools, LLC 2011-2016" Information in this document is subject to change without notice. No part of this document may

More information

User Guide. Version R9. English

User Guide. Version R9. English Discovery User Guide Version R9 English March 5, 2015 Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept EULATOS as updated from

More information

PxM Proof of Concept Configuration. June 2018 Version 3.1

PxM Proof of Concept Configuration. June 2018 Version 3.1 PxM Proof of Concept Configuration June 2018 Version 3.1 Table of Contents PxM Architecture, Installation & Configuration... 3 PxM Proof of Concept (POC) Guide... 4 Introduction... 4 Prerequisites... 4

More information

Active Directory Change Notifier Quick Start Guide

Active Directory Change Notifier Quick Start Guide Active Directory Change Notifier Quick Start Guide Software version 3.0 General Information: info@cionsystems.com Online Support: support@cionsystems.com Copyright 2017 CionSystems Inc., All Rights Reserved

More information

LepideAuditor for File Server. Installation and Configuration Guide

LepideAuditor for File Server. Installation and Configuration Guide LepideAuditor for File Server Installation and Configuration Guide Table of Contents 1. Introduction... 4 2. Requirements and Prerequisites... 4 2.1 Basic System Requirements... 4 2.2 Supported Servers

More information

High Availability Enabling SSL Database Migration Auto Backup and Auto Update Mail Server and Proxy Settings Support...

High Availability Enabling SSL Database Migration Auto Backup and Auto Update Mail Server and Proxy Settings Support... Quick Start Guide Table of Contents Overview... 4 Deployment... 4 System Requirements... 4 Installation... 6 Working with AD360... 8 Starting AD360... 8 Launching AD360 client... 9 Stopping AD360... 9

More information

Migrating vrealize Automation 6.2 to 7.1

Migrating vrealize Automation 6.2 to 7.1 Migrating vrealize Automation 6.2 to 7.1 vrealize Automation 7.1 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition.

More information

Installation Guide. for 6.5 and all add-on modules

Installation Guide. for 6.5 and all add-on modules Kaseya Server Setup Installation Guide for 6.5 and all add-on modules February 11, 2014 Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept

More information

Realms and Identity Policies

Realms and Identity Policies The following topics describe realms and identity policies: About, page 1 Create a Realm, page 8 Create an Identity Policy, page 15 Create an Identity Rule, page 15 Manage a Realm, page 20 Manage an Identity

More information

Administration GUIDE. OSSV Plug-In. Published On: 11/19/2013 V10 Service Pack 4A Page 1 of 100

Administration GUIDE. OSSV Plug-In. Published On: 11/19/2013 V10 Service Pack 4A Page 1 of 100 Administration GUIDE OSSV Plug-In Published On: 11/19/2013 V10 Service Pack 4A Page 1 of 100 User Guide - OSSV Plug-In Table of Contents Overview New Features System Requirements Getting Started Setup

More information

SnapCenter Software 4.0 Installation and Setup Guide

SnapCenter Software 4.0 Installation and Setup Guide SnapCenter Software 4.0 Installation and Setup Guide March 2018 215-12926_C0 doccomments@netapp.com Table of Contents 3 Contents Deciding whether to read the SnapCenter Installation and Setup Guide...

More information

vcenter Server Appliance Configuration Modified on 17 APR 2018 VMware vsphere 6.7 VMware ESXi 6.7 vcenter Server 6.7

vcenter Server Appliance Configuration Modified on 17 APR 2018 VMware vsphere 6.7 VMware ESXi 6.7 vcenter Server 6.7 vcenter Server Appliance Configuration Modified on 17 APR 2018 VMware vsphere 6.7 VMware ESXi 6.7 vcenter Server 6.7 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/

More information

Goliath Performance Monitor v11.7 POC Install Guide

Goliath Performance Monitor v11.7 POC Install Guide Goliath Performance Monitor v11.7 POC Install Guide Goliath Performance Monitor Proof of Concept Limitations Goliath Performance Monitor Proof of Concepts (POC) will be limited to monitoring 5 Hypervisor

More information

Policy Settings for Windows Server 2003 (including SP1) and Windows XP (including SP2)

Policy Settings for Windows Server 2003 (including SP1) and Windows XP (including SP2) Web 2 Policy Settings for (including SP1) and XP (including SP2) This document was written by Conan Kezema. and XP together introduce more than 270 new administrative template policy settings for you to

More information