Netwrix Auditor Installation and Configuration Guide

Total Page:16

File Type:pdf, Size:1020Kb

Netwrix Auditor Installation and Configuration Guide Netwrix Auditor Installation and Configuration Guide Version: 10 9/14/2021 Legal Notice The information in this publication is furnished for information use only, and does not constitute a commitment from Netwrix Corporation of any features or functions, as this publication may describe features or functionality not applicable to the product release or version you are using. Netwrix makes no representations or warranties about the Software beyond what is provided in the License Agreement. Netwrix Corporation assumes no responsibility or liability for the accuracy of the information presented, which is subject to change without notice. If you believe there is an error in this publication, please report it to us in writing. Netwrix is a registered trademark of Netwrix Corporation. The Netwrix logo and all other Netwrix product or service names and slogans are registered trademarks or trademarks of Netwrix Corporation. Microsoft, Active Directory, Exchange, Exchange Online, Office 365, SharePoint, SQL Server, Windows, and Windows Server are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries. All other trademarks and registered trademarks are property of their respective owners. Disclaimers This document may contain information regarding the use and installation of non-Netwrix products. Please note that this information is provided as a courtesy to assist you. While Netwrix tries to ensure that this information accurately reflects the information provided by the supplier, please refer to the materials provided with any non-Netwrix product and contact the supplier for confirmation. Netwrix Corporation assumes no responsibility or liability for incorrect or incomplete information provided about non-Netwrix products. © 2021 Netwrix Corporation. All rights reserved. 2/314 Table of Contents 1. Introduction 11 1.1. Netwrix Auditor Features and Benefits 11 1.2. How It Works 14 1.2.1. Workflow Stages 15 2. Deployment Planning 16 2.1. Netwrix Auditor Server and Client 16 2.1.1. Physical or Virtual? 16 2.1.2. Domains and Trusts 17 2.1.3. Simple Deployment 18 2.1.4. Distributed Deployment (Client-Server) 19 2.2. SQL Server and Databases 19 2.2.1. Databases 19 2.2.2. SQL Server 20 2.2.3. SQL Server Reporting Services 21 2.2.4. Database Sizing 22 2.2.5. Database Settings 22 2.2.5.1. Database Retention 23 2.3. File-Based Repository for Long-Term Archive 24 2.3.1. Location 24 2.3.2. Retention 25 2.3.3. Capacity 26 2.4. Working Folder 26 2.5. Sample Deployment Scenarios 27 2.5.1. Small Environment 27 2.5.1.1. PoC and Production Infrastructure 28 2.5.2. Regular Environment 28 2.5.3. Large Environment 29 2.5.4. Extra-Large Environment 30 3. Prerequisites and System Requirements 33 3/314 3.1. Supported Data Sources 33 3.1.1. Considerations for Oracle Database Auditing 40 3.1.2. Technology Integrations 41 3.2. Requirements to Install Netwrix Auditor 42 3.2.1. Hardware Requirements 42 3.2.1.1. Full Installation 42 3.2.1.2. Client Installation 44 3.2.2. Software Requirements 44 3.2.2.1. Other Components 45 3.2.2.2. Using SSRS-based Reports 48 3.3. Requirements for SQL Server to Store Audit Data 48 4. Protocols and Ports Required for Netwrix Auditor Server 50 5. Install Netwrix Auditor 52 5.1. Install the Product 52 5.2. Installing Core Services to Audit User Activity and SharePoint (Optional) 54 5.2.1. Install Netwrix Auditor for SharePoint Core Service 54 5.2.2. Install Netwrix Auditor User Activity Core Service 55 5.3. Installing Netwrix Auditor Client via Group Policy 56 5.3.1. Extract MSI File 56 5.3.2. Create and Distribute Installation Package 56 5.3.3. Create a Group Policy to Deploy Netwrix Auditor 56 5.4. Install Netwrix Auditor in Silent Mode 59 6. Upgrade to the Latest Version 60 6.1. Before Starting the Upgrade 60 6.1.1. Take Preparatory Steps 60 6.1.2. General Considerations and Known Issues 61 6.2. Upgrade Procedure 62 7. Configure IT Infrastructure for Auditing and Monitoring 63 7.1. Configure Active Directory Domain for Monitoring 77 7.1.1. Domain Audit Policy Settings 77 7.1.2. Audit Settings for AD Partitions 77 7.1.2.1. Domain Partition 77 4/314 7.1.2.2. Configuration and Schema Partitions 77 7.1.3. Security Event Log Settings 78 7.1.4. Exchange Settings 78 7.1.4.1. Next Steps 79 7.1.5. Active Directory: automatic configuration 79 7.1.6. Active Directory: manual configuration 80 7.1.6.1. Configure Basic Domain Audit Policies 81 7.1.6.2. Configure Advanced Audit Policies 82 7.1.6.3. Configure Object-Level Auditing 84 7.1.6.4. Adjust Security Event Log Size and Retention Settings 90 7.1.6.5. Adjust Active Directory Tombstone Lifetime (optional) 91 7.1.6.6. Enable Secondary Logon Service 93 7.2. Configure AD FS Server for Monitoring 93 7.3. Configure Infrastructure for Monitoring Exchange 96 7.3.1. Configure Exchange Administrator Audit Logging Settings 96 7.3.2. Configure Exchange for Monitoring Mailbox Access 98 7.4. Configure Infrastructure for Monitoring Exchange Online 100 7.4.1. Settings for non-owner mailbox access audit: automatic configuration 100 7.4.2. Settings for non-owner mailbox access audit: manual configuration 103 7.5. Prepare for Windows File Server Monitoring 104 7.5.1. Step 1. Check requirements 104 7.5.2. Step 2. Decide on audit data to collect 104 7.5.3. Step 3. Review considerations and limitations 105 7.5.3.1. DFS-related constraints 105 7.5.4. Step 4. Apply required audit settings 106 7.5.5. Step 5. Configure Data Collecting Account 107 7.5.6. Step 6. Configure required protocols and ports 107 7.5.7. File Servers and Antivirus 107 7.5.8. Configure Object-Level Access Auditing 107 7.5.9. Configure Local Audit Policies 118 7.5.10. Configure Advanced Audit Policies 119 7.5.11. Configure Event Log Size and Retention Settings 122 5/314 7.5.12. Enable Remote Registry Service 124 7.5.13. Configure Windows Firewall Inbound Connection Rules 125 7.6. Configure Dell EMC VNX/VNXe/Celerra/Unity for Monitoring 125 7.6.1. Configure Security Event Log Maximum Size 126 7.6.2. Configure Audit Object Access Policy 127 7.6.3. Configure Audit Settings for CIFS File Shares on EMC VNX/VNXe/Unity 128 7.7. Configure EMC Isilon for Monitoring 138 7.7.1. Configure EMC Isilon in Normal and Enterprise Modes 139 7.7.1.1. Considerations and Recommendations 141 7.7.2. Configure EMC Isilon in Compliance Mode 141 7.8. Configure NetApp Filer for Monitoring 144 7.8.1. Configure NetApp Data ONTAP 7 and 8 in 7-mode for Monitoring 144 7.8.1.1. Prerequisites 145 7.8.1.2. Configure Qtree Security 145 7.8.1.3. Configure Admin Web Access 145 7.8.1.4. Configure Event Categories 146 7.8.2. Configure NetApp Clustered Data ONTAP 8 and ONTAP 9 for Monitoring 148 7.8.2.1. Prerequisites 149 7.8.2.2. Configure ONTAPI Web Access 149 7.8.2.3. Configure Firewall Policy 150 7.8.2.4. Configure Event Categories and Log 152 7.8.3. Configure Audit Settings for CIFS File Shares 156 7.9. Configure Nutanix File Server for Monitoring 166 7.9.1. Create User Account to Access Nutanix REST API 167 7.9.2. Configure Partner Server 168 7.9.3. Create a Notification Policy 171 7.9.3.1. Monitored Operations 171 7.9.3.2. Configuration Procedure 171 7.9.3.3. Auditing Specific Folders 173 7.9.3.4. Example 173 7.9.4. Open Port for Inbound Connections 175 7.10. Configure Network Devices for Monitoring 175 6/314 7.10.1. Configure Cisco ASA Devices 176 7.10.2. Configure Cisco IOS 176 7.10.3. Configure Cisco Meraki Devices 178 7.10.4. Configure Fortinet FortiGate Devices 179 7.10.5. Configure Juniper Devices 180 7.10.6. Configure PaloAlto Devices 181 7.10.7. Configure SonicWall Devices 182 7.10.8. Configure HPE Aruba Devices 184 7.10.9. 187 7.10.10. Configure Pulse Secure Devices 187 7.11. Configure Oracle Database for Monitoring 189 7.11.1. Configure Oracle Database 12c, 18c, 19c for Auditing 190 7.11.2. Configure Oracle Database 11g for Auditing 193 7.11.2.1. Select audit trail to store Oracle audit records 194 7.11.2.2. Enable auditing of Oracle Database changes 195 7.11.3. Migrate to Unified Audit 197 7.11.4. Configure Fine Grained Auditing 199 7.11.5. Verify Your Oracle Database Audit Settings 199 7.11.6. Create and Configure Oracle Wallet 201 7.11.6.1. Create Oracle Wallet 201 7.11.6.2. Install Oracle Instant Client 201 7.11.6.3. Configure Oracle Instant Client for HTTP Proxy Connections 202 7.11.6.4. Update Existing Oracle Client Installation 203 7.12. Configure SharePoint Farm for Monitoring 203 7.12.1. Configure Audit Log Trimming 204 7.12.2. Configure Events Auditing Settings 205 7.12.3. Enable SharePoint Administration Service 205 7.13. Configure SQL Server for Monitoring 205 7.13.1. Configuring trace logging 205 7.13.2. Checking for primary key 207 7.13.3. Next steps 207 7.14. Configure Windows Server for Monitoring 207 7/314 7.14.1.
Recommended publications
  • Hyper-V Performance Comparison: Microsoft Windows Server 2008 SP2 and R2 with Intel Xeon Processor X5570
    TEST REPORT JULY 2009 Hyper-V performance comparison: Microsoft Windows Server 2008 SP2 and R2 with Intel Xeon processor X5570- and E5450-based servers Executive summary KEY FINDINGS Microsoft® Corporation (Microsoft) and Intel® Corporation (Intel) commissioned Principled z The Intel Xeon processor X5570-based server with Technologies® (PT) to measure Hyper-V R2 the optimum number of CSUs delivered 37.1 percent virtualization performance improvements using more vConsolidate performance when running vConsolidate on the following Microsoft operating Microsoft Windows Server 2008 Enterprise Edition systems and Intel processors: R2 than when runningTEST Microsoft REPORT Windows Server 2008 EnterpriseFEBRUARY Edition SP2. (See 2006 Figure 1.) • Microsoft Windows Server® 2008 z Microsoft Windows Server 2008 Enterprise Edition Enterprise Edition SP2 with Hyper-V on SP2 running on the Intel Xeon processor X5570- Intel® Xeon® processor E5450 based server with the optimum number of CSUs • Microsoft Windows Server 2008 Enterprise delivered 98.7 percent more vConsolidate Edition SP2 with Hyper-V on Intel Xeon performance than it did running on the Intel Xeon processor X5570 processor E5450-based server with the optimum • Microsoft Windows Server 2008 Enterprise number of CSUs. (See Figure 1.) Edition R2 with Hyper-V on Intel Xeon processor X5570 Figure 1 shows the vConsolidate results for all three configurations with the optimum number of vConsolidate work units, consolidation stack units (CSUs). The Intel Xeon processor X5570-based server with the optimum number of CSUs (eight) delivered 37.1 percent more vConsolidate performance when running Microsoft Windows Server 2008 Enterprise Edition R2 than when running Microsoft Windows Server 2008 Enterprise Edition SP2.
    [Show full text]
  • MCITP Exam 70-646: Windows Server 2008 Server Administrator, 2E
    Exam 70-646: Pro: Windows Server 2008 Server Administrator (2nd Edition) Objective LOcAtiON iN bOOK PLANNiNG FOR SeRveR DePLOYMeNt Plan server installations and upgrades. Chapter 1, Lesson 1 Plan for automated server deployment. Chapter 1, Lesson 2 Plan infrastructure services server roles. Chapter 2 Chapter 3 Chapter 9, Lesson 1 Plan application servers and services. Chapter 6, Lesson 1 Plan file and print server roles. Chapter 7 PLANNiNG for SeRveR MANAGeMeNt Plan server management strategies. Chapter 5, Lesson 1 Plan for delegated administration. Chapter 5, Lesson 2 Plan and implement group policy strategy. Chapter 4 MONitORiNG AND MAiNtAiNiNG SeRveRS Implement patch management strategy. Chapter 8, Lesson 2 Monitor servers for performance evaluation and optimization. Chapter 12 Monitor and maintain security and policies. Chapter 8, Lesson 1 Chapter 9, Lesson 2 PLANNiNG APPLicAtiON AND DAtA PROviSiONiNG Provision applications. Chapter 6, Lesson 2 Provision data. Chapter 10, Lesson 1 PLANNiNG FOR bUSiNeSS cONtiNUitY AND HiGH AvAiLAbiLitY Plan storage. Chapter 10, Lesson 2 Plan high availability. Chapter 11 Plan for backup and recovery. Chapter 13 e xam Objectives The exam objectives listed here are current as of this book’s publication date. Exam objectives are subject to change at any time without prior notice and at Microsoft’s sole discretion. Please visit the Microsoft Learning Web site for the most current listing of exam objectives: http://www.microsoft.com/learning/en/us/Exam .aspx?ID=70-646. Self-Paced Training Kit (Exam 70-646): ® Windows Server 2008 Server Administrator (2nd Edition) Orin Thomas Ian McLean PUBLISHED BY Microsoft Press A Division of Microsoft Corporation One Microsoft Way Redmond, Washington 98052-6399 Copyright © 2011 by Orin Thomas and Ian McLean All rights reserved.
    [Show full text]
  • Lumia with Windows 10 Mobile User Guide
    User Guide Lumia with Windows 10 Mobile Issue 1.1 EN-US About this user guide This guide is the user guide for your software release. Important: For important information on the safe use of your device and battery, read “For your safety” and “Product and safety info” in the printed or in-device user guide, or at www.microsoft.com/mobile/support before you take the device into use. To find out how to get started with your new device, read the printed user guide. For the online user guidance, videos, even more information, and troubleshooting help, go to support.microsoft.com, and browse to the instructions for Windows phones. You can also check out the support videos at www.youtube.com/lumiasupport. Moreover, there's a user guide in your phone – it's always with you, available when needed. To find answers to your questions and to get helpful tips, tap Lumia Help+Tips. If you’re new to Lumia, check out the section for new users. For info on Microsoft Privacy Statement, go to aka.ms/privacy. © 2016 Microsoft Mobile. All rights reserved. 2 User Guide Lumia with Windows 10 Mobile Contents For your safety 5 People & messaging 64 Get started 6 Calls 64 Turn the phone on 6 Contacts 68 Lock the keys and screen 7 Social networks 73 Charge your phone 7 Messages 74 Your first Lumia? 10 Email 78 Learn more about your phone 10 Camera 83 Set up your phone 10 Open your camera quickly 83 Update your apps 11 Camera basics 83 Explore your tiles, apps, and settings 12 Advanced photography 86 Navigate inside an app 14 Photos and videos 88 Use the touch screen
    [Show full text]
  • What's New in Active Directory Domain Services in Windows
    T w What’s New in Active Directory Domain Services in Windows Server 2012 How your organization can benefit from the new features in Active Directory Domain Services and Windows Server 2012 Sander Berkouwer Version 1.0 First published online in October 2012. Copyright Sander Berkouwer. The rights of Sander Berkouwer to be identified as the author of this work has been asserted by him in accordance with the Copyright, Designs and Patents Act 1988. All rights reserved. No part of this publication may be reproduced, stored or introduced into a retrieval system, or transmitted, in any form, or by any means (electronic, mechanical, photocopying, recording or otherwise) without the prior written consent of the publisher. Any person who does any unauthorized act in relation to this publication may be liable to criminal prosecution and civil claims for damages. This document is provided for informational purposes only and the author makes no warranties, either express or implied, in this document. Information in this document, including URL and other Internet Web site references, is subject to change without notice. The entire risk of the use or the results from the use of this document remains with the user. Active Directory, Microsoft, MS-DOS, Windows, Windows NT, and Windows Server are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries. All other trademarks are property of their respective owners. 1 Preface 84% of all organizations with more than 50 users use Microsofts Active Directory Domain Services as their centralized identity and access management solution. With Windows Server 2012, Microsoft introduces new features in Active Directory Domain Services to make Active Directory more scalable, more flexible, more dynamic and easier to deploy.
    [Show full text]
  • WINDOWS 10 IT PRO ESSENTIALS Support Secrets
    WINDOWS 10 IT PRO ESSENTIALS Support Secrets Ed Bott PUBLISHED BY Microsoft Press A division of Microsoft Corporation One Microsoft Way Redmond, Washington 98052-6399 Copyright © 2016 by Microsoft Corporation All rights reserved. No part of the contents of this book may be reproduced or transmitted in any form or by any means without the written permission of the publisher. ISBN: 978-1-5093-0280-2 Microsoft Press books are available through booksellers and distributors worldwide. If you need support related to this book, email Microsoft Press Support at [email protected]. Please tell us what you think of this book at http://aka.ms/tellpress. This book is provided “as-is” and expresses the author’s views and opinions. The views, opinions and information expressed in this book, including URL and other Internet website references, may change without notice. Some examples depicted herein are provided for illustration only and are fictitious. No real association or connection is intended or should be inferred. Microsoft and the trademarks listed at http://www.microsoft.com on the “Trademarks” webpage are trademarks of the Microsoft group of companies. All other marks are property of their respective owners. Acquisitions and Developmental Editor: Rosemary Caperton Editorial Production: Dianne Russell, Octal Publishing, Inc. Copyeditor: Bob Russell, Octal Publishing, Inc. Cover: Twist Creative • Seattle Visit us today at microsoftpressstore.com • Hundreds of titles available – Books, eBooks, and online resources from industry experts • Free U.S. shipping • eBooks in multiple formats – Read on your computer, tablet, mobile device, or e-reader • Print & eBook Best Value Packs • eBook Deal of the Week – Save up to 60% on featured titles • Newsletter and special offers – Be the first to hear about new releases, specials, and more • Register your book – Get additional benefits Contents Introduction ............................................................................................................................................
    [Show full text]
  • Windows Server 2012 R2 Evaluation Guide
    Windows Server 2012 R2 Evaluation Guide Copyright Information © 2013 Microsoft Corporation. All rights reserved. This document is provided "as-is." Information and views expressed in this document, including URL and other Internet Web site references, may change without notice. Some examples depicted herein are provided for illustration only and are fictitious. No real association or connection is intended or should be inferred. You bear the risk of using it. This document does not provide you with any legal rights to any intellectual property in any Microsoft product. You may copy and use this document for your internal, reference purposes. You may modify this document for your internal, reference purposes. Published: 4 October 2013 Table of Contents Using This Guide ....................................................................................................................... 1 Introduction to Windows Server 2012 R2 ................................................................................. 2 New Features and Highlights ........................................................................................................................ 2 Transforming Your Datacenter .................................................................................................. 7 Windows Server: Architecture of the Evaluation Environment .................................................................. 7 Windows Server Installation ......................................................................................................................
    [Show full text]
  • Learning Unix for OS X, Second Edition
    2nd Edition Covers El Capitan Learning Unix for OS X GOING DEEP WITH THE TERMINAL AND SHELL Dave Taylor SECOND EDITION Learning Unix for OS X Dave Taylor Boston Learning Unix for OS X by Dave Taylor Copyright © 2016 Dave Taylor. All rights reserved. Printed in the United States of America. Published by O’Reilly Media, Inc., 1005 Gravenstein Highway North, Sebastopol, CA 95472. O’Reilly books may be purchased for educational, business, or sales promotional use. Online editions are also available for most titles (http://safaribooksonline.com). For more information, contact our corporate/ institutional sales department: 800-998-9938 or [email protected]. Editor: Rachel Roumeliotis Indexer: Judy McConville Production Editor: Nicole Shelby Interior Designer: David Futato Copyeditor: Sonia Saruba Cover Designer: Randy Comer Proofreader: Rachel Head Illustrator: Rebecca Demarest January 2016: Second Edition September 2012: First Edition Revision History for the Second Edition 2016-01-19: First Release See http://oreilly.com/catalog/errata.csp?isbn=9781491939987 for release details. The O’Reilly logo is a registered trademark of O’Reilly Media, Inc. Learning Unix for OS X, the cover image, and related trade dress are trademarks of O’Reilly Media, Inc. While the publisher and the author have used good faith efforts to ensure that the information and instructions contained in this work are accurate, the publisher and the author disclaim all responsibility for errors or omissions, including without limitation responsibility for damages resulting from the use of or reliance on this work. Use of the information and instructions contained in this work is at your own risk.
    [Show full text]
  • Working with RD Web Access in Windows Server 2012
    Working with RD Web Access in Windows Server 2012 Introduction to RD Web Access So far in this series we have talked about how to successfully deploy and manage a Microsoft Windows Server 2012 VDI environment. But the overall success of your deployment will be measured by end-user satisfaction. Providing an easy path for users to easily discover the resources available to them is essential. This is where RD Web Access comes into play. RD Web Access delivers VDI resources (RemoteApps or full desktops) to end users. You publish these resources, and RD Web Access makes them easily discoverable for end users in these ways: • On the RD Web Access web site. • In the Start Menu of Windows 7 and Windows 8 clients that have the RemoteApps and Desktop Connections (RADC) configured. See more about RADC in the “RADC and Windows 8” section. • In the modern Remote Desktop app on Windows 8 clients that have RADC configured. In this article, we’ll look at how publishing works, what’s new in Windows Server 2012 and the Modern Remote Desktop Connection application, and how to customize RD Web Access. How Publishing Works At a high level, here’s how the pieces work together. You use RDMS to publish resources for the collection (recalling that a collection consists of homogenous servers). RD Connection Broker keeps track of all available resources. The RD Web Access role service queries RD Connection Broker for all available resources and RD Connection Broker returns the results. RD Web Access takes that data and produces two data streams: - Hypertext Markup Language (HTML) data that RD Web Access web portal displays as web pages.
    [Show full text]
  • Archioffice Getting Started Guide 2016
    GETTING STARTED GUIDE: ArchiOffice ArchiOffice Getting Started Guide 2016 ArchiOffice | Power your Office. Empower Yourself. (866) 945-1595 | www.bqe.com | [email protected] GETTING STARTED GUIDE: ArchiOffice CONTENTS INTRODUCTION ..................................................................................................................................... 1 ARCHIOFFICE SETUP CHECKLIST .................................................................................................................................. 2 SYSTEM REQUIREMENTS ....................................................................................................................... 3 SERVER REQUIREMENTS ............................................................................................................................................... 4 CLIENT REQUIREMENTS ............................................................................................................................................... 5 INSTALLATION ....................................................................................................................................... 5 INSTALLATION PREPARATION ....................................................................................................................................... 8 INSTALLATION .......................................................................................................................................................... 11 ADVANCED INSTALLATION .......................................................................................................................................
    [Show full text]
  • Windows 10 It Pro Essentials
    WINDOWS 10 IT PRO ESSENTIALS Top 10 Tools Ed Bott PUBLISHED BY Microsoft Press A division of Microsoft Corporation One Microsoft Way Redmond, Washington 98052-6399 Copyright © 2016 by Microsoft Corporation All rights reserved. No part of the contents of this book may be reproduced or transmitted in any form or by any means without the written permission of the publisher. ISBN: 978-1-5093-0278-9 First Printing Microsoft Press books are available through booksellers and distributors worldwide. If you need support related to this book, email Microsoft Press Support at [email protected]. Please tell us what you think of this book at http://aka.ms/tellpress. This book is provided “as-is” and expresses the author’s views and opinions. The views, opinions and information expressed in this book, including URL and other Internet website references, may change without notice. Some examples depicted herein are provided for illustration only and are fictitious. No real association or connection is intended or should be inferred. Microsoft and the trademarks listed at http://www.microsoft.com on the “Trademarks” webpage are trademarks of the Microsoft group of companies. All other marks are property of their respective owners. Acquisitions Editor: Rosemary Caperton Developmental Editor Rosemary Caperton Editorial Production: Dianne Russell, Octal Publishing, Inc. Copyeditor: Bob Russell, Octal Publishing, Inc. Cover: Twist Creative • Seattle Visit us today at microsoftpressstore.com • Hundreds of titles available – Books, eBooks, and online resources
    [Show full text]
  • Unit-V Windows Mobile App Development 1
    SIT-1402 – Mobile Application Development Unit-V Windows Mobile App Development Unit-V Windows Mobile App Development Introduction to windows phone 8, Application life cycle, UI designing and Events, Building, Files and storage, Network communication, Push notification, Background agents, Maps and Locations, Data access and storage, Introduction to silverlight and XML, Running and debugging the app, Deploying and publishing. 1. Introduction to windows phone 8 Microsoft was developing Windows Mobile 7 when it realized that the phone wouldn’t be an appealing product for consumers who were starting to get used to iPhone or Android devices. So its developers dropped the project and started from scratch to build a totally new platform: Windows Phone 7. The result was really different from the other competitors: a new user interface, based on a flat design style called Microsoft Design style (once known as Metro); and deep integration with social networks and all the Microsoft services, like Office, SkyDrive, and Xbox. The current version of the platform (which will be covered in this series) is Windows Phone 8; in the middle, Microsoft released an update called Windows Phone 7.5 that added many new consumer features but, most of all, improved the developer experience by adding many new APIs. Windows Phone 8 is a fresh start for the platform: Microsoft has abandoned the old stack of technologies used in Windows Phone 7 (the Windows Mobile kernel, Silverlight, XNA) to embrace the new features introduced in Windows 8, like the new kernel, the
    [Show full text]
  • Performing a Custom Installation of Observeit
    ObserveIT Custom Installation In a custom installation, each of the ObserveIT components can be installed separately and you can dis- tribute the components and use advanced configuration options as needed. Custom Installation is often used in environments with higher security procedures, requiring each com- ponent of the ObserveIT product to be installed separately and using dedicated service accounts; or in large-scale environments requiring custom modifications of some of the server-side components. ObserveIT Custom Installation 1 Assumptions This section describes the assumptions for examples included in the Custom Installation steps. SYSTEM REQUIREMENT ASSUMPTIONS The diagram below shows the system requirements for the Custom Installation that is described in this documentation. In the Custom Installation examples in the documentation, the following is assumed. Server Name Function Software MSSQL Server 2016 Standard Database server SQLSrv Windows Server 2016 Standard File server SQL Management Studio 17 ObserveIT Application Server Web Console Windows Server 2016 OITsrv1 ObserveIT Web Console Standard Microsoft IIS 10 OITAgent ObserveIT Agent Windows Server 2016 Standard The diagram below is an example If you use a more complex installation. Assumptions 2 The following is assumed: Server Name Function Software MSSQL Server 2016 Standard Database server SQLSrv Windows Server 2016 Standard File server SQL Management Studio 17 Windows Server 2016 Standard OITsrv1 ObserveIT Application Server #1 Standard Microsoft IIS 10 Windows Server
    [Show full text]