Standard Solution Package Is a Set of Data Objects—Collectively Called Content—Preloaded Into the VSA

Total Page:16

File Type:pdf, Size:1020Kb

Standard Solution Package Is a Set of Data Objects—Collectively Called Content—Preloaded Into the VSA SSttaannddaarrdd SSoolluuttiioonn PPaacckkaaggee User Guide Version R95 English November 6, 2020 Copyright Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya’s “Click-Accept” EULATOS as updated from time to time by Kaseya at http://www.kaseya.com/legal.aspx. If Customer does not agree with the Agreement, please do not install, use or purchase any Software and Services from Kaseya as continued use of the Software or Services indicates Customer’s acceptance of the Agreement.” ©2019 Kaseya. All rights reserved. | www.kaseya.com Contents Introduction .................................................................................................................................................. 3 Systems Management Configuration ........................................................................................................ 7 Setup Wizard Enabled Content ................................................................................................................ 19 Complete Content Catalog ....................................................................................................................... 59 Index ......................................................................................................................................................... 133 i Introduction C h a p t e r 1 1 Introduction Contents Introduction .................................................................................................................................................. 3 Overview ............................................................................................................................................... 3 Supported OS Platforms and Software ............................................................................................. 3 Package Summary ............................................................................................................................... 4 Systems Management Configuration ........................................................................................................ 7 The Setup Wizard ................................................................................................................................. 7 Setup Wizard Page 1 - System Monitoring and Alerts ............................................................. 8 Setup Wizard Page 2 - Workstation Maintenance .................................................................... 9 Setup Wizard Page 3 - Patch Management ............................................................................. 10 Setup Wizard Page 4 - Configuration Completed ................................................................... 11 Confirmation on the System Management Tab ...................................................................... 11 How Does It Work? ............................................................................................................................ 13 Prerequisites .............................................................................................................................. 13 System Policies in Policy Management ................................................................................... 13 Customizing an Organization’s Policies ................................................................................. 14 Policy Details .............................................................................................................................. 15 Built-in Settings vs Data-Specific Settings ............................................................................. 16 Linking Policies to Data Objects .............................................................................................. 17 Setup Wizard Enabled Content ................................................................................................................ 19 Default Configuration ........................................................................................................................ 19 Audit / Inventory ................................................................................................................................ 20 Patch / Update Management ............................................................................................................. 22 Routine Maintenance ......................................................................................................................... 26 Monitoring .......................................................................................................................................... 29 Monitoring Features Overview ................................................................................................. 29 Monitoring Policies .................................................................................................................... 33 Server .................................................................................................................................. 33 Hardware ............................................................................................................................. 33 Roles ................................................................................................................................... 33 Workstation ........................................................................................................................ 34 Security.Antivirus .............................................................................................................. 34 Utility ................................................................................................................................... 34 Monitor Sets ............................................................................................................................... 35 Backup ................................................................................................................................ 35 Database ............................................................................................................................. 35 Email .................................................................................................................................... 36 File / Print ............................................................................................................................ 37 Network Infrastructure ...................................................................................................... 37 OS Platforms.Windows (Core).Disk Space ..................................................................... 38 i Introduction OS Platforms.Windows (Core) .......................................................................................... 39 OS Platforms Windows Servers ....................................................................................... 39 OS Platforms.Windows Workstations.............................................................................. 40 Remote Access .................................................................................................................. 40 Security ............................................................................................................................... 41 Web Systems ...................................................................................................................... 41 Event Sets .......................................................................................................................................... 43 Security ....................................................................................................................................... 43 Backup ........................................................................................................................................ 43 Database ..................................................................................................................................... 44 Email ........................................................................................................................................... 47 Hardware ..................................................................................................................................... 49 Network Infrastructure .............................................................................................................. 54 Remote Access .......................................................................................................................... 55 Web Systems .............................................................................................................................. 55 OS Platforms .............................................................................................................................. 56 Complete Content Catalog ....................................................................................................................... 59 Views ................................................................................................................................................... 59 Policies ............................................................................................................................................... 64 Patch Policy Details ........................................................................................................................... 76 Agent Procedures
Recommended publications
  • Powershell Scripting Language Course Proposal for Tallinn University of Technology
    TALLINN UNIVERSITY OF TECHNOLOGY School of Information Technologies Riivo Kiljak 178071IABM POWERSHELL SCRIPTING LANGUAGE COURSE PROPOSAL FOR TALLINN UNIVERSITY OF TECHNOLOGY Master’s thesis Supervisor: Siim Vene MSc Tallinn 2019 TALLINNA TEHNIKAULIKOOL¨ Infotehnoloogia teaduskond Riivo Kiljak 178071IABM POWERSHELLI SKRIPTIMISKEELE KURSUSE ETTEPANEK TALLINNA TEHNIKAULIKOOLILE¨ Magistrito¨o¨ Juhendaja: Siim Vene MSc Tallinn 2019 Author’s Declaration of Originality I hereby certify that I am the sole author of this thesis. All the used materials, references to the literature and the work of others have been referred to. This thesis has not been presented for examination anywhere else. Author: Riivo Kiljak 07.05.2019 3 Abstract In the thesis, a recommendation is made to establish a new course at TalTech. The course is intended to teach the PowerShell scripting language to students, most importantly in the IT Systems Administration programme. Course material is proposed in the form of lecture slides, home assignments and knowledge tests. All three of which are available in the appendices of the paper. Design science is used to pass iterations of improving the content prior the the paper publishing. Academic literature is analysed to determine the included and excluded topics and the teaching methodology. More- over, input is acquired from scrutinising public information on Microsoft’s official PowerShell courses and interviewing subject matter experts who use PowerShell at local companies. The course material is provided written in LATEX which means that it can be conveniently modified, version controlled and distributed in the PDF format. Although the proposed course is seen as an online course hosted on Moodle, argumentation is made suggesting a combination with classroom seminars is likely to result in better learning outcomes at the cost of scalability.
    [Show full text]
  • CONESTOGA CABINET ASSEMBLY INFORMATION What Is Included with Your Cabinets: What Is Not Included with Your Cabinets
    CONESTOGA CABINET ASSEMBLY INFORMATION We suggest you view the 4 minute assembly demonstration video on our web site to see how easily our high end custom cabinets are assembled. Before continuing, it is important to realize that Conestoga’s RTA cabinet is targeted at cabinet shops who would rather use this system than build their own custom cabinets from scratch. On one hand, this indicates that it’s a VERY high quality cabinet. On the other hand, it means Conestoga has made some assumptions that its user has certain level of cabinet making skills and knowledge which most homeowners may not possess. As a result, we feel the assembly instructions Conestoga details in their guide are incomplete. Therefore, we have compiled the following assembly information from our years of assembly experience with this product. Remember, as opposed to other Conestoga Re-sellers or sales agents, we actually use the product every day. So, if you have a question that is not answered here, just give us a call and we can talk you through it, send you images from our shop floor, diagrams or even helpful hardware items to assist you. If it gets frustrating, take some time away and give us a call or shoot us an email. Rest assured, we’ll get you through it! What is Included with Your Cabinets: Everything necessary to build the cabinet box. Drawer glides and necessary hardware/screws. Hinges and necessary hardware/screws. Doors, drawer fronts and drawer boxes. What is not included with Your Cabinets: Screws required to mount drawer fronts to the drawer boxes (we use self tapping wood screws 1-1/4” long, available at local home centers or hardware stores.
    [Show full text]
  • Rootkit- Rootkits.For.Dummies 2007.Pdf
    01_917106 ffirs.qxp 12/21/06 12:04 AM Page i Rootkits FOR DUMmIES‰ 01_917106 ffirs.qxp 12/21/06 12:04 AM Page ii 01_917106 ffirs.qxp 12/21/06 12:04 AM Page iii Rootkits FOR DUMmIES‰ by Larry Stevenson and Nancy Altholz 01_917106 ffirs.qxp 12/21/06 12:04 AM Page iv Rootkits For Dummies® Published by Wiley Publishing, Inc. 111 River Street Hoboken, NJ 07030-5774 www.wiley.com Copyright © 2007 by Wiley Publishing, Inc., Indianapolis, Indiana Published by Wiley Publishing, Inc., Indianapolis, Indiana Published simultaneously in Canada No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning or otherwise, except as permit- ted under Sections 107 or 108 of the 1976 United States Copyright Act, without either the prior written permission of the Publisher, or authorization through payment of the appropriate per-copy fee to the Copyright Clearance Center, 222 Rosewood Drive, Danvers, MA 01923, (978) 750-8400, fax (978) 646-8600. Requests to the Publisher for permission should be addressed to the Legal Department, Wiley Publishing, Inc., 10475 Crosspoint Blvd., Indianapolis, IN 46256, (317) 572-3447, fax (317) 572-4355, or online at http://www.wiley.com/go/permissions. Trademarks: Wiley, the Wiley Publishing logo, For Dummies, the Dummies Man logo, A Reference for the Rest of Us!, The Dummies Way, Dummies Daily, The Fun and Easy Way, Dummies.com, and related trade dress are trademarks or registered trademarks of John Wiley & Sons, Inc. and/or its affiliates in the United States and other countries, and may not be used without written permission.
    [Show full text]
  • Solve Errors Caused by Corrupt System Files
    System File Corruption Errors Solved S 12/1 Repair Errors Caused by Missing or Corrupt System Files With the information in this article you can: • Find out whether corrupt system files could be causing all your PC problems • Manually replace missing system files using your Windows installation CD • Use System File Checker to repair broken Windows system files • Boost the memory available to Windows File Protection for complete system file protection Missing or corrupt system files can cause many problems when using your PC, from cryptic error messages to mysterious system crashes. If one of the key files needed by Windows has gone missing or become corrupt, you may think that the only way to rectify the situation is to re-install Windows. Fortunately, nothing that drastic is required, as Microsoft have included several tools with Windows that allow you to replace corrupt or missing files with new, fresh copies directly from your Windows installation CD. Now, whenever you find that an important .DLL file has been deleted or copied over, you won’t have to go to the trouble of completely re-installing your system – simply replace the offending file with a new copy. Stefan Johnson: “One missing file can lead to your system becoming unstable and frequently crashing. You may think that the only way to fix the problem is to re-install Windows, but you can easily replace the offending file with a fresh copy from your Windows installation CD.” • Solve errors caused by corrupt system files ................... S 12/2 • How to repair your missing system file errors ..............
    [Show full text]
  • Information Technology Security Policy
    BRAIN UK UK Brain Archive Information Network INFORMATION TECHNOLOGY SECURITY POLICY SOP Reference BUK SOP 3 Version number 1.31 Date created 15 April 2015 Date of last review 15 April 2015 Date of next review 15 April 2017 Author: Name Dr Clare Mitchell Signature Authorised by: Name Prof. James A R Nicoll Signature Ref: 14/SC/0098 UK Brain Archive Information Network (BRAIN UK) SOP 3 v1.31 Date: 15 April 2015 - 1 - THIS PAGE IS BLANK Table of Contents Ref: 14/SC/0098 UK Brain Archive Information Network (BRAIN UK) SOP 3 v1.31 Date: 15 April 2015 - 2 - 1. Purpose 5 2. Policy Declaration 2.1 Data Storage 5 2.2 Backup and Recovery Plan 6 2.3 System access and Passwords 6 2.4 Encryption 6 2.5 Data Transfer 7 2.6 Physical Security 7 2.7 Data Quality and Accuracy 2.7.1 Data Entry 7 2.7.2 Data Modification and Deletion 7 2.8 System Specification 8 3. References 8 4. Supporting Documentation 8 Ref: 14/SC/0098 UK Brain Archive Information Network (BRAIN UK) SOP 3 v1.31 Date: 15 April 2015 - 3 - THIS PAGE IS BLANK Ref: 14/SC/0098 UK Brain Archive Information Network (BRAIN UK) SOP 3 v1.31 Date: 15 April 2015 - 4 - 1. Purpose BRAIN UK processes and maintains a large amount of valuable data. This policy aims to protect such data against loss, unauthorised access and modification, inadvertent destruction and to ensure that the integrity and quality of stored data is maintained. The data processed by BRAIN UK falls into one of two distinct categories: 1.
    [Show full text]
  • Installation Tips
    Installation Tips Important Please Read Before Going Further! Installation of Kitchen Cabinets is NOT a Do-It-Yourself project for those without extensive experience in finish carpentry. If you are not a professional carpenter please seek help from a trained professional. This guide is meant to be used as a supplement to carpenters who are trained and familiar with cabinetry installa- tion techniques, it is not meant to be a stand alone installation guide. Version 1.0 - 2009 CABINET INSTALLATION TABLE OF CONTENTS Cabinet installation requires special skills and tools. If you are COMMON INSTALLATION TOOLS uncertain of any part of these basic instructions, terms or lack the minimum listed tools, consult with your cabinet supplier For professional results have the tools you need at hand and for recommended professional cabinet installation mechanics. ready. Here’s a tip: save changeover time by having two An error during installation can result in costly repairs and cordless screwguns – one with a drill bit for predrilling screw delays. holes and another with a screw tip. TERMS TO KNOW • Power Drill • Sand Paper • Drill Bits • Block Plane • Terms and Tools Level: A horizontal plane at right angles to the plumb. • Carpenter’s Levels (2’ & 4’) • Clamps • Carpenter’s Square • Caulking Plumb: A true vertical line. If something is “out of plumb” it •Tape Measure (1”x25’) • Chalk Line is not exactly straight up and down. • Step ladder • Mitre Box • Common Construction Details • Nail Set • Marking Tools Square: All lines parallel and at 90° to each other. • Extension Cord(s) • Stud Finder Rail: A horizontal framing member of a cabinet door.
    [Show full text]
  • Software to Extract Cab Files
    Software to extract cab files click here to download You can use WinZip to extract CAB files by following the steps listed below. file extension associated with WinZip program, just double-click on the file. PeaZip offers read-only support (open and extract cab files) for Microsoft Cabinet file format, providing a free alternative utility to open (list content) and www.doorway.ru packages, or disassemble single files from the container, under Windows and Linux operating systems. Moreover, the OS can create, extract, or rebuild cab files. This means you do not require any additional third-party software for this task. All CAB. For a number of years, Microsoft has www.doorway.ru files to compress software that was distributed on disks. Originally, these files were used to minimize the number . The InstallShield installer program makes files with the CAB However, you can also open or extract CAB files with a file decompression tool. Open, browse, extract, or view Microsoft CAB files with Altap Salamander File Manager. High quality software with emphasis on error states. Affordable cost: . Microsoft uses cab files to package software programs. You can view the contents of a cab file by unzipping it and extracting its contents to a. Hi, I need some help www.doorway.ru files. I have to extract a patch for one game, so i used universal extractor for to extract www.doorway.ru Now I have to. cab Extension - List of programs that can www.doorway.ru files. www.doorway.ru, Inventoria Stock Manager, NCH Software, Extract with Express Zip, Low.
    [Show full text]
  • Windows 95 & NT
    Windows 95 & NT Configuration Help By Marc Goetschalckx Version 1.48, September 19, 1999 Copyright 1995-1999 Marc Goetschalckx. All rights reserved Version 1.48, September 19, 1999 Marc Goetschalckx 4031 Bradbury Drive Marietta, GA 30062-6165 tel. (770) 565-3370 fax. (770) 578-6148 Contents Chapter 1. System Files 1 MSDOS.SYS..............................................................................................................................1 WIN.COM..................................................................................................................................2 Chapter 2. Windows Installation 5 Setup (Windows 95 only)...........................................................................................................5 Internet Services Manager (Windows NT Only)........................................................................6 Dial-Up Networking and Scripting Tool....................................................................................6 Direct Cable Connection ..........................................................................................................16 Fax............................................................................................................................................17 Using Device Drivers of Previous Versions.............................................................................18 Identifying Windows Versions.................................................................................................18 User Manager (NT Only) .........................................................................................................19
    [Show full text]
  • Copyrighted Material
    Index Numerics Address Resolution Protocol (ARP), 1052–1053 admin password, SOHO network, 16-bit Windows applications, 771–776, 985, 1011–1012 900, 902 Administrative Tools window, 1081–1083, 32-bit (x86) architecture, 124, 562, 769 1175–1176 64-bit (x64) architecture, 124, 562, 770–771 administrative tools, Windows, 610 administrator account, 1169–1170 A Administrators group, 1171 ADSL (Asynchronous Digital Subscriber Absolute Software LoJack feature, 206 Line), 1120 AC (alternating current), 40 Advanced Attributes window, NTFS AC adapters, 311–312, 461, 468–469 partitions, 692 Accelerated Graphics Port (AGP), 58 Advanced Computing Environment (ACE) accelerated video cards (graphics initiative, 724 accelerator cards), 388 Advanced Confi guration and Power access points, wireless, 996, 1121 Interface (ACPI) standard, 465 access time, hard drive, 226 Advanced Graphics Port (AGP) card, access tokens, 1146–1147 391–392 Account Operators group, 1172 Advanced Graphics Port (AGP) port, 105 ACE (Advanced Computing Environment) Advanced Host Controller Interface (AHCI), initiative, 724 212–213 ACPI (Advanced Confi guration and Power Advanced Micro Devices (AMD), 141–144 Interface) standard, 465 Advanced Packaging Tool (APT), 572 Action Center, 1191–1192 Advanced Power Management (APM) Active Directory Database, 1145–1146, 1183 standard, 465 active heat sink, 150 Advanced Programmable Interrupt active matrix display, LCD (thin-fi lm Controller (APIC), 374 transistor (TFT) display), 470 Advanced RISC Computing Specifi cation active partition, 267,
    [Show full text]
  • Guideline Formats and Architectures
    23.09.2021 17:00:47 Guideline Formats and Architectures Format selection Based on sources provided for package creation following procedures are available: • Transformation of existing vendor MSI. • Creation of MSI by repackaging legacy installer or from the scratch. • Usage of legacy setup. • Package Virtualization (App-V/ThinApp/MSIX) General packaging best practices are given below. An original vendor MSI may not be changed. Adjustments must always be made by MST. The original MSI Databases should Vendor MSI not be modified. In exceptional cases if transform creation is not possible or fixing of vendor MSI is not possible in acceptable timeframe, the setup capture may be performed. Vendor If vendor specific customization tool (e.g. Adobe InstallTuner, Microsoft Office Customization Tool) is available for original customization tool package, it should be used. More than one If original application contains more than one vendor MSI from different vendors, the packaging task should be divided for vendor MSI from separate tasks for each vendor MSI. different vendors Advantages and Disadvantages Application Virtualization Virtualizing applications (e.g. in App-V/MSIX) can offer customers advantages, but also disadvantages: Advantages Applications are installed and uninstalled correctly There are no conflicts between applications Multiple versions of the same application can be installed in parallel Advantages when rolling out applications Applications can be assigned per user (e.g. for VDI or Citrix) Disadvantages Virtualized versions of
    [Show full text]
  • Windows Internals, Sixth Edition, Part 2
    spine = 1.2” Part 2 About the Authors Mark Russinovich is a Technical Fellow in ® the Windows Azure™ group at Microsoft. Windows Internals He is coauthor of Windows Sysinternals SIXTH EDITION Administrator’s Reference, co-creator of the Sysinternals tools available from Microsoft Windows ® The definitive guide—fully updated for Windows 7 TechNet, and coauthor of the Windows Internals and Windows Server 2008 R2 book series. Delve inside Windows architecture and internals—and see how core David A. Solomon is coauthor of the Windows Internals book series and has taught components work behind the scenes. Led by a team of internationally his Windows internals class to thousands of renowned internals experts, this classic guide has been fully updated Windows developers and IT professionals worldwide, SIXTH for Windows 7 and Windows Server® 2008 R2—and now presents its including Microsoft staff. He is a regular speaker 6EDITION coverage in two volumes. at Microsoft conferences, including TechNet As always, you get critical, insider perspectives on how Windows and PDC. operates. And through hands-on experiments, you’ll experience its Alex Ionescu is a chief software architect and internal behavior firsthand—knowledge you can apply to improve consultant expert in low-level system software, application design, debugging, system performance, and support. kernel development, security training, and Internals reverse engineering. He teaches Windows internals courses with David Solomon, and is ® In Part 2, you will: active in the security research community.
    [Show full text]
  • [ EVEREST Ultimate Edition ]
    [ EVEREST Ultimate Edition ] ---------------------------------------- Versi EVEREST v4.50.1330/id Modul Pengukuran 2.3.224.0 Home page http://www.lavalys.com/ Tipe Laporan Bimbingan laporan Komputer TANSISCOTBK09K Generator Nain Sistem Operasi Microsoft Windows XP Profe ssional 5.1.2600 (WinXP Retail) Tanggal 20110510 Jam 06:23 [ Ringkasan ] ---------------------------------------- Komputer: Tipe Komputer ACPI Multiprocessor PC Sistem Operasi Microsoft Windows XP Pro fessional Paket Layanan OS Service Pack 3 Internet Explorer 6.0.2900.5512 DirectX 4.09.00.0904 (DirectX 9. 0c) Nama Komputer TANSISCOTBK09K Nama Pengguna Nain Domain Masuk TANSISCOTBK09K Tanggal / Jam 20110510 / 06:23 Motherboard: Tipe CPU Intel Pentium 4, 3000 MH z (15 x 200) Nama Motherboard Dell OptiPlex GX270 Chipset Motherboard Intel SpringdaleG i865G Memori Sistem 512 MB (DDR SDRAM) DIMM2: Infineon HYS64D32000GU7 256 MB PC2100 DDR SDRAM (2.5337 @ 142 MHz) (2.0336 @ 133 MHz) DIMM3: Hynix HYMD216 646D6JD43 128 MB PC3200 DDR SDRAM (3.0338 @ 200 MHz) (2.5337 @ 166 MHz) (2.0226 @ 133 MHz) DIMM4: Hynix HYMD216 646D6JD43 128 MB PC3200 DDR SDRAM (3.0338 @ 200 MHz) (2.5337 @ 166 MHz) (2.0226 @ 133 MHz) Tipe BIOS Phoenix (05/17/04) Port Komunikasi Communications Port (COM 1) Port Komunikasi ECP Printer Port (LPT1) Layar: Adapter Video RADEON 9600 Series Secon dary (256 MB) Adapter Video RADEON 9600 Series (256 MB) Akselerator 3D ATI Radeon 9600 (RV350) Monitor NEC V520 [15" CRT] (2Y 00657TB) Multimedia: Adapter Suara Analog Devices AD1981B(L ) @ Intel 82801EB ICH5 AC'97 Audio Controller [A2/A3] Adapter Suara BrookTree Bt878 Video Ca pture Device Audio Section Penyimpanan: Kontroler IDE Intel(R) 82801EB Ultra A TA Storage Controllers Kontroler IDE Intel(R) 82801EB Ultra A TA Storage Controllers Kontroler Penyimpanan A2222176 IDE Controller Drive Disk JetFlash Transcend 8GB U SB Device (7 GB, USB) Drive Disk Kingston DataTraveler 2.
    [Show full text]