Premium Essay

Project Server Virtual Machine Setup Guide

In:

Submitted By jdoes92
Words 2121
Pages 9
Setting up the Host Machine for the SharePoint, Office and Project 2010 Virtual Machines
V4.0

"The example companies, organizations, products, domain names, e-mail addresses, logos, people, places, and events depicted herein are fictitious. No association with any real company, organization, product, domain name, email address, logo, person, places, or events is intended or should be inferred."
System Requirements Requirement | Item | Operating System | Microsoft Windows® Server 2008 R2 with the Hyper-V role enabled | Drive Formatting | NTFS | Processor | Intel VT or AMD-V capable | RAM | 4 GB or more (8 GB or more recommended) | Hard disk space required for install | 50 GB |
Virtual Machine Software and Pre-Configuration
Virtual machine “a” contains the following pre-configured software: 1. Windows Server 2008 R2 Standard Evaluation Edition x64, running as an Active Directory Domain Controller for the “CONTOSO.COM” domain with DNS and WINS 2. Microsoft SQL Server 2008 R2 Enterprise Edition with Analysis, Notification, and Reporting Services 3. Microsoft Office Communication Server 2007 R2 4. Visual Studio 2010 5. Microsoft SharePoint Server 2010 Enterprise Edition 6. Microsoft Office Web Applications 7. FAST Search for SharePoint 2010 8. Microsoft Project Server 2010 9. Microsoft Office Professional Plus 2010 10. Microsoft Visio 2010 11. Microsoft Project 2010 12. Microsoft Office Communicator 2007 R2
Virtual machine “b” contains the following pre-configured software: 1. Windows Server 2008 R2 Standard Evaluation Edition x64, joined to the “CONTOSO.COM” domain 2. Microsoft Exchange Server 2010
Active directory has been preconfigured over 200 “demo” users with metadata in an organizational structure. All of these user profiles have been imported and indexed for search within SharePoint

Similar Documents

Premium Essay

Obia Installation

...Oracle® Business Intelligence Applications Installation Guide for Informatica PowerCenter Users Release 7.9.6.4 E35271-01 November 2012 Provides the steps to install and set up Oracle Business Intelligence Applications Release 7.9.6.4. Oracle Business Intelligence Applications Installation Guide for Informatica PowerCenter Users, Release 7.9.6.4 E35271-01 Copyright © 2009, 2012, Oracle and/or its affiliates. All rights reserved. Primary Author: P Brownbridge This software and related documentation are provided under a license agreement containing restrictions on use and disclosure and are protected by intellectual property laws. Except as expressly permitted in your license agreement or allowed by law, you may not use, copy, reproduce, translate, broadcast, modify, license, transmit, distribute, exhibit, perform, publish, or display any part, in any form, or by any means. Reverse engineering, disassembly, or decompilation of this software, unless required by law for interoperability, is prohibited. The information contained herein is subject to change without notice and is not warranted to be error-free. If you find any errors, please report them to us in writing. If this is software or related documentation that is delivered to the U.S. Government or anyone licensing it on behalf of the U.S. Government, the following notice is applicable: U.S. GOVERNMENT END USERS: Oracle programs, including any operating system, integrated software, any programs installed...

Words: 60905 - Pages: 244

Free Essay

Step-by-Step Install Guide Liferay Portal Enterprise on Linux V1.0

...Global Open Versity Labs Step-by-Step Install Guide Enterprise Liferay Portal v1.0 Global Open Versity IT Systems Integration Hands-on Labs Training Manual Step by Step Install Guide Liferay Portal Enterprise on Linux Kefa Rabah Global Open Versity, Vancouver Canada krabah@globalopenversity.org www.globalopenversity.org Table of Contents Page No. STEP-BY-STEP INSTALL GUIDE LIFERAY PORTAL ENTERPRISE ON LINUX Part 1: Install JDK6 Part 2: Quick Liferay Portal Installation with Default HSQL Database Part 3: Install MySQL Database for Liferay Enterprise Step 1: Install and configure MySQL Database Server Part 4: Install Liferay for an Enterprise Step 1: Remove Default Bundled Sample Data Step 2: Create Portal.Ext.Properties File Part 5: Need More Training 2 3 4 6 6 7 8 8 11 © A GOV Open Knowledge Access Technical Academic Publications License Enhancing education & empowering people worldwide through eLearning in the 21st Century © April 2007, Kefa Rabah, Global Open Versity, Vancouver Canada 1 www.globalopenversity.org ICT202 - Linux Enterprise Infrastructure Engineering Diploma Global Open Versity Labs Step-by-Step Install Guide Enterprise Liferay Portal v1.0 Global Open Versity IT Systems Integration Hands-on Labs Training Manual Step-by-Step Install Guide Liferay Portal Enterprise on Linux By Kefa Rabah, krabah@globalopenversity.org Feb 09, 2010 SerengetiSys Labs Project: your company – an enterprise business concern recently is deploying a new network infrastructure...

Words: 3512 - Pages: 15

Premium Essay

It255

...availability, vulnerability, integrity and confidentiality aspects of information systems. Introduction to Information Systems Security Syllabus Where Does This Course Belong? This course is required for the Bachelor of Science in Information Systems Security program. This program covers the following core areas:    Foundational Courses Technical Courses BSISS Project The following diagram demonstrates how this course fits in the program: IS427 Information Systems Security Capstone Project 400 Level IS404 Access Control, Authentication & KPI IS411 Security Policies & Implementation Issues IS415 System Forensics Investigation & Response IS416 Securing Windows Platforms & Applications IS418 Securing Linux Platforms & Applications IS421 Legal & Security Issues IS423 Securing Windows Platforms & Applications 300 Level IS305 Managing Risk in Information Systems IS308 Security Strategies for Web Applications & Social Networking IS316 Fundamentals of Network Security Firewalls & VPNs IS317 Hacker Techniques Tools & Incident Handling EC311 Introduction to Project Management IT250 Linux operating System CNS Program Prerequisites: ment 300 Level IT320 WAN Technology &...

Words: 4114 - Pages: 17

Premium Essay

Seeking Help

...Operating System Credit hours: 4 Contact hours: 50 (30 Theory Hours, 20 Lab Hours) Introduction to Information Systems Security Syllabus Where Does This Course Belong? This course is required for the Bachelor of Science in Information Systems Security program. This program covers the following core areas:    Foundational Courses Technical Courses BSISS Project The following diagram demonstrates how this course fits in the program: IS427 Information Systems Security 400 Level Capstone Project IS418 IS404 Access Control, Authentication & KPI IS421 Legal & Security Issues IS423 Securing Windows Platforms & Applications IS411 Security Policies & Implementation Issues IS415 System Forensics Investigation & Response IS416 Securing Windows Platforms & Applications Securing Linux Platforms & Applications 300 Level IS305 Managing Risk in Information Systems IS308 Security Strategies for Web Applications & Social Networking IS316 Fundamentals of Network Security Firewalls & VPNs IS317 Hacker Techniques Tools & Incident Handling EC311 Introduction to Project Management IT250 Linux operating System ment CNS Program Prerequisites: ©ITT Educational Services, Inc. Date: 10/25/2010 Introduction to Information...

Words: 4296 - Pages: 18

Free Essay

Capstone

...WeMakeConnections TTI Multi Campus Network Executive Summary: WeMakeConnections is an up-and-coming networking and infrastructure company; we offer network solutions that are customized to each client, and their specific financial and technical needs. We provide a le82vel of service you would expect from a close friend, not a company. We service all network sizes, large and small, and have worked extensively with existing network upgrades, as well as total network creation. WeMakeConnections offers personalized services to match any budget. In this day and age competition is fierce, and money is tight. That is why we only hire people who love networking; they know what works, what doesn't, and where we can cut waste. That is why WeMakeConnections is the only company that offers a complimentary follow up, one month after your network is complete. We want to make sure you love your network. Each of our eight core employee's graduated from the prestigious ITT Tech, San Diego. Each has a passion for networking, and genuine love for problem solving. From the cabling in the walls to workstations on the desks, a trained professional will be on the job. Based on the request for proposal from TTI, we have created what may be, our masterpiece work. The following pages detail our plan of action for TTI's success, and subsequent expansions. We are confident that our network provides the best return on investment for TTI's four additional campuses, and will be easily scaled to...

Words: 18593 - Pages: 75

Free Essay

Android Based Webstatic Server

...A Project Report On ANDROID BASED STATIC WEBSERVER BY CONTENTS TITLE ABSTRACT INTRODUCTION…………………………………………………. 1 Purpose……………………………………………………..………… 1.1 Scope…………………………………………………..…….……….. 1.2 Definitions, Acroynms, Abbrivations……………………. 1.3 Overview……………………..………………………………………. 1.4 SYSTEM ANALYSIS……………………………………… 3 Software Requirements Specification…..………………. 3.1 Hardware Requirements……………………………………….. 3.1.1 Software Requirements………………………………………… 3.1.2 IMPLEMENTATION……………………………………… 4 Modules……………………………………………………………….. 4.1 Accounts…………………………………………………………..4.1.1 Transactions………………………………………………………….. 4.1.2 DESIGN………………..…………………………….……… 5 UML Diagrams………………………………………………………… 5.1 Class Diagram………………………………………………………… 5.1.1 Usecase Diagram….……………………………………………….. 5.1.2 Sequence Diagram….……………………………………………….. 5.1.3 RESULT FOR IMPLEMENTATION…………………… 6 Output Screens………………………………………………………. 6.1 SYSTEM TESTING………………………………………….7 Types of Testing………………………………………………………. 7.1 TESTCASES…………………………………………………..8 CONCLUSION………………………………………………..9 ANDROID BASED STATIC WEBSERVER ABSTRACT Android is software platform and operating system for mobile devices. Being an open-source, it is based on the Linux kernel. It was developed by Google and later the Open Handset Alliance (OHA). It allows writing managed code in the Java language. Due to Android here is the...

Words: 9090 - Pages: 37

Free Essay

Performance Tuning for Windows Server 2008

...Performance Tuning Guidelines for Windows Server 2012 April 12, 2013 Abstract This guide describes important tuning parameters and settings that you can adjust to improve the performance and energy efficiency of the Windows Server 2012 operating system. It describes each setting and its potential effect to help you make an informed decision about its relevance to your system, workload, and performance goals. The guide is for information technology (IT) professionals and system administrators who need to tune the performance of a server that is running Windows Server 2012. For the most current version of this guide, see Performance Tuning Guidelines for Windows Server 2012. ------------------------------------------------- Disclaimer: This document is provided “as-is”. Information and views expressed in this document, including URL and other Internet website references, may change without notice. Some information relates to pre-released product which may be substantially modified before it’s commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here. You bear the risk of using it. ------------------------------------------------- Some examples depicted herein are provided for illustration only and are fictitious. No real association or connection is intended or should be inferred. ------------------------------------------------- This document does not provide you with any legal rights to any intellectual...

Words: 50142 - Pages: 201

Free Essay

Microsoft Exchange 2010

...Microsoft Exchange 2010 on VMware Best Practices Guide Microsoft Exchange 2010 on VMware Best Practices Guide © 2011 VMware, Inc. All rights reserved. This product is protected by U.S. and international copyright and intellectual property laws. This product is covered by one or more patents listed at http://www.vmware.com/download/patents.html. VMware is a registered trademark or trademark of VMware, Inc. in the United States and/or other jurisdictions. All other marks and names mentioned herein may be trademarks of their respective companies. VMware, Inc 3401 Hillview Ave Palo Alto, CA 94304 www.vmware.com © 2011 VMware, Inc. All rights reserved. Page 2 of 70 Microsoft Exchange 2010 on VMware Best Practices Guide Contents 1. Introduction ...................................................................................... 7 1.1 Purpose .......................................................................................................................... 7 1.2 Target Audience ............................................................................................................. 7 1.3 Scope ............................................................................................................................. 8 2. VMware ESX Host Best Practices for Exchange .............................. 9 2.1 CPU Configuration Guidelines ....................................................................................... 9 2.2 Memory...

Words: 19879 - Pages: 80

Premium Essay

Visual Studio

...retrieval system, or transmitted in any form or by any means (electronic, mechanical, photocopying, recording, or otherwise), or for any purpose, without the express written permission of Microsoft Corporation. Microsoft may have patents, patent applications, trademarks, copyrights, or other intellectual property rights covering subject matter in this document. Except as expressly provided in any written license agreement from Microsoft, the furnishing of this document does not give you any license to these patents, trademarks, copyrights, or other intellectual property. © 2012 Microsoft Corporation. All rights reserved. Microsoft, MSDN, BizSpark, Expression, Excel, IntelliTrace, Visio, Dynamics, SQL Server, Visual Studio, the Visual Studio logo, WebsiteSpark, DreamSpark, Windows, Windows Server, and Windows Azure are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries. The names of actual companies and products mentioned herein may be the...

Words: 11728 - Pages: 47

Premium Essay

Cloud Computing

...Introduction To Cloud Computing (IT175-1601A) Colorado Technical University Individual Project 02/08/2016 Table Of Contents Cloud Providers and Cost Savings Analysis………………………………………..……3 Cost Savings of the Cloud…………………………………………………………..…...5 Cloud Providers……………………………………………………………………..…...8 Software as a service Service (SaaS)…………………………………………………....10 Identity as a Service (IDaaS) ………………………………………………………...….13 Service-Oriented Architecture (SOA)………………………………………………...…17 Platform as a Service (PaaS)………………………………………………………….…18 PaaS Provider (Engine Yard)…………………………………………………………...19 Pass Provider (Red Hat Open Shift)……………………………………………………20 PaaS Provider (Caspio)……………………………………….…………………………21 Infrastructure as a Service (IaaS)……………………………………………………….24 IaaS Provider (Google Compute Engine)………………………………………………25 IaaS Provider (Rackspace Open Cloud)………………………………………………..27 IaaS Provider (HP Enterprise Converged Infrastructure)………………………………30 Security threats in cloud-based solutions with risk management strategies……………33 Risk Management in Cloud Computing………………………………………………..35 IT Governance for cloud-based solutions………………………………………………38 Identity Management In The Cloud……………………………………………………39 References………………………………………………………………………….…..45 Cloud Providers and Cost Savings Analysis Cloud computing is a type of computing that relies on sharing computing resources rather than having local servers or personaldevices to handle applications. Cloud computing is comparable togrid computing...

Words: 12017 - Pages: 49

Free Essay

Virtual Classroom

...TABLE OF CONTENTS Sr. Content Page no No 1. INTRODUCTION 6 1.1 Abstract 1.2 Problem Definition 1.3 Scope of Project 2. REVIEW OF LITERATURE 8 3. SOFTWARE REQUIREMENT SPECIFICATION 18 4. EXISTING SYSTEM 22 5. PROPOSED SYSTEM 26 6. TIMELINE CHART OF PROJECT` 32 7. FUTURE SCOPE 33 8. CONCLUSION 34 9. REFERENCES 35 1. INTRODUCTION 1.1 Abstract Virtual Classroom represents an innovative shift in the field of learning, providing rapid access to specific knowledge and information. It represents an interface between the students and a professor and provides personalized learning materials to the users. It offers a possibility to the attendees to share different resources at once and work with them as if they were at the same place where (real) resources are. In the system design, we use agents as entities that work on different tasks in the system. A set of agents of the same type is responsible for handling different users and their requests. The cooperation among agents is established through the act of exchanging messages. A wide variety of classroom techniques are being advocated to increase learning: active learning, collaboration, integration of assessment...

Words: 7999 - Pages: 32

Free Essay

Botnet Analysis and Detection

...Acknowledgements I would like to appreciate God Almighty for his faithfulness and for the strength, without him I am nothing. I would like to thank my supervisor Dr Hatem Ahriz for his guidance throughout the writing of this report. I would like to thank Richboy and Ete Akumagba for their guidance and for proof reading this report. I would like to thank my family for their support and love. ii Abstract This era of explosive usage of networks have seen the rise of several opportunities and possibilities in the IT sector. Unfortunately, cybercrime is also on the rise with several forms of attack including, but not limited to botnet attacks. A Botnet can simply be seen as a network of compromised set of systems that can be controlled by an attacker. These systems are able to take malicious actions as needed by the attacker without the consent of the device owner and can cause havoc. This paper is the first part of a two-part report and discusses on several reportedly known botnets and describes how they work and their mode of infection. Several historic attacks and the reported damage have been given to give a good picture and raise the bar on the capabilities of botnets. Several existing tools have been considered and examined which are useful for detecting and terminating botnets. You would find that each tool has its own detection strategy, which may have an advantage on some end than others. iii Table of Contents Declaration ................

Words: 13171 - Pages: 53

Free Essay

Abcdefg

...License Administration Guide FlexNet Publisher Licensing Toolkit 11.9 Legal Information Book Name: Part Number: Product Release Date: License Administration Guide FNP-1190-LAG01 July 2010 Copyright Notice Copyright © 2010 Flexera Software, Inc. and/or InstallShield Co. Inc. All Rights Reserved. This product contains proprietary and confidential technology, information and creative works owned by Flexera Software, Inc. and/or InstallShield Co. Inc. and their respective licensors, if any. Any use, copying, publication, distribution, display, modification, or transmission of such technology in whole or in part in any form or by any means without the prior express written permission of Flexera Software, Inc. and/or InstallShield Co. Inc. is strictly prohibited. Except where expressly provided by Flexera Software, Inc. and/or InstallShield Co. Inc. in writing, possession of this technology shall not be construed to confer any license or rights under any Flexera Software, Inc. and/or InstallShield Co. Inc. intellectual property rights, whether by estoppel, implication, or otherwise. All copies of the technology and related information, if allowed by Flexera Software, Inc. and/or InstallShield Co. Inc., must display this notice of copyright and ownership in full. Trademarks Flexera Software, AdminStudio, DemoNow, FlexEnabled, Flexlm, FlexNet, FlexCertified, FlexNet Connect, FlexNet Connector, FlexNet Manager, FlexNet Publisher, Globetrotter, InstallAnywhere, InstallAnywhere...

Words: 52399 - Pages: 210

Free Essay

Project Management for the Central Goverment

...of Peer to Peer………………………………………………………………..…...........2 1.1.1 Unstructured P2P…………………………………………………………………………2 1.1.2 Centralized P2P…………………………………………………………………………….3 1.2 Applications………………………………………………………………………..……………….....3 1.3 Advantages…………………..……………………………………………...............................3 1.4 Objective …………………………………………………………………………………………..…....4 1.5 Scope…………………….……………………………………………………………………….………….4 2. FEATURES OF PROJECT…………………………………………………………………………….5 3. HARDWARE & SOFTWARE REQUIREMENTS 3.1 Input Requirements…………………………………….……………………………………..8 3.2 Output Requirements………………………………………………………………………..8 3 3.3 Software Requirements…………………….………………………………………………..8 3.4 Hardware Requirements……………………………………………………………………..8 4. TOOL USED FOR DEVELOPMENT 4.1 NetBeans…………………………………………………………………………….……………….10 4.1.1 Features and Tools…………………..……………………………..………..…….10 4.1.2 Source Code Editor………………………………………………………………….10 4.1.3 GUI Builder………………………………………………………………………………..11 5. TECHNOLOGY TO BE USED 5.1 Introduction to Java…………………………………………………………..……………..13 5.1.1 Java Virtual Machine……………………………………………….…………..13 5.1.2 Principles………………………………………………………………………………..13 5.1.3 Versions……………………………………….………………………………………...14 5.1.4 Features of Java Language…………………………………………………..14 5.2 Multi Threading………………………………………………………………………….........16 5.2.1 Benefits of using threads……………………………………………………..17 5.2.2 Life Cycle of a Thread……………………………………………………………17 5.2.3 Thread Priority in Java………………………………………………………….18 5.3 Socket...

Words: 12882 - Pages: 52

Free Essay

Research Windows

...How Windows Server 2008 Delivers Business Value Published: January 2008 © 2008 Microsoft Corporation. All rights reserved. This document is developed prior to the product’s release to manufacturing, and as such, we cannot guarantee that all details included herein will be exactly as what is found in the shipping product. The information contained in this document represents the current view of Microsoft Corporation on the issues discussed as of the date of publication. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information presented after the date of publication. The information represents the product at the time this document was printed and should be used for planning purposes only. Information subject to change at any time without prior notice. This whitepaper is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS SUMMARY. Microsoft, Active Directory, PowerShell, SharePoint, SoftGrid, Windows, Windows Media, the Windows logo, Windows Vista, and Windows Server are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries. All other trademarks are property of their respective owners. Table of Contents Table of Contents ii Introduction 1 Make Your Infrastructure More Efficient with Virtualization 1 Server Virtualization...

Words: 10609 - Pages: 43