GFI Product ManualGetting Started Guide
http://firstname.lastname@example.orgThe information and content in this document is provided for informational purposes only and is provided "as is" withno warranty of any kind, either express or implied, including but not limited to the implied warranties ofmerchantability, fitness for a particular purpose, and non-infringement. GFI Software is not liable for any damages,including any consequential damages, of any kind that may result from the use of this document. The information isobtained from publicly available sources. Though reasonable effort has been made to ensure the accuracy of the dataprovided, GFI makes no claim, promise or guarantee about the completeness, accuracy, recency or adequacy ofinformation and is not responsible for misprints, out-of-date information, or errors. GFI makes no warranty, express orimplied, and assumes no legal liability or responsibility for the accuracy or completeness of any information containedin this document.If you believe there are any factual errors in this document, please contact us and we will review your concerns assoon as practical.All product and company names herein may be trademarks of their respective owners.GFI EndPointSecurity is copyright of GFI SOFTWARE Ltd. - 1999-2011 GFI Software Ltd. All rights reserved.Document Version: ESEC-GSG-EN-03.00.00Last updated: October 31, 2011
ction . 29Entering your license key after installation . 29Checking for newer GFI EndPointSecurity versions . on . 25Verifying operations of the shipping default protection policy . 25Miscellaneous22.214.171.1245Introduction . 15Using the Quick Start wizard . 15Navigating the GFI EndPointSecurity management console . 24Testing GFI EndPointSecurity5.15.211Introduction . 11System requirements . 11Upgrading from earlier versions . 12Installing GFI EndPointSecurity . 13Getting Started126.96.36.199Introduction . 3Key features . 3Components of GFI EndPointSecurity . 4How GFI EndPointSecurity works - Deployment and monitoring. 5How GFI EndPointSecurity works - Device access. 6How GFI EndPointSecurity works - Temporary access. 7Supported device categories. 8Supported connectivity ports . 9Installing GFI EndPointSecurity188.8.131.52.44About portable media device threats . 1GFI EndPointSecurity – the solution. 1Using this manual. 2Terms used in this manual . 2GFI EndPointSecurity licensing . 2About GFI ction . 31Common Issues. 31Knowledge Base . 31Web Forum . 31Request technical support . 31Build notifications . 31Documentation . 318Glossary329Appendix 1 - Deployment error messages35
9.19.2IndexIntroduction . 35Deployment error messages . 3537
List of screenshotsScreenshot 1 - GFI EndPointSecurity installation: domain administrator account setupScreenshot 2 - GFI EndPointSecurity installation: license key detailsScreenshot 3 - GFI EndPointSecurity Quick Start wizard: Start stepScreenshot 4 - GFI EndPointSecurity Quick Start wizard: Auto Discovery stepScreenshot 5 - Auto Discovery optionsScreenshot 6 - Discovery Area optionsScreenshot 7 - Actions optionsScreenshot 8 - GFI EndPointSecurity Quick Start wizard: Power Users stepScreenshot 9 - Power users optionsScreenshot 10 - GFI EndPointSecurity Quick Start wizard: Users Groups stepScreenshot 11 - Users Groups optionsScreenshot 12 - GFI EndPointSecurity Quick Start wizard: Database stepScreenshot 13 - Database setup optionsScreenshot 14 - GFI EndPointSecurity Quick Start wizard: Finish stepScreenshot 15 - GFI EndPointSecurity: management consoleScreenshot 16 – Selecting control entitiesScreenshot 17 - Selecting device categories to assign permissionsScreenshot 18 - Adding users or groupsScreenshot 19 - Selecting permission types per user or groupScreenshot 20 - Editing license key1314151616171819192021222223242627272829
1Introduction1.1About portable media device threatsThe key advantage of removable media devices (or portable devices) is easy access. In theory,this may be of great advantage for organizations, but still, it is a well-reported fact that accessand security are at opposite ends of the security continuum.Developments in removable media technology are escalating. Newer versions of portabledevices, such as flash memory, have increased in:»Better storage capacity»Improved performance»Easier and faster to install»Physically small enough to carry in a pocket.As a result, internal users may deliberately or accidentally:»Take away sensitive data»Expose confidential information»Introduce malicious code (e.g. viruses, Trojans) that can bring the entire corporatenetwork down»Transfer inappropriate or offensive material on to corporate hardware»Make personal copies of company data and intellectual property»Get distracted during work hours.In an attempt to control these threats, organizations have started to prohibit the use of(personally-owned) portable devices at work. Best practice dictates that you must never rely onvoluntary compliance and the best way to ensure complete control over portable devices is byputting technological barriers.1.2GFI EndPointSecurity - the solutionGFI EndPointSecurity is the security solution that helps you maintain data integrity by preventingunauthorized access and transfer of content to and from the following devices or connectionports:»USB Ports (e.g. Flash and Memory card readers, pen drives)»Firewire ports (e.g. digital cameras, Firewire card readers)»Wireless data connections (e.g. Bluetooth and Infrared dongles)»Floppy disk drives (internal and external)»Optical drives (e.g. CD, DVD)»Magneto Optical drives (internal and external)»Removable USB hard-disk drives»Other drives such as Zip drives and tape drives (internal and external).Through its technology, GFI EndPointSecurity enables you to allow or deny access and to assign„full‟ or „read only‟ privileges to:»Devices (e.g. CD/DVD drives, PDAs).»Local or Active Directory users/user groups.With GFI EndPointSecurity you can also record the activity of all devices or connection portsbeing used on your target computers (including the date/time of usage and by whom the deviceswere used).Getting Started GuideIntroduction 1
1.3Using this manualThis user manual is a comprehensive guide aimed at assisting you in installing, and testing GFIEndPointSecurity. It describes how to use and configure GFI EndPointSecurity to achieve the bestpossible corporate security.This manual contains the following chapters:Chapter 1IntroductionIntroduces this manual.Chapter 2About GFI EndPointSecurityProvides basic information on GFI EndPointSecurity and how it works.Chapter 3Installing GFI EndPointSecurityProvides information on system requirements and how to install the GFI EndPointSecurity.Chapter 4Getting StartedProvides information on how to configure the installation of GFI EndPointSecurity usingthe Quick Start wizard.Chapter 5Testing GFI EndPointSecurityProvides information on how to test your GFI EndPointSecurity installation.Chapter 6MiscellaneousProvides information on licensing and versioning.Chapter 7TroubleshootingProvides all the necessary information on how to deal with any problems encounteredwhile using GFI EndPointSecurity. Also provides extensive support information.Chapter 8GlossaryDefines technical terms used within GFI EndPointSecurity.Chapter 9Appendix 1 - Deployment error messagesProvides a list of errors displayed during deployment of agents from the managementconsole.Administration and Configuration ManualDetailed administration and configuration guidelines are provided in the GFI EndPointSecurity Administration and Configuration Manual, which is installed with the product or separatelydownloadable from the GFI website:http://www.gfi.com/esec/esecmanual.pdfThe Administration and Configuration Manual complements this Getting Started Guide andprovides more information on how to use and customize the features provided by GFIEndPointSecurity.1.4Terms used in this manualThe following terms are used in this manual:Provides additional information and references essential for the operation of GFIEndPointSecurity.For any technical terms and their definitions as used in this manual, refer to the Glossarychapter in this manual.1.5GFI EndPointSecurity licensingFor more information on licensing and evaluation, refer to the GFI website y/pricing/licensing2 IntroductionGetting Started Guide
2About GFI EndPointSecurity2.1IntroductionThis chapter provides you with the following information:»The key features and components of GFI EndPointSecurity»How GFI EndPointSecurity works»The device categories and connectivity ports supported by GFI EndPointSecurity2.2Key featuresGFI EndPointSecurity offers the following main features:Group-based protection controlIn GFI EndPointSecurity you can configure and place computers into groups that are governed byone protection policy. This allows you to configure a single protection policy and apply it to allthe computers that are members of that group.Granular access controlGFI EndPointSecurity enables you to allow or deny access to a specific device as well as to assign(where applicable) „full‟ or „read only‟ privileges over every supported device (e.g. CD/DVDdrives, PDAs) on a user by user basis.Scheduled deploymentGFI EndPointSecurity allows you to schedule the deployment of protection policies and anyrelated configuration changes without the need to keep to the GFI EndPointSecuritymanagement console open. The deployment feature also handles failed deployments throughautomatic rescheduling.Access controlApart from blocking a range of device categories, GFI EndPointSecurity also allows blocking:»By file type - for example, allow the user to read *.doc files but block access to all *.exefiles.»By physical port - all devices connected to particular physical ports, for example, alldevices connected to USB ports.»By device ID – block access to a single device based on the unique Hardware ID of thedevice.In Microsoft Windows 7, a feature called BitLocker To Go can be used to protect andencrypt data on removable devices. GFI EndPointSecurity performs checks on real filetypes encrypted with Windows 7 BitLocker To Go.Device whitelist and blacklistThe administrator can define a list of specific devices that are permanently allowed and othersthat are permanently banned.Power usersThe administrator can specify users or groups who would always have full access to devices thatare otherwise blocked by GFI EndPointSecurity.Temporary accessThe administrator is able to grant temporary access to a device (or group of devices) on aparticular computer. This feature allows the administrator to generate an unlock code that theend-user can use to obtain a time-limited access to a particular device or port, even when theGFI EndPointSecurity agent is not connected to the network.Getting Started GuideAbout GFI EndPointSecurity 3
Status dashboardThe dashboard‟s user interface shows the statuses of live and deployed agents, database andalerting servers, the GFI EndPointSecurity service as well as statistical data with charts.The main application keeps track of the live agent status by communicating with its deployedagents. Maintenance tasks are performed automatically once an agent goes online.Active Directory deployment through MSIFrom the GFI EndPointSecurity management console it is possible to generate MSI files that canbe later deployed using the Group Policy Object (GPO) feature within the Active Directory orother deployment options. An MSI file will contain all the security settings configured in aparticular protection policy.Agent management passwordAgent management functions (such as update and un-install) are protected by a userconfigurable password. This means that any other GFI EndPointSecurity instances will not haveaccess to the agent management options.Device discoveryThe GFI EndPointSecurity engine can be used to scan and detect the presence of devices on thenetwork, even on computers that are not assigned any protection policy. The informationgathered about detected devices can then be used to build security policies and assign accessrights for specific devices.Logs browserAn in-built tool allows the administrator to browse logs of user activity and device usage that isdetected by GFI EndPointSecurity.AlertingGFI EndPointSecurity allows you to configure e-mail alerts, network messages and SMS messagesthat can be sent to specified recipients when devices are connected or disconnected, whendevice access is allowed or blocked and upon service generated events.Custom messagesWhen users are blocked from using devices, they are shown popup messages explaining thereasons why the device was blocked. GFI EndPointSecurity allows the customization of thesemessages.Database maintenanceTo maintain the size of the database backend, GFI EndPointSecurity can be set to backup ordelete events older than a custom number of hours or days.Device encryptionFor maximum security, GFI EndPointSecurity can be configured to encrypt storage devices usingAES 256 encryption. Encryption can be enforced on specific computers running agents over thenetwork.2.3Components of GFI EndPointSecurityWhen you install GFI EndPointSecurity, the following components are set up:»GFI EndPointSecurity management console»GFI EndPointSecurity agent.GFI EndPointSecurity management consoleThrough the GFI EndPointSecurity management console you can:»Create and manage protection policies and specify which device categories andconnectivity ports are to be controlled.4 About GFI EndPointSecurityGetting Started Guide
»Remotely deploy protection policies and agents on to your target computers Granttemporary access to target computers to use specific devices.»View the device protection status of every computer that is being monitored.»Carry out scans on target computers to identify devices currently or previouslyconnected.»Check logs and analyze what devices have been connected to every network computer.»Keeps track of which computers have an agent deployed and which agents need to beupdated.GFI EndPointSecurity agentThe GFI EndPointSecurity agent is a client-side service responsible for the implementation of theprotection policies on the target computer(s). This service is automatically installed on theremote network target computer after the first deployment of the relevant protection policythrough the GFI EndPointSecurity management console. Upon the next deployments of the sameprotection policy, the agent will be updated and not re-installed.2.4How GFI EndPointSecurity works - Deployment and monitoringGFI EndPointSecurity protection policy deployment and monitoring operations can be divided infour logical stages:Getting Started GuideAbout GFI EndPointSecurity 5
Figure 1 - Protection policy deployment and monitoringStage 1 - Configure computers: The administrator specifies which protection policy is assignedto which computers, and the log-on credentials to be used by GFI EndPointSecurity to access thetarget computers and deploy the agents.Stage 2 - Customize protection policy: The administrator can customize a protection policybefore or after deploying it. Customization options include the creation of power users, additionof blacklisted/whitelisted devices and device access permissions.Stage 3 - Deploy protection policy: The administrator deploys the protection policy. Upon thefirst deployment of a protection policy, a GFI EndPointSecurity agent is automatically installedon the remote network target computer. Upon the next deployments of the same protectionpolicy, the agent will be updated and not re-installed.Stage 4 - Monitor device access: When agents have been deployed, the administrator canmonitor all device access attempts via the GFI EndPointSecurity management console, receivealerts and generate reports through the GFI EndPointSecurity ReportPack.2.5How GFI EndPointSecurity works - Device accessGFI EndPointSecurity device access operations can be divided in three logical stages:6 About GFI EndPointSecurityGetting Started Guide
Figure 2 - Device accessStage 1 - Device attached to computer: The user attaches a device to a target computerprotected by GFI EndPointSecurity.Stage 2 - Protection policy enforcement: The GFI EndPointSecurity agent installed on thetarget computer detects the attached device and goes through the protection policy rulesapplicable to the computer/user. This operation determines whether the device is allowed orblocked from being accessed.Stage 3 - Device usage allowed/blocked: The user either receives an error message indicatingthat device usage has been blocked, or else is allowed to access the device.2.6How GFI EndPointSecurity works - Temporary accessGFI EndPointSecurity temporary access operations can be divided in three logical stages:Getting Started GuideAbout GFI EndPointSecurity 7
Figure 3 -Requesting/granting temporary accessStage 1 - User requests temporary device access: The user executes the GFI EndPointSecurityTemporary Access tool from the computer on which the device is to be accessed. The tool isused to generate a request code, which the user communicates with the administrator. The useralso needs to inform the administrator on the device types or connection ports that need to beaccessed, and for how long will devices/ports access be required.Stage 2 - Administrator grants temporary access: The administrator uses the Temporary Accessfeature within the GFI EndPointSecurity management console to enter the request code, specifydevices/ports and time restrictions. An unlock code is generated which the administrator thencommunicates with the user.Stage 3 - User activates temporary device access: Once the user receives the unlock code sentby the administrator, this code is entered in the GFI EndPointSecurity Temporary Access tool toactivate the temporary access and to be able to use the required devices/ports.2.7Supported device categoriesIn GFI EndPointSecurity device categories are organized into the following categories:Floppy disksCD / DVDStorage DevicesUSB Pen drivesDigital Media Players (e.g. MP3/MP4 players)Flash and Memory Card ReadersMulti-drive USB devices (i.e. devices that do not mount as a single drive)Other portable storage devicesPrintersPDAsPocket PCs8 About GFI EndPointSecurityGetting Started Guide
Smart phonesNetwork AdaptersWi-FiRemovable Network Adapters (e.g. USB, Firewire, PCMCIA)ModemsSmart phonesMobile phonesImaging DevicesDigital CamerasWebcamsScannersHuman Interface DevicesKeyboardsMiceGame controllersOther DevicesBluetooth dongles/portsInfrared dongles/portsMO (magneto optical) drives (internal and external)Zip drivesTape drives.2.8Supported connectivity portsGFI EndPointSecurity scans for devices that are or have been connected on the following ports:USBFirewirePCMCIABluetoothSerial & ParallelInfraredSecure Digital (SD)Internal (e.g. optical drives connected internally on PCI).Getting Started GuideAbout GFI EndPointSecurity 9
3Installing GFI EndPointSecurity3.1IntroductionThis chapter provides you with the following information:»The system requirements of GFI EndPointSecurity»How to upgrade from GFI EndPointSecurity 3 or later and from GFI LANguard PortableStorage Control»How to install GFI EndPointSecurity3.2System requirementsThe following are the system requirements to install GFI EndPointSecurity:3.2.1Hardware requirements»Processor: 2GHz processor clock speed or better»RAM: 512 MB (minimum); 1 GB (recommended)»Hard disk: 100 MB of available space (further disk space is required for the databasebackend)3.2.2Software requirementsSupported operating systemsGFI EndPointSecurity can be installed on the following operating systems (x86 or x64):»Microsoft Windows Server 2008 R2 (x64) (Standard or Enterprise edition)»Microsoft Windows Server 2008 (Standard or Enterprise edition)»Microsoft Windows Small Business Server 2008 (Standard edition)»Microsoft Windows Server 2003 (Standard, Enterprise or Web edition)»Microsoft Windows Small Business Server 2003»Microsoft Windows 7 (Professional, Enterprise or Ultimate edition)»Microsoft Windows Vista (Enterprise, Business or Ultimate edition)»Microsoft Windows XP ProfessionalOther components»Microsoft Internet Explorer 5.5 or higher»Microsoft .NET Framework 2.0 or higher»TCP port 1116 (default) - required by the GFI EndPointSecurity agents to notify the GFIEndPointSecurity management console about their statuses and send device accessevents. Without this port open to receive events, the administrator will have to eithermanually monitor the events in the Event Viewer of each target computer or use GFIEventsManager to automatically collect and monitor events from the target computers onthe server. For more information about GFI EventsManager, refer to the GFI website at:http://www.gfi.com/eventsmanager.»Microsoft SQL Server 2000, 2005 or 2008 as the backend databaseEnsure that your firewall settings enable communications between all the targetcomputers where the GFI EndPointSecurity agents are installed and the GFIEndPointSecurity server.Getting Started GuideInstalling GFI EndPointSecurity 11
A database backend is required for storing device access data and for reportingpurposes. GFI EndPointSecurity provides the option to either use an available MicrosoftSQL Server or else to automatically download and install Microsoft SQL Server 2005Express on the same computer where GFI EndPointSecurity management console isinstalled.3.2.3Agent - Hardware requirements»Processor: 1GHz processor clock speed or better»RAM: 256 MB (minimum); 512 MB (recommended)»Hard Disk: 50 MB of available space3.2.4Agent - Software requirementsSupported operating systemsGFI EndPointSecurity agent can be installed on the following operating systems (x86 or x64):»Microsoft Windows Server 2008 R2 (x64) (Standard or Enterprise edition)»Microsoft Windows Server 2008 (Standard or Enterprise edition)»Microsoft Windows Small Business Server 2008 (Standard edition)»Microsoft Windows Server 2003 (Standard, Enterprise or Web edition)»Microsoft Windows Small Business Server 2003»Microsoft Windows 7 (Professional, Enterprise or Ultimate edition)»Microsoft Windows Vista (Enterprise, Business or Ultimate edition)»Microsoft Windows XP Professional3.3Upgrading from earlier versionsIf you have GFI LANguard Portable Storage Control, or an earlier version of GFI EndPointSecurity,it is possible to upgrade to GFI EndPointSecurity .3.3.1Upgrading from GFI EndPointSecurity 3 or laterUpgrading from GFI EndPointSecurity 3 or later to GFI EndPointSecurity 2012 is straightforward.The upgrade process is part of the GFI EndPointSecurity 2012 installation process, and includes:»Uninstalling GFI EndPointSecurity 3 or later»Importing GFI EndPointSecurity 3 configuration settings.Importing configuration settings from GFI EndPointSecurity 3 or laterWhen installing GFI EndPointSecurity, you are asked to confirm whether you want to importconfigurations from the previous version. Click Yes to import configurations. You are thenprompted to specify which of the following configurations to import:»Protection Policies:ComputerSecurity settings»Options:Logging optionsDatabase options3.3.2Upgrading from GFI LANguard Portable Storage ControlIf the computer on which you are installing GFI EndPointSecurity is protected by a GFI LANguardPortable Storage Control agent, you first need to uninstall that agent. To do this:1. Open GFI LANguard Portable Storage Control configuration console.12 Installing GFI EndPointSecurityGetting Started Guide
2. Delete the agent from the computer where GFI EndPointSecurity will be installed.This process should be done only for the computer where GFI EndPointSecurity will beinstalled.3. Close the GFI LANguard Portable Storage Control configuration console application andproceed to installing GFI EndPointSecurity.4. When installing GFI EndPointSecurity, you are asked to confirm whether you want to importconfigurations from the previous version. Click Yes to import configurations.The GFI LANguard Portable Storage Control agents that were protecting your computerswill be automatically added to a protection policy called LegacyAgents in GFIEndPointSecurity.3.4Installing GFI EndPointSecurityTo install GFI EndPointSecurity:Run the installer as a user with administrative privileges on the computer.1. Double-click on the GFI EndPointSecurity executable file.2. Select language, and click OK.3. Click Next at the Welcome screen to start setup.4. Read carefully the End-User License Agreement. If you agree to the terms laid out in theagreement, select I accept the license agreement and click Next.Screenshot 1 - GFI EndPointSecurity installation: domain administrator account setup5. Key in the logon credentials of an account with administrative privileges and click Next tocontinue.Getting Started GuideInstalling GFI EndPointSecurity 13
Screenshot 2 - GFI EndPointSecurity installation: license key details6. Key in the Full Name and Company. If you have a license key, update the License Key detailsand click Next.The license key can be keyed in after installation or expiration of the evaluation periodof GFI EndPointSecurity. For more information, refer to the Entering your license keyafter installation section in the Miscellaneous chapter.7. Key in or browse to select an alternative installation path or click Next to use the defaultpath and proceed with the installation.8. Click Back to re-enter installation information or click Next and wait for the installation tocomplete.9. Upon installation completion, enable or disable the Launch GFI EndPointSecurity checkboxand click Finish to finalize installation.14 Installing GFI EndPointSecurityGetting Started Guide
4Getting Started4.1IntroductionUpon the initial launch of GFI EndPointSecurity management console, the Quick Start wizard willautomatically be launched. This will enable you to configure GFI EndPointSecurity for first timeuse.The Quick Start wizard will guide you in configuring the following settings:»automatic discovery»power users»users groups»database backend.4.2Using the Quick Start wizardThe Quick Start wizard can also be launched from File Quick Start Wizard .Screenshot 3 - GFI EndPointSecurity Quick Start wizard: Start stepStep 1. Configuring automatic discoveryGFI EndPointSecurity provides you with the facility to search for newly connected computers tothe network at configured scheduled times through the auto discovery feature. In addition, youcan also instruct the agent deployment feature to assign the default protection policy to thenewly discovered computers.By default:»the Enable Auto Discovery checkbox is enabled»the auto discovery settings are set to scan the Current domain/workgroup»the install agents settings are set to assign the General Control protection policy(shipping default protection policy) on to the newly discovered computers.Getting Started GuideGetting Started 15
Screenshot 4 - GFI EndPointSecurity Quick Start wizard: Auto Discovery stepTo configure the Auto Discovery feature:1. Enable or disable the Enable Auto Discovery and Install agents on discovered computerscheckboxes.2. Click the Auto discovery settings hyperlink to configure the auto discovery settings.Screenshot 5 - Auto Discovery options16 Getting StartedGetting Started Guide
3. In the Auto Discovery dialog select the Auto Discovery tab and enable or disable the Enableautomatic discovery to detect computers newly connected to the network checkbox.4. In the Schedule section select the start date and set frequency of the searches from Hourly,Daily, Weekly or Monthly.Screenshot 6 - Discovery Area options5. Select the Discovery Area tab and select the area to be covered by the discovery feature. ForThe following domains/workgroups and Entire network except click Add and key in theDomain/workgroup name.Getting Started GuideGetting Started 17
Screenshot 7 - Actions options6. Select the Actions tab and enable or disable Install agents on discovered comp
In Microsoft Windows 7, a feature called BitLocker To Go can be used to protect and encrypt data on removable devices. GFI EndPointSecurity performs checks on real file types encrypted with Windows 7 BitLocker To Go. Device whitelist and blacklist The administrator can define a list of specific devices that are permanently allowed and others
www.ceaweld.com PPN 3F CC - MF PPN 3FF CC MF PPN3FCC spa 07-2005 2-09-2005 6:27 Pagina 1
Biacore T200 Getting Started 28-9840-98 Edition AB 5 Biacore T200 Getting Started Biacore T200 Getting Started Introduction This Getting Started handbook is designed as a self-study guide to introduce you to the basic operations of BiacoreTM T200, Biacore T200 Control Software and Biacore T200 Evaluation Software.
2 X. Nie, J. Feng, J. Xing and S. Yan (a) Input Image (b) Pose Partition (c) Local Inference Fig.1.Pose Partition Networks for multi-person pose estimation. (a) Input image. (b) Pose partition. PPN models person detection and joint partition as a regression process inferred from joint candidates. (c) Local inference. PPN performs local .
Use the BUDI-Generator1 on the IFA website to generate the Basic UDI-DI. See chapter 3.4. for details. 3 options on how to obtain UDI-DI PPN allocation Download the order file A - PZN Pre-allocation. Complete the file and send it by email to email@example.com. IFA sends the allocated PPN in the order confirmation by email.
For this purpose, IFA assigns manufacturers a manufacturer identification number/manufacturer code (CIN), which the manufacturer will use as a prefix to its part number. The product code generated in this way is covered in the PPN format with the prefix "13" and is therefore internationally unique as a product
Getting Started applies to the "PCS 7 Engineering Toolset V 6.0". Preface Process Control System PCS 7, Getting Started - Part 1 iv A5E00164244-01 Guide to the Manual Getting Started explains the individual steps required to create the "color_gs" project. You will find the most important background information required to
Time Matters 10.0 - New User Guide 8 Starting the Application Getting Started Getting Started Getting Started Getting Started
Getting Started with SIMOTION SCOUT TIA Getting Started Valid as of Version 4.5 11/2016 Preface Fundamental safety instructions 1 Getting Started with SIMOTION SCOUT TIA 2 Prepare the configuration 3 Create a project 4 Create SIMOTION device and configure online communication 5 Start SIMOTION SCOUT TIA 6 Download the project to the target system 7
6 – ABSYNTH 5 – Getting Started 1.2 The ABSYNTH 5 Documentation 1.2.1 In this Manual What you are holding in your hands right now is the Getting Started Manual which will give you an overview of ABSYNTH 5’s main features and functions. This Getting Started Manual is divided into four parts:
Categorical Data Analysis Getting Started Using Stata Scott Long and Shawna Rohrman cda12 StataGettingStarted 2012‐05‐11.docx Getting Started Using Stata – May 2012 – Page 2 Getting Started in Stata Opening Stata When you open Stata, the screen has seven key parts (This is Stata 12. Some of the later screen shots .
Getting Started with Oracle Data Integrator Getting Started 12c (184.108.40.206.0) E96509-02 March 2019 Oracle Data Integrator Getting Started This document provides instructions on how to
Getting Started with ArcGIS Pro 12. The ArcGIS Pro Interface ArcGIS Pro uses a horizontal ribbon across the top of the application window to display and organize functionality into a series of tabs. Getting Started with ArcGIS Pro 13 A New Project Getting Started with ArcGIS Pro 14.
Xerox Scan to PC Desktop 2 Getting Started Guide Product Documentation Xerox Scan to PC Desktop 13 is shipped with the following documentation: Getting Started Guide: this guide.Consult it for product overview and installation information. Network Install Guide: helps administrators to deploy the software in a network environment. Component documentation: the documentation of .
SonicWall SonicWave 432e and SonicWave 432i Getting Started Guide 3 1 Introduction In this Guide This Getting Started Guide provides instructions for basic installation and configuration of the SonicWall SonicWave 432e and SonicWave 432i wireless access points in single‐unit or multi‐unit wireless deployments.
4 Contents of the box Smart device and hardware Documentation and software Getting Started Guide (this guide) Getting Started CD, which includes the following: Palm Desktop software or a link to this software Link to instructions on how to get bonus software from My Centro User Guide Palm warra
Getting Started Guide for the SBTi's Net-Zero Standard ABOUT THE GETTING STARTED GUIDE This document is designed as a simple, easy-to-use guide for companies to support companies in setting net-zero targets aligned to the SBTi's Net-Zero Standard.
Getting Started Guide October 30, 2020 www.terasic.com.tw 3 Chapter 1 About this Guide The DE10-Nano Getting Started Guide contains a quick overview of the hardware and software setup including step-by-step procedures from installing the necessary software tools to using the DE10-Nano board. The main topics this guide covers are listed below:
Getting Started Guide This guide is available in the following locations: † On Cisco.com. On the product CD-ROM in the Documentation† folder. During the installation process, just before you have finished † installing the product, you are provided the option to read the Getting Started guide. Cisco Configuration Professional User Guide
QuickBooks 2016 for Windows Getting Started Guide Thank you for choosing QuickBooks! About this Guide This guide helps you get started with QuickBooks as quickly as possible. You’ll learn: What you will need to get started How
Getting Started: Synchro 8 Page 2 Introduction to the Synchro 8 Getting Started Guide . This guide will provide a basic understanding of how to use the Synchro 8 software package. This guide was designed to walk a user through the necessary steps to create a network simulation from opening the