06.05.2013 Views

The eG Installation Guide - eG Innovations

The eG Installation Guide - eG Innovations

The eG Installation Guide - eG Innovations

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Installing and Configuring on Unix<br />

4. Next, check whether the other protocols listed in the right panel of Figure 2.8 are Enabled. If<br />

not, then enable those protocols.<br />

• If the MS SQL Server 2008 is used as the <strong>eG</strong> backend, then ensure that the ‘SQL Server’<br />

service and ‘SQL Server Agent’ service are running on the SQL Server host.<br />

• Ensure that ‘NTLVM v2’ is disabled for the Windows host on which the MS SQL database<br />

server executes.<br />

For this, follow the steps below:<br />

Login to the Windows host of the MS SQL database server where the <strong>eG</strong> database is to be<br />

configured.<br />

From the Start menu, go to Control Panel -> Administrative Tools -> Local Security Policy.<br />

When the Local Security Settings window opens, expand the Local Policies node in the treestructure<br />

in the left panel of the window, and select Security Options. All the security policies of<br />

the Windows system and their settings will be displayed in the right panel as depicted by<br />

Figure 2.9 below.<br />

Figure 2.9: Viewing the Security options of the Windows system hosting the MS SQL database server<br />

Browse the policies list in the right panel for the following policy: Network security: LAN Manager<br />

authentication level<br />

Check whether the security Setting of that policy is Send NTLM response only. If not, then you<br />

need to change the security setting. For this, first select the policy from the right panel, rightclick<br />

on it, and then pick Properties (see Figure 2.10).<br />

26

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!