Académique Documents
Professionnel Documents
Culture Documents
Installation Guide
Release 6.5
11/2005
Copyright
Manual copyright © 2005 Microsoft Corporation. All rights reserved.
Your right to copy this documentation is limited by copyright law and the terms of the software license
agreement. As the software licensee, you may make a reasonable number of copies or printouts for
your own use. Making unauthorized copies, adaptations, compilations, or derivative works for
commercial distribution is prohibited and constitutes a punishable violation of the law.
Trademarks
Microsoft, ActiveX, Excel, FRx, FrontPage, Outlook, SharePoint, Visual Studio, Windows, and Windows
Server are either registered trademarks or trademarks of Microsoft Corporation, FRx Software
Corporation, or their affiliates in the United States and/or other countries. FRx Software Corporation is
a subsidiary of Microsoft Corporation. Crystal Reports is a registered trademark of Business Objects
SA.
The names of actual companies and products mentioned herein may be trademarks or registered
marks - in the United States and/or other countries - of their respective owners.
The examples companies, organizations, products, domain names, e-mail addresses, logos, people,
places, and events depicted herein are fictitious. No association with any real company, organization,
product, domain name, e-mail address, logo, person, place, or event is intended or should be inferred.
Warranty disclaimer
Microsoft Corporation disclaims any warranty regarding the sample code contained in this
documentation, including the warranties of merchantability and fitness for a particular purpose.
Limitation of liability
The content of this manual is furnished for informational use only, is subject to change without notice,
and should not be construed as a commitment by Microsoft Corporation. Microsoft Corporation
assumes no responsibility or liability for any errors or inaccuracies that may appear in this manual.
Neither Microsoft Corporation nor anyone else who has been involved in the creation, production or
delivery of this documentation shall be liable for any indirect, incidental, special, exemplary or
consequential damages, including but not limited to any loss of anticipated profit or benefits, resulting
from the use of this documentation or sample code.
License agreement
Use of this product is covered by a license agreement provided with the software product. If you have
any questions, please call the Microsoft Business Solutions Customer Assistance Department at 800-
456-0025 (in the United States or Canada) or +1-701-281-6500.
Publication Date
November 2005
Table of Contents iii
Table of Contents
Introduction 1
Audience.......................................................................................................................................... 1
Installation Preparation 3
Overview .......................................................................................................................................... 3
Summary of Tasks for New and Existing Microsoft Solomon Installations ................... 3
Pre-Installation Checklist ................................................................................................................ 5
Microsoft Solomon Installation Setup Options............................................................................ 11
Planning Security 13
Microsoft Solomon Security Best Practices................................................................................. 13
Physical Security ........................................................................................................................... 16
For the Employees ........................................................................................................................ 17
For the Administrator .................................................................................................................... 17
Securing the Server Operating System ........................................................................................ 18
Authentication................................................................................................................. 18
Access Control................................................................................................................. 21
Single Sign-on ................................................................................................................. 22
External Security Firewall ............................................................................................... 22
Virus Protection ............................................................................................................................. 22
Types of Viruses .............................................................................................................. 23
Virus Prevention Best Practices ..................................................................................... 23
ISA Server 2004............................................................................................................................ 24
ISA Server Policies .......................................................................................................... 24
Network Security Strategies ......................................................................................................... 24
Wireless Networks .......................................................................................................... 26
Network Security Scenarios ........................................................................................... 26
Security Update Management...................................................................................................... 29
Additional SQL Server 2000 Security Settings............................................................................ 30
Setting Up the Connection Between the Microsoft Project and Microsoft Solomon
Databases .......................................................................................................................82
Installing Microsoft Project Connector Components to the Microsoft Project
Professional 2002 or 2003 Client Workstation ............................................................87
Adding the PSA COM Add-In to Microsoft Project Professional ....................................90
Setting Up Microsoft Solomon on Workstations..........................................................................95
Client Workstation Setup — Executing Microsoft Solomon from a Shared Directory on
the Server ........................................................................................................................95
Client Workstation Setup — Running Microsoft Solomon from the Local Client
Workstation .....................................................................................................................98
Installing Crystal Reports® for Solomon on a Local Workstation .................................98
Troubleshooting 113
Restoring Microsoft Solomon System Database Table Views ..................................................113
Technical Resources for Microsoft Solomon .............................................................................115
Section Contents...........................................................................................................115
Terminology Definitions ................................................................................................115
Technology Tidbits.........................................................................................................115
Backup and Restore Procedures .................................................................................117
Registered Controls.......................................................................................................119
Solomon.ini....................................................................................................................119
Appendices 121
Appendix A: Microsoft SQL Server Optimization Notes .............................................................121
Supported Microsoft SQL Server Versions...................................................................121
Microsoft SQL Server 2000..........................................................................................121
Appendix B: Updating the Application Database with Schema Information ............................125
Appendix C: Manually Creating Stored Procedures and Table PA_Connect ............................127
Appendix D: Restoring Connector Functionality to Microsoft Project Server ...........................131
Appendix E: Microsoft Solomon Support....................................................................................133
Important Phone Numbers and Internet Addresses ...................................................133
Index 135
Introduction 1
Introduction
This guide provides instructions for installing Microsoft® Business Solutions–Solomon in the following
environments:
• Microsoft® Windows® 2000 Professional Service Pack 4
• Microsoft® Windows® 2000 Server Service Pack 4
• Microsoft® Windows® XP Professional Service Pack 2
• Microsoft® Windows Server™ 2003 Service Pack 1
• Microsoft® SQL Server™ 2000 Standard Edition Service Pack 3a and Service Pack 4
• Microsoft® SQL Server™ 2005
The following sections are included:
• Installation Preparation — This section provides an overview of the installation and upgrade
processes and a Pre-Installation Checklist to help you address tasks you must perform before you
begin installation. This section also describes the options you will see in the Microsoft Solomon
Setup window.
• Security Planning — This section addresses security issues and recommendations for ways to
create a more secure environment.
• Guide for New Microsoft Solomon Installations — This section provides steps to help those who do
not currently have Microsoft Solomon installed.
• Updating an Existing Microsoft Solomon Installation — This section provides steps to help you
upgrade your present Microsoft Solomon installation to release 6.5.
• Troubleshooting — This section provides solutions, hints, and tips to help you resolve common
installation, setup, and maintenance issues.
• Appendices — This section provides additional information about optimizing Microsoft SQL Server
optimization and updating application databases with Microsoft Solomon schema information.
Audience
The Microsoft Business Solutions–Solomon Installation Guide is written for the novice as well as the
veteran software installer. It includes checklists and other aids to help make your installation a
successful experience.
2 Installation Guide
Installation Preparation 3
Installation Preparation
This section will help you prepare for your Microsoft Solomon installation. The section includes:
• Overview — Read this section for a brief summary of what will happen during and after your
installation.
• Pre-Installation Checklist — You must perform many of the tasks on this list before you begin your
installation.
• Microsoft Solomon Installation Setup Options — This section describes what you will see on the
Microsoft Business Solutions-Solomon installation setup screen.
Overview
Where possible, Microsoft Solomon Setup detects operating environment characteristics and installs
the components that are appropriate for that environment. Setup also prompts you to answer
necessary questions up front so that file copying can proceed efficiently.
Remember, Microsoft Solomon Setup complements, but does not replace, careful installation planning
and preparation.
Pre-Installation Checklist
The following checklist is provided to help you prepare for your Microsoft Solomon installation and to
give you a record to refer to during future upgrade installations.
Note: The input of other individuals during the installation process might be helpful and, in some
cases, necessary. For example, you might need to consult with your database administrator when
questions arise about how to store your Microsoft Solomon data. Be sure the resources you need are
available during pre-installation planning and during the installation or upgrade process.
If you plan to use Microsoft Office 2000, 2003, or XP and Microsoft Solomon on the same workstation,
install Office 2000 or 2003 first, followed by Microsoft Solomon.
Contact your authorized Microsoft Solomon partner or certified consultant well in advance of your
planned installation date to make sure that your operating system, database, and hardware
environment are appropriate for the Microsoft Solomon installation.
(Optional) On the line below, record the computer name(s) of the server(s) where you will create or
update the Microsoft Solomon application and databases. The applications and databases can be
installed on separate servers.
Application server name _____________________________________________
Database server name _____________________________________________
Where can I find the computer name?
1. Right-click My Computer on the desktop of the server where you will install Microsoft
Solomon.
2. Choose Properties from the shortcut menu.
3. The Full Computer Name is on the Network Identification (Windows 2000) or Computer Name
(Microsoft® Windows XP, Microsoft® Windows Server™ 2003) tab of System Properties.
Complete these steps on each server where you will install Microsoft Solomon.
(Optional) On the lines below, record the computer name(s) of the workstations where you will
install Microsoft Solomon. Attach a separate sheet of paper if necessary.
_____________________________________________
_____________________________________________
_____________________________________________
_____________________________________________
_____________________________________________
Locate your Microsoft Solomon Release 6.5 CDs.
How many CDs should I have and what do the CDs contain?
• Volume 1 contains the Microsoft Solomon system and application files, including Tools for
Visual Basic and Adobe® Acrobat® Reader®.
• Volume 2 contains Adobe® Acrobat® Reader®, Crystal Reports® for Solomon, Project
Connector components that are installed on the server running Microsoft Project Server and
workstations running Microsoft Project Professional 2002 or 2003, Solomon Web Order
Starter Site, Microsoft SQL Server 2000 Service Pack 4, Microsoft Office XP Smart Tag
Manager, and the Microsoft Solomon user guides.
On the line below, record the edition of Microsoft Solomon that you will install.
_____________________________________________
Which Microsoft Solomon edition?
During installation, you will receive a prompt to choose the Microsoft Solomon edition you plan to
install. When Choose Edition appears, select from these choices:
6 Installation Guide
Note: Your Microsoft Solomon installation must include at least one system database. You must
also decide whether you will create demo databases. Demo databases are useful for training and
testing unfamiliar areas of the software without affecting your live data.
Empty Databases
_________________________________________ System Application
_________________________________________ Server (include path)
_________________________________________ System Application
_________________________________________ Server (include path)
_________________________________________ System Application
_________________________________________ Server (include path)
_________________________________________ System Application
_________________________________________ Server (include path)
_________________________________________ System Application
_________________________________________ Server (include path)
Demo Databases — Demo companies are included with Microsoft Solomon. The databases that
contain these companies are:
• Solomon Professional application databases are DemoSolomonApp10 (companies 0010 and
0020) and DemoSolomonApp60 (companies 0060, 0070, and 0080). The demo system
database for both companies is DemoSolomonSystem.
• Solomon Standard application database is DemoStandardApp51 (company 0051). The
system database is DemoStandardSystem.
Installation Preparation 7
You should use these names for your demo databases if possible.
_________________________________________ System Application
_________________________________________ Server (include path)
_________________________________________ System Application
_________________________________________ Server (include path)
_________________________________________ System Application
_________________________________________ Server (include path)
_________________________________________ System Application
_________________________________________ Server (include path)
_________________________________________ System Application
_________________________________________ Server (include path)
On the line below, record the Microsoft SQL Server version installed on the workstation or server
where you will create or update the Microsoft Solomon databases.
_____________________________________________
Which Microsoft SQL Server version do I have?
Microsoft Solomon release 6.5 supports Microsoft SQL Server 2000 Standard Edition with Service
Pack 3a and Service Pack 4, as well as SQL Server 2005. Service Pack 4 is included on the
Volume 2 CD (\MSSQL2000\ SQL2000-KB884525-SP4-x86-ENU.exe). Microsoft SQL Server must
be purchased separately. Contact your Microsoft Solomon partner.
If you already have Microsoft SQL Server installed, you can determine the SQL Server version by
using the OSQL or ISQL utility or the Query window in SQL Server Query Analyzer and type (or copy
and paste):
SELECT SERVERPROPERTY (‘productversion’), SERVERPROPERTY
(‘productlevel’)
The following table shows the relationship between product version the SQL Server release and
product level:
Warning: Microsoft has identified an issue with the final build of Microsoft SQL Server Service Pack 4
that relates to having Address Windowing Extensions (AWE) support enabled. This issue only affects
computers with more than two gigabytes (2 GB) of memory where AWE has been explicitly enabled.
Microsoft has issued an update to correct this problem. For more information about this service pack,
go to http://www.microsoft.com/sql/downloads/2000/sp4.asp. For more information about the
correction for the AWE issue, go to http://support.microsoft.com/default.aspx?kbid=899761.
If you will install Microsoft Solomon Web Order, review “Solomon Web Order Starter Site” on
page 50.
8 Installation Guide
If you will install a Web Order Starter Site, verify that the Web server where you will install it meets
the following hardware and software minimum requirements. Remember, these are minimum
requirements. Actual needs will depend on your anticipated transaction processing load:
• 1.0 GHz or higher processor speed
• 256 MB of RAM (512+ MB recommended)
• 2 GB of available hard disk space (4 GB recommended)
• Microsoft Windows 2000 Server (with IIS 5.0 or higher)
Load or install all required and related software and hardware resources on the server and
workstations where you will install Microsoft Solomon. Make sure that all environment settings are
correct.
Determine whether you will install Microsoft Solomon Tools for Visual Basic.
How can I determine whether I should install Microsoft Solomon Tools for Visual
Basic?
See whether Tools for Visual Basic is included on the Registration Report provided by Services
Solutions. If necessary, confirm that you should install Tools for Visual Basic by contacting your
authorized Microsoft Solomon partner or certified consultant.
Perform a system backup on the server where you will install Microsoft Solomon. Contact your
system administrator if you need assistance.
Note: Be sure to create a backup of all custom Crystal Reports in your existing Microsoft Solomon
installation so that they can be restored after you install Microsoft Solomon. See “Updating
Custom Crystal Reports” on page 112 for more information.
You must log on as the local Administrator or as a member of the local Administrators group at the
server where you will install Microsoft Solomon. Failure to log on with Administrator privileges will
cause problems in the installation.
Note: If you use Active Directory, you must log on as a member of the Domain Administrators
group, which in turn needs to be part of the local Administrators group.
Performing full or client installations of Microsoft Solomon on Windows 2000 Server or Windows
Server 2003 requires Administrator rights because the installation process must update the
Windows registry. You might also need to reboot the server during or after installation.
On the server where you will install Microsoft Solomon, close all currently running programs and
stop SQL Server Services.
Because Microsoft Solomon Setup may need to update files used by other programs or services, it
is important to complete this step before starting Microsoft Solomon Setup.
Installation Preparation 9
> To stop and start services using the MSSQLSERVER Properties dialog box:
1. Click the Start button, point to Settings, and then click Control Panel.
2. In the Control Panel, double-click Administrative Tools, and then double-click Services.
3. Scroll down until you see MSSQLSERVER, and then double-click to select it.
4. In the MSSQLSERVER Properties dialog box under Service Status, click the Stop button.
SQL Server Services stop.
5. A message stating SQLServerAgent will also shut down might appear. Click OK to stop the
SQLServerAgent.
6. When restarting SQL Server Services, select the service, then click the triangle on the
Services toolbar or choose Start from the Action menu. Remember to restart
SQLServerAgent (if needed) when restarting MSSQLServer.
10 Installation Guide
6. When restarting SQL Server Services, select the service, then click the triangle on the
Services toolbar or choose Start from the Action menu. Remember to restart
SQLServerAgent (if needed) when restarting MSSQLServer.
If an earlier 32-bit release of Microsoft Solomon is installed (Release 4.x, 5.x or 6.x), you must
remove the earlier release from all workstations and from the server where it is installed before
starting this installation. If you do not remove the earlier release before beginning this installation,
Microsoft Solomon Setup will require that you do so and will initiate the removal before starting
the installation.
How do I remove an earlier release of Microsoft Solomon?
Be sure to perform a system backup before you follow these steps:
1. Select Start | Settings | Control Panel.
2. Choose Add/Remove Programs.
3. Select your current Microsoft Solomon release in the Install/Uninstall list. If you are
performing these steps at the server where the earlier release of Microsoft Solomon is
installed, you must remove all Microsoft Solomon Clients installed on workstations and on the
server first, before removing Microsoft Solomon (see “Removing an Existing Microsoft
Solomon Installation” on page 102 for more information).
4. Click Add/Remove.
Your Pre-Installation Checklist is now complete. Be sure to print it so you can refer to it during the
installation tasks.
Installation Preparation 11
If you are accessing the Microsoft Solomon Volume 1 CD when you choose this option, you will
receive a prompt to insert the Volume 2 CD into the CD drive. Insert the Volume 2 CD, and select
Microsoft Office XP Smart Tag Manager to start the Office XP Smart Tag Manager setup.
• FRx® — If you choose FRx®, you will receive a prompt to use your FRx CD to perform the
installation.
• Adobe® Acrobat® Reader® — Installs Adobe Acrobat Reader 5.0.5 on your computer.
• Browse CD — Opens Windows Explorer.
• Exit Installation — Quits Microsoft Solomon Setup.
If an earlier release of Microsoft Solomon is not installed on your workstations or server, proceed to
“Guide for New Microsoft Solomon Installations” on page 13.
If you are updating an earlier release of Microsoft Solomon, continue with “Updating an Existing
Microsoft Solomon Installation” on page 101.
Planning Security 13
Planning Security
This section includes:
• Microsoft Solomon Security Best Practices
• Application Server E-mail Security
• Physical Security
• For the Employees
• For the Administrator
• Securing the Server Operating System
• Virus Protection
• ISA Server 2004
• Network Security Strategies
• Security Update Management
• Additional SQL Server 2000 Security Settings
Microsoft® Windows®, the foundation of Microsoft Solomon, provides sophisticated standards-based
network security. In the broadest sense, security involves planning and considering trade-offs. For
example, a computer can be locked in a vault and only accessible to one system administrator. This
computer may be secure, but it is not very usable because you cannot connect it to any other
computer. You need to consider how to make the network as secure as possible without sacrificing
usability.
Most organizations plan for external attacks and construct firewalls, but many companies do not
consider how to mitigate a security breach once a malicious user gets inside the firewall. Security
measures in your client’s environment will work well if users are not required to perform too many
procedures and steps to conduct business in a secure manner. Implementing security policies should
be as easy as possible for users or they will tend to find less secure ways of doing things.
Since the size of Microsoft Solomon implementations can vary a great deal, it is important to carefully
consider the needs of a smaller client and to weigh the effectiveness of security against the costs that
may be involved. As your client’s trusted advisor, use your best judgment to recommend a policy that
helps to meet security needs without creating a burden that will ultimately cause the client to stop
enforcing the policy.
For more information about securing your network, refer to the following Web sites:
Securing data access
http://msdn.microsoft.com/library/default.asp?url=/library/en-
us/dnnetsec/html/SecNetch12.asp
Using SSL certificates to have all client/server based communication encrypted
http://msdn.microsoft.com/library/default.asp?url=/library/en-
us/dnnetsec/html/secnetht19.asp
Using Microsoft SQL Server 2005
http://www.microsoft.com/sql/2005/default.mspx
By following some general rules in administration, you can help to increase the security of the
Microsoft Solomon environment:
• Assuming that system administrator has administrative privileges, employees do not need
administrative privileges over the domain. These user accounts should be restricted to Domain
Users.
• Assuming that the business owner or manager has administrative privileges, users, such as
accounts payable coordinators, cashiers, or sales representatives, do not need administrative
privileges over the domain. These user accounts should be restricted to Domain Users.
• Users must not be members of the Microsoft® Windows® Guests group. Guests group members
who connect to Microsoft Windows 2000 Server to execute Windows Terminal Server or to
Windows Server 2003 via Remote Desktop will not have access to Microsoft Solomon. They will
receive an abnormal program termination message, and Solomon will not load.
• Passwords should not be reused. It is often common practice to reuse passwords across systems
and domains. For example, an administrator responsible for two domains might create Domain
Administrator accounts in each that use the same password, and even set local administrator
passwords on domain computers that are the same across the domain. In such a case, a
compromise of a single account or computer can lead to a compromise of the entire domain.
• After installation is complete and the databases are created or updated to a newer Microsoft
Solomon version, you should consider changing the “master login” password. When changing the
Master login password, it must be accomplished through Database Administration (98.270.00).
This password should be kept confidential. It should warrant the same protection you give to the
Microsoft SQL Server™ sa password. All database access is funneled through the master login
and requires the highest level of protection. The “master login” password should only be known to
your system administrators.
• Domain Administrator accounts should not be used as service accounts. It is also common
practice to use Domain Administrator accounts as service accounts for common services such as
backup systems. However, this poses a security risk, because the password must be stored, or
cached, locally on every computer where the service resides. The password can easily be retrieved
by anyone with administrative rights over the computer. In such a case, the compromise of one
computer can lead to the compromise of the entire domain. Service accounts should never be
Domain Administrator accounts, and they should be limited in privilege as much as possible.
• Although Microsoft Solomon is supported on several operating systems, it is best to use the latest
operating systems with the most up-to-date security features. Also, operating system editions that
are for business purposes typically have more security features. For example, the Encrypting File
System (EFS), found in Windows® XP Professional but not in Windows XP Home Edition, allows
encrypting of files and folders for added security of sensitive data against theft or hackers.
Restricted File Access, also found only in Professional, allows restricting access to selected files,
applications, and other resources.
• Use the Windows Update tool provided with Windows 2000, Windows XP, and Windows Server™
2003 to apply the most current security updates. Use the Automatic Update feature of Windows to
keep your machines up to date. Sites with many computers can reduce IT costs and ensure
update compliance by using Microsoft Systems Management Server. For more information, go to
http://www.microsoft.com/smserver/default.mspx.
Planning Security 15
• For security surrounding the Microsoft Solomon executable files, Microsoft suggests following the
principle of least privilege: give users only the minimum privileges required to access data and
functionality.
Examples of files that should be considered for this level of security are:
– General Ledger Consolidation files
– Payroll ACH files and scripts
– Payroll Tax tables
– Transaction Import files, Control macros, data files, and log files
– EDI Transaction files
– Microsoft Solomon Event logs
– Microsoft Solomon executables
– Microsoft Solomon Standard reports
– Microsoft Solomon User reports\SDG\Receive directories
• When using the Access Rights screen, assign rights to Microsoft Solomon Groups, then add users
to the groups. This will help in maintaining the rights of your Microsoft Solomon users.
• A recommended practice is to have users log on to Microsoft Solomon using an integrated logon.
For more information, refer to “Adding Users” in the Microsoft Business Solutions–Solomon
System Manager Release 6.5 user guide (SAF_SM.pdf), which is located in the User Manuals
folder of your Solomon installation and on the Volume 2 CD. A key benefit of using integrated
logons is the ability to use the security features of your Windows server environment to enforce
strong password and password expiration policies with minimal intervention by administrators.
• If you choose not to use the integrated logon for authenticating users, be sure to use a strong
password methodology for Microsoft Solomon user passwords. Although Microsoft Solomon does
not enforce passwords that expire, you should implement a manual process that requires your
employees to change their Microsoft Solomon password at random intervals.
• If you use the Microsoft Office Project Connector for Solomon, the ...\Solomon\PA\MSPXML folder
temporarily stores Solomon SOAP requests to Microsoft Project Server that were rejected for
various reasons (for example, the project is checked out or Microsoft Project Server is temporarily
offline). By default, the MSPXML folder grants full access to all users who have access to the
Solomon directory (typically, all Solomon users), potentially allowing those users to view and alter
the data in the XML documents. To prevent this, grant Read, Write, and Delete permissions only to
the users who have rights to the Resubmit Batches (PA.MSS.00) utility, which is accessed from
the Microsoft Project Connector Setup (PA.MSP.00) screen. Grant only Write permission for the
folder to all other Solomon users.
• If you have installed, or plan to install, the Smart Tag Manager feature, you should review the
security model it employs in the “Administration Setup” section of the Microsoft Business
Solutions–Solomon Office XP Smart Tag Manager Release 6.5 guide
(SolomonSmartTagManager.pdf), and follow its recommendations as well. The security for that
feature is based on Windows NT® Authentication.
• If you have installed, or plan to install, the Web Order feature, you should review the security
model it employs, and follow its recommendations as well. For more information, see the
Microsoft Business Solutions–Solomon Release 6.5 Web Order user guide (\User
Manuals\Program Files\Solomon\SIV_WC.pdf on the Microsoft Solomon Volume 2 CD).
• The Application Server feature has a sub-feature where it can process requests based on e-mails
from your remote employees. This feature could be exploited by hackers if they chose to send a
destructive request via Application Server. Microsoft recommends that you:
– Create a specific exchange account for the application server to read from.
– Make a list of employees you will allow to use this feature and only allow e-mail from those
individuals to be processed by the Application Server’s e-mail account. When setting up these
users within Solomon make sure to include their unique email address in the EMail Address
16 Installation Guide
field and check the Active Application Server User checkbox. Application Server will only
accept emails from these specific accounts.
• Be more restrictive on access rights for the following features. These are features that should be
used by trusted employees and administrators.
– DB Update (DB.UPD.ATE)
– Customization Manager Menu Items
– Application Server (96.010.00)
– Access Rights Maintenance (95.270.00)
– Access Rights(95.600.00) report
– Database Administration (98.270.00)
– Database Physical Integrity (95.500.00)
– Possible Values Import (PV.REC.00)
– Report Control Maintenance (98.280.00)
– User Maintenance (95.260.00)
– Group Maintenance (95.280.00)
– Crystal Reports Designer
– Payroll module
– Password Maintenance (PA.PSD.00) if you use Project Management and Accounting
– Web Order module
Physical Security
Physical security represents the best place to start preventing malicious attacks. For example, if a
hard disk drive is stolen, eventually the data on that drive will be stolen as well. Discuss the following
physical security issues when developing a policy with your client:
• For larger deployments with dedicated IT departments, ensure server rooms and places where
software and manuals are stored are locked.
• Machines in the category would include:
– The Microsoft SQL Server database server
– The file server where the Microsoft Solomon executables reside
– The file server used as the Application Server
– The IIS server for Web Order
– The IIS server for Business Portal
– The Microsoft Project Server
• Keep unauthorized users away from the power and reset switches on the server(s).
• Consider removing the floppy disk drive from client workstations.
• Ensure burglar alarms are installed, regardless of how sensitive the data is.
• Ensure backups of critical data are stored offsite and that software is stored in fireproof
containers when not in use.
• If possible, deploy Microsoft Solomon through a Terminal Services implementation. Install
Microsoft Solomon onto a Terminal Server and have the client log in to the server to access
Microsoft Solomon. With this implementation, the Microsoft Solomon files are installed only on
one machine, thus limiting the ability for attackers to attack the Microsoft Solomon Binaries, and
you only have to maintain security on one computer.
Planning Security 17
Authentication
Authentication is a fundamental aspect of system security. It confirms the identity of any user trying to
log on to a domain or access network resources. The weak link in any authentication system is the
user’s password.
Passwords provide the first line of defense against unauthorized access to the domain and local
computers. Suggest the following password best practices where appropriate for the client’s
organization.
Planning Security 19
Password Protection
• Always require strong passwords. For more information, see “Strong Passwords” below.
• If passwords must be written down on a piece of paper, store the paper in a secure place and
destroy it when it is no longer needed.
• Never share passwords with anyone.
• Use different passwords for all user accounts.
• Change passwords immediately if they have been compromised.
• Be careful about where passwords are saved on computers. Some dialog boxes, such as those for
remote access and other telephone connections, present an option to save or remember a
password. Selecting this option poses a potential security threat because the password is stored
in the system registry.
Strong Passwords
The role that passwords play in securing an organization’s network is often underestimated and
overlooked. As mentioned, passwords provide the first line of defense against unauthorized access to
your organization. The Windows Server 2003 family has a new feature that checks the complexity of
the password for the Administrator account during the setup of the operating system. If the password
is blank or does not meet complexity requirements, the Windows Setup dialog box appears warning of
the dangers of not using a strong password for the Administrator account. In a workgroup
environment, a user will not be able to access a computer over the network using an account with a
blank password. Weak passwords provide attackers with easy access to computers and the network,
while strong passwords are considerably harder to crack, even with the password-cracking software
that is available today.
Password-cracking tools continue to improve, and the computers used to crack passwords are more
powerful than ever. Password-cracking software uses one of three approaches: intelligent guessing,
dictionary attacks, and brute-force automated attacks that try every possible combination of
characters. Given enough time, the automated method can crack any password. However, strong
passwords are much harder to crack than weak passwords. A secure computer has strong passwords
for all user accounts.
A weak password:
• Is no password at all.
• Contains the user’s user name, real name, or company name.
• Contains a complete dictionary word. For example, the word Password is a weak password.
A strong password:
• Is at least seven characters long.
• Does not contain the user’s user name, real name, or company name.
• Does not contain a complete dictionary word.
• Is significantly different from previous passwords. Passwords that increment (Password1,
Password2, Password3 ...) are not strong.
• Contains characters from each of the four groups listed in the following table.
Group Examples
Uppercase letters ABCD
Lowercase letters abcd
Numerals 01234
Symbols `~!@#$%^&*()_+- {}|[]\:“‘<>?,./
Examples of strong passwords are Pa$sw0rD and J*p2leO4>F.
A password can meet most of the criteria of a strong password but still be rather weak. For example,
Hello2U! is a relatively weak password even though it meets most of the criteria for a strong password
20 Installation Guide
and also meets the complexity requirements of password policy. H!elZl2o is a strong password
because the dictionary word is interspersed with symbols, numbers, and other letters. It is important
to educate clients, managers, and their users about the benefits of using strong passwords and to
teach them how to create passwords that are actually strong.
Passwords can be created containing characters from the extended ASCII character set. Using
extended ASCII characters increases the number of characters users can choose when they create a
password. As a result, it might take more time for password-cracking software to crack passwords that
contain these extended ASCII characters than it does to crack other passwords. Before using extended
ASCII characters in your password, test them thoroughly to make sure that passwords containing
extended ASCII characters are compatible with other applications that the organization uses. Be
especially cautious about using extended ASCII characters in passwords if the organization uses
several different operating systems.
You can find extended ASCII characters in the Character Map. Some extended ASCII characters should
not be used in passwords. Do not use a character if a keystroke is not defined for it in the lower-right
corner of the Character Map dialog box. For more information about how to use Character Map, see
Windows Server Online Help.
Examples of passwords that contain characters from the extended ASCII character set are kUµ!¶0o
and Wf©$0k#»g¤5ªrd.
The client can implement a password policy that enforces password complexity requirements. For
more information about this policy, see “Password Must Meet Complexity Requirements” on the
Microsoft Windows Server 2003 TechCenter Web site.
Defining the Password Policy
When helping your client define the password policy, be sure to create a policy that will require all user
accounts to have strong passwords. The following Windows Server settings require strong passwords.
• Define the Enforce password history policy setting so that several previous passwords are
remembered. With this policy setting, users cannot use the same password when their password
expires.
• Define the Maximum password age policy setting so that passwords expire as often as necessary
for the client’s environment, typically, every 30 to 90 days.
• Define the Minimum password age policy setting so that passwords cannot be changed until they
are more than a certain number of days old. This policy setting works in combination with the
Enforce password history policy setting. If a minimum password age is defined, users cannot
repeatedly change their passwords to get around the Enforce password history policy setting and
then use their original passwords. Users must wait the specified number of days to change their
passwords.
• Define a Minimum password length policy setting so that passwords must consist of at least a
specified number of characters. Long passwords — seven or more characters — are usually
stronger than short ones. With this policy setting, users cannot use blank passwords and they
need to create passwords that are at least a certain number of characters long.
• Enable the Password must meet complexity requirements policy setting. This policy setting checks
all new passwords to ensure that they meet basic strong password requirements. For a full list of
these requirements, see “Password Must Meet Complexity Requirements” in Windows Server
Online Help.
Defining an Account Lockout Policy
Be cautious when defining the account lockout policy. The account lockout policy should not be set
haphazardly. Although the probability of thwarting an unauthorized attack on your client’s organization
is increased with account lockout policy, it is possible also to lock out authorized users unintentionally,
which can be very costly for your client.
If the client decides to apply the account lockout policy, set the Account lockout threshold policy
setting to a high enough number that authorized users are not locked out of their user accounts
simply because they mistype a password.
Planning Security 21
Authorized users can be locked out if they change their passwords on one computer, but not on
another computer. The computer that is still using the old password will continuously attempt to
authenticate the user with the old password, and it will eventually lock out the user account. This
might be a costly consequence of defining an account lockout policy, because the authorized users
cannot access network resources until their accounts are restored. This issue does not exist for
organizations that use only domain controllers that are members of the Windows Server family.
For more information about account lockout policy, see “Account Lockout Policy Overview” in Windows
Server Online Help. For information about how to apply or modify account lockout policy, see “To Apply
or Modify Account Lockout Policy,” also in Windows Server Online Help.
Access Control
A Windows network and its resources (including Microsoft Solomon files) can be secured by
considering what rights users, groups of users, and other computers have on the network. You can
secure a computer or multiple computers by granting users or groups specific user rights. You can
secure an object, such as a file or folder, through assigning permissions to allow users or groups to
perform specific actions on that object. Key concepts that make up access control include:
• Permissions
• Ownership of objects
• Inheritance of permissions
• User rights
• Object auditing
Permissions
Permissions define the type of access granted to a user or group for an object or object property such
as files, folders, and registry objects. Permissions are applied to any secured objects such as files or
registry objects. Permissions can be granted to any user, group, or computer. It is a good practice to
assign permissions to groups.
Ownership of Objects
An owner is assigned to an object when that object is created. By default in Windows 2000 Server, the
owner is the creator of the object. This has changed in Windows Server 2003 for objects created by
members of the Administrators group.
When a member of the Administrators group creates an object in Windows Server 2003, the
Administrators group becomes the owner, rather than the individual account that created the object.
This behavior can be changed through the Local Security Settings Microsoft Management Console
(MMC) snap-in, using the setting System objects: Default owner for objects created by members of the
Administrators group. No matter what permissions are set on an object, the owner of the object can
always change the permissions on an object. For more information, see “Ownership” in Windows
Server Online Help.
Inheritance of Permissions
Inheritance allows administrators to assign and manage permissions easily. This feature automatically
causes objects within a container to inherit all the inheritable permissions of that container. For
example, the files within a folder, when created, inherit the permissions of the folder. Only permissions
marked to be inherited will be inherited.
User Rights
User rights grant specific privileges and logon rights to users and groups in your computing
environment. For information about user rights, see “User Rights” in Windows Server Online Help.
Object Auditing
You can audit users’ access to objects. You can then view these security-related events in the security
log using the Event Viewer. For more information, see “Auditing” in Windows Server Online Help.
22 Installation Guide
Single Sign-on
A key feature of Windows Server family authentication is its support of single sign-on. Single sign-on
allows a user to log on to the Windows domain once, using a single password, and authenticate to any
computer in the Windows domain without having to reenter that password.
Single sign-on provides two main security benefits for:
• A user, the use of a single password or smart card reduces confusion and improves work
efficiency.
• Administrators, the amount of administrative support required for domain users is reduced,
because the administrator needs to manage only one account per user.
Authentication, including single sign-on, is implemented as a two-part process: interactive logon and
network authentication. Successful user authentication depends on both of these processes. For more
information about how to configure the Windows single sign-on feature, see Windows Server Online
Help.
Virus Protection
A computer virus is an executable file that is designed to replicate itself, erase or corrupt data files
and programs, and avoid detection. In fact, viruses are often rewritten and adjusted so that they
cannot be detected. Viruses are often sent as e-mail attachments. Antivirus programs must be
updated continuously to look for new and modified viruses. Viruses are the number one method of
computer vandalism.
Planning Security 23
Antivirus software is specifically designed for the detection and prevention of virus programs. Because
new virus programs are created all the time, many makers of antivirus products offer periodic updates
of their software to customers. Microsoft strongly recommends implementing antivirus software in
your client’s environment.
Virus software is usually installed at each of these three places: user workstations, servers, and the
network where e-mail comes into (and in some cases, leaves) the organization.
Types of Viruses
There are three main types of viruses that infect computer systems: boot-sector viruses, file-infecting
viruses, and Trojan horse programs.
Boot-Sector Viruses
When a computer starts, it scans the boot sector of the hard disk before loading the operating system
or any other startup files. A boot-sector virus is designed to replace the information in the hard disk’s
boot sectors with its own code. When a computer is infected with a boot-sector virus, the virus’ code is
read into memory before anything else. After the virus is in memory, it can replicate itself onto any
other disks that are in use in the infected computer.
File-Infecting Viruses
The most common type of virus, a file-infecting virus, attaches itself to an executable program file by
adding its own code to the executable file. The virus code is usually added in such a way that it
escapes detection. When the infected file is run, the virus can attach itself to other executable files.
Files infected by this type of virus usually have a .com, .exe, or .sys file name extension.
Some file-infecting viruses are designed for specific programs. Program types that are often targeted
are overlay (.ovl) files and dynamic-link library (.dll) files. Although these files are not run, executable
files call them. The virus is transmitted when the call is made.
Damage to data occurs when the virus is triggered. A virus can be triggered when an infected file is run
or when a particular environment setting is met (such as a specific system date).
Trojan Horse Programs
A Trojan horse program is not really a virus. The key distinction between a virus and a Trojan horse
program is that a Trojan horse program does not replicate itself; it only destroys information on the
hard disk. A Trojan horse program disguises itself as a legitimate program, such as a game or utility.
When it’s run, though, it can destroy or scramble data.
The following illustration shows a perimeter network bounded by firewalls and placed between a
private network and the Internet in order to secure the private network.
Wireless Networks
By default, wireless networks are typically configured in a manner that allows eavesdropping on the
wireless signals. They can be vulnerable to a malicious outsider gaining access because of the default
settings on some wireless hardware, the accessibility that wireless networks offer, and present
encryption methods. There are configuration options and tools that can protect against eavesdropping
but keep in mind that they do nothing to protect the computers from hackers and viruses that enter
through the Internet connection. Therefore, it is extremely important to include a firewall to protect the
computers from unwanted intruders on the Internet.
For more information about protecting a wireless network, see “How to Make Your 802.11b Wireless
Home Network More Secure,” located at http://support.microsoft.com/default.aspx?scid=kb;en-
us;309369.
Hopefully, the client’s budget will allow for a more secure solution that will protect their corporate
data. One such solution is ISA Server. The increased cost of this additional server provides a great deal
more security than your average consumer firewall, since they typically only provide network address
translation (NAT) and packet filtering.
Another method is server publishing. ISA Server allows publishing internal servers to the Internet
without compromising the security of the internal network. You can configure Web publishing and
server publishing rules that determine which requests should be sent to a server on the local network,
providing an increased layer of security for the internal servers.
This scenario is similar to the preceding scenario after the second firewall is added. The only
difference is that the internal firewall that supports reverse proxy is not an ISA Server. In this scenario,
you should work closely with the managers of each firewall to define server publishing rules that
adhere to the security policy.
• Microsoft Systems Management Server (SMS) Software Update Services Feature Pack. The SMS
Software Update Services Feature Pack contains a number of tools aimed at easing the process of
issuing software updates throughout the enterprise. The tools include a Security Update Inventory
Tool, a Microsoft Office Inventory Tool for Updates, the Distribute Software Updates Wizard, and
an SMS Web Reporting Tool with Web Reports Add-in for Software Updates. For more information
about each tool, see
http://www.microsoft.com/smserver/downloads/20/featurepacks/suspack/.
Talk to your clients regarding each of these tools and encourage their use. It is very important that
security issues are addressed as quickly as possible, while maintaining the stability of the
environment.
a.) If AutoPlay is enabled on the CD drive, the Microsoft Business Solution-Solomon setup
window automatically appears.
b.) If AutoPlay is not enabled, run Setup.exe in the root directory of the Microsoft Solomon
Volume 1 CD by choosing Start | Run and browsing to the CD drive.
Figure 9: Install
Note: Updating the automation files requires that you reboot your computer. If you cannot
reboot the computer now without disrupting other users, click Cancel and resume installation
later, when rebooting the server will cause the least amount of disruption.
5. Click OK. The computer will reboot. If Microsoft Solomon Setup does not restart automatically,
restart it by repeating step 1b.).
Guide for New Microsoft Solomon Installations 33
Note: If SQL Server starts automatically when the operating system starts, you may have to
stop SQL Server Services again. See “How do I stop and restart SQL Server Services?” on
page 9 for information on how to stop SQL Server services.
Welcome appears, advising you to exit all Windows® programs before continuing.
7. Click Next.
Software License Agreement appears, asking you to accept or decline the Microsoft Solomon
software license agreement.
8. Carefully read the software license agreement.
9. If you agree to the terms of the license agreement, click Yes. If you decline, another window
appears advising you Microsoft Solomon 6.5 Setup will stop operating.
Instructions appears.
13. If this is an upgrade installation and Microsoft Solomon Setup detects a previous Microsoft
Solomon installation, it requires you to remove the previous installation before continuing.
Click Yes to uninstall.
14. If this is an upgrade installation and Microsoft Solomon Setup detects an existing Microsoft
Solomon menu file (Delta.mnu) in the selected destination folder, it lets you save a backup of
the existing menu file in the backup subdirectory.
Strongly recommended: Select only those applications and modules you need to install. Do
not automatically select all applications and modules.
Note: You can install the Microsoft Solomon user guides by selecting the Solomon User
Manuals option on the Microsoft Solomon Volume 2 CD Installation Setup screen. User guides
are provided in Adobe Acrobat PDF format.
18. If you selected Client Setup Utility in the Foundation Series, and Microsoft Solomon Setup
detects a previous Microsoft Solomon client installation, it requires you to remove the
previous installation before continuing.
Click Yes to uninstall.
19. If you selected Tools for Visual Basic in the Tools Series, Software License Agreement appears
again, this time asking you to accept or decline the Microsoft Solomon Tools for Visual Basic
license agreement.
Carefully read the software license agreement. To accept the terms of the license agreement,
click Yes.
If you decline, another window appears advising you Microsoft Solomon 6.5 Setup will stop
operating. You can cancel Setup, accept the license agreement and continue the installation,
or click the Back button to remove Tools from the list of modules you chose to install.
20. If you selected Customization Manager in the Foundation Series, Customization Features
appears, prompting for the type of customization features to use with the Solomon
Customization Manager module.
21. Click Next. Select Program Folder appears, prompting for the destination of Microsoft
Solomon program icons.
Microsoft Solomon Setup copies files from the Microsoft Solomon Volume 1 CD. If the Client
Setup Utility in the Foundation Series is selected (step 16), Microsoft Solomon Setup next
executes the Microsoft Solomon client setup program.
27. After Microsoft Solomon Setup finishes installing files, View Readme File appears, prompting
you to review the Microsoft Solomon ReadMe.txt file.
Note: Microsoft Solomon requires that you install Microsoft SQL Server using the default
settings for Sort Order and Character Set.
3. Follow the instructions in “Appendix A: Microsoft SQL Server Optimization Notes” on page 121
to set up Microsoft SQL Server for use with Microsoft Solomon.
40 Installation Guide
Creating Databases
An application database contains all of the accounting data for an individual financial entity. A system
database contains shared site-specific data such as database field attributes, edit characteristics,
product registrations, customizations, and Microsoft Solomon screen-level security.
You must set up a working Microsoft Solomon application database (also known as a production or
empty database) and a system database before you can begin entering business data into Microsoft
Solomon.
Before you installed Microsoft Solomon, you recorded information about your databases on your Pre-
Installation Checklist. Retrieve the printout of your list. It will be important in the following steps.
Database Maintenance (98.290.00) can create databases based on four different scenarios:
• Empty Databases — Use this scenario to create a new system database and a new application
(production) database.
• Demo – Professional Edition — Use this scenario to create a database for demonstrating the
features in Solomon Professional. This scenario includes demonstration data for the Financial
Management, Inventory and Order Processing, Manufacturing, Field Service Management, and
Project Management and Accounting modules. It also includes Multi-Company support.
• Demo – Standard Edition — Use this scenario to create a single-company database for
demonstrating the Solomon Standard features. This scenario contains only Financial Management
Series data.
• Additional Empty Application Database — Use this scenario to create an additional application
database for use with an existing system database.
> To create Microsoft Solomon databases:
Note: These procedures must be performed by the Microsoft Solomon system administrator.
1. Confirm that the SQL Server service is running and restart it if necessary. Refer to “How do I
stop and restart SQL Server Services?” on page 9 for information about starting SQL Server
services.
2. From the Start menu, select the Database Maintenance icon in the Microsoft Solomon
program folder. Database Maintenance (98.290.00) appears.
3. In Destination SQL Server Name, Login ID, and Password, type the Microsoft SQL Server
name, login ID (sa), and password.
4. Click Connect to connect to the SQL Server.
5. Click the Create Databases tab.
2. Click Advanced.
Advanced Configuration Settings appears.
Note: Demo companies are included with Microsoft Solomon 6.5. The established application
database names for these companies are:
SQL Master60SP Login appears if you have not yet created the Master60sp user. This will not
happen if you have already installed a 6.0 SP1 or higher database already on this SQL Server.
Note: If you have already created the Master60sp user, the Sysadmin Login dialog box
appears. Proceed to step 10.
Note: For more information about strong passwords, see “Strong Passwords” on page 19.
10. In the Confirm Password box, re-type the password, and then click Ok.
The Login dialog box appears.
46 Installation Guide
Note: The Login dialog box will appear only if the Master60SP login already exists.
Note: Do not enter information in the boxes under System Database Definition. The system
database is defined in step 6 below.
16. Specify the appropriate company (for example, 0040). You can also select the company from
a list of possible values by pressing F3.
17. Press TAB to move to the Password box.
18. Specify the user ID as SYSADMIN and type the corresponding password,
19. Click OK
20. Continue with “Preparing the Empty System and Application Databases.”
Note: The previous step is required. However, you cannot complete all fields on the tabs until you
first define certain General Ledger module setup information: retained earnings and YTD net
income accounts, subaccounts, and ledgers. See step 12.
Note: The Web server on which you plan to install your Solomon Web Order Starter Site meets the
minimum requirements listed in the “Pre-Installation Checklist” on page 5.
Guide for New Microsoft Solomon Installations 51
6. Select Components appears, prompting for the Solomon Web Order Starter Site components
to install.
Note: You must use a new name for the virtual directory. Do not use the name of an existing
virtual directory.
14. Click Next. Commerce Site Location appears, prompting for the Solomon Web Order Starter
Site directory.
Note: The Solomon Web Order Starter Site directory must be a new directory, not an existing
directory.
54 Installation Guide
16. Click Next. Commerce Site Information appears, prompting for a descriptive title for the
Solomon Web Order Starter Site.
Note: If Setup Complete displays a message advising you to reboot the Solomon Web Order Starter
Site server, please do so. It may be necessary to reboot the server to fully register all new DLL files in
the system registry.
Note: Possible cleanup of the registry keys might be needed. Contact your system administrator
for assistance with this task.
58 Installation Guide
2. Select Crystal Reports® in the Microsoft Business Solutions-Solomon setup window. Crystal
Reports for Solomon Setup appears and advises you to close Windows programs before
continuing with the installation.
10. When Crystal Reports has been successfully installed appears, click Finish. Crystal Reports
has been installed on the server.
Note: Due to changes in the standard reports in Microsoft Solomon, customized reports from the 4.x,
5.x, and 6.x releases may not run without modification. Contact your authorized Microsoft Solomon
partner or certified consultant if your customized reports do not run.
Guide for New Microsoft Solomon Installations 61
Note: Using Windows authentication entails less user intervention than Project Server authentication
and is the recommended authentication method. If you choose Project Server authentication, each
user must supply additional credentials in order to log the PSA COM add-in (the component used for
entering Microsoft Solomon Project Management and Accounting information) into Microsoft Project
Server each time the Microsoft Project Professional client is started. Furthermore, when new projects
are created in a Microsoft Solomon environment that uses Project Server authentication, the owner of
the Project Server user ID in Microsoft Project Connector Setup (PA.MSP.00) must log on to Microsoft
Project Server and publish each new project. Failure to do so results in the project being inaccessible
to other users, including the project’s manager, until the designated user publishes it to Microsoft
Project Server.
62 Installation Guide
6. In Windows User Account, type the Windows account information using the format
DomainID\UserID.
7. In E-mail, type the user’s e-mail address.
8. In User Name, type the user’s name as it should appear in the enterprise resource pool.
9. Select the user’s group, category, and global permission.
10. Click Save Changes.
> To set up Windows authentication on Microsoft Project Professional 2002 or 2003:
1. Open Microsoft Project Professional 2002 or 2003 and select Tools | Enterprise Options |
Microsoft Project Server Accounts.
2. Click Add.
Account Properties displays.
Note: When integrated employees are created in Microsoft Solomon, a Project Server
authenticated user is created automatically.
Guide for New Microsoft Solomon Installations 67
Note: The Microsoft Project Server must have SQL Server Client Utilities installed, even if the
Microsoft Project database is on a different server. If SQL Server client utilities are not
installed, the scripts to update the Microsoft Project database cannot run.
a.) If AutoPlay is enabled on the CD drive, the Microsoft Business Solution-Solomon setup
window automatically appears.
b.) If AutoPlay is not enabled, run Setup.exe in the root directory of the Microsoft Solomon
Volume 2 CD by choosing Start | Run and browsing to the CD drive.
3. Select Microsoft Project Connector. The Microsoft Project Connector for Solomon installation
screen appears.
Select Components displays, prompting you to select the version of Microsoft Project Server
you are using.
8. Type the URL for Microsoft Project Web Access and click Next. The second Microsoft Project
Connector for Solomon Setup Information screen displays.
Since the number of files copied is small, Setup Complete displays almost immediately.
Note: In obscure cases, the server name recorded in the PDS.wsdl file is “servername," rather
than the name of the server where Microsoft Project Server is installed. If you are unable to
establish or restore connectivity between the Solomon and Microsoft Project databases after
completing all of the steps in this section, follow these steps:
a.) Browse to ...\Program Files\Microsoft Office Project Server 2003 (or Microsoft Project
Server 2002)\IIS Virtual Root\PDS.wsdl.
b.) Right-click on the PDS.wsdl file, and then select Open With.
c.) In Open With, select Notepad, and then click OK.
d.) When the file opens in Notepad, scroll down until you see the following indented line:
<soap:address location="http://servername/ProjectServer/PDS.WSDL"/>
e.) Verify that the name of your server appears instead of “servername.”
f.) If the PDS.wsdl file contains “servername," replace “servername” with the name of the
server where Microsoft Project Server is installed.
g.) Save and close the file.
Guide for New Microsoft Solomon Installations 77
Note: You must have administrative permission to open the enterprise global template in order to
perform this procedure.
6. When both the enterprise global template and PSAView.mpt are open, select Tools |
Organizer. Microsoft Project Organizer displays.
Figure 78: Organizer after Adding the PSA Accounting View to the Enterprise Global
9. Click the Tables tab.
80 Installation Guide
10. In PSAView, highlight PSA Accounting Table and click Copy >>. PSA Accounting Table appears
in the Checked-out Enterprise Global area.
16. To display the PSA Accounting View in Microsoft Project Professional, you must first close
Microsoft Project, then re-open it and select View | PSA Accounting View.
Note: Each user can specify a default view for Microsoft Project Professional by opening
Microsoft Project and selecting Tools | Options. On the View tab, select the Default view drop-
down to display the list of available views. Select a view and click OK.
82 Installation Guide
To make a specific view the default view for all users, open the enterprise global template and
select Tools | Options. On the View tab, select the Default view drop-down to display the list of
available views. Select a view and click OK.
Figure 82: Selecting the PSA Accounting View as the default view
9. Select Project Controller from the Module list. The Project Controller menu displays.
11. Click Microsoft Project Connector Setup. Microsoft Project Connector Setup (PA.MSP.00) displays.
Figure 85: Microsoft Project Connector Setup (PA.MSP.00), General Parameters tab
12. Select Activate Microsoft Project Connector.
13. Click the Microsoft Project Connection tab.
Figure 86: Microsoft Project Connector Setup (PA.MSP.00), Microsoft Project Connection tab
For more information about authentication methods, see “Setting Up Users for the Project
Connector” on page 61.
Guide for New Microsoft Solomon Installations 85
14. In Server URL Name, type the URL of the server that hosts the Microsoft Project Server application
environment.
15. If you select Windows Authentication, users are authenticated and authorized without any added
user intervention. If it is not selected, Microsoft Project uses Project Server authentication, which
involves prompting each user for credentials each time Microsoft Project is started. Selecting this
checkbox disables Project Server User ID and Password.
16. Project Server User ID is enabled if Windows Authentication is not selected. Type the user ID that
Project Management and Accounting will use to log on to Microsoft Project.
Note: If you elect to use Project Server authentication, be aware that the user ID in Microsoft
Project is case-sensitive. The user ID in this field must exactly match (in case sensitivity) the user
ID in Microsoft Project. The user Administrator is a built-in account in Microsoft Project and the “A”
must be capitalized if you choose to type it here. Furthermore, when new projects are initially
created in a Microsoft Solomon environment that uses Project Server authentication, the user
specified at Project Server User ID must log on to Microsoft Project Server and publish each new
project. Failure to do so results in the project being inaccessible to other users, including the
project’s manager, until the designated user publishes it to Microsoft Project Server.
17. Password is enabled if Windows Authentication is not selected. Type the password for the Project
Server User ID. The password is encrypted to prevent accidental discovery by unauthorized
persons.
18. After typing the information for all fields on this tab, click Test Connection to test the connection to
Microsoft Project Server. If the information supplied on this tab is correct, PC Message Number
1391, “Connection Successful,” appears.
19. Click the Solomon Connection tab.
Figure 87: Microsoft Project Connector Setup (PA.MSP.00), Solomon Connection tab
20. In Database Server Name, type the name of the server that hosts the Microsoft Solomon
databases.
21. In Application Database Name, type the name of the Microsoft Solomon application database that
will integrate with the Microsoft Project Server specified on the Microsoft Project Connection tab.
22. In System Database Name, type the name of the Microsoft Solomon system database used by the
application database specified in Application Database Name.
86 Installation Guide
23. In SQL Server User ID, type the user ID that Microsoft Project will use to log on to the Microsoft
Solomon database. Since the purpose of the SQL Server login is to transmit information between
the two server environments, be sure that the login is exactly the same as in Microsoft SQL Server
and set the permissions for this user ID accordingly.
24. In Password, type the password for the SQL Server User ID. The password is encrypted to prevent
accidental discovery by unauthorized persons.
25. After typing the information for all fields on this tab, click Test Connection to test the connection to
the Microsoft Solomon databases. If the information supplied on this tab is correct, PC Message
Number 1391, “Connection Successful,” appears.
26. Click Save.
27. Once you have confirmed that connectivity between the Microsoft Solomon and Project Server
databases is functioning correctly from all client workstations that are set up to use the
integration, you may need to clear Activate Microsoft Project Connector in Microsoft Project
Connector Setup (PA.MSP.00) until the implementation is complete. If you do not perform the
implementation of the Project Connector features when all client installations are complete, users
will have access to the integration features before they are properly configured. If you choose to
clear Activate Microsoft Project Connector until all implementation tasks have been completed,
Microsoft Project users who have the PSA COM add-in installed on their workstation will receive
the message “The Solomon Integration to Microsoft Project Server is not activated” each time they
connect to Microsoft Project Server.
Guide for New Microsoft Solomon Installations 87
Important: You must have Administrator rights on the computer due to the need to register
components.
> To install the integration components to Microsoft Project Professional 2002 or 2003:
1. Insert the Microsoft Solomon Volume 2 CD into the CD drive.
a.) If AutoPlay is enabled on the CD drive, the Microsoft Business Solution-Solomon setup
window automatically appears.
b.) If AutoPlay is not enabled, run Setup.exe in the root directory of the Microsoft Solomon
Volume 2 CD by choosing Start | Run and browsing to the CD drive.
2. Select Microsoft Project Connector. The Microsoft Project Connector for Solomon installation
screen appears.
4. Click Yes. Welcome displays, advising you to exit other Windows programs before continuing.
Figure 95: Microsoft Project toolbar customized with COM Add-Ins button
5. Click Close to close Customize.
6. Click COM Add-Ins. COM Add-Ins displays.
Important: Microsoft Project Connector for Solomon Setup copies PSAAddin.dll to …\WinNT (or
Windows) \System32, making it accessible to all users of each workstation. Browse to the System32
folder and select the file from there.
92 Installation Guide
Note: You might receive a message, “You are not connected to Solomon,” immediately after adding
the PSA add-in. The likely cause of this message is that the connection to Project Management and
Accounting has not been set up.
You might also see a logon prompt. If the connection to Project Management and Accounting is set up,
you can log on the add-in by providing the appropriate credentials.
10. Since the add-in loads when you start Microsoft Project, close Microsoft Project Professional, then
reopen it. If the Solomon Integration toolbar does not appear automatically, add it to Microsoft
Project by selecting View | Toolbars | Solomon Integration.
The Solomon Integration toolbar is small enough that you can place it on the same row as an
existing toolbar.
Note: Since the Solomon Integration toolbar writes data to the Microsoft Solomon database from
Microsoft Project, each user who has the COM add-in installed in Microsoft Project Professional must
also be a Microsoft Solomon user.
Guide for New Microsoft Solomon Installations 95
2. Map a network drive to the shared application folder on the server where the Microsoft
Solomon programs are installed. For example:
E:\<computer_name>\<share_name>
where:
<computer_name> is the computer name of the server.
<share_name> is the share name established for the directory above the Microsoft
Solomon directory on the server (for example, SolomonShare).
3. Run Setup.exe from the …\Wrkstn subdirectory to start the Microsoft Solomon client setup.
Welcome appears, advising you to exit other Windows programs before continuing.
Note: If Microsoft Solomon Setup detects an existing installation, it requires you to remove it
before continuing. Click Yes to uninstall. If existing Microsoft Solomon databases must be
made compatible with release 6.5, see “Updating an Existing Microsoft Solomon Installation”
on page 101.
Start Copying Files appears, displaying the disk space required to complete the installation.
Note: Possible cleanup of the registry keys may be needed. Contact your system administrator for
assistance with this task.
Guide for New Microsoft Solomon Installations 99
Crystal Enterprise — In Crystal Reports Setup, you may be asked if you want to install Crystal
Enterprise. Crystal Enterprise is not included with Microsoft Solomon and is not supported by
Technical Support.
When using Crystal Reports with Microsoft Solomon, keep the following in mind:
• Microsoft Solomon does not use Crystal Reports dictionaries.
• Crystal Reports supports Microsoft Solomon user access control. Any user who is in
Crystal Reports is counted as a Microsoft Solomon seat license.
• To access Crystal Reports, you must be logged on to Microsoft Solomon using a valid user
ID and password.
• Crystal Reports service packs from Crystal Decisions are not compatible with Crystal
Reports for Microsoft Solomon. Microsoft Business Solutions provides these service
packs.
Note: Due to changes in the standard reports, customized reports from Microsoft Solomon 4.x
and 5.x may not run without modification. Contact your authorized Microsoft Solomon partner
or certified consultant if your customized reports do not run with Microsoft Solomon.
Updating an Existing Microsoft Solomon Installation 101
Update Prerequisites
Create a backup of the application server, including all custom Crystal Reports so that they can be
restored after Microsoft Solomon is installed.
Important: Microsoft Solomon 4.10 or higher is required in order to update directly to release 6.5. If
you currently use a release older than Microsoft Solomon 4.10, contact your authorized Microsoft
Solomon partner or certified consultant about how to upgrade your Microsoft Solomon environment to
Microsoft Solomon 4.10 so that you can install Microsoft Solomon 6.5.
To verify the Microsoft Solomon release currently installed, see “Which Microsoft Solomon edition?” on
page 5 of the Pre-Installation Checklist.
102 Installation Guide
On the “Pre-Installation Checklist” on page 5, you were instructed to remove any existing 32-bit
release of Microsoft Solomon (release 4.x or later) from all client workstations and from the server
where it is installed before you start your Microsoft Solomon 6.5 installation. Otherwise, Microsoft
Solomon 6.5 Setup will require that you do so and will initiate the removal before starting the
Microsoft Solomon 6.5 installation.
If you missed those steps, you can perform them now.
9. When the uninstall process completes, click Details to view any files that could not be
removed.
10. View your file system to make sure the Solomon or Solomon IV folder (often under \Program
Files) was removed. If it still exists, delete it.
11. Reboot your computer.
12. Make sure no registry files appear in the Microsoft|Solomon program area of the registry.
Enlist the assistance of someone in your organization who is an expert on working with the
registry or call Microsoft Solomon Technical Support; see “Appendix E: Microsoft Solomon
Support” on page 133 for contact information.
104 Installation Guide
Updating Databases
Before updating databases for use with Microsoft Solomon Release 6.5, make sure you first upgrade
your version of Microsoft SQL Server to Microsoft SQL Server 2000 Standard Edition with Service
Pack 3a or Service Pack 4. To purchase your upgrade, contact your authorized Microsoft Solomon
partner.
Important Points:
• Back up all Microsoft Solomon system and application databases before beginning the following
procedure.
• The update procedure deletes all standard Microsoft Solomon data in three system database
tables: Messages, Screen, and Rptcontrol. It then imports the current Microsoft Solomon required
data and repopulates the three tables.
• All records that you added to the Messages, Screen, or Rptcontrol table will remain intact. If
changes were made to standard records in these tables, however, the changes will be overwritten.
If changes were made to the database schema, it will be necessary to verify that these changes
are still in place after the update to Microsoft Solomon Release 6.5 is complete.
• The ScreenCategory and ScreenMenu records that define the menu for the EVERYONE user group
are replaced during an upgrade. Any changes or additions that you have made to these records
will be lost after you install Microsoft Solomon Release 6.5.
The Database Maintenance (98.290.00) utility can update Microsoft Solomon databases based on a
single scenario, 4.1x/4.2x/4.5x/5.x/6.x to 6.5.
> To update Microsoft Solomon databases:
1. Log on to the database server as the Administrator.
2. Back up all Microsoft Solomon system and application databases.
Updating an Existing Microsoft Solomon Installation 105
3. From the Start menu, select the Database Maintenance icon in the Microsoft Solomon
program folder. Database Maintenance (98.290.00) appears.
5. After you click OK in either the SQL Master60sp Login or the Login dialog box, Default
Password appears.
Note: If the update was unsuccessful, you will not see this message. Instead, a database
update failure message will appear.
9. Click OK.
10. Click Close.
11. Review the Dbbuild.log file in the \Eventlog folder. A successful database update results in a
zero-byte Dbbuild.log file.
12. Follow the instructions in “Using Database Update after Completing the Database
Maintenance Scenario” on page 109 to continue the database update process.
13. Repeat this process for each remaining system database and respective application
databases.
108 Installation Guide
Prepare SQL Server 7.0 Databases for running with SQL Server 2000
The Prepare SQL Server 7.0 Databases for running with SQL Server 2000 scenario is required to
ensure that Microsoft Solomon databases are ready for use with Microsoft SQL Server 2000.
Before running a database update scenario, make sure that you have upgraded your Microsoft SQL
Server to at least Microsoft SQL Server 2000 Standard Edition with Service Pack 3a or Service Pack 4.
See “Updating Databases” on page 104 for more information.
Note: Do not run the Prepare SQL Server 7.0 Databases for running with SQL Server 2000 scenario if
you have not upgraded from SQL Server 7.0 to SQL Server 2000. If it is necessary for you to use this
scenario, it should be run after a SQL Server 7.0 database has been upgraded to SQL Server 2000
and before logging on to the database in Microsoft Solomon.
After the Microsoft Solomon databases have been upgraded to SQL Server 2000 and before running
Microsoft Solomon, prepare the databases.
1. Run Database Maintenance (98.290.00).
2. Click the Update Databases tab.
3. In Update Scenarios, click Prepare SQL Server 7.0 Databases for running with SQL Server 2000.
4. Click Update Database.
This process takes a short time and allows Microsoft Solomon to access the databases on a SQL
Server 2000 database server.
Updating an Existing Microsoft Solomon Installation 109
Note: Populating the Screen table occurs during database creation (databases are created using
Database Maintenance (98.290.00)). The Screen.csv file is no longer a part of Database Update
(DB.UPD.ATE).
Note: If Active Directory is being used, you must log on as a member of the Domain
Administrators group, which in turn needs to be part of the local Administrators group.
2. Map a network drive to the shared application folder on the server where the Microsoft
Solomon programs are installed. For example:
E:\<computer_name>\<share_name>
where:
<computer_name> is the computer name of the server.
<share_name> is the share name established for the directory above the Solomon
directory on the server (for example, SolomonShare).
3. Run Setup.exe from the …\Wrkstn subdirectory on the server where Microsoft Solomon is
installed to start the Microsoft Solomon client setup. Welcome appears, advising you to exit
other Windows programs before continuing.
Note: If the Microsoft Solomon Setup program detects an existing client installation, it
requires you to remove it before continuing. Click Yes to uninstall. If existing Microsoft
Solomon databases must be made compatible with release 6.5, see “Updating an Existing
Microsoft Solomon Installation” on page 101.
Note: In most cases, opening and saving custom reports is sufficient for updating them to version 10.
However, in certain cases it may be necessary to make minor report layout adjustments to your
custom reports to ensure that the output is acceptable. For example, you may notice that a field value
on a custom report is truncated. If you experience this problem, open the affected report in Crystal
Reports and extend the length of the truncated fields.
Expect that you may need to adjust the layout of custom reports as necessary whenever the version of
Crystal Reports integrated with Microsoft Solomon changes.
Troubleshooting 113
Troubleshooting
Restoring Microsoft Solomon System Database Table
Views
Two occurrences can create the need to restore the Microsoft Solomon system database table views:
• Dropping views in an application database
• Changing the name of the system database
Note: The following procedures must be performed by the Microsoft Solomon system administrator.
Terminology Definitions
This section defines terms associated with Microsoft Solomon:
• View — A view is an alternate way of looking at data in one or more tables. Microsoft Solomon
uses database views in many reports to facilitate the multi-company or inter-company
implementation. To continue the company metaphor, we view the system database’s Company
table.
• Index — An index is a set of pointers that are logically ordered by the values of a key. Indexes
provide quick access to data and can enforce uniqueness on the rows in a table. Indexes are used
everywhere in Microsoft Solomon. They are foundational to the performance of a database
structure.
• Stored Procedure — A stored procedure is a multi-statement compiled Transact-SQL query with
control-of-flow language that can take parameters and allows user-declared variables, conditional
execution, and other powerful programming features. Stored procedures are used within Microsoft
Solomon to perform tasks such as database navigation and possible values lookups. They are
also used in database views.
• Proper Order of Rebuild — If a view is incorrect or dropped due to an error, the proper order of
build is the correct way to recreate the view and the underlying components on which the view
depends.
• Backup/Restore — Backup/restore is the process of making a physical backup copy of a database
and subsequently restoring the database from the backup to the computer system.
Backup/restore implements the standard Microsoft SQL Server Backup and Restore utility
programs.
• Registered Controls — A registered control is an object with a visible interface used within
Microsoft Solomon. Control examples include text boxes in a Microsoft Solomon screen,
Swimapi.dll, and Solomon Customization Manager components. Here, the scope of registered
controls is limited to installing, registering, and unregistering critical controls. It includes common
issues that may cause conflict when you are removing Microsoft Solomon.
• Solomon.ini File — The Solomon.ini file is used by Microsoft Solomon applications to control user-
specific and global preferences in the Microsoft Solomon environment.
Technology Tidbits
Recommended Protocols for Microsoft SQL Server
• TCP/IP Sockets is the recommended protocol for production environments. TCP/IP is the
communication protocol used by the server and workstation and is also the standard Internet
protocol. Sockets transport database calls across the TCP/IP protocol. The terms TCP/IP Sockets
and Sockets are used interchangeably.
116 Installation Guide
• NetBEUI and Named Pipes are a protocol alternative to TCP/IP Sockets. NetBEUI is the
communication protocol used by the server and workstation. Named Pipes is a method of
transporting database calls across the NetBEUI protocol. The terms NetBEUI/Named Pipes and
Named Pipes are used interchangeably.
Note: Use the SQL Server Client Configuration Utility to validate proper protocols on the workstation
and the server. The protocols on both machines must match in order to establish a connection.
Company Record
The central storage point for companies, the company record in the system database cross-references
the application database(s) where a company’s financial data is stored. Since companies can have a
one-to-one or a one-to-many relationship of company to application database, the Company table is
the central cross-reference for all companies.
Preset companies exist within the demo databases included on the Microsoft Business Solutions–
Solomon Release 6.5 Volume 1 CD. These databases are built from the \Solomon\Demo database
subdirectory. They contain these companies and application databases:
Note: Should you need to recreate database views, certain activities must subsequently occur to
complete the process. This is due to the nature of the company metaphor throughout the database.
See “Appendix A: Microsoft SQL Server Optimization Notes” on page 121 for more information.
Troubleshooting 117
Registered Controls
Microsoft Solomon’s 32-bit architecture introduced the use of registered controls. These controls can
range from add-on product controls that facilitate data input to Microsoft Solomon’s kernel file
Swimapi.dll. Registered controls are installed and registered in the workstation’s Registry database.
Microsoft Solomon 6.5 setup automatically installs and registers the necessary components. After
Microsoft Solomon 6.5 is installed on a server, the following components are installed:
• Solomon — Program files for Microsoft Solomon
• Solomon Release 6.5 Client — Controls required to run Microsoft Solomon
You must remove any existing Microsoft Solomon client installation before beginning Microsoft
Solomon Release 6.5 installation. If you do not, Microsoft Solomon Release 6.5 may not install
correctly.
You must remove all client workstations before removing the server components. If you do not,
Microsoft Solomon Client will not uninstall correctly.
Improperly removing Microsoft Solomon Release 6.5 can result in unusual program behavior and
unexpected results. The recommended procedure for removing Microsoft Solomon Release 6.5 is
described in “Removing Microsoft Solomon Workstation Components” and “At the server where
Microsoft Solomon is installed, open the Windows Control Panel.” on page 102.
Solomon.ini
Microsoft Solomon uses the Solomon.ini file to save workstation-specific information such as the last
database that was logged on to, printer preferences, and other settings.
Solomon.ini is divided into sections indicated by double brackets [ ]. Each section performs its own
characteristic functions. See the System Manager Manual Appendix A for more information on the
Solomon.ini settings. For example, the [Company] section stores local company login information.
Under each section are several settings that control the workstation’s options.
[Company] — Company section
CompanyID=0010 — CompanyID setting
UserID=SYSADMlN — UserID setting
Solomon.ini is specific to the local workstation and stored in \Windows (or \Winnt) folder. If a setting
or section is not found in the Solomon.ini, the program looks in alternate locations. The behavior
occurs in the following order:
1. After executing Parent.exe, Microsoft Solomon looks for \Windows\Solomon.ini on the local client
workstation.
2. If Solomon.ini does not exist, the program creates it with just the basic sections needed. These
sections are [System32 Database] and [Company].
3. For sections Parent.exe does not find locally, the program then looks in the Solomon.ini in the
same tree structure from which Parent.exe was called on the server.
4. If a setting is not found in the local Solomon.ini, it is obtained from the server’s Solomon.ini.
A section and settings in the local \Windows\Solomon.ini overrides the same section and detail line(s)
in the shared Solomon.ini on the server. If a setting is found in the local Solomon.ini, it overrides the
settings in the server’s Solomon.ini.
Appendices 121
Appendices
Appendix A: Microsoft SQL Server Optimization Notes
This Appendix presents information on installing and setting up Microsoft SQL Server to operate with
Microsoft Solomon Release 6.5.
7. Set Minimum (MB) to 0MB. Set Maximum (MB) by moving the slider to the right approximately
80%.
The following chart is provided as a guideline:
5. In System Database Name and Databases, select the system and application databases to
which the Microsoft Solomon updates apply.
6. In Update Scenarios, select the option Field and Record Maintenance Update.
7. Click Update Database to apply the update to the databases.
Appendices 127
3. Choose File | Open, browse to the folder specified in step 6 on page 73 (such as,
…\Inetpub\wwwroot\PSA\), and select file PA_Connect.sql.
Note: You must decide whether to save the changes made to the file. You might choose not to
save changes for security reasons — remember that the file now contains the administrative
password for SQL Server.
16. Open a command line window by clicking Start | Run. At Open, type cmd.
Figure 135: Pasting the command into the command line window
Note: The following statements executed at a command prompt would accomplish the correct
moves from a Microsoft Solomon CD in Drive D:
Note: The ViewDrop sub-directory must also be re-created in this following path with access
available to all Microsoft Project Server users: C:\Program Files\Microsoft Project
Server\Bin\ViewDrop
132 Installation Guide
Right-click the ViewDrop folder and select Security. Verify these accounts and permissions:
Full Control permissions:
Administrators group
System
Read and Write permissions:
Authenticated Users
Internet Guest accounts
Appendices 133
Microsoft Solomon Technical Support Guaranteed and Premium Support clients only
• Via Phone 888-477-7877
• Via Internet www.microsoft.com/BusinessSolutions
Index
A E
Access control 21 Edition 5
Account lockout policy 20 Solomon Professional 6
AcctXRef record 116 Solomon Standard 6
Adding PSA COM add-in to Microsoft Project Employees, security considerations 16
Professional 90 Empty application database, preparing 49
Administrative rights 13, 16 Empty system database, preparing 49
Antivirus software 22 Existing Microsoft Solomon installations 101
Audience 1 removing 102
Authentication 18, 22
B F
File-infecting viruses 23
Backup procedures 117 Firewalls 22, 24, 26
Baseline Security Analyzer 29
Boot sector viruses 23
Bulletins, security 29 H
Hardware firewalls 22, 24, 26
C
Cashier security considerations 16
Checklist, pre-installation 5
I
Client workstation setup Implementation planning security 13
executing Microsoft Solomon from Inheritance of permissions 21
the local client workstation 98 Installation
Client workstations, updating 110 Crystal Reports 57
Company record 116 Crystal Reports on local
Computer name 5 workstation 98
Connector functionality, restoring 129 existing Microsoft Solomon
Creating applications 101
databases 40 integration components to Microsoft
Creating manually stored procedures and Project Professional 2002 client
table PA_Connect 125 workstation 87
Crystal Reports 57 Microsoft SQL Server 39
installation on local workstation 98 preparation 3
installing 57 Project Connector 71
updating 112 PSA Accounting View to Microsoft
Custom Crystal Reports, updating 112 Project Server 2002 77
support products 50
using Microsoft Solomon CDs 31
D Internet connection firewalls 22, 24, 26
ISA Server 2004 24
Database
creating 40
demo 6
updating 104
L
DB update LAN security strategies 24
using after completing database Local area network security strategies 24
maintenance scenario 109 Lockout policy 20
Demo Logging on
database 6 authentication 18
preparing application database 47 single sign-on 22
preparing system database 47 using demo application database 47
Device firewalls 22, 24, 26 using demo system database 47
136 Installation Guide
M P
MBSA 29 Passwords 19
Microsoft Baseline Security Analyzer 29 Perimeter networks 24
Microsoft Internet Security and Permissions 21
Acceleration 24 Physical security 15
Microsoft Office Project Connector for Planning security 13
Solomon 61 Pre-installation checklist 5
Microsoft Project Professional Preparing
Adding PSA COM add-in 90 demo application database 47
Microsoft Security Bulletin search tool 29 demo system database 47
Microsoft Security Notification Service 29 empty application database 49
Microsoft Software Update Services 29 empty system database 49
Microsoft Solomon SQL Server 7.0 databases for running
CD installation 31 with SQL Server 2000 108
CDs 31 Prerequisite update 101
edition 5 Procedures
installation setup options 11 backup 117
installation tasks 3 restore 117
installations 3 Project Connector 61
installing existing applications 101 installation 71
Internet addresses 131 setting up users 61
new installations 31 Protocols for Microsoft SQL Server 115
phone numbers 131 PSA Accounting View installation 77
setup on workstations 95 PSA COM, adding add-in to Microsoft Project
support 131 Professional 90
technical resources 115
uninstall workstation
components 102, 119 R
updating client workstations 110
workstation components Record
uninstall 102, 119 AcctXRef 116
Microsoft SQL Server company 116
2000 1, 7 Registered controls 119
2000 security settings 30 Removing existing Microsoft Solomon
installation 39 installations 102
optimization notes 121 Restore
recommended protocols 115 connector functionality 129
supported versions 121 database view 113
version 200 0 121 procedures 117
Microsoft Systems Management Server Rights
Software Update Services Feature administrative 13, 16
Pack 30 Windows user 21
Risk management See Security
N S
Network security 24
Notification Service, Security 29 Schema, updating application database 123
Security
access control 21
O account lockout policy 20
administrator responsibilities 16
Object auditing 21 authentication 18
Object ownership, Windows Server best practices 13
security 21 bulletins and updates 29
Operating systems employees and 16
security 18 firewalls 22, 24, 26
update management 29 ISA Server 2004 24
Overview 3 network 24
Owners, object ownership 21 Notification Service 29
object auditing 21
object ownership 21
overview 13
Index 137
passwords 19 Update
permissions 21 application database with Microsoft
physical 15 Solomon Schema information 123
single sign-on 22 custom Crystal Reports 112
SQL Server 2000 settings 30 databases 104
virus protection 22 databases from 4.1x through 6.x to
Windows Server best practices 18 6.5 105
Server components, uninstall 102 Microsoft Solomon client
Setting up workstations 110
client workstation 98 prerequisites 101
connection between Microsoft Project User rights, Windows Server security 21
and Microsoft Solomon Users setup 61
databases 82 Using
Microsoft Solomon on DB update after completing database
workstations 95 maintenance scenario 109
Microsoft Solomon options 11 SQL Server optimization within
Solomon Web Order module 56 Microsoft Solomon 116
users 61
Single sign-on 22
SMS Software Update Services Feature V
Pack 30
Software Virus protection 22
antivirus programs 22
firewalls 22, 24, 26
Update Services 29 W
Solomon Web Order module setup 56
Solomon.ini 119 Web Order
SQL Server 7.0, preparing databases for module setup 56
running with SQL Server 2000 108 starter site 50
SQL Services Service Web Order Starter Site
start 9, 10 installation 50
Stored procedures and table PA_Connect, requirements 50
manually creating 125 system information 50
Strong passwords 19 Websites
Support for security information 23
Microsoft Solomon 131 for virus protection information 23
product installation 50 Windows Server operating systems
Supported Microsoft SQL Server security 18
versions 121 See also Operating systems
SUS 29 Wireless networks 26
System database Workstation
preparing 49 client setup 98
preparing demo 47 setting up Microsoft Solomon 95
Systems Management Server Software uninstall components 102, 119
Update Services Feature Pack 30
T
Technical resources for Microsoft
Solomon 115
Technology tidbits 115
Terminology definitions 115
Tools for Visual Basic 8
Trojan horse programs 23
Troubleshooting 113
restoring a database view 113
U
Uninstall
Microsoft Solomon workstation
components 102, 119
server components 102