What are the security risks for opening port 80 on workstations?

Hello all,
in our environment, there is an application which open port 80 on workstations when installed, but it is not allowed on preimeter FW
could you please advise what are the security risks for leaving port 80 opened on the workstations? or it is considered secure unless it is not allowed on the preimeter FW?
thanks alot & regards

Hi R.Naguib.
The 80 port is open by default through the firewall on Windows system, it is used by a http protocol by a browser.
As for the network or hardware Firewall settings, I suggest to turn to the network administrator for details.
Regards
Wade Liu
TechNet Community Support

Similar Messages

  • What are the best tools for opening very large XML files and examining the tree and confirming they are valid?

    I am generating some very large XML files (600,000+ lines, 50MB+ characters). I finally have them all being valid XML and valid UTF-8.
    But the files are so large Safari and Chrome will often not open them. FireFox will though.
    Instead of these browsers, I was wondering if there are there any other recommended apps for the Mac for opening and viewing the XML, getting an error message if they are not valid for some reason and examing the XML tree?
    I opened the file in the default app for XML which is Xcode, but that is just like opening it in a plain text editor. You can't expand/collapse the XML tree like you can with a browser, and it doesn't report errors.
    Thanks,
    Doug

    Hi Tom,
    I had not seen that list. I'll look it over.
    I'm also in touch with the developer of BBEdit (they are quite responsive) and they are willing to look at the file in question and see why it is not reporting UTF-8 errors while Chrome is.
    For now I have all the invalid characters quashed and things are working. But it would be useful in the future.
    By the by, some of those editors are quite pricey!
    doug

  • What are the security settings to lock down a form with fillable fields and yet allow someone with Reader to fill in the fields as will as save the form and print it?

    What are the security settings to lock down a form with fillable fields and yet allow someone with Reader to fill in the fields as will as save the form and print it?

    You want to allow someone to open your document and fill out the form (in the fields you have created), but not change or edit the form, right? Here's the answer - assuming you are using Acrobat Pro and someone will be opening the PDF using at least Acrobat Reader 9 and up:
    Tools > Protection > Encrypt < Encrypt with Password
    Answer YES to change the security.
    A new window opens:
         Do NOT select Document Open (or that will require a password to open the document.)
         Select: Permissions (Check the box next to "Restrict editing and printing of the document.")
         Change the following 2 settings from the drop-down box:
              Printing Allowed: Select High Resolution
              Changes Allowed: Select Commenting, filling in form fields, and signing signature fields
              Leave selected: "Enable text access for screen reader devices for the visually impaired"
              Change Permissions Password (insert a strong password)
              Leave all other settings alone in "Options"
              OK - OK
              Re-enter the Permissions Password (the one you entered above)
              OK - OK
              Save the PDF to apply the security [notice that (SECURED0 will appear after the document title]

  • What are the correct settings for my WRT54GS for using remote access on a Windows Home Server?

    I can not remotely access my Windows Home Server from outside.  What are the correct settings for my WRT54GS?

    I have opened ports 80, 443,and 4125 to PCP.  The  router address is http://192.168.1.1, my address is 221.40.138.170.
    Thank you.

  • What are the major risks buying used lenses ?

    i just bought my first dslr,  and i was wondering what are the major risks buying used lenses ?

    You need to be able to inspect and test the lens.
    Look for obvious signs of physical damage, drops, etc. (cracks, dents, etc.)  A lens normally will get some signs of wear but as it's a used lens, you expect *some* wear... you're really looking for signs of damage.
    Remove both front and rear caps.  Look through the lens into a bright no-contrast background (a white wall, a blue sky, etc.) and check the optics.  You're looking for signs of mold growth or damage to coatings.  Minor dust on internal optics wont impact the lens performance... so while you wouldn't want major amounts of dirt... don't worry too much about minor bits of dust (I've actually helped prove this to someone by clipping a 3M PostIt note down to a tiny 1/4" x 1/4" size and sticking it on the front glass.  Take a photo... nothing shows in the photo (even a piece of "dirt" that big wont show because the camera cannot focus on anything that close to the lens.)  
    Rotate the focus ring from end to end.  You should feel a smooth and consistent amount of friction as you rotate the focus ring.  There should be no rough spots.  Listen to the lens as you do this... there should be no grinding noises.
    Do the same with the zoom ring but in addition to checking for smooth consistent performance (no sticky or rough spots) you're also checking to make sure nothing seems excessively worn (nothing wobbles loose... very heavily used lenses can do that after enough wear.)
    Connect the lens to the camera and make sure the camera can completely operate the auto-focus motors without a problem and/or if it's an image stabilized lens that the IS components are working.
    Set the camera to max aperture (e.g. f/22, f/32.. depending on the lens) and press your camera's "depth of field preview" button (if you don't know which button is your DOF preview, check your manual.  Canon tends to move that one around a bit but it's almost always on the front side of the camera near the lens mount.)  You want to press and release it a few times.  This will cause the lens aperture blades to stop down to the aperture you set.  Release... do this while watching the lens.  You should see the aperture blades move in and out (well... they snap in and out very quickly).  You want to make sure it works ok, the camera gets no error codes, and there's no signs that anything is sticking.
    And then there is the focus test... 
    Focus the camera preferably at a FLAT surface that has lots of detail.... such as the brick wall of a building.  Make sure the camera is level and that the camera's focal plane is parallel to the plane of the wall.  Take a test photo at low f-stop and inspect.  You're checking to verify that the focus works and that the focus is reasonable across the image.   As you inspect from left ot right and top to bottom you are looking to make sure the focus is more or less equal (if the right side of the image is focused... but the left side of the image is soft... it would indicate that lens elements are skewed (lens isn't collimated).  It's difficult for a lens to get into this situation unless it was dropped and you'd probably see signs of damage.  
    Tim Campbell
    5D II, 5D III, 60Da

  • What are the basic steps for creating a content repository?

    I am trying to create a document store on a file system (fsdb) that will hold files that are ftp's to that location. Is this possible using KM? If so, what are the basic steps for creating a file system repository and using it through KM? I have found stuff on help.sap.com but that only tells you what each component does not what actual steps need to be taken to setup KM, such as user rights , creating an entry point, so that all of KM is not visible, etc...
    If anyone knows of any guides that show a step by step process that would be great too.
    Thanks
    Paul

    Hi Paul
    First of all you need to create a new repository
    Suppose you want to add all the documents under folder Paul under C: Drive
    (Even you can put whole documents of C: drive into Paul)
    Navigate to System Admin -> System Configuration -> Knowledge management -> Content Management -> Repository Manager -> File System Repository
    There you can create a new directory by clicking on button New
    Give the parameters as follows :-
    Name               :           Anything you like
    Description       :           Anything you want
    Prefix (must start with /)  :  Probably same as your repository name like \Paul
    Lookup mode : caseless
    Root Directory   :  C:\Paul
    NOTE:  This is the trick. You need to give the proper path means folder path which you want use as repository)
    Repository Services  :  Any services you want
    Property Search : Managercom.sapportals.wcm.repository.manager.generic.search.SimplePropertySearchManager
    Security Manager         :           AclSecurityManager
    ACL Manager Cache   :           ca_cm_rep_acl
    The save it
    Now see whether the same repository is coming under KM Content or not, if not may be after restart it will come.
    I think the above information will help you. If still you have problem, please feel free to contect me.
    Regards,
    Chamkaur

  • What are the best approaches for mapping re-start in OWB?

    What are the best approaches for mapping re-start in OWB?
    We are using OWB repository 10.2.0.1.0 and OWB client 10.2.0.1.31. The Oracle version is 10 G (10.2.0.3.0). OWB is installed on Linux.
    We have number of mappings. We built process flows for mappings as well.
    I like to know, what are the best approches to incorportate re-start options in our process. ie a failure of mapping in process flow.
    How do we re-cycle failed rows?
    Are there any builtin features/best approaches in OWB to implement the above?
    Does runtime audit tables help us to build re-start process?
    If not, do we need to maintain our own tables (custom) to maintain such data?
    How did our forum members handled above situations?
    Any idea ?
    Thanks in advance.
    RI

    Hi RI,
    How many mappings (range) do you have in a process flows?Several hundreds (100-300 mappings).
    If we have three mappings (eg m1, m2, m3) in process flow. What will happen if m2 fails?Suppose mappings connected sequentially (m1 -> m2 -> m3). When m2 fails then processflow is suspended (transition to m3 will not be performed). You should obviate cause of error (modify mapping and redeploy, correct data, etc) and then repeat m2 mapping execution from Workflow monitor - open diagram with processflow, select mapping m2 and click button Expedite, choose option Repeat.
    In re-start, will it run m1 again and m2 son on, or will it re-start at row1 of m2?You can specify restart point. "at row1 of m2" - I don't understand what you mean (all mappings run in Set based mode, so in case of error all table updates will rollback,
    but there are several exception - for example multiple target tables in mapping without corelated commit, or error in post-mapping - you must carefully analyze results of error).
    What will happen if m3 fails?Process is suspended and you can restart execution from m3.
    By having without failover and with max.number of errors=0, you achieve re-cycle failed rows to zero (0).This settings guarantee existence only two return result of mapping - SUCCSES or ERROR.
    What is the impact, if we have large volume of data?In my opinion for large volume Set based mode is the prefered processing mode of data processing.
    With this mode you have full range enterprise features of Oracle database - parallel query, parallel DML, nologging, etc.
    Oleg

  • What are the pre requisites for SPLIT VALUATION OF A MATERIALS

    Dear friends
    What are the pre requisites for creating SPLIT VALUATION for  A MATERIAL in particular Plant
    regards
    Radha

    Hi,
    I am not sure what you mean exactly.
    But you would need to have the valuation category and all of the valuation types created in config in advance.
    Then you can allocate the appropriate valuation category to the material (accounting view) (as long as no stock or open POs etc. exist).
    then you can create your additional accounting views (one for each valuation type that you want to use).
    Steve B

  • What are the security implications of having JAVA running on my Mac Book Pro?

    What are the security implications of having JAVA running on my Mac Book Pro?

    Java on the Web (not to be confused with JavaScript, to which it's not related, despite the similarity of the names) is a weak point in the security of any system. Java is, among other things, a platform for running complex applications in a web page, on the client. That was always a bad idea, and Java's developers have proven themselves incapable of implementing it without also creating a portal for malware to enter. Past Java exploits are the closest thing there has ever been to a Windows-style virus affecting OS X. Merely loading a page with malicious Java content could be harmful.
    Fortunately, client-side Java on the Web is obsolete and mostly extinct. Only a few outmoded sites still use it. Try to hasten the process of extinction by avoiding those sites, if you have a choice. Forget about playing games or other non-essential uses of Java.
    Java is not included in OS X 10.7 and later. Discrete Java installers are distributed by Apple and by Oracle (the developer of Java.) Don't use either one unless you need it. Most people don't. If Java is installed, disable it — not JavaScript — in your browsers.
    Regardless of version, experience has shown that Java on the Web can't be trusted. If you must use a Java applet for a task on a specific site, enable Java only for that site in Safari. Never enable Java for a public website that carries third-party advertising. Use it only on well-known, login-protected, secure websites without ads. In Safari 6 or later, you'll see a lock icon in the address bar with the abbreviation "https" when visiting a secure site.

  • What are the best practices for generating an EPS logo from InDesign?

    Our costomer is running into technical issues with the logo we sent them, which was exported from Indesign. Images were not embedded and fonts missing. I was able to embed the images and fonts. However, we DO NOT want them to be able to make any text changes. So after exporting an eps, I opened the file in Adobe Illustrator and made all the text outlines. I hope this works. But I just wanted to post the question on what are the best practices for doing this?
    The client needs the logo with transparent background, images emebdded and type in outlines. Also, they need some space around the text. When I exported the eps, the file is right up on the edge of the type.

    It sounds like you are pretty far from "best practice" with regard to logo design and delivery.
    These days, the very use of the EPS format should be considered bad practice, and some other terms in your post, (i.e., 'images,' 'missing fonts'), make it sound like there is not a seasoned logo designer involved.
    That said, you probably already got the advice you need to get out of the immediate jam. However, without proper logo design, you and the client will soon be facing other problems. You should be delivering a 100% vector graphic in single-color (black) and corporate-color(s) versions, with no live font data, that has been test-scaled to very small and very large sizes; ensuring it will work at postage-stamp size and on the side of a truck or building, with specific spot color(s) and proportions that will enable it to be offset printed, embroidered and screen-printed on apparel, and cut into signage materials and decals.

  • What Are the Security Implications of not Completely Signing Database?

    Hello everyone,
    What are the security implications of not completely signing the database?
    From http://www.archlinux.org/pacman/ ,
    The following quote implies that the database exists merely just in case hand tweaking is necessary:
    maintains a text-based package database (more of a hierarchy), just in case some hand tweaking is necessary.
    However, considering that there are cases that pacman's local database needs to be restored, there are implications that the database is essential for pacman to function properly.
    From https://wiki.archlinux.org/index.php/Ho … l_Database :
    Restore pacman's local database
    Signs that pacman needs a local database restoration:
    - pacman -Q gives absolutely no output, and pacman -Syu erroneously reports that the system is up to date.
    - When trying to install a package using pacman -S package, and it outputs a list of already satisfied dependencies.
    - When testdb (part of pacman) reports database inconsistency.
    Most likely, pacman's database of installed software, /var/lib/pacman/local, has been corrupted or deleted. While this is a serious problem, it can be restored by following the instructions below.
    I know that all official packages (from core, extra, community, etc.) are signed so that all files should be safe, but I'm just paranoid.
    What if the database was hacked?  Will this lead to installation of harmful software?
    Sincerely,
    Cylinder57
    Last edited by Cylinder57 (2012-10-15 03:42:31)

    Cylinder57 wrote:
    From this quote:
    Allan wrote:But, the OP (also?) talks about the local package database on his computer.  That is not signed at all as there is no point.  If someone can modify that, then they can regenerate the signature, or just modify any other piece of software on your computer.
    Is it going to be easy for anyone other than the authorized user to modify the local package database?
    Allan basically answered that with the quote above already as I understand it. Someone who has access to the installation, e.g. is able chrooting your PC via USB, is not held back by any ACLs. However, modifying the local database only makes limited sense because the packages are already installed. Pacman would only recheck, if you re-install a package. The only really relevant attack vector for the package database is
    (1) installing an older package with a vulnerability,
    (2) re-placing the up-to-date package sig in the local database with the older one and
    (3) modifying the system, e.g. via pacman.conf excludes, to not update that.
    then also re-installing would not create a sig-error and you get stuck with the bogus old package.
    With a signed database this would not be possible. However, as Allan wrote earlier also with a signed database that criminal can manually install (totally leaving pacman & package cache) whatever it needs in this scenario. So, if you are -really- paranoid about that, you probably want to spend (a lot of configuring) time with something like the "aide" package.
    Cylinder57 wrote:
    And, are the following statements correct:
    If the repository databases are modified, the hacker might be able to modify the packages on the server (Considering that if someone can modify the local package database, that person can modify any other piece of software on that particular computer.)
    However, pacman won't let users from installing the modified packages (due to package signing,) unless at one person with access is bribed (at least, for an individual package.)
    I don't know the intricacies of the server infrastructure - only saw they have great names :-), but I am pretty certain your statements assume that correctly. It is pretty unlikely that someone able to modify the central repository database fails at placing a bogus package for shipping with those access rights at this time. Yet it does no harm not to post any details of such a scenario here imo. In any case: A compromised mirror would be enough for that - and easier to achieve (hacked anywhere or e.g. in a non-democratic state). Plus you also answered it yourself. The keys are key for our safety there. Which keeps me hoping that no criminal lawnmover salesmen frequent the Brisbane area.
    As you put up a thread about this, one question you can ask yourself is:
    Have you always checked on updates new signatures keys which pacman asks about? If you ever pressed "accept/enter" without checking them out-of-band (e.g. the webserver), that compromised mirror database might have just created a "legitimate" key .. user error, but another attack vector the database signing would catch.
    edit: Re-thinking the last paragraph just after posting, I now believe it would not be that easy as implied - simply because the bogus key is not trusted by one of the master keys. The pacman pgp trust model should catch that without database signing. At least it would if only the official repositories are activated, but that's a pre-requisite to the whole thread.
    Last edited by Strike0 (2012-10-20 23:01:26)

  • FAQ: What are the best resources for After Effects CS6?

    Listed are select troubleshooting and "how to" resources for After Effects CS6.
    After Effects CS6 troubleshooting resources
    I'm having trouble downloading and installing After Effects. What do I do?See troubleshooting documents, post in the Downloading, Installing, Setting Up forum, or contact support. For details, see this blog post or this FAQ.
    What are the system requirements for After Effects CS6?See this article.
    Does After Effects CS6 work with Mac OS X 10.9 (Mavericks)?Yes, update to After Effects CS6 (11.04) for that capability. More info in this blog post.
    How do I prevent After Effects CS6 from crashing when I use Illustrator files?Prevent this issue by turning off the preference Create Layer Markers from Footage XMP Metadata in the Media & Disk Cache preferences category. More info in this blog post.
    I can't open the composition mini-flow chart. What do I do?See the workarounds in the following blog post.
    Is there a 30 day trial available for After Effects CS6?Yes, subscribe to the free version of Creative Cloud, then download After Effects CS6. More info here.
    I'm getting errors related to QuickTime. What do I do?See this blog post for troubleshooting items related to QuickTime.
    What are the GPU related features in After Effects CS6?See this blog post for details.
    Do I need new plug-ins for After Effects CS6?See this blog post for information.
    I'm getting errors after applying the 3D Camera Tracker or Warp Stabilizer to a long clips in After Effects CS6. What do I do?See this blog post for more information.
    After Effects CS6 Tutorials
    How do I get started with After Effects CS6?See this blog post.
    Where can I find tutorials for learning After Effects CS6?
    See this blog post.
    See also this collection of tutorials.
    Issue: What are the top new and changed features in After Effects CS6?See this blog post.
    Issue: How do I optimize After Effects CS6 for best performance?See this article.

    Hi ..
    GO to website www.Apache.org
    down load Apache tomcat server .
    install it ...
    Go to sun site
    c and download jsp tutorials ...
    Go to
    (www.coreservlets.com)download book core servlets
    u can find lots of nice books supported by sun on sunwebsite ...
    Now u r equipped ....
    start doing everything (R &D) on server ..
    Join This JSP forum and ask any thing u didnt got ..or learn or get confused..
    I thing once u go through this ..it will do all what u want
    Hope it helps
    Best of Luck :)
    regds & take care

  • What are the field names for below mentioned

    Hello Friends
    What are the fields names for below tables
    in EKKO
    Purchase Document Date
    Net Value of the purchase document.
    In EKPO
    Item Description
    From which place We bought it. (It means in Sales Items there we can know from which plant we sold the goods, like in EKPO, there is any field like this)
    Please let we are defining the report to find out the stock availability for perticular storage location using select Options plant, company code, material no.
    How many tables involve her to build this report. and also field names, they come under which table.
    Please send me this information ASAP. PLz Plz Plz..........
    Regards
    Praveen

    You can check the fields of these tables via SE11
    Purchase Document Date  -  EKKO-BEDAT
    Item Description  -  EKPO-TXZ01
    Net price per item - EKPO-NETPR.
    Regards,
    Rich Heilman

  • What are the ideal specs for a DigiBeta master tape when authoring a "widescreen anamorphic" 16:9 SD DVD (original aspect ratio is 14:9)?

    I just received the masters for a new SD DVD. I would like to author a "widescreen anamorphic" SD DVD horizontally squeezed widescreen image stored in a standard 4:3 aspect ratio DVD image frame. (On 4:3 displays, mattes should preserve the original aspect ratio. On 16:9 displays the image will fill the screen at the highest possible resolution.)
    Below I've listed the specs of the Digi Beta master tapes the producers have sent to me for digitizing. I'd like to know this: What are the ideal specs for a DigiBeta master tape when authoring a widescreen anamorphic SD DVD, using material with an original aspect ratio of 14:9?
    I've also listed my guesses below. Please let me know if my guesses are right. If not, please suggest alternatives (and if possible explain why.)
    TECHNICAL SPECIFICATIONS OF EXISTING MASTER:
    Tape: DigiBeta
    Original Aspect Ratio: 1.55 (14:9)
    Vid Rate: 29.97 fps
    Pixel Aspect: NTSC - CCIR 601
    Frame Size: 720 x 480
    Anamorphic: Full-Height Anamorphic (16:9 image displayed in letterboxed, non-distored 4:3)
    Display Format: 4:3 Letterbox
    MY GUESS AT IDEAL TECHNICAL SPECIFICATIONS (for a DigiBeta, that is):
    Tape: DigiBeta
    Original Aspect Ratio: 1.55 (14:9)
    Vid Rate: 29.97 fps
    Pixel Aspect: Square
    Frame Size: 720 x 540
    Anamorphic: YES
    Display Format: 16:9 Anamorphic (horizontally squeezed widescreen image)
    Please feel free to ask for clarification or further information you need to answer my question.
    Thank you so much in advance for your help!
    Best, Noetical.
    BTW, I can't wait for the day when everything has gone digital and we get digital intermediates instead of tapes to digitize!

    Hi Nick...thanks for taking the time to reply to my question.
    Nick Holmes wrote:
    What you have there is a mess.
    NTSC pixels are never square.
    NTSC is 720x486, even when it is Anamorphic.
    You shouldn't be using an already letterboxed master to make an Anamorphic version. Get the master that was made before the letterboxing stage.
    When you make an Anamorphic DVD it should display as 16:9 full screen automatically on widescreen TVs.
    The same DVD will automatically letterbox on 4:3 TVs.
    Um yeah...duh. That's exactly what I was trying to explain in the preface of my question. I'm sorry if I didn't make it clear...all these things you mention are the reasons I'm putting together a list of the technical specs of the DigiBeta I need so I can have them send that instead of the stupid letterboxed version. 
    Look, I'm sending this request to some intern at their offices in England, asking for a master with which I can make an Anamorphic DVD. They already sent me this master, which as you and I both agree is an idiotic asset to use for these purposes. As such, I was hoping for advice on a more precise way of requesting the master that I need than asking for "the master that was made before the letterboxing stage." Upon reflection, perhaps I'll just do that. If you or anyone else has a suggestion about something I should add to my request that would improve the odds of them sending the tape I need, please repond. Thank you!
    BTW, It's been a long time since anyone has responded to something I've written or said as though I'm an idiot. I remember now that I don't really like it. (Moving along...)

  • What are the settings required for QM in procurement

    Hi Team,
    What are the settings required for QM in procurement. I have  set indicator for QM in procurement in QM view in material master.
    I am not clear about  following fields to be maintained in QM view.
    QM Control Key
    Certificate type
    Target QM system
    Tech. delivery terms Indicator.
    Please suggest me in which case to be used this fiels. Is it relivant to Quality Certificates.
    Thanks

    Hi,
    All meaning are
    QM Control Key :
    If you activate the indicator for QM in procurement in the material master record at the client level, you must also store a control key at the plant level for quality management in procurement.
    Certificate type :
    Certificate types applies to the Certificate processing in procurement  &  Certificate creation
    Target QM system :
    whether the vendor's verified QM system, according to vendor master record or quality info-record (for a combination of vendor/material) meets the requirements for QM systems as specified in the material master
    -  If you activate the indicator for QM in procurement in the material master record at the client level, you must also store a control key at the plant level for quality management in procurement. If you want Procurment control then accordingly define Control Key.
    -  If you want Vendor's perticular certificate for Material then you have to define Certificate type.
    Also, you have to maintain Material, Vendor's Info record at plant level.
    Thanks,
    JM

Maybe you are looking for

  • Macbook Pro 15" not the same?

    I just bought a Macbook pro 15" 2.2 ghz, and I was wondering why I got the "AMD Radeon HD 6750M with 512MB GDDR5 memory" Instead of the "AMD Radeon HD 6770M with 1GB GDDR5 memory"? I read forums and saw youtube videos where people would have the 2.2g

  • Tried to update to 13, now nothing works

    I was running Flash Player 11, everything ran fine, logged on to HBO Go and was told I needed to update to 13. So I did, and flash ran but dragged a lot. I tried to do a clean install and revert to previous versions (I tried 10 and 11) in IE, Firefox

  • Variable in web report selecting '#'

    Hi, When I execute a BW report in Web, something really strange is happening. I have got an optional variable for calender month. Whatever value I select, it changes to '#' by itself. It works well in RSRT. If I type the value for e.g. 02.2007 manaul

  • Basic OLS question

    Oracle 11.1.0.7: Couple of questions: 1. All the examples in OLS are using GUI. I am unable to find example using SQL for 11g. 2. If I want to add a hidden "WHERE" clause then is the only way to do this is through own PL/SQL? Or is there any other wa

  • Where is the CUSTOMER CARE & BILLING v2.3 Documentation

    Hi there people, I am working on selling the CC&B product line in a presentation and wondered if anyone could point me to a place I can find CC&B documentation? I am looking specifically for documentation with screens shots showing: Product Configura