Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
263 views60 pages

Software

The document provides instructions for installing Microsoft Office software and activating the licenses. It begins by having the user uninstall any previous Office software. Then it guides them through downloading and installing the Office Deployment Tool to facilitate installation. Next, the user downloads an XML configuration file specific to their software and language and moves it to the installation folder. They are instructed to open the Command Prompt and use commands to download and install the Office applications. Finally, they obtain a product key from their Microsoft account to activate the installed software.

Uploaded by

Althea Dy
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
263 views60 pages

Software

The document provides instructions for installing Microsoft Office software and activating the licenses. It begins by having the user uninstall any previous Office software. Then it guides them through downloading and installing the Office Deployment Tool to facilitate installation. Next, the user downloads an XML configuration file specific to their software and language and moves it to the installation folder. They are instructed to open the Command Prompt and use commands to download and install the Office applications. Finally, they obtain a product key from their Microsoft account to activate the installed software.

Uploaded by

Althea Dy
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 60

SOFTWARE

 Office
 Anti-virus
 Third Party Software
 Software is a set of instructions, data or
programs used to operate computers
and execute specific tasks. It is the
opposite of hardware, which describes
the physical aspects of a computer.

 Software is a generic term used to refer


to applications, scripts and programs
that run on a device. It can be thought
of as the variable part of a computer,
while hardware is the invariable part.
 The two main categories of
software are application software
and system software. An
application is software that fulfills
a specific need or performs tasks.
System software is designed to
run a computer's hardware and
provides a platform for
applications to run on top of.
 How to Install Office Products
for Windows?
Use this guide to help you install the 2019 or 2021 versions of Microsoft Desktop
applications for Windows. These applications include:

 Office Standard 2019 or 2021


 Office Professional Plus 2019 or 2021
 Access 2019 or 2021
 Project Standard 2019 or 2021
 Project Professional 2019 or 2021
 Visio Standard 2019 or 2021
 Visio Professional 2019 or 2021
Before you begin, here are the things
you need before you get started:

 An internet connection.
 The computer running Windows 10,
on which the software will be installed.
 Administrator account password for
your PC (Ideally, you should be
logged into an administrator account
for your installation).
Outline
 Prepare your computer
 Download and install the Office Deployment Tool
 Download your configuration file
 Download and install your app through the Windows Command Prompt
 Get your activation key from the VLSC
 Activate your software
 Pin your apps (optional)
Step 1: Uninstall any previous versions of the Microsoft Software
you’re installing.
Note: The installation will not work if the Microsoft App is already
installed, regardless of the version.

Many new computers come pre-installed with Office 365. To check:

A. Click on the Start menu. Type “Apps and features” and select
the system setting. (Note: You cannot get to the required page
through the Control Panel).
B. Search the Apps & features list for “Office” and separately for
"365“
C. If the results list "Microsoft Office Desktop Apps" or "Microsoft
Office 365" click on the item, and then click Uninstall.
Otherwise, you can proceed to Step 2.
Step 2: Download and install the Office Deployment Tool

A) Create a new folder on your Desktop. Name it “ODT”.


B) Download the Office deployment tool
(ODT).
Visit the Microsoft Download Center and click
on the Download button.

C) Install the ODT.


Open the file to install it. You will be prompted
to accept Microsoft’s Software Licence Terms.

Note: If you are not logged into an


administrator account, you will be prompted
for an administrator's password.
D) Store the extracted files in the correct folder.
Select the ODT folder on our desktop to store the extracted files. Make sure your username is
indicated in the dialogue box.

Store extracted files from the


Office Deployment Tool in the
new “ODT” folder in your
Desktop. This is the folder we
created in Step 2-A.
If you opened your ODT folder on your desktop, it should look
like the image below:
Step 3: Download your configuration file

The XML files are available below. Click on the link for the software and
language you want to install. You will be taken to a folder hosted in Box.
Navigate to the system type and version of the software you want. Then
download the XML file.
Tip: Are you unsure if your
computer is 64 bit or 32 bit?
You can go ahead and
download the 32 bit version.
If you are installing multiple
Microsoft 2019 products,
make sure you install the
same version for all products.
B) Move the XML file to the "ODT" Folder.
Move the XML file from your Downloads folder to your new “ODT” folder
in your Desktop. This is the folder we created in Step 2-A.
Your ODT folder should like the image below:

IMPORTANT! Your file name must either be displaying as


"configuration.xml" or "configuration".
Step 4: Download and install your app
through the 'Windows Command Prompt'
application

A) Open Windows Command Prompt.


Navigate to your ODT folder in File
Explorer.
Click the address bar in the File Explorer
window.
With the address bar selected, type "cmd"
and press Enter.
B) Download your Microsoft Apps.
Copy and paste the command below:
setup /download configuration.xml
Troubleshooting: “Couldn't install”
Hit Enter

This command can take around 10


minutes to finish running. It will seem as
though nothing is happening, but files are
being downloaded to your ODT folder.
If you opened your ODT folder, it should
look like the image below:
You will know the command has finished
running when the Command Prompt
window looks like this:

There is a new line starting with C:\


Users\username where you did not
enter a command. 
C) Install your Microsoft Apps.
Once the previous command has finished
running you must copy and paste, the
command below:

setup /configure configuration.xml

Hit Enter.

You will be prompted to allow Microsoft to


make changes to your device.

Once you agree, a display window will


appear, showing the progress of your
installation.
When the installation is complete, the display will disappear. You can then
close the command prompt.
Step 5: Get your product key

If your license includes Software Assurance, go to the Microsoft VLSC.


If your license does not include Software Assurance, you will need to get your product key from your
Microsoft 365 Admin Center.
Login to your Microsoft 365 Admin Center using the Microsoft for Nonprofits domain in the
Organization Details section of your TechSoup Canada account.

Navigate to Billing > Your Products and find the software you want to install.


You may see Office LTSC Standard 2021 or Office Standard 2019. Click on that
product and get your MAK product key. Do not use the key called "Setup Key".
Step 6: Activate your software
A) Open an Office application.
Once you have copied the correct key, open one of your new Microsoft applications. We
opened Microsoft Excel.
B) Enter the Activation Key.
1. Open a blank document. 
2. Go to File > Account > Change Product Key and paste your activation Key. Activate your
software.
Step 7: Pin your apps (optional)
Microsoft 2019 apps won’t create shortcuts for your desktop.
To make them easy to access, click on your Start Menu, and go down your list of programs
to locate the Microsoft Office Apps.
When you come across the ones you wish to pin, right click on the app, and then click Pin
to Start.
 Install the Anti-virus Program
To install an antivirus program on your
computer, follow the steps below.

 If you purchased the antivirus program


from a retail store, insert the CD or
DVD into the computer's disc drive.
The installation process should start
automatically, with a window opening
to help guide you through the install
process.
 If you downloaded the antivirus program
on the Internet, find the downloaded file
on your computer. If the downloaded file
is a zip file, unzip the file to extract and
access the installation files. Look for a
file named setup.exe, install.exe, or
something similar, then double-click that
file. The installation process should
start, with a window opening to help
guide you through the install process.
 In the installation process window, follow
the steps provided to install the antivirus
program. The install process provides
recommended options so the antivirus
program will function properly, which in
most cases can be accepted as is. The
one exception is if the install process
recommends to install any toolbars for
Internet browsers or other helpful programs
for your computer. If prompted to install
other software with the antivirus program,
uncheck all boxes or decline the install of
those extra programs. No additional
programs should be needed for the
antivirus program to install and run
successfully on your computer.
 When the install process is complete, close
out of the install window.

 If used, remove the CD or DVD from the


computer's disc drive.

 The antivirus program is now installed and


ready to use. While it may not be required,
we recommend restarting your computer
so that any modified settings in the
operating system can take effect correctly.
10 Third Party & Supplier Risk Management Software

The Third-Party Risk Management Software can be deployed as a


standalone product or as part of larger governance, risk, and
compliance endeavor. Third-party and supplier risk management
solutions must integrate with other software tools including supply
chain suites, quality management software, ERP systems, and
governance, risk, and compliance software if they are given
separately.
1. ONE TRUST
OneTrust is defining an entirely new market category
of software – the industry of trust – and the market is
certainly responding.
now based in Atlantic , makes software for businesses
trying to stay on the right side of the growing number
of internet regulations. In response to the new
California law, OneTrust made it easy for companies to
set up a number to manage the requests.
In an attempt to rein in tech giants like Facebook and
Google, governments around the world in recent years
have approved new laws governing how websites
must handle consumer data, treat their competitors
and protect young people. The European Union has a
data privacy law that governs the entire bloc. California
has approved two privacy measures in recent years,
and other states have followed suit
2. UPGUARD
UpGuard provides cybersecurity risk management
software (offered as SaaS) that helps organizations
across the globe prevent data breaches by continuously
monitoring their third-party vendors and their security
posture. UpGuard is the only service that offers world-
class data leak detection capabilities across an
organization’s supply chain while continuously monitoring
over a million companies to identify security exposures
using proprietary security ratings proactively. Their
expertise has been featured in The New York Times, The
Wall Street Journal, Bloomberg, The Washington Post,
Forbes, Reuters, and TechCrunch among others.
UpGuard’s powerful risk assessment workflows enable
organizations to automate security questionnaires, and
the identified risks from responses are automatically
mapped to vendors’ security ratings providing a holistic
view of risks posed by third-party vendors. Its remediation
capabilities make it easier for organizations to collaborate
internally and with third-party vendors to remediate the
identified security risks.
3. BITSIGHT
BitSight transforms how organizations manage cyber risk.
The BitSight Security Ratings Platform applies
sophisticated algorithms, producing daily security ratings
that range from 250 to 900, to help organizations manage
their own security performance; mitigate third party risk;
underwrite cyber insurance policies; conduct financial
diligence; and assess aggregate risk. BitSight’s solutions
for Security Performance Management, Third Party Risk
Management, Critical National Infrastructure, and Cyber
Insurance are further bolstered by partnerships with
Solactive, Refinitiv and Kovrr, broadening BitSight’s
offerings for investors and cyber insurers as cybersecurity
ratings continue to demonstrate a strong correlation to
business performance. BitSight is the Standard in
Security Ratings with over 2,400 global customers,
including 20% of the Fortune 1000, and the largest
ecosystem of users and information. The BitSight Security
Rating was also used by 20% of the world’s governments
in 2020 and is currently available on over 40 million
organizations worldwide.
4.VENMINDER
Venminder is an industry recognized leader of
third-party risk management solutions.
Dedicated to third-party risk, the company is
the go-to partner for software, high-quality
assessments on vendor controls, certified
subject-matter expertise and education.
Venminder’s platform provides a centralized
location to execute a third-party risk
management program. It enables users to
store documentation, onboard a vendor, track
contracts, manage SLAs, send and manage
questionnaires, manage due diligence and
oversight, complete risk assessments, create
workflows, run reporting and more.
5. WHISTIC
Whistic simplifies how businesses assess,
publish, and share security documentation with
customers and vendors.
The Whistic Vendor Security Network accelerates
the vendor assessment process by enabling
buyers to access and evaluate a vendor’s Whistic
Profile and create trusted connections that last
well beyond the initial point-in-time assessment.
Additionally, Whistic facilitates zero-touch
assessments via the Whistic Trust Catalog which
contains security information for more than 35,000
businesses. Make security your competitive
advantage and join businesses like Airbnb, Okta,
Betterment, Vonage, and Qualtrics who are
leveraging Whistic to modernize their vendor
security programs.
6. SECURITY SCOREGUARD
 SecurityScoregurad is the global leader in
cybersecurity ratings with more than 12 million
companies continuously rated. Founded in 2013 by
security and risk experts Dr. Aleksandr Yampolskiy and
Sam Kassoumeh, SecurityScorecard’s patented
technology is used by over 30,000 organizations for
enterprise risk management, third-party risk
management, board reporting, due diligence, cyber
insurance underwriting, and regulatory oversight.
SecurityScorecard is the first cybersecurity ratings
company to offer digital forensics and incident
response services, providing a 360-degree approach
to security prevention and response for its worldwide
customer and partner base. SecurityScorecard
continues to make the world a safer place by
transforming the way companies understand, improve
and communicate cybersecurity risk to their boards,
employees and vendors. Every organization has the
universal right to their trusted and transparent Instant
SecurityScorecard rating.
7. CYBER GRX
Cyber GRX is a SaaS platform whose mission is to help
customers and the third parties with whom they do business
solve the challenge of risk management. It is built on NIST-based
assessments, mapped to the ISO 27001 framework and can be
mapped to most other frameworks as well.
Onboarding vendors is simple with a search feature for checking
if companies are already in the system, as well as for any
previously conducted assessments. Several vendors can easily
be onboarded at once with bulk import functionality.
Assessments have three tiers: Tier 1 provides the strongest level
of due diligence while Tier 3 is the shortest-self assessment.
Their offerings range from automated validation all the way up to
onsite validation. If no tier is present, that means a community
member has never performed an assessment on that company.
You can easily order an assessment at the appropriate tier level
based on inherent risk. You can also submit special requests to
the vendor. A lot of behind-the-scenes automation takes place
once an order is submitted. Assessments are built with a great
deal of logic, and the skip-level feature simplifies completion by
jumping sections that are not applicable based on provided
answers.
Business exposure is scored as low, medium or
high risk and is determined by standardized
questions that are not customizable. Users receive
a report on the back end to show which controls
matter most for remediation. Everyone’s progress
is trackable.
The Portfolio Overview shows company statistics
accompanied by a colorful bubble graphic that
visualizes the likelihood of a cyber event. Circle
sizes directly correlate to the likelihood of risk. The
assessment is based on the user’s industry,
current threat intelligence and a security ratings
tool. Also shown are outliers with higher likelihoods
of being attacked and their impacts.
CyberGRX built a table that outlines different
controls and scores them on maturity (on a
scale up to five) and effectiveness (on a scale
up to 100). Comments are invited on the
scores for enhanced collaboration. The Top
Risks Chart ranks risks from low to high,
prioritizing remediation with top suggestions for
moving a company toward an acceptable
posture. A variety of metrics can be added for
company comparisons.
It appears the CyberGRX team is attempting to
shift the industry away from an aggressive
assessment approach to one more focused on
collaboration. Basic, no-cost support is offered
through 8/5 phone support. Overall, we found
this to be an intuitive, simplified platform.
8. PROCESS BOLT
ProcessBolt empowers the enterprise supplier risk
management process by replacing spreadsheets and emails
with AI powered interactive questionnaires, process tracking,
notifications, alerting, data driven dashboards and risk
metrics.
Enterprise: Full visibility to supplier risk and assessment
status.
Suppliers: Painless, intuitive and easilyrepeatable client risk
assessments.
Risk Management Professional: One simple platform saving
time and dollars.
Purpose built workflow to ease risk assessment process.
Pre-configured and easily customizable assessment
templates (BITS SIG, GDPR readiness, PCI SAQ, and
more). Quickly attach evidence and artifacts to
assessments. Meaningful notifications and alerts.
Second definition : ProcessBolt eliminates
time-consuming manual risk assessment
processes through automation so you can
focus on your business, not data collection.
ProcessBolt is the only complete vendor risk
management solution on the market that
serves both enterprises and vendors to
maximize efficiency.
9. RECIPROCITY
The Reciprocity (ROAR) Platform unifies
risk observation, assessment and
remediation activities to provide a single,
real-time view of risk and compliance in
business context.
Using expert-provided guidance, easily
create cyber assurance programs that
unify compliance and risk to deliver a
holistic, real-time view of your risk posture.
The ROAR platform breaks down the silos
that cause inefficiencies, gaps and blind
spots and provides a single source of truth
to increase efficiency, improve
collaboration and optimize decision
making.
A unified data model enables data
sharing, eliminating redundant
activities and minimizing audit fatigue.
Automated workflows, pre-built
integrations and flexible APIs free your
staff from manual work while real-time
alerts keep cross-functional teams
informed. The ROAR platform delivers
the expertise, guidance and insight
you need, in the business context
required, to maintain competitiveness,
support growth and earn the trust of
customers, partners and employees.
10. PREVALENT
Prevalent takes the pain out of third-party
risk management (TPRM). Companies
use our software and services to
eliminate the security and compliance
exposures that come from working with
vendors, suppliers and other third parties.
Our customers benefit from a flexible,
hybrid approach to TPRM, where they not
only gain solutions tailored to their needs,
but also realize a rapid return on
investment. Regardless of where they
start, we help our customers stop the
pain, make informed decisions, and adapt
and mature their TPRM programs over
time.
Conclusion
To do this well you will need a cloud-based
integrated platform you can trust, in order to
deliver the visibility needed to determine a
robust risk posture for effective third-party
risk management.
Now that you have all the details of each,
evaluate your business requirements, and
choose the best software.
THANK YOU!!!

You might also like