S-IA-PRO Intelli-M Access Professional V4.0

Size: px
Start display at page:

Download "S-IA-PRO Intelli-M Access Professional V4.0"

Transcription

1 S-IA-PRO Intelli-M Access Professional V4.0 An Addendum to the Intelli-M Access V4.0 User Guide For SKU: S-IA-PRO ACCESS Professional PLEASE READ THIS MANUAL BEFORE USING YOUR INTELLI-M ACCESS PROFESSIONAL SYSTEM, and always follow the instructions for safety and proper use. Save this manual for future reference. IN-S-IA-PRO_4.0_RM 2/26/14

2 Legal Notice infinias, the infinias logo, and Intelli-M are trademarks or registered trademarks of infinias. Microsoft and Windows are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries. Other trademarks and trade names may be used in this document to refer to either the entities claiming the marks and names or their products. infinias disclaims any proprietary interest in trademarks and trade names other than its own. No part of this document may be reproduced or distributed in any form or by any means without the express written permission of infinias. The information in this document is subject to change without notice or obligation. infinias 9340 Priority Way West Drive Indianapolis, IN Telephone: (toll free), Copyright 2014, infinias. All Rights Reserved. ii

3 TABLE OF CONTENTS Table of Contents SECTION 1 Introduction System requirements Considerations System software Upgrading to Intelli-M Access Professional...2 SECTION 2 Active Directory Integration How It Works Active Directory requirements Integration checklist Site code and card number attributes Create a Peripheral...6 SECTION 3 Microsoft Outlook Integration How it works Integration requirements Integration checklist Calendar permissions Create a Peripheral in Intelli-M Access Create Rules Create an Unlock Zone Rule Create a Revert Zone Rule Test the system...21 SECTION 4 Google Calendar Integration How it works Integration checklist Create a Peripheral in Intelli-M Access Create Rules Create an Unlock Zone Rule Create a Revert Zone Rule Test the system...31 Intelli-M Access V4.0 Professional User Manual iii

4 TABLE OF CONTENTS iv

5 SECTION 1: INTRODUCTION SECTION 1 Introduction Thank you for purchasing Intelli-M Access Professional, the Simple, Scalable, and Secure access control system, designed for the small business, and scalable for the enterprise. Intelli-M Access Professional is installed by adding a software license to your existing Intelli-M Access Essentials system. It enables the following features: LDAP integration Calendar integration (Google or Microsoft Outlook and Exchange) Customizable door templates Video Integration with industry leading video surveillance manufacturers Expanded library of rules engine events and actions Elevator Control With these features, you can manage Intelli-M Access users from within Active Directory, lock and unlock Doors for Meetings or Appointments on your calendar, and perform many other actions. Video Integration Intelli-M Access Professional supports video integration with industry leading video surveillance platforms, providing a robust and complete physical security solution. It can integrate with video surveillance platforms from DIGIOP, Pelco Digital Sentry, Exacq, American Dynamics, Vicon, Milestone and others. When integrated, Intelli-M Access can easily be configured to send event information to the video surveillance platforms for reporting and to trigger recording, activate soft alarms, activate digital outputs, and other functions. With DIGIOP integrations, the video surveillance platform can push temporary door unlock commands back to the Intelli-M Access server. Typical event information from Intelli-M Access can include: Detection of an Unknown Credential Status Event when access to a door is attempted using an unrecognizable credential. Detection of a Door Forced Open Event when a door is opened without a credential presented. Detection of a Valid Credentials Event before or after work hours when access to a door is attempted outside of normal work hours. Detection of an Anti-Passback Violation Event when a credential is used more than once at the same reader in a short period of time. With every card swipe on the IN reader, there must be a corresponding card swipe on the OUT reader before the card can be used at the IN reader again. For more information about Intelli-M Access integration with a video surveillance platform, refer to the applicable integration documentation available through infinias. About this document This document is an addendum to the Intelli-M Access Essentials V4.0 User Manual. It includes the additional features added to Intelli-M Access Essentials server by installing the Intelli-M Access Professional license. Intelli-M Access V4.0 Professional User Manual 1

6 SECTION 1: INTRODUCTION 1.1 System requirements Considerations Since Intelli-M Access is a client/server application, we recommend that it be run on a server in a secure environment. If Intelli-M Access is installed in a virtual environment, we recommend VMware ESXi or higher. Note that Intelli-M Access includes a Rules engine that extends the functionality of the system; to take advantage of these features, the server must be available continuously System software Intelli-M Access V4.0 runs on any system hardware where Intelli-M Access Essentials V4.0 is installed. infinias recommends using the most recent versions of operating systems. For Active Directory integration, the server where Intelli-M Access is installed must be a member of the Windows Domain in your organization. Furthermore, the Domain Controller must be running Windows Server 2008 or newer - Server 2003 and older Domain Controllers are not supported. Finally, if your installation does not require Active Directory integration, this requirement can be ignored. Microsoft Exchange integration requires Microsoft Exchange 2007 or newer. Earlier versions of Microsoft Exchange do not provide the necessary integration features, and therefore are not supported. If your installation will not be using Exchange integration, this requirement can be ignored. Google Calendar integration requires a Gmail (Google mail) address. 1.2 Upgrading to Intelli-M Access Professional Intelli-M Access Professional is a licensed upgrade to Intelli-M Access Essentials. If you installed Intelli-M Access Essentials Version 4.0 or later, you can upgrade to Intelli-M Access Professional by installing a license. Licenses are normally issued using Activation License cards. For information on installing a license, please refer to the Intelli-M Access Essentials V4.0 User Manual or the Intelli-M Access Essentials V4.0 Quick Setup Guide. Typical Activation License card 2

7 SECTION 2: ACTIVE DIRECTORY INTEGRATION SECTION 2 Active Directory Integration Intelli-M Access Professional can integrate with the Active Directory Server in your organization to allow the Active Directory Administrator to manage Intelli-M Access cardholders within the Active Directory User management system rather than within the Intelli-M Access User Interface. This integration provides the convenience of not having to learn and use another user management system on a daily basis. 2.1 How It Works Intelli-M Access will monitor the Calendar of each specified Exchange Room Mailbox. When a meeting or appointment is scheduled in the Calendar of a Room Mailbox, the Intelli-M Access integration with Exchange will send event information to Intelli-M Access. A Meeting Started event will be sent to Intelli-M Access when a meeting is scheduled to begin, and a Meeting Ended Event will be sent to Intelli-M Access when the meeting is scheduled to end. If you also requested Exchange to send out a Meeting Reminder notification to the required attendees, it will also send a Meeting Reminder event to Intelli-M Access. Active Directory integration will manage all of the attributes associated with a Person, including the Persons Group membership(s). Therefore, you can manage First Name, Last Name, all contact information, Employee Id, and even the card number associated with that Person within Active Directorys User management tools. Although Active Directory can modify Intelli-M Access users and groups, that integration is oneway at no time does Intelli-M Access modify Active Directory with its own data, even if you continue to use the Intelli-M Access User Interface to configure cardholders. NOTE It is strongly recommended that you do not modify Persons in Intelli-M Access after the integration with Active Directory. Changes you make are likely to be overwritten by the next change made to the same user in Active Directory. The exception to this recommendation is when a person has multiple credentials - you can continue to manage additional credentials for a cardholder in Intelli-M Access. Allow Active Directory to manage the first (initial) card credential (that shown in the Person Summary) 2.2 Active Directory requirements Active Directory integration requires that the server on which you have installed Intelli-M Access be a member of the Windows Domain in your organization. Furthermore, the Domain Controller must be running W indows Server 2008 or newer - Server 2003and older Domain Controllers are not supported. Minimum System Requirements to Run Active Directory Plugin with Intelli-M Access: - i5 processor - 8GB of RAM - 250GB HDD Intelli-M Access. Professional User Manual

8 SECTION 2: ACTIVE DIRECTORY INTEGRATION Integration checklist The Active Directory integration effort will require you to interface closely with the IT representative in your organization. Intelli-M Access will map Active Directory attributes such as First Name, Last Name, etc. with Intelli-M Access Person and Group items, such as First Name, Last Name. Many of these mappings are performed for you automatically, but some are not. The following is a complete list of all Active Directory User attributes that are implicitly understood to map into Intelli-M Access (First Name and Last Name are not shown below because their mappings are hard-coded). Intelli-M Access Item Title Department Company Job Title Phone Number Cell Phone Office Primary Employee Id Notes Active Directory Attribute (LDAP-Display-Name) personaltitle department company title telephonenumber mobile physicaldeliveryofficename mail employeeid description The Active Directory attributes are the same as the Active Directory Users and Computers administration utility on the Domain Controller. A list of attributes and their definitions is provided at NOTE You can enable Advanced Features in the Active Directory Users and Computers utility to see the attributes in the form shown in the table above. To enable Advanced Features, click View and then check the Advanced Features menu item. When enabled and when viewing the Properties, click the Attribute Editor tab to see all known attributes and their values. These attributes and values and be directly modified here. You can map all of the remaining Intelli-M Access Person items to Active Directory attributes. Always coordinate these mappings with your IT representative to ensure that the proper attributes are used for the mappings. These attributes may be provided later to Intelli-M Access. 4

9 SECTION 2: ACTIVE DIRECTORY INTEGRATION Site code and card number attributes After mapping Active Directory attributes and Intelli-M Access Person items, determine which Active Directory attributes will represent the person s site code and card number. NOTE Intelli-M Access requires a valid Site Code and Card Number in order to create a Person. Unlike the table in Integration checklist on page 4, there is no specific mappings for the Site Code and Card Number. You must consult with your IT representative to determine which Active Directory attributes will represent these attributes. You can also create custom Active Directory attributes if there is a need to do so. By default, Intelli-M Access Professional maps the Windows user s Side Code to the FAX attribute and maps the Card Number to the Pager attribute. Because Windows users typically do not have a personal FAX number or carry a pager, these fields are rarely used. If this mapping is permissible, then you need to do nothing; the software will map these attributes for you. The figure below shows an example Properties dialog for a user where the Site Code has been written into the Fax field and the Card Number has been written into the Pager field. User Properties dialog PIN code attribute You can reserve an Active Directory attribute as the PIN code for the user. Use the steps described above to choose the attribute. Intelli-M Access V4.0 Professional User Manual 5

10 SECTION 2: ACTIVE DIRECTORY INTEGRATION Group filter attribute Active Directory contains numerous Groups that are not needed by Intelli-M Access, but still fill the Intelli-M Access Groups page with unnecessary Group names. To filter unwanted Groups from being copied from Active Directory, Intelli-M Access maintains a Group Filter that reserves the Active Directory attribute wwwhomepage (by default) to identify a group as one that Intelli-M Access needs. This attribute is an attribute for Windows Domain Groups. By setting the attribute to infinias, Intelli-M Access will recognize this group as its group and be copied to Intelli-M Access. Consult with your IT representative to determine which Group attribute can be reserved for this purpose. The figure below shows an example of a Windows Group that has been identified as an Intelli-M Access group using the wwwhomepage attribute. Group Properties in Active Directory NOTE Complete the steps above and make the necessary changes within Active Directory before moving to the next section in this document. This includes setting the Group Filter attribute and updating all relevant Windows Users with their appropriate Site Code and Card Number Create a Peripheral After determining which user attributes to map and which Group Filter attribute to use, you can begin to create a peripheral in Intelli-M Access: 1. Login to Intelli-M Access, then open the Peripherals tab. Click the Create Peripheral command in the Actions menu to open the Create Peripheral dialog. See below. 6

11 SECTION 2: ACTIVE DIRECTORY INTEGRATION Create Peripheral dialog 2. Click New in the left frame to open a list of plugins available to use as Peripherals. The list should include one or more options: Create new Peripheral If you do not see Active Directory Connection in the list, click Discover. Wait several seconds for Intelli-M Access to re-discover the plugins, then click New again. If the plugin installation proceeded correctly, you will see the Active Directory Connection entry. If you still do not see Active Directory Connection in the list, verify that you are using a licensed Intelli-M Access Professional installation. 3. Select the Active Directory Connection menu item to start creating the Peripheral with this plugin. A Create New Active Directory Connection popup dialog will appear: Intelli-M Access V4.0 Professional User Manual 7

12 SECTION 2: ACTIVE DIRECTORY INTEGRATION New Active Directory connection dialog Use this configuration page to map Intelli-M Access fields (the labels on the left side of the UI) to Active Directory attributes (the entry fields on the right side of the UI). The Active Directory attribute names are case-sensitive. The only Active Directory users who will be transferred to Intelli-M Access are users with a Site Code and Card Code field mapping. Site, Card Code, or PIN Code fields must be mapped with currently unused attributes in Active Directory. Most of the remaining mappings are created using logical choices, such as for the Primary Address. Simply map the remaining fields that are important. Domain: Contact your IT department for correct domain, domain user, and domain pasword credentials. Update Interval (seconds): Set the polling interval (in seconds) for how often Intelli-M Access downloads changes from Active Directory. Site Code: Provide an unused Active Directory attribute that you want to re-use and map to the Site Code (aka Facility Code) of the User's card number. Card Code: Provide an unused Active Directory attribute that you want to re-use and map to the User's Card Code (Card Number). Title: Provide the Active Directory attribute that you want to map to the User name prefix (e.g. Mr., Mrs., Miss, etc). The personaltitle attribute is used by default. 8

13 SECTION 2: ACTIVE DIRECTORY INTEGRATION Suffix: Provide the Active Directory attribute that you want to map to the Users Name suffix (e.g. Jr., Esq., etc). No default attribute is provided. Department: Provide the Active Directory attribute that you want to map to the User company department membership. The department attribute is used by default. Company: Provide the Active Directory attribute that you want to map to the company at which the user is employed. The company attribute is used by default. Office: Provide the Active Directory attribute that you want to map to the office in which the user is employed. The physicaldeliveryofficename Attribute is used by default. Building: Provide the Active Directory attribute that you want to map to the building in which the User is located. There is no default attribute. Job Title: Provide the Active Directory attribute that you want to map to the User s job title. In Intellli-M Access, Job Title is referred to as Position. The title attribute is used by default. Phone Number: Provide the Active Directory attribute that you want to map to the User s office phone number. The telephonenumber attribute is used by default. Phone Extension: Provide the Active Directory attribute that you want the user s telephone extension, if it exists. There is no default attribute. Cell Phone: Provide the Active Directory attribute that you want to map to the User s cell phone number. The mobile attribute is used by default. License Plate: Provide the Active Directory attribute that you want to User s automobile license plate. There is no default attribute. Primary Provide the Active Directory attribute that you want to map to the user s work address. The attribute is used by default. Secondary Provide the Active Directory attribute that you want to User personal or secondary address, if it exists. There is no default attribute PIN Code: Provide an unused Active Directory attribute that you want to re-use and map to the Site Code (aka Facility Code) of the user s card number. Employee Id: Provide the Active Directory attribute that you want to map to the user s employee ID, if it exists. The employeeid attribute is used by default. Notes: Provide the Active Directory attribute that you want to map to any notes written by the administrator about the user account. The description attribute is used by default. User attribute: Active Directory normally creates a canonical name of Users for every Windows User Account. This name appears in the distinguished name as CN=Users. The Active Directory plugin relies on CN=Users to tell the difference between a Windows User Account and all other objects in Active Directory. Organizations often re-use the CN attribute to denote organizational hierarchy, and change the name Users to something else. If your organization has modified the canonical name, then we strongly recommend that you add Users to your list of Organizational Units (i.e. OU=Users). If you cannot make this change, then enter the name that you used to replace CN=Users in the User Attribute field. Group attribute: The Group Attribute lets you specify which Active Directory groups should be transferred to Intelli-M Access and which ones should not. If you leave this attribute field blank, all Active Directory Groups will be transferred. To designate one or more Groups for transfer, apply the following steps: i. Choose an unused attribute in Active Directory such as extensionattribute1, extensionattribute2, etc. that you can reserve for this purpose Intelli-M Access V4.0 Professional User Manual 9

14 SECTION 2: ACTIVE DIRECTORY INTEGRATION ii. Using the Active Directory Users and Groups utility, enter the string infinias in the attribute for all Groups that you want to transfer to Intelli-M Access. iii. Enter the attribute name you chose into the Group Attribute field in the configuration UI. For example, if you chose extensionattribute1, then enter extensionattribute1 into this field. Immediate Transfer Users and Groups: Check this box to connect to Active Directory and transfer its entire database of Groups and Users into Intelli-M Access. NOTE Users in Active Directory must have attributes set for a Site Code and a Card Number to transfer automatically into Intelli-M Access. Only Groups that have infinias in the selected Group Attribute in Active Directory will be transferred into Intelli-M Access. 4. When you finish editing the fields in the Create new Active Directory Connection screen, click Create AD Monitor. Intelli-M Access will connects to the Active Directory server using the supplied information. The system will then connect to the Domain Controller and start listening for changes to Windows Users and Groups. If you checked the Immediately Transfer Users and Groups box, it will also start downloading all appropriate Users and Groups to Intelli-M Access. This download process will run in the background and may take minutes or hours to complete. If you entered the correct server information, the progress will complete and a new entry in the Discovered Devices list will appear. See the screen below: New Active Directory monitor added to Devices list 5. Click the newly-added device to see its configuration: 10

15 SECTION 2: ACTIVE DIRECTORY INTEGRATION Device Name and Configuration 6. The Name field defines the actual name of the Peripheral as determined by Intelli-M Access. Change the name from its default as needed, then click Create to create the Peripheral. It will appear on the Peripheral page with the Room Mailbox names. See below. Created Peripheral Active Directory (WIN2008-Inf.training.local) 7. Click the People tab to verify that the Active Directory users with the appropriate infinias Group Filter are created in Intelli-M Access. Intelli-M Access V4.0 Professional User Manual 11

16 SECTION 2: ACTIVE DIRECTORY INTEGRATION People imported from Active Directory The Active Directory Peripheral updates Intelli-M Access when a corresponding change is made in Active Directory. 12

17 SECTION 3: MICROSOFT OUTLOOK INTEGRATION SECTION 3 Microsoft Outlook Integration Intelli-M Access Professional can integrate with a Microsoft Exchange Server to allow Outlook Meetings or Appointments to automatically unlock and re-lock doors controlled by Intelli-M Access. Also, Microsoft Exchange Server can send Meeting Reminder, Meeting Started, and Meeting Ended events to Intelli-M Access for specified Exchange room mailboxes. This form of ad-hoc scheduling allows you to manage the lock status of a door that doesn t operate on a regular schedule like that of an office or retail business. Sporting events, party reservations at public buildings or churches are typical venues where Outlook Calendar integration can be useful. If your organization does not have Microsoft Exchange, you can use Google Calendar integration (see SECTION 4 Google Calendar Integration on page 23). 3.1 How it works Intelli-M Access will monitor the Calendar of each specified Exchange Room Mailbox. Whenever a meeting or appointment is scheduled in the Calendar of a Room Mailbox, Intelli-M Access Exchange integration will send event information to Intelli-M Access informing it of these calendar events. A Meeting Started event will be sent to Intelli-M Access when a meeting is scheduled to begin, and a Meeting Ended Event will be sent to Intelli-M Access when the meeting is scheduled to end. If you also requested Exchange to send out a Meeting Reminder notification to the required attendees, it will also send a Meeting Reminder event to Intelli-M Access. These events appear in Intelli-M Access and can be used with Rules feature to initiate actions, such as to unlock and re-lock meeting room or public-access doors. For example, Intelli-M Access can be configured to unlock a door when it receives a Meeting Reminder or Meeting Start event, and can be configured to re-lock the door (or revert the door schedule) when the Meeting Ended event is received. After configuring the unlock/revert Rules in Intelli-M Access, you can control door access by creating a meetings or appointments in Outlook. These features are accomplished by monitoring the calendar of a Exchange Room Mailbox. A Room Mailbox is an ordinary Exchange user account that is preconfigured to automatically accept all meeting or appointment requests in Outlook. When you create a meeting or appointment, you add a Room Mailbox to the Resources list. Adding a Room Mailbox to the Resources list reserves that room for that time period, preventing anyone else from organizing a Meeting or Appointment for that room at the same time of day. In addition, that meeting gets automatically added to that Room Mailbox Calendar. Intelli-M Access monitors the Room Mailbox Calendar to know when to send the event information described earlier. As meetings or appointments are added, moved or deleted from the Room Mailbox Calendar, Intelli-M Access will monitor these changes. To monitor a Room Mailbox Calendar, Intelli-M Access must log into Exchange with a valid Exchange User account, and Exchange must be configured to allow this User account to view the Room Mailbox Calendar. Intelli-M Access V4.0 Professional User Manual 13

18 SECTION 3: MICROSOFT OUTLOOK INTEGRATION 3.2 Integration requirements Intelli-M Access Professional requires Microsoft Exchange 2007 or newer. Exchange 2003 and earlier are not supported as they do not provide the necessary integration features Integration checklist You must provide information about Microsoft Exchange to the Intelli-M Access Exchange plugin when you configure it, including: Internet Domain. The internet domain name that Exchange uses for creating its addresses, i.e. the part of your Exchange address to the right of character. Exchange User Account. The chosen Exchange User account (and its password) that you specified for Calendar permissions in the Exchange Management Console ordinary Mailbox account WebMail URL. Intelli-M Access logs into Exchange via Exchange Web Services to monitor the requested Calendars using the you specified. The URL that you use to read your webmail in an internet browser is similar to the URL that you need. Room Mailbox Addresses. The address of each Room Mailbox you gave Full Access Permissions to in the ordinary Mailbox account in the Exchange Management Console. These addresses are used by Intelli-M Access to know which Room Mailbox accounts to monitor. Configuration of the Exchange Calendar is performed by creating an Intelli-M Access Peripheral, then referencing that Peripheral when you create one or more Rules configured to use that Peripheral Calendar permissions To integrate Microsoft Exchange with Intelli-M Access, you must configure Exchange to allow an ordinary Exchange Mailbox account to have Full Access permission to each Room Mailbox account whose calendars you want to monitor. Although you can use any Exchange Mailbox account for this purpose, we recommend that you create a Mailbox account specifically for monitoring calendars. To give Full Access permission to a mailbox to monitor the Room Mailbox Calendars: 1. Open the Microsoft Exchange Management Console. 2. In the tree view on the left side of the console window, click the plus sign to open Microsoft Exchange On-Premises (...), then click the plus sign to open Recipient Configuration. 3. Select Mailbox to view all Exchange Mailboxes in the right side view. 4. Right-click each Room Mailbox you want to manage, then select the Manage Full Access Permission... menu addendum item. 5. Follow the instructions to add the chosen ordinary Mailbox account to the list of accounts that have full access permissions to this Room Mailbox. 14

19 SECTION 3: MICROSOFT OUTLOOK INTEGRATION 6. Perform the steps above for all Room Mailboxes that represent areas with doors being managed by Intelli-M Access. 3.3 Create a Peripheral in Intelli-M Access To create a Peripheral: 1. Login to Intelli-M Access, then open the Peripherals tab. 2. Click the Create Peripheral command in the Actions menu to open the Create Peripheral dialog. See below. Create Peripheral dialog 3. Click New in the left frame to open a list of plugins available to use as Peripherals. The list should include one or more options. Create new Peripheral Intelli-M Access V4.0 Professional User Manual 15

20 SECTION 3: MICROSOFT OUTLOOK INTEGRATION If you do not see Exchange Calendar in the menu: a. Click Discover, then wait several seconds for Intelli-M Access to re-discover the plugins.. Click New again. If you still do not see the Exchange Calendar menu item, please verify that you are using a licensed Intelli-M Access Professional installation. If the plugin installation proceeded correctly, you will see the Exchange Calendar entry listed among the other menu items in the popup menu. 4. Select the Exchange Calendar menu item to start creating the Peripheral with this plugin. The Create new Exchange Calendar popup dialog will appear: New Exchange Calendar dialog 5. In the Create new Exchange Calendar popup dialog, enter the following: Domain: Enter the part of your Exchange address to the right of character. Username: Provide the username of the ordinary Mailbox account you previously gave Full Access Permissions to the Room Mailboxes in Exchange Management Console. Enter only the username portion of the account, the part of your Exchange address to the left of character. Password: Enter the password for the Username account you entered above. WebMail URL: Replace the mail.mycompany.com portion of the sample WebMail URL with your corporate webmail name. If you are using Exchange 2007 or 2010, the remainder of the URL is entered automatically. Room Mailboxes: For each Room Mailbox you previously configured, enter the address of each conference room, separating each address with the comma (,) character. The window will update to show a progress bar while Intelli-M Access connects to the Exchange server using your settings: 16

21 SECTION 3: MICROSOFT OUTLOOK INTEGRATION Exchange Calendar integration progress NOTE If the Peripheral Configuration parameters you entered are not accepted, or if a connectivity issue exists (such as a firewall blocking a port), the progress window will revert to the previous Create Peripheral menu where you can change your settings. For each Room Mailbox you specified, the Exchange plugin will send Intelli-M Access three test events: one for Meeting Reminder, one for Meeting Started, and one for Meeting Ended. The purpose for these test events is to inform Intelli-M Access of the Room Mailbox names and the events they will generate. This is used to verify that Intelli-M Access will display this information on the Rules page (for creating Rules). Intelli-M Access Events tab with Exchange Calendar test events 6. When the Create Peripheral process completes, a new entry in the Discovered Devices list will appear. Click the newly added Device to show the configuration settings in the right pane. Intelli-M Access V4.0 Professional User Manual 17

22 SECTION 3: MICROSOFT OUTLOOK INTEGRATION Device Name and configuration 7. You can change the name from its default if necessary, then click Create. The Peripheral will now be created with Room Mailbox names in the Peripherals page. See below. New peripheral Exchange Calendar (mailbox) 18

23 SECTION 3: MICROSOFT OUTLOOK INTEGRATION 3.4 Create Rules After creating a Peripheral that represents the Exchange Server and its Room Mailboxes, you can create Rules that act on Events generated by the Room Mailboxes for meeting notifications Create an Unlock Zone Rule Create an Unlock Zone Rule to unlock the door of a room associated with an Exchange Room Mailbox. To create the rule: 1. Open the Intelli-M Access Configuration interface, if necessary. 2. Click the Rules tab. 3. In the Rules tab, click Create Rule in the Actions list. A popup dialog will appear showing the Access Privilege Rule. 4. In the Type field at the top, open the drop-down lost, then select Unlock Zone. The popup dialog will populate with fields for supplying information to configure the unlock zone rule. See the figure below. Create Unlock Zone rule dialog 5. Configure the rule options as follows: a. Schedule. Choose a Schedule that covers the time you want this Rule to apply (usually the Always schedule).. Ignore the Group, Zone, Door and Reader tabs. c. Event. Select the Meeting Started (or Meeting Reminder) event from the list. Intelli-M Access V4.0 Professional User Manual 19

24 SECTION 3: MICROSOFT OUTLOOK INTEGRATION d. Peripheral. Choose the Room Mailbox name associated with the Door that secures that area. e. Target Zone. Choose the Zone to unlock. The Zone must contain the door that secures the area represented by the Room Mailbox. 6. Click Create Create a Revert Zone Rule You can re-lock the door of a room associated with an Exchange Room Mailbox by creating a Revert Zone Rule for that Room Mailbox. This will revert the door to its normal lock schedule (which is assumed to be locked). 1. From the Intelli-M Access interface, click the Configuration link. 2. Click the Rules tab. 3. When the Rules page appears, click the Create Rule Action from the Actions menu. 4. Open the combo box and select Revert Zone from the list. The popup dialog will populate with fields for supplying information to configure the Revert Zone Rule, which are the same as the Unlock Zone Rule. 5. Configure the rule options as follows: a. Schedule. Choose a Schedule that covers the time you want this Rule to apply (usually the Always schedule). 20

25 SECTION 3: MICROSOFT OUTLOOK INTEGRATION. Ignore the Group, Zone, Door and Reader tabs. c. Event. Select Meeting Ended from the list. d. Peripheral. Choose the same Room Mailbox that you specified in the Unlock Zone Rule. e. Target Zone. Choose the same Zone that you specified in the Unlock Zone Rule. 6. Click Create to create the Rule. 7. Perform these two tasks for each Door associated with a Room Mailbox Test the system For each zone you configured above, use Microsoft Outlook or another Exchange client create a meeting or appointment in the zone. Verify that for the meeting you scheduled, door(s) were unlocked and re-locked as expected. Following is an example for testing the integration configuration: 1. Create a meeting with an attendee(s). 2. Identify a zone you configured during the Intelli-M Access integration with Exchange Server. In the example shown below, Conference Room was added as a resource for the meeting. Intelli-M Access V4.0 Professional User Manual 21

26 SECTION 3: MICROSOFT OUTLOOK INTEGRATION Resources: 3. If you configured the a Meeting Reminder to unlock the resource (zone) door, set the reminder time for the meeting. The example below is shown using Microsoft Outlook. 4. Verify that the doors are unlocked and locked as expected. 22

27 SECTION 4: GOOGLE CALENDAR INTEGRATION SECTION 4 Google Calendar Integration Intelli-M Access Professional can integrate with Google Calendar to allow Google Calendar Appointments to automatically unlock and re-lock doors controlled by Intelli-M Access. Also, Google Calendar can send Meeting Reminder, Meeting Started, and Meeting Ended events to Intelli-M Access for room mailboxes. This form of ad-hoc scheduling allows you to manage the lock status of a door that doesn t operate on a regular schedule like that of an office or retail business. Sporting events, party reservations at public buildings or churches are typical venues where Google Calendar integration can be useful. 4.1 How it works Intelli-M Access will monitor the Calendar of each specified Room Mailbox. When a meeting or appointment is scheduled in the Calendar of a Room Mailbox, the Intelli-M Access integration with Google Calendar will send event information to Intelli-M Access. A Meeting Started event will be sent to Intelli-M Access when a meeting is scheduled to begin, and a Meeting Ended event will be sent to Intelli-M Access when the meeting is scheduled to end. If you also requested Google Calendar to send out a Meeting Reminder notification to the required attendees, it will also send a Meeting Reminder event to Intelli-M Access. These events appear in Intelli-M Access and can be used with the Rules feature to initiate actions, such as to unlock and re-lock meeting room or public-access doors. For example, Intelli-M Access can be configured to unlock a door when it receives a Meeting Reminder or Meeting Start event, and can be configured to re-lock the door (or revert the door schedule) when the Meeting Ended event is received. After configuring the unlock/revert Rules in Intelli-M Access, you can control door access by simply creating a meetings or appointments in Google Calendar. 4.2 Integration checklist To use Google Calendar integration, you must have a Gmail address. 4.3 Create a Peripheral in Intelli-M Access To create a peripheral: 1. Login to Intelli-M Access. 2. Open the Peripherals tab, then click Create Peripheral in the Actions Menu to open a Create Peripheral dialog: Intelli-M Access V4.0 Professional User Manual 23

28 SECTION 4: GOOGLE CALENDAR INTEGRATION Create Peripheral dialog 3. Click New in the left frame to open a list of plugins available to use as Peripherals. The list should include one or more options. Create Peripheral (New) menu If you do not see Google Calendar in the popup menu: a. Click Discover, then wait several seconds for Intelli-M Access to re-discover the plugins.. Click New again. If you still do not see the Google Calendar menu item, please verify that you are using a licensed Intelli-M Access Professional installation. If the plugin installation proceeded correctly, you will see the Google Calendar entry listed among the other menu items in the popup menu. 24

29 SECTION 4: GOOGLE CALENDAR INTEGRATION 4. Select the Google Calendar menu item to start creating the Peripheral. A Create new Google Calendar popup dialog will open. New Google Calendar dialog Enter the following information: Google Address: Provide your Gmail address. Password: Provide the password for the Gmail address you entered. Meeting Location names: Provide the name of each meeting location you plan to specify when creating Appointments in Google Calendar. Separate each address with the comma (,) character. NOTE Google Calendar Meeting Location names are whatever you provide Google Calendar when you create an apointment in the Google Calendar web page. Therefore, you must be careful to enter the names in Google Calendar exactly as you have entered them in the Meeting Location names box. Any misspellings will be viewed as a different Location. 5. Click Create Calendar. The window will show a progress bar while Intelli-M Access connects to the Google Calendar using the parameters you provided. Intelli-M Access V4.0 Professional User Manual 25

30 SECTION 4: GOOGLE CALENDAR INTEGRATION Google Calendar integration progress NOTE If the Peripheral Configuration parameters you entered are unacceptable, or if a connectivity issue exists (such as a firewall blocking a port), the progress window will revert to the previous Create Peripheral menu where you can change your settings. Google Calendar device created When the Create Peripheral process completes, a new entry in the Discovered Devices list will appear. 26

31 SECTION 4: GOOGLE CALENDAR INTEGRATION New Exchange Device added to Devices list 6. Click the newly added Device to show the configuration settings in the right pane. Device Name and configuration 7. You can change the Name from its default if necessary, then click Create. The Peripheral will now be created with Room Mailbox names in the Peripherals page. See below. Intelli-M Access V4.0 Professional User Manual 27

32 SECTION 4: GOOGLE CALENDAR INTEGRATION New peripheral Google Calendar (my ) 8. For each Meeting Location name you specified, the Google Calendar plugin will send Intelli-M Access three test events: one for Meeting Reminder, one for Meeting Started, and one for Meeting Ended. The purpose for these test events is to inform Intelli-M Access of the Room Mailbox names and the events they will generate. This is used to verify that Intelli-M Access will display this information on the Rules page (for creating Rules). Verify that these events can be seen in Intelli-M Access. 4.4 Create Rules After creating a Peripheral that represents the Google calendar and its room mailboxes, you can create Rules that act on events generated by the Room Mailboxes for meeting notifications Create an Unlock Zone Rule Create an Unlock Zone Rule to unlock the door of a room associated with a room mailbox. To create the rule: 28

33 SECTION 4: GOOGLE CALENDAR INTEGRATION 1. Open the Intelli-M Access Configuration interface, if necessary. Click the Rules tab In the Rules tab, click Create Rule in the Actions list. A popup dialog will appear showing the Access Privilege Rule. 4. In the Type field at the top, open the drop-down lost, then select Unlock Zone. The popup dialog will populate with fields for supplying information to configure the unlock zone rule. See the figure below. Create Unlock Zone rule dialog 5. Configure the rule options as follows: a. Schedule. Choose a Schedule that covers the time you want this Rule to apply (usually the Always schedule). Ignore the Group, Zone, Door and Reader tabs. c. Event. Select the Meeting Started (or Meeting Reminder) event from the list. Intelli-M Access V4.0 Professional User Manual 29

34 SECTION 4: GOOGLE CALENDAR INTEGRATION d. e. Peripheral. Choose the Room Mailbox name associated with the Door that secures that area. Target Zone. Choose the Zone to unlock. The Zone must contain the door that secures the area represented by the Room Mailbox. 6. Click Create to create the Rule Create a Revert Zone Rule You can re-lock the door of a room associated with an Exchange Room Mailbox by creating a Revert Zone Rule for that Room Mailbox. This will revert the door to its normal lock schedule (which is assumed to be locked). 1. From the Intelli-M Access interface, click the Configuration link. Click the Rules tab When the Rules page appears, click the Create Rule Action from the Actions menu. 4. Open the combo box and select Revert Zone from the list. The popup dialog will populate with fields for supplying information to configure the Revert Zone Rule, which are the same as the Unlock Zone Rule. 5. Configure the rule options as follows: 30

35 SECTION 4: GOOGLE CALENDAR INTEGRATION a.. Schedule. Choose a Schedule that covers the time you want this Rule to apply (usually the Always schedule). Ignore the Group, Zone, Door and Reader tabs. c. Event. Select Meeting Ended from the list. d. e. Peripheral. Choose the same Room Mailbox that you specified in the Unlock Zone Rule. Target Zone. Choose the same Zone that you specified in the Unlock Zone Rule. 6. Click Create to create the Rule. 7. Perform these two tasks for each Door associated with a Room Mailbox Test the system For each zone you configured above, open and log into Google Calendar with an Internet browser to create an appointment in the zone. (NOTE: To access Google Calendar you may need a special access code from your Google Calendar Administrator.) Verify that for the meeting you scheduled, door(s) were unlocked and re-locked as expected. Following is an example for testing the iintegration configuration: 1. Create an appointment with attendees 2. Identify a zone you configured during the Intelli-M Access integration with Google Calendar. In the example shown below, Conference Room (Where) and Executive Board Room were added as resources for meetings. Intelli-M Access V4.0 Professional User Manual 31

36 SECTION 4: GOOGLE CALENDAR INTEGRATION New Google Calendar Appointment Page Meeting Subject. Provide a subject for the new meeting. This will appear as part of the Event in Intelli-M Access. The other part of the Event will be the Meeting Reminder, Meeting Started and Meeting Ended Events. In the example above, the subject of the meeting is Important Meeting. Where. Provide the exact name of the location you specified in the Intelli-M Access Google Calendar configuration interface. NOTE The Where name and the name in Intelli-M Access must match. If they do not, the event w ill appear in IntelliM Access, but it will be seen as a locaiton not present, and no door will be unlocked. Reminders. If you keep the Reminder, a Meeting Reminder event will be generated in the time frame identified in the Calendar. All other items on the page are not relevant to Intelli-M Access. Use other items on the page as needed, then click Save to create the Appointment. 3. If you configured the a Meeting Reminder to unlock the resource (zone) door, set the reminder time for the meeting. 4. Verify that the door(s) unlock(s) and lock(s) as expected. 32

S-IMS-A Intelli-M Access Essentials V4.0 Installation and User Guide

S-IMS-A Intelli-M Access Essentials V4.0 Installation and User Guide S-IMS-A Intelli-M Access Essentials V4.0 Installation and User Guide For SKU: S-IMS-A ACCESS Essentials PLEASE READ THIS MANUAL BEFORE USING YOUR INTELLI-M ACCESS SYSTEM, and always follow the instructions

More information

Novell ZENworks Asset Management 7.5

Novell ZENworks Asset Management 7.5 Novell ZENworks Asset Management 7.5 w w w. n o v e l l. c o m October 2006 USING THE WEB CONSOLE Table Of Contents Getting Started with ZENworks Asset Management Web Console... 1 How to Get Started...

More information

Evoko Room Manager. System Administrator s Guide and Manual

Evoko Room Manager. System Administrator s Guide and Manual Evoko Room Manager System Administrator s Guide and Manual 1 1. Contents 1. Contents... 2 2. Read this first! Introduction to this Guide... 6 3. User Guide... 6 4. System Architecture Overview... 8 ----

More information

Amicus Link Guide: Outlook/Exchange E-mail

Amicus Link Guide: Outlook/Exchange E-mail Amicus Link Guide: Outlook/Exchange E-mail Applies to: Amicus Premium 2015 Synchronize your Amicus and Outlook e-mail. Choose a client-side link with your local Microsoft Outlook or a Server-side link

More information

WatchDox for Windows User Guide. Version 3.9.0

WatchDox for Windows User Guide. Version 3.9.0 Version 3.9.0 Notice Confidentiality This document contains confidential material that is proprietary WatchDox. The information and ideas herein may not be disclosed to any unauthorized individuals or

More information

Dell KACE K1000 System Management Appliance Version 5.4. Service Desk Administrator Guide

Dell KACE K1000 System Management Appliance Version 5.4. Service Desk Administrator Guide Dell KACE K1000 System Management Appliance Version 5.4 Service Desk Administrator Guide October 2012 2004-2012 Dell Inc. All rights reserved. Reproduction of these materials in any manner whatsoever without

More information

WatchDox for Windows. User Guide. Version 3.9.5

WatchDox for Windows. User Guide. Version 3.9.5 WatchDox for Windows User Guide Version 3.9.5 Notice Confidentiality This document contains confidential material that is proprietary WatchDox. The information and ideas herein may not be disclosed to

More information

Installing Microsoft Exchange Integration for LifeSize Control

Installing Microsoft Exchange Integration for LifeSize Control Installing Microsoft Exchange Integration for LifeSize Control September 2005 Part Number 132-00002-001, Version 1.1 Copyright Notice Copyright 2005 LifeSize Communications. All rights reserved. LifeSize

More information

OWA - Outlook Web App

OWA - Outlook Web App OWA - Outlook Web App Olathe Public Schools 0 Page MS Outlook Web App OPS Technology Department Last Revised: May 1, 2011 Table of Contents MS Outlook Web App... 1 How to Access the MS Outlook Web App...

More information

Outlook Web Access User Guide

Outlook Web Access User Guide Table of Contents Title Page How to login...3 Create a new message/send attachment...5 Remove the reading pane...10 Calendar functions...11 Distribution lists...11 Contacts list...13 Tasks...18 Options...19

More information

Android App User Guide

Android App User Guide www.novell.com/documentation Android App User Guide ZENworks Mobile Management 2.7.x August 2013 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of

More information

Aventail Connect Client with Smart Tunneling

Aventail Connect Client with Smart Tunneling Aventail Connect Client with Smart Tunneling User s Guide Windows v8.7.0 1996-2006 Aventail Corporation. All rights reserved. Aventail, Aventail Cache Control, Aventail Connect, Aventail Connect Mobile,

More information

Avaya Video Conferencing Manager Deployment Guide

Avaya Video Conferencing Manager Deployment Guide Avaya Video Conferencing Manager Deployment Guide August 2011 Avaya Video Conferencing Manager Deployment Guide 2 Avaya Video Conferencing Manager This guide is for network administrators who use Avaya

More information

NETWRIX EVENT LOG MANAGER

NETWRIX EVENT LOG MANAGER NETWRIX EVENT LOG MANAGER ADMINISTRATOR S GUIDE Product Version: 4.0 July/2012. Legal Notice The information in this publication is furnished for information use only, and does not constitute a commitment

More information

Configuration Guide BES12. Version 12.3

Configuration Guide BES12. Version 12.3 Configuration Guide BES12 Version 12.3 Published: 2016-01-19 SWD-20160119132230232 Contents About this guide... 7 Getting started... 8 Configuring BES12 for the first time...8 Configuration tasks for managing

More information

Managing users. Account sources. Chapter 1

Managing users. Account sources. Chapter 1 Chapter 1 Managing users The Users page in Cloud Manager lists all of the user accounts in the Centrify identity platform. This includes all of the users you create in the Centrify for Mobile user service

More information

Appointment Scheduler

Appointment Scheduler Appointment Scheduler User s Guide While every attempt is made to ensure both accuracy and completeness of information included in this document, errors can occur, and updates or improvements may be implemented

More information

HOTPin Integration Guide: DirectAccess

HOTPin Integration Guide: DirectAccess 1 HOTPin Integration Guide: DirectAccess Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is provided 'as is'; Celestix assumes no responsibility

More information

Configuration Task 3: (Optional) As part of configuration, you can deploy rules. For more information, see "Deploy Inbox Rules" below.

Configuration Task 3: (Optional) As part of configuration, you can deploy rules. For more information, see Deploy Inbox Rules below. Configure the E-mail Router After the E-mail Router has been installed, you can configure several aspects of it. Some of these configuration tasks are mandatory. Others are optional in that you use them

More information

Scheduling Software User s Guide

Scheduling Software User s Guide Scheduling Software User s Guide Revision 1.12 Copyright notice VisualTime is a trademark of Visualtime Corporation. Microsoft Outlook, Active Directory, SQL Server and Exchange are trademarks of Microsoft

More information

LifeSize Control TM Deployment Guide

LifeSize Control TM Deployment Guide LifeSize Control TM Deployment Guide July 2011 LifeSize Control Deployment Guide 2 LifeSize Control This guide is for network administrators who use LifeSize Control to manage video and voice communications

More information

Step-by-Step Guide for Microsoft Advanced Group Policy Management 4.0

Step-by-Step Guide for Microsoft Advanced Group Policy Management 4.0 Step-by-Step Guide for Microsoft Advanced Group Policy Management 4.0 Microsoft Corporation Published: September 2009 Abstract This step-by-step guide describes a sample scenario for installing Microsoft

More information

Live Maps. for System Center Operations Manager 2007 R2 v6.2.1. Installation Guide

Live Maps. for System Center Operations Manager 2007 R2 v6.2.1. Installation Guide Live Maps for System Center Operations Manager 2007 R2 v6.2.1 Installation Guide CONTENTS Contents... 2 Introduction... 4 About This Guide... 4 Supported Products... 4 Understanding Live Maps... 4 Live

More information

Quick Start Guide for VMware and Windows 7

Quick Start Guide for VMware and Windows 7 PROPALMS VDI Version 2.1 Quick Start Guide for VMware and Windows 7 Rev. 1.1 Published: JULY-2011 1999-2011 Propalms Ltd. All rights reserved. The information contained in this document represents the

More information

LifeSize Control Installation Guide

LifeSize Control Installation Guide LifeSize Control Installation Guide April 2005 Part Number 132-00001-001, Version 1.0 Copyright Notice Copyright 2005 LifeSize Communications. All rights reserved. LifeSize Communications has made every

More information

ArcMail Technology Defender Mail Server Configuration Guide for Microsoft Exchange Server 2003 / 2000

ArcMail Technology Defender Mail Server Configuration Guide for Microsoft Exchange Server 2003 / 2000 ArcMail Technology Defender Mail Server Configuration Guide for Microsoft Exchange Server 2003 / 2000 Version 3.2 ArcMail Technology 401 Edwards Street, Suite 1601 Shreveport, LA 71101 Support: (888) 790-9252

More information

Kaseya 2. Quick Start Guide. for Network Monitor 4.1

Kaseya 2. Quick Start Guide. for Network Monitor 4.1 Kaseya 2 VMware Performance Monitor Quick Start Guide for Network Monitor 4.1 June 7, 2012 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private

More information

COOK COUNTY OFFICE 365 MIGRATION USER GUIDE

COOK COUNTY OFFICE 365 MIGRATION USER GUIDE COOK COUNTY OFFICE 365 MIGRATION USER GUIDE Dear Cook County Office 365 User: Your mailbox is schedule to be migrated to Microsoft s Office 365 platform. Page 1 TABLE OF CONTENTS 01. PRE-MIGRATION RECOMMENDATIONS

More information

Sage 200 Web Time & Expenses Guide

Sage 200 Web Time & Expenses Guide Sage 200 Web Time & Expenses Guide Sage (UK) Limited Copyright Statement Sage (UK) Limited, 2006. All rights reserved If this documentation includes advice or information relating to any matter other than

More information

vcloud Director User's Guide

vcloud Director User's Guide vcloud Director 5.5 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of

More information

MailEnable Connector for Microsoft Outlook

MailEnable Connector for Microsoft Outlook MailEnable Connector for Microsoft Outlook Version 2.23 This guide describes the installation and functionality of the MailEnable Connector for Microsoft Outlook. Features The MailEnable Connector for

More information

Cisco TelePresence Management Suite Extension for Microsoft Exchange

Cisco TelePresence Management Suite Extension for Microsoft Exchange Cisco TelePresence Management Suite Extension for Microsoft Exchange Installation Guide D14846.01 June 2011 Software version 2.3 Contents Introduction 5 End user guidance 5 Server requirements 6 Exchange

More information

FuseMail- Exchange ControlPanel Admin Guide Feb.27-14 V1.0. Exchange ControlPanel Administration Guide

FuseMail- Exchange ControlPanel Admin Guide Feb.27-14 V1.0. Exchange ControlPanel Administration Guide Exchange ControlPanel Administration Guide Table of Contents Top Level Portal Administration... 4 Signing In to Control Panel... 4 Restoring Account Password... 5 Change Account Details... 7 Viewing Account

More information

Using Outlook WebAccess

Using Outlook WebAccess Using Outlook WebAccess Outlook Toolbars - Terminology Update all folders New Move/Copy Reply Forward Check for New Messages Help Show/Hide Folders Delete Reply to All Show/Hide Reading Pain Search Address

More information

How to install and use the File Sharing Outlook Plugin

How to install and use the File Sharing Outlook Plugin How to install and use the File Sharing Outlook Plugin Thank you for purchasing Green House Data File Sharing. This guide will show you how to install and configure the Outlook Plugin on your desktop.

More information

Oracle Enterprise Manager

Oracle Enterprise Manager Oracle Enterprise Manager System Monitoring Plug-in Installation Guide for Microsoft Active Directory Release 12.1.0.1.0 E28548-04 February 2014 Microsoft Active Directory, which is included with Microsoft

More information

Getting Started with Microsoft Office Live Meeting. Published October 2007 Last Update: August 2009

Getting Started with Microsoft Office Live Meeting. Published October 2007 Last Update: August 2009 Getting Started with Microsoft Office Live Meeting Published October 2007 Last Update: August 2009 Information in this document, including URL and other Internet Web site references, is subject to change

More information

Inter-Tel Audio and Web Conferencing

Inter-Tel Audio and Web Conferencing MITEL Inter-Tel Audio and Web Conferencing User Guide NOTICE This Inter-Tel Audio and Web Conferencing User Guide is released by Inter-Tel, Inc. as a guide for end-users. It provides information necessary

More information

EMC ViPR Controller Add-in for Microsoft System Center Virtual Machine Manager

EMC ViPR Controller Add-in for Microsoft System Center Virtual Machine Manager EMC ViPR Controller Add-in for Microsoft System Center Virtual Machine Manager Version 2.3 Installation and Configuration Guide 302-002-080 01 Copyright 2013-2015 EMC Corporation. All rights reserved.

More information

Using Avaya Aura Messaging

Using Avaya Aura Messaging Using Avaya Aura Messaging Release 6.3.2 Issue 1 December 2014 Contents Chapter 1: Getting Started... 4 Messaging overview... 4 Prerequisites... 4 Accessing your mailbox from any phone... 4 Accessing the

More information

Getting Started with Microsoft Office Live Meeting. Published October 2007

Getting Started with Microsoft Office Live Meeting. Published October 2007 Getting Started with Microsoft Office Live Meeting Published October 2007 Information in this document, including URL and other Internet Web site references, is subject to change without notice. Unless

More information

Core Protection for Virtual Machines 1

Core Protection for Virtual Machines 1 Core Protection for Virtual Machines 1 Comprehensive Threat Protection for Virtual Environments. Installation Guide e Endpoint Security Trend Micro Incorporated reserves the right to make changes to this

More information

WebSpy Vantage Ultimate 2.2 Web Module Administrators Guide

WebSpy Vantage Ultimate 2.2 Web Module Administrators Guide WebSpy Vantage Ultimate 2.2 Web Module Administrators Guide This document is intended to help you get started using WebSpy Vantage Ultimate and the Web Module. For more detailed information, please see

More information

Mobility Manager 9.5. Users Guide

Mobility Manager 9.5. Users Guide Mobility Manager 9.5 Users Guide LANDESK MOBILITY MANAGER Copyright 2002-2013, LANDesk Software, Inc. and its affiliates. All rights reserved. LANDesk and its logos are registered trademarks or trademarks

More information

Table of Contents INTRODUCTION... 2 HOME PAGE... 3. Announcements... 7 Personalize & Change Password... 8 Reminders... 9 SERVICE CATALOG...

Table of Contents INTRODUCTION... 2 HOME PAGE... 3. Announcements... 7 Personalize & Change Password... 8 Reminders... 9 SERVICE CATALOG... Table of Contents INTRODUCTION... 2 HOME PAGE... 3 Announcements... 7 Personalize & Change Password... 8 Reminders... 9 SERVICE CATALOG... 11 Raising a Service Request... 12 Edit the Service Request...

More information

WatchDox Administrator's Guide. Application Version 3.7.5

WatchDox Administrator's Guide. Application Version 3.7.5 Application Version 3.7.5 Confidentiality This document contains confidential material that is proprietary WatchDox. The information and ideas herein may not be disclosed to any unauthorized individuals

More information

BaseManager & BACnet Manager VM Server Configuration Guide

BaseManager & BACnet Manager VM Server Configuration Guide BaseManager & BACnet Manager VM Server Configuration Guide For Self-Hosted BaseManager & BACnet Manager Servers Deployed as Virtual Machines August 27, 2015 Customer Service 1-866-294-5847 i Baseline Inc.

More information

GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android

GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android GO!Enterprise MDM for Android, Version 3.x GO!Enterprise MDM for Android 1 Table of Contents GO!Enterprise MDM

More information

Lepide Exchange Recovery Manager

Lepide Exchange Recovery Manager Configuration Guide Lepide Exchange Recovery Manager Lepide Software Private Limited, All Rights Reserved This User Guide and documentation is copyright of Lepide Software Private Limited, with all rights

More information

Deploying System Center 2012 R2 Configuration Manager

Deploying System Center 2012 R2 Configuration Manager Deploying System Center 2012 R2 Configuration Manager This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED, OR STATUTORY, AS TO THE INFORMATION IN THIS DOCUMENT.

More information

Audio and Web Conferencing

Audio and Web Conferencing MITEL Audio and Web Conferencing User Guide Notice This User Guide is released by Mitel Networks Corporation as a guide for end users. It provides information necessary to use Audio and Web Conferencing.

More information

Basic Setup Guide. Remote Administrator 4 NOD32 Antivirus 4 Business Edition Smart Security 4 Business Edition

Basic Setup Guide. Remote Administrator 4 NOD32 Antivirus 4 Business Edition Smart Security 4 Business Edition Basic Setup Guide Remote Administrator 4 NOD32 Antivirus 4 Business Edition Smart Security 4 Business Edition Contents Getting started...1 Software components...1 Section 1: Purchasing and downloading

More information

Velocity Web Services Client 1.0 Installation Guide and Release Notes

Velocity Web Services Client 1.0 Installation Guide and Release Notes Velocity Web Services Client 1.0 Installation Guide and Release Notes Copyright 2014-2015, Identiv. Last updated June 24, 2015. Overview This document provides the only information about version 1.0 of

More information

BlackBerry Internet Service. Version: 4.5.1. Administration Guide

BlackBerry Internet Service. Version: 4.5.1. Administration Guide BlackBerry Internet Service Version: 4.5.1 Administration Guide Published: 2014-01-22 SWD-20140122155744258 Contents 1 Getting started...6 Administrative feature availability... 6 Availability of features

More information

OPS Data Quick Start Guide

OPS Data Quick Start Guide OPS Data Quick Start Guide OPS Data Features Guide Revision: October, 2014 Technical Support (24/7) - (334) 705-1605 http://www.opelikapower.com Quick Start Guide OPS Data: Beginning today, you have access

More information

User Guide. Live Meeting. MailStreet Live Support: 866-461-0851

User Guide. Live Meeting. MailStreet Live Support: 866-461-0851 User Guide Live Meeting Information in this document, including URL and other Internet Web site references, is subject to change without notice. Unless otherwise noted, the example companies, organizations,

More information

Administering Avaya one-x Agent with Central Management

Administering Avaya one-x Agent with Central Management Administering Avaya one-x Agent with Central Management Release 2.0 November 2009 2009 Avaya Inc. All Rights Reserved. Notice While reasonable efforts were made to ensure that the information in this document

More information

WhatsUp Gold v16.1 Installation and Configuration Guide

WhatsUp Gold v16.1 Installation and Configuration Guide WhatsUp Gold v16.1 Installation and Configuration Guide Contents Installing and Configuring Ipswitch WhatsUp Gold v16.1 using WhatsUp Setup Installing WhatsUp Gold using WhatsUp Setup... 1 Security guidelines

More information

Installing the Virtual Desktop Application (MAC)

Installing the Virtual Desktop Application (MAC) Installing the Virtual Desktop Application (MAC) The folowing instructions will guide you through the process of installing the components necessary to connect in to the NEL B Virtual Desktop environment

More information

DIGIPASS Authentication for GajShield GS Series

DIGIPASS Authentication for GajShield GS Series DIGIPASS Authentication for GajShield GS Series With Vasco VACMAN Middleware 3.0 2008 VASCO Data Security. All rights reserved. Page 1 of 1 Integration Guideline Disclaimer Disclaimer of Warranties and

More information

Kaseya 2. Quick Start Guide. for Network Monitor 4.1

Kaseya 2. Quick Start Guide. for Network Monitor 4.1 Kaseya 2 Syslog Monitor Quick Start Guide for Network Monitor 4.1 June 5, 2012 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private Sector

More information

HDA Integration Guide. Help Desk Authority 9.0

HDA Integration Guide. Help Desk Authority 9.0 HDA Integration Guide Help Desk Authority 9.0 2011ScriptLogic Corporation ALL RIGHTS RESERVED. ScriptLogic, the ScriptLogic logo and Point,Click,Done! are trademarks and registered trademarks of ScriptLogic

More information

Cisco WebEx Mail Administrator's Guide

Cisco WebEx Mail Administrator's Guide Cisco WebEx Mail Administrator's Guide Copyright 1997-2009 Cisco Systems, Inc. and/or its affiliated entities. All rights reserved. WEBEX, CISCO, Cisco WebEx, the CISCO logo, and the Cisco WebEx logo are

More information

Installation and Configuration Guide

Installation and Configuration Guide Installation and Configuration Guide BlackBerry Resource Kit for BlackBerry Enterprise Service 10 Version 10.2 Published: 2015-11-12 SWD-20151112124827386 Contents Overview: BlackBerry Enterprise Service

More information

End User Configuration

End User Configuration CHAPTER114 The window in Cisco Unified Communications Manager Administration allows the administrator to add, search, display, and maintain information about Cisco Unified Communications Manager end users.

More information

NETWRIX USER ACTIVITY VIDEO REPORTER

NETWRIX USER ACTIVITY VIDEO REPORTER NETWRIX USER ACTIVITY VIDEO REPORTER ADMINISTRATOR S GUIDE Product Version: 1.0 January 2013. Legal Notice The information in this publication is furnished for information use only, and does not constitute

More information

Virtual Office Account Manager Phone System Setup Guide. 8x8 Virtual Office Phone System Setup Guide

Virtual Office Account Manager Phone System Setup Guide. 8x8 Virtual Office Phone System Setup Guide 8x8 Virtual Office Version 1.1, October 2011 Contents Introduction...3 System Requirements...4 Supported Operating Systems....4 Required Plug-ins....4 Supported Browsers....4 Required Firewall Ports...4

More information

Horizon Debt Collect. User s and Administrator s Guide

Horizon Debt Collect. User s and Administrator s Guide Horizon Debt Collect User s and Administrator s Guide Microsoft, Windows, Windows NT, Windows 2000, Windows XP, and SQL Server are registered trademarks of Microsoft Corporation. Sybase is a registered

More information

NetWrix Account Lockout Examiner Version 4.0 Administrator Guide

NetWrix Account Lockout Examiner Version 4.0 Administrator Guide NetWrix Account Lockout Examiner Version 4.0 Administrator Guide Table of Contents Concepts... 1 Product Architecture... 1 Product Settings... 2 List of Managed Domains and Domain Controllers... 2 Email

More information

RoomWizard Synchronization Software Manual Installation Instructions

RoomWizard Synchronization Software Manual Installation Instructions 2 RoomWizard Synchronization Software Manual Installation Instructions Table of Contents Exchange Server Configuration... 4 RoomWizard Synchronization Software Installation and Configuration... 5 System

More information

8x8 Virtual Office Phone System Setup Guide

8x8 Virtual Office Phone System Setup Guide 8x8 Virtual Office May 2013 Effective May 10, 2013, the Privileges tab in the top navigation bar of the Account Manager was renamed My Account. Privileges and User Profiles can now be found in the My Account

More information

Using Avaya Flare Experience for Windows

Using Avaya Flare Experience for Windows Using Avaya Flare Experience for Windows Release 9.0 Issue 02.01 September 2013 Contents Chapter 1: About Flare Experience... 5 About Flare Experience... 5 Main window... 6 Button descriptions... 10 Chapter

More information

BroadTouch Business Communicator for Desktop

BroadTouch Business Communicator for Desktop BroadTouch Business Communicator for Desktop User Guide Release 10.0.2 Document Version 1 9737 Washingtonian Boulevard, Suite 350 Gaithersburg, MD 20878 Tel +1 301.977.9440 WWW.BROADSOFT.COM BroadTouch

More information

NETWRIX ACCOUNT LOCKOUT EXAMINER

NETWRIX ACCOUNT LOCKOUT EXAMINER NETWRIX ACCOUNT LOCKOUT EXAMINER ADMINISTRATOR S GUIDE Product Version: 4.1 July 2014. Legal Notice The information in this publication is furnished for information use only, and does not constitute a

More information

Amazon WorkMail. User Guide Version 1.0

Amazon WorkMail. User Guide Version 1.0 Amazon WorkMail User Guide Amazon WorkMail: User Guide Copyright 2016 Amazon Web Services, Inc. and/or its affiliates. All rights reserved. Amazon's trademarks and trade dress may not be used in connection

More information

Citrix Access Gateway Plug-in for Windows User Guide

Citrix Access Gateway Plug-in for Windows User Guide Citrix Access Gateway Plug-in for Windows User Guide Access Gateway 9.2, Enterprise Edition Copyright and Trademark Notice Use of the product documented in this guide is subject to your prior acceptance

More information

Enterprise Toolbar User s Guide. Revised March 2015

Enterprise Toolbar User s Guide. Revised March 2015 Revised March 2015 Copyright Notice Trademarks Copyright 2007 DSCI, LLC All rights reserved. Any technical documentation that is made available by DSCI, LLC is proprietary and confidential and is considered

More information

The LSUHSC N.O. Email Archive

The LSUHSC N.O. Email Archive The LSUHSC N.O. Email Archive Introduction The LSUHSC N.O. email archive permanently retains a copy of all email items sent and received by LSUHSC N.O. Academic email users. Email items will be accessible

More information

Getting Started. Getting Started with Time Warner Cable Business Class. Voice Manager. A Guide for Administrators and Users

Getting Started. Getting Started with Time Warner Cable Business Class. Voice Manager. A Guide for Administrators and Users Getting Started Getting Started with Time Warner Cable Business Class Voice Manager A Guide for Administrators and Users Table of Contents Table of Contents... 2 How to Use This Guide... 3 Administrators...

More information

RMFT Outlook Add-In User Guide

RMFT Outlook Add-In User Guide RMFT Outlook Add-In User Guide Software Version 2.5 November 23, 2011 RepliWeb, Inc., 6441 Lyons Road, Coconut Creek, FL 33073 Tel: (954) 946-2274, Fax: (954) 337-6424 E-mail: info@repliweb.com, Support:

More information

Managing policies. Chapter 7

Managing policies. Chapter 7 Chapter 7 Managing policies You use the Policies tab in Admin Portal to create policy sets for roles. A policy set lets you configure the following categories of policies: Mobile Device Policies Use to

More information

Trustwave SEG Cloud Customer Guide

Trustwave SEG Cloud Customer Guide Trustwave SEG Cloud Customer Guide Legal Notice Copyright 2015 Trustwave Holdings, Inc. All rights reserved. This document is protected by copyright and any distribution, reproduction, copying, or decompilation

More information

GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android with TouchDown

GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android with TouchDown GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android with TouchDown GO!Enterprise MDM for Android, Version 3.x GO!Enterprise MDM for Android with TouchDown 1 Table

More information

How To Use Senior Systems Cloud Services

How To Use Senior Systems Cloud Services Senior Systems Cloud Services In this guide... Senior Systems Cloud Services 1 Cloud Services User Guide 2 Working In Your Cloud Environment 3 Cloud Profile Management Tool 6 How To Save Files 8 How To

More information

AT&T Conferencing Add-in for Microsoft Outlook v10.5

AT&T Conferencing Add-in for Microsoft Outlook v10.5 AT&T Conferencing Add-in for Microsoft Outlook v10.5 July 2014 2014 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks contained herein are trademarks of AT&T

More information

Active Directory Self-Service FAQ

Active Directory Self-Service FAQ Active Directory Self-Service FAQ General Information: info@cionsystems.com Online Support: support@cionsystems.com CionSystems Inc. Mailing Address: 16625 Redmond Way, Ste M106 Redmond, WA. 98052 http://www.cionsystems.com

More information

XenClient Enterprise Synchronizer Installation Guide

XenClient Enterprise Synchronizer Installation Guide XenClient Enterprise Synchronizer Installation Guide Version 5.1.0 March 26, 2014 Table of Contents About this Guide...3 Hardware, Software and Browser Requirements...3 BIOS Settings...4 Adding Hyper-V

More information

Discovery Guide. Secret Server. Table of Contents

Discovery Guide. Secret Server. Table of Contents Secret Server Discovery Guide Table of Contents Introduction... 3 How Discovery Works... 3 Active Directory / Local Windows Accounts... 3 Unix accounts... 3 VMware ESX accounts... 3 Why use Discovery?...

More information

Security Assertion Markup Language (SAML) Site Manager Setup

Security Assertion Markup Language (SAML) Site Manager Setup Security Assertion Markup Language (SAML) Site Manager Setup Trademark Notice Blackboard, the Blackboard logos, and the unique trade dress of Blackboard are the trademarks, service marks, trade dress and

More information

Using Avaya Aura Messaging

Using Avaya Aura Messaging Using Avaya Aura Messaging 6.0 November 2011 2010 Avaya Inc. All Rights Reserved. Notice While reasonable efforts have been made to ensure that the information in this document is complete and accurate

More information

NETWRIX CHANGE NOTIFIER

NETWRIX CHANGE NOTIFIER NETWRIX CHANGE NOTIFIER FOR SQL SERVER QUICK-START GUIDE Product Version: 2.6.194 February 2014. Legal Notice The information in this publication is furnished for information use only, and does not constitute

More information

VMware vcenter Log Insight Getting Started Guide

VMware vcenter Log Insight Getting Started Guide VMware vcenter Log Insight Getting Started Guide vcenter Log Insight 1.5 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by

More information

How To Manage Your Quarantine Email On A Blackberry.Com

How To Manage Your Quarantine Email On A Blackberry.Com Barracuda Spam Firewall User s Guide 1 Copyright Copyright 2005, Barracuda Networks www.barracudanetworks.com v3.2.22 All rights reserved. Use of this product and this manual is subject to license. Information

More information

Administration Guide. BlackBerry Enterprise Service 12. Version 12.0

Administration Guide. BlackBerry Enterprise Service 12. Version 12.0 Administration Guide BlackBerry Enterprise Service 12 Version 12.0 Published: 2015-01-16 SWD-20150116150104141 Contents Introduction... 9 About this guide...10 What is BES12?...11 Key features of BES12...

More information

User Guide. Laplink Software, Inc. User Guide MN-LLE-EN-05 (REV. 2/2010) h t t p : / / w w w. l a p l i n k. c o m / h e l p

User Guide. Laplink Software, Inc. User Guide MN-LLE-EN-05 (REV. 2/2010) h t t p : / / w w w. l a p l i n k. c o m / h e l p 1 Laplink Software, Inc. Customer Service/Technical Support: Web: http://www.laplink.com/help E-mail: CustomerService@laplink.com User Guide Laplink Software, Inc. 14335 NE 24th Street, Suite 201 Bellevue,

More information

Configuration Guide. SafeNet Authentication Service. SAS Agent for Microsoft Internet Information Services (IIS)

Configuration Guide. SafeNet Authentication Service. SAS Agent for Microsoft Internet Information Services (IIS) SafeNet Authentication Service Configuration Guide Technical Manual Template Release 1.0, PN: 000-000000-000, Rev. A, March 2013, Copyright 2013 SafeNet, Inc. All rights reserved. 1 Document Information

More information

Quick Start Guide for Parallels Virtuozzo

Quick Start Guide for Parallels Virtuozzo PROPALMS VDI Version 2.1 Quick Start Guide for Parallels Virtuozzo Rev. 1.1 Published: JULY-2011 1999-2011 Propalms Ltd. All rights reserved. The information contained in this document represents the current

More information

Integrating LANGuardian with Active Directory

Integrating LANGuardian with Active Directory Integrating LANGuardian with Active Directory 01 February 2012 This document describes how to integrate LANGuardian with Microsoft Windows Server and Active Directory. Overview With the optional Identity

More information

Installation Manual UC for Business Unified Messaging for Exchange 2010

Installation Manual UC for Business Unified Messaging for Exchange 2010 Installation Manual UC for Business Unified Messaging for Exchange 2010 NEC Corporation nec.com Unified Messaging for Exchange Installation Manual - Exchange 2010 Edition Table of Contents About this Manual...

More information

Administration GUIDE. Exchange Database idataagent. Published On: 11/19/2013 V10 Service Pack 4A Page 1 of 233

Administration GUIDE. Exchange Database idataagent. Published On: 11/19/2013 V10 Service Pack 4A Page 1 of 233 Administration GUIDE Exchange Database idataagent Published On: 11/19/2013 V10 Service Pack 4A Page 1 of 233 User Guide - Exchange Database idataagent Table of Contents Overview Introduction Key Features

More information