Knowledge Base Article

Size: px
Start display at page:

Download "Knowledge Base Article"

Transcription

1 Knowledge Base Article Example Project involving Scripting Copyright , ISONAS Security Systems All rights reserved

2 Table of Contents 1: INTRODUCTION : PROBLEM DESCRIPTION: : LOCKDOWN SOLUTION : LOCKDOWN CARDS: : LOCKDOWN CARDS (ALTERNATE CONFIGURATION): : PUSH-BUTTON RESETS THE DOORS STATUS: : INRSERV CONFIGURATION: : SCRIPT TESTING: : NOTIFICATIONS : EX-EMPLOYEE ACCESS ATTEMPT NOTIFICATION: Document Version ( KBA0060Scripting.Doc ) Date of Revision Revision Author Description 10/27/ Shirl Jones Initial Release 1//18/2009 1,1 Shirl Jones Notification added

3 1: INTRODUCTION This document describes an advanced installation, in which the Scripting features of the Crystal Matrix software are used. By reviewing the example configurations, you should gain an understanding of the different ways you can set up the ISONAS system to meet your customer s requirements. It is assumed that you are already comfortable and familiar with configuring the basic Who/When/Where concepts within the Crystal Matrix Software. 1.1: PROBLEM DESCRIPTION: The Tropical High School (THS) is installing the ISONAS Access Control System. The facility is a five (5) story building, with an elevator, and multiple exterior and interior doors being controlled by the ISONAS Access Control System. The part of the project that this document discusses includes: Initial Installation Requirements Supply lockdown cards for both the Principal and Vice-principal. When these cards are used at any reader in the facility, the following doors go into lockdown mode: Front Lobby, Gym, LoadingDock, and EastSide To help assure that the Principal or Vice-Principal realize that they just placed the school into lockdown mode, these card should be rejected and not open the doors. Supply a push-button located in the school s office that resets these doors back into their normal mode of operation. As we will see, the lockdown cards solution s design requires use of the Scripting feature. In addition, the school will be using the Scripting sub-system s notification functionality to report on any ex-employees who are attempting to access the school. 2: LOCKDOWN SOLUTION Note: Many times, there are multiple ways that the ISONAS system can be configured to accomplish a certain task. These examples demonstrate one configuration that addresses the client s needs. Scripting 3

4 2.1: LOCKDOWN CARDS: The basic business rule we are implementing here is:. When: A member of the AuthLockDown people-group, presents their badge at any reader-controller in the facility Then: Their badge will be rejected, and the exterior doors of the school will be placed into the Lockdown state. Configuring the ISONAS system to support this feature requires: 1. Defining a Door Group THS_AllDoors that contains all doors in the system a. This Door Group is used when defining which doors the Lockdown card can be presented to. 2. Defining a People Group AuthLockDown for those people who will have authority to place the school in the lockdown condition 3. Creating a 2 nd Person entry for the Principal and a 2 nd entry for the Vice- Principal in the Person database, a. The person who is assigned these lockdown badges will have another badge that they normally use to access the facilities. The client requests that the lockdown badges be rejected when presented to the doors. The action of rejecting these badges serves as a warning to the person presenting the card that they just placed the school into the lockdown condition. b. Assign these 2 nd People entries to the AuthLockDown group c. The Unique ID for each person s 2 nd entry will start with the text LockDown as a reminder of the purpose of this entry. d. Assure that there is no permission defined that gives the AuthLockDown Group access to any location. 4. Assign the Lockdown Badges to each person s 2 nd entry. Scripting 4

5 5. Define the Script that places the exterior doors into the lockdown mode. a. Define the action that initiates the Script as shown below i. A card belonging to a person assigned to the AuthLockDown Group ii. Was presented to a door in the THS_All Door Group iii. And the card was rejected. b. Define the Script itself as shown <REMARK> Tropical High School Exterior Lockdown Script <REMARK> Script last modified: 10/25/2008 by Tom <LOCKDOWN><THS_FrontLobby> <LOCKDOWN><THS_Gym> <LOCKDOWN><THS_LoadingDock> <LOCKDOWN><THS_EastSide> c. Please note that the syntax of the Scripting commands are documented in the ISONAS Scripting and TCP/IP Interface document that can be found in application s sub-directory..\isonas\docs Scripting 5

6 2.2: LOCKDOWN CARDS (ALTERNATE CONFIGURATION): An alternative configuration would remove the need for a 2 nd entry in the People database for the Principal and Vice-Principal. It uses the Count Limitation feature of the Crystal Software. If the site uses Count Limited for other purposes, then a careful review should be done to assure that neither the Principal nor the Vice-Principal would have another reason to use another credential that could also be Count Limited. Configuring the ISONAS system to support this feature requires: 1. Defining a Door Group THS_AllDoors that contains all doors in the system a. This Door Group is used when defining which doors the Lockdown card can be presented to. 2. Defining a People Group AuthLockDown for those people who will have authority to place the school in the lockdown condition 3. Assign the Lockdown badges to the Principal and Vice-Principal a. Modify these badges so they are count limited and the remaining count is zero (0) Scripting 6

7 4. Define the Script that places the exterior doors into the lockdown mode. a. Define the action that initiates the Script as shown below i. A card belonging to a person assigned to the AuthLockDown Group ii. Was presented to a door in the THS_All Door Group iii. And the card was rejected with a Reject Overlimit condition. b. Define the Script itself as shown <REMARK> Tropical High School Exterior Lockdown Script <REMARK> Script last modified: 10/25/2008 by Tom <LOCKDOWN><THS_FrontLobby> <LOCKDOWN><THS_Gym> <LOCKDOWN><THS_LoadingDock> <LOCKDOWN><THS_EastSide> c. Please note that the syntax of the Scripting commands are documented in the ISONAS Scripting and TCP/IP Interface document that can be found in application s sub-directory..\isonas\docs Scripting 7

8 2.3: PUSH-BUTTON RESETS THE DOORS STATUS: The School s office will have a push-button installed, which will be tied into the office s ISONAS reader-controller AUX input. When activated, the AUX input will run a script to place the exterior doors back into their normal status. 1. Define the Script that places the exterior doors into the lockdown mode. a. Define the action that initiates the Script as shown below i. The THS_Office door s AUX input opens the office door. Scripting 8

9 b. Define the script as shown. <REMARK> Tropical High School Return to Normal Script <REMARK> Script last modified: 10/25/2008 by Tom <RESETNORMAL><THS_FrontLobby> <RESETNORMAL><THS_Gym> <RESETNORMAL><THS_LoadingDock> <RESETNORMAL><THS_EastSide> c. Assure that the THS_Office Door is configured to use the People/ Permissions databases to validate the AUX input. d. Add a Permission to authorize the AUX input for 24 hours a day, 7 days a week. i. In the example above the Group AUX Button exists, and the AUX person is assigned to that group. The Shift Always exists, and is valid 24x7. Now the system has been configured to match the customer s requirements. Scripting 9

10 2.4: INRSERV CONFIGURATION: The Crystal Matrix INRServ process handles the processing of Scripts and the events that initiate the scripting. The full documentation on the INRServ process is found in the ISONAS Script and TCP/IP Interface document. You can find a copy of this document in the..\program Files\ISONAS\Docs folder. A few configuration notes for the school s INRServ process. Configure the INRServer to run as a Windows Service Configure the TCP/IP interface to Start Automatically on Load Configure the Scripts to Start Automatically on Load Scripting 10

11 2.4: SCRIPT TESTING: The school has a put a plan in-place to periodically test the scripts. Testing will be done on either a monthly or bi-monthly basis. This will assure that any other Crystal Matrix configuration changes that have been made have not prevented the lockdown scripts from properly doing their job. Two examples of configuration changes that could affect the scripts would include: o The School decides to rename the doors within the Crystal Software package. The scripts would need to be updated with the new door names. o The server running the access system is reconfigured to no longer run the Crystal Matrix INRServ process. This testing also assures that the Lockdown cards are readily available to the Principal and Vice-Principal. Scripting 11

12 3: NOTIFICATIONS The Crystal Matrix notification feature is very powerful and flexible. You have control to: Select the System Events that initiate the s Select who the s are sent to Define the content of the message Optionally include event specific information in the To illustrate the strength of the facility, an example usage is described below. 3.1: EX-EMPLOYEE ACCESS ATTEMPT NOTIFICATION: The school district would like to be warned by if an ex-employee has attempted to enter the facility using their old credential. Procedurally, the school will handle an employee who has left by: Deactivate the employee s access by removing all of their current PeopleGroup assignments Assigning that person to the Ex-Employees PeopleGroup. The Crystal Matrix configuration used to accomplish the notification is: 1. The system will have a PeopleGroup defined for Ex-Employees 2. The Ex-Employee PeopleGroup will not be used by any Permissions. 3. A Script will be defined that runs whenever a member of the Ex-Employee PeopleGroup is rejected at any door. 4. This Script will generate a notification that is sent to the school district s security office and human resources department. Scripting 12

13 3.1.1: SYSTEM CONFIGURATION FOR EX-EMPLOYEE HANDLING: 1. Define the Script that generates the notification. a. Define the action that initiates the Script as shown below i. A card was presented to a door in the THS_All Door Group ii. The card belonged to a person assigned to the Ex_Employee PeopleGroup iii. And the card was rejected. b. Define the script as shown. <REMARK> Tropical High School ExEmployee Access Attempt <REMARK> Script last modified: 10/25/2008 by Tom <QUEUE ><security@ths.org;human_resources@ths.org><20> <Ex-Employee Attempted Access> <Please notify School > < ><EVENT DATA> This script will send the to two recipients. There will be a 20 second delay before the is sent, to allow the system to combine multiple access-attempts into a single . The EVENT DATA entry adds the details of the access-attempt to the . Scripting 13

14 2. Configure the Scripting System s Notification settings. The INRServ s TCP/IP configuration window contains the notification settings. Below is shown the school s configuration. 3. An ex-employee s access attempt would generate an that looks like: This shows that Mike Gregory attempted to enter the school at 3:06 AM, thru the THS_SouthEast Door. Scripting 14

15 For more information: Web: Tel: x102 (toll-free) or x102 (CO) Fax: ISONAS Headquarters: 4720 Walnut Street, Suite 200, Boulder, Colorado USA Scripting 15

Knowledge Base Article

Knowledge Base Article Knowledge Base Article Monitor & Control of Cabinets, Lockers, and Closets with the PowerNet More than just Entryways Copyright 2012, ISONAS Security Systems All rights reserved Table of Contents 1: INTRODUCTION...

More information

Knowledge Base Article

Knowledge Base Article Knowledge Base Article Running the ISONAS Crystal Matrix Access Control Software from multiple workstations. Copyright 2008-2012, ISONAS Security Systems All rights reserved Table of Contents 1: INTRODUCTION...

More information

Knowledge Base Article. Integrating ISONAS Access Control System with TagMaster LR-series RFID Readers

Knowledge Base Article. Integrating ISONAS Access Control System with TagMaster LR-series RFID Readers Knowledge Base Article Integrating ISONAS Access Control System with TagMaster LR-series RFID Readers Copyright 2009-2012, ISONAS Security Systems All rights reserved Table of Contents 1: INTRODUCTION...

More information

Crystal Matrix Software. Quick Start. Configuration Guide

Crystal Matrix Software. Quick Start. Configuration Guide Crystal Matrix Software Quick Start Configuration Guide Date: March 10, 2015 Page: 1 Table of Contents Intended Use... 2 Introduction... 3 Basic Steps... 3 Install and Register the Crystal Matrix software...

More information

How To Set Up Isonas Crystal Matrix On A Pc Or Mac Or Ipa (For A Mac) On A Network With A Network Switch (For An Ipa) On An Ip Address) On Your Ipa Or Ip Address On

How To Set Up Isonas Crystal Matrix On A Pc Or Mac Or Ipa (For A Mac) On A Network With A Network Switch (For An Ipa) On An Ip Address) On Your Ipa Or Ip Address On Introduction ISONAS Crystal Matrix Advanced Networking Checklist Because of the simple network topology used for most ISONAS installations, the only network configuration typically required is to set the

More information

Logging and SNMP Trap Notification Of Events. Isonas Access Control System. Release 12 June 2007

Logging and SNMP Trap Notification Of Events. Isonas Access Control System. Release 12 June 2007 Logging and SNMP Trap Notification Of Events Release 12 June 2007 6325 Gunpark Drive. Boulder, CO 80301 (303) 567 6516 www.isonas.com 1 Background and Introduction This specification describes and defines

More information

Interfacing ISONAS Access Control to an IVC-controlled Video Surveillance System

Interfacing ISONAS Access Control to an IVC-controlled Video Surveillance System Interfacing ISONAS Access Control to an IVC-controlled Video Surveillance System To provide more flexibility and scalability for comprehensive security systems, more components are becoming IP enabled.

More information

Crystal Access System

Crystal Access System Crystal Access System Manual Updated to reflect changes in ISONAS Software V 15 January 2015 Contents Software Installation... 5 Software Registration... 7 Upgrade of Software... 12 Software Overview...

More information

Embedded Web Server. User Guide. General usage guide lines to the ISONAS Embedded Web Server available on all ISONAS PowerNet reader-controllers

Embedded Web Server. User Guide. General usage guide lines to the ISONAS Embedded Web Server available on all ISONAS PowerNet reader-controllers Embedded Web Server User Guide General usage guide lines to the ISONAS Embedded Web Server available on all ISONAS PowerNet reader-controllers 06/12/09 Contents Revision history... 4 Scope... 4 Introduction...

More information

Distribution List Manager User s Manual

Distribution List Manager User s Manual Distribution List Manager User s Manual Welcome... 2 Configuring the Add-in... 3 Settings Tab... 3 Advanced Tab... 4 Troubleshooting... 5 Distribution List Manager Copyright 2008 Sperry Software Inc. P

More information

Kaseya 2. User Guide. for Network Monitor 4.1

Kaseya 2. User Guide. for Network Monitor 4.1 Kaseya 2 Ping Monitor User Guide for Network Monitor 4.1 June 5, 2012 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private Sector IT organizations.

More information

Kaseya 2. Quick Start Guide. for Network Monitor 4.1

Kaseya 2. Quick Start Guide. for Network Monitor 4.1 Kaseya 2 VMware Performance Monitor Quick Start Guide for Network Monitor 4.1 June 7, 2012 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private

More information

Using triggers and actions

Using triggers and actions Using triggers and actions Important For Triggers and Actions to function correctly, the server PC must be running at all times. Triggers and Actions is a powerful feature. It can be used to report on

More information

MONITOR ISM / AFx Multi-Tenant Security System User Guide V1.3

MONITOR ISM / AFx Multi-Tenant Security System User Guide V1.3 MONITOR ISM / AFx Multi-Tenant Security System User Guide V.3 Multi-Tenant Security System User Guide Welcome New Users! There are two types of suite security keypads. Follow the instructions in the proceeding

More information

SPC Connect Configuration Manual V1.0

SPC Connect Configuration Manual V1.0 SPC Connect Configuration Manual V1.0 I-200090-1 28.11.2014 Copyright Copyright Technical specifications and availability subject to change without notice. Copyright Siemens AB We reserve all rights in

More information

Doors in a Network Environment

Doors in a Network Environment in a Network Environment 1.0 Purpose of this Document Doors is designed for use in stand-alone computer applications; no network functionality has been built into the program. However, with the prevalence

More information

TRACK, AUDIT and CONTROL medications at the Point-of-Care.

TRACK, AUDIT and CONTROL medications at the Point-of-Care. TRACK, AUDIT and CONTROL medications at the Point-of-Care. with ISONAS THE TRUE COST OF MEDICATION ERRORS In addition to the rising costs associated with inefficient use of time within the clinical environment,

More information

Monitoring Replication

Monitoring Replication Monitoring Replication Article 1130112-02 Contents Summary... 3 Monitor Replicator Page... 3 Summary... 3 Status... 3 System Health... 4 Replicator Configuration... 5 Replicator Health... 6 Local Package

More information

Quest ChangeAuditor 5.1. For Windows File Servers. Events Reference

Quest ChangeAuditor 5.1. For Windows File Servers. Events Reference Quest ChangeAuditor For Windows File Servers 5.1 Events Reference 2010 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described

More information

PORTAL ADMINISTRATION

PORTAL ADMINISTRATION 1 Portal Administration User s Guide PORTAL ADMINISTRATION GUIDE Page 1 2 Portal Administration User s Guide Table of Contents Introduction...5 Core Portal Framework Concepts...5 Key Items...5 Layouts...5

More information

Electronic Security. For Financial Institutions

Electronic Security. For Financial Institutions A partner you can bank on Our bank was growing. New branches. New card processing center. We wanted to tie access control, alarm monitoring and video surveillance into one system we could monitor from

More information

Kaseya 2. Quick Start Guide. for Network Monitor 4.1

Kaseya 2. Quick Start Guide. for Network Monitor 4.1 Kaseya 2 Syslog Monitor Quick Start Guide for Network Monitor 4.1 June 5, 2012 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private Sector

More information

AEI RAIL NETWORK SERVER User Manual

AEI RAIL NETWORK SERVER User Manual AEI RAIL NETWORK SERVER User Manual Copyright 2000 Signal Computer Consultants All rights reserved Signal Computer Consultants P.O. Box 18445 Pittsburgh, PA 15236 Tel. 888 872-4612 (toll free US and Canada

More information

Nevepoint Access Manager 1.2 BETA Documentation

Nevepoint Access Manager 1.2 BETA Documentation Nevepoint Access Manager 1.2 BETA Documentation Table of Contents Installation...3 Locating the Installation Wizard URL...3 Step 1: Configure the Administrator...4 Step 2: Connecting to Primary Connector...4

More information

DFA EXTERNAL AGENCY POLICY AND FORMS FOR ACCESS CONTROL

DFA EXTERNAL AGENCY POLICY AND FORMS FOR ACCESS CONTROL DFA EXTERNAL AGENCY POLICY AND FORMS FOR ACCESS CONTROL Revised on May 18, 2011 Section 1 ACCESS CONTROL SYSTEM (ACS) DESCRIPTION Monitoring building access and the general security of buildings and facilities

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,

More information

Oracle Beehive. Using Windows Mobile Device Release 2 (2.0.1.7)

Oracle Beehive. Using Windows Mobile Device Release 2 (2.0.1.7) Oracle Beehive Using Windows Mobile Device Release 2 (2.0.1.7) E28326-01 July 2012 Document updated July, 2012 This document describes how to access Oracle Beehive from your Windows Mobile device using

More information

Knowledge Base Article

Knowledge Base Article Knwledge Base Article Crystal Matrix Interface Cmparisn TCP/IP vs. SDK Cpyright 2008-2012, ISONAS Security Systems All rights reserved Table f Cntents 1: INTRODUCTION... 3 1.1: TCP/IP INTERFACE OVERVIEW:...

More information

ADMINISTRATOR GUIDE VERSION

ADMINISTRATOR GUIDE VERSION ADMINISTRATOR GUIDE VERSION 4.0 2014 Copyright 2008 2014. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means electronic or mechanical, for any purpose

More information

Access Control and Audit Trail Software

Access Control and Audit Trail Software Varian, Inc. 2700 Mitchell Drive Walnut Creek, CA 94598-1675/USA Access Control and Audit Trail Software Operation Manual Varian, Inc. 2002 03-914941-00:3 Table of Contents Introduction... 1 Access Control

More information

Cloud. Hosted Exchange Administration Manual

Cloud. Hosted Exchange Administration Manual Cloud Hosted Exchange Administration Manual Table of Contents Table of Contents... 1 Table of Figures... 4 1 Preface... 6 2 Telesystem Hosted Exchange Administrative Portal... 7 3 Hosted Exchange Service...

More information

Portions of this product were created using LEADTOOLS 1991-2009 LEAD Technologies, Inc. ALL RIGHTS RESERVED.

Portions of this product were created using LEADTOOLS 1991-2009 LEAD Technologies, Inc. ALL RIGHTS RESERVED. Installation Guide Lenel OnGuard 2009 Installation Guide, product version 6.3. This guide is item number DOC-110, revision 1.038, May 2009 Copyright 1992-2009 Lenel Systems International, Inc. Information

More information

Integrated Migration Tool

Integrated Migration Tool IceWarp Unified Communications Version 11.3 Published on 1/6/2015 Contents... 4 Performing Migration... 5 Set up the Domain in IceWarp Server... 5 Create Migrator Email Account... 6 Configure Migration

More information

Colorado Ski Racing Management System

Colorado Ski Racing Management System Software Requirements Specification For Colorado Ski Racing Management System In satisfaction of the course requirements in SYST3020 and SYST3510 Prepared by Hirokazu Inoue University of Colorado at Boulder

More information

Team Quicken Loans: Mobile RFID Inventory Tracking System. Administrator Manual

Team Quicken Loans: Mobile RFID Inventory Tracking System. Administrator Manual Team Quicken Loans: Mobile RFID Inventory Tracking System Administrator Manual TABLE OF CONTENTS Mobile RFID Inventory Tracking System Admin Manual What s the Mobile RFID Inventory Tracking System?...

More information

CWA On-Line Credentials Instructions - 2015

CWA On-Line Credentials Instructions - 2015 CWA On-Line Credentials Instructions - 2015 This on-line system will replace filling out the credential forms and demographics card. Once a local has entered credentials information on-line, a print-image

More information

Location awareness. Home area

Location awareness. Home area 1 Location awareness Alarm off Bluetooth, WiFi or GPS can be used to detect when the phone leaves the home area. For Bluetooth and WiFi the home area is defined by the coverage area of the network they

More information

IP Link Best Practices for Network Integration and Security. Introduction...2. Passwords...4 ACL...5 VLAN...6. Protocols...6. Conclusion...

IP Link Best Practices for Network Integration and Security. Introduction...2. Passwords...4 ACL...5 VLAN...6. Protocols...6. Conclusion... IP Link Best Practices for Network Integration and Security Table of Contents Introduction...2 Passwords...4 ACL...5 VLAN...6 Protocols...6 Conclusion...9 Abstract Extron IP Link technology enables A/V

More information

OFFICE 365 TRAINING GUIDE

OFFICE 365 TRAINING GUIDE OFFICE 365 TRAINING GUIDE Presented by: GATEWAY UNIFIED SCHOOL DISTRICT 4411 MOUNTAIN LAKES BLVD, REDDING, CA 96003 gateway schools.org TABLE OF CONTENTS About Office 365... 2 Signing Into Email/Outlook

More information

Google Trusted Stores Setup in Magento

Google Trusted Stores Setup in Magento Google Trusted Stores Setup in Magento Google Trusted Stores is a free badging program that can improve your conversion rate and average order size by reassuring potential customers you offer a great shopping

More information

Email management with Policy Patrol

Email management with Policy Patrol Policy Patrol 10 Technical Documentation October 28, 2014 Policy Patrol includes many email management features, including customized auto replies, automated follow-up, auto forwarding/copying and list

More information

Forward proxy server vs reverse proxy server

Forward proxy server vs reverse proxy server Using a reverse proxy server for TAD4D/LMT Intended audience The intended recipient of this document is a TAD4D/LMT administrator and the staff responsible for the configuration of TAD4D/LMT agents. Purpose

More information

NELSON VOLTAGE MONITOR INSTALLATION & PROGRAMMING MANUAL

NELSON VOLTAGE MONITOR INSTALLATION & PROGRAMMING MANUAL NELSON VOLTAGE MONITOR INSTALLATION & PROGRAMMING MANUAL CONTENTS GENERAL INFORMATION...3 INSTALLATION...3 FIELD WIRING...4 PROGRAMMING...4 Circuit Monitor Options...5 Power Frequency...5 Alarm Silence

More information

Real-Time Business Visibility Solutions For the Real World

Real-Time Business Visibility Solutions For the Real World Pre-Configured Solutions File Server Monitoring Real-Time Business Visibility Solutions For the Real World Updated: May 2009 Page 1 of 42 Doc. Version. 6.2.1 Table of Contents File Server Monitoring Solution

More information

Gallagher Command Centre

Gallagher Command Centre DATASHEET Gallagher Command Centre security.gallagher.com Gallagher Command Centre is the central management platform for the Gallagher security system. Leveraging a client server architecture, the software

More information

DocuSign Connect for Salesforce Guide

DocuSign Connect for Salesforce Guide Information Guide 1 DocuSign Connect for Salesforce Guide 1 Copyright 2003-2013 DocuSign, Inc. All rights reserved. For information about DocuSign trademarks, copyrights and patents refer to the DocuSign

More information

DS License Server V6R2013x

DS License Server V6R2013x DS License Server V6R2013x DS License Server V6R2013x Installation and Configuration Guide Contains JAVA SE RUNTIME ENVIRONMENT (JRE) VERSION 7 Contains IBM(R) 64-bit SDK for AIX(TM), Java(TM) Technology

More information

Remote Administration

Remote Administration Windows Remote Desktop, page 1 pcanywhere, page 3 VNC, page 7 Windows Remote Desktop Remote Desktop permits users to remotely execute applications on Windows Server 2008 R2 from a range of devices over

More information

ChangeAuditor 6.0 For Windows File Servers. Event Reference Guide

ChangeAuditor 6.0 For Windows File Servers. Event Reference Guide ChangeAuditor 6.0 For Windows File Servers Event Reference Guide 2013 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described

More information

PRINT CONFIGURATION. 1. Printer Configuration

PRINT CONFIGURATION. 1. Printer Configuration PRINT CONFIGURATION Red Flag Server5 has improved the designs of the printer configuration tool to facilitate you to conduct print configuration and print tasks management in a more convenient and familiar

More information

ServerView Inventory Manager

ServerView Inventory Manager User Guide - English FUJITSU Software ServerView Suite ServerView Inventory Manager ServerView Operations Manager V6.21 Edition October 2013 Comments Suggestions Corrections The User Documentation Department

More information

Burst Technology. bt-webfilter User Guide

Burst Technology. bt-webfilter User Guide Burst Technology presents bt-webfilter User Guide Burstek TM 9240 Bonita Beach Road Bonita Springs, FL 34135 Telephone: (239) 495-5900 or toll free (800) 709-2551 Visit the Burstek Website at http://www.burstek.com

More information

Email & text message (SMS) relaying using Talk2M

Email & text message (SMS) relaying using Talk2M Email & text message (SMS) relaying using Talk2M 1 Introduction This document explains how to configure your ewon in order to send out emails and text messages (SMS) using the Talk2M relay server. 1.1

More information

1.6 HOW-TO GUIDELINES

1.6 HOW-TO GUIDELINES Version 1.6 HOW-TO GUIDELINES Setting Up a RADIUS Server Stonesoft Corp. Itälahdenkatu 22A, FIN-00210 Helsinki Finland Tel. +358 (9) 4767 11 Fax. +358 (9) 4767 1234 email: info@stonesoft.com Copyright

More information

HARDWIRED CONTROL PANELS

HARDWIRED CONTROL PANELS USER GUIDE 9651 HARDWIRED CONTROL PANELS Contents 1. Introduction...3 The Alarm System...3 The Keypad...3 About This Guide...5 2. Everyday Operation...6 How Do I Know if the System is Working?...6 Setting

More information

Outlook Email. User Guide IS TRAINING CENTER. 833 Chestnut St, Suite 600. Philadelphia, PA 19107 215-503-7500

Outlook Email. User Guide IS TRAINING CENTER. 833 Chestnut St, Suite 600. Philadelphia, PA 19107 215-503-7500 Outlook Email User Guide IS TRAINING CENTER 833 Chestnut St, Suite 600 Philadelphia, PA 19107 215-503-7500 This page intentionally left blank. TABLE OF CONTENTS Getting Started... 3 Opening Outlook...

More information

WirelessOffice Administrator LDAP/Active Directory Support

WirelessOffice Administrator LDAP/Active Directory Support Emergin, Inc. WirelessOffice Administrator LDAP/Active Directory Support Document Version 6.0R02 Product Version 6.0 DATE: 08-09-2004 Table of Contents Objective:... 3 Overview:... 4 User Interface Changes...

More information

How do I control and manage SIPe Profiles

How do I control and manage SIPe Profiles How do I control and manage SIPe Profiles 1 CREATING A PROFILE Each Profile provides authorised access to designated levels of the SIPe product commissioning, and permits that authorised user to edit the

More information

ChangeAuditor 5.6. For Windows File Servers Event Reference Guide

ChangeAuditor 5.6. For Windows File Servers Event Reference Guide ChangeAuditor 5.6 For Windows File Servers Event Reference Guide 2011 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described

More information

# $ %&' ( $" )% %! $" )$) %! &%& $'('!

# $ %&' ( $ )% %! $ )$) %! &%& $'('! !!" # $ %&' ( $" )% %! $" )$) %! &%& $'('! Contents Anonymous Call Rejection 3 Call Block 3 Call Forward 4 Call Return 5 Call Waiting 5 Caller ID 6 Do Not Disturb 7 Find Me 7 Last Number Redial 8 Selective

More information

Anonymous Call Rejection

Anonymous Call Rejection Contents Anonymous Call Rejection 4 Call Block 5 Call Forward 6-7 Call Return 8 Call Waiting 9 Caller ID 10-11 Do Not Disturb 12 Find Me 13 Selective Call Forwarding 14 Speed Dial 15 Three-Way Calling

More information

Sage ERP MAS 90 Sage ERP MAS 200 Sage ERP MAS 200 SQL. Installation and System Administrator's Guide 4MASIN450-08

Sage ERP MAS 90 Sage ERP MAS 200 Sage ERP MAS 200 SQL. Installation and System Administrator's Guide 4MASIN450-08 Sage ERP MAS 90 Sage ERP MAS 200 Sage ERP MAS 200 SQL Installation and System Administrator's Guide 4MASIN450-08 2011 Sage Software, Inc. All rights reserved. Sage, the Sage logos and the Sage product

More information

SuccessMaker Learning Management System Administrator's Guide Version 1.0

SuccessMaker Learning Management System Administrator's Guide Version 1.0 SuccessMaker Learning Management System Administrator's Guide Version 1.0 Copyright 2007 2008 Pearson Education, Inc. or its affiliates Copyright 2007 2008 Pearson Education, Inc. or its affiliates. All

More information

Dell KACE K1000 System Management Appliance Version 5.4. Service Desk Administrator Guide

Dell KACE K1000 System Management Appliance Version 5.4. Service Desk Administrator Guide Dell KACE K1000 System Management Appliance Version 5.4 Service Desk Administrator Guide October 2012 2004-2012 Dell Inc. All rights reserved. Reproduction of these materials in any manner whatsoever without

More information

Office Voice User Guide. User Guide

Office Voice User Guide. User Guide Office Voice User Guide User Guide Contents Anonymous Call Rejection 3 Call Block 3 Call Forward 4 Call Return 5 Call Waiting 5 Caller ID 6 Do Not Disturb 7 Find Me 7 Last Number Redial 8 Selective Call

More information

Archiving with MS Exchange Server

Archiving with MS Exchange Server Archiving with MS Exchange Server Copyright 2011 by REDDOXX GmbH REDDOXX GmbH Neue Weilheimer Str. 14 73230 Kirchheim Fon: +49 (0)7021 92846-0 Fax: +49 (0)7021 92846-99 email: info@reddoxx.com Internet:

More information

Coral Message Center (CMC)

Coral Message Center (CMC) Coral Message Center (CMC) User Guide Version 2.1 for Windows The flexible way to communicate. 2002-2003 Active Voice LLC All rights reserved. First edition 2003. 1 for Yes, 2 for No, PhoneBASIC, Repartee,

More information

Module One: Getting Started... 6. Opening Outlook... 6. Setting Up Outlook for the First Time... 7. Understanding the Interface...

Module One: Getting Started... 6. Opening Outlook... 6. Setting Up Outlook for the First Time... 7. Understanding the Interface... 2 CONTENTS Module One: Getting Started... 6 Opening Outlook... 6 Setting Up Outlook for the First Time... 7 Understanding the Interface...12 Using Backstage View...14 Viewing Your Inbox...15 Closing Outlook...17

More information

Learning Management System (LMS) Guide for Administrators

Learning Management System (LMS) Guide for Administrators Learning Management System (LMS) Guide for Administrators www.corelearningonline.com Contents Core Learning Online LMS Guide for Administrators Overview...2 Section 1: Administrator Permissions...3 Assigning

More information

THE BUSINESS VALUE OF AN ERP SYSTEM

THE BUSINESS VALUE OF AN ERP SYSTEM THE BUSINESS VALUE OF AN ERP SYSTEM AJMAL BEG THE BUSINESS VALUE OF AN ERP SYSTEM AJMAL BEG ii Copyright c 2010 by Ajmal Beg. All rights reserved. This technology described in this publication is based

More information

Call Center - Agent Application User Manual

Call Center - Agent Application User Manual Forum 700 Call Center Agent Application User Manual Legal notice: Belgacom and the Belgacom logo are trademarks of Belgacom. All other trademarks are the property of their respective owners. The information

More information

Cortado Corporate Server 6.1 The Mobile Business Formula for Success What s New?

Cortado Corporate Server 6.1 The Mobile Business Formula for Success What s New? Cortado Corporate Server 6.1 The Mobile Business Formula for Success What s New? What s New in Cortado Corporate Server 6.1? Configuration with Windows PowerShell Support of ios 6 MDM features New Cortado

More information

A Transend Corporation White Paper Preparing Microsoft Exchange Server for Migration

A Transend Corporation White Paper Preparing Microsoft Exchange Server for Migration A Transend Corporation White Paper Preparing Microsoft Exchange Server for Migration Copyright December 2012 by Transend Corporation Table of Contents Section 1: Introduction... 1 Section 2: Basic Requirements...

More information

SAP BusinessObjects Financial Consolidation Web User Guide

SAP BusinessObjects Financial Consolidation Web User Guide SAP BusinessObjects Financial Consolidation Document Version: 10.0 Support Package 18 2016-02-19 SAP BusinessObjects Financial Consolidation Web User Guide Content 1 General user functions....12 1.1 To

More information

How to Install an ISONAS PowerNet Reader-Controller

How to Install an ISONAS PowerNet Reader-Controller How to Install an ISONAS PowerNet Reader-Controller Copyright 2006-2014, ISONAS Security Systems All rights reserved ISONAS Inc. FCC ID: OCZRC-03, OCZRC-03M IC: 8431A-RC03, 8431A-RC03M This device complies

More information

Setup Instructions for Secure Hummingbird FTP

Setup Instructions for Secure Hummingbird FTP Setup Instructions for Secure Hummingbird is the terminal emulation software that allows users to connect their pc to the mainframe in a secure environment. For example, this allows users to connect to

More information

753 Broad Street Phone: 706-312-3535 Suite 200 Fax: 706-868-8655 Augusta, GA 30901-5518. Copyrights

753 Broad Street Phone: 706-312-3535 Suite 200 Fax: 706-868-8655 Augusta, GA 30901-5518. Copyrights Ipswitch, Inc. Web: www.imailserver.com 753 Broad Street Phone: 706-312-3535 Suite 200 Fax: 706-868-8655 Augusta, GA 30901-5518 Copyrights 1995-2011 Ipswitch, Inc. All rights reserved. IMail Collaboration

More information

PowerPanel Business Edition USER MANUAL

PowerPanel Business Edition USER MANUAL USER MANUAL Rev. 0.9 2007/10/26 Copyright 2006-2007 Cyber Power Systems, Inc. All rights reserved. PowerPanel Business Edition USER S MANUAL PowerPanel Business Edition provides power management Services.

More information

Inteset Secure Lockdown ver. 2.0

Inteset Secure Lockdown ver. 2.0 Inteset Secure Lockdown ver. 2.0 for Windows XP, 7, 8, 10 Administrator Guide Table of Contents Administrative Tools and Procedures... 3 Automatic Password Generation... 3 Application Installation Guard

More information

Configuration Guide. DHCP Server. LAN client

Configuration Guide. DHCP Server. LAN client DHCP Server Configuration Guide 4.0 DHCP Server LAN client LAN client LAN client Copyright 2007, F/X Communications. All Rights Reserved. The use and copying of this product is subject to a license agreement.

More information

Kaseya 2. User Guide. Version 1.1

Kaseya 2. User Guide. Version 1.1 Kaseya 2 Directory Services User Guide Version 1.1 September 10, 2011 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private Sector IT organizations.

More information

Installation Guide. Version 1.5. May 2015 Edition 2002-2015 ICS Learning Group

Installation Guide. Version 1.5. May 2015 Edition 2002-2015 ICS Learning Group Installation Guide Version 1.5 May 2015 Edition 2002-2015 ICS Learning Group 1 Disclaimer ICS Learning Group makes no representations or warranties with respect to the contents or use of this manual, and

More information

How to Schedule Report Execution and Mailing

How to Schedule Report Execution and Mailing SAP Business One How-To Guide PUBLIC How to Schedule Report Execution and Mailing Release Family 8.8 Applicable Releases: SAP Business One 8.81 PL10 and PL11 SAP Business One 8.82 PL01 and later All Countries

More information

CA NSM System Monitoring. Option for OpenVMS r3.2. Benefits. The CA Advantage. Overview

CA NSM System Monitoring. Option for OpenVMS r3.2. Benefits. The CA Advantage. Overview PRODUCT BRIEF: CA NSM SYSTEM MONITORING OPTION FOR OPENVMS Option for OpenVMS r3.2 CA NSM SYSTEM MONITORING OPTION FOR OPENVMS HELPS YOU TO PROACTIVELY DISCOVER, MONITOR AND DISPLAY THE HEALTH AND AVAILABILITY

More information

Use QNAP NAS for Backup

Use QNAP NAS for Backup Use QNAP NAS for Backup BACKUP EXEC 12.5 WITH QNAP NAS Copyright 2010. QNAP Systems, Inc. All Rights Reserved. V1.0 Document revision history: Date Version Changes Apr 2010 1.0 Initial release Note: Information

More information

UP L18 Enhanced MDM and Updated Email Protection Hands-On Lab

UP L18 Enhanced MDM and Updated Email Protection Hands-On Lab UP L18 Enhanced MDM and Updated Email Protection Hands-On Lab Description The Symantec App Center platform continues to expand it s offering with new enhanced support for native agent based device management

More information

Velocity Web Services Client 1.0 Installation Guide and Release Notes

Velocity Web Services Client 1.0 Installation Guide and Release Notes Velocity Web Services Client 1.0 Installation Guide and Release Notes Copyright 2014-2015, Identiv. Last updated June 24, 2015. Overview This document provides the only information about version 1.0 of

More information

Out n About! for Outlook Electronic In/Out Status Board. Administrators Guide. Version 3.x

Out n About! for Outlook Electronic In/Out Status Board. Administrators Guide. Version 3.x Out n About! for Outlook Electronic In/Out Status Board Administrators Guide Version 3.x Contents Introduction... 1 Welcome... 1 Administration... 1 System Design... 1 Installation... 3 System Requirements...

More information

Sage 100 ERP. Installation and System Administrator s Guide

Sage 100 ERP. Installation and System Administrator s Guide Sage 100 ERP Installation and System Administrator s Guide This is a publication of Sage Software, Inc. Version 2014 Copyright 2013 Sage Software, Inc. All rights reserved. Sage, the Sage logos, and the

More information

Sterling Call Center. Upgrade Guide. Release 9.2

Sterling Call Center. Upgrade Guide. Release 9.2 Sterling Call Center Upgrade Guide Release 9.2 Sterling Call Center Upgrade Guide Release 9.2 Note Before using this information and the product it supports, read the information in Notices on page 39.

More information

Geotech AEMS Data Centre User Guide

Geotech AEMS Data Centre User Guide Geotech AEMS Data Centre User Guide Geotechnical Instruments (UK) Ltd Sovereign House Queensway Leamington Spa Warwickshire. CV31 3JR UK Telephone: +44 (0) 1926 338111 Support: technical@geotech.co.uk

More information

BillQuick HR Getting Started Guide2015

BillQuick HR Getting Started Guide2015 GETTING STARTED GUIDE: BillQuick HR 2015 BillQuick HR Getting Started Guide2015 BillQuick Power Up Your Business (866) 945-1595 www.bqe.com info@bqe.com GETTING STARTED GUIDE: BillQuick HR 2015 Contents

More information

Working with the Call Center

Working with the Call Center Quick Reference: Call Center Working with the Call Center Contents Roadmap: Working with web-based patients... 2 Roadmap: Working with phone-based patients... 4 Roadmap: Working with paper-based patients...

More information

DANGER indicates that death or severe personal injury will result if proper precautions are not taken.

DANGER indicates that death or severe personal injury will result if proper precautions are not taken. Multi-User Systems 1 ArchiveServer 2 SIMATIC HMI WinCC V7.0 SP1 File Server 3 WinCC ServiceMode 4 Redundant Systems 5 System Manual Print of the Online Help 11/2008 Legal information Warning notice system

More information

SFTP Server User Login Instructions. Open Internet explorer and enter the following url: https://sftp.sae.org

SFTP Server User Login Instructions. Open Internet explorer and enter the following url: https://sftp.sae.org SFTP Server User Login Instructions Open Internet explorer and enter the following url: https://sftp.sae.org You will be prompted for a user id and password as such. Please enter your account id and password.

More information

ADP CollectAll Manager v2.4 User s Guide

ADP CollectAll Manager v2.4 User s Guide ADP CollectAll Manager v2.4 User s Guide ADP CollectAll Manager Version 2.4 User s Guide 2007 Automatic Data Processing, Inc. ADP provides this publication as is without warranty of any kind, either express

More information

PowerSchool Parent Portal Administrator Guide. PowerSchool 7.x Student Information System

PowerSchool Parent Portal Administrator Guide. PowerSchool 7.x Student Information System PowerSchool 7.x Student Information System Released March 2012 Document Owner: Documentation Services This edition applies to Release 7.1.3 of the PowerSchool software and to all subsequent releases and

More information

STIDistrict Server Replacement

STIDistrict Server Replacement STIDistrict Server Replacement Major Steps Defined This document addresses how to migrate data and applications from an existing STIDistrict (SQL) Server to a new machine. There will be 8 major steps:

More information

USC Marshall School of Business ShareFile_With_Outlook_Client_v2.docx 6/12/13 1 of 9

USC Marshall School of Business ShareFile_With_Outlook_Client_v2.docx 6/12/13 1 of 9 About ShareFile When you wish to send someone a file or need a file from someone else, your best option is to use ShareFile. It not only provides increased security by automatically encrypting files but

More information

Worksharing is a design method that allows multiple team members to work on the same project model at the same time.

Worksharing is a design method that allows multiple team members to work on the same project model at the same time. Revit Worksharing Introduction Worksharing is a design method that allows multiple team members to work on the same project model at the same time. On many projects, team members are assigned a specific

More information