Operation Error Management

Size: px
Start display at page:

Download "Operation Error Management"

Transcription

1 S&C IntelliTeam CNMS Communication Network Management System Operation Error Management Table of Contents Section Page Section Page Overview Error Management Alarms... 4 Viewing Alarms Editing Alarm Details... 6 Acknowledging Alarm Clearing Alarm... 8 Acknowledging and Clearing Alarms... 8 Show/Hide Cleared Alarms Assigning Owners Alarm Forwarding Deleting an Alarm Exporting Alarm...10 Printing Alarm Alarm List Filtering Generating a Report Configuring Purge Settings Purge Alarm Now View Archive Alarm Actions Trap Notification...15 Adding Alarm Notification Viewing Alarm SNMP Notification Editing Alarm SNMP Notification...16 Associating Listener Traps with Alarm Filters Deleting Alarm SNMP Notification...17 Refreshing Alarm SNMP Notification...17 Configuring an Alarm Notification Adding Alarm Recipient...18 Viewing Alarm Recipient Editing Alarm Recipient Associating Recipient with an Alarm Filter Deleting Alarm Recipient Refreshing Alarm Recipient Logs Alarm Control Settings Event Logs Log Details Printing Event Logs Exporting Logs Event Log Filters Viewing Event Logs with Quick Filters Purging Logs Purge Now View Archive Error Stats January 25, 2016 S&C Electric Company , all rights reserved Instruction Sheet

2 Overview The IntelliTeam CNMS Communications Network Management System is a Simple Network Management Protocol (SNMP)-based solution for monitoring and managing a network of S&C SpeedNet Radios. It provides the following features: Monitors performance of SpeedNet Radio Ethernet and wireless interfaces Provides consolidated performance reports on a per radio subgroup level Supports continuous monitoring and management of radio configuration Supports continuous monitoring and management of network topology Supports scheduled software upgrade and backup for one or more radios Supports periodic configuration backups SpeedNet Radios enable utilities to build wireless mesh networks for small area coverage such as an electrical distribution feeder, and networks can be expanded to cover an entire metropolitan area. The SpeedNet system provides fully integrated, twoway communication of real-time information between smart grid components over a peer-to-peer mesh network. SpeedNet Radios automatically build routing tables that define message paths so, if a link is lost, a new path will be quickly established. Operating in the unlicensed 902- to 928-MHz band, typical range with an omnidirectional antenna is 2 to 5 miles in mesh mode, and more than 6 miles in point-to-multipoint mode with directional antennas. If needed, SpeedNet Repeater Radios can be installed to increase transmission range and provide alternate nodes for message routing. See Figure 1. Figure 1. A typical SpeedNet Radio Mesh Network. 2 S&C Instruction Sheet

3 Overview The modular sections of the IntelliTeam CNMS system are opened from the Main menu accessed with the Start button. See Figure 2. A hierarchy of menus and submenus are available in each module: Topology Configuration Error Management Performance Security Report Manager Application Settings Tools Help Figure 2. IntelliTeam CNMS main menu. S&C Instruction Sheet

4 Error management is a set of functions that: Detect malfunctions in a network Maintain and examine error logs Accept and act on error-detection notifications Error management provides the means to identify issues and coordinate resolution by assigning alarms to other users. To enable this, this module is organized as described below: Logging of Faults and Log Management All errors are recorded in the error log with a timestamp. This log can be viewed using the IntelliTeam CNMS Log Browser. In addition to managing the view list for user-friendly views, the log can also be purged and archived. Alarm Management Features such as assignment of alarm to specific users; alarm filtering; alarm forwarding; and housekeeping by deleting, purging, and archiving old alarms, are used for effective management. Tools to manage the alarms Alarm SNMP notification and automatic notification are some of the actions triggered by an alarm. The IntelliTeam CNMS system enables configurations so these actions are only triggered for a filtered alarm list. Alarms The IntelliTeam CNMS system generates an alarm when an event indicates a failure. Set of events representing a common error or failure are correlated into alarms. For all events with the same failure object, one alert is generated, and the severity is set as the severity of the latest event with this failure object. The generated alarm is communicated to the user as an . It is also stored in the database. Whenever a new event is generated, the application ensures that there is only one alarm in the IntelliTeam CNMS database for a specific root cause. Since the reasons for problems differ across networks and depend on the traps and notifications supported, The IntelliTeam CNMS system offers a configurable list of fields that can be marked as unique for generating or updating an alarm. By default, it is configured to create an alarm for each unique combination of network elements, source (for example: Port-3-2) and category (For example: interface failure). This consolidation process helps in handling event bursts when a network element raises the same trap repeatedly. To meet this criterion, the IntelliTeam CNMS system takes the following actions: Generation of a new alarm A new alarm is generated when there is no alarm in the IntelliTeam CNMS database for the configured combination (Default criteria source, category and network element combination). Updating an existing alarm Whenever an alarm is generated for a device for a specific condition for which an alarm is already associated with it, the new event log updates the old alarm with the details instead of creating a new alarm. However, the related event logs enumerate the number of times this alarm was reported. The alarm browser provides users with a summary of the alarms currently active in the network elements. The following functions are available from the alarm browser: View the details of an alarm Filter alarm details to see the desired alarms Manage the alarms by assigning the alarms to various users Acknowledge one or more alarms Clear one or more alarms manually Search the alarms based on any of the fields present in the alarm 4 S&C Instruction Sheet

5 Purge and archive the alarms Forward one or more alarms to the northbound clients Export the selected alarms to a desired file format Print the selected/filtered alarms Viewing Alarms The Alarm Browser window gives a summary of the alarms currently active in the network elements. It displays the alarm-specific details in a tabular view indicating information on network element, the affected component, the reason for the alarm, the severity of the alarm, and similar parameters. A view of the list of alarms for a group of network elements is also available under the Alarms tab at the Group level in the tree. To view the alarm browser window: 1. Navigate to the Alarms tab window in the Application landing window. 2. The Alarm Browser window displays the list of alarms along with the alarm details. See Figure 3 on page 6. The details displayed carry the following information: Annotation Indicator An icon that shows whether a user has made an annotation to the alarm. Remedy Indicator An icon that shows whether a users has noted a remedy to the alarm. Alarm ID The unique ID of the alarm. Severity The severity of the problem. Element Name The name of the radio reporting the problem. Subgroup The subgroup of the radio reporting the problem. IP Address The wireless IP address of the radio reporting the problem. Message A message/fault description obtained from the device. Date Updated The date of last update of the alarm. Acknowledgement Status The field to indicate whether the alarm is acknowledged or not. Owner The owner of the alarm. Source The component of the network element having the fault. Category The alarm category such as Ac Power, Availability. Event Type Threshold, CNMS, status polling, data collection. Trigger Indicates whether the current state of the alarm was caused by a failure, conflict, success, or resolution. Date Created Time The date on which alarm raised. Date Acknowledged The date of acknowledgement, if the alarm is acknowledged. Cleared Time The cleared time, if the alarm is already cleared. Remedy The remedy suggested by the administrator for the problem. S&C Instruction Sheet

6 Figure 3. Alarm Browser window. Editing Alarm Details The view displayed by the Alarm Browser can be edited to: Acknowledge one or more alarms Provide comments for future reference Change the owner for the alarm These changes can be saved to maintain a history of change. To edit the alarm details: 1. Navigate to the Alarms tab on the Application landing window. 2. Select an alarm from the Alarm Browser window. See Figure Click Alarm Details icon, or right click on the selected alarm and select Alarm Details. The Alarm Details window opens. See Figure 4 on page Click the Acknowledge check box to acknowledge the alarm. The History pane displays history of the selected alarm. Note: An alarm can be acknowledged only by its owner. 5. Enter the required Remedy and Annotation. The user ID and the date/time of annotation are automatically recorded. 6. Click Update to save the changes. 7. Click on the Event Details tab to view the Events window. See Figure 5 on page 7. Event history shows key events before the alarm and can help you find the root cause of the alarm. Events can also help you understand the impact of this alarm on other components of the network element. By default, this view displays event logs shows 15 minutes before and 15 minutes after the occurrence of each alarm log. 6 S&C Instruction Sheet

7 Figure 4. Alarm Details window. Figure 5. Event Details window. S&C Instruction Sheet

8 Acknowledging Alarm To acknowledge an alarm: 1. Navigate to the Alarms tab on the Application Landing window. 2. Select any alarm other than a cleared alarm from the Alarm Browser window. See Figure 3 on page Click on the Acknowledge icon, or right click on the selected alarm and select the Acknowledge menu. 4. Change the Acknowledged Status from N to Y. 5. The alarm can also be acknowledged from the Alarm Details window. See Figure 4 on page Select the Acknowledge check box to acknowledge an alarm. Then click Update. Clearing Alarm Whenever an error is corrected in a network element, the network element generates a Clear alarm, which clears the alarm automatically. While users can clear an alarm generated by the CNMS server after acknowledging it, they cannot manually clear an alarm generated by a network element. Whenever a CNMS alarm is cleared, the user is asked to enter the reason for clearing the alarm. This is added as an annotation to the alarm. When the alarm is cleared, its severity value is changed to Cleared, and its severity color changes accordingly. The Related Alarm Logs tab gives details on the history of any alarm, giving information on when the alarm was raised and when it was cleared. To clear an alarm: 1. Navigate to the Alarms tab window in the Application Landing page. Select a CNMS alarm from the list. Note: Only acknowledged alarms can be cleared. 2. Click on the Clear icon, or right click on the selected alarm and select Clear menu. 3. Click OK in the confirmation window to proceed, or click Cancel to abort the Clear process. 4. The Annotation window opens. Enter the required remarks and click Save. 5. The cleared alarm is added in the cleared alarms count and is listed in green above the tool bar. Acknowledging and Clearing Alarms Alarms can now be acknowledged and cleared with a single button. To acknowledge and clear an alarm: 1. Navigate to the Alarms tab. Select a CNMS alarm from the list. 8 S&C Instruction Sheet Click on the Acknowledge & Clear icon, or right click on the selected alarm and select Acknowledge & Clear. 3. Click OK in the confirmation window to proceed, or click Cancel to abort the Acknowledge & Clear Process. 4. The Annotation window opens. Enter the required remarks and click Save. 5. The cleared alarm is added in the cleared alarms count, and listed in green above the tool bar.

9 Show/Hide Cleared Alarms The Show or Hide Cleared Alarms functionality is used to display or hide all the cleared alarms. To show or hide cleared alarms: 1. Navigate to the Alarms tab window in the Application landing page. 2. Click on the Show Cleared Alarms icon, to show all the cleared alarms. 3. Click on the Hide Cleared Alarms icon, to hide all the cleared alarms. Assigning Owners Users with sufficient privilege can assign alarms to other users. This feature can be used by the administrator to assign alarms to network operators, so they can review and resolve a problem. To assign an owner: 1. Navigate to the Alarms tab in the Application Landing page. 2. Select an alarm from the Alarm List window. 3. Click on the Assign Owner icon, or right click on the selected alarm and select Assign Owner. 4. In the Assign Owner window, select the required owner from the drop-down list. See Figure Click Assign to commit the change. Note: The owner can also be changed from the Alarm Details window. See Figure 4 on page 7. Select the owner from the drop-down list. Click Update. Figure 6. Assign Owner window. Alarm Forwarding To forward an alarm: 1. Navigate to the Alarms tab in the Application Landing page. 2. Select an alarm from the Alarm Browser window. See Figure 3 on page Click on the Alarm Forwarding icon, or right click on the selected alarm and select Alarm Forwarding. 4. In the Alarm Forwarding window. See Figure 7 on page 10. Select the Trap tab to forward the alarm to a trap listener. Select tab to forward the alarm to an recipient. 5. Click on Trap/ Configuration to add trap/ recipient. 6. Select any trap/ recipient from the list, and select Send to forward the selected alarm. S&C Instruction Sheet

10 Figure 7. Trap tab on the Alarm forwarding window. Deleting an Alarm Users cannot delete alarms generated by the network element. All alarms and logs associated with a network element will be deleted when the network element is removed from the IntelliTeam CNMS network. Administrators and users with sufficient privilege can delete an alarm generated by the IntelliTeam CNMS system. Only those alarms whose severity property is set as Cleared can be deleted. To delete an alarm: 1. Navigate to the Alarms tab in the Application Landing page. 2. Select an alarm from the Alarm Browser window. See Figure 3 on page Click on the Delete icon, or right click on the selected alarm and select Delete. Exporting Alarm Printing Alarm It is possible to export the alarms to an Excel /CSV /XML /PDF /HTML file to send it to users that have no direct access to the IntelliTeam CNMS system. Recipients can even use the export to load data into another trouble-ticket database, and the trouble report can be saved with the alarm details. See the Export section. Alarm details can be printed on a standard printer connected to the client machine. 10 S&C Instruction Sheet

11 Alarm List Filtering The list of alarms displayed in the Alarm List can be customized. Filters based on certain parameters, values, and conditions can be set. The Alarm Filter Manager window displays the list of filters and their corresponding filter components. See Viewing Event Logs with Quick Filters for more information about filtering alarms. Generating a Report To generate a report: 1. Navigate to Error Management>Alarms>Generate Reports from the main menu. 2. The Alarm Report Generator window opens. See Figure If you need to generate a report for a specific condition, configure the Conditions pane on the Alarm Report Generator window, see Figure 9 on page Click on Download Report to download the report. 5. The Download Alarm Report File window opens. 6. Right click on Download Exported File to proceed, or click Cancel to cancel the download process. Figure 8. Alarm Report Generator window. S&C Instruction Sheet

12 Figure 9. Configure filter conditions on the Alarm Report Generator window. Configuring Purge Settings IntelliTeam CNMS can be configured to periodically purge cleared alarms with these features: Clearing of alarms The inactive alarms are cleared from the network elements. Periodic Archive and Purge schedule The IntelliTeam CNMS system can purge cleared alarms older than one week. After one week of operation, cleared alarms older than seven days are purged daily. Periodic Archive and Purge When the number of cleared alarms increases beyond a specified limit (for example, 50,000 alarms), excess alarms are purged every 30 minutes. Manually triggered by the user Requests for manual purge of the cleared alarms are also executed by the IntelliTeam CNMS system. Because logs are periodically archived, the IntelliTeam CNMS system does not archive the cleared alarms when they are purged. To purge alarms based on age: 1. Navigate to Error Management>Alarms>Purge Settings on the Main menu 2. The Configure Alarm Purge Interval window opens. See Figure 10 on page Configure and select the check box Purge alarms older than. 4. Click OK to save the settings. 12 S&C Instruction Sheet

13 Figure 10. Configure Alarm Purge Interval window. Purge Alarm Now To purge all cleared alarms: 1. Navigate to Alarms tab window in the Application Landing page. 2. Click on the Purge Now icon, to purge all cleared alarms. View Archive IntelliTeam CNMS archives the alarms as they are purged. The archived files are stored as.csv in the /server/ems/archive directory. This feature allows the user to load and view those archived files through the following options. To view the purged alarm archive: 1. Navigate to Error Management >Alarms >View Archive from the main menu. 2. The Alarm Archive Viewer window opens. See Figure 11 on page If the.csv file is available on the local hard disk: Click on the Load Archive from Local Hard Drive icon. The Load Archive window opens. See Figure 12 on page 14. Browse for the archived file. Click Load to load the file, or Cancel to abort the process. 4. If the.csv file is available on the IntelliTeam CNMS server: Click on the Load Archive from Server icon. The Load Archive window opens. See Figure 13 on page 14. Select the archived file from the list. Click Load to load the file or Cancel to abort the process. S&C Instruction Sheet

14 Figure 11. Alarm Archive Viewer window. Figure 12. Load Archive from Local Hard Drive window. Figure 13. Load Archive from Server window. 14 S&C Instruction Sheet

15 Alarm Actions The IntelliTeam CNMS system generates alarms based on periodic monitoring. It also reports operational issues. The IntelliTeam CNMS system can be configured to take a predefined action when an alarm is received. The following alarm actions are supported by default: Automatic SNMP Trap notification to any northbound interface Automatic notification to any address Users can define a list of alarms for notification. A specific action will be taken only when an alarm matching the rule/filter is generated. This ensures users do not receive /notifications for alarms they are not interested in. Users can also manually forward the alarms to any network agent, such as an SNMP trap, or send an notification. Trap Notification Adding Alarm Notification Alarms can be forwarded selectively as traps to northbound clients of other SNMP management systems. The Alarm SNMP Notification window shows the trap destination and alarm filters for traps ready to send. Users can view the forwarded alarms in the alarm browser. To add an alarm notification: 1. Navigate to Error Management>Manage>SNMP Notification from the main menu. 2. The Alarm SNMP Notification window opens. See Figure 15 on page 16. The left pane lists the destination addresses and their ports for notifications to be sent. The right pane lists alarm filters. 3. Click Add. The Add New SNMP Listener window opens. See Figure Specify the IP Address (i.e ) and Port (i.e. 161). 5. Click OK to commit the data. The newly created SNMP Listener will be listed in the Alarm SNMP Notification window. Figure 14. Add New SNMP Listener window. S&C Instruction Sheet

16 Viewing Alarm SNMP Notification To view an alarm SNMP notification: 1. Navigate to Error Management>Manage >SNMP Notification from the main menu. 2. The Alarm SNMP Notification window opens. See Figure The left pane lists the destination addresses and their ports for notifications to be sent. The right pane lists alarm filters. Figure 15. Alarm SNMP Notification window. Editing Alarm SNMP Notification To edit an alarm SNMP notification: 1. Navigate to Error Management>Manage>SNMP Notification from the main menu. 2. The Alarm SNMP Notification window opens. See Figure Select the SNMP Listener to be modified. 4. Click on the Edit icon. The Edit SNMP Listener window opens. See Figure Make necessary changes, and click OK. Figure 16. Edit SNMP Listener window. 16 S&C Instruction Sheet

17 Associating Listener Traps with Alarm Filters To associate a listener trap with an alarm filter: 1. Navigate to Error Management>Manage>SNMP Notification from the main menu. 2. The Alarm SNMP Notification window opens. See Figure 15 on page Select Trap Destination on the left pane. 4. To select the filters that need to be associated with an alarm, select the required check boxes. 5. Click OK to associate the SNMP listener with alarm filters. Deleting Alarm SNMP Notification To delete an alarm SNMP notification: 1. Navigate to Error Management>Manage>SNMP Notification from the main menu. 2. The Alarm SNMP Notification window opens. See Figure 15 on page Select the SNMP Listener to be deleted. 4. Click on the Delete icon. 5. Click OK in the confirmation window to proceed, or click Cancel to abort the deletion process. Refreshing Alarm SNMP Notification The Refresh menu icon in the Alarm SNMP Notification window is used to revert to the previous state of the alarm trap forwarder. For example, if an association is selected to perform some operation, and has not yet been saved, the new settings are lost when the refresh button is clicked. To refresh an alarm SNMP notification: 1. Navigate to Error Management>Manage>SNMP Notification from the main menu. 2. The Alarm SNMP Notification window opens. See Figure 15 on page Select a trap listener and associate it with any filter. 4. Click on the Refresh icon. 5. Click OK in the confirmation window to proceed, or click Cancel to abort the refresh process. Configuring an Alarm Notification The server can be configured for an alarm arrival that requires generation of an alert. The IntelliTeam CNMS server can either send all the alarms or just those that match predefined criteria. To send a notification for specific alarms, create an alarm filter with the match criteria and use the filter to configure the notification. For example, a filter with the match criteria of owner= user ID, would forward all the alarms assigned to that user to his/her address. The following alarm details will be sent as part of the sent to the user: Alarm ID Network element Source (shelf/slot/card/port) Severity Alarm raised by (generated by network element/by CNMS) Created time Last updated time S&C Instruction Sheet

18 Owner assigned Acknowledgement status Acknowledged time (if acknowledged) Alarm description Remedy (if available) If the mail server has not already been configured: 1. A pop-up confirmation window is displayed. 2. Click Yes to proceed with the configuration. The Mail Server Configuration window opens. See S&C Instruction Sheet Mail Server Settings section. Adding Alarm Recipient To add an alarm recipient: 1. Navigate to Error Management>Manage> Notification from the main menu. 2. The Alarm Notification window opens. See Figure 18 on page Click on the Add icon. The Add New Listener window opens. See Figure Specify the address and Details. 5. Click OK to commit the data. Figure 17. Add New Listener window. 18 S&C Instruction Sheet

19 Viewing Alarm Recipient To view the alarm recipient: 1. Navigate to Error Management>Manage> Notification from the main menu. 2. The Alarm Notification window opens. See Figure 18. The left pane lists the recipient, who will receive the . The right pane lists the alarm filters. 3. Select the required recipient. The filters that have a check mark in the Associate check box are associated with this recipient. Figure 18. Alarm Notification window. Editing Alarm Recipient To edit the alarm recipient: 1. Navigate to Error Management>Manage> Notification from the main menu. 2. The Alarm Notification window opens. See Figure Select the recipient to be modified. 4. Click on the Edit icon. The Edit Recipient window opens. See Figure Make any necessary changes, and click OK. Figure 19. Edit Listener window. S&C Instruction Sheet

20 Associating Recipient with an Alarm Filter To associate the recipient with an alarm filter: 1. Navigate to Error Management>Manage> Notification from the main menu. 2. The Alarm Notification window opens. See Figure 18 on page Select an recipient. 4. To select the filters to be associated with the recipient, select the required check boxes. 5. Click OK to associate an recipient with the alarm filters. Deleting Alarm Recipient To delete an alarm recipient: 1. Navigate to Error Management>Manage> Notification from the main menu. 2. The Alarm Notification window opens. See Figure 18 on page Select the recipient to be deleted. 4. Click on the Delete icon. 5. Click OK in the confirmation window to proceed, or click Cancel to abort the deletion process. Refreshing Alarm Recipient To refresh an alarm recipient: 1. Navigate to Error Management>Manage> Notification from the main menu. 2. The Alarm Notification window opens. See Figure 18 on page Select an recipient and associate it with any filter. 4. Click on the Refresh icon. A pop-up Confirmation window opens. 6. Click OK to proceed, or click Cancel to abort the refresh process. Logs All errors are logged in the error log with a timestamp. This is carried out irrespective of their source (alarm logs, event logs, and IntelliTeam CNMS-generated logs). All logs contain the following information: Log ID (Unique across all the devices) Event Severity Informational for events and specific severity for alarms generated by the network element and CNMS Network Element Log Source The source could be any component within the network element Failure Message A message detailing the reason for failure Log Time The timestamp of the error Log Category For example: fan failure or boot failure Log Type Category of log, for example: trap based, or data collection based Remedy Remedy for the fault, if available 20 S&C Instruction Sheet

21 Alarm Control Settings The Alarm Control Panel allows administrators to enable/disable individual alarm types and to automatically assign them to specific users. See Figure Navigate to Applications Settings>Alarm Control Settings from the Start menu. 2. Uncheck boxes to disable an individual alarm type. 3. Select a user from the drop-down menu in the Owner column to automatically assign an alarm to a specific user. 4. Click Save to commit the changes, or click Cancel to disregard the changes. Figure 20. Alarm Control Panel window. S&C Instruction Sheet

22 Event Logs When an event is generated as the consequence of an error, by default an event log is generated by the CNMS server that is then consolidated into an alarm. These event logs can be viewed, printed, exported and purged. The IntelliTeam CNMS server has a very flexible log browser that allows browsing through all the logs displayed on multiple pages. By default, the log displays the complete set for all the members of a global group. The log browser can also display logs for a selected network element. The display can be: Organized as pages when there are a large number of log entries Sorted based on one or more columns Restricted by selecting the columns to be displayed (or hiding some of the columns) Filtered based on conditions, so only logs of interest are displayed To view event logs: 1. Select a group from the hierarchy tree. 2. Navigate to the Events tab on the Application Landing page. 3. The Events window opens, and displays the list of events for the selected network element or a group along with the details. See Figure 21. Figure 21. Events window. 22 S&C Instruction Sheet

23 Log Details To view details of an event: 1. Select a network element from the hierarchy tree. 2. Navigate to the Event Logs tab on the Application Landing page. 3. The EventsLog window opens, and displays the list of events along with the details. See Figure 21 on page Select an event log in the list. 5. Click on the View Event Logs icon, or right click and select the View menu. The Events-View window is displayed. See Figure Click Close to close the Events-View window. Figure 22. Events-View window. Printing Event Logs Exporting Logs Event Log Filters Viewing Event Logs with Quick Filters Details displayed on the window can be printed on a standard printer connected to the client machine. This option enables exporting the logs to an Excel/CSV/XML/PDF/HTML file to make it easy to send it to users who have no direct access to the IntelliTeam CNMS system. This feature enables you to view the event logs selectively, based on a user-defined filter condition. Filter management functionality is comprehensive and guided by the intuitive user interface. See the Filter Management section on page 13 of S&C Instruction Sheet Refer to the Filter Management section on page 13 of S&C Instruction Sheet S&C Instruction Sheet

24 Purging Logs The IntelliTeam CNMS system has an archive and purge mechanism with a configurable Purge Interval for purging older logs. Logs are archived before being purged from the database. The following purging options are available: Periodic archive and purge schedule with a configurable interval. For example, the IntelliTeam CNMS system can be set to purge event logs more than 1 week old. After 1 week of operation, logs older than 7 days will be purged daily. Periodic archive and purge if the number of logs increases beyond a specified limit, such as 50,000 logs. Manual archive and purge of logs older than the configured number of days upon user request. Manual archive and purge of logs more than a certain number of logs. Manual purge of all the logs with or without archiving the purged logs. To configure the purge interval for event logs: 1. Navigate to Error Management>Events>Purge Settings from the main menu. The Configure Log Purge Interval window opens. See Figure Configure Purge logs older than and Maximum no. of logs to retain as required. 3. Click OK to save the settings. Figure 23. Configure Log Purge Interval window. Purge Now To purge all the event logs now: 1. Navigate to Error Management>Events>Purge Now from the main menu. 2. A confirmation message box is displayed. 3. Click OK to proceed, or click Cancel to abort the purge now process. 24 S&C Instruction Sheet

25 View Archive The IntelliTeam CNMS system archives the events when they are purged. Archived files are stored as a.csv file in the /server/ems/archive directory. To load and view those archived files: 1. Navigate to Error Management >Events >View Archive from the main menu. 2. The Log Archive Viewer window opens. See Figure If the.csv file is available on the local hard disk: a. Click on the Load Archive from Local Hard Drive icon. b. The Load Archive window opens. See Figure 25 on page 25. c. Browse for the archived file. d. Click Load to load the file, or Cancel to abort the process. 4. If the.csv file is available on the IntelliTeam CNMS Server: a. Click on the Load Archive from Server icon. b. The Load Archive window opens. See Figure 26 on page 25. c. Select the archived file from the list. d. Click Load to load the file, or Cancel to abort the process. Figure 24. Log Archive Viewer window. S&C Instruction Sheet

26 Figure 25. Load Archive from Local Hard Drive window. Figure 26. Load Archive from Server window. Error Stats The Error Stats window gives a pictorial representation of the alarms and events that have occurred over a period of time. To view the Alarm Stats or Event Stats window. 1. Navigate to the Error Stats tab. See Figure Select Alarm Stats or Event Stats in the drop-down menu. 3. Click on the Edit Dashboard icon to change any chart parameters. 4. Click on the New Dashboard icon to create and save a new dashboard. Figure 27. Error Stats window. 26 S&C Instruction Sheet

27

28

S&C IntelliTeam CNMS Communication Network Management System Table of Contents Overview Topology

S&C IntelliTeam CNMS Communication Network Management System Table of Contents Overview Topology S&C IntelliTeam CNMS Communication Network Management System Operation Topology Table of Contents Section Page Section Page Overview.... 2 Topology Discovery... 4 Viewing the Network.... 4 Add Entire Network

More information

Operation Tools. S&C IntelliTeam CNMS Communication Network Management System. Table of Contents. Overview... 2 Tools. Section Page Section Page

Operation Tools. S&C IntelliTeam CNMS Communication Network Management System. Table of Contents. Overview... 2 Tools. Section Page Section Page S&C IntelliTeam CNMS Communication Network Management System Operation Tools Table of Contents Section Page Section Page Overview.... 2 Tools Database Administration.... 4 User Triggered Database-Backup....

More information

NMS300 Network Management System

NMS300 Network Management System NMS300 Network Management System User Manual June 2013 202-11289-01 350 East Plumeria Drive San Jose, CA 95134 USA Support Thank you for purchasing this NETGEAR product. After installing your device, locate

More information

Webmail Instruction Guide

Webmail Instruction Guide Webmail Instruction Guide This document is setup to guide your through the use of the many features of our Webmail system. You may either visit www.safeaccess.com or webmail.safeaccess.com to login with

More information

File Management Utility User Guide

File Management Utility User Guide File Management Utility User Guide Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held

More information

Tracking Network Changes Using Change Audit

Tracking Network Changes Using Change Audit CHAPTER 14 Change Audit tracks and reports changes made in the network. Change Audit allows other RME applications to log change information to a central repository. Device Configuration, Inventory, and

More information

Administering Cisco ISE

Administering Cisco ISE CHAPTER 8 This chapter describes the administrative activities for the Cisco Identity Services Engine (ISE) and how to perform them. The following topics are covered: Logging In, page 8-1 System Time and

More information

Viewing and Troubleshooting Perfmon Logs

Viewing and Troubleshooting Perfmon Logs CHAPTER 7 To view perfmon logs, you can download the logs or view them locally. This chapter contains information on the following topics: Viewing Perfmon Log Files, page 7-1 Working with Troubleshooting

More information

EMC ViPR SRM. Alerting Guide. Version 3.7.1.0 302-002-455 01

EMC ViPR SRM. Alerting Guide. Version 3.7.1.0 302-002-455 01 EMC ViPR SRM Version 3.7.1.0 Alerting Guide 302-002-455 01 Copyright 2015-2016 EMC Corporation. All rights reserved. Published in the USA. Published February, 2016 EMC believes the information in this

More information

DiskPulse DISK CHANGE MONITOR

DiskPulse DISK CHANGE MONITOR DiskPulse DISK CHANGE MONITOR User Manual Version 7.9 Oct 2015 www.diskpulse.com info@flexense.com 1 1 DiskPulse Overview...3 2 DiskPulse Product Versions...5 3 Using Desktop Product Version...6 3.1 Product

More information

TRUSTWAVE VULNERABILITY MANAGEMENT USER GUIDE

TRUSTWAVE VULNERABILITY MANAGEMENT USER GUIDE .trust TRUSTWAVE VULNERABILITY MANAGEMENT USER GUIDE 2007 Table of Contents Introducing Trustwave Vulnerability Management 3 1 Logging In and Accessing Scans 4 1.1 Portal Navigation and Utility Functions...

More information

Legal Notes. Regarding Trademarks. 2012 KYOCERA Document Solutions Inc.

Legal Notes. Regarding Trademarks. 2012 KYOCERA Document Solutions Inc. Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held liable for any problems arising from

More information

Legal Notes. Regarding Trademarks. 2011 KYOCERA MITA Corporation

Legal Notes. Regarding Trademarks. 2011 KYOCERA MITA Corporation Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held liable for any problems arising from

More information

NETWRIX EVENT LOG MANAGER

NETWRIX EVENT LOG MANAGER NETWRIX EVENT LOG MANAGER ADMINISTRATOR S GUIDE Product Version: 4.0 July/2012. Legal Notice The information in this publication is furnished for information use only, and does not constitute a commitment

More information

SonicWALL CDP 5.0 Microsoft Exchange InfoStore Backup and Restore

SonicWALL CDP 5.0 Microsoft Exchange InfoStore Backup and Restore SonicWALL CDP 5.0 Microsoft Exchange InfoStore Backup and Restore Document Scope This solutions document describes how to configure and use the Microsoft Exchange InfoStore Backup and Restore feature in

More information

Using Webmail. Technical Manual: User Guide. Document Updated: 1/07. The Webmail Window. Displaying and Hiding the Full Header.

Using Webmail. Technical Manual: User Guide. Document Updated: 1/07. The Webmail Window. Displaying and Hiding the Full Header. Using Webmail Technical Manual: User Guide The Webmail Window To save an attachment: 1. Click once on the attachment name. Or, if there are multiple attachments, click the Save icon to save all attachments

More information

Richmond SupportDesk Web Reports Module For Richmond SupportDesk v6.72. User Guide

Richmond SupportDesk Web Reports Module For Richmond SupportDesk v6.72. User Guide Richmond SupportDesk Web Reports Module For Richmond SupportDesk v6.72 User Guide Contents 1 Introduction... 4 2 Requirements... 5 3 Important Note for Customers Upgrading... 5 4 Installing the Web Reports

More information

Audit Management Reference

Audit Management Reference www.novell.com/documentation Audit Management Reference ZENworks 11 Support Pack 3 February 2014 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of

More information

System Administrator Guide

System Administrator Guide System Administrator Guide Webroot Software, Inc. PO Box 19816 Boulder, CO 80308 www.webroot.com Version 3.5 Webroot AntiSpyware Corporate Edition System Administrator Guide Version 3.5 2007 Webroot Software,

More information

Course Reports 10/18/2012

Course Reports 10/18/2012 Course Reports 10/18/2012 I. Course Reports Provided by the Software A. All User Activity Inside Content Areas displays a summary of all user activity inside Content Areas for the course. Use this report

More information

Avaya Network Configuration Manager User Guide

Avaya Network Configuration Manager User Guide Avaya Network Configuration Manager User Guide May 2004 Avaya Network Configuration Manager User Guide Copyright Avaya Inc. 2004 ALL RIGHTS RESERVED The products, specifications, and other technical information

More information

Installation and configuration of Real-Time Monitoring Tool (RTMT)

Installation and configuration of Real-Time Monitoring Tool (RTMT) Installation and configuration of Real-Time Monitoring Tool (RTMT) How to install and upgrade RTMT, page 1 Services, servlets, and service parameters on server, page 5 Navigation of RTMT, page 6 Nonconfigurable

More information

Kaseya 2. User Guide. Version 7.0. English

Kaseya 2. User Guide. Version 7.0. English Kaseya 2 Monitoring Configuration User Guide Version 7.0 English September 3, 2014 Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept

More information

Dell Active Administrator 8.0

Dell Active Administrator 8.0 What s new in Dell Active Administrator 8.0 January 2016 Dell Active Administrator 8.0 is the upcoming release of Dell Software's complete solution for managing Microsoft Active Directory security auditing,

More information

Administration Guide. . All right reserved. For more information about Specops Inventory and other Specops products, visit www.specopssoft.

Administration Guide. . All right reserved. For more information about Specops Inventory and other Specops products, visit www.specopssoft. . All right reserved. For more information about Specops Inventory and other Specops products, visit www.specopssoft.com Copyright and Trademarks Specops Inventory is a trademark owned by Specops Software.

More information

Help Desk Web User Guide

Help Desk Web User Guide Help Desk Web User Guide 1 P age Contents Create an Incident... 3 Classifying Category... 3 Describe Incident Request... 3 Add Attachments to the Request... 4 Requests... 4 Request List View... 5 Modes

More information

Bitrix Site Manager ASP.NET. Installation Guide

Bitrix Site Manager ASP.NET. Installation Guide Bitrix Site Manager ASP.NET Installation Guide Contents Introduction... 4 Chapter 1. Checking for IIS Installation... 5 Chapter 2. Using An Archive File to Install Bitrix Site Manager ASP.NET... 7 Preliminary

More information

PORTAL ADMINISTRATION

PORTAL ADMINISTRATION 1 Portal Administration User s Guide PORTAL ADMINISTRATION GUIDE Page 1 2 Portal Administration User s Guide Table of Contents Introduction...5 Core Portal Framework Concepts...5 Key Items...5 Layouts...5

More information

Table of Contents INTRODUCTION... 2 HOME PAGE... 3. Announcements... 7 Personalize & Change Password... 8 Reminders... 9 SERVICE CATALOG...

Table of Contents INTRODUCTION... 2 HOME PAGE... 3. Announcements... 7 Personalize & Change Password... 8 Reminders... 9 SERVICE CATALOG... Table of Contents INTRODUCTION... 2 HOME PAGE... 3 Announcements... 7 Personalize & Change Password... 8 Reminders... 9 SERVICE CATALOG... 11 Raising a Service Request... 12 Edit the Service Request...

More information

Sophos for Microsoft SharePoint Help

Sophos for Microsoft SharePoint Help Sophos for Microsoft SharePoint Help Product version: 2.0 Document date: March 2011 Contents 1 About Sophos for Microsoft SharePoint...3 2 Dashboard...4 3 Configuration...5 4 Reports...27 5 Search...28

More information

Power Monitoring Expert 7.2

Power Monitoring Expert 7.2 Power Monitoring Expert 7.2 PDF version of the Web Applications online help 7ENxx-00xx-00 07/2013 PDF version of the Web Applications online help Safety information Safety information Important information

More information

XMS Quick Start Guide

XMS Quick Start Guide 812-0055-002D XMS Quick Start Guide Overview of Quick Start Steps This guide will quickly get you up and running with the Xirrus Management System (XMS). It includes instructions for setting up the XMS

More information

Pharos Control User Guide

Pharos Control User Guide Outdoor Wireless Solution Pharos Control User Guide REV1.0.0 1910011083 Contents Contents... I Chapter 1 Quick Start Guide... 1 1.1 Introduction... 1 1.2 Installation... 1 1.3 Before Login... 8 Chapter

More information

WebSphere Business Monitor

WebSphere Business Monitor WebSphere Business Monitor Dashboards 2010 IBM Corporation This presentation should provide an overview of the dashboard widgets for use with WebSphere Business Monitor. WBPM_Monitor_Dashboards.ppt Page

More information

Monitor TemPageR 4E With PageR Enterprise

Monitor TemPageR 4E With PageR Enterprise Monitor TemPageR 4E With PageR Enterprise TemPageR 4E is AVTECH Software s Real-Time Temperature Monitor with Data Logging, SNMP & Unlimited Alerting. It is designed specifically to monitor 1-4 digital

More information

SAP BusinessObjects Financial Consolidation Web User Guide

SAP BusinessObjects Financial Consolidation Web User Guide SAP BusinessObjects Financial Consolidation Document Version: 10.0 Support Package 18 2016-02-19 SAP BusinessObjects Financial Consolidation Web User Guide Content 1 General user functions....12 1.1 To

More information

VMware vrealize Operations for Horizon Administration

VMware vrealize Operations for Horizon Administration VMware vrealize Operations for Horizon Administration vrealize Operations for Horizon 6.1 This document supports the version of each product listed and supports all subsequent versions until the document

More information

BlackBerry Enterprise Server

BlackBerry Enterprise Server BlackBerry Enterprise Server Version: 5.0 Service Pack: 3 Monitoring Guide Published: 2011-03-07 SWD-1398426-0307061008-001 Contents 1 BlackBerry Enterprise Server monitoring solution... 5 BlackBerry Monitoring

More information

Managing Identities and Admin Access

Managing Identities and Admin Access CHAPTER 4 This chapter describes how Cisco Identity Services Engine (ISE) manages its network identities and access to its resources using role-based access control policies, permissions, and settings.

More information

WhatsVirtual for WhatsUp Gold v16.0 User Guide

WhatsVirtual for WhatsUp Gold v16.0 User Guide WhatsVirtual for WhatsUp Gold v16.0 User Guide Contents Welcome Welcome to WhatsVirtual... 1 Using WhatsVirtual Discovering virtual devices... 2 Viewing discovery output... 4 Manage and monitor virtual

More information

TSM Studio Server User Guide 2.9.0.0

TSM Studio Server User Guide 2.9.0.0 TSM Studio Server User Guide 2.9.0.0 1 Table of Contents Disclaimer... 4 What is TSM Studio Server?... 5 System Requirements... 6 Database Requirements... 6 Installing TSM Studio Server... 7 TSM Studio

More information

BlackBerry Enterprise Server Version: 5.0. Monitoring Guide

BlackBerry Enterprise Server Version: 5.0. Monitoring Guide BlackBerry Enterprise Server Version: 5.0 Monitoring Guide SWD-567890-0331093029-001 Contents 1 BlackBerry Enterprise Server monitoring solution... 5 BlackBerry Monitoring Service... 5 Web address and

More information

Table of Contents INTRODUCTION...2 HOME PAGE...3. Announcements... 6 Personalize... 7 Reminders... 9 Recent Items... 11 SERVICE CATALOG...

Table of Contents INTRODUCTION...2 HOME PAGE...3. Announcements... 6 Personalize... 7 Reminders... 9 Recent Items... 11 SERVICE CATALOG... Table of Contents INTRODUCTION...2 HOME PAGE...3 Announcements... 6 Personalize... 7 Reminders... 9 Recent Items... 11 SERVICE CATALOG...12 REQUEST...14 Request List View... 15 Creating a New Incident...

More information

Editor Manual for SharePoint Version 1. 21 December 2005

Editor Manual for SharePoint Version 1. 21 December 2005 Editor Manual for SharePoint Version 1 21 December 2005 ii Table of Contents PREFACE... 1 WORKFLOW... 2 USER ROLES... 3 MANAGING DOCUMENT... 4 UPLOADING DOCUMENTS... 4 NEW DOCUMENT... 6 EDIT IN DATASHEET...

More information

EventTracker: Integrating Imperva SecureSphere

EventTracker: Integrating Imperva SecureSphere EventTracker: Integrating Imperva SecureSphere Publication Date: June 14, 2012 EventTracker 8815 Centre Park Drive Columbia MD 21045 www.eventtracker.com About This Guide Abstract This guide provides instructions

More information

Email -- Reading and Printing Email

Email -- Reading and Printing Email Email -- Reading and Printing Email Checking for New Email By default, webmail checks for new email automatically. If you want to manually check for new email, click the Check Email button. Or, click the

More information

NovaBACKUP. Storage Server. NovaStor / May 2011

NovaBACKUP. Storage Server. NovaStor / May 2011 NovaBACKUP Storage Server NovaStor / May 2011 2011 NovaStor, all rights reserved. All trademarks are the property of their respective owners. Features and specifications are subject to change without notice.

More information

DarwiNet Client Level

DarwiNet Client Level DarwiNet Client Level Table Of Contents Welcome to the Help area for your online payroll system.... 1 Getting Started... 3 Welcome to the Help area for your online payroll system.... 3 Logging In... 4

More information

First Financial Bank Online Banking Quick Reference. February, 2013

First Financial Bank Online Banking Quick Reference. February, 2013 February, 2013 PURPOSE... 2 SUPPORT... 2 ACCESSING ONLINE BANKING... 2 Getting to the Online Banking Site... 2 Requesting Enrollment in Online Banking... 2 Logging in for the First Time... 2 Registering

More information

GFI LANguard 9.0 ReportPack. Manual. By GFI Software Ltd.

GFI LANguard 9.0 ReportPack. Manual. By GFI Software Ltd. GFI LANguard 9.0 ReportPack Manual By GFI Software Ltd. http://www.gfi.com E-mail: info@gfi.com Information in this document is subject to change without notice. Companies, names, and data used in examples

More information

Call Management. V6 User Guide

Call Management. V6 User Guide Call Management V6 User Guide 1 Page Overview 3 Call Management 3 My Reports Dashboard 4 Standard Widgets 5 Custom Widgets 6 Call Recordings 6-7 Reports Catalogue 7 Time Interval Reports 7 Extension Reports

More information

Hamline University Administrative Computing Page 1

Hamline University Administrative Computing Page 1 User Guide Banner Handout: BUSINESS OBJECTS ENTERPRISE (InfoView) Document: boxi31sp3-infoview.docx Created: 5/11/2011 1:24 PM by Chris Berry; Last Modified: 8/31/2011 1:53 PM Purpose:... 2 Introduction:...

More information

Cloud. Hosted Exchange Administration Manual

Cloud. Hosted Exchange Administration Manual Cloud Hosted Exchange Administration Manual Table of Contents Table of Contents... 1 Table of Figures... 4 1 Preface... 6 2 Telesystem Hosted Exchange Administrative Portal... 7 3 Hosted Exchange Service...

More information

GP REPORTS VIEWER USER GUIDE

GP REPORTS VIEWER USER GUIDE GP Reports Viewer Dynamics GP Reporting Made Easy GP REPORTS VIEWER USER GUIDE For Dynamics GP Version 2015 (Build 5) Dynamics GP Version 2013 (Build 14) Dynamics GP Version 2010 (Build 65) Last updated

More information

CentreWare Internet Services Setup and User Guide. Version 2.0

CentreWare Internet Services Setup and User Guide. Version 2.0 CentreWare Internet Services Setup and User Guide Version 2.0 Xerox Corporation Copyright 1999 by Xerox Corporation. All rights reserved. XEROX, The Document Company, the digital X logo, CentreWare, and

More information

ViRobot Desktop 5.5. User s Guide

ViRobot Desktop 5.5. User s Guide ViRobot Desktop 5.5 User s Guide ViRobot Desktop 5.5 User s Guide Copyright Notice Copyright 2007 by HAURI Inc. All rights reserved worldwide. No part of this publication or software may be reproduced,

More information

Table of Contents WELCOME TO ADAUDIT PLUS... 3. Release Notes... 4 Contact ZOHO Corp... 5 ADAUDIT PLUS TERMINOLOGIES... 7 GETTING STARTED...

Table of Contents WELCOME TO ADAUDIT PLUS... 3. Release Notes... 4 Contact ZOHO Corp... 5 ADAUDIT PLUS TERMINOLOGIES... 7 GETTING STARTED... Table of Contents WELCOME TO ADAUDIT PLUS... 3 Release Notes... 4 Contact ZOHO Corp.... 5 ADAUDIT PLUS TERMINOLOGIES... 7 GETTING STARTED... 8 System Requirements... 9 Installing ADAudit Plus... 10 Working

More information

System Administration and Log Management

System Administration and Log Management CHAPTER 6 System Overview System Administration and Log Management Users must have sufficient access rights, or permission levels, to perform any operations on network elements (the devices, such as routers,

More information

Table of Contents. Welcome... 2. Login... 3. Password Assistance... 4. Self Registration... 5. Secure Mail... 7. Compose... 8. Drafts...

Table of Contents. Welcome... 2. Login... 3. Password Assistance... 4. Self Registration... 5. Secure Mail... 7. Compose... 8. Drafts... Table of Contents Welcome... 2 Login... 3 Password Assistance... 4 Self Registration... 5 Secure Mail... 7 Compose... 8 Drafts... 10 Outbox... 11 Sent Items... 12 View Package Details... 12 File Manager...

More information

Using Webmail. Document Updated: 9/08. Technical Manual: User Guide. The Webmail Window. Displaying and Hiding the Full Header.

Using Webmail. Document Updated: 9/08. Technical Manual: User Guide. The Webmail Window. Displaying and Hiding the Full Header. Using Webmail Technical Manual: User Guide Webmail is supported in the following browsers: Windows Internet Explorer 6, Internet Explorer 7, Firefox 2, and Firefox 3 Mac OSX Safari 2, Safari 3, Firefox

More information

GETTING STARTED GUIDE. FileAudit VERSION. www.isdecisions.com

GETTING STARTED GUIDE. FileAudit VERSION. www.isdecisions.com GETTING STARTED GUIDE FileAudit 5 VERSION www.isdecisions.com Introduction FileAudit monitors access or access attempts to sensitive files and folders on Microsoft Windows servers. FileAudit allows you

More information

Presentation Reporting Quick Start

Presentation Reporting Quick Start Presentation Reporting Quick Start Topic 50430 Presentation Reporting Quick Start Websense Web Security Solutions Updated 19-Sep-2013 Applies to: Web Filter, Web Security, Web Security Gateway, and Web

More information

WebSphere Business Monitor

WebSphere Business Monitor WebSphere Business Monitor Administration This presentation will show you the functions in the administrative console for WebSphere Business Monitor. WBPM_Monitor_Administration.ppt Page 1 of 21 Goals

More information

ICP Data Entry Module Training document. HHC Data Entry Module Training Document

ICP Data Entry Module Training document. HHC Data Entry Module Training Document HHC Data Entry Module Training Document Contents 1. Introduction... 4 1.1 About this Guide... 4 1.2 Scope... 4 2. Step for testing HHC Data Entry Module.. Error! Bookmark not defined. STEP 1 : ICP HHC

More information

Creating and Managing Online Surveys LEVEL 2

Creating and Managing Online Surveys LEVEL 2 Creating and Managing Online Surveys LEVEL 2 Accessing your online survey account 1. If you are logged into UNF s network, go to https://survey. You will automatically be logged in. 2. If you are not logged

More information

User Manual for Web. Help Desk Authority 9.0

User Manual for Web. Help Desk Authority 9.0 User Manual for Web Help Desk Authority 9.0 2011ScriptLogic Corporation ALL RIGHTS RESERVED. ScriptLogic, the ScriptLogic logo and Point,Click,Done! are trademarks and registered trademarks of ScriptLogic

More information

Logi Ad Hoc Reporting. Troubleshooting Scheduling Failure. Version 10

Logi Ad Hoc Reporting. Troubleshooting Scheduling Failure. Version 10 Logi Ad Hoc Reporting Troubleshooting Scheduling Failure Version 10 Last Updated: April 2011 General Configuration Overview The execution and delivery of scheduled reports is one of the more complicated

More information

NETWORK PRINT MONITOR User Guide

NETWORK PRINT MONITOR User Guide NETWORK PRINT MONITOR User Guide Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held liable

More information

AdventNet ManageEngine SupportCenter Plus :: User Guide. Table Of Contents INTRODUCTION... 3 REQUEST... 4. Creating a New Request...

AdventNet ManageEngine SupportCenter Plus :: User Guide. Table Of Contents INTRODUCTION... 3 REQUEST... 4. Creating a New Request... Table Of Contents INTRODUCTION... 3 REQUEST... 4 Creating a New Request... 5 Quick Create...5 Contact Details...5 Classifying Request Category...5 Prioritizing Request...6 Describe Request...6 Add Attachments

More information

Chapter 15: Forms. User Guide. 1 P a g e

Chapter 15: Forms. User Guide. 1 P a g e User Guide Chapter 15 Forms Engine 1 P a g e Table of Contents Introduction... 3 Form Building Basics... 4 1) About Form Templates... 4 2) About Form Instances... 4 Key Information... 4 Accessing the Form

More information

Fleet Manager Quick Guide (Non Maintenance Mode)

Fleet Manager Quick Guide (Non Maintenance Mode) Fleet Manager Quick Guide (Non Maintenance Mode) Launch Fleet Manager: Open the Fleet Manager Application by: 1. Double clicking the icon located on the desktop - or 2. Via Start > Programs > MobileView

More information

IT HELP Desk Dashboard ManageEngine Service Desk Plus User Guide

IT HELP Desk Dashboard ManageEngine Service Desk Plus User Guide Create an Incident When you need to report a failure or problem of your system to the IT help desk team, then send a request to the team. There are different modes of placing a request, such as submitting

More information

Burst Technology. bt-loganalyzer. User Guide

Burst Technology. bt-loganalyzer. User Guide Burst Technology presents bt-loganalyzer SQL Edition User Guide Burstek TM 9240 Bonita Beach Road Bonita Springs, FL 34135 Telephone: (239) 495-5900 or toll free (800) 709-2551 Visit the Burstek Website

More information

Attix5 Pro Server Edition

Attix5 Pro Server Edition Attix5 Pro Server Edition V7.0.2 User Manual for Mac OS X Your guide to protecting data with Attix5 Pro Server Edition. Copyright notice and proprietary information All rights reserved. Attix5, 2013 Trademarks

More information

Online Help StruxureWare Data Center Expert

Online Help StruxureWare Data Center Expert Online Help StruxureWare Data Center Expert Version 7.2.1 What's New in StruxureWare Data Center Expert 7.2.x Learn more about the new features available in the StruxureWare Data Center Expert 7.2.x release.

More information

Sophos for Microsoft SharePoint Help. Product version: 2.0

Sophos for Microsoft SharePoint Help. Product version: 2.0 Sophos for Microsoft SharePoint Help Product version: 2.0 Document date: September 2015 Contents 1 About Sophos for Microsoft SharePoint...3 2 Dashboard...4 3 Configuration...5 3.1 On-access scan...5 3.2

More information

Dell SupportAssist Version 2.0 for Dell OpenManage Essentials Quick Start Guide

Dell SupportAssist Version 2.0 for Dell OpenManage Essentials Quick Start Guide Dell SupportAssist Version 2.0 for Dell OpenManage Essentials Quick Start Guide Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your computer.

More information

Novell ZENworks Asset Management 7.5

Novell ZENworks Asset Management 7.5 Novell ZENworks Asset Management 7.5 w w w. n o v e l l. c o m October 2006 USING THE WEB CONSOLE Table Of Contents Getting Started with ZENworks Asset Management Web Console... 1 How to Get Started...

More information

SAP BusinessObjects Business Intelligence Platform Document Version: 4.1 Support Package 5-2014-11-06. Business Intelligence Launch Pad User Guide

SAP BusinessObjects Business Intelligence Platform Document Version: 4.1 Support Package 5-2014-11-06. Business Intelligence Launch Pad User Guide SAP BusinessObjects Business Intelligence Platform Document Version: 4.1 Support Package 5-2014-11-06 Business Intelligence Launch Pad User Guide Table of Contents 1 Document history....7 2 Getting started

More information

EMC Smarts Network Configuration Manager

EMC Smarts Network Configuration Manager EMC Smarts Network Configuration Manager Version 9.4.1 Advisors User Guide P/N 302-002-279 REV 01 Copyright 2013-2015 EMC Corporation. All rights reserved. Published in the USA. Published October, 2015

More information

Manual Password Depot Server 8

Manual Password Depot Server 8 Manual Password Depot Server 8 Table of Contents Introduction 4 Installation and running 6 Installation as Windows service or as Windows application... 6 Control Panel... 6 Control Panel 8 Control Panel...

More information

Application Note Room Alert

Application Note Room Alert Application Note Room Alert Monitor Room Alert 24E With PageR Enterprise Instructions for Using Room Alert 24E With PageR Enterprise The Room Alert 24E ID Box is one of AVTECH Software s hardware solutions

More information

HP LaserJet MFP Analog Fax Accessory 300 Send Fax Driver Guide

HP LaserJet MFP Analog Fax Accessory 300 Send Fax Driver Guide HP LaserJet MFP Analog Fax Accessory 300 Send Fax Driver Guide Copyright and License 2008 Copyright Hewlett-Packard Development Company, L.P. Reproduction, adaptation, or translation without prior written

More information

SonicWALL GMS Custom Reports

SonicWALL GMS Custom Reports SonicWALL GMS Custom Reports Document Scope This document describes how to configure and use the SonicWALL GMS 6.0 Custom Reports feature. This document contains the following sections: Feature Overview

More information

Copyright 2013 GE Multilin Inc. All rights reserved. CyberSentry SEM software revision 1.00. CyberSentry, Digital Energy, Multilin, and GE Multilin

Copyright 2013 GE Multilin Inc. All rights reserved. CyberSentry SEM software revision 1.00. CyberSentry, Digital Energy, Multilin, and GE Multilin Copyright 2013 GE Multilin Inc. All rights reserved. CyberSentry SEM software revision 1.00. CyberSentry, Digital Energy, Multilin, and GE Multilin are trademarks or registered trademarks of GE Multilin

More information

McAfee SIEM Alarms. Setting up and Managing Alarms. Introduction. What does it do? What doesn t it do?

McAfee SIEM Alarms. Setting up and Managing Alarms. Introduction. What does it do? What doesn t it do? McAfee SIEM Alarms Setting up and Managing Alarms Introduction McAfee SIEM provides the ability to send alarms on a multitude of conditions. These alarms allow for users to be notified in near real time

More information

STORAGE SYSTEM DATALOGGER DATABASE

STORAGE SYSTEM DATALOGGER DATABASE STORAGE SYSTEM DATALOGGER DATABASE Database based storage system for data acquisition systems, dataloggers and transmitters Instruction Manual Introduction This storage system is database based system

More information

Contents Overview... 5 Configuring Project Management Bridge after Installation... 9 The Project Management Bridge Menu... 14

Contents Overview... 5 Configuring Project Management Bridge after Installation... 9 The Project Management Bridge Menu... 14 Portfolio Management Bridge for Microsoft Office Project Server User's Guide June 2015 Contents Overview... 5 Basic Principles and Concepts... 5 Managing Workflow... 7 Top-Down Management... 7 Project-Based

More information

CTERA Agent for Mac OS-X

CTERA Agent for Mac OS-X User Guide CTERA Agent for Mac OS-X September 2013 Version 4.0 Copyright 2009-2013 CTERA Networks Ltd. All rights reserved. No part of this document may be reproduced in any form or by any means without

More information

Custom Reporting System User Guide

Custom Reporting System User Guide Citibank Custom Reporting System User Guide April 2012 Version 8.1.1 Transaction Services Citibank Custom Reporting System User Guide Table of Contents Table of Contents User Guide Overview...2 Subscribe

More information

MULTIFUNCTIONAL DIGITAL SYSTEMS. Operator s Manual for AddressBook Viewer

MULTIFUNCTIONAL DIGITAL SYSTEMS. Operator s Manual for AddressBook Viewer MULTIFUNCTIONAL DIGITAL SYSTEMS Operator s Manual for AddressBook Viewer 2008, 2009 TOSHIBA TEC CORPORATION All rights reserved Under the copyright laws, this manual cannot be reproduced in any form without

More information

CRM Migration Manager 3.1.1 for Microsoft Dynamics CRM. User Guide

CRM Migration Manager 3.1.1 for Microsoft Dynamics CRM. User Guide CRM Migration Manager 3.1.1 for Microsoft Dynamics CRM User Guide Revision D Issued July 2014 Table of Contents About CRM Migration Manager... 4 System Requirements... 5 Operating Systems... 5 Dynamics

More information

Juniper Networks Management Pack Documentation

Juniper Networks Management Pack Documentation Juniper Networks Management Pack Documentation Juniper Networks Data Center Switching Management Pack for VMware vrealize Operations (vrops) Release 2.5 Modified: 2015-10-12 Juniper Networks, Inc. 1133

More information

PRINT FLEET MANAGER USER MANUAL

PRINT FLEET MANAGER USER MANUAL PRINT FLEET MANAGER USER MANUAL 1 Disclaimer of warranties and limitation of liabilities ( YES ) reserves all rights in the program as delivered. The program or any portion thereof may not be reproduced

More information

BUSINESS INSIGHTS EXPLORER Data at Your Fingertips

BUSINESS INSIGHTS EXPLORER Data at Your Fingertips How Do I BUSINESS INSIGHTS EXPLORER Data at Your Fingertips Access Business Insights Explorer Find Information in Business Insights Explorer Drill Into Additional Information Filter, Sort, Group, or Summarize

More information

Desktop Surveillance Help

Desktop Surveillance Help Desktop Surveillance Help Table of Contents About... 9 What s New... 10 System Requirements... 11 Updating from Desktop Surveillance 2.6 to Desktop Surveillance 3.2... 13 Program Structure... 14 Getting

More information

Decision Support AITS University Administration. EDDIE 4.1 User Guide

Decision Support AITS University Administration. EDDIE 4.1 User Guide Decision Support AITS University Administration EDDIE 4.1 User Guide 2 P a g e EDDIE (BI Launch Pad) 4.1 User Guide Contents Introduction to EDDIE... 4 Log into EDDIE... 4 Overview of EDDIE Homepage...

More information

MultiSite Manager. User Guide

MultiSite Manager. User Guide MultiSite Manager User Guide Contents 1. Getting Started... 2 Opening the MultiSite Manager... 2 Navigating MultiSite Manager... 2 2. The All Sites tabs... 3 All Sites... 3 Reports... 4 Licenses... 5 3.

More information

Using Webmail. Document Updated: 11/10. Technical Manual: User Guide. The Webmail Window. Logging In to Webmail. Displaying and Hiding the Full Header

Using Webmail. Document Updated: 11/10. Technical Manual: User Guide. The Webmail Window. Logging In to Webmail. Displaying and Hiding the Full Header Using Webmail Technical Manual: User Guide Webmail is supported in the following browsers: Windows Internet Explorer 6, Internet Explorer 7, Firefox 2, and Firefox 3 Mac OSX Safari 2, Safari 3, Firefox

More information

Service Desk Plus: User Guide

Service Desk Plus: User Guide Service Desk Plus: User Guide Introduction ManageEngine ServiceDesk Plus is comprehensive help desk and asset management software that provides help desk agents and IT managers, an integrated console to

More information