3 Contents 1 Introduction Related documents 1 1 Navigation of the software 1 2 How to use this guide Managing Access Holidays and Timezones 2 2 Access Levels 2 7 Cardholder Management 2 9 i
4 3 Monitoring Alarms Deleting events 3 3 Acknowledging Events 3 3 System Hardware Tree 3 6 Pending alarms 3 10 Tracing alarms 3 10 Filtering alarms 3 11 Other Features 3 13 AGlossary of Terms Terms A 2 ii
5 C h a p t e r 1 Introduction Related documents Thank you for choosing OnGuard, the world s leading online access control system. Use this guide to make sure that you set up and use your system in the most efficient way and to get the most out of it. The following documents are available to help you install, maintain, or operate other related systems. See your BEST Representative for more information. Alarm Monitoring User Guide BadgeDesigner User Guide FormsDesigner User Guide ID CredentialCenter User Guide Basic Import Utility User Guide Installation & Setup User Guide MapDesigner User Guide System Administration User Guide 1 1
6 Chapter 1: Introduction Universal Interface Server User Guide Replicator User Guide View/Edit Only Workstation User Guide Alternative Wiring Configurations Guide Legato Co-StandbyServer User Guide Hardware Installation Guide Visitor Management User Guide Area Access Manager User Guide Digital Video User Guide Video Archive Server User Guide Replication Administration User Guide Digital Video Hardware User Guide Navigation of the software The OnGuard application follows normal Windows conventions, and several methods are available to the operator for navigation. These methods include using both menus and toolbars. Many first-time operators indicate that using menus, rather than toolbars, for navigation, gives a more intuitive experience. Moreover, the menus provide access to all configuration options whereas the toolbars provide access to only the most commonly used configurations. The following graphic shows the menu and toolbar. 1 2
7 Figure 1.1 Toolbars vs the menu. Chapter 1: Introduction Toolbars The Administration Menu The following instructions will use menus for navigation, and all of the configuration will be performed through the Administration and Access Control menu lists. Once a particular screen has been chosen, the Administrator has the choice of buttons in dark typeface at the bottom of the page. 1 3
8 Chapter 1: Introduction The following list represents most of the choices that are available: Add means to create a new record, Modify means to edit an existing record, Cancel means to abort the current operation, Delete means to remove the record from programming, and OK means to save the record. Additionally, every configuration screen has a Help option that will take the Administrator directly to a graphic of the selected screen. This online help follows typical Windows search conventions. Finally, when multiple screens are opened at one time, tabs will appear at the bottom of the page to assist in the selection of a single screen from the displayed group.. Figure 1.2 Sample buttons and tabs located at the bottom of the window. Sample buttons. Sample tabs. How to use this guide This manual is intended for use as a training guide and a reference in the day-to-day operation of an OnGuard online system. Chapter 2, Managing Access This chapter provides step-bystep procedures to set up timezones, holidays, access levels, and on the adding, modifying, deleting and searching cardholders. Chapter 3, Alarm Monitoring This chapter provides complete step-by-step instructions to set up the user interface for efficient alarm monitoring. Appendix A, Glossary This appendix provides a list of terms that are specifically used in the OnGuard software. Terms that appear in the glossary are set in italics when they are first used. 1 4
9 C h a p t e r 2 Managing Access Determining a person s ability to use his or her card to gain access through a door is really a matter of solving the equation, Who can go where... when. Reversing this formula we can see that permitting access contains the following, in the order of process: 1 time (when) element 2 location (where) element 3 person (who) element The following diagram represents this formula and will be used throughout this guide to help you remember it. 2 1
10 Chapter 2: Managing Access Figure 2.1 Pictorial of the basic access control formula Once all of these elements have been satisfied, a card is ready for use in the system. These instructions will refer first to the time element of the access control equation. Holidays and Timezones When When Where Who Access A timezone is a block of time that a particular activity or functionality is allowed to occur. These blocks of time are represented by intervals. A holiday represents a special period of time, where the timezone is to behave differently. Or to put it another way, a holiday is an exception to the normal workings of a timezone. To add a timezone 1 From System Administration click Access Control > Timezones. The Holidays/Timezones window displays 2 2
11 Chapter 2: Managing Access Figure 2.2 The Timezone window showing the Always schedule. Timezones tab The default Always schedule Click Add to create a new timezone. 2 Click the Timezones tab. A list of the existing timezones will be displayed. 3 Click Add to create a new timezone to the list. Figure 2.3 Adding a timezone. Enter the timezone name. Enter the time interval(s) start, end, and days of the week when it is to be active. 2 3
12 Chapter 2: Managing Access 4 Choose a name for the timezone and enter the choice in the Name field. Choosing a name that actually represents the period of time for the timezone allows you to more efficiently retrieve a timezone from a long list. The timezone list can include up to 255 different timezones. 5 Enter the desired start and end times for each desired interval (time must be entered in a 24-hour format). Indicate by checking the check box on each day that you want the interval to be active. 6 Click OK. The new timezone has been added to the list. Notice the Timezones tab has additional headings for something other than standard days of the week. These H1 through H8 headings represent holidays that allow for the exceptions to each interval. These holidays, or exception days, are configured on the Holiday tab. OnGuard organizes these exception days into one of eight types. Those exception days that are to be treated the same would be organized into one of the eight types. A holiday type can contain more than one configured exception period. Holidays can be defined as one 24-hour period or a series of uninterrupted days. To add a holiday 1 If not already on the Holidays/Timezones window, from System Administration click Access Control > Timezones. The Holidays/Timezones window displays 2 4
13 Chapter 2: Managing Access Figure 2.4 Holiday tab Click Add to create a holiday. 2 Click the Holiday tab. 3 Click Add. Figure 2.5 Adding the Spring Break holiday. Name the holiday descriptively. Select the holiday type. Select the day that the holiday starts and then enter the number of days that it lasts. 4 Enter a unique and descriptive name for the holiday. 5 Select the holiday type by selecting one of the check boxes. 2 5
14 Chapter 2: Managing Access 6 From the calendar, select the day that you want the exception period to start. 7 Enter a duration in days if the holiday lasts more than one day. 8 Click OK to save the record. 9 Click the Timezones tab and select Modify. 10 Determine which exceptions days the timezone will be active by checking the appropriate check boxes. The holiday type selection will take priority over a day of the week that is or is not checked. 11 Click OK to save the record. 2 6
15 Chapter 2: Managing Access Access Levels Creating access levels satisfies the where element of the access control equation. An access level is nothing more than a reader-timezone combination. Where To add access levels 1 From System Administration click Access Control > Access Levels. The Access levels window displays Figure Click Add to create an access level. 2 7
16 Chapter 2: Managing Access Figure 2.7 Choose the name of the access level. Choose the readers that will define the where of the access level. Choose the time zones that will define the when of the access level. 3 Choose a name for the access level and enter the choice in the Name area. 4 Select the reader(s) and timezone configuration(s) to be included in the access level. Remember that a selection is not made unless a checkmark is observed. 5 Click Assign to move the reader and timezone selections to the right side of the form. 6 Click OK to save the record. 2 8
17 Chapter 2: Managing Access Cardholder Management Adding cardholders satisfies the final element of who for the access control equation. Who To add cardholder records 1 Open System Administration and go to Administration, Cardholders. A page with several tabs will be displayed. We are only concerned with the first three tabs of Cardholder, Badge, and Access Levels for common dayto-day entry. Figure 2.8 The cardholder, general information screen. Click Add to start entering cardholder general information. 2 Click Add on the Cardholder tab. Complete all appropriate fields on the form. 3 Click the Badge tab. 2 9
18 Chapter 2: Managing Access Figure 2.9 The cardholder, badge information screen Choose the badge type. Employee is not the only badge type you could choose. Enter the Badge ID if the field will accept the data. 4 Select the appropriate Badge Type from the drop-down list. 5 Enter a Badge ID for the corresponding badge only if the field will accept data. Sometimes a system is set to automatically generate badge ID's and manual entry will not be required. Complete the rest of Badge tab as required by your organization. 6 Click the Access Level tab. 2 10
19 Chapter 2: Managing Access Figure 2.10 The cardholder, access level information screen Choose the access level for this cardholder. You may need to choose more than one access level. 7 Select the appropriate access levels for the cardholder. Only the access levels accompanied by a checkmark are selected for assignment. 8 Click OK to save the record. 2 11
20 Chapter 2: Managing Access 2 12
21 C h a p t e r 3 Monitoring Alarms The Alarm Monitoring application permits you to perform many real time functions to the access control system hardware. The application permits you to: view hardware and system events as they occur. view the current status of each system component. control functionality of components throughout the installed system. The combined real time functionality that the Alarm Monitoring application allows provides you with a valuable tool for monitoring, controlling, and troubleshooting an OnGuard system. The Alarm Monitoring application is like all OnGuard applications in that you may navigate through choices of menus and a toolbar. The following instructions will use a combination of both navigation methods. 3 1
22 Chapter 3: Monitoring Alarms Upon logging into the Alarm Monitoring application you are usually greeted with the Main Alarm Monitoring screen. This screen is identified with a tab containing yellow bells that is located in the lower left portion of the screen. See Figure 3.1. Figure 3.1 Main alarm monitoring window Click on any column to sort by that field. More fields are available for sorting than are displayed here. Alarm monitoring tab. Click to display the Alarm Monitoring Window. You can view this screen anytime in the forefront of the application by clicking on the tool containing the yellow bells. This screen presents events in a line-by-line textual format as they occur in the system and is used to manage these events by deleting or acknowledging them after the appropriate action has been taken. Take care to not allow an excessive number of events to accumulate on this screen. Events will scroll off of the screen once the screen is filled. Allowing these events to scroll off of the page can create some confusion for the operator when looking for a specific event. Moreover, the more events left to accumulate on the Main Alarm Monitoring screen, the slower the screen will respond to opening, closing, and general manipulation of the window. Events on this screen can be sorted by many methods, and these methods are represented by clicking on the various column headings as shown in Figure 3.1. Additionally, these methods may be customized through the Options menu. 3 2
23 Chapter 3: Monitoring Alarms Deleting events Events can be deleted by several different methods; any method chosen is acceptable and will accomplish the same thing. To delete an event Do any one of the following: Click on the event and then press the keyboard delete button. Click on the event and then click on the menu Edit > Delete. Right-click on the event and then select Delete from the provided choices. The same methods for deleting single events can be used for deleting several events at one time. To delete all alarm events at one time 1 From the Alarm Monitoring Application, click Edit > Select All. 2 Perform one of the following: OR Acknowledging Events Press the delete button on the keyboard, OR Right-click on the selection and left-click on the delete selection, OR Select Edit > Delete from the menu, Click Edit > Delete All. Occasionally, not all of the alarms will be deleted with a delete command. If this is the case you will get a message like Figure 3.2. Figure 3.2 The Some alarms cannot be deleted message These events have been configured by the System Administrator to require an action other than deletion for proper man- 3 3
24 Chapter 3: Monitoring Alarms agement of the event. This action is usually referred to as acknowledging an event. Like deleting an event, an event can be acknowledged several ways. To acknowledge an alarm event Do one of the following: Click on the event and then click on the menu Edit > Acknowledge, OR Click on the event and then click on the yellow check mark button from the toolbar, OR Double-click on the event, OR Right-click on the event and then select Acknowledge. Any of these methods may remove the event from the Main Alarm Monitoring window or may display Figure 3.3: Figure 3.3 Acknowledging an alarm Type the appropriate note into this section. Click Acknowledge and then Close. If this screen is displayed, the acknowledgement transaction has been configured by the System Administrator to require notes to be included before the event can be removed from the Main Alarm Monitoring window. You can include notes in one of two ways. 3 4
25 Chapter 3: Monitoring Alarms To acknowledge an alarm by including notes 1 Type the desired response directly into the section. 2 Click Acknowledge. 3 Click Close. OR 1 Click Select. A list of predefined acknowledgement notes is displayed. These predefined acknowledgement notes would have been configured by the System Administrator. Figure 3.4 The Select Acknowledgment notes window displays After making sure to do what the acknowledgment note calls for, click the name of the acknowledgment note so that a checkmark appears next to it. This section lists the text of the acknowledgment note that spells out exactly what was done. 2 Click Acknowledge. 3 Click Close. Note The System Administrator may have configured other aids for alarm event management. You could use these aids by reading the requirements for event response in the Instruction window or by playing a sound instruction file by clicking on the Audio button. Events can be acknowledged also in groups. Once the events have been selected, the events can be acknowledged in one of several ways. 3 5
26 Chapter 3: Monitoring Alarms To acknowledge a group of alarm events 1 Select the group of alarm events. 2 Do one of the following: Right-click on the selection and then left-click on Fast Group Acknowledge, OR Click on the events and then click on the menu Edit > Fast Group Acknowledge, OR Click on the yellow check mark from the toolbar. Any one of these actions should display Figure 3.5. Figure 3.5 Acknowledge Selected Alarms window Click here to select the note(s) that are appropriate for the selected alarms. OR Type the note that is appropriate. Click OK 3 Type in or select the desired notes to complete the acknowledgement transaction. 4 Click OK. System Hardware Tree The Main Alarm Monitoring screen provides some useful information, but other screens are available that may present a more complete picture of the exact operating status of the system. One screen that is especially helpful in monitoring the status of an OnGuard system is the System Hardware Tree. To launch the System Hardware Tree Click on the tool just to the right of the yellow bells. Figure 3.6 Clicking on the System Hardware Tree button Click on System Tree button. 3 6
27 Chapter 3: Monitoring Alarms Figure 3.7 The System Hardware Tree Click on the sign to collapse the tree. Click on the + sign to expand the tree. Red s showing that the device is off line. Expand the tree by clicking on the plus symbols. You can now observe the system in real-time status, tree format. This format is useful to determine whether the installed equipment is operating properly and the exact status of each component. Components failing to communicate status are indicated with a red. Notice that this screen is represented in the lower left corner by a tab containing the corresponding toolbar icon. The operator can assume control of the functionality for the various components in many ways. Like the Main Alarm Monitoring window, there are various methods is to do this. Some examples include the following. Opening a door for the strike time Using the system hardware tree window, you can open/ unlock a door for the amount of time that is programmed for the lock or strike. This is called the strike time. To open a door for the strike time Do one of the following: Click on the reader and then click on the blue door button from the toolbar, OR Right-click on the reader from the tree and then click on Open Door(s), OR Click on the reader from the tree, then from the menu Control > [name of the reader] > Open Door(s). 3 7
28 Chapter 3: Monitoring Alarms Changing the mode of the reader A reader can be in any one of the following modes: Card and PIN Card only PIN or card Facility code only Locked Unlocked To change the mode of the reader Do one of the following: Right-click on the reader from the tree, then click on Reader Access Modes, and then the new reader mode, OR Click on the reader from the tree, then from the menu click Control > [the name of the reader] > Reader Access Modes > the new reader mode. Masking an alarm input Alarms can be masked selectively ignored under certain conditions. To mask an alarm input Do one of the following: Right-click on the alarm input from the tree, then click on Mask > Alarm Input(s). OR Click on the input from the tree, then from the menu, click Control > [the name of the input] > Mask > Alarm Input(s). Most of these same functions can be performed from the Main Alarm Monitoring window as well as by selecting an event from the displayed list and right-clicking and making a selection from the displayed choices or by selecting event an using the Control option from the menu. 3 8
29 Chapter 3: Monitoring Alarms Tiling (displaying multiple) two screens Many times you may want to display both the alarm monitoring screen and the system hardware tree at the same time. This type of display enables you to enjoy the advantages of both screens. The process of displaying multiple screens is called tiling. To tile two alarm windows Clicking Window > Tile Horizontally (or Vertically). Figure 3.8 The Alarm Monitoring window and System Hardware Tree tiled vertically Alarm Monitoring screen. System Tree screen. Note Whichever screen is active at the time will go to the top or to the left. 3 9
30 Chapter 3: Monitoring Alarms Pending alarms The Pending Alarms screen can be launched by clicking on the toolbar button represented by the red bells. This screen provides an option to sort higher priority alarms to a window separate from the Main Alarm Monitoring window. To display all pending alarms Click on button with the red bells. Figure 3.9 Clicking on the pending alarms button Click on Pending alarms button. Tracing alarms Tracing is a function of the alarm monitoring application. It allows you to isolate a system component or badge ID and trace it in either real time or in the past. You can trace only within predetermined limits. To trace a badge ID 1 Select the trace badge button from the toolbar. Figure 3.10 Clicking on the trace badge ID button Click on Trace Badge ID button. The Trace Badge window displays Figure 3.11 Entering the badge ID to trace Enter the badge ID number to be traced. 2 Type in the badge ID to be traced. 3 Click OK. 3 10
31 Chapter 3: Monitoring Alarms The Trace Configuration window displays Figure 3.12 Determining whether the trace should be live and/or historical Determine whether to trace the badge ID in the past and/or in real time. If you only want to find out where someone was within a certain time period, click the perform historical trace and then select the start and end times. Filtering alarms 4 Determine the type of trace desired by choosing from Historical, Live, or both. 5 Select the appropriate trace criteria. 6 Press OK. All of the activity associated with the trace request will display on its own window in the Alarm Monitoring display. The alarm filter provides an on-the-fly method for you to prevent certain events from reporting in the Main Alarm Monitoring window. To filter selected alarm types 1 Make sure that the Main Alarm Monitoring window is active (not behind another window or inactive), by clicking on the title bar. 2 Click on Configure > Alarm Filter. The Alarm Filter for Main Alarm Monitor window displays 3 11
32 Chapter 3: Monitoring Alarms Figure 3.13 Selecting some alarm event types to filter out Clear the alarm events that you do not want to display on the alarm monitoring window. All the alarm events that have a check mark will display. 3 Clear the check mark on the event type(s) that you do not want to display in the Main Alarm Monitoring window. The event type(s) left unchecked will not display until the check mark is re-entered by the selection(s). 3 12
33 Chapter 3: Monitoring Alarms Other Features The toolbar and menus of the Alarm Monitoring application provide much more functionality than is discussed in detail in this document. Constant use and exploration of the application will reveal many more options and multiple ways to perform the same operation. Here are some guidelines to use as you navigate through the application: Right-clicking on an event or object will usually reveal options available for the selected item. Using the menus usually requires first selecting an item in one of the monitoring windows. The following table identifies the Alarm Monitoring menu items: Use this menu... To... File Edit View Trace Configure Control Options Window Help Open or close the application, or Change the password Select, delete, or acknowledge events Open windows duplicates the function of the toolbar. Trace a badge or component Filter alarms Manipulate the functionality of items Control the operational behavior of various windows Control the interaction of multiple windows Get information 3 13
34 Chapter 3: Monitoring Alarms The following graphic identifies each button on the Alarm Monitoring toolbar. Figure 3.14 Alarm Monitoring toolbar Traces a badge or event Opens a selected door for the strike time Acknowledges a selected event Initiates configured guard tours Opens the Scheduler Allows you to retrieve reports Displays a list of configured maps Displays a cardholder screen Provides a separate window for high priority events Displays the System Hardware Tree in the foreground Displays the Main Alarm Monitoring Window in the foreground Opens/closes the application 3 14
35 A p p e n d i x A Glossary of Terms Use this glossary as a reference and whenever you see a word in italic type, like this: timezone A 1
36 Appendix A: Glossary of Terms Terms access level An access control relationship made between a reader or readers and a time zone or time zones. An access level is assigned to a badge ID for the purpose of granting access through a reader or readers during a specified time. acknowledge access panel (Intelligent System Controller/ISC) activation/deactivation date badge badge ID badge type card format cardholder communication server credential extended unlock A circuit board with on-board memory that is responsible for making most of the decisions in an access control system. The act of taking note of an event and taking any action required. The date that a credential becomes active or expires. The credential or token that carries a cardholder s data. Part of the access control information that is encoded to a token. This information, usually numerical, is unique to a particular credential holder. Used in OnGuard to determine a number of parameters for a particular badge ID. These parameters include the activation and deactivation dates, default access groups, the applied badge design, the printer used to print the badge, the required data fields for cardholder entry, and a range of badge ID's to be used for a specific group of badges. The way that data is arranged and ordered on the card. An individual who is issued a particular credential. The server application designed to provide network services to access panels, readers, PCs and PDAs. A physical token, usually a card or fob, encoded with access control information. The extra period of time the lock will unlock when an authorized credential with extended unlock privileges is presented. A 2
37 Appendix A: Glossary of Terms facility code filtering alarms holiday input intelligent system controller (ISC) mask output PDA pending alarm reader interface module (RIM) request to exit strike time System Hardware Tree tracing events time interval Part of the access control information that can be encoded to a credential. This information, usually numerical, is unique to a group of credentials. Usually this feature is used to authenticate a credential to a particular organization. The act of refining specifically what alarms ned to be displayed on the Alarm Monitoring window. A special period of time, where the timezone is to behave differently. An exception to the normal workings of a timezone. A hardware connection point used for status reporting of a particular sensor. See access panel. Hiding or ignoring an event. An OnGuard on-board relay or switch that is configurable to follow the status of an input, system condition, or a time zone. Personal Digital Assistant. An alarm that requires acknowledgment. A circuit board that acts as the integration point for access activity at a particular opening. The RIM integrates Card Reader, Door Position, Request-to-Exit, and Lock Control activity with the ISC. A sensor usually installed on the non-secure side of the door that will mask the door position switch upon activation. See unlock duration. The screen that displays all hardware devices allowing you to directly control them. To track down when a system event occurred or to trace the activity of a badge ID, either in real time or historically. A specific range of time, which corresponds to a particular day or days of the week. A time zone can be comprised of several, individual intervals. A 3
38 Appendix A: Glossary of Terms timezone A defined range of time for assignment to various access control activities. A time zone may be applied to a reader or readers when creating an access level, to a reader to change the mode of operation, to a relay to activate and deactivate, to an input to mask and unmask, and a host of other operations. unlock duration use limit The time that the lock momentarily unlocks. A configuration limiting a credential to a defined number of uses. A 4
B.A.S.I.S. G and V Offline Setup Guide Copyright 2006 Stanley Security Solutions, Inc. and Stanley Logistics, Inc. All rights reserved. Printed in the United States of America. Information in this document
Doors.NET installation and controller configuration is a three step process. Each of these steps has its own document, with controller configuration broken into separate documents per hardware type. software
WinDSX User s Guide b This page was intentionally left blank. DSX, Our Commitment to Service Our Commitment to service is continually demonstrated through our Training Programs and Technical Support Department.
Monitoring Network DMN User Manual Table of contents Table of contents... 2 1. Product features and capabilities... 3 2. System requirements... 5 3. Getting started with the software... 5 3-1 Installation...
MaxMobile 10.5 for Windows Mobile Smartphone Welcome to MaxMobile Introduction MaxMobile 10.5 for Windows Mobile Smartphone provides you with a way to take your customer information on the road. You can
800-02577-TC 3/10 Rev. A Total Connect Online Help Guide TRADEMARKS Honeywell is a registered trademark of Honeywell International Inc. Windows and Windows Vista are trademarks, or registered trademarks
NT500 Offline Getting Started Guide Copyright 2007 Stanley Security Solutions, Inc. and Stanley Logistics, Inc. All rights reserved. Printed in the United States of America. Information in this document
Strategic Asset Tracking System User Guide Contents 1 Overview 2 Web Application 2.1 Logging In 2.2 Navigation 2.3 Assets 2.3.1 Favorites 2.3.3 Purchasing 2.3.4 User Fields 2.3.5 History 2.3.6 Import Data
Decision Support AITS University Administration Web Intelligence Rich Client 4.1 User Guide 2 P age Web Intelligence 4.1 User Guide Web Intelligence 4.1 User Guide Contents Getting Started in Web Intelligence
Installation and Operation Manual version version About this document This document is intended as a guide for installation, maintenance and troubleshooting of Portable Device Manager (PDM) and is relevant
Blackbaud FundWare Accounts Receivable Guide VOLUME 1 SETTING UP ACCOUNTS RECEIVABLE VERSION 7.50, JULY 2008 Blackbaud FundWare Accounts Receivable Guide Volume 1 USER GUIDE HISTORY Date Changes June 2000
NDA-30141 ISSUE 1 STOCK # 200893 CallCenterWorX-Enterprise IMX MAT Quick Reference Guide MAY, 2000 NEC America, Inc. LIABILITY DISCLAIMER NEC America, Inc. reserves the right to change the specifications,
Microsoft Outlook 2007 Calendar Features Participant Guide HR Training and Development For technical assistance, please call 257-1300 Copyright 2007 Microsoft Outlook 2007 Calendar Objectives After completing
Velocity Web Services Client 1.0 Installation Guide and Release Notes Copyright 2014-2015, Identiv. Last updated June 24, 2015. Overview This document provides the only information about version 1.0 of
History Explorer View and Export Logged Print Job Information WHITE PAPER Contents Overview 3 Logging Information to the System Database 4 Logging Print Job Information from BarTender Designer 4 Logging
Infoview XIR3 User Guide 1 of 20 1. WHAT IS INFOVIEW?...3 2. LOGGING IN TO INFOVIEW...4 3. NAVIGATING THE INFOVIEW ENVIRONMENT...5 3.1. Home Page... 5 3.2. The Header Panel... 5 3.3. Workspace Panel...
Event Viewer User Guide Version 1.0 September 2009 Event Viewer User Guide Issue 1.0, released September 2009 Disclaimer Copyright 2009, Grosvenor Technology. All rights reserved. JANUS and the Grosvenor
Doors.NET installation and controller configuration is a three step process. Each of these steps has its own document, with controller configuration broken into separate documents per hardware type. software
Accounting Manager User Guide A31003-P1030-U114-2-7619 Our Quality and Environmental Management Systems are implemented according to the requirements of the ISO9001 and ISO14001 standards and are certified
DVS Net (Integration) Installation and User s Guide Ver 11.10.x Digital Video Security System Digital Video Recorder www.tuniss.com PLEASE CALL TUNISS COMPUTER AT: 650-401-6138 FOR ANY QUASTIONS REGARDING
Horizon Patient Folder User s Guide - 1 - Overview St. Mary's Medical Center is embarking on a new way to view the medical record for patients on-line. This information will guide you through the Horizon
Senior Systems Cloud Services In this guide... Senior Systems Cloud Services 1 Cloud Services User Guide 2 Working In Your Cloud Environment 3 Cloud Profile Management Tool 6 How To Save Files 8 How To
LESSON 13 Managing Devices OBJECTIVES After completing this lesson, you will be able to: 1. Open System Properties. 2. Use Device Manager. 3. Understand hardware profiles. 4. Set performance options. Estimated
Hold the Ctrl key down & then left click on a link below to navigate to it: Table of Contents Overview of the Message Center Message Center Basics Working with the Message Journal Working with Documents
USING THE MODEL IQ 1000 INTELLICLOCK The IQ 1000 is an advanced model of time clock with many features and benefits designed to offer you a wide range of options in how you collect your time and attendance
CFD-FX Trading platform Software User Guide May 2006 CONTENTS Introduction........................................................1 Installing the trading platform........................................1
Mobile Android App User Guide Copyright 2012 icontrol Networks, Inc. All rights reserved. No reproduction in whole or in part without prior written approval. icontrol Networks, icontrol, and icontrol logo
User Manual for Web Help Desk Authority 9.0 2011ScriptLogic Corporation ALL RIGHTS RESERVED. ScriptLogic, the ScriptLogic logo and Point,Click,Done! are trademarks and registered trademarks of ScriptLogic
email-lead Grabber Business 2010 User Guide Copyright and Trademark Information in this documentation is subject to change without notice. The software described in this manual is furnished under a license
MyTax Illinois Help General use information... 5 Install Adobe Reader... 5 Enable Pop-ups in My Browser... 5 Determine Your Current Browser... 6 Change Browser Font Size... 6 Browsers that You Can Use...
Table of Contents INTRODUCTION...2 HOME PAGE...3 Announcements... 6 Personalize... 7 Reminders... 9 Recent Items... 11 SERVICE CATALOG...12 REQUEST...14 Request List View... 15 Creating a New Incident...
BusinessObjects Enterprise XI Release 2 InfoView User s Guide BusinessObjects Enterprise XI Release 2 Patents Trademarks Copyright Third-party contributors Business Objects owns the following U.S. patents,
Time Billing and Project Management Software Built With Your Industry Knowledge BillQuick Agent 2010 Getting Started Guide BQE Software, Inc. 2601 Airport Drive Suite 380 Torrance CA 90505 Support: (310)
Titan Security System User Manual P/N MAUSER-TITAN REV 04 ISS 27JUN13 Copyright Trademarks and patents Manufacturer Contact information 2013 UTC Fire & Security. All rights reserved. The Titan Security
March 3 rd, 2003 Information Exchange Network (IEN) System Operator Training Day 3 Final March 3 rd, 2003 IEN System Operator s Training Part 3 Operator s Training Part 3 Agenda IEN Alarm Viewer TCS and
Guide to using Cumulus software (a.k.a., the Cumulus "client") January 2012 Stanford Law School s images database is in Cumulus a digital asset manager made by Canto Software http://www.canto.com. Stanford
Novell ZENworks Asset Management 7.5 w w w. n o v e l l. c o m October 2006 USING THE WEB CONSOLE Table Of Contents Getting Started with ZENworks Asset Management Web Console... 1 How to Get Started...
Server Manager Diagnostics Page 653. Information. Audit Success. Audit Failure The view shows the total number of events in the last hour, 24 hours, 7 days, and the total. Each of these nodes can be expanded
The LSUHSC N.O. Email Archive Introduction The LSUHSC N.O. email archive permanently retains a copy of all email items sent and received by LSUHSC N.O. Academic email users. Email items will be accessible
ETS Major Field Tests Proctor Administrator Manual Updated: December 2010 Table of Contents Contents 1.0 WELCOME... 1 1.1 INTRODUCTION... 1 1.2 SYSTEM REQUIREMENTS AND SETTING-UP STUDENT WORKSTATIONS...
Microsoft Access 2010 handout Access 2010 is a relational database program you can use to create and manage large quantities of data. You can use Access to manage anything from a home inventory to a giant
University of Minnesota Voucher and Journal Imaging Guide for ImageNow 6.2 INTRODUCTION... 2 LAUNCHING IMAGENOW AND LOGGING IN... 2 IMAGENOW TOOLBAR... 3 VENDOR PAYMENT OR JOURNAL ENTRY WORKFLOW... 3 OPENING
TheFinancialEdge Fast! Guide 101811 2011 Blackbaud, Inc. This publication, or any part thereof, may not be reproduced or transmitted in any form or by any means, electronic, or mechanical, including photocopying,
Chapter Website Navigation and Database Instructions Accessing the AACN Chapter Website 2 Chapter Officer and Chapter Advisor Features 4 Chapter Database Instructions 7 o Log-In Instructions 7 o Chapter
2 CONTENTS Module One: Getting Started... 6 Opening Outlook... 6 Setting Up Outlook for the First Time... 7 Understanding the Interface...12 Using Backstage View...14 Viewing Your Inbox...15 Closing Outlook...17
1 C H A P T E R Microsoft Outlook 2013 -And- Outlook Web App (OWA) Using Office 365 1 MICROSOFT OUTLOOK 2013 AND OUTLOOK WEB ACCESS (OWA) Table of Contents Chapter 1: Signing Into the Microsoft Email System...
Xerox 700 Digital Color Press with Integrated Fiery Color Server Utilities 2008 Electronics for Imaging, Inc. The information in this publication is covered under Legal Notices for this product. 45072726
Grants Management Division Manual Grants Online Overview and System Navigation Prepared by BearingPoint, Inc. May 5, 2006 Table of Contents Table of Contents TABLE OF CONTENTS...I DOCUMENT CONVENTIONS...I
Getting Started Getting Started with Time Warner Cable Business Class Voice Manager A Guide for Administrators and Users Table of Contents Table of Contents... 2 How to Use This Guide... 3 Administrators...
Sitecore CMS 6.2 Content Author's Reference and Cookbook Rev. 091019 Sitecore CMS 6.2 Content Author's Reference and Cookbook A Conceptual Overview and Practical Guide to Using Sitecore Table of Contents
in a Network Environment 1.0 Purpose of this Document Doors is designed for use in stand-alone computer applications; no network functionality has been built into the program. However, with the prevalence
ACS CLIENT SOFTWARE USER MANUAL 1 ACS USER GUIDE 1.1 System Requirement Recommended System Requirement OS CPU VGA RAM HDD WindowXP, Vista Pentium 4, 2Ghz 1024*768, 64MB 24bit color graphic card 1GB 20MB
Table of Contents INTRODUCTION... 2 HOME PAGE... 3 Announcements... 7 Personalize & Change Password... 8 Reminders... 9 SERVICE CATALOG... 11 Raising a Service Request... 12 Edit the Service Request...
All Rights Reserved Copyright 2006 The use, disclosure, modification, transfer, or transmittal of this work for any purpose, in any form, or by any means, without the written permission of the copyright
Time & Attendance Supervisor Basics for ADP Workforce Now Automatic Data Processing, LLC ES Canada ADP s Trademarks The ADP Logo, ADP, ADP Workforce Now and IN THE BUSINESS OF YOUR SUCCESS are registered
Exercise Safe Commands and Audit Trail Table of Contents Exercise 1: Secure Objects with Safe Commands...2 Exercise 2: Record User Actions in the Audit Trail... 13 3.1 Setting up the SQL Server for Audit
Manual Password Depot Server 8 Table of Contents Introduction 4 Installation and running 6 Installation as Windows service or as Windows application... 6 Control Panel... 6 Control Panel 8 Control Panel...
First Time On-Campus Remote Desktop Connection ipad Edition General: This guide is a step-by-step guide for configuring and using an ipad to remotely connect to a work computer from on campus. This guide
Ross Video Limited DashBoard Server and User Rights Management User Manual DashBoard Server and User Rights Management User Manual Ross Part Number: 8351DR-004A-01 Release Date: March 22, 2011. Printed
CERT/Software Engineering Institute June 2016 http://www.sei.cmu.edu Table of Contents Welcome to STEPfwd! 3 Becoming a Registered User of STEPfwd 4 Learning the Home Page Layout 5 Understanding My View
Outlook 2010 Essentials Training Manual SD35 Langley Page 1 TABLE OF CONTENTS Module One: Opening and Logging in to Outlook...1 Opening Outlook... 1 Understanding the Interface... 2 Using Backstage View...
PRACTICE CS Time & Expense Entry WalkThrough Version 2014.x.x TL 27573a (01/16/2015) Copyright Information Text copyright 2004-2015 by Thomson Reuters. All rights reserved. Video display images copyright
PowerSchool 7.x Student Information System Released December 2011 Document Owner: Documentation Services This edition applies to Release 7.1 of the [product name] software and to all subsequent releases
WHAT IS VIRTUAL DESKTOP? Virtual Desktop is an online environment that allows you to access NSF applications and a virtual desktop that mimics a Windows 7 environment. You can use Virtual Desktop to use
Raptor K30 Gaming Software User Guide Revision 1.0 Copyright 2013, Corsair Components, Inc. All Rights Reserved. Corsair, the Sails logo, and Vengeance are registered trademarks of Corsair in the United
BusinessObjects Enterprise InfoView User's Guide BusinessObjects Enterprise XI 3.1 Copyright 2009 SAP BusinessObjects. All rights reserved. SAP BusinessObjects and its logos, BusinessObjects, Crystal Reports,
Smart Web User Guide Amcom Software, Inc. Copyright Version 4.0 Copyright 2003-2005 Amcom Software, Inc. All Rights Reserved. Information in this document is subject to change without notice. The software
Scheduling Software User s Guide Revision 1.12 Copyright notice VisualTime is a trademark of Visualtime Corporation. Microsoft Outlook, Active Directory, SQL Server and Exchange are trademarks of Microsoft
Retail Service User Guide. Page 2 of 81 Table of Contents WELCOME TO REVEL SYSTEMS RETAIL SERVICE... 5 STARTING YOUR WORK... 6 Logging In to Your POS... 7 Refreshing the POS Settings... 8 Clocking In and
Alarm Monitoring is a BASIS application designed for the monitoring of Access Control devices, their status and usage. It can be used to check if a device is having problems, if there is an alarm, such
29200 Northwestern Hwy Suite 350 Southfield, MI 48034 1-866-4WINSPC winspc.com 2016 DataNet Quality Systems. All rights reserved. WinSPC is a registered trademark of DataNet Quality Systems. Document Version:
Contact Manager and Document Tracking CampusVue Student User Guide Campus Management Corporation Web Site http://www.campusmanagement.com/ E-mail Information: Support: E-mail form on Web site email@example.com
R Impact Call PC call001 Impact Call User s Guide Comdial strives to design the features in our communications systems to be fully interactive with one another. However, this is not always possible, as
June 9, 2014 Outlook Web Access (OWA) 2010 Email Cheat Sheet Outlook Web Access 2010 allows you to gain access to your messages, calendars, contacts, tasks and public folders from any computer with internet
Chapter 2: Clients, charts of accounts, and bank accounts Most operations in BankLink Practice are client specific. These include all work on coding transactions, reporting, and maintaining chart of accounts
16.3.2 Lab: Configure Windows XP Firewall Print and complete this lab. In this lab you will explore the Windows XP Firewall and configure some advanced settings. Recommended Equipment Two computers directly
OWA - Outlook Web App Olathe Public Schools 0 Page MS Outlook Web App OPS Technology Department Last Revised: May 1, 2011 Table of Contents MS Outlook Web App... 1 How to Access the MS Outlook Web App...
APPLICATION NOTE Contents The DMP Software Family... 1 Stand-Alone Link Software... 1 Add-on Modules for Link Software... 1 System Link End-User Panel Management Software... 2 Simple Registration and Activation...
Quest ChangeAuditor FOR WINDOWS FILE SERVERS 5.1 User Guide Copyright Quest Software, Inc. 2010. All rights reserved. This guide contains proprietary information protected by copyright. The software described
QuickBooks Business Accounting Software 2007 2009 for Windows Account Conversion Instructions Converting from Direct Connect to Web Connect As your financial institution completes its system conversion,