2 Guide Contents Dear Milestone Customer, With the purchase of Milestone XProtect Central you have chosen a very powerful central monitoring solution, providing instant overview of any number of Milestone XProtect Corporate, XProtect Enterprise or XProtect Professional installations throughout your organization whether near or far. This Getting Started Guide is aimed at system administrators only. It briefly explains the steps involved in installing Milestone XProtect Central (hereafter simply referred to as Central) as well as how to configure some of its key features. For more detailed descriptions, please refer to the manuals available on the Central software DVD as well as on When installed, Central furthermore features a comprehensive help system. Please check for updates to make sure you install the most recent version of our software. Guide Contents Install the Central Server... 2 Install and Log In to the Central Client... 4 Structure of the Central Client Window... 5 Obtain Central License Key... 6 Specify Central License Key in Central Client... 7 Define Servers... 7 Define Users & Roles... 9 Define Alarms Define Maps Ready for Use Built-in Help System
3 Install the Central Server Central is client/server-based. The Central Server receives event and status information from your surveillance system installations, and presents it for operators connected through Central Clients. Begin by installing the Central Server. Once installed, the Central Server will run in the background. You then install a Central Client and perform the remaining configuration through the Central Client. Prerequisites Read the License Terms on the Product License Sheet (enclosed with the Central software DVD) before installing any part of Central. Make sure IIS (Internet Information Services) is installed on the computer on which Central Server will be installed. Make sure.net 3.5 Framework SP1 is installed on the computer on which the Central Server will be installed. If you are going to use your Central solution for connecting to XProtect Enterprise surveillance systems, it is highly recommended that you use XProtect Enterprise version 5.6c or later. If you are going to use your Central solution for connecting to XProtect Professional surveillance systems, it is highly recommended that you use XProtect Professional version 6.5b or later. Installing the Central Server on a computer Running Microsoft Windows Vista A special procedure applies for installation on a Microsoft Windows Vista computer; please refer to the Central Administrator s Manual. If Upgrading from XProtect Central Version 3.5 If you are upgrading from Central version 3.5, you can reuse your existing database of alarms. You will thus be able to view, and work with, alarms from Central 3.5 in Central 3.7, provided you note the following: 2
4 When you remove the Central 3.5 server software, make sure you do not remove the Microsoft SQL Server Desktop Engine used as the database in Central 3.5. Then, when you install Central 3.7, new fields will be added to the database, allowing its content to be used with Central 3.7. Your configuration from Central 3.5 will then work in Central 3.7 too. Installation Procedure 1. Insert the Central software DVD. On the DVD, click the Central Server installation link. After a short while, the Milestone XProtect Central Server Setup window will open. If you are installing a version downloaded from the internet, run the CentralServerInstaller.exe file from the location you have saved it to. Read the license terms, then click the Agree button. 2. Specify information in the following fields: Software License Code (SLC): Type your Software License Code; it is printed on the Product License Sheet enclosed with your Central software DVD. Database password for : Optional. If required, specify a password to be used when accessing Central s database. Database location: Optional. Select a location for the database, or simply leave the field blank to use Central s default location. Server Web Site (IIS defined): Specify required server web site. If no special site/port is required, simply select Default Web Site, port=80. When ready, click the Install button. 3. On the following installation steps, Microsoft SQL Server Desktop Engine, Milestone XProtect Central Server and Milestone XProtect Central Internet Information Service (IIS) will automatically be installed. Wizard windows may occasionally prompt you to select installation folders. 4. When the installation process is complete; click the Close button. 3
5 Install and Log In to the Central Client 1. Insert the Central software DVD. On the DVD, click the Central Client installation link. After a short while, the Milestone XProtect Central Client Setup Wizard will open. If you are installing a version downloaded from the internet, run the CentralClientInstaller.exe file from the location you have saved it to. 2. On the wizard s first page, click Next and follow the installation wizard. 3. Once the Central Client is installed, you are able to log in. Double-click the Central Client shortcut on your desktop, or select Milestone XProtect Central Client from Windows Start menu. 4. In the login window s Connect To field, type or select the name or IP address of the Central Server. The server name or IP address may include a port number (example: :80). Tip: If you want to avoid having to type or select the name/ip address of the server the next time you log in, select the Connect automatically box. If you wish to be able to select between several servers, however, do not select the Connect automatically box. Click OK to log in with your active Windows account. If you wish to log in with a different Windows account, click the login window s Options >> button, and specify the required user name, password and domain, then click OK. 5. The Milestone XProtect Central Client window opens, allowing you to configure your Central solution. 4
6 Structure of the Central Client Window The Central Client window is divided into four main sections (most of which will be empty until you have configured your Central solution): Alarm Overview Section When defined events are detected on defined surveillance systems, alarm information will appear in the Central Client s Alarm Overview section. From the Alarm Overview section, operators are able to view further information about individual alarms, including recordings of incidents. Operators are also able to sort and filter alarms, change the state of alarms (for example from New to Resolved), assign alarms to other users, etc. Navigation Section The Navigation section s content depends upon user rights: System administrators use the Navigation section for configuring a wide range of Central features. Users with nonadministrator roles primarily use the Navigation section for an overview of available servers, cameras and other devices. Map Section The Map section is used for displaying visual representations, such as street plans, building plans, photographs, etc. Indicators representing servers, cameras, etc. can easily be placed on maps, allowing operators to quickly pair alarms with the exact physical locations of your surveillance system installations. The indicators will change color according to the operational state of servers/devices. Indicators will also show if 5
7 new alarms are present. The Map section is thus an important visually oriented supplement to the Alarm Overview list. You are able to use any number of maps, and place them in any number of hierarchies according to your needs. Information Section The Information section features three tabs: The first two tabs let operators view detailed information about a selected server or a selected device (e.g. a camera); the third tab displays preview thumbnail images from the latest alarms. Simplifying the Client User Interface If required, administrators are able to simplify the Central Client user interface. This can occasionally be relevant, for example if certain operators only use their Clients for simple verification purposes, see the Central Administrator s Manual. Obtain Central License Key You must obtain a Central license key from Milestone before you can configure your Central solution. The Central license key determines the number of surveillance servers you are able to include in your Central solution. 1. Go to the Milestone website at click the Login link, select Software Registration, and log in to the online registration system. If you do not have a login, click the New To The System? link, and follow the instructions. When ready, log in using the registered address and password. 2. If you have not yet registered your SLC (Software License Code; listed on your Product License Sheet), do so by clicking the Add SLC link and completing the SLC registration steps before proceeding. When ready, click the link representing the SLC. 3. Click the Add new MAC link and specify the MAC address of the computer running the Central Server. 6
8 The MAC address is a 12 digit hexadecimal (example: AF). Tip: To find the MAC address of a Windows XP computer, click Start, select Run, then type cmd in the text box and click OK. In the command prompt window, type ipconfig/all and press ENTER. The 12- digit Physical Address is the computer s MAC address. 4. Click Submit. The computer is added to the list of devices under the SLC in question. 5. Click the Go to SLC details link. 6. Click the Get License Keys by link to have the Central license key ed to you. Alternatively, simply copy the Central license key from the table s License Key column. Specify Central License Key in Central Client 1. Go to the Central Client window s Navigation section, expand the Settings entry, right-click License Registration, and select Edit License Registration... This will open the License Registration dialog: The Server MAC address and Software license key fields will be pre-filled. 2. In the Central license key field, type/paste your Central license key. 3. Click OK. Define Servers Next, define each XProtect Corporate, XProtect Enterprise or XProtect Professional server you want to include in your Central solution. When you define a server, information about cameras and other devices connected to the server (including I/O devices, manually triggered events, VMD events, generic events, and custom events) automatically becomes available in Central. 7
9 1. In the Central Client s Navigation section, right-click the Servers entry, and select New... This will open the Server Connection dialog. 2. In the Server address field, specify the required server s IP address or hostname. In the Server type field, select whether the server is an XProtect Enterprise (incl. XProtect Professional) or an XProtect Corporate server. 3. In the Authentication: Central / Status API section, specify the Port, User name and Password to be used for communication between the server and Central. If connecting to an XProtect Enterprise or XProtect Professional server: The information in the fields Port (default port number is 1237), User name, and Password must match exactly what has been specified in XProtect Enterprise s or XProtect Professional s Management/Administrator application. Tip: If in doubt about how to verify this, see the Central Administrator s Manual. If connecting to an XProtect Corporate server: Default port number is 80. Fill in the User name and Password fields as follows: If you have administrator rights on the XProtect Corporate Management Server in question, type the user name and password you normally use when logging in to the XProtect Corporate Management Server. If you do not have administrator rights on the server in question, contact the server s administrator for the user name and password of a user who has either administrator rights or a role with Application Security Rights to use the Status API. 4. Relevant only if connecting to an XProtect Enterprise or XProtect Professional server: A connection to the XProtect Enterprise/XProtect Professional server s Image Server service is required in order to view recorded and live video as well as still images in Central. In the Authentication: Image Server section, specify Port, User name, and Password. 8
10 Default port number is 80. The user name and password must belong to a real or pseudo user account which has been defined through XProtect Enterprise/XProtect Professional. The account in question must have access to all cameras on the required server. Note that if XProtect Enterprise/XProtect Professional will be accessed from the internet via a router or firewall, Internet Access (in older versions called Outside Access) must be enabled in XProtect Enterprise/XProtect Professional. 5. Optional: If wishing to log all registered events on the server in a log file stored on the Central Server, select Enabled in the Event logging section. Event logging allows you to see which events are generated on the server, and hence which events may be relevant to use for triggering alarms in Central. 6. When ready, click the Save button to save the server definition. Your server definition will now be listed in the Central Client s Navigation section. Later you will be able to drag indicators representing the server, its cameras, etc. from the Navigation section s list onto maps in the Central Client s Map section. Repeat steps 1-6 if more servers are required. Tip: Central is able to handle master/slave setups as well. See the Central Administrator s Manual on the Central software DVD for more information. Define Users & Roles Now define Central users and their roles. Roles determine the users rights. Central users are primarily imported from Active Directory; a distributed directory service included with several Windows Server operating systems. Importing users from Active Directory means that you do not have to create any user accounts or user authentication all anew in Central. Active Directory also allows you to import groups of users in one go; see the Central Administrator s Manual. 9
11 If your organization does not use Active Directory service, you are of course still able to import users into Central; see the Central Administrator s Manual for information. Import Users To import users from Active Directory, do the following: In the Central Client s Navigation section, expand the User Configuration entry and right-click Users. 2. Select Import from Active Directory... This will open the Import Users and Groups dialog. 3. Click the Add button to open the Select Users or Groups dialog. 4. Verify that the required domain is specified in the From this location field. If not, click the Locations... button to browse for the required domain. 5. In the Enter the object names to select box, type the required user names. Use the Check Names feature to verify that the names you have entered are recognized by Active Directory. 6. Click OK. You are returned to the Import Users and Groups dialog, in which the required users will now be listed. 7. Click OK. The required users will be imported into Central. Upon import, the names of the imported users will be added under Users in the Central Client s Navigation section. Create Roles As the administrator configuring Central, you are logged in with Central s default administrator role, called admin. This role gives you access to the full set of features, including the ability to create other roles on Central, for example for security staff and other operators. Users with such other roles will not have access to any of the configuration features reserved for the admin role. Note that users who have local administrator rights on the computer on which the Central Server is installed will always be able to use Central with the rights of the administrator role.
12 1. In the Central Client s Navigation section, select User Configuration, right-click Roles and select New... This will open the Role Definition dialog. 2. Specify a name for the new role in the Role name field. 3. In the dialog s Function access section, select the Central Client features to which users with the new role should have access: Alarm management: The right to manage alarms, i.e. detected events Operational acknowledgement: The right to acknowledge and temporarily snooze operational status information View video: The right to view recorded video, live video and single preview images Multiple alarm change: Requires that Alarm management is also selected. The right to change the state of multiple selected alarms simultaneously. Bookmark management: Requires that Alarm management is also selected. The right to manage bookmarks (selected individual images from exact times within a video sequence). 4. In the dialog s Camera access section, specify the cameras and any other devices to which users with the new role should have access. 5. Relevant only if plugins are used for connecting Central to third-party systems: If plugins are used on your system, the Role Definition dialog will contain an extra section called Other device access. From this section, you are able to select third party systems to which users with the role should have access. 6. When ready, click the Save button to save the new role definition. Repeat if more roles are required. Add Users to Roles 11
13 12 1. In the Central Client s Navigation section, select User Configuration, then Users. 2. Right-click the required user name, select Add user to role, then select the required role. Define Alarms When specific events are detected on one of the defined surveillance system servers, they will trigger alarms in Central. You must now create so-called alarm definitions, which will determine which events should trigger which alarms. By default, your alarm definitions will always be enabled, i.e. they will be active all the time. If you require some or all of your alarm definitions to be enabled at certain times only, right-click Alarm time profiles in the Client s Navigation section, and define the required periods of time before you complete the steps below. 1. In the Central Client s Navigation section, right-click Alarm definitions, then select New Alarm... This will open the Alarm Definition dialog. 2. Type a name for the alarm in the Name field. 3. Optionally, type a description text in the Description field. Description texts can be used to include a list of actions which operators must complete if the alarm occurs. 4. In the Event message list, select the event which should be used to trigger the alarm. Tip: Among the options on the list you will see External Event. This represents any event not directly related to a camera or server, for example input from buttons, sensors, etc. Note: Some events will only work with particular surveillance systems (e.g. XProtect Corporate). 5. In the Sources list, select which servers, cameras or other devices the event should originate from in order to trigger the alarm. Your options depend upon which type of event you have selected in the Event message list. Examples:
14 If your alarm is based on an event like Server Not Responding, only servers will be available for selection in the Sources list. You can either select individual servers, or all servers in one go (by selecting the All servers box). If your alarm is based on a camera-related event like Motion Detected, cameras become selectable. You can select individual cameras under a specific server, select all cameras under a server in one go (by selecting the All sources box under the required server), or even select all cameras under all servers in one go (by selecting the All cameras box). If your alarm is based on an event like External Event (i.e. on input from buttons, sensors, external data streams, etc.), inputs defined on the servers become selectable. You can select individual inputs or some/all inputs in one go. 6. Optionally, select one or more cameras in the Related cameras list. The Related cameras list allows you to select cameras for inclusion in the alarm definition even though they are not themselves triggering the alarm. This can be relevant, for example, if you have selected an external event (such as a door detector registering that a door is being opened) as the Source for your alarm. By defining one or more cameras located near the door as Related cameras, you are able to include the cameras recordings of the door area in the alarm. Also, if the camera triggering the alarm is unable to provide images, the alarm will use images from the devices specified in Related cameras. 7. In the Enabled section, select when the alarm should be enabled for triggering in Central. If you have defined one or more time profiles, they will be selectable from the list; otherwise select Always. 8. In the Alarm priority list, select a priority for the alarm. Priorities can be used for sorting purposes. 13
15 9. In the Owner list, select whether a particular user should be responsible for the alarm, or whether it should be shared by all users. Note that because user access rights may vary, users in the list may vary depending on your selection in the Sources list. 10. The Actions section in the lower part of the window lets you define a number of optional actions: Trigger an event: Lets you select if one or more surveillance system events should be triggered by the alarm. Auto close alarm on: Lets you select if the alarm should automatically switch to Closed state upon a particular event. This is possible for alarms triggered by some (but not all) events. For example, if your alarm is triggered by a Not Responding camera, the alarm can be closed automatically when the camera is Responding. Video destination: If video destinations (settings related to integration of alarms with Milestone XProtect Matrix; see more in the Central Administrator s Manual) have been defined, you are able to select a destination to which live video will automatically be sent when the alarm occurs. You can only select a video destination if you have defined one or more cameras among the alarm s Sources and/or Related cameras. Start video viewing: Lets you control how recorded video of incidents will be presented to users. By specifying a number of seconds in the field, you can make the displayed video sequence start a number of seconds before the triggering event took place. This allows operators and other personnel to also view what took place prior to an alarm. Use of this feature requires that recorded video from before the event will actually be available, for example because the required camera always records, or because pre-buffering is used for the camera in question. 14
16 Viewing image quality: Determines the quality of video played back in connection with the alarm definition in question, but also affects bandwidth usage. If the Central Client is used over the internet, over a slow network connection, or if for other reasons you need to limit bandwidth use, image quality can be reduced on the server side by selecting e.g. Low or Medium. Viewing frame rate: Lets you select a frame rate for video played back in connection with the alarm definition in question. 11. When ready, click OK to save your alarm definition. Repeat for each required alarm definition. Define Maps Maps are the visual representations of your surveillance system installations, displayed in the Central Client s Map section. Map information is stored on the Central Server, and is thus accessible by all Central Clients. Load Map Background Images Before you can use a background image, such as a building plan or a photograph, in a map, the background image must be loaded onto the Central Server: 1. In the Central Client s Navigation section, right-click Maps, then select Edit Map Settings... This will open the Map Settings dialog. 2. Click the dialog s Load New... button. Locate and select the required background image, then click the Open button. This will load the background image onto the server. Repeat if more background images are required. Define a New Map 1. In the Central Client s Navigation section, expand Maps, right-click the second-level map entry, then select New Map... This will open the Map Setup dialog. 15
17 2. Type a name for the new map in the Map name field. 3. Select a background to be used in the map. You can either use a simple background color or an imported background image. 4. Click the Save button. Your new map will appear in the Navigation section. Repeat if more maps are required. Place Indicators on Maps To place indicators representing servers, cameras, etc. on a map, select the required map in the Navigation section, make sure the Lock check box at the bottom of the Navigation section is cleared, then simply drag the required servers, cameras, etc. from the Navigation section onto the required map in the Map section. Indicators will change color according to the operational state of the devices they represent. Indicators will also show if new alarms are present on devices. For a complete overview of indicators, including their possible colors, animations, etc., see the Central Administrator s Manual. Ready for Use Although you are still able to define further settings, such as logging, etc. (see the Central Administrator s Manual), your Central solution is now essentially ready for use. Before you install Central Client software on operators computers and show operators how to log in, it is highly recommended that you create a backup copy of your configuration. Detailed descriptions of day-to-day use of the Central Client, including how to handle incoming alarms, are available in the Central Administrator s Manual as well as the operator-targeted Central User s Manual. Both manuals are available on the Central software DVD. 16
18 Built-in Help System When using the Central Client, simply press F1 on your keyboard to open its built-in help system. 17
IEI emerge and Milestone Systems Network Video Recorder Setup and Integration Guide Milestone Version 6.5 and emerge Version 3.2 and above CONTENTS Requirements for Milestone NVR/IEI emerge Integration...
Creating client-server setup with multiple clients Coffalyser.Net uses a SQL client server database model to store all project/experiment- related data. The client-server model has one main application
QUANTIFY INSTALLATION GUIDE Thank you for putting your trust in Avontus! This guide reviews the process of installing Quantify software. For Quantify system requirement information, please refer to the
Notes: STATISTICA VERSION 10 STATISTICA ENTERPRISE SERVER INSTALLATION INSTRUCTIONS 1. The installation of the STATISTICA Enterprise Server entails two parts: a) a server installation, and b) workstation
Installation Instruction STATISTICA Enterprise Small Business Notes: ❶ The installation of STATISTICA Enterprise Small Business entails two parts: a) a server installation, and b) workstation installations
Magaya Software Installation Guide MAGAYA SOFTWARE INSTALLATION GUIDE INTRODUCTION Introduction This installation guide explains the system requirements for installing any Magaya software, the steps to
STATISTICA VERSION 12 STATISTICA ENTERPRISE SMALL BUSINESS INSTALLATION INSTRUCTIONS Notes 1. The installation of STATISTICA Enterprise Small Business entails two parts: a) a server installation, and b)
IEI emerge and On-Net Surveillance Systems (OnSSI) Network Video Recorder Setup and Integration Guide OnSSI Version 6.5 and IEI emerge Version 3.2 and above CONTENTS Requirements for OnSSI NVR/IEI emerge
Dear ONSSI Customer, With the purchase of ONSSI NetDVMS you have chosen an extremely powerful and intelligent surveillance solution. This Getting Started Administrator Guide will explain how to install
Avigilon Control Center Server User Guide Version 4.10 PDF-SERVER-D-Rev1 Copyright 2011 Avigilon. All rights reserved. The information presented is subject to change without notice. No copying, distribution,
Central Management System Software Installation Guide Ver. 188.8.131.52115.001 ... ii System Introduction... 3 Client/Server Architecture...3 System Requirements... 4 System Setup...4 Multiple Monitor Configuration...5
Milestone Systems XProtect Smart Client 7.0 Contents FIRST TIME USE... 12 INSTALL THE XPROTECT SMART CLIENT... 12 Install from the surveillance server... 12 Install from a DVD... 12 THE LOG-IN PROCESS...
Clarios Technology Pty. Ltd. Intelligent Reporter Installation Guide Installing Intelligent Reports JIRA plugin The Intelligent Reports plugin for JIRA is available through the Atlassian Marketplace. Follow
Notes: STATISTICA VERSION 9 STATISTICA ENTERPRISE INSTALLATION INSTRUCTIONS FOR USE WITH TERMINAL SERVER 1. These instructions focus on installation on Windows Terminal Server (WTS), but are applicable
Milestone Systems Software Manager 1.5 Contents INTRODUCTION... 4 PREREQUISITES... 5 SUPPORTED OPERATING SYSTEMS... 5 PREREQUISITES FOR ALL REMOTE SERVERS... 5 IMPORTANT INFORMATION... 5 VERSION SPECIFIC
Milestone XProtect Corporate 3.1 Step-by-Step Guide How to Back Up, Move and Restore the Management Server This guide is relevant if you want to move an XProtect Corporate Management Server installation
Pro Surveillance System 4.0 Quick Start Reference Guide 1 Table of Contents 1) Overview 3 2) Initial Setup Adding a Connection..4 3) Viewing Live Cameras...6 4) Single or Multi Channel Playback..8 5) Predetermined
User Manual Onsight Management Suite Version 5.1 Another Innovation by Librestream Doc #: 400075-06 May 2012 Information in this document is subject to change without notice. Reproduction in any manner
Microsoft XP Professional Remote Desktop Connection With Remote Desktop, you get full, secure access to your work computer via an Internet or network connection. For example, you can connect to your office
StruxureWare Power Monitoring 7.0.1 Installation Guide 7EN02-0308-01 07/2012 Contents Safety information 5 Introduction 7 Summary of topics in this guide 7 Supported operating systems and SQL Server editions
Introduction EASYLABEL 6 has several new features for saving the history of label formats. This history can include information about when label formats were edited and printed. In order to save this history,
Installation Guide Lenel OnGuard 2009 Installation Guide, product version 6.3. This guide is item number DOC-110, revision 1.038, May 2009 Copyright 1992-2009 Lenel Systems International, Inc. Information
Table of Contents Chapter 1. User Interface Overview...5 Chapter 2. Installation...6 2.1 Beginning Installation...6 2.2 Starting the CMS software...10 2.3 Starting it from the Start menu...10 2.4 Starting
milestone XProtect Basis+ 6.5 Administrator s Manual Target Audience for this Document This document covers Milestone XProtect Basis+ from a surveillance system administrator s perspective. It is solely
Hosting Users Guide 2011 eofficemgr technology support for small business Celebrating a decade of providing innovative cloud computing services to small business. Table of Contents Overview... 3 Configure
BSDI Advanced Fitness & Wellness Software 6 Kellie Ct. Califon, NJ 07830 http://www.bsdi.cc SOFTWARE BACKUP/RESTORE INSTRUCTION SHEET This document will outline the steps necessary to take configure the
SOS Online Backup USER MANUAL HOW TO INSTALL THE SOFTWARE 1. Download the software from the website: http://www.sosonlinebackup.com/download_the_software.htm 2. Click Run to install when promoted, or alternatively,
XProtect Corporate 4.1 Administrator s Manual Target Audience for this Document This document is aimed at surveillance system administrators installing and/or managing an XProtect Corporate surveillance
Avigilon Control Center 5 System Integration Guide Video and Event Viewer for Lenel OnGuard 2013-2015, Avigilon Corporation. All rights reserved. AVIGILON, the AVIGILON logo, ACC and AVIGILON CONTROL CENTER
White paper Milestone Federated Architecture TM Prepared by: John Rasmussen, Senior Technical Product Manager, Corporate Business Unit, Milestone Systems Date: June 22, 2015 Table of Contents Introduction...
Milestone Systems White Paper Milestone Federated Architecture TM Prepared by: John Rasmussen, Product Manager, Milestone XProtect Corporate Milestone Systems 30 November 2010 Page 1 of 15 Table of Contents
Intel Unite Solution Standalone User Guide Legal Disclaimers & Copyrights All information provided here is subject to change without notice. Contact your Intel representative to obtain the latest Intel
Quick Start Guide DocuSign Retrieve 3.2.2 Published April 2015 Overview DocuSign Retrieve is a windows-based tool that "retrieves" envelopes, documents, and data from DocuSign for use in external systems.
Milestone Systems XProtect Advanced Started Guide Contents ABOUT THIS GUIDE... 5 PRODUCT OVERVIEW... 6 ABOUT LICENSES... 7 SYSTEM REQUIREMENTS... 8 INSTALLATION OVERVIEW... 9 INSTALLATION PRECONDITIONS...
Using LifeSize systems with Microsoft Office Communications Server 2007 This technical note describes the steps to integrate a LifeSize video communications device with Microsoft Office Communication Server
Quick-Start Guide SUPER DVR MONITORING SOFTWARE Remote Surveillance & Playback For use on Q-See s QSDT series of PC Securitiy Surveillance Cards 2 CONFIGURING ROUTER FOR REMOTE ACCESS REMOTE SURVEILLANCE
NAS 107 Introduction to Control Center Perform basic management on your NAS using Control Center A S U S T O R C O L L E G E COURSE OBJECTIVES Upon completion of this course you should be able to: 1. Use
SyAM Management Utilities and Non-Admin Domain Users Some features of SyAM Management Utilities, including Client Deployment and Third Party Software Deployment, require authentication credentials with
Moving the TRITON Reporting Databases Topic 50530 Web, Data, and Email Security Versions 7.7.x, 7.8.x Updated 06-Nov-2013 If you need to move your Microsoft SQL Server database to a new location (directory,
Installation Guide Lenel OnGuard 2010 Installation Guide, product version 6.4. This guide is item number DOC-110, revision 1.045, May 2010 Copyright 1995-2010 Lenel Systems International, Inc. Information
How To Install SQL Server 2014 Express Edition Updated: 2/4/2016 2016 Shelby Systems, Inc. All Rights Reserved Other brand and product names are trademarks or registered trademarks of the respective holders.
Getting Started with MozyPro Online Backup Online Software from Time Warner Cable Business Class A Guide for Users MozyPro is an online backup service with an easy to use interface so you can start backing
NF5 VOIP Setup Guide (for Generic) Configuring your NF5 for VOIP Service The following steps will take you through the process of setting up your VOIP connection. Step 1: Checking Computer Network Settings:
RBackup Server Installation and Setup Instructions and Worksheet Fill out the Installation Worksheet. (In this document) Read and comply with Installation Prerequisites (In this document) Review the Partner
Allworx OfficeSafe Operations Guide Release 6.0 No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, photocopy,
ilaw Installation Procedure This guide will provide a reference for a full installation of ilaw Case Management Software. Contents ilaw Overview How ilaw works Installing ilaw Server on a PC Installing
Xerox econcierge Account Setup Guide Xerox econcierge Account Setup Guide The free Xerox econcierge service provides the quickest, easiest way for your customers to order printer supplies for all their
User Guide for OpenDrive Application v184.108.40.206 for MS Windows Platform 20150430 April 2015 Table of Contents Installation 4 Standard Installation Unattended Installation Installation (cont.) 5 Unattended
Microsoft Corporation Project Server 2010 Installation Guide Office Asia Team 11/4/2010 Table of Contents 1. Prepare the Server... 2 1.1 Install KB979917 on Windows Server... 2 1.2 Creating users and groups
MadCap Software Upgrading Guide Pulse Copyright 2014 MadCap Software. All rights reserved. Information in this document is subject to change without notice. The software described in this document is furnished
CHAPTER 7 E-Map Application E-Map displays the monitoring area on an electronic map, by which the operator can easily locate the cameras, sensors and alarms triggered by motion or I/O devices. Topics discussed
How do I resolve issues with a Client not connecting to the Best Practice server instance? This FAQ is intended to answer common questions about resolving issues with a Best Practice client not connecting
Software License Renewal Instructions SAS 9.3 Foundation for Microsoft Windows Note: In this document, references to Microsoft Windows or Windows include Microsoft Windows for x64. SAS software is licensed
Using Avaya Flare Experience for Windows Release 9.0 Issue 02.01 September 2013 Contents Chapter 1: About Flare Experience... 5 About Flare Experience... 5 Main window... 6 Button descriptions... 10 Chapter
ACTIVE DIRECTORY DEPLOYMENT CASAS Technical Support 800.255.1036 2009 Comprehensive Adult Student Assessment Systems. All rights reserved. Version 031809 CONTENTS 1. INTRODUCTION... 1 1.1 LAN PREREQUISITES...
Browser Client is a web-based application that allows users to point their browser at a URL and view live video from a set of Intellex units. Browser Client 2.0 is compatible with Intellex 3.2 software.
Hardware, Software & System Requirements for SQL Server 2008 R2 Express Edition To get the overview of SQL Server 2008 R2 Express Edition, click here. Please refer links given below for all the details
Manual Password Depot Server 8 Table of Contents Introduction 4 Installation and running 6 Installation as Windows service or as Windows application... 6 Control Panel... 6 Control Panel 8 Control Panel...
Installation Guide DOCSVAULT Document Management System for everyone 9 v Desktop and Web Client v On Premises Solution v Intelligent Data Capture v Email Automation v Workflow & Record Retention Installing
Alarm Client Installation and User Guide NEC NEC Infrontia Corporation July 2008 NDA-30364, Revision 8 Liability Disclaimer NEC Infrontia Corporation reserves the right to change the specifications, functions,
October, 2015 Install/Uninstall Xerox Print Drivers & Apps Best Practices for Windows 8, 8.1, and 10 Customer Tip 2015 Xerox Corporation. All rights reserved. Xerox, Xerox and Design, ColorQube, and WorkCentre
Mobility with Eye-Fi Scanning Guide Scan and Transfer Images Wirelessly with Eye-Fi This document is to be used in addition to the scanner s user guide located on the installation disc. The instructions
Getting Started with Microsoft Office Live Meeting Published October 2007 Information in this document, including URL and other Internet Web site references, is subject to change without notice. Unless
Contents For Administrators... 3 Set up SourceAnywhere... 3 SourceAnywhere Service Configurator... 3 Start Service... 3 IP & Port... 3 SQL Connection... 4 SourceAnywhere Server Manager... 4 Add User...
Getting Started with Microsoft Office Live Meeting Published October 2007 Last Update: August 2009 Information in this document, including URL and other Internet Web site references, is subject to change
En Configuring the WT-4 for ftp (Ad-hoc Mode) Windows XP Introduction This document provides basic instructions on configuring the WT-4 wireless transmitter and a Windows XP Professional SP2 ftp server
OneStop Reporting 3.7 Installation Guide Updated: 2013-01-31 Copyright OneStop Reporting AS www.onestopreporting.com Table of Contents System Requirements... 1 Obtaining the Software... 2 Obtaining Your
Setup and configuration for Intelicode SQL Server Express Due to overwhelming demand and the increased load on support, we are providing a complete SQL Server installation walkthrough document. SQL Server
idvr-pro Viewer Software for Mac User Manual ver 0.1 1 Contents 1. Introduction... Error! Bookmark not defined. 1.1 Summary... Error! Bookmark not defined. 2. Install... Error! Bookmark not defined. 2.1
Networking Best Practices Guide Version 6.5 Summer 2010 Copyright: 2010, CCH, a Wolters Kluwer business. All rights reserved. Material in this publication may not be reproduced or transmitted in any form
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the product, please review the readme files,