S-IMS-A Intelli-M Access Essentials V4.0 Installation and User Guide
|
|
|
- Trevor Atkins
- 10 years ago
- Views:
Transcription
1 S-IMS-A Intelli-M Access Essentials V4.0 Installation and User Guide For SKU: S-IMS-A ACCESS Essentials PLEASE READ THIS MANUAL BEFORE USING YOUR INTELLI-M ACCESS SYSTEM, and always follow the instructions for safety and proper use. Save this manual for future reference. IN_S-IMS-A_4.0_RM 1/2/2014
2 Legal Notice infinias, the infinias logo, and Intelli-M are trademarks of infinias. Microsoft and Windows are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries. Other trademarks and trade names may be used in this document to refer to either the entities claiming the marks and names or their products. infinias disclaims any proprietary interest in trademarks and trade names other than its own. infinias 9340 Priority Way West Drive Indianapolis, IN Telephone: (toll free), No part of this document may be reproduced or distributed in any form or by any means without the express written permission of infinias. The information in this document is subject to change without notice or obligation. Copyright 2014, infinias. All Rights Reserved. ii
3 TABLE OF CONTENTS Table of Contents SECTION 1 Introduction System requirements Considerations Operating systems Hardware Software Version 4.0 license Important terms and concepts...3 SECTION 2 Installation Import data from other access control systems (optional) Import to Intelli-M Access...18 SECTION 3 Configure Intelli-M Access Logging into Intelli-M Access Settings page Replacement license - Intelli-M Access upgrade to V Activate your license Create a door Create a door with eidc controller Create a door with Stanley EL Series locksets Create a Person Change the Admin password Create an Access Privilege Additional configuration steps for your facility...39 SECTION 4 User Interface Page layout Login to Intelli-M Access Events page People page Views and Actions Create Person Edit Person Delete Person View Person...53 Intelli-M Access V4.0 User Manual iii
4 TABLE OF CONTENTS Print Badge Get Events Create Group Edit Group Reports page Doors page - Home section Views Actions (Doors View) Actions (Zones View) Door Status Icons Doors page - Configuration section Create Door Edit Door Delete Door Update All Update Modified Update Get Events Create Behavior Edit Behavior Delete Behavior Create Zone Edit Zone Delete Zone Update Schedules page Create Schedule Delete Schedule Create Holiday Set Edit Holiday Set Delete Holiday Set Groups page - Configuration section Rules page Create Rule - Access Privilege Create Rule - Event Management...77 iv
5 TABLE OF CONTENTS Create Rule - Hide Event Create Rule - Alarm Management Create Rule - Credential Management Create Rule - Event Create Rule - Lock Zone Edit rule Delete Rule Peripherals page Create Peripheral Edit Peripheral Delete Peripheral Customize page System Settings About tab tab Security tab...89 SECTION 5 Mobile Credential Install the Mobile Credential server Configure Intelli-M Access for Mobile Credentials Install a Mobile Credential license Assign Mobile Credential to a person Install and configure the infinias app on a mobile device Using the Mobile Credential SECTION 6 Advanced Setup and Configuration APPENDIX A Stanley QEW Gateway Setup for Intelli-M Access APPENDIX B Troubleshooting FAQ B.1 Installation issues B.2 Runtime troubleshooting Intelli-M Access V4.0 User Manual v
6 vi
7 SECTION 1: INTRODUCTION SECTION 1 Introduction Thank you for purchasing Intelli-M Access, the Simple, Scalable, and Secure access control system. Intelli-M Access is the most functional and economical access control system available for small through enterprise scale installations. This guide the installation, configuration and management of the Intelli-M Access V4.0 access control system. 1.1 System requirements Considerations Since Intelli-M Access is a client/server application, we recommend that it be run on a server in a secure environment. If Intelli-M Access is installed in a virtual environment, we recommend VMWare ESXi or higher. Note that Intelli-M Access includes a Rules engine that extends the functionality of the system; to take advantage of these features, the server must be available continuously Operating systems Intelli-M Access runs on Microsoft Windows operating systems. We always recommend using the most recent versions of operating systems, and for installations of greater than 32 doors, we strongly recommend using a server class operating system. Microsoft Windows Vista Professional (recommended), Enterprise, Ultimate Microsoft Windows Server 2008 R2, Server 2012 R2 Microsoft Windows 7 Professional, Enterprise, and Ultimate, Windows 8, Windows 8.1 Other versions of Microsoft Windows, including the Home version, do not include components required by Intelli-M Access Hardware For 32 doors or less, the recommended hardware includes: 2GB RAM 2 GHz Processor 50GB HDD free space Single 100 Mb network interface Microsoft Windows Vista or newer Intelli-M Access V4.0 User Manual 1
8 SECTION 1: INTRODUCTION For 32 to 128 doors, the recommended hardware includes: 4GB RAM Dual core, 2 GHz Processor 100GB HDD free space Single or dual 100 Mb network interface Microsoft Windows Vista or newer For more than 128 doors Intelli-M Access takes advantage of multiple processors and expanded memory. For extremely large systems, the database server and reporting services can be moved to another server to improve performance. For specific recommendations, please contact infinias Software Intelli-M Access requires key components available with or for advanced Microsoft Windows operating systems including: IIS (Internet Information Server) - Microsoft web server resident in Windows. This server is used to provide Intelli-M Access web pages to any standard browser. IIS must be activated before installing Intelli-M Access. Message Queueing - By using transaction server, Intelli-M Access delivers an asynchronous message queuing architecture designed to be robust, highly scalable and resilient to spikes in demand. Like IIS, Message Queueing must be activated before installing Intelli-M Access. Reporting Services - Reporting Services is installed with the SQL Server Advanced Services package provided by infinias. It provides reporting capabilities. Both reports and badges are delivered through Reporting Services. To design reports, download and install Report Builder, a free tool from Microsoft. SQL Server - Intelli-M Access uses version 2008 or newer, and will automatically install the 32-bit version of SQL Server 2008 R2 with Advanced Services if a compatible version of SQL Server is not already installed. Intelli-M Access also requires Microsoft SQL Reporting Services, a part of the SQL Server installation, to be installed. All required software packages, including SQL Server 2008, will be automatically configured during the installation process. Refer to the installation chapter for more information. 1.2 Version 4.0 license The new Intelli-M Access V4.0 licensing system requires the Intelli-M Access server to be connected to the internet during the license activation phase. If the server is not or cannot be connected to the Internet, contact infinias to help you activate your system. The new license key consists of a License Key string and a Password string each string is 6 or 7 characters long. Keys used to activate Intelli-M Access V3.x and earlier systems are incompatible with V4. However, as with previous versions of Intelli-M Access, if you are installing Intelli-M Access as a new install, or as an update to an Intelli-M Access V3.x or older system, a 30-day trial key 2
9 SECTION 1: INTRODUCTION will automatically be generated. Refer to 3.3 Replacement license - Intelli-M Access upgrade to V4.0 on page 26 for more information. 1.3 Important terms and concepts This subsection includes important terms and concepts used in the advanced infinias access control system, which is a significant departure from traditional access control systems. Please become familiar with the following before configuring and using your Intelli-M Access system. Door vs. zone In former access control systems, a Door was configured to grant certain access privileges to that Door. Intelli-M Access introduces the concept of a Zone. A Zone can viewed as the physical space which the Door occupies in a facility, floor, or room. Simply put, a Door borders two areas of a room, floor, or building. Each of the two areas is called a Zone. Therefore, when you apply privileges to a Door Intelli-M Access, you re granting access to the Zone that the door protects. During installation, Intelli-M Access creates two default Zones: Inside and Outside. These zones represent the inside of your building or office, and the outside of your building or office - your perimeter door or doors already border these two zones. Inside your building, you may have interior doors that you need to secure. Each door to be secured also borders two zones: the interior of the floor or building, and the side you wish to secure. You could re-use the Inside Zone for the unsecured side of the door, and create a new Zone, for example IT Server Room, to serve as the name of the secured side of the door. During configuration of access privileges, you will grant access to the IT Server Room Zone, not the Door that borders it. You can re-use Zones in more than one way. The previous example demonstrated how you could re-use the Inside Zone because it happened to represent the same physical space that your perimeter doors also occupied. Another way to re-use a Zone name is if the same people will always be given identical access privileges to multiple areas. For example, if you are a hospital, and you have 3 operating rooms, and the same people always have identical access to those 3 rooms, then you can create a single Zone, such as Operating Room, to represent the secured side of the operating rooms. As you plan your system configuration, consider useful names for the Zones to which you will be applying access privileges. Once you have configured your Zones, it will be much easier to maintain and re-configure access privileges to the Zones than compared to the old mechanism of per-door privileges. Muster zone A Muster Zone is a Zone that has been tagged with the In or Out Muster attribute. When you tag a Zone with the In Muster attribute, Intelli-M Access will keep track of all users that have entered that Zone. You can also tag a Zone with the Out Muster attribute to keep track of both sides of a Door if you wish. A special Muster View on the Events Page displays the location of all cardholders in these Muster Zones in real-time. Intelli-M Access V4.0 User Manual 3
10 SECTION 1: INTRODUCTION Cardholder vs. group Traditional access control systems define a cardholder and allow you to configure that Cardholder s access rights within the system. Intelli-M Access borrows from the Enterprise world, and extends the Cardholder as a member of a Group, similar to the way Windows contains Windows account Users and Groups. All cardholders must be a member of at least one Group, and can be a member of multiple Groups. Access Privileges will be not be applied to a Cardholder but rather to a Group. Thus you can modify the access privileges of a large number of Cardholders with one simple configuration change. Or you can make significant access privilege changes to a single Cardholder merely by adding them to or removing them from a Group. Door types Intelli-M Access presents the Door Type, a template that describes the input and output configuration gathered into a single entity. Most door wiring configuration are already described with one of the built-in Door Types. If you have one or more doors with a nonstandard configuration, you can easily create your own Door Type which you can apply to your custom-configured doors. Door Behaviors Door Behavior declares the Door s unlock schedule and the mode of the attached card reader(s), such as Card Only mode or Card plus PIN mode. Intelli-M Access creates one behavior by default, the Always Locked Behavior. This Behavior sets the card reader to Card plus PIN. Rules and privileges Intelli-M Access expands the aging concept of access control, with the concept of Privilege : the combination of a Group (who has access), a Zone (where access is granted), and a Schedule (when access is granted). You can create as many Privileges as needed to manage the configuration of access rights in your system. Intelli-M Access extends these capabilities with the Rule. A Rule specifies the action taken when something happens. A Privilege is a type of a Rule ( what to do when a card is swiped or a PIN is entered ). There are many other Rules that you can create to make Intelli-M Access do precisely what you want when something happens. Examples include sending , locking and unlocking any Zone or Door, energizing or de-energizing one of the door controller outputs, etc. For more information see SECTION 6 Advanced Setup and Configuration on page 104. Schedules and holiday sets A Schedule is a stand-alone set of time ranges that define a 7-day week. Each day has a set of zero or more time ranges you can define. Schedules define the Active Time Range. A Schedule (Active Time Range) can be applied to a Door (via the Door Behavior) as an unlock schedule, to a Person (via the Group membership) to define the hours they may access a Zone, or a Rule to specify when the Rule can be active. For example, when a Schedule is applied to a Door, the Door will be unlocked during the Active Time Range, and unlocked during the inactive time range. 4
11 SECTION 1: INTRODUCTION A Holiday is a single day in which normal business hours are altered, such as Thanksgiving or Christmas. A Holiday Set is a grouping of Holidays in which the altered business hours match. For example, a Holiday Set might consist of New Year s, Thanksgiving, the day after Thanksgiving, and Christmas Day, when the office is closed; another Holiday Set might consist of Christmas Eve and New Year s Eve because the office hours are a half day. Once you ve established your Holiday Set, you can assign a set of zero or more time ranges that define that Holiday Set. You can also apply that Holiday Set to a Schedule you ve created. Thus, you ll have a single Schedule that contains the normal hours of office operation, plus all of the days in which the office is to be partially or completely closed. Finally, you can assign that Schedule to any Door Behavior, Person Group, or Rule. Events and alarms In Intelli-M Access, you define what is or is not an Alarm (or event) using the Rules Engine. By default, Intelli-M Access identifies an Alarm as an access control denial event. Alarm acknowledgement Intelli-M Access introduces the concept of Automatic Alarm Acknowledgement. Through the Rules Engine in Intelli-M Access, you determine what events are truly important. For more information see SECTION 6 Advanced Setup and Configuration on page 104. Extensibility and peripherals Intelli-M Access introduces the concept of a Peripheral, a third-party device that can be integrated with Intelli-M Access. A Peripheral can be any entity - a video surveillance DVR, an individual IP Camera, a hardware I/O device, or even a web service like Google Maps. Each Peripheral is supported by a Plugin, a software module that provides a bridge between Intelli-M Access and the device or service. You can then use the Rules Engine to control the Peripheral, telling it to record video on camera X when a card with invalid credentials are swiped at Door Y, energize output A when input B is raised, show live video in my browser on camera X when even Y occurs, etc. During installation, Intelli-M Access provides a 32-channel Ethernet-controlled I/O device peripheral. You can create a Rule to force the device s output(s) to a desired state, or use the device s inputs states to lock or unlock doors, send , and several other actions. Reports Intelli-M Access uses the Microsoft Reporting Services engine enabling you to create customized reports. Custom-printed cardholder badges also utilize the Reporting Services engine, giving you control over the look of your badges. For additional information about creating your own custom reports, please visit infinias.com. Intelli-M Access V4.0 User Manual 5
12 SECTION 2: INSTALLATION SECTION 2 Installation The Intelli-M Access installation package is contained in a 1.2GB compressed, self-extracting file that can be downloaded or available on installation media you can order from infinias. The compressed file contains all of the operating system and application prerequisites to complete the installation of Intelli-M Access V Obtain the Intelli-M Access installation file. 2. Copy the installation file to the server where you want to install Intelli-M Access. 3. Double-click the file to start the installation. If your current OS configuration requires an installation of one or more prerequisite software packages, you will be presented with a window similar to that shown below: InstallShield Prerequisites Dialog a. Click the Install button to install the first prerequisite in the list. Each prerequisite will be installed in order that you see them in the list. One or more prerequisites may require a system reboot, and may automatically do so in order to complete the prerequisite installation. If a reboot is required, the installation will continue immediately after logging back into the system following the reboot. Repeat this step until all prerequisites are installed. Intelli-M Access Prerequisite Manager A special prerequisite, the Intelli-M Access Prerequisite Manager, is the last prerequisite to be installed. This prerequisite will automatically install the required Internet Information Services (IIS) and Microsoft Message Queuing (MSMQ), packages that are both required by Intelli-M Access. Once this prerequisite is complete, the actual product installation will begin. 4. If there are any errors in installing any of the prerequisites, especially IIS or MSMQ, a prerequisite window will appear and will describe the error, similar to that shown below. 6
13 SECTION 2: INSTALLATION Intelli-M Access Prerequisite Manager Error Window a. If an error window appears during installation of a prerequisite, follow the instructions provided in the window before continuing the installation. If necessary, contact infinias Technical Support for further assistance. Begin installation 5. After all prerequisites are installed, you will be presented with the usual opening installation window (see below). Click Next to continue the installation. InstallShield Welcome dialog 6. When the License Agreement window appears, read the contents thoroughly. If you agree to the agreement detailed in the window, click the I accept the terms in the license agreement radio button. If you.. do not accept the terms in the license agreement, select that radio button. Click Next to continue. Intelli-M Access V4.0 User Manual 7
14 SECTION 2: INSTALLATION License Agreement dialog 7. If you agreed to the terms of the license agreement shown in the window above, the Destination Folder option will appear. Click Change, then browse to a different location for the installation, if necessary. Click Next to continue. Destination Folder dialog 8. The Setup Type window lets you choose which features of Intelli-M Access you need to install. 8
15 SECTION 2: INSTALLATION a. Do either of the following: Setup Type dialog * If a Custom installation is not necessary (see next bullet), choose Complete, then click Next and continue the installation at Step 9. * Select Custom then click Next and continue with the following sub steps if any of the following scenarios applies to your system:»» You already have a pre-existing instance of SQL Server 2008 R2 installed, either on the local computer or on a remote computer. See the important notes below regarding pre-existing SQL Server instances.»» You are installing Intelli-M Access onto a computer that already has a web-based application installed and is already listening on port 80. See the important note below regarding changing the name and location of the website. Intelli-M Access V4.0 User Manual 9
16 SECTION 2: INSTALLATION Many application installations affect the existing IIS configuration. Some applications change the name of the default IIS website from Default Web Site to another name. Some might delete the default website altogether. In either case, the application probably uses port 80 (and possibly port 443), preventing Intelli-M Access from using port 80. Other applications disable IIS because they use a third-party web server like Apache. In all of these cases, you can still install Intelli-M Access on this computer. If Default Web Site has been changed or removed, you can either provide the new name to the Intelli-M Access installer, or you can choose your own name and provide an unused port number (e.g or 8080). If IIS has been disabled, it was disabled so the third party web server could use port 80. In that case, change the port number in the Internet Services Information (IIS) Manager utility to an unused port number (e.g or 8080), re-enable Default Web Site, and provide the new port number to the Intelli-M Access installation. NOTE Intelli-M Access requires SQL Server Standard/Enterprise 2008 R2 or SQL Server Express 2008 R2 with Advanced Services. Regardless of which Edition you have installed, you must configure SQL Server to allow Mixed Mode Authentication - that is, SQL Server must allow both SQL Authentication and Windows Authentication. You can modify this configuration property using SQL Management Studio. You must have SQL Reporting Services installed. If you do not, the installation will succeed but the Reports page will show an error. If you do not need the reports feature in Intelli-M Access, then you do not need to install the Reporting Services option in SQL Server. If you will be using the reports feature of Intelli-M Access, run your SQL Server installation again and add Reporting Services to the installation. After that is complete, run the Intelli-M Access installation. If you have already installed Intelli-M Access, simply run the Intelli-M Access installation again and choose the Repair option. b. A Custom Setup window will open showing the installation components whose installation options you can modify. Click on each icon in the list to change how the feature is installed, then click Next. For example, If you already have SQL Server 2008 R2 installed, then click the icon to the left of the SQL Server entry, and choose Will not be installed, and click Next. If you do not have SQL Server installed, and chose Custom to modify the Intelli-M Access website name, than make no changes and simply click Next to continue. 10
17 SECTION 2: INSTALLATION Custom Setup dialog c. In the Database Server dialog, click Browse locate the full path to the SQL Server instance in the top edit box, if necessary. The full path includes the hostname or IP address of the computer on which SQL Server is installed. Database Server dialog If SQL is installed on the local computer, you may use., , or localhost to represent the computer name. Follow the hostname with the backslash character ( \ ) and then the SQL instance name, such as MSSQLSERVER or SQLEXPRESS. The installer attempts to discover and authenticate to any locally-installed SQL Server, so the correct information may already be displayed. If you do not know what to enter, please contact your IT representative or the person who installed SQL Server. d. Next, provide credentials that have access to SQL Server with Administrative control. You can use any credentials that you know have Administrative rights to SQL Server, either a Windows or SQL user. These credentials are necessary to create the infinias database in your SQL Server instance and will not be saved anywhere. Intelli-M Access V4.0 User Manual 11
18 SECTION 2: INSTALLATION e. Click Next to continue. The installation will then attempt to connect to SQL Server to verify your information. You will receive an error popup window if the installation fails to connect. If that occurs, please correct the SQL Server information and try again. f. After the installer successfully connects to the SQL Server, it will display the Microsoft Reporting Service dialog. The installer attempts to discover a locally-installed reporting services web server, so the correct information may already be displayed. Ensure that the URL shown is correct, or enter the correct path in the entry field. If you do not know what to enter, please contact your IT representative or the person who installed SQL Server. Click Next to continue. Microsoft Reporting Services dialog g. In the Intelli-M Access Web Application Web Application dialog, select a website name and the port on which the website will listen. If you are installing Intelli-M Access on a system that has an existing web-based application running, provide a unique name for the IIS Website to be created, along with an unused port number. Click Next to continue. Intelli-M Access Web Application Web Application dialog 12
19 SECTION 2: INSTALLATION h. In the Ready to Install the Program dialog, click Back to check are modify your pre-installation settings, if necessary, then click Install to continue with the Intelli-M Access Installation. Ready to Install the Program dialog Installation progress The actual installation process of copying files and configuring your operating system may take anywhere from 5 minutes to nearly an hour if SQL Server needs to be installed. When SQL is being installed, SQL installation process windows appear and display the progress of the SQL Server install. If the SQL Server installation fails, the SQL install the Intelli-M Access install will abort and an information window will appear. NOTE If SQL Server installation fails, refer to B.1 Installation issues on page 111 for suggestions on how to troubleshoot installation failures. Installation complete After all files have been copied and your system configuration is complete, the final installation window will be displayed. Click Finish to close the window. You are now ready to configure Intelli-M Access. Intelli-M Access V4.0 User Manual 13
20 SECTION 2: INSTALLATION If you are new to the infinias system, some concepts and terms used in Intelli-M Access may be unfamiliar. Review these in 1.3 Important terms and concepts on page 3 before continuing. 2.1 Import data from other access control systems (optional) NOTE If your Intelli-M access control system does not replace or build upon another access control system, skip this subsection and continue with Chapter 3. Intelli-M Access includes an import/export utility for extracting configuration information from other access control systems (such as Supervisor Plus) and importing that data into Intelli-M Access. For large access control networks, this can save hours of configuration time. Because of the complexity of the Door configuration in Intelli-M Access, however, Doors are not imported; they need to be manually created in Intelli-M Access. This utility imports data from other systems using a comma-delimited (CSV) text file. Data in CSV format may be exporting from a third-party access control system, and then imported directly into Intelli-M Access. A sample CSV file is available on the infinias website that describes the data format information. To use the Import/Export Utility: 1. Click the Windows Start menu All Programs infinias Import Utility. The startup page will open See below. 14
21 SECTION 2: INSTALLATION 2. If you have an XML or CSV file from exported another system, skip to subsection Import to Intelli-M Access on page 18 and follow the instructions on importing data into Intelli-M Access. 3. To export user data from Supervisor Plus, select the Export from Supervisor Plus radio button. The Export from Supervisor Plus option causes the utility to transfer cardholder and group information into an XML file. This file will be used later as the import file for transfer into Intelli-M Access. Click Next. 4. A Login page will open. In the Login window, enter hostname or IP address of the server where Supervisor Plus is installed. Intelli-M Access V4.0 User Manual 15
22 SECTION 2: INSTALLATION 5. Enter the user name and password for the SQL database that Supervisor Plus uses (see above). Use the default Integral name and password if they weren t changed. CAUTION If Supervisor Plus is running, exit Supervisor Plus and leave it off to avoid conflicts with Intelli-M Access. 6. Click Connect to connect to the Supervisor Plus database (e.g. SQL Server). The application will connect successfully if the proper hostname and credentials were entered. Contact infinias Support if you have having trouble connecting to the database. 7. After a connection to the database is established, click Next. 8. Check the Cardholder Information box, then click Next. The utility will export all cardholder information relevant to Intelli-M Access. 9. In the Target Export File window, click the folder icon and browse to the location where you want to save the export file. Append a file name, then click Next. 16
23 SECTION 2: INSTALLATION 10. In the Begin File Export window, click Next to proceed. A progress dialog will appear during the export process. 11. When the Task Complete window opens, click Finish. Intelli-M Access V4.0 User Manual 17
24 SECTION 2: INSTALLATION Import to Intelli-M Access To import data to Intelli-M Access: 1. Launch the Import utility, if not already open: Click the Windows Start menu All Programs infinias Export from Supervisor Plus. The startup page will open See below. 18
25 SECTION 2: INSTALLATION 2. To import user data from another access control system (such as Supervisor Plus) to Intelli-M Access, select the Import to Intelli-M Access radio button, then click Next. 3. In the Intelli-M Access Administrator login page, select options as follows: a. For the hostname, enter localhost (meaning that you must be running this utility from the server onto which you installed Intelli-M Access). b. Enter the admin username and password (use the default values if the password was not changed) you haven t changed the credentials yet. Ensure that proper credentials have been entered, and click Connect to connect to Intelli-M Access. If you have trouble connecting to the database, please contact infinias Tech Support for further assistance. c. After the test connection is successful, click Next to continue. 4. In the Import User Data page, click the directory icon and select the file containing the data you want to import, then click Next to continue. Intelli-M Access V4.0 User Manual 19
26 SECTION 2: INSTALLATION 5. Click Next in the Begin Data Import page to proceed with the import. The import process may take one or two minutes. 6. After the import completes, the Results Page sorts the import results into four categories: New Users that were added to Intelli-M Access Existing Users whose information was updated in Intelli-M Access Users who for some reason were not added or updated New Groups that were added to Intelli-M Access 20
27 SECTION 2: INSTALLATION The ResultsDialog example above shows one new User and two new Groups were added. After examining, click Finish in the Task Complete window to close the utility. Task Complete page Congratulations! You ve successfully transferred the users and groups from another access control system into Intelli-M Access. Intelli-M Access V4.0 User Manual 21
28 SECTION 3: CONFIGURE INTELLI-M ACCESS SECTION 3 Configure Intelli-M Access Follow these simple steps to get your access control up and running in minutes. This chapter will guide you through the minimal steps required for successful configuration of your Intelli-M Access system. Before configuring your system, write down the IP Address or Serial Number as well as the physical location of all of your door controllers. You will need this information to continue. 3.1 Logging into Intelli-M Access 1. At the windows desktop, click Start All Programs infinias Intelli-M Access to open your web browser pointing at Intelli-M Access running under IIS. An Authentication screen will appear. Intelli-M Access Login Page 2. In the Authentication screen, enter your Intelli-M Access username (default: admin) and password (default: admin), then click Login. Note that when Intelli-M Access is installed, the software is licensed in Trial mode for 30 days. 22
29 SECTION 3: CONFIGURE INTELLI-M ACCESS 3.2 Settings page After logging into Intelli-M Access with a Trial license, the Settings tab opens. To activate your user license(s), complete the following steps. If you do not have a valid license key and password, you can obtain one from your dealer by contacting [email protected] for assistance. If your Trial license is still valid, you can skip the activation steps and continue with 3.5 Create a door on page 29 to configure your Intelli-M Access system. Activate licenses 1. To begin the License activation process in the Settings tab, click the Edit Dealer link under Actions on the left side of the window. The Edit Dealer Information window will open: NOTE The Custom tab in earlier version of In Intelli-M Access was renamed Settings in V4.0 to expand the functionality of this area of the user interface. The existing features in the Custom tab accessible by clicking the Custom Fields under Views. Settings Page 2. In the Edit Dealer Information pop-up window, you can retrieve your Dealer information from the Internet if you have your dealer key: enter the key in the field provided, then click Retrieve Dealer Information via Key. If you don t have either your dealer key or direct access to the Internet, enter the applicable information in the fields provided. Intelli-M Access V4.0 User Manual 23
30 SECTION 3: CONFIGURE INTELLI-M ACCESS 3. After entering your Dealer and Contact information, click Save. Your Dealer and Contact information will be transferred to the infinias registration server and appear in the Settings page. See the example below. 24
31 SECTION 3: CONFIGURE INTELLI-M ACCESS NOTE the Dealer Key to yourself. You can re-use that Dealer Key to avoid re-entering the same dealer information on future Intelli-M Access installations. If the server fails to connect to the registration server for any reason, the Dealer information will still be retained, but there will be no Dealer Key to reference later. 4. Next, click the Edit Customer link under Actions on the left side of the window to open the Edit Customer Information screen shown below. Edit Customer Information 5. In the Edit Customer Information pop-up window, you can retrieve your Customer information from the Internet if you have your customer key: enter the key in the field provided, then click Retrieve Customer Information via Key. If you don t have either your customer key or direct access to the Internet, enter the customer and contact information in the fields provided. 6. After entering your Customer and Contact information, click Save. Your Customer and Contact information will be transferred to the infinias registration server and appear in the Settings page. See the example below. Intelli-M Access V4.0 User Manual 25
32 SECTION 3: CONFIGURE INTELLI-M ACCESS Dealer, Customer, and License Information 3.3 Replacement license - Intelli-M Access upgrade to V4.0 If you are installing Intelli-M Access 4.0 as an upgrade to an existing 3.x or earlier Intelli-M Access product. A text window containing your replacement license key and password will appear. The new license information is also saved to a text file on your desktop for use later, if needed. Follow the instructions below to activate the license key. NOTE Currently, Intelli-M Access Professional and Intelli-M Access Corporate keys cannot be provided via this method. The replacement license key is for Essentials customers only. Please call technical support to obtain a replacement Professional or Corporate key. 3.4 Activate your license 1. In the Settings tab, click the Activate License link under Actions on the left side of the window. A popup window like that shown below will appear. 26
33 SECTION 3: CONFIGURE INTELLI-M ACCESS Activate License 2. In the window, enter your Intelli-M Access V4.0 license key and password (or for an upgrade install, your replacement license key and password). 3. Do one of the following: ONLINE ACTIVATION - if your Intelli-M Access server can connect to the Internet: Click Activate in the Activate License window. Intelli-M Access will then connect to the license registration server to register your copy of Intelli-M Access and activate your license. If the activation process succeeds, your licence key will appear on the Settings page. If the activation fails, use the OFFLINE ACTIVATION method described below. OFFLINE ACTIVATION - if your Intelli-M Access server cannot connect to the Internet: i. Click Activate in the Activate License window. The activation will fail, and the following pop-up window will appear. Activate License Failure ii. Click the link to Download activation request file..., then click Done to close the window. Intelli-M Access V4.0 User Manual 27
34 SECTION 3: CONFIGURE INTELLI-M ACCESS iii. iv. the Activation Request file to and request an Activation Response file. When you receive the Activation Response file, save it anywhere on your server. v. In the Settings tab, click the Activate License link under Action on the left side of the window. vi. In the Activate License window, click the link I have been provided a file for activating a license.... The following Activate License window will open. Activation Response File Entry Dialog vii. viii. In the window shown above, click Browse and select the Activation Response file saved earlier. Click Activate. 4. After performing the activation steps, verify that the license you added appears in the Settings tab. Also, a confirmation will be sent to you and your dealer showing that your license key was activated. 28
35 SECTION 3: CONFIGURE INTELLI-M ACCESS License activation - confirmation 5. Repeat this Activate your license procedure for additional licenses you need to activate. These licenses may include any of the following: Stanley Electronic Lock license Intelli-M Access V4.0 User Manual 29
36 SECTION 3: CONFIGURE INTELLI-M ACCESS Intelli-M Access V4.0 Corporate or Professional license Mobile Credential licence (see 5.2 Configure Intelli-M Access for Mobile Credentials on page 95 for more information) 3.5 Create a door infinnias Intelli-M Access V4.0 supports two door controller types: the infinias eidc/eidc32 controller, and the Stanley EL Series lockset. Although Creating a door for both types is similar, they function the same way within Rules, Schedules and Reports of Intelli-M Access Create a door with eidc controller The Doors tab in the Configuration menu system allow you to create (define), edit doors, delete doors, and update the Door configuration. See below. Initially, no doors are pre-configured for the system, but may be discovered automatically. Doors System Settings page 30
37 SECTION 3: CONFIGURE INTELLI-M ACCESS To create a door: 1. Open the Create Door menu. Click Configuration (in the upper right corner, if shown), click the Doors (tab), then click the Create Door link under Actions on the left side of the window. A blank menu, similar to that shown below, will open. 2. Enter the fields of the menu as needed: a. Choose a Door Name. Choose a name such as Front Door, Lobby Door, etc. b. Choose a Device. Leave the select at its default for this example. c. Choose a Time Zone. Choose the time zone that the door controller is physically located. (The doors can be located in different time zones.) Intelli-M Access will adjust the time of day to compensate for the time zone difference. For most installations, use the currently-selected time zone. d. Choose a Door Behavior. Even if you want this first door to be unlocked during business hours, you can still create the Door by choosing the default Always Locked Behavior. And if the door is to be locked all the time, you ll not need to revisit this later. e. Select the two Zones that the Door borders. The Secured (Inside) Zone represents the physical space that you want to secure access. The Unsecured (Outside) Zone represents the physical space that is unsecured, and is where the proximity card reader ( IN Reader ) will be located that grants access to the Secured Zone. If you have 2 readers, you will configured the second reader ( OUT Reader ) below. f. Choose an IP Address. The IP Address combo box will contain all door controllers that were automatically discovered by the system. All controllers that are within the Intelli-M Access server s subnet will be discoverable, and any controllers outside the subnet (i.e. with a router between the controller(s) and the server) will not be discoverable. If the IP Address of your device is not found, simply type the IP address in the combo box. Intelli-M Access V4.0 User Manual 31
38 SECTION 3: CONFIGURE INTELLI-M ACCESS g. Choose a Serial Number. If you chose an IP Address that was discovered, the Serial Number combo box will automatically choose the correct Serial Number for you from its list of discovered devices. If you manually entered an IP address in the IP Address combo box, then manually enter the Serial Number found on the sticker of the controller. h. Click Test Connect. (Optional) This step helps confirm that the IP Address and Serial Number are correct. If the Test Connect fails, make sure you can ping the controller (at a command prompt on the server, ping <IP address of the device>) and view it in a web browser (use the URL address of the device>). If Test Connect fails even after you ve resolved any connectivity issues, contact technical support for assistance... i. Choose a Door Type. If your door has a door contact sensor, please connect that sensor to Input 1 ( IN1 ) on the controller, and choose 1 or 2 Reader IN1 Normally Closed Door Type. If you do not have a door contact sensor, or if you sensor is a Normally-Open sensor, choose 1 or 2 Reader IN1 Normally Open Door Type. You may also press the Diagram button to view a superset of connection and wiring options. j. Choose the 2nd Reader. If you have only one card reader, or if you have two card readers - one on each side of the door to secure access in both directions - leave this choice in its default setting ( is not used or provides access in opposite direction ). If you are connecting both card readers on the same side of the door, choose provides access in same direction as Reader 1 (IN reader). If you do not know the answer, leave this choice in its default setting. 3. Click Create, then wait a few seconds. The Door will appear in the main Doors viewing area and eventually display three status icons. The left-most icon should be a yellow triangle, indicating that the Door configuration has changed and needs to be updated. (See Door Status Icons on page 61 for an explanation of door icons.) This is normal status the first-time creation of the Door. If there is only one icon and it is a red circle, the system could not communicate with the Door using the information you provided. If this occurs, recheck the entries you provided in the menu, and refer to appendix B.2 Runtime troubleshooting on page 113 for suggestions. 32
39 SECTION 3: CONFIGURE INTELLI-M ACCESS NOTE If you create or update a Door and you see a rippled red line in one of the fields, hover the cursor over that field. A message will popup explaining the problem. Correct the problem and try again. 4. Follow the steps above to create additional Doors. After creating Doors or editing Door menus, click the Update Modified link under Action on the left side of the window to apply the changes Create a door with Stanley EL Series locksets Stanley EL Series locksets interface to the Intelli-M Access server through a Stanley QEW gateway. Each gateway can service four locksets, each with its own lock identifier. Before adding Stanley EL Series locksets to Intelli-M Access, the Stanley QEW gateway(s) must be configured to communicate with Intelli-M Access. See APPENDIX A Stanley QEW Gateway Setup for Intelli-M Access on page 105 for the setup procedure. For more information about the Stanley QEW and EL Series locksets, refer to the documentation provided with those products. To create a door in Intelli-M Access for a Stanley EL Series lockset, do the following: 1. Open the Create Door menu. Click Configuration (in the upper right corner, if shown), click the Doors (tab), then click the Create Door link under Actions on the left side of the window. A blank menu, similar to that shown below, will open. Create Door popup window for Stanley EL Series lockset 2. Enter the fields of the menu as needed: a. Choose a Door Name. Choose a name such as Front Door, Lobby Door, etc. In the example above, the door name is associated with the gateway it is serviced by. b. Choose a Device. Open the drop-down list and select Stanley EL Series for Stanley locksets. Intelli-M Access V4.0 User Manual 33
40 SECTION 3: CONFIGURE INTELLI-M ACCESS c. Choose a Time Zone. Choose the time zone that the door controller is physically located. (The doors can be located in different time zones.) Intelli-M Access will adjust the time of day to compensate for the time zone difference. For most installations, use the currently-selected time zone. d. Choose a Door Behavior. Even if you want this first door to be unlocked during business hours, you can still create the Door by choosing the default Always Locked Behavior. And if the door is to be locked all the time, you ll not need to revisit this later. e. Select the two Zones that the Door borders. The Secured (Inside) Zone represents the physical space that you want to secure access. The Unsecured (Outside) Zone represents the physical space that is unsecured, and is where the proximity card reader ( IN Reader ) will be located that grants access to the Secured Zone. If you have 2 readers, you will configured the second reader ( OUT Reader ) below. f. Select a Device. In the lower section of the window, open the Device drop-down list and select the lockset with the Lock Identifier that you want to configure. The Lock Identifier (MAC address) for the lockset is shown on the controller module inside the lockset. If the lock identifier for the lock you are configuring doesn t appear in the Device drop-down list, click Refresh repeatedly until it appears. g. Choose a Serial Number. If you chose an IP Address that was discovered, the Serial Number combo box will automatically choose the correct Serial Number for you from its list of discovered devices. If you manually entered an IP address in the IP Address combo box, then manually enter the Serial Number found on the sticker of the controller. 3. Click Create, then wait a few seconds. The Door will appear in the main Doors viewing area and eventually display four status icons. eidc/eidc32 door Stanley EL Series door Battery power indicator Initially, the left-most Status icon may show a red circle. When an online message is received from the Stanley gateway, it will change to a yellow triangle, indicating that the Door configuration has changed and needs to be updated. (See Door Status Icons on page 61 for an explanation of door icons.) A door update can be performed when the icon is a red circle. This is normal status the first-time creation of the Door. If there is only one icon and it is a red circle, the system could not communicate with the Door using the information you provided. If this occurs, recheck the entries you provided in the menu. Or, if after an update, the red circle remains for an extended period, refer to appendix B.2 Runtime troubleshooting on page 113 for suggestions. 34
41 SECTION 3: CONFIGURE INTELLI-M ACCESS NOTE If you create or update a Door and you see a rippled red line in one of the fields, hover the cursor over that field. A message will popup explaining the problem. Correct the problem and try again. 4. Follow the steps above to create additional Doors. After creating Doors or editing Door menus, click the Update Modified link under Action on the left side of the window to apply the changes. 3.6 Create a Person The People page displays all of the cardholders and Intelli-M Access users in the system. Initially there is only one user (Person), the admin user account you used to log into the system. To create additional People who are cardholders or system users: 1. Open the Create Person menu. Click Home (in the upper right corner, if shown), click the People (tab), then click the Create Person link under Actions on the left side of the window. A blank menu, similar to that shown below, will open. Create Person popup dialog 2. Enter the fields of the menu as needed: a. Enter a First Name and Last Name in the appropriate name fields. b. Enter a Site Code and a Card Code. The card number (Card Code) is usually printed on the card, and the Site Code is printed in the paperwork that came with the batch of cards. If you do not know the Site Code or Card Code, simply swipe the card at the Door you created earlier, and the Site Code /Card Code combo will be displayed on the Events Page. Copy those values into these two fields. Intelli-M Access V4.0 User Manual 35
42 SECTION 3: CONFIGURE INTELLI-M ACCESS c. Place the Person in a Group. Click the arrow in the Groups tab (or drag and drop) to add membership to the selected Group, which is already visible below the Card Code boxes. Initially, there is one group: Everyone. If several groups were created, you can easily find a Group name in a long list of Groups by clicking the mouse anywhere in the Available Group window area and start typing the name of the Group. The Group whose name most closely matches what you type will be automatically selected. d. Configure PIN code. If some access controllers require a PIN, you can specify the PIN number in the Badge tab submenu. In the example below, the PIN number 3210 was entered for the Card Code PIN code (four numbers) e. Modify other fields in the menu as needed. Click the tabs in the lower in the lower part of the menu to enter other personal information including a pin code (Badge), username and password (Role). 3. Repeat these steps for each Person you wish to create. Each time you create or update a Person or their profile, the information will be automatically sent to each Door. NOTE If you see a rippled red line in a field, hover the cursor over that field and a message will appear explaining the problem. Correct the problem and try again Change the Admin password To improve the security of your system (and facility), it is strongly recommended that the admin user password be changed from its default (admin). The admin password is specified in the admin user dialog. To change the admin password: 36
43 SECTION 3: CONFIGURE INTELLI-M ACCESS 1. Open the admin user edit menu: Click Home (in the upper right corner, if shown), click the People (tab), then double-click the admin user entry. The admin user entry is similar to that shown below. admin user entry The admin user entry will open in an Edit Person window. 2. Click on the Role tab to open the Roles submenu. 3. Enter a new password in the Password and Re-enter Password fields, then click Save. You will be automatically logged out. 4. Log back in using the new password. Intelli-M Access V4.0 User Manual 37
44 SECTION 3: CONFIGURE INTELLI-M ACCESS 3.7 Create an Access Privilege An Access Privilege is a Rule in Intelli-M Access that grants people (or group(s)) access to a zone. A Zone can be viewed as the physical space which the Door boarders in your facility, floor, or room. Initially, Intelli-M Access includes two zones: Inside and Outside. To create an Access Privilege: 1. Open the Create Rule menu: Click Configuration (in the upper right corner, if shown), click the Rules (tab), then click the Create Rule link under Actions on the left side of the window. A blank Create Rule configuration menu, similar to that shown below, will open. 2. Open the Type drop-down list and select Access Privilege, if not already shown (see above). 3. Choose a Schedule. Click the Schedule tab, then click the radio button for the schedule(s) for when you want to apply the rule. Initially, there may be only two options: Always (24 x 7 x 365) and Never. Click the radio button for the schedule(s) you want to apply to the rule. 38
45 SECTION 3: CONFIGURE INTELLI-M ACCESS Create Rule Popup Dialog 4. Choose a Group. Choose the Everyone Group. All the People you created earlier belong to that Group. 5. Choose a Zone. Choose the Inside Zone. The perimeter Doors you created have their card readers providing access to the Inside Zone. 6. Click Create to save the new Access Privilege. 7. Click on the Doors tab. Notice that the Door or Doors created earlier each have a yellow triangle in the Status column, indicating that the configuration for that Door has changed and the Door needs to be updated. Click the Update or Update All Action link to update the door controllers. Congratulations! Your doors are now locked and secured, granting access to the cardholders you created. 3.8 Additional configuration steps for your facility Subsections earlier in this chapter include the basic setup steps for configuring the Intelli-M Access system. Intelli-M Access is very flexible, and can be tailored to almost any facility and its occupants for secure access. To refine your configuration setup, consider the following: Intelli-M Access V4.0 User Manual 39
46 SECTION 3: CONFIGURE INTELLI-M ACCESS Create unlock schedules tailored to work groups and the way the facility is used. For instance, special schedules can be setup for a warehouse, for the cleaning crew, for manufacturing, for the research group, for the finance group, etc. On the Doors page, create new Behaviors. Door Behavior declares a door s unlock schedule and the mode of the attached card reader(s), such as Card Only mode or Card plus PIN mode. Assign the unlock schedules to the Behaviors. On the Persons page, create Groups of the types of people ( Cleaning Crew, Executives, Sales, etc) that share the same work hours or use the same areas (zones) of the facility. Perhaps name each Group with the type of access they have ( 9am to 5pm, Weekend Access, Research lab, etc). Create Zones that represent areas on the Doors page (Zones View). Assign these new Zones to doors by editing them on the Door page. Some doors certainly don t just border inside and outside, but probably have other floors, interior doors, and so on, that need securing. Finally, unite of these new configuration elements together with new Access Privileges. Create Access Privileges in the Rules page to grant access each Group, Schedule and Zone you created. 40
47 SECTION 4: USER INTERFACE SECTION 4 User Interface This chapter describes each segment of the user interface in detail. 4.1 Page layout The Intelli-M Access user interface is organized into two sections, the Home section and the Configuration section. All users are allowed access to the Home section, and only Administrators are allowed access to the Configuration section. Home section The Home section contains the following pages: Events page - Displays events generated by the system in real-time. People page - Displays all credential holders in the system. Allows you to create, modify, and delete People. Reports page - Displays built-in and custom reports. Generates reports in PDF format for easy view and printing. Doors page - Displays the system s Doors. Provides real-time status of door lock and open/close state. Optional Views and Actions Tabs for pages Click for Configuration section Page information Intelli-M Access V4.0 User Manual 41
48 SECTION 4: USER INTERFACE Configuration section The Configuration section, found as a link in the upper right corner of the Home section, contains the following pages: Doors page - Displays the system Doors. Allows you to create, modify, and delete Doors. Schedules page - Displays the system Schedules. Allows you to create, modify, and delete Schedules and Holidays. Groups page - Displays all Groups in the system. Allows you to create, modify, and delete Groups. Peripherals page - Displays third-party devices added to the system. Allows you to create, modify and delete Peripherals. Customize page - Displays custom fields for People. Allows you to create, modify and delete custom fields. Optional Views and Actions Tabs for pages Search text box Click for Home section Page information Paging controls Page Content Area All pages in the system, except for the Login Page, share a similar layout. Each page contains a Content Area which is the white portion of the user interface, tabs to select the page you want to view, and View and Actions menus specific to the page type. Content Areas have a paging feature for People, Groups, Doors, etc, which will display additional content on subsequent pages. Content Areas that use paging will have paging icons in the lower left portion of the Content Area. Click on the paging icons to move forward or backward through pages, or directly enter the page number to view. 42
49 SECTION 4: USER INTERFACE A search text box in the upper right corner of the content area is available to filter the items in the view. Only those items that partially or completely match the text you entered will be displayed. You can return to the unfiltered view by clearing the contents of the search box. A sorting list box in the upper right corner of the content area is available to sort by other than Last name. The sorting choices are determined by which page you are viewing. Some Content Areas also contain sub-views that provide a different perspective of the current View. For example, the Doors Page allows you to view the Doors by their list of Zones or by their IP and MAC Addresses. These sub-views are presented in the Content Area as a drop-down list box. Depending on the page, there may be sorting options in the content area. In addition, the People and Doors pages contain a search text box to limit the display of People or Doors by the search criteria. The Views menu contains a list of one or more ways you can view the data shown in the content area. You may wish to view the content in different ways. For example, on the Doors Page you can view Doors by the Door names, by the Zones they border, or by Door Behaviors. The Views menu does not modify data, it merely changes the format of the data displayed. The Actions menu contains a list of one or more commands you can perform to the content. Examples of an Action are unlocking a Door, creating a Person, etc. You can refer to the Actions menu see what commands are available for that particular content, or right-click on an item in the content area to open a list of available Actions. 4.2 Login to Intelli-M Access On the server desktop To login to the Intelli-M Access at the Intelli-M Access server, click Start All Programs infinias Intelli-M Access to open your web browser and point at Intelli-M Access. An Authentication screen will appear. NOTE When using Windows Internet Explorer to login to Intelli-M Access, ensure that the browser is setup for compatibility mode. From a computer on the same network (LAN) as the Intelli-M Access server To login to the Intelli-M Access server from another computer on the same network, or if Intelli-M Access is on a server you can reach with an IP address: address of server> For example, http: // Intelli-M Access V4.0 User Manual 43
50 SECTION 4: USER INTERFACE Intelli-M Access Login page The default username is admin, and the default password is admin. For improved security of your system, we strongly encourage you to change the admin password. 4.3 Events page The first page you will always see when you login to the system is the Events page. An example is shown below. 44
51 SECTION 4: USER INTERFACE Events page The Events Page contains the last 100 events and alarms that were processed by the system. Events tagged as Alarms are highlighted in red. The Events Page contains 5 columns, each describing a single aspect of the event: Location - Describes where the event occurred. This is usually the name of a Door or Peripheral, if the location is known. Views Full Name - Describes the name of the person that initiated the event, if the event was initiated by a person and that person s name is known. A large number of events are generated by a Door or Peripheral. If a card swipe event occurred, but the person s name is not known, the site code and card number are displayed. From and To - Describe the Zone that the Person exited (From) and entered (To), if applicable. These fields contain information only when a Person has passed through a Door via a valid credential operation. Event - Name of the event that occurred. An event is usually named with two parts: a general description, such as Access Denied, and a reason for the event, such as Unknown Card Number. Date - Displays the date and time when the event occurred. The Events Page presents two Views on the events: Events - The default View is the Events view. It shows the Events as described above. Intelli-M Access V4.0 User Manual 45
52 SECTION 4: USER INTERFACE Muster - The Muster view displays all of the Muster Zones and the People that used their credentials to gain access into those Zones. You can keep track of cardholders in real-time by identifying important Zones with the In (or Out) Muster attribute when you create your Zone(s). This View is where you can track the cardholder movement. Actions Actions available on the Events page include: Pause Events - Allows you to temporarily stop updating the Events list to prevent the current list of Events from scrolling off-screen. When paused, the menu title will change to display Resume Events. Click Resume Events to return to normal logging. Track Last Event - When enabled, events generated by a Person, such as a valid credential swipe, will display the picture associated with the Person that generated the event. A check mark is displayed next to the menu title when the feature is enabled. Disable Track Last Event if you do not have pictures, or if you do not want to see pictures appear on events. Track Last Event is enabled by default. 4.4 People page The People page is where you can create, modify and delete credential holders and Intelli-M Access users. The to create, edit, or delete people on this page, you must be assigned an Administrator or Human Resource role. Groups can be created only by someone with an Administrator role. The People page is shown below: 46
53 SECTION 4: USER INTERFACE In Intelli-M Access, a Person is defined as a user that has either a card or key fob-style credential to gain access to secured areas, or an operator credential (also known as a Role) to gain login access into the Intelli-M Access system. A Person can have both types of credentials Views and Actions The People page allows for two different viewing perspectives of the credential holders: Person View - Displays the first 100 People in the content area, sorted by last name. Click the paging icons in the lower left corner of the Content Area to change pages. The Search text box is used to find people whose First name, Last name, Site Code, or Card Number contains the character string entered in the box. If nothing is entered in the Search text box, the Sorting list box is used to sort all people by First Name, Last Name, Card Number, or Card Status. Click the green arrow to the right to reverse the order of the search. If nothing is entered in Search text box or selected in Sort, People are sorted by last name. Selecting the Person View opens a set of related Actions to manage those holding credentials in the system. You can create, edit, delete, view, print badges for and display the events relate to a card holder in the system, and deleted from the system. Groups View - Displays the first 100 Groups in the content area, sorted alphabetically. Click on the paging icons in the lower left corner of the Content Area to change pages. The search text box will display Groups whose names match the text you entered. The sorting list box provides no additional sort options for Groups other than Name. Double-click on a Group name to list the members of the group Selecting the Groups View opens a set of related Actions to manage groups and group membership. Groups are comprised by a set of zero or more persons created in the system. You can create, edit, and delete groups and control the membership of groups Create Person The Create Person menu creates a new Intelli-M Access credential holder and allows you to add the Person one or more Groups. See below: Intelli-M Access V4.0 User Manual 47
54 SECTION 4: USER INTERFACE Create Person dialog The Create Person dialog includes five sections: Summary section - Contains the person s name, card number, picture, and other information. Enter at least a First Name, Last Name, Site Code and Card Number. All other fields in this section, including the tabbed sections, are optional. Contact tab - Contains contact information such as phone numbers and addresses, Company Name, Job title, and other contact-related items. See below. 48
55 SECTION 4: USER INTERFACE Create Person dialog, Contact tab The fields that contain drop-down list boxes remember what you previously entered. This saves when you create new People in the system who have the same Company Name, Department, Office, etc. Most information you enter into the Contact area is for your use only. Intelli-M Access uses only the Primary and Secondary fields when a Rule(s) is constructed to send to members of a Group(s). The Primary and Secondary addresses are used as the destination addresses when the Rule is executed. Badge tab - Contains a more detailed version of the card number information. It allows you to activate, deactivate and expire card numbers, and create multiple card numbers for a Person. If you already entered a site code and card number in the summary section, you ll see that card entry in the Badges tab too. To create additional credentials, click the Add button. Click on the fields you need to edit, such as the Site Code and Card Code fields and enter the proper values. You can also update fields of the first card number in this section. Intelli-M Access V4.0 User Manual 49
56 SECTION 4: USER INTERFACE Create Person dialog, Badge tab NOTE When you create multiple credentials for a Person, all credentials are assigned the same access rights. If you give credentials to a person that needs separate access rights, create a new Person for them. To assign a Person a PIN in a Card + PIN credential, enter a value in the Pin Code field. To give the Person a PIN in a PIN-only credential, do not enter the PIN in the Pin Code field; enter the PIN in the Card Code field, using zero (or the keypad s default Site Code) for the Site Code field. Credentials tab - for systems licensed to use Mobile Credentials, use this tab to setup the permissions and authentication codes for the person. Groups tab - the Groups tab contains the list of Available Groups in the system, and a list of Groups of which the Person is a member. It allows you to add or remove the person to or from membership in a Groups. Adding a Person to a Group means that Person is allowed access to all Zones in which that Group was given access. To add or remove in a group: a. Click the Groups tab. b. Click the name of the Group to which you want to change person s membership. c. Click the icon on the right of the Available Groups ( u or t )column to move the group name to the right or left. 50
57 SECTION 4: USER INTERFACE To find a Group name in a long list of Groups, click the mouse anywhere in the Available Groups column and start typing the name of the Group. The Group whose name most closely matches what you type will be automatically selected. Role tab - The Role tab provides a menu for granting the person Intelli-M Access login credentials. Four levels of access are provided: None: No access. Most card holders have this access level. User: A User privilege provides read-only access to the Intelli-M Access system. A User cannot make any configuration changes. Human Resources: A person with HR privilege includes all User access privileges and can use all features of the Create and Edit Person menus except the ability to assign persons Administrative access privileges. With the HR access privilege, you can assign others HR and User privileges. Administrator: Administrator privilege can perform all functions within Intelli-M Access. Custom Fields - Contains a list of all Custom Fields created in the Configuration section, and a place for you to provide the values for those fields. These values are ignored by Intelli-M Access, and will be specific to this Person. Change Image To add or change the person s picture, click Change Image. A Select Image popup will appear: Intelli-M Access V4.0 User Manual 51
58 SECTION 4: USER INTERFACE Select Image Popup Click Browse..., then navigate to an image on your hard drive or shared network drive. Valid image files are GIF, JPEG, and PNG. There is no size limit to these images, they will be scaled to fit the capacity the database. Check the Preserve aspect ratio? box if you want to keep the picture aspect ratio and prevent distorting the image. When the aspect ratio is preserved, there may be black bars on top or bottom to fill a void space. Clearing this checkbox will force the entire image box to be filled, at the expense of possibly distorting the image to compensate. Print badge To print a badge of this Person, click Print Badge button. A Print Badge dialog will appear as shown below: Print Badge dialog The Print Badge dialog shows the badge design selected in a Select Badge drop-down list box and rendering for the person. You can select a different badge design template after opening the Select Badge drop-down list. Click the Save or Print buttons at the top of the window to save the badge as a PDF file or to send it to a printer. Click Close when done. 52
59 SECTION 4: USER INTERFACE Badge designs can be created using Microsoft Report Builder 3.0 (a free tool) and appear as items on the Reports page. Instructions for creating your own Badge layouts is described in a document which can be downloaded from the infinias website. NOTE Because the report is generated from the information found in the database, changes to the Person s data, including the picture, are not reflected in the badge until you saved your changes (by clicking Create or Save on the dialog). Click Create to create the Person. When you click Create, data about the person is transmitted to all relevant doors Edit Person To modify a Person, click on (to highlight) the Person and then click the Edit Person in the Action list. You can also doubleclick the Person item to open the edit window. The Edit Person dialog is the same as the Create Person dialog, except that all of the relevant fields are populated with data entered earlier. After updating the person s data, click Save to retain your changes and transmit them to all relevant doors Delete Person To Delete Person a person, click on (to highlight) the Person and then click the Delete Person in the Action list. A confirmation popup will appear; click Yes to deleted the person from the system and deactivate that person s card on all doors. NOTE Deleting a Person does not remove them from the database. Instead, the Person is marked as Deleted. This allows you to run reports and view events generated by the Person before they were deleted from the system View Person Use this action to view a Person s information without changing personal data Print Badge You can print a Person s badge by first clicking on the Person and then clicking the Print Badge in the Action list. This will present the same popup dialog as shown when you are creating or editing a Person and you click Print Badge. Refer to the Create Person section for more information Get Events To get all events generated by a Person, click on (to select) that Person, then click Get Events in the Action list. A popup dialog will appear. See below. Intelli-M Access V4.0 User Manual 53
60 SECTION 4: USER INTERFACE Events for a Person This dialog will display all events ever generated by this Person, with the first 100 events in a paged view. The same paging icons will be visible for you to page through the events in the same manner as other paged views. Click Close to close the window. Actions (Groups View) Actions for Groups are available only to Administrators. The following section describes the commands: Create Group Groups can only be created by those with an Administrative role. When you create a Group, the group information is not automatically sent to the door. You must update the door on the Doors page in to send this Group and its membership to the relevant doors. To create a Group: 1. In the People page under the Views menu, click Groups. 2. In the Actions list, click Create Group. A Create Group Dialog will appear: 54
61 SECTION 4: USER INTERFACE Create Group dialog 3. Enter a name for the group in the Group Name box. In the example above, the group is named Spring team. 4. Click (to select) a name in the left column you want to add to the group, then click the add icon, u, to pre-assign them to the group. In the example above, three names are being assigned to the group. 5. After all members of the group are pre-assigned, click Create to form the group Edit Group To change the membership of an existing group, different methods are available. You can remove a single individual from a group in the Edit Person menu Groups tab, or remove several people at once in the Edit Group menu. When changes are made to a group, they are automatically sent to all relevant doors. To use the Edit Group menu: 1. In the People page under Views, click Groups. 2. Click (to select) the Group you want to edit, then click Edit Group. You can also double click on the group name to open the group setup screen in an edit window. In this example, the Spring team group was selected. Intelli-M Access V4.0 User Manual 55
62 SECTION 4: USER INTERFACE 3. Click (to select) a name in the left column you want to remove from to the group, then click the icon, u, to pre-remove them from the group. In the example above, one name is being removed. 4. Click Apply to remove the name(s), or click Save to remove the names and close the menu. NOTE In the Create Group and Edit Group menus, the Name list includes up to 100 People on the page. Use the paging icons at the bottom of the window to see other names list. Also, you can find a name on the current page by clicking inside the Person list column and start typing part of the name. The closest match will be automatically selected Reports page The Reports page is where you view and run Intelli-M Access Reports, as shown bewlow: 56
63 SECTION 4: USER INTERFACE Reports page Intelli-M Access uses Microsoft SQL Reporting Services for creating reports. Microsoft SQL Reporting Services ( Report Server ) is installed as part of Microsoft SQL Server 2008 R2. A report in Intelli-M Access is a Microsoft SQL Report Definition (.RDL) file. Each report shown on the Reports page is represented by an RDL file that was published (transferred) to the Report Server. You can create your own reports by using Microsoft SQL Report Builder 3.0, a free download from Microsoft s website. A separate document explaining how to make custom reports is available on the infinias website. All reports are generated in the PDF file format. On the Reports page, the only View listed is the Reports view, and the only Action is Run Report. To run a Report, click the report of interest and then click Run Report, or double-click the report. A Report Parameters dialog will appear: Intelli-M Access V4.0 User Manual 57
64 SECTION 4: USER INTERFACE Report Parameters dialog The main content of the Report Parameters Dialog is a list of the first 100 People or Groups, depending on the report selected. You can use the paging icons at the bottom of the window to find a different entry. Some Report Parameter windows allow you to enter a start, end time, and other options. When all options are entered (or selected), click the Generate Report. A window will appear that contains the report as a PDF document. From that window, you can print the report or save it to a PDF file. NOTE If, after generating a report, a pop-up window with a File Open/Save dialog appears, the result cannot be opened with a PDF reader. Please install Adobe Reader, and then regenerate the Report. Intelli-M Access includes the following built-in reports: Audit Log - The Audit Log report provides tracking information on the most common Administrative tasks, such as creating, modifying, or deleting People, Groups, Doors, Zones, etc. for the selected time range. To must have an Administrator role to generate this report. Logo Badge (landscape) - The Logo Badge is one of the two built-in badge reports provided by Intelli-M Access. The Logo Badge is a report that displays your company logo along with Person information in a landscape layout. You can modify this report to include your specific company logo and information. No time range or other parameter input is required. Picture Badge (landscape) - The Picture Badge is the other built-in Badge report provided by Intelli-M Access. The Picture Badge is a report that displays the Person s image along with other Person information. You can modify this report to make it look exactly as you need. No time range or other parameter input is required. Picture Badge (portrait) - The Picture Badge is a portrait version of the Picture Badge (landscape). The Picture Badge is a report that displays the Person s image along with other Person information. You can modify this report to make it look exactly as you need. No time range or other parameter input is required. Barcode Sample - The Barcode Sample is a special report whose content explains how to add barcode fields to any report, particularly Badge reports. Run this report to view the example and instructions. No time range or other parameter input is required. 58
65 SECTION 4: USER INTERFACE Cardholder Detail - The Cardholder Detail report displays a summary of the Persons contact information, along with their picture, and a list of all events generated by the selected Person(s) during the time range you selected. Event - The Event Report displays all events generated by the selected Person(s) during the time range you select. Group Report - The Group Report displays all Groups and the members of each Group. Privileges - The Privileges Report displays a matrix of all Access Privileges in the system, showing the Groups, Schedules and Zones in an access matrix. Zones and Doors - The Zones and Doors Report lists all Zones and a summary of all Doors in each Zone. 4.5 Doors page - Home section The Doors page in the Home section lists all doors and their connection, lock, and open/close status, and list Zones. On this page, you can lock and unlock doors, update the door configuration, and display events for each door. Layout format select Search and Sort options Page select controls Refresh Connection Status Lock Status Open/Close Status Home section Doors page Intelli-M Access V4.0 User Manual 59
66 SECTION 4: USER INTERFACE The Doors page lists up to 100 doors in a page. Paging icons at the bottom of the window enable you to display different pages of door, and refresh the display. You can also use the search boxes at the top of the window to find a specific door or sort the list by name, status, zone, etc. All users are allowed access to the Doors page. To configure Doors, see the Doors page description in the Configuration section Views The Doors Page includes two different Views: Doors View - The Doors are displayed in a list format, showing summary information about each Door, including Door Status. In the content area, open the Layout drop-down list to select one of the following layout formats: Grid Layout - The default layout, it shows the Door Name, the In Zone (the Zone that Reader One provides access to), the Out Zone (the Zone that Reader Two provides access to), and the Door Status icons. Condensed - A layout that shows just the Door Name and the Door Status icons in a condensed format in order to display the most number of doors in the content area. Device View - A layout that shows the Door Name, IP Address, MAC Address, Serial Number, and Door Status icons in a list format. Zones View - The Zones are displayed in a card format, where each Zone lists the names of all Doors that borders that particular Zone Actions (Doors View) The Doors Page allows for many Actions in the Doors View. They are: Lock All Doors - Sends the Lock Doors command to all Doors in the system. The Door Status icons will update. Lock Doors - Select one or more Doors, then click the Lock Doors Action. The selected Doors will lock and the Door Status icons will update. Revert to Schedule - Select one or more Doors and then click the Revert to Schedule Action to return those doors to their normal lock/unlock Schedule. The doors will lock or unlock depending on what is scheduled for that time of day. Momentary Unlock - Select one or more Doors and then click the Momentary Unlock Action to unlock the door for a few seconds. The Action is the equivalent of a Request To Exit. The Door will unlock for the same duration that it stays unlocked for a normal valid credential access condition (typically 4 seconds). Unlock Doors - Select one or more Doors, and click the Unlock Doors Action to unlock the specified Doors. The Doors will unlock, and the Door Status icons will change accordingly. 60
67 SECTION 4: USER INTERFACE Get Events - Select a Door, and click the Get Events Action to retrieve all Events generated by that Door. A popup window will appear that contains the Events, similar to the Events popup dialog described earlier. The first 100 Events will be displayed, and the usual paging icons will be available for you to navigate through the remaining Events Actions (Zones View) The Doors page allows for two Actions while in the Zones View. They are: Lock Doors - Select one or more Zones, and click the Lock Doors Action to unlock all Doors within those Zones. The Doors will lock, and the Door Status will update. Door status can be seen in the Doors View. Revert to Schedule - Select one or more Zones, and click the Revert to Schedule Action to revert all Doors within those Zones to their normal lock/unlock schedule. The doors will lock or unlock depending on what is scheduled for that time of day Door Status Icons Three columns of status icons, representing the Connection status, Lock status, and Open/Closed status are provided on the Doors page. These icons represent the current states of the door. A legend of the icons is included on page. If you hover the mouse over an icon in the legend, the definition of the icon is shown. Connection Status icons The left icon column displays the connection status of the Door. This column will display either a circle icon or a triangle icon. If the icon is a circle, then the icon represents connection status. If the icon is a triangle, then it represents a door update status. Green circle: The door is fully operational and the connection is active. This is the desired idle condition. Red circle: The door is offline. The server cannot connect to the door Orange circle: The door is initialization, establishing a connection Intelli-M Access V4.0 User Manual 61
68 SECTION 4: USER INTERFACE Yellow triangle: Someone made a configuration change to the system, such as creating or modifying Access Privileges, creating new Groups and assigning them to Doors, etc. You must update the door to return the icon to its normal idle condition (Green Circle). Red triangle: The update operation failed. Try again to update the door. If the retry fails, investigate recent changes to the door what could contribute to the problem. If you cant resolve the problem, contact infinias Technical Support for assistance. Blue triangle: An update is in progress. During the update, cardholder access is not available. Normally, the icon will change to a Green Triangle within 30 seconds. Green triangle: The door update is in progress, but cardholder access is available. Cardholder status ID is available if a valid Credential Management Rule is visible on the Rules Page. If a Credential Management Rule running, cardholder access will not be available until the status icon changes to a Green Circle. You can create a Credential Management Rule on the Rules Page. Lock Status The middle icon column indicates the lock status of the door. Usually the door is in one of only two lock states - locked or unlocked. However, seven icons are provided to give more information about the lock state. When locked, the possible icons are: Green with Horizontal Bar: The door is locked and is running its normal (un)lock schedule. Yellow with Horizontal Bar: The door was locked by manual intervention, such as the Lock Door Action or a Rule that locks the door. You can return to normal Blue (or Green if normal is locked ) condition by clicking the Revert To Schedule Action. Red with Horizontal Bar: The door is in lockdown state and no card access or REX (request to exit) button access is allowed. You can return to normal Green (or Blue if normal is unlocked ) condition by clicking the Revert To Schedule Action. Gray with Horizontal Bar: The door was locked and is being updated. The current lock state cannot be assured. Blue with Vertical Bar: The door is unlocked and is running its normal (un)lock schedule. Yellow with Horizontal Bar: The door is unlocked, but was unlocked by some manual intervention, such as an Unlock Door Action or a Rule that unlocks the door. You can return to normal Green (or Blue if normal is unlocked ) condition with the Revert To Schedule Action. Gray with Horizontal Bar: The door was unlocked and is being updated. The current unlock state cannot be assured. 62
69 SECTION 4: USER INTERFACE Open/Close Status The right most icon column displays information about the open/closed status of the door sensor, if one is attached. Generally, the door can be either open or closed. Six icons are provided to give more information about the status. These icons are: Green circle closed: The door is closed and operating normally. Gray circle closed: The door was closed and is now being updated. The current closed status cannot be assured. Green circle opened: The door is open due to someone opening the door after a valid credential access. Yellow circle opened: The door is open due to valid credential access, but has been open too long (typically more than 45 seconds). Red circle opened: The door was forced open without proper credential access, or was opened from the inside without a motion sensor REX (request to exit button) to notify the door that someone is exiting, or the door was held open for more than 60 seconds. Gray circle opened: The door was open and is now being updated. The current open status cannot be assured. 4.6 Doors page - Configuration section Use the Doors page in the Configuration section to create, modify, or delete a Door, and update their configuration. The Configuration section is for use by those assigned the Administrators role. To open the Doors page in the Configuration section, click Configuration in the upper-right corner of the window, if present, then click the Doors tab. The Doors page is shown below: Intelli-M Access V4.0 User Manual 63
70 SECTION 4: USER INTERFACE Layout format select Search and Sort options Page select controls Refresh Connection Status Lock Status Open/Close Status Configuration section Doors Configuration Page The Doors page lists up to 100 doors in a page. Paging icons at the bottom of the window enable you to display different pages of door, and refresh the display. You can also use the search boxes at the top of the window to find a specific door or sort the list by name, status, zone, etc. Views The Doors Page includes three different Views: Doors View - The Doors are displayed in a list format, showing summary information about each Door, including Door Status. In the content area, open the Layout drop-down list to select one of the following layout formats: Grid Layout - The default layout, it shows the Door Name, the In Zone (the Zone that Reader One provides access to), the Out Zone (the Zone that Reader Two provides access to), and the Door Status icons. Condensed - A layout that shows just the Door Name and the Door Status icons in a condensed format in order to display the most number of doors in the content area. 64
71 SECTION 4: USER INTERFACE Device View - A layout that shows the Door Name, IP Address, MAC Address, Serial Number, and Door Status icons in a list format. Behaviors View - This view displays the Door Behaviors created in the system. A Door Behavior is a characteristic defined by a combination of an unlock schedule and a card mode (Card only, Card + Pin, etc. ). Zones View - The Zones are displayed in a card format, where each Zone lists the names of all Doors that borders that particular Zone. Actions (Doors View) The Doors page provides many Actions in the Doors View. They are described in the following subsections Create Door To add a door to Intelli-M Access, click the Doors view, then click the Create Door Action to open the popup dialog shown below. To use the Create Door dialog: Create Door dialog Choose a Door Name. Enter a descriptive name such as Front Door, Lobby Door, etc. Choose a Device. Leave the select at its default for this example. Choose a Time Zone. The doors can be located in different time zones. Choose the time zone where the door controller is located, if you prefer; Intelli-M Access will adjust the time of day for doors in different time zone. Intelli-M Access V4.0 User Manual 65
72 SECTION 4: USER INTERFACE Choose a Door Behavior. Open the Door Behavior drop down list and select the behavior most fitting for the door. A Door Behavior is a characteristic defined by a combination of an unlock schedule and a card mode (Card only, Card + Pin, etc. ). See Door Behavior later in this section. Select the two Zones that the Door borders. The Secured (Inside) Zone represents the physical space that you want to secure access. The Unsecured (Outside) Zone represents the physical space that is unsecured, and is where the proximity card reader ( IN Reader ) will be located that grants access to the Secured Zone. If you have 2 readers, configure the second reader ( OUT Reader ) as described below. Choose an IP Address. The IP Address combo box will contain all door controllers that were automatically discovered by the system. All controllers that are on the same subnet as the Intelli-M Access server are discoverable. Controllers outside the subnet (i.e. with a router between the controller(s) and the server) are not automatically discovered. If the IP Address of your device is not found, enter the IP address of the controller in the combo box. Choose a Serial Number. If you chose an IP Address that was discovered, the Serial Number combo box will show the serial Number for you from its list of discovered devices. If you manually entered an IP address in the IP Address combo box, then enter the serial number of the device shown on the controller. Click Test Connect. (Optional) Use this option can confirm that the IP Address and Serial Number are correct. If the Test Connect fails, then make sure you can ping the controller and connect to it with a web browser. If Test Connect fails after all connectivity issues are resolved, contact infinias technical support for assistance. Choose a Door Type. The door type is defined application of the door controller at the door. It describes how the controller is wired to other door components. Several door types are loaded in the system together with a wiring diagram for each. If your door has a door contact sensor, connect that sensor to Input 1 ( IN1 ) on the controller, and choose 1 or 2 Reader IN1 Normally Closed Door Type. If you do not have a door contact sensor, or if you sensor is a Normally-Open sensor, choose 1 or 2 Reader IN1 Normally Open Door Type. You may also click the Diagram button to view a superset of connection and wiring options. Choose the 2nd Reader. If you have only one card reader, or if you have two card readers, one on each side of the door to secure access in both directions, leave this choice in its default setting ( is not used or provides access in opposite direction ). If you are connecting both card readers on the same side of the door, choose provides access in same direction as Reader 1 (IN reader). If you do not know the answer, leave this choice in its default setting. Click Create, then wait a few seconds. The Door will appear in the main Doors viewing area and eventually display three status icons. The left-most icon should be a yellow triangle, a normal indication for the creation of the Door. If there is only one status icon, a red circle, the system could not communicate with the Door using the information you provided. If this occurs, please refer to the Troubleshooting section at the end of this document for assistance. NOTE if you create or update a Door and you see a red squiggly line in one of the fields, hover the cursor over that field and a message will appear explaining the problem. Correct the problem and try again Edit Door To modify a Door configuration, select a Door and then click the Edit Door Action, or double-click on the Door. An Edit Door popup dialog will appear. The entries for this dialog are similar to the Create Door dialog described in Create Door on page 65. Make the changes you require, then click Save. The Door Status Connection icon will change to a yellow triangle, indicating that the Door needs to be updated. 66
73 SECTION 4: USER INTERFACE Delete Door To delete a Door, select the Door to delete and click the Delete Door Action. A confirmation message box will appear, and the Door will be deleted after the confirmation. This action does not remove the Door; it marks as Deleted in the database so that Reports and Events will show the door existed. NOTE If you are replacing a non-functional controller, do not delete the door and re-create it. Simply Edit the Door and change the IP Address and Serial Number Update All Click the Update All Action to update all Doors at once. The Door Status Icons will be updated to reflect the proper state during the update procedure. If you have dozens or hundreds of Doors, you may see that the Doors are updated in bunches of 20 to 60 at a time. This is by design Update Modified Click the Update Modified Action if you wish to update only those Doors who are displaying the yellow triangle icon, denoting that the door needs to be updated. The Door Status Icons will be updated to reflect the proper state during the update procedure. If you have dozens or hundreds of Doors that need updating, you may see that the Doors are updated in bunches of 20 to 60 at a time. This is by design Update Select one or more Doors and click the Update Action if you wish to update a select few (or one) Doors at a time, rather than all at once. The Door Status Icons will be updated to reflect the proper state during the update procedure Get Events Select a Door, and click the Get Events Action to retrieve all Events generated by the Door. A popup window will appear showing the door events. The first 100 events will be displayed. Paging icons at the bottom of the window can be used to view pages of earlier events Create Behavior In the Behaviors view, click Create Behavior action to create a new Door Behavior. A Create Behavior popup dialog will appear, as shown below. Intelli-M Access V4.0 User Manual 67
74 SECTION 4: USER INTERFACE Create Behavior dialog Provide a Name for the Behavior. This is the name that will appear in the Door Behavior drop-down list box in the Create/Edit Door dialog. Choose a Schedule. This Schedule will be used for determining when the Door is to be unlocked and locked. The Door will be unlocked wherever the Schedule shows blue, and will be locked wherever the Schedule shows white. If there is no Schedule that satisfies this Doors unlock requirements, you can create a new Schedule, which is described later in this chapter. Choose a Card Mode. The Card Mode determines whether the cardholder will be granted access with only a card (or key fob) swipe, only a PIN entry, or both access card and PIN entry. Select Card Only for card-only or PIN-only access, and Card + PIN for card plus PIN access requirements. NOTE When you choose Card Only for PIN-only entry, enter the PIN number as the Card Number when creating your Person cardholders. Do not enter the PIN into the PIN Code field - this field is for Card + PIN configuration. Please refer to the Person configuration section for more information on PIN code entry. Click Create to create the new Behavior Edit Behavior Select a Door Behavior, and click the Edit Behavior Action, or double-click on a Door Behavior, to modify an existing Behavior. An Edit Behavior popup dialog will appear, similar to the Create Behavior dialog shown above, with the Behavior information populated in the fields. Simply change the configuration items you require, and press the Save button to update your Behavior. NOTE When you modify a Behavior, all Doors that are configured to use this modified Behavior will show the Yellow Triangle, indicating that they need to be updated Delete Behavior To delete a Behavior, select a Door Behavior, then click the Delete Behavior Action. A confirmation message box will appear, and the Behavior will be deleted after confirmation. 68
75 SECTION 4: USER INTERFACE NOTE Door Behaviors can be deleted only when there are no Doors configured to use this Behavior. If you get an error popup dialog indicating that one or more Doors are configured for this Behavior, assign a different Behavior to those Doors, then delete the Behavior Create Zone Select the Zones View, then click the Create Zone Action to create a Zone. A Create New Zone popup dialog is shown below: To create a Zone: Enter a Zone Name. Provide a name for the Zone. This name will appear in the Create/Edit Door popup dialog in the dropdown list boxes that reflect the available Zones. Choose a Muster State. (Optional) To list all credential holders who entered this Zone (on the Events Page), choose the Inside Muster Zone in the drop-down list box. To list all credential holders who exited this Zone, choose the Outside Muster Zone. If you are not concerned about movement in this Zone, select Unknown. After entering the configuration above, click Submit to create the Zone. The Zone will immediately be visible in the Content Area, and will also be available when creating or modifying Doors Edit Zone To modify a Zone name or its Muster attribute, select the Zone and click the Edit Zone Action. An Edit Zone popup dialog, similar to the Create New Zone dialog, will open. Make the needed changes and then click Submit. Changing a Zone name or Muster state does not affect the Door controller Delete Zone To delete a Zone, click the Zone you want to delete and click the Delete Zone Action. A delete confirmation message box will appear, and the Zone will be deleted after confirmation. NOTE If you try to delete a Zone that has Doors bordering that Zone, an error message will appear with this information. First, assign the Doors to other Zones, then delete the Zone. Intelli-M Access V4.0 User Manual 69
76 SECTION 4: USER INTERFACE Update Select one or more Zones and click the Update Action to update all Doors that border the selected Zones. The Door Status icons in the Doors view page will reflect the current state of the update process. 4.7 Schedules page The Schedules Page in the Configuration Section lets you create, modify or delete a Schedule, and create, modify or delete Holidays that can be applied to a Schedule. You must have an Administrator role to modify the Schedules page. Schedules configuration page Schedules are shown in 7 x 24 (hours) array format. Blue-colored blocks in the array represents an Active time bloc. Initially, two schedules are included: Never and Always (see above). They cannot be modified. In the Always Schedule every hour of every day marked Active. If this Schedule is applied to a door, the blue means the Door would be unlocked. In a Rule, blue means the Rule is allowed to execute. For a Person, blue means they will be granted access at that time block when they present their credentials. 70
77 SECTION 4: USER INTERFACE The Never Schedule implies a Door that s always locked, the Rule that would never run, and a Person that would never be granted access, even if their credentials otherwise allowed it. Views The Schedule page provides two Schedule views. They are: Schedules View - Displays the Schedules in a paged list, showing the first 100 Schedules. Paging icons are provided at the bottom of the window for navigating to other pages. Each Schedule is shown as a 7 day x 24 hour array. Each day row contains a 24 hour time range from midnight to 11:59:59 PM. Areas in the array shaded blue areas indicate the Active time. Holidays View - Displays the Holiday Sets in a card format. Each Holiday Set shows the individual Holiday days that are contained in that set Create Schedule To create a schedule, select the Schedules view, then click the Create Schedule Action. See below. Choose a Schedule Name. Enter a name for the Schedule. For example, choose Office Hours to create a Schedule that defines a 8-5 or 9-5 style office time range. Create the Active Time Range. The Active Time Range is a block of time, shown in blue, that defines when the Schedule is Active. An Active Time Range for a door means that the door is unlocked, a Person s Valid Card/Fob Swipe is accepted, etc, Intelli-M Access V4.0 User Manual 71
78 SECTION 4: USER INTERFACE during the blue portion of the Schedule. Click the cursor inside the 24-hour row for the day you wish to modify, and drag the cursor to the end of the time range. A blue rectangle will follow your cursor movement, creating the Active Time Range in blue. You can drag the cursor up or down across rows to fill in blue color across more than one day at a time. To return a time range to white, click on the blue region you wish to modify and drag your cursor across the range you want to clear. You can also single-click on a time block to change it between blue and white. The smallest increment of a Schedule is 15 minutes. You can hover your cursor over a part of the Schedule to determine the exact time of day represented by that part of the Schedule. You can create multiple time ranges in a single day. For example, you can create an Active Time Range for 8am to Noon, and another one for 1pm to 5pm, leaving the lunch hour portion in white. When applied to a Door, such a Schedule will re-lock the door during the lunch hour and unlock the door starting at 1pm. To add a holiday set, click the Add Holiday Set button, then select the holidays from the list you want to add a the schedule. Each holiday selected has its own one day schedule. Select the Active times that holiday by dragging your cursor across the time range you want to mark Active. Similarly, you can also remove holidays by clicking Remove Holiday Set. If you add one or more Holiday Sets to a Schedule, add the same Holiday Set to all Schedules. For example, if you apply a Holiday Set to a lock schedule for a Door, add that Holiday Set to the Schedule you used for cardholder access. Otherwise, NOTE when a holiday becomes the current day, the controller will not have a holiday schedule to use and will deny access with the Time Schedule error. You do need to apply Holiday Sets to the Always and Never Schedules. They will adopt the Holiday Set automatically. When you have finished configuring your Active Time Ranges, click Create to create your Schedule. Edit Schedule - To modify a Schedule, click the Edit Schedule Action. An Edit Schedule popup dialog will appear, similar to the Create Schedule dialog, except that its fields will be populated with the Schedule data. Choose a new Schedule name if you wish, and/or modify the Active Time Range using the same operations described earlier. Click the Save button to save your changes Delete Schedule To remove a schedule, remove it by selecting the schedule, then clicking the Delete Schedule Action. A confirmation message box will appear, and the Schedule will be deleted after confirmation. Actions (Holiday Set View) The Holiday Set View provides three Actions for managing Holiday Sets. They are: Create Holiday Set Edt Holiday Set Delete Holiday Set 72
79 SECTION 4: USER INTERFACE Create Holiday Set A Holiday Set is used to define a list of days whose Active time range (in blue) are identical with each other. For example, the set might include New Year s Day, Thanksgiving Day, and Christmas Day. A different Holiday Set can be constructed for different holidays, such as Presidents Day, MLK Day, Columbus Day, etc. that may have a different Active time schedule. To add a Holiday exceptions to your schedule: Create a Holiday Set that contains your list of Holidays. Click the Create Holiday Set Action to open the Create Holiday Set dialog. The dialog displays a calendar for current year. You can change the year by clicking the arrows on bar at the top of the calendar. Choose a Holiday Set Name. Give your Holiday Set a name that s relevant to the group of Holidays you will be adding to this Set. Choose your Holidays. To add a Holiday to the Set, click on a date shown in the calendar. The date you clicked will appear in a list of Holidays on the left pane. You can provide a name for that Holiday by clicking Edit at the bottom of the pane, or by double-clicking that holiday in the left pane. When you edit the Holiday, an Edit Holiday dialog will open as shown below: Intelli-M Access V4.0 User Manual 73
80 SECTION 4: USER INTERFACE Edit Holiday dialog Enter a name for the Holiday into the Name field, then click Save. You can also change the date of the Holiday in this window. You can remove a Holiday from the Set by clicking on the day a second time. The date will be removed from the list after a confirmation reply. Continue clicking on holidays in the Create Holiday Set dialog until you have chosen all Holidays whose Active time range for that day are the same, then click Create. The Holiday Set can now be applied to a Schedule Edit Holiday Set To modify a Holiday Set, click the Edit Holiday Set Action. In the dialog that opens, click on dates in the calendar to add or remove Holidays to or from the Set. Click Edit to rename a Holiday or change its date. When finished, click Save to save your changes Delete Holiday Set To delete a Holiday Set, select the set, then click the Delete Holiday Set Action. The Holiday Set will be deleted after you confirm. 4.8 Groups page - Configuration section The Groups page in the Configuration Section enables you create, modify or delete a Group. You can also add or remove members from a Group. The Groups page is shown below: 74
81 SECTION 4: USER INTERFACE The Groups Configuration Page provides the same capabilities as the Home section People page. Refer to 4.4 People page on page 46 for procedure for managing Groups and People. 4.9 Rules page The Rules Page enables you manage your Rules, which include Access Privileges. Rules are commands that can control the behavior of the Door controller and the behavior of Intelli-M Access. Rules can be divided into two types: Controller-based Rule -A Door controller-based Rule is called an Access Privilege. It is a combination of a Group ( who has access), a Zone ( where the Group is granted access), and a Schedule ( when is the Group granted access). Create an Access Privileges for each Group, Zone and Schedule combination for your system. Access Privileges are downloaded to the respective Door controllers when you perform the Update Action on the Doors Configuration page. After the Access Privileges are downloaded, the controller will operate using these rules without assistance from the Intelli-M Access server. Host-based Rule - All other Rules are considered Host-based Rules. The processing of these Rule occurs on the Intelli-M Access server (i.e. the host ). The result of the Rule may be a command to the controller (e.g. Unlock Zone ), but the decision-making occurs on the host. Use the Create Rule Action to create Access Privileges for your Door controllers, as well as host-based rules to activate functionality that is customized to your environment. The Rules Page is shown below. Intelli-M Access V4.0 User Manual 75
82 SECTION 4: USER INTERFACE Create Rule - Access Privilege Access Privilege Rules provide access privileges for Groups on Zones. By default, Intelli-M Access creates an Access Privilege for the Everyone Group to be granted access to the Inside Zone in the Always Schedule. To create an Access Privilege, ensure that Access Privilege type is selected in the Type drop-down list box. Click the Create Rule Action, and a Create Rule dialog will open. See below. 76
83 SECTION 4: USER INTERFACE Configure Access Privilege rules in accordance with the following: Create Rule dialog Select a Schedule. The Schedule specifies when the Rule is active. In other words, everywhere there is blue-colored blocks in the Schedule you choose, access will be granted. Select a Group. The Group represents the collection of People whose credentials you want to be granted access to the Zone you will choose next. Select a Zone. The Zone contains the Door(s) you wish the Group you selected to be given access. Press the Create button to create your new Access Privilege. The new Access Privilege will appear in the Access Privilege section in the Content Area. NOTE Access Privileges do not take effect until the Doors affected by the Access Privilege are updated on the Doors Configuration page. The Doors that are affected will have their Connection Status icon changed to a yellow triangle Create Rule - Event Management The Event Management Rule makes an Event visible in the Events Page. By default, all Events are visible. You can reduce the number of visible Events with this type of Rule. To filter out a single Event, you can also use the Hide Event Rule described below. Intelli-M Access V4.0 User Manual 77
84 SECTION 4: USER INTERFACE To create an Event Management Rule, click the Create Rule Action, then open the Type field and select Event Management in the drop-down list. Configure Event Management rules in accordance with the following: Select a Schedule. The Schedule specifies when the Rule is active - when the Event will be visible on the Events Page. The Event will not be visible during the inactive time range of the Schedule. Select a Group (optional). If you choose one or more Groups, the Event will be made visible only if a member of one of the selected Group(s) generated the Event. If you do not select a Group, then the Event will be visible regardless of who generated the Event. Select a Zone (optional). If you choose one or more Zones, the Event will be visible only if the Event occurred in one of the selected Zone(s). If you do not select a Zone, then the Event will be visible regardless of where the Event occurred. Select an Event (optional). All Events you choose will be visible when the Event also meets the above criteria. If you do not specify an Event, then all Events that meet the above criteria will be visible. Select an Action (optional). An Action is another type of Event, and often covers multiple of the Events you see in the Event tab described above. All Actions you choose will be made visible, provided the Action also meets the above criteria. If you do not specify an Action, then all Events that meet the above criteria will be made visible on the Events Page Create Rule - Hide Event The Hide Event Rule ensures that a specific Event will not be visible on the Events page. This Rule is useful when you need to hide only one or two Events from the Events Page. To create a Hide Event Rule, click the Create Rule Action, then open the Type field and select Hide Event in the drop-down list. Configure Hide Event rules is accordance with the following: Select a Schedule. The Schedule specifies when the Rule is active - when the Event is hidden from the Events Page. The Event will not be hidden during the inactive time range (the white area) of the Schedule. Select a Group (optional). If you choose one or more Groups, the Event will be hidden only if a member of one of the selected Group(s) generated the Event. If you do not select a Group, then the Event will be hidden regardless of who generated the Event. Select a Zone (optional). If you choose one or more Zones, the Event will be hidden only if the Event occurred in one of the selected Zone(s). If you do not select a Zone, then the Event will be hidden regardless of where the Event occurred. Select an Event (optional). All Events you choose will be hidden, provided the Event also meets the above criteria. If you do not specify an Event, then all Events that meet the above criteria will be hidden. Select an Action (optional). All Actions you choose will be hidden, provided the Action also meets the above criteria. If you do not specify an Action, then all Events that meet the above criteria will be hidden on the Events Page Create Rule - Alarm Management The Alarm Management Rule converts a specific Events into an Alarm. An alarm is indicated in the Events page as an item highlighted red. By default Intelli-M Access provides Alarm Management rules to manage the five Access Denied events. To create a new Alarm Management rule, click the Create Rule Action, then open the Type field and select Alarm Management in the drop-down list. Configure the Alarm Management rule is accordance with the following: 78
85 SECTION 4: USER INTERFACE Select a Schedule. The Schedule specifies when the Rule is active. Events that satisfy the rule criteria will be converted into Alarms only during the Active time range (blue) portion of the Schedule you select. Select a Group (optional). If you choose one or more Groups, the Event will be converted into an Alarm only if the Event was generated by a member of one of the Groups you selected. If no Group was selected, then qualifying Events generated by all Groups will be converted into an Alarm. Select a Zone (optional). If you choose one or more Zones, the Event will be converted into an Alarm only when the Event occurs in the Zone(s) you selected. If you do not select a Zone, then qualifying Events in all Zones will be converted into an Alarm. Select an Event (optional). All Events you choose will be converted to an Alarm, provided the Event also meets the criteria specified above. If you do not specify an Event, then all Events that meet the above criteria will be converted into an Alarm. Select an Action (optional). All Actions you choose will be converted to an Alarm, provided the Action also meets the criteria specified above. If you do not specify an Action, then all Events that meet the above criteria will be converted into an Alarm Create Rule - Credential Management The Credential Management rule handles any scenario where a cardholder should have been but for some reason was not. The most common example of this scenario occurs when the controller was offline during the credential download. This Rule will evaluate all Unknown Credential Status errors and apply that cardholder to the controller if that card number was supposed to be already present in the controller. NOTE This Rule will not download credentials that do not belong in the controller. Only one Credential Management Rule active on the System is needed unless there are different behaviors on different Schedules. To create a new Credential Management rule, click the Create Rule Action, then open the Type field and select Credential Management in the drop-down list. Configure the Alarm Management rule is accordance with the following: Select a Schedule. The Schedule specifies when the Rule is active. Select an Event Reason (optional). All Events you choose will be used to evaluate the cardholder s access rights, provided the Event also meets the criteria specified above. If you do not specify an Event, then all Events that meet the above criteria will be evaluated (not recommended) Create Rule - Event The Event rule sends an to one or more recipients based on the information you provide in this Rule. To create a new Credential Management rule, click the Create Rule Action, then open the Type field and select Event in the drop-down list. Configure the Event rule is accordance with the following: To create a new Event rule, click the Create Rule Action, then open the Type field and select Event in the drop-down list. Configure the Event rule is accordance with the following: Select a Schedule. The Schedule specifies when the Rule is active. Events that satisfy this rule s criteria will generate an to a list of selected recipients. Intelli-M Access V4.0 User Manual 79
86 SECTION 4: USER INTERFACE Select a Group (optional). If you choose one or more Groups, the will be sent only when a member of one of those Groups generated the Event. If you do not select a Group, the will be sent when anyone generates the Event. Select a Zone (optional). If you choose one or more Zones, the will be sent only when the Event occurred at one of the Zones you specified. If you do not select a Zone, the will be sent anywhere the Event occurred. Select a Door (optional). If you choose one or more Doors, the will be sent only when the Event occurred at one of the Doors you specified. If you do not select a Door, the will be sent for every door where the Event occurred. Select an Event (optional). All Events you choose will be ed to the recipient list if the Event meets the criteria specified above. If you do not specify an Event, then all Events that meet the above criteria will be ed to the recipients. Select an Action (optional). All Actions you choose will be ed to the recipient list, providing the Action also meets the criteria specified above. If you do not specify an Action, then all Actions that meet the above criteria will be ed to the recipients. Select a Target Group. Select at least one Group from the list. All members of the Group(s) you select will have s sent to their Primary and Secondary accounts, as specified in their Person profile. Members of the Group(s) that do not have addresses will not receive the Create Rule - Lock Zone The Lock Zone rule locks Doors that border the Zone specified in the Rule. All Access Privileges continue to operate normally while the Doors to the Zone are locked. Lock Zone is maintained until another action, such as Revert to Schedule or Unlock Zone, unlocks the door. The Lockdown Zone rule is similar to the Lock Zone rule, except that the Doors are in a lockdown mode that block all Access Privileges, i.e. no valid card or fob swipes nor REX (request to exit button) requests is granted. The Unlock Zone rule is also similar, except that it unlocks all Doors in the specified Zone(s). The Revert Zone rule is also similar, except that it reverts the Zone doors to their scheduled lock state. To create one of these Rules, click the Create Rule Action, then open the Type drop-down list and select the type of rule you want to configure. Select a Schedule. The Schedule specifies when the Rule is active. Select a Group (optional). If you choose one or more Groups, the Zone Doors will be locked only when a member of one of those Groups generated the Event. If no Group is selected, the Doors will be locked when anyone generates the Event. Select a Zone (optional). If you choose one or more Zones, the doors for those zones are locked only when the Event occurs at one of the Zones you specified. If you do not select a Zone, the doors for the zone(s) are locked when the Event occurs anywhere. Select a Door (optional). If you choose one or more Doors, the Doors of the zone are locked only when the Event occurs at one of the Doors you specified. If you do not select a Door, the doors for the zone are locked when the Event occurs anywhere. Select a Reader (optional). If you choose one or more card Readers, the doors for the zone are locked only when the Event occurs at the Reader(s) you selected. If you do not select a Reader, the doors for the zone are locked when the Event occurs anywhere. Select an Event. Choose one or more Events that will cause the Doors for the Zone to be locked. The Doors will lock when the that Event(s) occurs and the above criteria are met. 80
87 SECTION 4: USER INTERFACE Select a Target Zone. Select one or more Zones whose Doors are locked when the selected Event occurs and the above criteria are met Edit rule To modify an existing Rule, select the rule, then click the Edit Rule Action to open the Edit Rule dialog. Make the necessary changes, then click Save to update the existing Rule. NOTE If the modified Rule is an Access Privilege, all Doors affected by the Access Privilege will show a yellow triangle, indicating that the door needs to be updated. All other modified Rules changes will be reflected immediately Delete Rule To remove a Rule, select the rule, then click the Delete Rule Action. Click Yes in the confirmation window. NOTE If the deleted Rule is an Access Privilege, all Doors affected by the Access Privilege will show a yellow triangle, indicating that the door needs to be updated. All other deleted Rules will be reflected immediately Peripherals page The Peripherals page in the Configuration Section lets you manage your Peripheral Devices. A Peripheral Device is an entity that represents a third party product or service. It provide Intelli-M Access with the ability to communicate with the external device, product, or service in a tightly-integrated manner. All Peripherals are plugins managed by the infinias EAC Rule Action service. By default, Intelli-M Access supports three Peripheral Types: Web Page Generic Peripheral Ethernet I/O Module Other Peripheral types can be added by installing Intelli-M Access plugins for them. For example, a plugin is available for Pelco DigitalSentry, which adds support for activating recording on one or more Pelco DigitalSentry cameras based on an Event occurring in Intelli-M Access. Future video integration plugins will be released to support products such as Exacq Ev and Milestone XProtect servers. The Peripherals page is shown below: Intelli-M Access V4.0 User Manual 81
88 SECTION 4: USER INTERFACE Peripherals Page Information on how to obtain additional Peripherals, how to create your own Peripheral, or how to support the Web Page and Generic Peripherals in your proprietary application can be obtained by contacting infinias. Views The Peripherals Page supports only one View, the Peripherals View. Actions The Peripherals Page supports three Actions: Create Peripheral, Edit Peripheral, and Delete Peripheral Create Peripheral To communicate with a third-party device or service, you must create a Peripheral that is configured to communicate with that device or service. Click the Create Peripheral Action, and a Create Peripheral dialog will open: 82
89 SECTION 4: USER INTERFACE Create Peripheral dialog The Create Peripheral dialog includes two sections: the list of existing devices in the left pane, and the configuration of a existing device in the right pane. You can create a Peripheral by choosing one of the existing devices in the left pane. In other words, you cannot create a Peripheral until it is visible by Intelli-M Access as a device in the left pane. Some plugins, such as the Ethernet I/O device, automatically discover their devices, and automatically appear in the left pane. However, many do not, and even those that do discover their devices also support adding devices manually. So if your device doesn t already appear in the list, you must manually add a device into the list, then create it as a Peripheral. This section covers how to create a device manually as well as choosing from an existing device. Create a new Web Page. The Web Page peripheral enables you to open a specific URL in a web browser when a Rule to show that page is applied. This Peripheral is commonly used to display video from an IP camera in a browser. You can use this feature even if your IP cameras are a part of a video management system. If the IP camera supports showing live video in a web browser, you can show that video in a separate browser window when the Rule-defined Event occurs. Create a Generic Peripheral. The Generic peripheral is similar to the Web Page Peripheral, except that it is designed to call a Web Service rather than a Web Server (web page). This Peripheral is used by third-party integrators who want to import Events data from Intelli-M Access into their proprietary application. Use the Forward Event rule template to create Rules that sends the Events you determine to the third-party system. For more information, refer to the How to Forward Intelli-M Access Events document available on the infinias website. Manually Add a Device. Open the New drop-down list to select a devices to manually add. In the example below, only the 32-Channel Ethernet I/O is listed (default). Other device types will appear in list after the plugin for them is installed. Refer to the infinias website for documentation specific to each available plugin. Intelli-M Access V4.0 User Manual 83
90 SECTION 4: USER INTERFACE New Device menu Configure an Existing Device. To configure a device that was discovered or manually added, select the device in the devices list in the left pane. A configuration page customized for that device will appear in the right pane with a Peripheral Name for that device. If you selected a device that you created manually, you can modify the Name field to the way you want the device to appear in Intelli-M Access. Click Create at the bottom of the window to create the peripheral. NOTE If you select an automatically-discovered device that you didn t manually create, the device may not be configured for your needs. Before you click Create, you must first configure the device using its custom configuration page shown in the right pane. Click Save or Update at the bottom of the custom configuration interface first. After you configured the device, select the device again the left pane, then click Create at the bottom of the window to create the peripheral. Failure to do so may create a Peripheral that doesn t match your needs. If this occurs, refer to the Edit Peripheral procedure below. After clicking Create to create the peripheral, the device will disappear from the discovered devices list in the right pane and will appear in the Content Area of the Peripherals Page. See below. 84
91 SECTION 4: USER INTERFACE 32-Channel I/O Device configured for elevator control Edit Peripheral You can modify Peripherals using the Edit Peripheral Action. The Edit Peripheral Action is identical to the Create New Peripheral Dialog, except that the custom configuration page for the specified Peripheral is visible. To edit a Peripheral: 1. Select (highlight the peripheral you want edit. 2. Click the Edit Peripheral Action. 3. Make all necessary changes, then click Save or Update. Do not click Create (at the button at the bottom of the dialog). 4. When the configuration of the device is complete, the custom configuration interface will close. Click Cancel to close the dialog. Intelli-M Access V4.0 User Manual 85
92 SECTION 4: USER INTERFACE Delete Peripheral To remove a Peripheral, select the peripheral, then click the Delete Peripheral Action. Click Yes in the confirmation window. NOTE When the Peripheral is deleted, the device reappears in the discovered devices list. You can create the Peripheral again using this list Customize page The Customize page in the Configuration section lets you create Person attributes that are not included in the Intelli-M Access Person fields. Customize Page Views There is only one view supported, and that is the Custom Fields View. 86
93 SECTION 4: USER INTERFACE Actions The Custom Fields Page supports three Actions: Create, Edit and Delete. Create Field - Adds a new Custom Field to Intelli-M Access. To create a new Custom Field, click the Create Field Action to open the Create Field dialog. Create New Custom Field Dialog Enter the name of the Custom Field into the Field Name text box. This name will appear in the Custom tab of the Create/ Edit Person dialog, where you enter a Person-specific value for this field. Repeat these steps to create as many custom fields as needed. Edit Field - To modify a Custom Field name, select the field, then click the Edit Field Action. Make changes in the menu as needed, then click Update. Delete Field - To remove a Custom Field, select the field, then click the Delete Field Action. Click Yes in the confirmation window System Settings The Configuration section also contains the System Settings link in the upper-right corner of the window. This link is used to access menus to configure global configuration options for Intelli-M Access About tab The System Settings - About tab displays the Intelli-M Access Version number. Intelli-M Access V4.0 User Manual 87
94 SECTION 4: USER INTERFACE System Settings - About tab tab The System Settings - tab allows you to provide SMTP Server information for sending on Events to the account you specify. System Settings - tab Enter the appropriate information, click Apply, and then Save. Setup information for many large providers (gmail, hotmail, yahoo, aol, etc) are available on the Internet. SMTP Server - Address of your SMTP mail server. See the example above. Port - port recommended by your SMTP service provider. SSL checkbox - Check if recommended for by your SMTP service provider. Domain - Enter a domain name if recommended by your SMTP service provider. User Name -Username of the account. Password - Account password 88
95 SECTION 4: USER INTERFACE Security tab The System Settings - Security tab controls the level of system security you wish to specify for Intelli-M Access, an example displaying the system defaults is shown below. Features in the Security tab include the following: System Settings - Security tab with help Require SSL for all Intelli-M Access clients - Intelli-M Access supports SSL (Secure Sockets Layer) encryption between all web browsers and the Intelli-M Access web server. Enabling this feature means that all those who log into Intelli-M Access must use instead of to communicate with Intelli-M Access. SSL communication requires a valid digital certificate. Intelli-M Access will create a non-trusted digital certificate, which causes a certificate warning message like that below. Security Certificate warning Intelli-M Access V4.0 User Manual 89
96 SECTION 4: USER INTERFACE Click the Continue to this website (not recommended). link to continue (the certificate does refer to a valid website). To remove this warning, you must purchase and install a trusted digital certificate from a third-party company like VeriSign ( verisign.com/). Disable Web Mode on Controllers - The infinias eidc door controllers do not support SSL encryption between a web browser and the eidc internal web server. If SSL is needed when you access the controller, either change the controller admin password (described below), or disable the web server entirely. Checking this box will disable the web server, restricting access to the controller through Intelli-M Access only. Encrypt Controller Communications - Check this box to encrypt the data that passes between the Intelli-M Access server and all eidcs. Controller Admin Password - Displays the default password for the eidc and enables you to change it. Changing the controller admin password here changes the admin password of each controller currently managed by Intelli-M Access. It improves the security of your system. Applying this change does not affect controllers that are offline. Intelli-M Access API Password - Displays the password used internally by Intelli-M Access to process and finalize events. This password should be changed to strengthen the security of your system. 90
97 SECTION 5: MOBILE CREDENTIAL SECTION 5 Mobile Credential The Intelli-M Access Mobile Credential feature allows users to unlock doors using a smartphone app. Implementation of this feature requires four steps: 1. Install the Mobile Credential Server software (available through infinias.com). This server can reside on the same hardware as the Intelli-M server, or on a network where it can exchange data with the Intelli-M access server. 2. Configure Intelli-M Access user permissions to use a mobile credential. Licensing is required. 3. Install and configure the Mobile Credential application on your smartphone. The Mobile Credential application is a free, personal application for Android devices and the Apple iphone, ipad, and ipod (ios 3.0 or later). 4. Setup a WIFI network through which smartphone users can connect to the Intelli-M Access server to gain access to doors. 5.1 Install the Mobile Credential server The Intelli-M Access Mobile Credential Server installation package will install the necessary components to allow your mobile device application to work with your Intelli-M Access server. The Mobile Credential Server can either be loaded directly onto your Intelli-M Access server or onto a separate server that has access to your Intelli-M Access server. 1. Download Mobile Credential Server installation. A link to the installation file is available on the infinias.com website after logging into a (your) free infinias user account. 2. Copy the installation file to the server where you want to install the Mobile Credential Server. 3. Double-click on the filename to start the installation. A window similar to the following window might appear. If so, click Run. 4. In the Welcome window shown below, click Next to continue the installation. Intelli-M Access V4.0 User Manual 91
98 SECTION 5: MOBILE CREDENTIAL 5. When the License Agreement window appears, read the contents thoroughly. If you will comply with the conditions stated in the agreement, click the I accept the terms in the License Agreement radio button, then click Next to continue. Otherwise, click Cancel and discontinue installation of this product. 6. In the Destination Folder screen, change the location where you want to install the server if necessary, then click Next. 92
99 SECTION 5: MOBILE CREDENTIAL 7. The next dialog is used to identify the location of the Intelli-M Access server. If you are installing the Mobile Credential server on your Intelli-M server system, verify that the options shown on the screen are correct, then click Next to continue. If you are installing the Mobile Credential server on a different system, change the Intelli-M Access Hostname or IP and Port fields to point to your Intelli-M Access server, then click Next. 8. In the screen shown below, click Install to begin the installation. Intelli-M Access V4.0 User Manual 93
100 SECTION 5: MOBILE CREDENTIAL 9. After installation completes, click Finish to close tine Setup Wizard. NOTE If the Mobile Credentials server is installed on machine other than the Intelli-M Access server, you must manually add a certificate for proper communication between the servers. To do so: 1. On the Mobile Credentials server machine, open a command prompt window. 2. In the command prompt window, open the directory: C:\Windows\Microsoft.NET\Framework\v Run the command: aspnet_regiis.exe -ir This command will install ASP.NET v4.0 Application Pool if it was not created when.net 4.0 was installed. 4. Run the command: SelfSSL7.exe /Q /T /I /S Default Web Site /V Close the command prompt window. 94
101 SECTION 5: MOBILE CREDENTIAL 5.2 Configure Intelli-M Access for Mobile Credentials Two steps are required for configuring Intelli-M Access for the Mobile Credential feature: Add the Mobile Credential license pack to your Intelli-M Access server Configure users to use their Mobile Credential Install a Mobile Credential license 1. Obtain a Mobile Credential license key and password from your dealer. 2. Log into Intelli-M Access, then open the Settings tab. Activate License link 3. In the Settings tab, click the Activate License link under Action on the left side of the window. A popup window like that shown below will appear. Intelli-M Access V4.0 User Manual 95
102 SECTION 5: MOBILE CREDENTIAL 4. In the window, enter your Mobile Credential license key and password. 5. Do one of the following: ONLINE ACTIVATION - if your Intelli-M Access server can connect to the Internet: Click Activate in the Activate License window. Intelli-M Access will then connect to the license registration server to register your copy of Intelli-M Access and activate your license. If the activation process succeeds, your licence key will appear on the Settings page. If the activation fails, use the OFFLINE ACTIVATION method described below. OFFLINE ACTIVATION - if your Intelli-M Access server cannot connect to the Internet: i. Click Activate in the Activate License window. The activation will fail, and the following pop-up window will appear. Activate License Failure ii. iii. Click the link to Download activation request file..., then click Done to close the window. the Activation Request file to [email protected] and request an Activation Response file. 96
103 SECTION 5: MOBILE CREDENTIAL iv. When you receive the Activation Response file, save it anywhere on your server. v. In the Settings tab, click the Activate License link under Action on the left side of the window. vi. In the Activate License window, click the link I have been provided a file for activating a license.... The following Activate License window will open. Activation Response File Entry Dialog vii. viii. In the window shown above, click Browse and select the Activation Response file saved earlier. Click Activate. 6. After performing the activation steps, verify that the license you added appears in the Settings tab. Also, a confirmation will be sent to you and your dealer showing that your license key was activated. Intelli-M Access V4.0 User Manual 97
104 SECTION 5: MOBILE CREDENTIAL License activation - confirmation Assign Mobile Credential to a person You can assign a mobile credential to a person through a Create person or Edit Person action from the Groups tab. In the screen shown below, the total Mobile Credential licenses consumed is shown in the lower right corner of the page. 7. In the Groups tab, select a person to edit (or Create a Person) to open their configuration window. a. In the Edit Person window, open the Credentials tab. 98
105 SECTION 5: MOBILE CREDENTIAL b. On the left side of the Credentials tab header, select Mobile from the drop down list (see above). c. In the Credential column, enter an arbitrary unique character string ( activation key (Apple) or registration number (Android)). In the example above, the key is JohnsUniqueKey123. This key will be entered into the infinias app on the person s mobile device to bind that device to the Intelli-M Access server. The key should be unique for each Person. 8. Click Save to retain the your settings. 5.3 Install and configure the infinias app on a mobile device The infinias Mobile Credentials app can be installed on Android devices and iphones, ipads, and ipods (ios 3.0 or later). NOTE: The examples shown here are from an iphone. Screens presented on an Android device may not be the same, but are similar in function. 1. Find and install the infinias Mobile Credential app on your mobile device. Intelli-M Access V4.0 User Manual 99
106 SECTION 5: MOBILE CREDENTIAL 2. Open the app and go to the Configure screen. In the Configure screen, enter your activation key assigned to you and the IP address and port of the Intelli-M Access server. 3. Press the Activate button. If the activation (bind with the Intelli-M Access server) is successful, the following dialog will open
107 SECTION 5: MOBILE CREDENTIAL 4. After the mobile device successfully connects to the Intelli-M Access server, a unique server-generated credential is written to the Credential field you previously entered with the personal, arbitrary unique character string. Verify that a new entry appears in this field. See below. Server-generated credential 5.4 Using the Mobile Credential After activating your mobile device on the Intelli-M Access server, a list of the doors that you have access to will appear. Intelli-M Access V4.0 User Manual 101
108 SECTION 5: MOBILE CREDENTIAL Set the default door If one door is used more frequently than others, you can set that door as the default. Tap Edit, then select a door. You will see Default appear next to the door. Tap Done to complete the process. Unlock a door To momentarily unlock a Door, select that door from the list of doors, then tap the orange icon at the bottom of the screen. While the door is unlocked, the orange icon will change to green. When the door reverts to locked, the icon will change back to orange. Delete a door from the list If you want to remove a door from the list of doors, you can: 1) tap Edit, tap the red circle next to the door name, then tap Delete, or 2) swipe from left to right across a door name, then tap the red Delete button
109 SECTION 5: MOBILE CREDENTIAL Intelli-M Access V4.0 User Manual 103
110 SECTION 6: ADVANCED SETUP AND CONFIGURATION SECTION 6 Advanced Setup and Configuration Advanced Setup and Configuration contains configuration options that are not automatically available in the user interface but can be made available by running one or more script files installed on your system. In addition, descriptions of extra functionality can be found on the infinias website in the Recipe Cards section. Please login to the site, and go to the Intelli-M Access section under Support, and look for the Recipe Cards. The infinias Support website also provides several How Tos, procedures for configuring your system for special conditions, such as: Man-Trap (configuring a door that must be closed before opening an inner door) Anti-passback (preventing successive card swipes on a single door) Import users with a CVS file How to backup and restore the database Creating custom logo badges Configuring notifications exacqvision Pro VMS integration many others To access the How Tos and other support documents, you must create a login (free) to the site. Go to for more information
111 APPENDIX A: STANLEY QEW GATEWAY SETUP FOR INTELLI-M ACCESS APPENDIX A Stanley QEW Gateway Setup for Intelli-M Access To monitor and control Stanley EL Series locksets with Intelli-M Access, the Stanley QEW gateway that services the locksets must be configured for the Intelli-M Access server. These setup guidelines assume that: The gateway and locksets are installed as specified in Stanley product documentation. The Stanley QEW gateway is installed on the same LAN (network) as the Intelli-M Access server. In actual installations, they can exist on different networks, but they must be able to communicate without blockages. To setup the Stanley QEW for Intelli-M Access, do the following: 1. At a Microsoft Windows computer on the same network where the Stanley QEW you want to configure is installed, open a file browser, then open the Network section and scan for network devices. In the example below, the gateway is highlighted. 2. Right-click on the Stanley QEW entry, then select Properties to open the properties window. Intelli-M Access V4.0 User Manual 105
112 APPENDIX A: STANLEY QEW GATEWAY SETUP FOR INTELLI-M ACCESS Click this link to access the gateway 3. In the properties window (see above), click the Device webpage link to access the gateway configuration menus. The webpage will open. 4. In the Password field, enter the password for the Stanley QEW gateway. If the password was not changed, use the default password: password, then click LOGIN. 5. If the password you entered to login to the gateway was the default password, enter a new password in the New Password and Confirm Password fields in the Change Administrator Password menu (see below), then click NEXT. infinias strongly recommends that gateway passwords be changed from their default value
113 APPENDIX A: STANLEY QEW GATEWAY SETUP FOR INTELLI-M ACCESS 6. In the Network Configuration menu (see below) click Manual to set a fixed IP address for the gateway. Initially the gateway is configured for DHCP, which can change if the unit is reset of rebooted from a power loss. A fixed IP address will assure that the addressing the gateway on the LAN remains unchanged. Click NEXT when finished. 7. In the Time Zone Configuration menu, select the time zone from the drop-down list where the gateway is installed, then click NEXT. Intelli-M Access V4.0 User Manual 107
114 APPENDIX A: STANLEY QEW GATEWAY SETUP FOR INTELLI-M ACCESS 8. When the following menu opens, confirm the configuration settings shown in the menu. If these settings should change, click PREVIOUS and repeat the previous steps. 9. In the menu shown above, follow the Instructions to reopen the Stanley QEW gateway in a new browser window
115 APPENDIX A: STANLEY QEW GATEWAY SETUP FOR INTELLI-M ACCESS 10. In the Access Control System (ACS) Configuration menu shown below, enter the IP address (URL) of the server on which Intelli-M Access is installed, then click FINALIZE. NOTE: Do not change the port number field (443) unless the port was changed in Intelli-M Access, or the field after the forward slash (WebHAL/Gateway). 11. After the gateway is successfully setup, a Congratulations window will open. Click the STATUS button at the top of the menu. STATUS button Intelli-M Access V4.0 User Manual 109
116 APPENDIX A: STANLEY QEW GATEWAY SETUP FOR INTELLI-M ACCESS 12. In the STATUS window verify that the Stanley EL Series locksets installed in the network are recognized by the gateway. Note that the display indicates the Lock ID (MAC address), battery level, and status of each lockset. 13. Click LOGOUT to close the Stanely QEW interface
117 APPENDIX B: TROUBLESHOOTING FAQ APPENDIX B Troubleshooting FAQ B.1 Installation issues QQ AA I ran the installer, but almost immediately after the install started, it ended with an error saying the installation had been interrupted. A recent Windows Update is apparently causing some InstallShield-based installs to generate a.net Framework error during the installation startup procedure. To fix this problem, reinstall.net Framework 3.5 and, if already installed,.net Framework 4.0. If.NET Framework 4.0 is not installed, it is not needed. To re-install.net Framework, open the Control Panel, and double-click the Programs and Features icon. Select the.net Framework 3.5 entry, then press the Repair button above the list. If a Repair button isn t shown, click the Uninstall/Change button, and you ll be given the option to repair the installation. Follow the instructions to repair the installation, then reboot your computer. You must reboot the computer to fully resolve the problem, even though the system will not prompt you to reboot. After a reboot, the installation should complete successfully. If.NET Framework 4.0 is installed, it might not appear in the Applications list where you see.net Framework 3.5; it may be present in the Windows Features list, which can be seen by clicking on the Turn Windows Features On or Off link, found in the left pane of the Programs and Features window. If you find.net Framework 4.0 in that list, you ll have to uncheck the.net Framework 4.0 checkbox, let it uninstall, then check the box to re-install.net Framework 4.0. Reboot the computer to complete the repair. QQ AA The Intelli-M Access Prerequisites Manager displayed a window saying that one of the prerequisites could not be installed. What should I do? The Intelli-M Access Prerequisite Manager attempts to automatically install the Internet Information Server (IIS) and Microsoft Message Queuing (MSMQ). However, several obstacles can prevent this automated task from succeeding: Intelli-M Access V4.0 User Manual 111
118 APPENDIX B: TROUBLESHOOTING FAQ Having User Account Control enabled while not logging in as Administrator could prevent the install from succeeding. The system was unable to reboot and automatically restart the computer. In any of these cases, you should be able to follow the instructions provided in the window to resolve the issue. If you are unable to resolve your issue, please contact infinias Tech Support for more assistance. QQ AA SQL Server installation failed, and I was asked whether or not to continue the installation. What should I do? Click No to abort the installation. If you already clicked Yes, you can still abort the installation if it s still running, or uninstall it through the Control Panel. After the system is returned to its pre-installed state, view the SQL Server install logfiles to determine the cause of the problem. The log files can be found in the C:\Program Files\Microsoft SQL Server\100\Setup Bootstrap\Log folder. Inside that folder will be a folder whose name is a semi-readable form of the time and date that the installation was attempted. The format of the folder name is <this_year><two-digit-month><two-digit-day>_<six_ digit_time>. For example, _ indicates 6/1/2013 at 10:24:34 AM. Open the folder whose name represents the most recent installation attempt. Inside the folder, inspect the two files named: Summary_<computer_name>_ <install_folder_name>_globalrules.txt. Depending on how far the SQL installation proceeded before the error, this file may not exist. Summary_<computer_name>_<install_folder_name>_Component Update.txt Open the GlobalRules file first. The top of the file has a block of text whose label is Overall Summary. In that text block, you ll see the result codes that occurred, and an Exit Message which contains a description of what caused SQL Server installation to fail. If this file shows no errors near the top, then open the file whose name contains ComponentUpdate. The most common problem is that the system has a pending reboot, probably caused by a previous install or a Windows Update that is pending. To resolve this problem, reboot the computer, then restart the Intelli-M Access installation. The Intelli-M Access Prerequisite Manager attempts to discover a pending reboot before you start the installation, but SQL Server uses a different pending reboot logic. Another common (group of) error message(s) occurs when installing SQL 2008 with an earlier version of SQL Server preinstalled. Depending on what SQL Server tools are already installed, you may have to manually uninstall older SQL tools and utilities so they can be replaced by the newer ones found in the new SQL installation. You don t need to uninstall the entire SQL Server or modify or remove existing databases. You may need to uninstall only the older SQL utilities that are replaced by newer ones and which are backward compatible to your previous SQL installation. If the error message is not clear, contact infinias Tech Support with a description of the problem to help resolve the issue
119 APPENDIX B: TROUBLESHOOTING FAQ B.2 Runtime troubleshooting QQ AA QQ AA The Events have stopped working. I don t see Events updating on the Events page anymore. An Event in Intelli-M Access passes through several processes before it becomes visible on the Events page. Some of these processes can fail, blocking the processes from completing. But even if an event doesn t appear, all events are stored in the database and can be retrieved whenever necessary. There are several reasons why an Event might fail to appear: One or more of the Intelli-M Access services are not running. To verify this, open the Control Panel, double- click Administrative Tools, and double-click Services. A Windows Services list will appear. Find the four Intelli-M Access services - they all start with infinias EAC.... Make sure all four services are running. If they are not, try to start the ones that are not running. If all non-running services start, then reboot the system when convenient to verify that the services restart themselves (a system reboot might be why they aren t running). If this problem persists, contact infinias Tech Support additional assistance. The firewall is blocking ports needed for internal communication. Intelli-M Access requires that ports 80, 18776, 18777, 18779, and 1433 be unblocked. The installation procedure should have opened these ports automatically. To test a firewall issue, temporarily disable the firewall and see if events start appearing again. If so, create firewall exceptions to open the ports listed above, and turn your firewall back on. The Rule Action service, which communicates with IIS to tell Intelli-M Access to finalize Events, needs Intelli-M Access credentials to authenticate into the system. These credentials are stored internally, but could possibly be out of sync. To resolve credentials issues, go to the System Settings page, then click the Security tab. Enter a new Intelli-M Access API Password then click Save. If this resolves the issue, Events should start appearing within seconds. Make sure that there is a Rule created to finalize Events. During installation, Intelli-M Access created Rules governing the finalization of ordinary Events and all Alarms. Make sure that there is still at least one Event Management Rule present and active. If you investigated the possibilities above and Events still do not appear in the system, please contact infinias Tech Support for additional assistance. When I click on the Reports Page and I get an error or the page is blank. How do I fix it? Normally, Reports are published to Microsoft Reporting Services during installation. However, some problems can occur during this process. When that happens, open a browser window and navigate to After a minute or two, you should see a mostly white page with the link that looks similar to Intelli-M Access Reports. If you do not see the link, the reports were not successfully published to Reporting Services. If this happens, reinstall Intelli-M Access. If the problem persists, contact infinias Tech Support for further assistance. If the reports link is visible in the website listed above, then it is likely that the problem involves database permissions. The often happens when the database was restored from another computer, or you renamed the computer after installation. To resolve the problem, reinstall Intelli-M Access. If the problem persists, contact infinias Tech Support for further assistance. Intelli-M Access V4.0 User Manual 113
S-IA-PRO Intelli-M Access Professional V4.0
S-IA-PRO Intelli-M Access Professional V4.0 An Addendum to the Intelli-M Access V4.0 User Guide For SKU: S-IA-PRO ACCESS Professional PLEASE READ THIS MANUAL BEFORE USING YOUR INTELLI-M ACCESS PROFESSIONAL
Intelli-M Access Quick Start Guide
Intelli-M Access Quick Start Guide Before You Begin The Intelli-M Access software can be used in conjunction with the eidc. Use Intelli-M Access to manage, view, and report activity through an eidc controlled
4.0 SP1 (4.0.1.0) November 2014 702P03296. Xerox FreeFlow Core Installation Guide: Windows Server 2008 R2
4.0 SP1 (4.0.1.0) November 2014 702P03296 Installation Guide: Windows Server 2008 R2 2014 Xerox Corporation. All rights reserved. Xerox, Xerox and Design, FreeFlow, and VIPP are trademarks of Xerox Corporation
WhatsUp Gold v16.2 Installation and Configuration Guide
WhatsUp Gold v16.2 Installation and Configuration Guide Contents Installing and Configuring Ipswitch WhatsUp Gold v16.2 using WhatsUp Setup Installing WhatsUp Gold using WhatsUp Setup... 1 Security guidelines
WhatsUp Gold v16.1 Installation and Configuration Guide
WhatsUp Gold v16.1 Installation and Configuration Guide Contents Installing and Configuring Ipswitch WhatsUp Gold v16.1 using WhatsUp Setup Installing WhatsUp Gold using WhatsUp Setup... 1 Security guidelines
http://docs.trendmicro.com
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the product, please review the readme files,
Quick Start Guide for VMware and Windows 7
PROPALMS VDI Version 2.1 Quick Start Guide for VMware and Windows 7 Rev. 1.1 Published: JULY-2011 1999-2011 Propalms Ltd. All rights reserved. The information contained in this document represents the
http://docs.trendmicro.com
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the product, please review the readme files,
Sharp Remote Device Manager (SRDM) Server Software Setup Guide
Sharp Remote Device Manager (SRDM) Server Software Setup Guide This Guide explains how to install the software which is required in order to use Sharp Remote Device Manager (SRDM). SRDM is a web-based
Pro-Watch Software Suite Installation Guide. 2013 Honeywell Release 4.1
Pro-Watch Software Suite Release 4.1 Installation Guide Document 7-901073V2 Pro-Watch Software Suite Installation Guide 2013 Honeywell Release 4.1 Copyright 2013 Honeywell. All rights reserved. Pro-Watch
SOS Suite Installation Guide
SOS Suite Installation Guide rev. 8/31/2010 Contents Overview Upgrading from SOS 2009 and Older Pre-Installation Recommendations Network Installations System Requirements Preparing for Installation Installing
RSA Authentication Manager 7.1 Basic Exercises
RSA Authentication Manager 7.1 Basic Exercises Contact Information Go to the RSA corporate web site for regional Customer Support telephone and fax numbers: www.rsa.com Trademarks RSA and the RSA logo
Quick Start Guide for Parallels Virtuozzo
PROPALMS VDI Version 2.1 Quick Start Guide for Parallels Virtuozzo Rev. 1.1 Published: JULY-2011 1999-2011 Propalms Ltd. All rights reserved. The information contained in this document represents the current
Software License Registration Guide
Software License Registration Guide When you have purchased new software Chapter 2 Authenticating a License When you would like to use the software on a different PC Chapter 3 Transferring a License to
Live Maps. for System Center Operations Manager 2007 R2 v6.2.1. Installation Guide
Live Maps for System Center Operations Manager 2007 R2 v6.2.1 Installation Guide CONTENTS Contents... 2 Introduction... 4 About This Guide... 4 Supported Products... 4 Understanding Live Maps... 4 Live
Embarcadero Performance Center 2.7 Installation Guide
Embarcadero Performance Center 2.7 Installation Guide Copyright 1994-2009 Embarcadero Technologies, Inc. Embarcadero Technologies, Inc. 100 California Street, 12th Floor San Francisco, CA 94111 U.S.A.
Installation Guide for Pulse on Windows Server 2012
MadCap Software Installation Guide for Pulse on Windows Server 2012 Pulse Copyright 2014 MadCap Software. All rights reserved. Information in this document is subject to change without notice. The software
SC-T35/SC-T45/SC-T46/SC-T47 ViewSonic Device Manager User Guide
SC-T35/SC-T45/SC-T46/SC-T47 ViewSonic Device Manager User Guide Copyright and Trademark Statements 2014 ViewSonic Computer Corp. All rights reserved. This document contains proprietary information that
How To Create An Easybelle History Database On A Microsoft Powerbook 2.5.2 (Windows)
Introduction EASYLABEL 6 has several new features for saving the history of label formats. This history can include information about when label formats were edited and printed. In order to save this history,
Avigilon Control Center Server User Guide
Avigilon Control Center Server User Guide Version 4.10 PDF-SERVER-D-Rev1 Copyright 2011 Avigilon. All rights reserved. The information presented is subject to change without notice. No copying, distribution,
ivms-5200 Professional Web Manager User Manual
ivms-5200 Professional Web Manager User Manual UD.6L0202D1651A01 Hikvision ivms-5200 Professional Web Manager User Manual This manual, as well as the software described in it, is furnished under license
Installation Guide for Pulse on Windows Server 2008R2
MadCap Software Installation Guide for Pulse on Windows Server 2008R2 Pulse Copyright 2014 MadCap Software. All rights reserved. Information in this document is subject to change without notice. The software
Freshservice Discovery Probe User Guide
Freshservice Discovery Probe User Guide 1. What is Freshservice Discovery Probe? 1.1 What details does Probe fetch? 1.2 How does Probe fetch the information? 2. What are the minimum system requirements
Sage 200 Web Time & Expenses Guide
Sage 200 Web Time & Expenses Guide Sage (UK) Limited Copyright Statement Sage (UK) Limited, 2006. All rights reserved If this documentation includes advice or information relating to any matter other than
SMART Vantage. Installation guide
SMART Vantage Installation guide Product registration If you register your SMART product, we ll notify you of new features and software upgrades. Register online at smarttech.com/registration. Keep the
Diamond II v2.3 Service Pack 4 Installation Manual
Diamond II v2.3 Service Pack 4 Installation Manual P/N 460987001B ISS 26APR11 Copyright Disclaimer Trademarks and patents Intended use Software license agreement FCC compliance Certification and compliance
User Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream
User Manual Onsight Management Suite Version 5.1 Another Innovation by Librestream Doc #: 400075-06 May 2012 Information in this document is subject to change without notice. Reproduction in any manner
Getting Started with Vision 6
Getting Started with Vision 6 Version 6.9 Notice Copyright 1981-2009 Netop Business Solutions A/S. All Rights Reserved. Portions used under license from third parties. Please send any comments to: Netop
TANDBERG MANAGEMENT SUITE 10.0
TANDBERG MANAGEMENT SUITE 10.0 Installation Manual Getting Started D12786 Rev.16 This document is not to be reproduced in whole or in part without permission in writing from: Contents INTRODUCTION 3 REQUIREMENTS
USER GUIDE WEB-BASED SYSTEM CONTROL APPLICATION. www.pesa.com August 2014 Phone: 256.726.9200. Publication: 81-9059-0703-0, Rev. C
USER GUIDE WEB-BASED SYSTEM CONTROL APPLICATION Publication: 81-9059-0703-0, Rev. C www.pesa.com Phone: 256.726.9200 Thank You for Choosing PESA!! We appreciate your confidence in our products. PESA produces
RSM Web Gateway RSM Web Client INSTALLATION AND ADMINISTRATION GUIDE
RSM Web Gateway RSM Web Client INSTALLATION AND ADMINISTRATION GUIDE Installation and Administration Guide RSM Web Client and RSM Web Gateway 17 August, 2004 Page 1 Copyright Notice 2004 Sony Corporation.
Intel Unite Solution. Standalone User Guide
Intel Unite Solution Standalone User Guide Legal Disclaimers & Copyrights All information provided here is subject to change without notice. Contact your Intel representative to obtain the latest Intel
Interworks. Interworks Cloud Platform Installation Guide
Interworks Interworks Cloud Platform Installation Guide Published: March, 2014 This document contains information proprietary to Interworks and its receipt or possession does not convey any rights to reproduce,
Online Help StruxureWare Data Center Expert
Online Help StruxureWare Data Center Expert Version 7.2.1 What's New in StruxureWare Data Center Expert 7.2.x Learn more about the new features available in the StruxureWare Data Center Expert 7.2.x release.
WhatsUp Gold v16.3 Installation and Configuration Guide
WhatsUp Gold v16.3 Installation and Configuration Guide Contents Installing and Configuring WhatsUp Gold using WhatsUp Setup Installation Overview... 1 Overview... 1 Security considerations... 2 Standard
Archive Attender Version 3.5
Archive Attender Version 3.5 Getting Started Guide Sherpa Software (800) 255-5155 www.sherpasoftware.com Page 1 Under the copyright laws, neither the documentation nor the software can be copied, photocopied,
Installation Guide: Delta Module Manager Launcher
Installation Guide: Delta Module Manager Launcher Overview... 2 Delta Module Manager Launcher... 2 Pre-Installation Considerations... 3 Hardware Requirements... 3 Software Requirements... 3 Virtualisation...
Centran Version 4 Getting Started Guide KABA MAS. Table Of Contents
Page 1 Centran Version 4 Getting Started Guide KABA MAS Kaba Mas Welcome Kaba Mas, part of the world-wide Kaba group, is the world's leading manufacturer and supplier of high security, electronic safe
Enterprise Manager. Version 6.2. Installation Guide
Enterprise Manager Version 6.2 Installation Guide Enterprise Manager 6.2 Installation Guide Document Number 680-028-014 Revision Date Description A August 2012 Initial release to support version 6.2.1
Software Version 5.1 November, 2014. Xerox Device Agent User Guide
Software Version 5.1 November, 2014 Xerox Device Agent User Guide 2014 Xerox Corporation. All rights reserved. Xerox and Xerox and Design are trademarks of Xerox Corporation in the United States and/or
Table of Contents. Introduction...9. Installation...17. Program Tour...31. The Program Components...10 Main Program Features...11
2011 AdRem Software, Inc. This document is written by AdRem Software and represents the views and opinions of AdRem Software regarding its content, as of the date the document was issued. The information
Reporting for Contact Center Setup and Operations Guide. BCM Contact Center
Reporting for Contact Center Setup and Operations Guide BCM Contact Center Document Number: NN40040-302 Document Status: Standard Document Version: 04.00 Part Code: N0060637 Date: June 2006 Copyright 2005
NSi Mobile Installation Guide. Version 6.2
NSi Mobile Installation Guide Version 6.2 Revision History Version Date 1.0 October 2, 2012 2.0 September 18, 2013 2 CONTENTS TABLE OF CONTENTS PREFACE... 5 Purpose of this Document... 5 Version Compatibility...
4.0 SP2 (4.0.2.0) May 2015 702P03296. Xerox FreeFlow Core Installation Guide: Windows Server 2008 R2
4.0 SP2 (4.0.2.0) May 2015 702P03296 Installation Guide: Windows Server 2008 R2 2015 Xerox Corporation. All rights reserved. Xerox, Xerox and Design, and FreeFlow are trademarks of Xerox Corporation in
Consolidated Monitoring, Analysis and Automated Remediation For Hybrid IT Infrastructures. Goliath Performance Monitor Installation Guide v11.
Consolidated Monitoring, Analysis and Automated Remediation For Hybrid IT Infrastructures Goliath Performance Monitor Installation Guide v11.6 (v11.6) Document Date: August 2015 www.goliathtechnologies.com
Using SQL Reporting Services with Amicus
Using SQL Reporting Services with Amicus Applies to: Amicus Attorney Premium Edition 2011 SP1 Amicus Premium Billing 2011 Contents About SQL Server Reporting Services...2 What you need 2 Setting up SQL
DameWare Server. Administrator Guide
DameWare Server Administrator Guide About DameWare Contact Information Team Contact Information Sales 1.866.270.1449 General Support Technical Support Customer Service User Forums http://www.dameware.com/customers.aspx
Team Foundation Server 2013 Installation Guide
Team Foundation Server 2013 Installation Guide Page 1 of 164 Team Foundation Server 2013 Installation Guide Benjamin Day [email protected] v1.1.0 May 28, 2014 Team Foundation Server 2013 Installation Guide
Product Manual. MDM On Premise Installation Version 8.1. Last Updated: 06/07/15
Product Manual MDM On Premise Installation Version 8.1 Last Updated: 06/07/15 Parallels IP Holdings GmbH Vordergasse 59 8200 Schaffhausen Switzerland Tel: + 41 52 632 0411 Fax: + 41 52 672 2010 www.parallels.com
Issue Tracking Anywhere Installation Guide
TM Issue Tracking Anywhere Installation Guide The leading developer of version control and issue tracking software Table of Contents Introduction...3 Installation Guide...3 Installation Prerequisites...3
Quick Install Guide. Lumension Endpoint Management and Security Suite 7.1
Quick Install Guide Lumension Endpoint Management and Security Suite 7.1 Lumension Endpoint Management and Security Suite - 2 - Notices Version Information Lumension Endpoint Management and Security Suite
User Guide Win7Zilla
User Guide Win7Zilla Table of contents Section 1: Installation... 3 1.1 System Requirements... 3 1.2 Software Installation... 3 1.3 Uninstalling Win7Zilla software... 3 Section 2: Navigation... 4 2.1 Main
Charter Business Desktop Security Administrator's Guide
Charter Business Desktop Security Administrator's Guide Table of Contents Chapter 1: Introduction... 4 Chapter 2: Getting Started... 5 Creating a new user... 6 Recovering and changing your password...
DeviceAnywhere Enterprise. ios Device Onboarding Guide
DeviceAnywhere Enterprise ios Device Onboarding Guide DeviceAnywhere Enterprise ios Device Onboarding Guide DeviceAnywhere Enterprise 6.2.1 DeviceAnywhere Enterprise Automation 6.2.1 DeviceAnywhere Enterprise
BCA Software Installation and Troubleshooting Guide
BCA Software Installation and Troubleshooting Guide This document contains four components: Prerequisites provides the list of prerequisites and system requirements to successfully install and run the
Legal Notes. Regarding Trademarks. 2012 KYOCERA Document Solutions Inc.
Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held liable for any problems arising from
Installing Oracle 12c Enterprise on Windows 7 64-Bit
JTHOMAS ENTERPRISES LLC Installing Oracle 12c Enterprise on Windows 7 64-Bit DOLOR SET AMET Overview This guide will step you through the process on installing a desktop-class Oracle Database Enterprises
ivms-4200 Client Software Quick Start Guide V1.02
ivms-4200 Client Software Quick Start Guide V1.02 Contents 1 Description... 2 1.1 Running Environment... 2 1.2 Surveillance System Architecture with an Performance of ivms-4200... 3 2 Starting ivms-4200...
NETWORK PRINT MONITOR User Guide
NETWORK PRINT MONITOR User Guide Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held liable
Upgrading from Call Center Reporting to Reporting for Contact Center. BCM Contact Center
Upgrading from Call Center Reporting to Reporting for Contact Center BCM Contact Center Document Number: NN40010-400 Document Status: Standard Document Version: 02.00 Date: June 2006 Copyright Nortel Networks
Administration guide. Host software WinCCU Installation. Complete gas volume and energy data management
Administration guide Host software WinCCU Installation Complete gas volume and energy data management Contents 1 Introduction... 1 Safety first... 1 Warning... 1 Typographic conventions... 1 Product versioning...
Pearl Echo Installation Checklist
Pearl Echo Installation Checklist Use this checklist to enter critical installation and setup information that will be required to install Pearl Echo in your network. For detailed deployment instructions
Aventail Connect Client with Smart Tunneling
Aventail Connect Client with Smart Tunneling User s Guide Windows v8.7.0 1996-2006 Aventail Corporation. All rights reserved. Aventail, Aventail Cache Control, Aventail Connect, Aventail Connect Mobile,
Metalogix SharePoint Backup. Advanced Installation Guide. Publication Date: August 24, 2015
Metalogix SharePoint Backup Publication Date: August 24, 2015 All Rights Reserved. This software is protected by copyright law and international treaties. Unauthorized reproduction or distribution of this
Installation Instructions Release Version 15.0 January 30 th, 2011
Release Version 15.0 January 30 th, 2011 ARGUS Software: ARGUS Valuation - DCF The contents of this document are considered proprietary by ARGUS Software, the information enclosed and any portion thereof
FileMaker Server 13. FileMaker Server Help
FileMaker Server 13 FileMaker Server Help 2010-2013 FileMaker, Inc. All Rights Reserved. FileMaker, Inc. 5201 Patrick Henry Drive Santa Clara, California 95054 FileMaker and Bento are trademarks of FileMaker,
XenClient Enterprise Synchronizer Installation Guide
XenClient Enterprise Synchronizer Installation Guide Version 5.1.0 March 26, 2014 Table of Contents About this Guide...3 Hardware, Software and Browser Requirements...3 BIOS Settings...4 Adding Hyper-V
Point of Sale 2015 Enterprise. Installation Guide
Point of Sale 2015 Enterprise Installation Guide Contents About this guide 3 System Requirements - Microsoft SQL Server 2008 R2 Express 3 System Requirements - POS Enterprise 2015 (Administrator) 3 System
Test Center Enterprise. ios Device Onboarding Guide
Test Center Enterprise ios Device Onboarding Guide Copyright Copyright 2012 Keynote DeviceAnywhere. All Rights Reserved. March 2012. Notice 2012 Keynote DeviceAnywhere. All rights reserved. THE INFORMATION
Easy Data Centralization with Webster. User Guide
Easy Data Centralization with Webster User Guide CONTENTS 3-4 1 Introducing Webster Webster - An Introduction 5-14 2 Installing & Configuring Webster Installing the System Configuring Webster 15-18 3 Managing
How To Install Help Desk Premier
Help Desk Premier Installation Guide 2012 BrightBox Solutions All rights reserved. Last Updated October, 2012 Help Desk Premier is a trademark of BrightBox Solutions. Help Desk Premier software and the
Software Version 5.2 June 2015. Xerox Device Agent User Guide
Software Version 5.2 June 2015 Xerox Device Agent User Guide 2015 Xerox Corporation. All rights reserved. Xerox, Xerox and Design and Phaser are trademarks of Xerox Corporation in the United States and/or
National Fire Incident Reporting System (NFIRS 5.0) NFIRS Data Entry/Validation Tool Users Guide
National Fire Incident Reporting System (NFIRS 5.0) NFIRS Data Entry/Validation Tool Users Guide NFIRS 5.0 Software Version 5.3 Prepared for: Directorate of Preparedness and Response (FEMA) Prepared by:
FileMaker Server 14. FileMaker Server Help
FileMaker Server 14 FileMaker Server Help 2007 2015 FileMaker, Inc. All Rights Reserved. FileMaker, Inc. 5201 Patrick Henry Drive Santa Clara, California 95054 FileMaker and FileMaker Go are trademarks
How To Use Senior Systems Cloud Services
Senior Systems Cloud Services In this guide... Senior Systems Cloud Services 1 Cloud Services User Guide 2 Working In Your Cloud Environment 3 Cloud Profile Management Tool 6 How To Save Files 8 How To
enicq 5 System Administrator s Guide
Vermont Oxford Network enicq 5 Documentation enicq 5 System Administrator s Guide Release 2.0 Published November 2014 2014 Vermont Oxford Network. All Rights Reserved. enicq 5 System Administrator s Guide
Portions of this product were created using LEADTOOLS 1991-2009 LEAD Technologies, Inc. ALL RIGHTS RESERVED.
Installation Guide Lenel OnGuard 2009 Installation Guide, product version 6.3. This guide is item number DOC-110, revision 1.038, May 2009 Copyright 1992-2009 Lenel Systems International, Inc. Information
National Fire Incident Reporting System (NFIRS 5.0) NFIRS Data Entry/Validation Tool Users Guide
National Fire Incident Reporting System (NFIRS 5.0) NFIRS Data Entry/Validation Tool Users Guide NFIRS 5.0 Software Version 5.6 1/7/2009 Department of Homeland Security Federal Emergency Management Agency
Pharos Control User Guide
Outdoor Wireless Solution Pharos Control User Guide REV1.0.0 1910011083 Contents Contents... I Chapter 1 Quick Start Guide... 1 1.1 Introduction... 1 1.2 Installation... 1 1.3 Before Login... 8 Chapter
QUANTIFY INSTALLATION GUIDE
QUANTIFY INSTALLATION GUIDE Thank you for putting your trust in Avontus! This guide reviews the process of installing Quantify software. For Quantify system requirement information, please refer to the
FileMaker 12. ODBC and JDBC Guide
FileMaker 12 ODBC and JDBC Guide 2004 2012 FileMaker, Inc. All Rights Reserved. FileMaker, Inc. 5201 Patrick Henry Drive Santa Clara, California 95054 FileMaker and Bento are trademarks of FileMaker, Inc.
StrikeRisk v6.0 IEC/EN 62305-2 Risk Management Software Getting Started
StrikeRisk v6.0 IEC/EN 62305-2 Risk Management Software Getting Started Contents StrikeRisk v6.0 Introduction 1/1 1 Installing StrikeRisk System requirements Installing StrikeRisk Installation troubleshooting
FileMaker 11. ODBC and JDBC Guide
FileMaker 11 ODBC and JDBC Guide 2004 2010 FileMaker, Inc. All Rights Reserved. FileMaker, Inc. 5201 Patrick Henry Drive Santa Clara, California 95054 FileMaker is a trademark of FileMaker, Inc. registered
EXPRESSCLUSTER X for Windows Quick Start Guide for Microsoft SQL Server 2014. Version 1
EXPRESSCLUSTER X for Windows Quick Start Guide for Microsoft SQL Server 2014 Version 1 NEC EXPRESSCLUSTER X 3.x for Windows SQL Server 2014 Quick Start Guide Document Number ECX-MSSQL2014-QSG, Version
Ajera 7 Installation Guide
Ajera 7 Installation Guide Ajera 7 Installation Guide NOTICE This documentation and the Axium software programs may only be used in accordance with the accompanying Axium Software License and Services
About This Manual. 2 About This Manual
Ver.4.1 Important This System Guide applies to RadiNET Pro Ver. 4.1. Please read this System Guide and the User s Manual on the RadiNET Pro CD-ROM carefully to familiarize yourself with safe and effective
Lepide Software. LepideAuditor for File Server [CONFIGURATION GUIDE] This guide informs How to configure settings for first time usage of the software
Lepide Software LepideAuditor for File Server [CONFIGURATION GUIDE] This guide informs How to configure settings for first time usage of the software Lepide Software Private Limited, All Rights Reserved
Core Protection for Virtual Machines 1
Core Protection for Virtual Machines 1 Comprehensive Threat Protection for Virtual Environments. Installation Guide e Endpoint Security Trend Micro Incorporated reserves the right to make changes to this
Defender 5.7 - Token Deployment System Quick Start Guide
Defender 5.7 - Token Deployment System Quick Start Guide This guide describes how to install, configure and use the Defender Token Deployment System, based on default settings and how to self register
Installation Guide v1.11 and Higher
Progeny Imaging Installation Guide v1.11 and Higher 00-02-1604 Rev. D ECN P3483 Revision Date: 6/2/2015 0120 Contents 1. About This Manual... 3 Text Conventions... 3 2. Welcome to Progeny Imaging... 4
Polycom CMA System Upgrade Guide
Polycom CMA System Upgrade Guide 5.0 May 2010 3725-77606-001C Trademark Information Polycom, the Polycom Triangles logo, and the names and marks associated with Polycom s products are trademarks and/or
CoCreate Manager Server Installation Guide. CoCreate Manager Server Installation Guide 1
CoCreate Manager Server Installation Guide CoCreate Manager Server Installation Guide 1 CoCreate Manager Server Installation Guide 2 Table Of Contents 1. CoCreate Manager Server 2008 4 1.1. Installation
Table of Contents. CHAPTER 1 About This Guide... 9. CHAPTER 2 Introduction... 11. CHAPTER 3 Database Backup and Restoration... 15
Table of Contents CHAPTER 1 About This Guide......................... 9 The Installation Guides....................................... 10 CHAPTER 2 Introduction............................ 11 Required
Upgrading Your Web Server from ClientBase Browser Version 2.0 or Above to Version 2.1.1
Upgrading Your Web Server from ClientBase Browser Version 2.0 or Above to Version 2.1.1 Introduction Successful ClientBase Browser usage depends on proper hardware, setup and installation. This section
System Overview and Terms
GETTING STARTED NI Condition Monitoring Systems and NI InsightCM Server Version 2.0 This document contains step-by-step instructions for the setup tasks you must complete to connect an NI Condition Monitoring
Installing and Configuring vcenter Multi-Hypervisor Manager
Installing and Configuring vcenter Multi-Hypervisor Manager vcenter Server 5.1 vcenter Multi-Hypervisor Manager 1.1 This document supports the version of each product listed and supports all subsequent
Server Application. ACTi NVR v2.2. Quick Installation Guide
Server Application ACTi NVR v2.2 Quick Installation Guide ACTi APP-2000 This document is copyrighted, 2003-2008 by ACTi Corporation. All rights are reserved. ACTi Corporation reserves the right to make
ION EEM 3.8 Server Preparation
PREREQUISITE GUIDE JUNE 21, 2006 ION EEM 3.8 Server Preparation This document details the server configuration required for an ION EEM installation. This document can and should be used by the your company
Installation / Backup \ Restore of a Coffalyser.Net server database using SQL management studio
Installation / Backup \ Restore of a Coffalyser.Net server database using SQL management studio This document contains instructions how you can obtain a free copy of Microsoft SQL 2008 R2 and perform the
Lepide Event Log Manager. Users Help Manual. Lepide Event Log Manager. Lepide Software Private Limited. Page 1
Users Help Manual Lepide Event Log Manager Lepide Software Private Limited. Page 1 Users Help Manual for Lepide Event Log Manager Lepide Software Private Limited, All Rights Reserved This User Guide and
