Setting up an Sender

Save this PDF as:
 WORD  PNG  TXT  JPG

Size: px
Start display at page:

Download "Setting up an Sender"

Transcription

1 Setting up an Sender There are two different types of mail senders available in the Rock digitizers. There are E mail messages senders and E mail file senders. The file senders are used to send recorded files of various types, and the messages senders are used to send messages when specific situations occur, such as system startup, new event, or Alarm. You may have multiple E mail senders of either type in your layout, sending different messages and/or file types to different clients. Note that you need a sender module for each targeted recipient, so if you need messages sent to a lot of people, you should consider setting up distribution lists at the server end. There are also two different types of sending that can be done, sending directly using your own mail server or sending through a Kinemetrics supplied and maintained mail relay. Using the Kinemetrics mail relay is quite simple, but does require internet access and use of DNS in your network setup. Using your own mail server does not require either of these, but is more complex to set up and can be installation specific. If using your own mail server, it must support SMTP or ESMTP mail access. We will give examples here using an e mail message sender using both the Kinemetrics mail relay as well as using our own in house mail server. Note that the Kinemetrics mail relay is not accessible for SMTP/ESMTP traffic from outside.

2 Adding the module: Go to Advanced Features: Enable module add/remove:

3 Go to Module Add: Select the E mail message sender: The module is now added. You must now configure it for using the Kinemetrics mail relay or your own server.

4 Using the KMI mail relay: Go to System Operation parameters: Select the E mail message sender module:

5 Set the parameters to send messages. Note, I have only needed to set the following things: Using the KMI relay The destination user (who will receive the message) A subject line A string to be sent when there is an event (Remember, you need internet access and DNS enabled in order to use the KMI mail relay)

6 Click OK to apply changes: Click Apply Changes Now to restart the system with your new parameters:

7 After the system restarts, when a trigger occurs, a message will be sent as follows: The UID tag uniquely identifies the message as coming from your unit.

8 Using a dedicated mail server: Enable Password Editing under Advanced Features (your mail server may require authentication):

9 Passwords are normally hidden, so enter the parameter editor in such a way that they are shown: Understand that exposing passwords is somewhat risky:

10 Select the E mail message sender module: Set the parameters to send messages. Note, I have only needed to set the following things: Not using the KMI relay Specify the mail host (mail.kmi.com in our case) The mail client (how you identify yourself to the mail server) The destination user (who will receive the message) Who is sending the message (from user) A subject line A string to be sent when there is an event Note that you may have to specify a different IP port (rather than port 25) and you may have to specify authentication credentials (user and password) depending on the requirements of your mail server. You will likely have to get your IT people involved.

11

12 Click OK to apply changes: Click Apply Changes Now to restart the system with your new parameters:

13 After the system restarts, when a trigger occurs, a message will be sent as follows:

14 Tokenizing parameters into a message: Messages can include data from the system. These variables can be tokenized into a message. To find out what is available, you need to open a telnet connection to the instrument at port The password for this port by default is kmi. Type the password when requested and then type the command rtparams at the > prompt. You will see a list of values like this: You may been to increase the size of the scroll window of the telnet program (or PuTTY in this case) to see all of the values. Also, some values may only show up conditionally for example the value LastTriggerTime is only populated when there has been a trigger.

15 To use this value in a message, surround it in ^ characters in your message as follows: New event at ^LastTriggerTime^ The message you will be sent will now look like this: Tokenization can be done in the message or the subject line. If the message begins with it specifies a text file that is to be opened, read, tokenized, and then transmitted. This allows longer messages that contain more information to be designed and to more closely fit the requirements of the end user. For example:

Note: CONTENTS. 1. Outlook Express (IMAP) 2. Microsoft Outlook (IMAP) 3. Eudora (IMAP) 4. Thunderbird (IMAP) 5. Outlook Express (POP)

Note: CONTENTS. 1. Outlook Express (IMAP) 2. Microsoft Outlook (IMAP) 3. Eudora (IMAP) 4. Thunderbird (IMAP) 5. Outlook Express (POP) CONTENTS 1. Outlook Express (IMAP) 2. Microsoft Outlook (IMAP) 3. Eudora (IMAP) 4. Thunderbird (IMAP) 5. Outlook Express (POP) Note: Prior to configuring, please ensure that your ID is enabled for POP/IMAP.

More information

FortiMail Gateway Setup and Configuration Technical Note

FortiMail Gateway Setup and Configuration Technical Note FortiMail Gateway Setup and Configuration Technical Note FortiMail Gateway Setup and Configuration Technical Note Document Version: Version 1 Publication Date: 04 April 2005 Description: This technical

More information

Quick Note 24. Extracting the debug.txt file from a TransPort. Digi Technical Support. February Page 1

Quick Note 24. Extracting the debug.txt file from a TransPort. Digi Technical Support. February Page 1 Quick Note 24 Extracting the debug.txt file from a TransPort Digi Technical Support February 2016 Page 1 Contents 1 Introduction... 3 2 Version... 4 3 FTP method... 5 3.1 FTP Using FileZilla FTP Client...

More information

XenData Alert Module Administrator Guide

XenData Alert Module Administrator Guide XenData Alert Module Administrator Guide Version 6.11 2006-2013 XenData Limited. All rights reserved. XenData is a trademark of XenData Limited. Document last modified date: 20 Dec 2013 Contents 1. Overview

More information

ADD Comcode July CAS for Windows. Version 2.2 Addendum

ADD Comcode July CAS for Windows. Version 2.2 Addendum 555-006-517 ADD Comcode 107848756 July 1996 CAS for Windows Version 2.2 Addendum Copyright 1996 Lucent Technologies 555-006-517 ADD All Rights Reserved Comcode 107848756 Printed in U.S.A. July 1996 Notice

More information

Administration Guide

Administration Guide Administration Guide This guide will cover how to customize and lock down the SCOM 2012 Maintenance Mode Scheduler for your end users. Table of Contents Customize Look and Feel... 2 Enable Auditing of

More information

(electronic mail) is the exchange of computer-stored messages by telecommunication.

(electronic mail) is the exchange of computer-stored messages by telecommunication. What is email? E-mail (electronic mail) is the exchange of computer-stored messages by telecommunication. E-mail is one of the protocols included with the Transport Control Protocol/Internet Protocol (TCP/IP)

More information

Condor Analysis Applet Setup for Rock Digitizer

Condor Analysis Applet Setup for Rock Digitizer Condor Analysis Applet Setup for Rock Digitizer Application Note #66 Eliseo Banda August 27, 2012 Rev. 1 This application note copyright Kinemetrics, Inc., 2012. All rights reserved. Kinemetrics products

More information

Electronic Mail. Electronic Mailboxes

Electronic Mail. Electronic Mailboxes Electronic Mail E-mail belongs to the Application Layer Has been around since the early 80 s Enables new forms of interaction Fast Automatic processing (sorting, reply) Can carry other content Electronic

More information

Connect to the Cambridge network

Connect to the Cambridge network Connect to the Cambridge network You can connect to the University network from home or another location so that you can access files and use common software, for example Word, Excel, PowerPoint and CHRIS.

More information

Installation Guide for 3.1.x

Installation Guide for 3.1.x CARETEND BI Installation Guide for 3.1.x TABLE OF CONTENTS DOCUMENT PURPOSE... 2 OVERVIEW... 2 PLATFORM COMPONENTS... 3 Rock-Pond BI Server... 3 CareTend BI Client Application... 3 ABOUT INSTANCES... 3

More information

Agent and Agent Browser. Updated Friday, January 26, Autotask Corporation

Agent and Agent Browser. Updated Friday, January 26, Autotask Corporation Agent and Agent Browser Updated Friday, January 26, 2018 2018 Autotask Corporation Table of Contents Table of Contents 2 The AEM Agent and Agent Browser 3 AEM Agent 5 Privacy Mode 9 Agent Browser 11 Agent

More information

Multi-NVR Manager. Quick Start Configuration Usage

Multi-NVR Manager. Quick Start Configuration Usage Multi-NVR Manager Quick Start Configuration Usage 2014. All rights are reserved. No portion of this document may be reproduced without permission. All trademarks and brand names mentioned in this publication

More information

How to Configure Office 365 for Inbound and Outbound Mail

How to Configure Office 365 for Inbound and Outbound Mail How to Configure Office 365 for Inbound and Outbound Mail You can configure Microsoft Office 365 with the Barracuda Email Security Service as your inbound and/or outbound mail gateway. If you make setting

More information

LifeSize Control Installation Guide

LifeSize Control Installation Guide LifeSize Control Installation Guide January 2009 Copyright Notice 2005-2009 LifeSize Communications Inc, and its licensors. All rights reserved. LifeSize Communications has made every effort to ensure

More information

My The guide.

My  The guide. My email The guide Read our Blog: http://.co.uk/blog View our support site: http://123-reg.co.uk/support Follow us on Twitter: https://twitter.com/123reg Contents 1. How do I get my own personalised email

More information

Scheduling Reports Launch the Scheduling Tool... 1 Description... 1 Overview of Scheduling Components... 2

Scheduling Reports Launch the Scheduling Tool... 1 Description... 1 Overview of Scheduling Components... 2 PeopleSoft Data Dictionary EPM: Scheduling Reports Table of Contents Scheduling Reports... 1 2 Launch the Scheduling Tool... 1 Description... 1 Overview of Scheduling Components... 2 Distribution... 2

More information

Internet Technology. 03r. Application layer protocols: . Paul Krzyzanowski. Rutgers University. Spring 2016

Internet Technology. 03r. Application layer protocols:  . Paul Krzyzanowski. Rutgers University. Spring 2016 Internet Technology 03r. Application layer protocols: email Paul Krzyzanowski Rutgers University Spring 2016 1 Email: SMTP (Simple Mail Transfer Protocol) 2 Simple Mail Transfer Protocol (SMTP) Protocol

More information

Click Studios. Passwordstate. Remote Session Launcher. Installation Instructions

Click Studios. Passwordstate. Remote Session Launcher. Installation Instructions Passwordstate Remote Session Launcher Installation Instructions This document and the information controlled therein is the property of Click Studios. It must not be reproduced in whole/part, or otherwise

More information

Proven Practice Installing TM1 9.5 in Apache Tomcat Product(s): TM1 9.5 Area of Interest: Install Config

Proven Practice Installing TM1 9.5 in Apache Tomcat Product(s): TM1 9.5 Area of Interest: Install Config Proven Practice Installing TM1 9.5 in Apache Tomcat Product(s): TM1 9.5 Area of Interest: Install Config 2 Copyright and Trademarks Licensed Materials - Property of IBM. Copyright IBM Corp. 2009 IBM, the

More information

NETWRIX PASSWORD EXPIRATION NOTIFIER

NETWRIX PASSWORD EXPIRATION NOTIFIER NETWRIX PASSWORD EXPIRATION NOTIFIER ADMINISTRATOR S GUIDE Product Version: 3.3 January 2013 Legal Notice The information in this publication is furnished for information use only, and does not constitute

More information

Getting Started with Outlook Web App (OWA)

Getting Started with Outlook Web App (OWA) Getting Started with Outlook Web App (OWA) Office 365 User Guide When first accessing your new Office 365 account, or if you are having any issues with your regular email client, use the below directions

More information

Send Setting Guide ATTENTION

Send Setting Guide ATTENTION Send Setting Guide This guide explains how to set up the Send to E-mail and Store to Shared Folder functions using the Send Function Setting Tool, and how to check if the functions are set properly by

More information

Virtual Desktop Infrastructure Setup for Windows 7

Virtual Desktop Infrastructure Setup for Windows 7 Virtual Desktop Infrastructure Setup for Windows 7 Virtual Desktop Infrastructure (VDI) allows you to connect to a virtual computer and use software that you don t have installed on your own computer or

More information

Virtual Desktop Infrastructure Setup for Windows 10

Virtual Desktop Infrastructure Setup for Windows 10 Virtual Desktop Infrastructure Setup for Windows 10 Virtual Desktop Infrastructure (VDI) allows you to connect to a virtual computer and use software that you don t have installed on your own computer

More information

1. Begin by selecting [Content] > [Add Content] > [Webform] in the administrative toolbar. A new Webform page should appear.

1. Begin by selecting [Content] > [Add Content] > [Webform] in the administrative toolbar. A new Webform page should appear. Creating a Webform 1. Begin by selecting [Content] > [Add Content] > [Webform] in the administrative toolbar. A new Webform page should appear. 2. Enter the title of the webform you would like to create

More information

Business Connect Secure Remote Access Service (SRAS) Customer Information Package

Business Connect Secure Remote Access Service (SRAS) Customer Information Package Business Connect Secure Remote Access Service (SRAS) Customer Information Package Table of Contents 1.0 Introduction... 1 1.1 Overview... 1 1.2 Scope and Audience... 1 1.3 Design Deliverables... 1 1.4

More information

Enabling Smart Card Logon for Mac OS X Using Centrify Suite

Enabling Smart Card Logon for Mac OS X Using Centrify Suite DoD Public Key Enablement (PKE) Reference Guide Enabling Smart Card Logon for Mac OS X Using Centrify Suite 2012.4 Contact: dodpke@mail.mil URL: http://iase.disa.mil/pki-pke/ URL: http://iase.disa.smil.mil/pki-pke/

More information

Remote Proctor Now Student Guide

Remote Proctor Now Student Guide Remote Proctor Now Student Guide Website... 2 Video Walkthrough... 2 Authentication... 2-8 Taking an exam... 8-12 Common Errors... 13 1 RPNow Student/Exam Taker Guide Website: http://www.remoteproctor.com/rpinstall/

More information

GWCommander V3.x. Administrators Guide

GWCommander V3.x. Administrators Guide GWCommander V3.x Administrators Guide OpenNet Software Ltd., January 2006 OpenNet Software Ltd. GWCommander v.3 Admin Guide, Page 1 Table of Contents 1. Introduction...2 1.1 Requirements...3 2. Setting

More information

VPN Installation Quick Setup Guide

VPN Installation Quick Setup Guide VPN Installation Quick Setup Guide For computers running This document will help guide you through the process of installing the NJ TRANSIT VPN software on your Apple Macintosh (Mac) OS X computer. If

More information

IBM Campaign Version-independent Integration with IBM Engage Version 1 Release 3.1 April 07, Integration Guide IBM

IBM Campaign Version-independent Integration with IBM Engage Version 1 Release 3.1 April 07, Integration Guide IBM IBM Campaign Version-independent Integration with IBM Engage Version 1 Release 3.1 April 07, 2017 Integration Guide IBM Note Before using this information and the product it supports, read the information

More information

# Constructors $smtp = Net::SMTP->new( mailhost ); $smtp = Net::SMTP->new( mailhost, Timeout => 60);

# Constructors $smtp = Net::SMTP->new( mailhost ); $smtp = Net::SMTP->new( mailhost, Timeout => 60); NAME Net::SMTP - Simple Mail Transfer Protocol Client SYNOPSIS DESCRIPTION EXAMPLES # Constructors $smtp = Net::SMTP->new( mailhost, Timeout => 60 This module implements a client interface to the SMTP

More information

Authorized Send User s Guide Version 4.0

Authorized Send User s Guide Version 4.0 Canon Authorized Send User s Guide Version 4.0 08011-40-UD1-003 This page is intentionally left blank. 2 Authorized Send User s Guide Contents Preface...5 How to Use This Manual... 5 Symbols Used in This

More information

XMediusFAX Sharp OSA Connector Administration Guide

XMediusFAX Sharp OSA Connector Administration Guide WWW.XMEDIUS.COM XMediusFAX Sharp OSA Connector 4.1.0 Administration Guide XMediusFAX Sharp OSA Connector Version Number 4.1.0.76 March 2016. Patents Protected by US Patents 4,994,926; 5,291,302; 5,459,584;

More information

Virtual Desktop Infrastructure Setup for MacOS

Virtual Desktop Infrastructure Setup for MacOS Virtual Desktop Infrastructure Setup for MacOS Virtual Desktop Infrastructure (VDI) allows you to connect to a virtual computer and use software that you don t have installed on your own computer or mobile

More information

Virtual Desktop Infrastructure Setup for MacOS

Virtual Desktop Infrastructure Setup for MacOS Virtual Desktop Infrastructure Setup for MacOS Virtual Desktop Infrastructure (VDI) allows you to connect to a virtual computer and use software that you don t have installed on your own computer or mobile

More information

Chapter 9: Internet

Chapter 9: Internet Chapter 9: Internet Email Internet email has become one of the most popular applications on the Internet. An Internet experience is not complete without the usage of email. In this chapter we shall be

More information

AP-ENBD User Manual V0.2

AP-ENBD User Manual V0.2 AP-ENBD User Manual V0.2 2015/12 Catolog Catolog... 2 1 Introduction... 1 1.1 Communication Structure... 1 1.2 Internal Principle... 2 2 Installation... 2 2.1 Connect to the Same Router (or Switch )...

More information

Downloading and Licensing. (for Stealthwatch System v6.9.1)

Downloading and Licensing. (for Stealthwatch System v6.9.1) Downloading and Licensing (for Stealthwatch System v6.9.1) Contents Contents 2 Introduction 5 Purpose 5 Audience 5 Preparation 5 Trial Licenses 5 Download and License Center 6 Contacting Support 6 Registering

More information

Exporting distribution lists from Thunderbird to Outlook

Exporting distribution lists from Thunderbird to Outlook Exporting distribution lists from Thunderbird to Outlook PLEASE NOTE: Do not export the lists under Distribution Lists in your Thunderbird Address Book as these will no longer be maintained on the new

More information

CDS 32 Version 2.xx File Utilities

CDS 32 Version 2.xx File Utilities CDS 32 Version 2.xx File Utilities c2004 Pristine Systems, Inc. CONTENTS Addendum, 7 Addendum, Marking Multiple Selections, 7 Audio File Manager, 3 A Move, 3 M N E Network Audio Manager, 4 Exit, 4 R F

More information

Overview... 3 Provisioning Sites for Security Awareness Training... 3 Understanding Phishing Simulations... 6 Understanding Types...

Overview... 3 Provisioning Sites for Security Awareness Training... 3 Understanding Phishing Simulations... 6 Understanding  Types... Overview... 3 Provisioning Sites for Security Awareness Training... 3 Understanding Phishing Simulations... 6 Understanding Email Types... 6 Understanding Programs and Campaign Scheduling... 6 Welcome

More information

NETWRIX WINDOWS SERVER CHANGE REPORTER

NETWRIX WINDOWS SERVER CHANGE REPORTER NETWRIX WINDOWS SERVER CHANGE REPORTER ADMINISTRATOR S GUIDE Product Version: 4.0 June 2013. Legal Notice The information in this publication is furnished for information use only, and does not constitute

More information

WHAT'S NEW UVC MOBILE APP VERSION 1.5

WHAT'S NEW UVC MOBILE APP VERSION 1.5 WHAT'S NEW UVC MOBILE APP VERSION 1.5 1. The Remember Me option allows the user to save their login credentials. 2. Click on the menu button to access the Contacts, Tasks, Settings and About screen. 3.

More information

Click Studios. Passwordstate. Password Discovery, Reset and Validation. Requirements

Click Studios. Passwordstate. Password Discovery, Reset and Validation. Requirements Passwordstate Password Discovery, Reset and Validation Requirements This document and the information controlled therein is the property of Click Studios. It must not be reproduced in whole/part, or otherwise

More information

CONNECTION ELECTRONICS LTD.

CONNECTION ELECTRONICS LTD. System Manual Version 1.0 Revised on 16-Apr-2010 CONNECTION ELECTRONICS LTD. NOTICE The information contained in this document is believed to accurate in all respects but is not warranted by Connection

More information

Log & Event Manager UPGRADE GUIDE. Version Last Updated: Thursday, May 25, 2017

Log & Event Manager UPGRADE GUIDE. Version Last Updated: Thursday, May 25, 2017 UPGRADE GUIDE Log & Event Manager Version 6.3.1 Last Updated: Thursday, May 25, 2017 Retrieve the latest version from: https://support.solarwinds.com/success_center/log_event_manager_(lem)/lem_documentation

More information

Troubleshooting IMAP Clients and ViewMail for Outlook

Troubleshooting IMAP Clients and ViewMail for Outlook Troubleshooting IMAP Clients and ViewMail for Outlook, page 1 Troubleshooting Problems with Changing Passwords When users change their Cisco Personal Communications Assistant (PCA) password in the Messaging

More information

TRAINING GUIDE. ArcGIS Online and Lucity

TRAINING GUIDE. ArcGIS Online and Lucity TRAINING GUIDE ArcGIS Online and Lucity ArcGIS Online and Lucity This covers some basic functionality we feel you will need to be successful with Lucity with ArcGIS Online or Portal for ArcGIS Enterprise.

More information

User Guide. BlackBerry Workspaces for Windows. Version 5.5

User Guide. BlackBerry Workspaces for Windows. Version 5.5 User Guide BlackBerry Workspaces for Windows Version 5.5 Published: 2017-03-30 SWD-20170330110027321 Contents Introducing BlackBerry Workspaces for Windows... 6 Getting Started... 7 Setting up and installing

More information

Perform a Server Move for Junxure

Perform a Server Move for Junxure Perform a Server Move for Junxure These instructions are the recommendations for IT personnel on how to perform a Server Move for the Junxure Database. Junxure Tech Support understands every environment

More information

People are more likely to open and read a letter than a generic letter addressed to sir, madam or to whom it may concern.

People are more likely to open and read a letter than a generic letter addressed to sir, madam or to whom it may concern. Introduction (WD 330) People are more likely to open and read a letter than a generic letter addressed to sir, madam or to whom it may concern. Word provides the capability of creating a letter, which

More information

Embedded Connector for IKON DocSend Setup Guide

Embedded Connector for IKON DocSend Setup Guide Embedded Connector for IKON DocSend Setup Guide Version 1.1 2016 IKON-20160314 Equitrac Embedded Connector for IKON DocSend Setup Guide Document History Date Description of Change April 18, 2013 Updated

More information

Protecting the AXIGEN Messaging Solution with NOD32

Protecting the AXIGEN Messaging Solution with NOD32 Protecting the AXIGEN Messaging Solution with NOD32 GECAD Technologies 10A Dimitrie Pompei Blvd., BUCHAREST 2, ROMANIA Tel.: +40 21 303 20 80 +40 21 303 20 81 http://www.axigen.com Last modified: 1/29/2007

More information

SMTP Mail. February 14, 2012 Lotus Mail Routing Team IBM Corporation

SMTP Mail. February 14, 2012 Lotus Mail Routing Team IBM Corporation SMTP Mail February 14, 2012 Lotus Mail Routing Team Welcome Participant Passcode: 4297643 2011 IBM Corporation 2 SMTP: A Brief History SMTP (Simple Message Transfer Protocol) SMTP evolved and became a

More information

Avaya Modular Messaging Microsoft Outlook Client Release 5.0

Avaya Modular Messaging Microsoft Outlook Client Release 5.0 Avaya Modular Messaging Microsoft Outlook Client Release 5.0 Important: Instructions in this guide are applicable only if your message store is the Avaya Message Storage Server (MSS) or Microsoft Exchange

More information

Installation & Configuration Guide Enterprise/Unlimited Edition

Installation & Configuration Guide Enterprise/Unlimited Edition Installation & Configuration Guide Enterprise/Unlimited Edition Version 2.3 Updated January 2014 Table of Contents Getting Started... 3 Introduction... 3 Requirements... 3 Support... 4 Recommended Browsers...

More information

Setting up Microsoft Office 365

Setting up Microsoft Office 365 Integration Guide Revision G McAfee SaaS Email Protection Securing Exchange Online in Microsoft Office 365 Setting up Microsoft Office 365 Use this guide to configure Microsoft Office 365 and Microsoft

More information

Chapter 2 Application Layer

Chapter 2 Application Layer Chapter 2 Application Layer A note on the use of these ppt slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you see the animations;

More information

Click Studios. Passwordstate. Installation Instructions

Click Studios. Passwordstate. Installation Instructions Passwordstate Installation Instructions This document and the information controlled therein is the property of Click Studios. It must not be reproduced in whole/part, or otherwise disclosed, without prior

More information

9.4 Authentication Server

9.4 Authentication Server 9 Useful Utilities 9.4 Authentication Server The Authentication Server is a password and account management system for multiple GV-VMS. Through the Authentication Server, the administrator can create the

More information

Migrating from Citrix XenApp (IMA / FMA) to Parallels Remote Application Server

Migrating from Citrix XenApp (IMA / FMA) to Parallels Remote Application Server Parallels Remote Application Server Migrating from Citrix XenApp (IMA / FMA) to Parallels Remote Application Server Contents 1. Introduction a. Why Should You Migrate from Citrix to Parallels RAS b. Overview

More information

Realms and Identity Policies

Realms and Identity Policies The following topics describe realms and identity policies: Introduction:, page 1 Creating a Realm, page 5 Creating an Identity Policy, page 11 Creating an Identity Rule, page 15 Managing Realms, page

More information

Zetadocs for NAV Installation Guide. Equisys Ltd

Zetadocs for NAV Installation Guide. Equisys Ltd 2 Table of Contents 4 Deployment Scenarios Overview Zetadocs Express 4 Zetadocs Delivery Essentials 4 Zetadocs Capture Essentials 4 Deployment Environments 4 6 Express Installation 1. Installing the Zetadocs

More information

MOVEit Transfer on Azure Marketplace Quickstart Guide. How to deploy and use MOVEit Transfer from Microsoft Azure Marketplace

MOVEit Transfer on Azure Marketplace Quickstart Guide. How to deploy and use MOVEit Transfer from Microsoft Azure Marketplace MOVEit Transfer on Azure Marketplace Quickstart Guide How to deploy and use MOVEit Transfer from Microsoft Azure Marketplace Copyright Notice 1991-2017 Ipswitch, Inc. All rights reserved. This document,

More information

EEG DE361 HD BAS Decoder Product Manual

EEG DE361 HD BAS Decoder Product Manual EEG DE361 HD BAS Decoder Product Manual All rights reserved. [This page left intentionally blank] eeg Table Of Contents Introduction 2 Product Description... 2 Installation 3 Front Panel... 3 Rear Panel...

More information

Pure commitment. how to. change IPsec VPN settings via the vcloud Director API. version 3.0

Pure commitment. how to. change IPsec VPN settings via the vcloud Director API. version 3.0 Pure commitment. how to change IPsec VPN settings via the vcloud Director API version 3.0 Contents Overview... 3 Obtaining your vcloud API credentials... 3 Installing a REST client... 4 Obtaining an authorisation

More information

Enabling Smart Card Logon for Linux Using Centrify Suite

Enabling Smart Card Logon for Linux Using Centrify Suite DoD Public Key Enablement (PKE) Reference Guide Enabling Smart Card Logon for Linux Using Centrify Suite 2012.4 Contact: dodpke@mail.mil URL: http://iase.disa.mil/pki-pke/ URL: http://iase.disa.smil.mil/pki-pke/

More information

TIBCO Spotfire Automation Services 7.5. User s Manual

TIBCO Spotfire Automation Services 7.5. User s Manual TIBCO Spotfire Automation Services 7.5 User s Manual Revision date: 15 January 2016 Important Information SOME TIBCO SOFTWARE EMBEDS OR BUNDLES OTHER TIBCO SOFTWARE. USE OF SUCH EMBEDDED OR BUNDLED TIBCO

More information

Click Studios. Passwordstate. Password Discovery, Reset and Validation. Requirements

Click Studios. Passwordstate. Password Discovery, Reset and Validation. Requirements Passwordstate Password Discovery, Reset and Validation Requirements This document and the information controlled therein is the property of Click Studios. It must not be reproduced in whole/part, or otherwise

More information

How To Trigger a Relay Group From an Input

How To Trigger a Relay Group From an Input In GuardPointPro it is possible to fire a group of relays across multiple controllers from a signal to a single input This guide explains the steps: Grouping the outputs [Relays] 1. Go to the menu Event

More information

Administrative Tasks CHAPTER

Administrative Tasks CHAPTER 15 CHAPTER This chapter describes administrative tasks to perform with WCS. These tasks include the following: Running Background Tasks, page 15-2 (such as database cleanup, location server synchronization,

More information

Virto Social Aggregator Web Part for Microsoft SharePoint Release User and Installation Guide

Virto Social Aggregator Web Part for Microsoft SharePoint Release User and Installation Guide Virto Social Aggregator Web Part for Microsoft SharePoint Release 2.3.0 User and Installation Guide 2 Table of Contents SYSTEM/DEVELOPER REQUIREMENTS... 3 OPERATING SYSTEM... 3 SERVER... 3 BROWSER... 3

More information

Infoblox Trinzic V-x25 Series Appliances for AWS

Infoblox Trinzic V-x25 Series Appliances for AWS DEPLOYMENT GUIDE Infoblox Trinzic V-x25 Series Appliances for AWS NIOS version 8.2 Oct. 2017 2017 Infoblox Inc. All rights reserved. Infoblox Trinzic TE-Vx25 Deployment Guide October 2017 Page 1 of 29

More information

Aloaha FindMail.

Aloaha FindMail. Aloaha FindMail.eMail Aloaha FindMail.eMail is an email archiving solution that can archive inbound-, internal and outbound emails directly and transparently into a central mailstore. Additionally emails

More information

G-Lock EasyMail7. Startup Guide. Client-Server Marketing Solution for Windows. To learn more about G-Lock EasyMail7, visit

G-Lock EasyMail7. Startup Guide. Client-Server  Marketing Solution for Windows. To learn more about G-Lock EasyMail7, visit G-Lock EasyMail7 Client-Server Email Marketing Solution for Windows Startup Guide 1 Table of Contents This document is your startup guide for G-Lock EasyMail7 product. It is designed to provide you with

More information

Framework Server Manager

Framework Server Manager Information in this document is subject to change without notice. No part of this document may be reproduced or transmitted in any form or by any means, for any purpose, without the express written permission

More information

Getting Started. Getting Started with Your Platform Model. Factory Default Configurations CHAPTER

Getting Started. Getting Started with Your Platform Model. Factory Default Configurations CHAPTER CHAPTER 2 This chapter describes how to access the command-line interface, configure the firewall mode, and work with the configuration. This chapter includes the following sections: with Your Platform

More information

This material is based on work supported by the National Science Foundation under Grant No

This material is based on work supported by the National Science Foundation under Grant No This material is based on work supported by the National Science Foundation under Grant No. 0802551 Any opinions, findings, and conclusions or recommendations expressed in this material are those of the

More information

Technical Tip Building Rules and Actions Utilizing a Custom Query

Technical Tip Building Rules and Actions Utilizing a Custom Query Technical Tip Building Rules and Actions Utilizing a Custom Query Revision 07.06.2015 Technical Tip: Building Rules and Actions Utilizing a Custom Query Page 1 Table of Contents 1.0 HOW IT WORKS... 3 2.0

More information

Setup Guide. Page 0

Setup Guide. Page 0 Email Setup Guide Page 0 Table of Contents Mailbox Setup Guide... 2 Before you Start... 2 Desktop Mail Clients... 3 Outlook 2016 setup... 3 Outlook 2013 setup... 7 Outlook 2010 setup... 12 Windows 10 Mail

More information

SafeGuard Easy Demo guide. Product version: 6 Document date: February 2012

SafeGuard Easy Demo guide. Product version: 6 Document date: February 2012 SafeGuard Easy Demo guide Product version: 6 Document date: February 2012 Contents 1 Introduction...3 2 Requirements...4 3 The demo configuration package...5 4 Install the demo software...6 5 What to expect

More information

4190 Information Management System (IMS) Software Upgrade Instructions

4190 Information Management System (IMS) Software Upgrade Instructions 4190 Information Management System (IMS) Software Upgrade Instructions Introduction This publication describes the software upgrade procedure for the 4190 Information Management System (IMS). Inspecting

More information

Scan-to- . using Office 365. Copytech s guide to setting up Scan-to- on Konica Minolta MFDs using MS Office 365

Scan-to- . using Office 365. Copytech s guide to setting up Scan-to-  on Konica Minolta MFDs using MS Office 365 Scan-to-Email using Office 365 Copytech s guide to setting up Scan-to- Email on Konica Minolta MFDs using MS Office 365 Time required for set up: Approximately 20 minutes Engineer required: No Copytech

More information

A guide to configure agents for log collection in Log360

A guide to configure agents for log collection in Log360 A guide to configure agents for log collection in Log360 Contents Introduction... 2 Agent-based log collection... 2 When can you go for agent-based log collection?... 2 Architecture of agent-based log

More information

Exchange Protection Whitepaper

Exchange Protection Whitepaper Whitepaper Contents 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. Introduction... 2 Documentation... 2 Licensing... 2 Exchange Server Protection overview... 3 Supported platforms... 3 Requirements by platform... 3 Remote

More information

TIBCO Spotfire Automation Services Installation and Configuration

TIBCO Spotfire Automation Services Installation and Configuration TIBCO Spotfire Automation Services Installation and Configuration Software Release 7.0.1 July 2015 Two-Second Advantage 2 Important Information SOME TIBCO SOFTWARE EMBEDS OR BUNDLES OTHER TIBCO SOFTWARE.

More information

Configuring Ethernet Audio on Microsoft Windows Server 2012

Configuring Ethernet Audio on Microsoft Windows Server 2012 Configuring Ethernet Audio on Microsoft Windows Server 2012 Ethernet Audio uses the NFS file sharing system available in Server 2012 to allow file sharing with DigiCart/E or DigiCart/EX. First, we need

More information

ServiceNow Deployment Guide

ServiceNow Deployment Guide ServiceNow Deployment Guide (For Eureka release and forward) Okta Inc. 301 Brannan Street, 3 rd Floor San Francisco, CA, 94107 info@okta.com 1-888-722-7871 Contents Overview... 3 Active Directory Integration...

More information

DB2 Web Query 5250 Reporting Extension Usage Instructions

DB2 Web Query 5250 Reporting Extension Usage Instructions DB2 Web Query 5250 Reporting Extension Usage Instructions Updated July 2011 Copyright IBM Corporation 2011. All rights reserved. Contents Overview... 3 Part 1: Setup... 3 Part 1.1: Sample command... 3

More information

WHITEPAPER Rewrite Services. Power365 Integration Pro

WHITEPAPER  Rewrite Services. Power365 Integration Pro WHITEPAPER Email Rewrite Services Power365 Integration Pro Table of Contents The Challenge... 3 The Binary Tree Solution... 3 What to Expect... 3 Day 1 Email Rewrite Services... 3 Day 2 Email Rewrite Services...

More information

SafeGuard Easy Demo guide. Product version: 6.1

SafeGuard Easy Demo guide. Product version: 6.1 SafeGuard Easy Demo guide Product version: 6.1 Document date: February 2014 Contents 1 About this guide...3 2 Requirements...4 3 The demo configuration package...5 4 Install the demo software...6 5 What

More information

Unifaun OnlineConnect

Unifaun OnlineConnect Unifaun OnlineConnect Unifaun ERPConnect UNIFAUN WWW.UNIFAUN.COM DECEMBER 7, 2017 Contents 1 Overview... 3 1.1 Order files... 3 1.1.1 When should the order files be created?... 3 1.1.2 What should the

More information

Important Information

Important Information May 2014 Important Information The following information applies to Proofpoint Essentials US1 data center only. User Interface Access https://usproofpointessentials.com MX Records mx1-usppe-hosted.com

More information

Oracle 10g. Configuration Guide. Copyright 2005 CRYPTOCard Corporation All Rights Reserved

Oracle 10g. Configuration Guide. Copyright 2005 CRYPTOCard Corporation All Rights Reserved Oracle 10g Configuration Guide Copyright 2005 CRYPTOCard Corporation All Rights Reserved http://www.cryptocard.com Overview This document provides instructions for implementing Oracle 10g as the backend

More information

1. Open Microsoft Outlook and under Microsoft Outlook's new menu "Outlook Integration".

1. Open Microsoft Outlook and under Microsoft Outlook's new menu Outlook Integration. 1. Product Installation Installing SharePointBoost's Outlook Integration Please check with the Installation Guide Once you have successfully installed both Server and Client side of Outlook Integration,

More information

Avaya IP Office SIP Endpoint Configuration Guide

Avaya IP Office SIP Endpoint Configuration Guide Valcom Session Initiation Protocol (SIP) VIP devices are compatible with SIP-enabled versions of Avaya IP Office (5.0 and higher). The Valcom device is added to the IP Office system as a SIP Extension.

More information

IBM emessage Version 9 Release 1 February 13, User's Guide

IBM emessage Version 9 Release 1 February 13, User's Guide IBM emessage Version 9 Release 1 February 13, 2015 User's Guide Note Before using this information and the product it supports, read the information in Notices on page 471. This edition applies to version

More information