Installation Guide for 3.1.x

Size: px
Start display at page:

Download "Installation Guide for 3.1.x"

Transcription

1 CARETEND BI Installation Guide for 3.1.x TABLE OF CONTENTS DOCUMENT PURPOSE... 2 OVERVIEW... 2 PLATFORM COMPONENTS... 3 Rock-Pond BI Server... 3 CareTend BI Client Application... 3 ABOUT INSTANCES... 3 CONFIGURING ACTIVE DIRECTORY... 3 Security Group... 4 DNS Record... 4 INSTALLING ROCK-POND BI SERVER... 5 Step 1 Download the Installation File... 5 Step 2 Install Rock-Pond BI Server... 5 CONFIGURING ROCK-POND BI SERVER... 5 Step 1 Add an Instance and Select License... 5 Step 2 Configure Mail Settings... 6 Step 3 Configure Data Sources... 6 Step 4 Configure Security Settings... 8 Step 5 Install and Start the Rock-Pond BI Server... 9 Step 6 Windows Firewall Exception... 9 INSTALLING CARETEND BI CLIENT APPLICATION... 9 Step 1 Download the Installation File... 9 Step 2 Install CareTend BI... 9 LOGGING INTO THE CARETEND BI CLIENT APPLICATION...10 VALIDATION OF SUCCESSFUL INSTALLATION...10 USER SECURITY OVERVIEW...10 SECURITY MANAGER...11 CPR+ AND HOMECARE360 INSTALLATIONS Deactivating Users Synchronizing User Information CARETEND INSTALLATIONS Deactivating Users MWBI_InstallGuide.docx Page 1 of 25

2 Synchronizing User Information FASTRACK INSTALLATIONS Deactivating Users DEFINING SECURITY SETS Security Set Properties Content Sets Default Security Set Custom Security Sets ASSIGNING SECURITY SETS TO USERS APPENDIX A INSTALLATION CHECKLIST...16 APPENDIX B REQUIREMENTS...18 Hardware / Software Requirements Cloud Connectivity Requirements APPENDIX C ADVANCED CONFIGURATION OPTIONS...20 Rock-Pond BI Server TCP IP/Port Settings Rock-Pond BI Server Windows Service Account CareTend BI Manual Server Specification Restricting License Selection in Login Screen APPENDIX D CARETEND BI PLATFORM DIAGRAM...22 APPENDIX E MANUALLY UPGRADING THE PLATFORM...23 Rock-Pond BI Server CareTend BI Client Application APPENDIX F - SQL SERVER ANALYSIS SERVICES (SSAS)...24 SSAS INSTALLATION LOCATION SSAS INSTALLATION SSAS CONFIGURATION Firewall Configuration Analysis Services Configuration CONFIGURING CARETEND BI FOR SSAS DOCUMENT PURPOSE This document details the installation and configuration process for the Mediware Business Intelligence (CareTend BI) platform. A current version of this document is always available at the following link, and it is suggested you access it via the link each time you view it so you have the most recent information: OVERVIEW CareTend BI brings extensive business intelligence to users in your organization such as reports, dashboards, and analytical data cubes. It is designed to be simple, secure, easy to install, and easy to maintain. An MWBI_InstallGuide.docx Page 2 of 25

3 installation checklist is provided in Appendix A that will ensure you are ready to proceed and allows you to document your setup if you must refer to it at a later time. PLATFORM COMPONENTS There are two components that make up the CareTend BI platform. The first component is the Rock-Pond BI Server and installs one time on an existing server of your choice. The second component is the CareTend BI client application, which may be installed directly onto user workstations or onto a centralized application server where it may be published using technologies like Citrix or Remote Desktop Services. ROCK-POND BI SERVER The Rock-Pond BI Server is the first component that should be installed in your environment. This component serves two key functions: Centralized configuration of the platform, such as where the platform connects to to retrieve data for business intelligence content, security related parameters, as well as other important settings that control how the platform behaves. Centralized processing of business intelligence content that has been configured by administrators and/or users to be generated and delivered automatically via the built-in scheduling feature. The Rock-Pond BI Server consists of an application which is used to configure the component as well as a standard Windows Service that starts after the product is configured. The requirements for the Rock-Pond BI Server component is provided in Appendix B. CARETEND BI CLIENT APPLICATION The CareTend BI client application is the second component that should be installed either onto user workstations or onto a centralized application server where it may be published using the solution of your choice. The client application is where the majority of product setup will occur and is also where business intelligence content is utilized by end users. The CareTend BI client communicates directly with the Rock-Pond BI Server to determine how it will operate and typically does not require specific workstation configuration to begin using. The requirements for the CareTend BI client component is provided in Appendix B. ABOUT INSTANCES The CareTend BI platform supports multiple instances to be configured. Most organizations will only have one instance installed into their Rock-Pond BI Server, but in some cases, multiple instances will be configured. For example, if you have a CareTend production system and a CareTend test system, and require CareTend BI to work against each of those systems, you will add an instance for each of them. Each instance has its own configuration and operates separate from any other instance that is configured. CONFIGURING ACTIVE DIRECTORY The CareTend BI platform integrates with your existing Active Directory domain to control user access to the product. This allows users to login to the product using their existing domain credentials if they have been MWBI_InstallGuide.docx Page 3 of 25

4 granted the appropriate access by system administrators. For the CareTend BI platform to integrate with Active Directory, the following will be required: A new Active Directory security group for which users will be added. This controls whether a user may login to the product regardless of supplying valid domain credentials. A new Active Directory DNS entry which will direct the CareTend BI client application to the location of the Rock-Pond BI Server. SECURITY GROUP Create a new security group in your Active Directory domain which will be used to control which users have access to login to the CareTend BI product. You may name the security group however you would like, but if you are configuring multiple instance in the Rock-Pond BI Server, you should name the security group so that it may be identified as specific to the instance it belongs. DNS RECORD For the CareTend BI client application to automatically find the location of the Rock-Pond BI Server, and to prevent client level configuration from being required, you must specify a new DNS record that maps a hostname on your domain to the IP address of the server where the Rock-Pond BI Server is located. In the DNS control panel, add a new host (A) record, and name it BISERVER. Associate this new host record with the corresponding server s IP address. MWBI_InstallGuide.docx Page 4 of 25

5 INSTALLING ROCK-POND BI SERVER The following steps should be completed to properly install the Rock-Pond BI Server: STEP 1 DOWNLOAD THE INSTALLATION FILE The current version of Rock-Pond BI Server 3.1.x may be downloaded at Download this to the server which you plan on housing this component. STEP 2 INSTALL ROCK-POND BI SERVER Execute the RPBIS_3.1.exe installation file to install it onto the server. You may choose to install to a location other than the default if you desire. During the installation, you may be prompted to install additional components which are required by the platform, such as SAP s Crystal Reports runtimes and Microsoft s Visual C++ runtimes. You will only be prompted to install these additional components if the installer determines that they are not already present or if the installer determines that the existing versions of these components require updating. After the installation is complete, you may launch Rock-Pond BI Server via the icon on the desktop if you chose to have the desktop shortcut installed. CONFIGURING ROCK-POND BI SERVER The Rock-Pond BI Server s main screen allows you to add, edit, and delete instances as well as control the Windows Service. STEP 1 ADD AN INSTANCE AND SELECT LICENSE Click the Add Instance button in the Rock-Pond BI Server s toolbar. This will display the configuration dialog where you will supply the configuration for this instance. You will have been provided a license file that is to be loaded on the first tab of this screen labeled License. The license file will have a.lic extension. Click Select License to load the license file that was provided to you. Once selected, the license will be validated and your company name will be shown along with the system which the license is assigned. MWBI_InstallGuide.docx Page 5 of 25

6 STEP 2 CONFIGURE MAIL SETTINGS CareTend BI features a powerful scheduling platform that allows administrators and/or users to configure business intelligence content to be generated and delivered automatically. This feature provides support for the delivery of automatically generated content via . To utilize this delivery option, you must supply valid SMTP server settings that will be used. Many different types of SMTP settings are supported and will be based on the implementation of your organization s solution. If you would like to disable functionality within CareTend BI, you may check the box labeled Disable SMTP Functionality, otherwise specify your SMTP settings and click Validate. Your SMTP settings will be tested by sending a test to the address listed in the Admin Address field. STEP 3 CONFIGURE DATA SOURCES For CareTend BI to connect to your system database(s) to display business intelligence content, you must specify the location of your system s Microsoft SQL Server database. In some situations, you may be asked to specify settings for more than one data source, such as systems which require a connection to an application database as well as a reporting database. The CareTend BI platform supports utilizing Integrated Authentication when connecting to the database, however, it is recommended that you create new SQL Server credentials that have the appropriate access and specify them on this screen as it is typically simpler to configure. Configuring SQL Server Security for BI MWBI_InstallGuide.docx Page 6 of 25

7 In many cases, administrators will utilize a SQL Server user account that has full permissions to the source database. In this case, there are not any additional security related settings that you are required to configure. CareTend BI stores small amounts of company settings related data and data model objects for which content is driven by in a schema named rpbi in your source system database. The rpbi schema allows all objects that CareTend BI creates, manages, and utilizes to remain in a segregated part of your database structure, allowing for the option to configure a SQL Server user account with fine grained security permissions. Under normal circumstances, CareTend BI automatically creates the rpbi schema and manages all the database objects within the rpbi schema. You may decide you would like to create a SQL Server user account for CareTend BI that has stricter security associated with it. CareTend BI requires that the SQL Server user account has a minimum of the following permissions: 1. Read-only access to all tables within the source system database. 2. Full access to all objects within the rpbi schema. This includes reading and writing, executing stored procedures and functions, selecting from views, as well as the creation, renaming, and deletion of objects. If the SQL Server user account you create does not have access to create a new schema within your source system database, you will need to manually create the rpbi schema before starting the Rock-Pond BI Server. Once you have entered your data source settings, click Validation. Your connections will be tested. If there are any issues with the settings, the validation will fail and you will need to adjust the settings accordingly. Note Regarding Integrated Authentication: If you choose to utilize integrated authentication, then you must ensure two requirements are met: 1. All users who will utilize CareTend BI must have the appropriate SQL Server permissions granted to their domain credentials. 2. The Rock-Pond BI Server Windows Service must be configured to use a service account that has been granted the appropriate SQL Server permissions otherwise it will not start. MWBI_InstallGuide.docx Page 7 of 25

8 STEP 4 CONFIGURE SECURITY SETTINGS Security Groups You must specify the Active Directory security group which was added in the Configuring Active Directory section. This group controls which users will be able to login to this instance. The security group specified here must match exactly to the group that was setup in Active Directory. If you wish to bypass the security group check, you may check the Disable Security Groups box. Users will still require a valid login to utilize the product. Client Updates The CareTend BI platform features an internal updating function that prompts users to upgrade their client in the event a new one becomes available. This eases administration of the product by not requiring administrators to manually update numerous workstations. It is highly recommended that client updates be enabled unless there is a specific reason to disable them. In some cases, it may be desired to disable this functionality, such as situations where the CareTend BI client application will be published to users via an application server using Citrix or Remote Desktop Services. Users in these environments typically do not have the required permissions to perform application updates, thus it is recommended to disable them. Refer to the Upgrading the CareTend BI Platform section for more information about how automatic updates function and how to apply updates manually. Administrative User In some cases, when the CareTend BI platform is integrating with a Mediware system that is not integrated with Active Directory, such as CPR+ and HomeCare360, you may need to specify a manual mapping to determine who will initially be the administrator of the CareTend BI platform. This is required when the administrator s Windows domain username does not match a corresponding username in the target system. For example, if you re an administrator of the CareTend BI platform and are installing it for the first time, and your username is mjones but your CPR+ or HomeCare360 username is jonesm, you ll need to specify the mapping in this section by entered mjones into the Windows Username field and jonesm into the System Username field. This will create a link between the mjones windows user and the jonesm system user. MWBI_InstallGuide.docx Page 8 of 25

9 STEP 5 INSTALL AND START THE ROCK-POND BI SERVER You will need to install and start the Windows Service that will run in the background. To do this, click Install Rock-Pond BI Server which will install the service onto the server. The corresponding service will appear in the standard Windows Services control panel as Rock-Pond BI Server. After the service is installed, click Start Rock-Pond BI Server which will start the Windows service. If there are any problems starting the Windows service, refer to the Windows Event Log which will contain more detailed information regarding the failure. The entries in the Windows Event Log will be labeled Rock- Pond BI Server. If the Windows service started successfully, the main screen will indicate that the server is running. You may now close the Rock-Pond BI Server screen and archive the license file that you selected during step 1. There is no need to keep the license file in the same location that it was in during the instance configuration. STEP 6 WINDOWS FIREWALL EXCEPTION The CareTend BI client application communicates with the Rock-Pond BI Server via TCP port The server that the Rock-Pond BI Server is installed on will need to allow access to this port from local network computers if the Windows firewall is enabled. If a third-party firewall is in place, it will need to be adjusted to allow this communication. INSTALLING CARETEND BI CLIENT APPLICATION The following steps should be completed to properly install the CareTend BI client application: STEP 1 DOWNLOAD THE INSTALLATION FILE The current version of CareTend BI 3.1.x may be downloaded at Download this to the workstation or application server that will be utilizing the client. STEP 2 INSTALL CARETEND BI Execute the MWBI_3.1.exe installation file to install it onto the workstation or application server. You may choose to install to a location other than the default if you desire. During the installation, you may be prompted to install additional components which are required by the platform, such as SAP s Crystal Reports runtimes and Microsoft s Visual C++ runtimes. You will only be MWBI_InstallGuide.docx Page 9 of 25

10 prompted to install these additional components if the installer determines that they are not already present or if the installer determines that the existing versions of these components require updating. After the installation is complete, you may launch CareTend BI via the icon on the desktop if you chose to have the desktop shortcut installed. LOGGING INTO THE CARETEND BI CLIENT APPLICATION Once the CareTend BI client application is installed and the Rock-Pond BI Server is started, users may login. Launch the CareTend BI client application via the icon on the desktop. If the current user is logged into a domain account, the login screen will automatically detect it. A domain may also be specified manually be prefacing the username with the domain in the format of DOMAIN\username. If multiple instances are configured in the Rock-Pond BI Server, they will be enumerated in the Instance drop down. If only one instance is present, it will be auto selected. After a successful login occurs, the username, domain, and last selected instance will be remembered for convenience. VALIDATION OF SUCCESSFUL INSTALLATION A successful installation is established when logging into the CareTend BI client application for the first time and being presented with the main screen (content explorer). At this time, a record will be logged to Rock- Pond s cloud indicating the user, date, and time of the client login. That timestamp will be used to determine when the successful installation occurred. USER SECURITY OVERVIEW The CareTend BI platform provides administrators with the capability to define security parameters that control what functions users have access to within the application as well as what business intelligence content they are able to utilize. CareTend BI is integrated with Mediware s CareTend, CPR+, and HomeCare360 systems at the user level which inherit user security settings such as site and company assignments so that users only have access to information for which they are assigned. MWBI_InstallGuide.docx Page 10 of 25

11 SECURITY MANAGER User security is configured within the Security Manager of the CareTend BI client application, which is available in the settings menu. Only CareTend BI administrative users have access to this area. Launching the Security Manager for the first time may take up to a minute while users from the system are imported into the CareTend BI platform. Once loaded, a list of all users from the target system will be displayed. NOTE: Not all systems are integrated at the user level, such as Fastrack. In this case, only users who have logged into CareTend BI will be displayed in the security manager. TIP: The Security Manager and the screens within it provide for flexible management of users by allowing you to search, filter, and group by the columns in the grid. For instance, you may drag the Security Set column to the area above the grid to organize users into groups based on the security set they belong to. You may also use the quick search area above the grid to quickly find users using a search string, or filter columns directly in the column header. CPR+ AND HOMECARE360 INSTALLATIONS If you are using CareTend BI with Mediware s CPR+ or HomeCare360 systems, you may need to associate the users of the product with their corresponding user in the system. This mapping between the Windows username and the system username is required if they do not match. For examples, if the Windows username is mjones and that user s corresponding system username is jonesm, then a mapping must be established before the user will be able to login to CareTend BI. DEACTIVATING USERS Users may be deactivated either by removing them from the corresponding BI Active Directory group, or be deactivating the user from within CPR+ or HomeCare 360. SYNCHRONIZING USER INFORMATION When using CPR+ or HomeCare 360 BI, you will be prompted to synchronize users upon visiting the Security Manager. This function updates CareTend BI with all relevant information from your core system, such as name, address, and user status. It s recommended that this synchronization be performed regularly, but MWBI_InstallGuide.docx Page 11 of 25

12 is not required to be performed each time you load the security manager. You may also synchronize users via the button in the Security Manager s toolbar. CARETEND INSTALLATIONS Before users will be able to login to CareTend BI, they must be setup as an active user in CareTend. DEACTIVATING USERS Users may be deactivated either by removing them from the corresponding BI Active Directory group, or be deactivating the user from within CareTend. SYNCHRONIZING USER INFORMATION When using CareTend, you will be prompted to synchronize users upon visiting the Security Manager. This function updates CareTend BI with all relevant information from your core system, such as name, address, and user status. It s recommended that this synchronization be performed regularly, but is not required to be performed each time you load the security manager. You may also synchronize users via the button in the Security Manager s toolbar. FASTRACK INSTALLATIONS Fastrack does not integration directly with CareTend BI. All logins to CareTend BI when used with Fastrack are based on the users Active Directory credentials. DEACTIVATING USERS Users may be deactivated either by removing them from the corresponding BI Active Directory group or by deactivating them from within the Security Manager by setting their status via the button in the toolbar. DEFINING SECURITY SETS Security sets allow administrators to define what areas of the CareTend BI applications users are permitted to access as well as what business intelligence they are able to use. Each user is assigned to a single security set. When a new user logs into CareTend BI for the first time, they are assigned to the default security set. SECURITY SET PROPERTIES Security sets are broken into several sections which allow for fine grained privileges to be defined for various areas of the CareTend BI application: Administrative Access The Administrative User (Full System Access) checkbox defines whether or not users associated with this security set will be administrators of CareTend BI. This will provide full access to all areas of CareTend BI, including the Security Manager. This option should only be enabled for users who are delegated administrative responsibility and understand the security implementation of the platform. Administrative users have the ability to see other users configuration, such as their jobs, tasks, and history. Enable Company Settings The Enable Company Settings checkbox defines whether or not users associated with this security set will be allowed to access the Company Settings area that is available in the client application s settings menu. MWBI_InstallGuide.docx Page 12 of 25

13 Jobs and Tasks This section defines whether users have access to Jobs, Tasks, or both. Definitions Tasks Jobs Tasks allow users to define saved instances of business intelligence content that can easily be recalled at a later time. Tasks may optionally be setup to deliver to predefined destinations, such as recipients, SFTP and FTP servers, or network shares. Jobs allow users to group one or more tasks together and schedule them to generate and deliver automatically. If Jobs or Tasks is enabled in the security set, you will need to define the Policy that applies to the user. This controls what recipients the user is able to have business intelligence content delivered to. There are four policies to choose from: 1. Open Access This allows users to setup tasks that may deliver via to any recipient(s) of their choosing. 2. Allow to Specific Recipients This allows administrators to setup list that contain predefined recipients that users can select from when configuring a task to deliver via . When this option is selected, the tab allows for the addition of new lists as well as the association of lists with the security set. 3. Allow to Specific Domains This allows administrators to setup lists that contain predefined domain names for which users can configure a task to deliver to via . For instance, if the user should only be able to business intelligence content to recipients within the company.com domain name, the company.com domain name would be added to the domain list in the tab. 4. Allow to Self Only This allows administrators to restrict users to only the ability to configure tasks that can be ed to the current user. This prevents the user from configuring a task to deliver business intelligence content to anyone but themselves. Tasks may also be configured by users to allow business intelligence content to be delivered to SFTP, FTP, and File / Network locations. These destinations will only be available if they are setup in the CareTend BI platform and associated with the security set. You can add or associate destinations on the SFTP, FTP, and File / Network tabs within the security set. TIP: Destinations may also be centrally managed by accessing the Configure Delivery Destinations option in the main settings menu under Jobs and Tasks Configuration. Destinations that are added in this area may then be selected when configuring security sets. Content The content section of the security set allows administrators to control whether or not users who belong to the security set are able to access the Content Deployment area of the CareTend BI platform as well as control what business intelligence content they are able to use. Cube Layout Sharing should be enabled for those users who will be responsible for creating cube layouts and sharing them with one or more users, or the entire company. MWBI_InstallGuide.docx Page 13 of 25

14 You may permit users of CareTend BI to modify company help and company tags for your organization. When enabled, users may create company level tabs in the Content Help module as well as define company level tags in the Content Explorer. Checking the Allow editing of Company Help and Tags will enable this functionality. Security sets can be configured to allow users who are assigned to them access to either all business intelligence content or to specific content sets. Content sets allow administrators to select specific business intelligence areas and specific content which the users is permitted to use. If Enable All Content is not enabled in the security set, users will not be able to use any business intelligence content until a content set is created and assigned to the security set. Deployment Content Deployment should be enabled for those users who write their own business intelligence content and will be publishing it to the organization for other users to use. For a normal user, this is likely not something that will need to be enabled. You may permit users of CareTend BI to modify standard help and standard tags for content that is deployed by your organization within the Content Deployment module. Users with this permission may edit standard help, standard tags, and the description of the content item. Checking the Allow Editing of Standard Content Help and Tags will enable this functionality. FocusBoards Enabling the FocusBoard manager allows users to manage FocusBoards and the slideshows that are assigned to them. Enabling this turns on the FocusBoard Manager option in Mediware s main settings menu. For more information about FocusBoards, contact Rock-Pond Solutions. CONTENT SETS Content sets may be created and configured by clicking the Content Sets button in the Security Manager s toolbar or by clicking the Setup button in the security set next to the Content Set drop down menu. This will display the list of content sets that are currently setup and available to assign to security sets. The following sample screen shows the various ways to configure a content set: MWBI_InstallGuide.docx Page 14 of 25

15 Once a content set has been added, you may assign it to a security set in the drop down. Users who belong to that security set will only have visibility and access to the content that was assigned in the content set. DEFAULT SECURITY SET The default security set is applied to users when they first login to CareTend BI unless they have already been assigned to a custom security set. The default security set is designed to allow administrators to define strict permissions within the software until they have the opportunity to further define what permissions a user should be assigned. The default security set may be configured by clicking the Default Security Set button in the Security Manager s toolbar. CUSTOM SECURITY SETS You may configure custom security sets that allow for different users to have access to different areas of CareTend BI. For example, you may have a security setup for administrators which provides full access to the CareTend BI platform, another security set that provides access to only financial reporting for reimbursement staff, and another content set that allows users to build and publish content via the Content Deployment module. MWBI_InstallGuide.docx Page 15 of 25

16 ASSIGNING SECURITY SETS TO USERS Assigning security sets to users is easy. Select one or more user in the grid by holding down the control key, and choose the Assign Security Set menu option in the Security Manager s toolbar. Select the security set which you would like to assign to the selected users. This security set will take immediate affect for the users. IMPORTANT NOTE: When implementing the CareTend BI platform for the first time, the default security set is set to permit full access to the product. This is done so that the administrator who is installing and configuring the platform has initial access to complete the initial setup of the product. A new administrative security set should be created and assigned to the administrative user performing the initial setup of the platform and the default security set should be adjusted to remove administrative access. APPENDIX A INSTALLATION CHECKLIST The following checklist may be used to prepare for the installation of the CareTend BI platform as well as document your configuration along the way. Ensure you have completely reviewed this installation document prior to proceeding. Step Installation Step Date Completed By Notes Complete review of this installation document Confirm receipt of the Rock-Pond BI Server license file Select server for which you will install the Rock-Pond BI Server MWBI_InstallGuide.docx Page 16 of 25

17 Determine CareTend BI client application deployment model (Citrix, Remote Desktop Services, Direct Workstation, etc.) Confirm that the target systems meet the minimum hardware, software, and network requirements Determine which users will require access to the CareTend BI platform Configure Active Directory as described in this installation document adding the users who require access to the platform to the newly created security group Obtain SQL Server connection and authentication information for the target system database Obtain SMTP connection information if enabling support for delivery of business intelligence content Download, install, configure, and start the Rock-Pond BI Server ensuring the Windows firewall has had the proper exception created Download and install the CareTend BI client application and provide access to the required users Confirm user access to the CareTend BI client application and its business intelligence content Complete initial setup of the CareTend BI platform by configuring user security MWBI_InstallGuide.docx Page 17 of 25

18 APPENDIX B REQUIREMENTS The Rock-Pond BI Server and CareTend BI client are desktop applications that utilize Microsoft s.net framework. They are intended to be installed on current 64-bit versions of Microsoft Windows and Microsoft Windows Server operating systems. There are many variables that exists shape the requirements of the CareTend BI platform. As a result, certain requirements are not straightforward and depend heavily on your implementation of the platform into your environment as well as your organizations size and the number of users who will utilize the product. Some factors to consider when planning resource requirements and determining expected performance of the CareTend BI platform are: Average disk size of the target system s Microsoft SQL Server database(s) Number of concurrent users and the type of business intelligence content they will regularly use Implementation model of the application, such as deployment via Citrix, Remote Desktop Services, or direct user workstation installations. Multi-user environments will require additional system resources when compared to direct workstation installations Specifications of the target systems Microsoft SQL Server and the resources that are dedicated to its operation Maintenance status of the target systems Microsoft SQL Server database, such as optimized indexes and properly maintained transaction logs. All of the factors listed above greatly determine what your system and network requirements will be. HARDWARE / SOFTWARE REQUIREMENTS The following table shows the hardware and software minimum requirements for the Rock-Pond BI Server and CareTend BI client application, however, your specific implementation s requirements will vary: Component Disk Memory CPU Operating System Microsoft.NET Rock-Pond BI Server 1 GB 4 GB x64 CareTend BI 1 GB 2 GB X64 Windows Server 2003 R2, 2008 R2, 2012 R2 Windows 7, 8, 8.1, 10 Windows Server 2003 R2, 2008 R2, 2012 R2 Windows 7, 8, 8.1, CLOUD CONNECTIVITY REQUIREMENTS The CareTend BI platform is a cloud driven application which enables it to deliver dynamic business intelligence solutions to its users. The following describes the types of communication that take place between the CareTend BI platform and the cloud: Business intelligence content templates are maintained in the cloud and obtained by the CareTend BI platform on demand. This enables users to always have access to current versions of their content as well as have access to newly available content as it becomes available. MWBI_InstallGuide.docx Page 18 of 25

19 Customer licensing, configuration, and usage logging are maintained in the cloud which provides a safe, secure, flexible, and dynamic method in which the CareTend BI platform obtains it s configuration and becomes tailored to your organizations requirements. Platform updates are delivered from the cloud as they become available. Administrators at your organization have control to approve updates before they happen to the application components. End user resources and documentation are maintained in the cloud so that current valuable resources are always available to the users of the product. User preferences are maintained in the cloud which enable users to access their personalized CareTend BI application regardless of which computer they login to. There are always a lot of justified concerns that organizations have when they implement platforms that utilize the Internet. The following describes the types of communication that DOES NOT take place between the CareTend BI platform and the cloud: System data (CPR+, HomeCare360, Fastrack, and CareTend) is NEVER transferred over the Internet to the cloud and the cloud NEVER accesses your system data. The cloud has no access to your internal network or to your system data. Information about your company is NEVER transferred over the Internet to the cloud. Product usage information, such as the business intelligence content being utilized by your organizations users is stored in the cloud but does NOT contain any information contained within that content. The following table shows the Internet requirements for the Rock-Pond BI Server and CareTend BI client application: Component Type Port Destinations Protocol Rock-Pond BI Server TCP (Outbound) 22 CareTend BI TCP (Outbound) 22 rpbi1.rpsol.net ( ) rpbi2.rpsol.net ( ) rpbi1.rpsol.net ( ) rpbi2.rpsol.net ( ) SSH 2.0 / RSA 2048bit Encryption SSH 2.0 / RSA 2048bit Encryption MWBI_InstallGuide.docx Page 19 of 25

20 APPENDIX C ADVANCED CONFIGURATION OPTIONS The following are advanced configuration options that may be utilized if required: ROCK-POND BI SERVER TCP IP/PORT SETTINGS By default, the Rock-Pond BI Server binds to port 8434 on all IP addresses that exist on the system for which it is installed. If your situation requires the need to override this, you may specify a specific IP address and port to bind to: 1. In the Rock-Pond BI Server Program Files Folder, which defaults to C:\Program Files\Rock-Pond Solutions\Rock-Pond BI Server, create an empty file named server.bi. 2. Open the server.bi file in notepad and enter an IP address and port in the format of IP:PORT. For example, entering :9000 in the server.bi file will cause the Rock-Pond BI Server to bind to port 9000 on Ensure the Windows firewall is configured with the appropriate exception for this custom binding. ROCK-POND BI SERVER WINDOWS SERVICE ACCOUNT In some cases, it may be necessary to change the service account for which the Rock-Pond BI Server s Windows service runs under from Local System Account to a custom service account. Scenarios where this is important include: 1. Utilizing Windows Authentication for your data connections. When doing so, the service must be running under an account that has the appropriate SQL Server permissions to the database. 2. Installing Rock-Pond BI Server in a non-standard place, such as somewhere else than C:\ or C:\Program Files. The service must be running under an account that can fully manipulate files within the program files directory. CARETEND BI MANUAL SERVER SPECIFICATION By default, the CareTend BI client application searches for the DNS hostname BISERVER to locate the IP address of the Rock-Pond BI Server and will default to using port 8434 when connecting to it. This may be overridden by manually specifying the IP and port: 1. In the CareTend BI Program Files Folder, which defaults to C:\Program Files\Mediware Information Systems\CareTend BI, create an empty file named server.bi. 2. Open the server.bi file in notepad and enter an IP address and port in the format of IP:PORT. For example, entering :9000 in the server.bi file will cause the CareTend BI to connect to the Rock-Pond BI Server at using port RESTRICTING LICENSE SELECTION IN LOGIN SCREEN In the event that you have configured multiple instances in the Rock-Pond BI server and wish to only display specific instances in the drop down menu of the login screen, you may supply arguments at the command line or in the shortcut to limit the selection. This is useful if you have multiple instances that contain configurations for separate companies that only specific users would login to. MWBI_InstallGuide.docx Page 20 of 25

21 The -l (lowercase L) switch may be supplied at the command line followed by one or more license keys separated by commas. This switch may be passed to the bi_client.exe at the command line, in a batch file, or in a published application definition in Citrix or Remote Desktop Servers. For example: Launch CareTend BI and limit instance selection to license bi_client.exe -l Launch CareTend BI and limit instance selection to license and bi_client.exe -l 12345,99999 MWBI_InstallGuide.docx Page 21 of 25

22 APPENDIX D CARETEND BI PLATFORM DIAGRAM The following diagram depicts a typical installation of the CareTend BI platform and its components. Your specific implementation of the platform may vary depending on your environment. MWBI_InstallGuide.docx Page 22 of 25

23 APPENDIX E MANUALLY UPGRADING THE PLATFORM The CareTend BI platform implements automatic updates that keep the Rock-Pond BI Server and the CareTend BI client application up-to-date as new releases become available. In some cases, such as multi-user environments where the client is published via Citrix or Remote Desktop Services and client updates are disabled in the Rock-Pond BI Server, manual updates may need to be applied. Manually updating simply requires that the new versions of the Rock-Pond BI Server and CareTend BI installation files are downloaded and run. Detailed upgrade instructions will be provided with the release notes for the version you are upgrading to. The instructions in this section detail a typical upgrade, but the release notes may require additional steps to be taken. Always refer to the release notes before applying upgrades. ROCK-POND BI SERVER Prior to running the new installation file, ensure that you have stopped the Rock-Pond BI Server s Windows service and closed the application. After executing the new installation, launch the Rock-Pond BI Server, confirm that the version is the expected version, and start the Windows service. CARETEND BI CLIENT APPLICATION Ensure all that all instance of the CareTend BI client application are closed. Once confirmed, execute the new installation, launch CareTend BI, and confirm that the version is the expected version. MWBI_InstallGuide.docx Page 23 of 25

24 APPENDIX F - SQL SERVER ANALYSIS SERVICES (SSAS) The CareTend BI platform supports the utilization of Microsoft s SQL Server Analysis Service component as a data source for its content. SSAS facilitates 3 dimensional OLAP cubes that can be used to quickly and efficiently analyze large amounts of data from within CareTend BI. To utilize this feature, you will need to contact Rock-Pond Solutions to coordinate the configuration. In addition, to utilize this feature, you must provision a SSAS server if you do not already have one. The Analysis Services component is an included feature in the Microsoft SQL Server platform, and you may already have an SSAS server running. CareTend BI is compatible with SQL Server Analysis Servers 2008 and greater. SSAS INSTALLATION LOCATION SSAS may stand on its own, separate from the SQL Server instance that is already installed at your company. SSAS requires network layer connectivity to the SQL Server database that it will be processing data for, in this case, your Mediware core system database. SSAS INSTALLATION SSAS may be installed using the standard SQL Server installation media. The installation program allows for the selection of Analysis Services. This should be run on the system for which SSAS will operated and house data. SSAS CONFIGURATION There are two main configuration items that must be addressed after SSAS is configured: FIREWALL CONFIGURATION If using a firewall, such as the built-in Windows Firewall, a rule must be added to allow inbound connections to the SSAS server. SSAS operates on TCP port 2383 by default. Allowing a connection to TCP port 2383 from your network on the system housing the SSAS server will permit CareTend BI to connect to it to retrieve data for content. ANALYSIS SERVICES CONFIGURATION In the SQL Server Configuration Manager, you must ensure that SQL Server Analysis Services is set to run automatically and is currently running. Next, you should use SQL Server Management Studio to connect to the analysis services instance. During the installation, it will have allowed you to specific the users that are administrative users. This step should be performed by that user: MWBI_InstallGuide.docx Page 24 of 25

25 Once connected, you must right-click the server root node in the tree in the object explorer, choose Properties, and under the Security section, assign a server administrator. The user defined here will be used when configuring CareTend BI for the SSAS connection. You may prefer to setup a brand-new user specific to this, or use an existing AD user. CONFIGURING CARETEND BI FOR SSAS Once SSAS is provisioned, Rock-Pond will assign the SSAS connection to your account. Once that is done, the Rock-Pond BI Server can be used to define the connection to the new SSAS server. MWBI_InstallGuide.docx Page 25 of 25

ROCK-POND REPORTING 2.1

ROCK-POND REPORTING 2.1 ROCK-POND REPORTING 2.1 Installation and Setup Guide Revised on 09/25/2014 TABLE OF CONTENTS ROCK-POND REPORTING 2.1... 1 SUPPORT FROM ROCK-POND SOLUTIONS... 2 ROCK-POND REPORTING OVERVIEW... 2 INFRASTRUCTURE

More information

SentryOne Quick Start 1

SentryOne Quick Start 1 SentryOne Quick Start 1 1 Cover Page QUICK START GUIDE SentryOne Quick Start 2 2 Table of Contents 1. Cover Page 1 2. Table of Contents 2-3 3. Quick Start Guide 4 4. Important Concepts 5-6 5. Installation

More information

Sage X3 Intelligence Financial Reporting. Installation and Upgrade Guide

Sage X3 Intelligence Financial Reporting. Installation and Upgrade Guide Financial Reporting Installation and Upgrade Guide The software described in this document is protected by copyright, and may not be copied on any medium except as specifically authorized in the license

More information

Enterprise Vault.cloud CloudLink Google Account Synchronization Guide. CloudLink to 4.0.3

Enterprise Vault.cloud CloudLink Google Account Synchronization Guide. CloudLink to 4.0.3 Enterprise Vault.cloud CloudLink Google Account Synchronization Guide CloudLink 4.0.1 to 4.0.3 Enterprise Vault.cloud: CloudLink Google Account Synchronization Guide Last updated: 2018-06-08. Legal Notice

More information

Version Installation Guide. 1 Bocada Installation Guide

Version Installation Guide. 1 Bocada Installation Guide Version 19.4 Installation Guide 1 Bocada Installation Guide Copyright 2019 Bocada LLC. All Rights Reserved. Bocada and BackupReport are registered trademarks of Bocada LLC. Vision, Prism, vpconnect, and

More information

Print Audit 6. Print Audit 6 Documentation Apr :07. Version: Date:

Print Audit 6. Print Audit 6 Documentation Apr :07. Version: Date: Print Audit 6 Version: Date: 37 21-Apr-2015 23:07 Table of Contents Browse Documents:..................................................... 3 Database Documentation.................................................

More information

MEDIASEAL Encryptor Client Manual

MEDIASEAL Encryptor Client Manual MEDIASEAL Encryptor Client Manual May 2018 Version 3.7.1 Fortium Technologies Ltd www.fortiumtech.com Copyright 2018 - Fortium Technologies Ltd Information contained in this document is subject to change

More information

PxM Proof of Concept Configuration. June 2018 Version 3.1

PxM Proof of Concept Configuration. June 2018 Version 3.1 PxM Proof of Concept Configuration June 2018 Version 3.1 Table of Contents PxM Architecture, Installation & Configuration... 3 PxM Proof of Concept (POC) Guide... 4 Introduction... 4 Prerequisites... 4

More information

Installing and Configuring VMware Identity Manager Connector (Windows) OCT 2018 VMware Identity Manager VMware Identity Manager 3.

Installing and Configuring VMware Identity Manager Connector (Windows) OCT 2018 VMware Identity Manager VMware Identity Manager 3. Installing and Configuring VMware Identity Manager Connector 2018.8.1.0 (Windows) OCT 2018 VMware Identity Manager VMware Identity Manager 3.3 You can find the most up-to-date technical documentation on

More information

VII. Corente Services SSL Client

VII. Corente Services SSL Client VII. Corente Services SSL Client Corente Release 9.1 Manual 9.1.1 Copyright 2014, Oracle and/or its affiliates. All rights reserved. Table of Contents Preface... 5 I. Introduction... 6 Chapter 1. Requirements...

More information

x10data Application Platform v7.1 Installation Guide

x10data Application Platform v7.1 Installation Guide Copyright Copyright 2010 Automated Data Capture (ADC) Technologies, Incorporated. All rights reserved. Complying with all applicable copyright laws is the responsibility of the user. Without limiting the

More information

SafeConsole On-Prem Install Guide. version DataLocker Inc. July, SafeConsole. Reference for SafeConsole OnPrem

SafeConsole On-Prem Install Guide. version DataLocker Inc. July, SafeConsole. Reference for SafeConsole OnPrem version 5.2.2 DataLocker Inc. July, 2017 SafeConsole Reference for SafeConsole OnPrem 1 Contents Introduction................................................ 2 How do the devices become managed by SafeConsole?....................

More information

CTC BIM Suites Installation and Configuration Guide

CTC BIM Suites Installation and Configuration Guide CTC BIM Suites Installation and Configuration Guide Contents CTC Express Tools Overview...5 General Security Requirements Summary...5 Revit Workstations...5 Network Floating License Servers...6 Upgrading

More information

EMS FOR MICROSOFT OUTLOOK Installation Guide

EMS FOR MICROSOFT OUTLOOK Installation Guide EMS FOR MICROSOFT OUTLOOK Installation Guide V44.1 Last Updated: March 5, 2018 EMS Software emssoftware.com/help 800.440.3994 2018 EMS Software, LLC. All Rights Reserved. Table of Contents CHAPTER 1: EMS

More information

Installation Guide. Sage Intelligence Reporting

Installation Guide. Sage Intelligence Reporting Installation Guide Sage 300 2016 Intelligence Reporting 07.2016 Table of Contents 1.0 Introduction 3 1.1 How to use this Guide 3 1.2 Topic summary 3 1.3 Network configurations 4 1.3.1 Typical network configurations

More information

Barracuda NextGen Report Creator

Barracuda NextGen Report Creator The creates customized reports using statistics and logs collected on Barracuda NextGen F-Series Firewalls. Each report can be configured to use multiple appliances, custom or predefined report data templates,

More information

Contents. Limitations. Prerequisites. Configuration

Contents. Limitations. Prerequisites. Configuration Welcome to your Netmail Secure trial The trial version of Netmail Secure allows you to evaluate Netmail Secure from within your own corporate domain. Included is a sample mail feed that is automatically

More information

Ekran System v.6.0 Privileged User Accounts and Sessions (PASM)

Ekran System v.6.0 Privileged User Accounts and Sessions (PASM) Ekran System v.6.0 Privileged User Accounts and Sessions (PASM) Table of Contents About... 3 Using Privileged User Accounts... 4 Password Vault Configuration... 5 Defining Domain Administrator Credentials...

More information

Getting Started With the Cisco PAM Desktop Software

Getting Started With the Cisco PAM Desktop Software CHAPTER 3 Getting Started With the Cisco PAM Desktop Software This chapter describes how to install the Cisco PAM desktop client software, log on to Cisco PAM, and begin configuring access control features

More information

Cisco TelePresence Management Suite Extension for Microsoft Exchange

Cisco TelePresence Management Suite Extension for Microsoft Exchange Cisco TelePresence Management Suite Extension for Microsoft Exchange Administrator Guide Software version 2.2 D14197.06 February 2011 Contents Contents... 2 Introduction... 4 Pre-Installation Information...

More information

INSTALLATION AND USER S GUIDE OfficeCalendar for Microsoft Outlook

INSTALLATION AND USER S GUIDE OfficeCalendar for Microsoft Outlook INSTALLATION AND USER S GUIDE OfficeCalendar for Microsoft Outlook Sharing Microsoft Outlook Calendar and Contacts without Exchange Server Table of Contents What is OfficeCalendar? Sharing Microsoft Outlook

More information

LT Auditor Installation Guide

LT Auditor Installation Guide LT Auditor+ 2013 Installation Guide Intellectual Property Copyright 2007-2012 Blue Lance, LT Auditor+, and the Report Generator are registered trademarks of Blue Lance, Inc. Microsoft, Windows 2003, Window

More information

docalpha Installation Guide

docalpha Installation Guide ARTSYL DOCALPHA INSTALLATION GUIDE 1. docalpha Architecture Overview... 2 1.1. docalpha Server Components... 4 1.2. docalpha Production Environment Stations Overview... 4 1.3. docalpha Setup & Administration

More information

Virtual Postman Manual. Version

Virtual Postman Manual. Version Virtual Postman Manual Version 6.20.5 Virtual Postman Manual Version 6.20.5 Copyright 2004-2014 Virtual Postman CC Abstract This manual presents the Virtual Postman document management system, version

More information

High Availability Enabling SSL Database Migration Auto Backup and Auto Update Mail Server and Proxy Settings Support...

High Availability Enabling SSL Database Migration Auto Backup and Auto Update Mail Server and Proxy Settings Support... Quick Start Guide Table of Contents Overview... 4 Deployment... 4 System Requirements... 4 Installation... 6 Working with AD360... 8 Starting AD360... 8 Launching AD360 client... 9 Stopping AD360... 9

More information

EventMaster PLUS! Version 4 Installation and Upgrade Guide. Workgroup Deployment Microsoft MSDE 2000

EventMaster PLUS! Version 4 Installation and Upgrade Guide. Workgroup Deployment Microsoft MSDE 2000 EventMaster PLUS! Version 4 Installation and Upgrade Guide Deployment Microsoft MSDE 2000 EventMaster4 PLUS! EventMaster4 PLUS! EventMaster4 PLUS! EventMaster4 PLUS! Please send any comments regarding

More information

akkadian Global Directory 3.0 System Administration Guide

akkadian Global Directory 3.0 System Administration Guide akkadian Global Directory 3.0 System Administration Guide Updated July 19 th, 2016 Copyright and Trademarks: I. Copyright: This website and its content is copyright 2014 Akkadian Labs. All rights reserved.

More information

SkyPoint Installation & Licensing Guide

SkyPoint Installation & Licensing Guide SkyPoint Installation & Licensing Guide Lenel Systems International, Inc. i 2012 Lenel Systems International, Inc. SkyPoint Installation & Licensing Guide Contents Table of Contents INTRODUCTION... 5

More information

Installation Guide Worksoft Certify

Installation Guide Worksoft Certify Installation Guide Worksoft Certify Worksoft, Inc. 15851 Dallas Parkway, Suite 855 Addison, TX 75001 www.worksoft.com 866-836-1773 Worksoft Certify Installation Guide Version 9.0.3 Copyright 2017 by Worksoft,

More information

Xton Access Manager GETTING STARTED GUIDE

Xton Access Manager GETTING STARTED GUIDE Xton Access Manager GETTING STARTED GUIDE XTON TECHNOLOGIES, LLC PHILADELPHIA Copyright 2017. Xton Technologies LLC. Contents Introduction... 2 Technical Support... 2 What is Xton Access Manager?... 3

More information

Solution Composer. User's Guide

Solution Composer. User's Guide Solution Composer User's Guide January 2014 www.lexmark.com Contents 2 Contents Overview...4 Understanding the basics...4 System recommendations...5 Building custom solutions...6 Getting started...6 Step

More information

PerTrac Analytical Platform. SQL Version Setup Guide

PerTrac Analytical Platform. SQL Version Setup Guide SQL Version Setup Guide PerTrac Analytical Platform SQL Version Setup Guide Version 7.3.x March 21, 2013 TABLE OF CONTENTS SECTION 1: INSTALLATION OVERVIEW 3 SECTION 2: SINGLE USER INSTALLATION LAYOUTS

More information

Administrator s Guide

Administrator s Guide Administrator s Guide 1995 2011 Open Systems Holdings Corp. All rights reserved. No part of this manual may be reproduced by any means without the written permission of Open Systems, Inc. OPEN SYSTEMS

More information

Print Audit 5 - Step by Step Walkthrough

Print Audit 5 - Step by Step Walkthrough Print Audit 5 - Step by Step Walkthrough IMPORTANT: READ THIS BEFORE PERFORMING A PRINT AUDIT 5 INSTALLATION Print Audit 5 is a desktop application that you must install on every computer where you want

More information

VMware Identity Manager Cloud Deployment. DEC 2017 VMware AirWatch 9.2 VMware Identity Manager

VMware Identity Manager Cloud Deployment. DEC 2017 VMware AirWatch 9.2 VMware Identity Manager VMware Identity Manager Cloud Deployment DEC 2017 VMware AirWatch 9.2 VMware Identity Manager You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/

More information

has been retired This version of the software Sage 300 Construction and Real Estate ( formerly Sage Timberline Office)

has been retired This version of the software Sage 300 Construction and Real Estate ( formerly Sage Timberline Office) Sage 300 Construction and Real Estate ( formerly Sage Timberline Office) MyAssistant Installation Guide Version 15.1 This version of the software has been retired NOTICE This document and the Sage 300

More information

EMS DESKTOP CLIENT Installation Guide

EMS DESKTOP CLIENT Installation Guide EMS DESKTOP CLIENT Installation Guide Version 44.1 Last Updated: March 5, 2018 EMS Software emssoftware.com/help 800.440.3994 2018 EMS Software, LLC. All Rights Reserved. Table of Contents CHAPTER 1: Introduction

More information

LABEL ARCHIVE Administrator s Guide

LABEL ARCHIVE Administrator s Guide LABEL ARCHIVE Administrator s Guide DOC-LAS2015_25/05/2015 The information in this manual is not binding and may be modified without prior notice. Supply of the software described in this manual is subject

More information

APPENDIX B: INSTALLATION AND SETUP

APPENDIX B: INSTALLATION AND SETUP APPENDIX B: INSTALLATION AND SETUP Page A. Overview... B:1 How do I install and setup ICMS?... B:1 Do I need special security rights to install ICMS?... B:1 Installation Basics... B:1 How do I get a quick

More information

Contents 1. Table of Contents. Report Server (Home Page) Installation. Manage Reports DevExpress Inc.

Contents 1. Table of Contents. Report Server (Home Page) Installation. Manage Reports DevExpress Inc. Contents 1 Table of Contents Report Server (Home Page)... 3 Report Server... 4 Worker Service... 11 End-User Designer... 15... 18 Licensing and... Distribution 19 Manage User... Accounts 20 Manage Data...

More information

KYOCERA Net Admin User Guide

KYOCERA Net Admin User Guide KYOCERA Net Admin User Guide Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held liable

More information

DOWNLOAD PDF SQL SERVER 2012 STEP BY STEP

DOWNLOAD PDF SQL SERVER 2012 STEP BY STEP Chapter 1 : Microsoft SQL Server Step by Step - PDF Free Download - Fox ebook Your hands-on, step-by-step guide to building applications with Microsoft SQL Server Teach yourself the programming fundamentals

More information

New in isupport v12.7

New in isupport v12.7 New in isupport v12.7 In addition to continued enhancement of code quality, this release contains the following features: Social Client renamed to mysupport Email Processing Email Rules and Rule Groups

More information

Covene Cohesion Server Installation Guide A Modular Platform for Pexip Infinity Management October 25, 2016 Version 3.3 Revision 1.

Covene Cohesion Server Installation Guide A Modular Platform for Pexip Infinity Management October 25, 2016 Version 3.3 Revision 1. Covene Cohesion Server Installation Guide A Modular Platform for Pexip Infinity Management October 25, 2016 Version 3.3 Revision 1.0 Table of Contents 1. Overview... 3 2. Upgrading an Existing Installation...

More information

Installation Manual. Fleet Maintenance Software. Version 6.4

Installation Manual. Fleet Maintenance Software. Version 6.4 Fleet Maintenance Software Installation Manual Version 6.4 6 Terri Lane, Suite 700 Burlington, NJ 08016 (609) 747-8800 Fax (609) 747-8801 Dossier@dossiersystemsinc.com www.dossiersystemsinc.com Copyright

More information

Sage Construction Central Setup Guide (Version 18.1)

Sage Construction Central Setup Guide (Version 18.1) Sage 300 Construction and Real Estate Sage Construction Central Setup Guide (Version 18.1) Certified course curriculum Important Notice The course materials provided are the product of Sage. Please do

More information

Sage 300 Construction and Real Estate. MyAssistant Installation Guide Version 18.1

Sage 300 Construction and Real Estate. MyAssistant Installation Guide Version 18.1 Sage 300 Construction and Real Estate MyAssistant Installation Guide Version 18.1 NOTICE This document and the Sage 300 Construction and Real Estate MyAssistant software may be used only in accordance

More information

BACKUP APP V7 QUICK START GUIDE FOR SYNOLOGY NAS

BACKUP APP V7 QUICK START GUIDE FOR SYNOLOGY NAS BACKUP APP V7 QUICK START GUIDE FOR SYNOLOGY NAS Revision History Date Descriptions Type of modification 29 Jun 2016 First Draft New 25 Nov 2016 Modified Ch 3 Download Backup App, Ch 3 Install Backup App

More information

Privileged Identity App Launcher and Session Recording

Privileged Identity App Launcher and Session Recording Privileged Identity App Launcher and Session Recording 2018 Bomgar Corporation. All rights reserved worldwide. BOMGAR and the BOMGAR logo are trademarks of Bomgar Corporation; other trademarks shown are

More information

Deploying VMware Identity Manager in the DMZ. JULY 2018 VMware Identity Manager 3.2

Deploying VMware Identity Manager in the DMZ. JULY 2018 VMware Identity Manager 3.2 Deploying VMware Identity Manager in the DMZ JULY 2018 VMware Identity Manager 3.2 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ If you have

More information

Release Notes. NetBrain Integrated Edition 7.0

Release Notes. NetBrain Integrated Edition 7.0 NetBrain Integrated Edition 7.0 Release Notes Version 7.0b1 Last Updated 2017-11-22 Copyright 2004-2017 NetBrain Technologies, Inc. All rights reserved. Contents 1. Highlights... 3 2. Feature Summary...

More information

New World ERP-eSuite

New World ERP-eSuite New World ERP-eSuite 2018.1 INSTALLATION GUIDE April 9, 2018 Review important information for installing this release: SSL is required for esuite Services and Website servers. 2018 Tyler Technologies.

More information

Deployment Guide Installing WhatsUp Gold Distributed Edition to Central and Remote Sites

Deployment Guide Installing WhatsUp Gold Distributed Edition to Central and Remote Sites Deployment Guide Installing WhatsUp Gold Distributed Edition to Central and Remote Sites This guide provides information about installing and configuring WhatsUp Gold Central and Remote Sites. Contents

More information

Working with Reports

Working with Reports The following topics describe how to work with reports in the Firepower System: Introduction to Reports, page 1 Risk Reports, page 1 Standard Reports, page 2 About Working with Generated Reports, page

More information

Toolbar User Guide. Release 17.0

Toolbar User Guide. Release 17.0 Toolbar User Guide Release 17.0 2012 by Cox Communications. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means, electronic, mechanical, photocopying,

More information

Deltek Vision 7.1. Installation and Configuration Guide for Performance Management. (Analysis Cubes and Performance Dashboards)

Deltek Vision 7.1. Installation and Configuration Guide for Performance Management. (Analysis Cubes and Performance Dashboards) Deltek Vision 7.1 Installation and Configuration Guide for Performance (Analysis Cubes and Performance Dashboards) April 3, 2014 While Deltek has attempted to verify that the information in this document

More information

Customizing and Administering Project Server Access

Customizing and Administering Project Server Access WEB Customizing and Administering Project Server Access In this chapter Creating and Deleting Users from Project Server 2 Managing User Groups Project Server User Security 4 Using Categories to Control

More information

Kernel Migrator. for SharePoint. Configuration Guide

Kernel Migrator. for SharePoint. Configuration Guide Kernel Migrator for SharePoint Table of Contents 1. System Requirements... 4 1.1 Minimum System Requirements... 4 1.2 Required Operating Systems... 4 1.3 Supported Virtual Environment... 4 1.4 Supported

More information

Automation Anywhere Enterprise 10 LTS

Automation Anywhere Enterprise 10 LTS Automation Anywhere Enterprise 10 LTS Document Version: 1.3 Installation Guide Date of Publication: 15 th November, 2016 Update(s) to this document edition: Table of Contents 1. Client Prerequisites Processor

More information

VMware Identity Manager Cloud Deployment. Modified on 01 OCT 2017 VMware Identity Manager

VMware Identity Manager Cloud Deployment. Modified on 01 OCT 2017 VMware Identity Manager VMware Identity Manager Cloud Deployment Modified on 01 OCT 2017 VMware Identity Manager You can find the most up-to-date technical documentation on the VMware Web site at: https://docs.vmware.com/ The

More information

Netwrix Auditor for Active Directory

Netwrix Auditor for Active Directory Netwrix Auditor for Active Directory Quick-Start Guide Version: 8.0 4/22/2016 Legal Notice The information in this publication is furnished for information use only, and does not constitute a commitment

More information

AT&T Global Network Client for Mac User s Guide Version 2.0.0

AT&T Global Network Client for Mac User s Guide Version 2.0.0 Version 1.7.0 AT&T Global Network Client for Mac User s Guide Version 2.0.0 experience may vary. This document is not an offer, commitment, representation or warranty by AT&T and is subject to change..

More information

TECHNICAL WHITE PAPER AUGUST 2017 REVIEWER S GUIDE FOR VIEW IN VMWARE HORIZON 7: INSTALLATION AND CONFIGURATION. VMware Horizon 7 version 7.

TECHNICAL WHITE PAPER AUGUST 2017 REVIEWER S GUIDE FOR VIEW IN VMWARE HORIZON 7: INSTALLATION AND CONFIGURATION. VMware Horizon 7 version 7. TECHNICAL WHITE PAPER AUGUST 2017 REVIEWER S GUIDE FOR VIEW IN VMWARE HORIZON 7: INSTALLATION AND CONFIGURATION VMware Horizon 7 version 7.x Table of Contents Introduction.... 3 JMP Next-Generation Desktop

More information

MITEL. Live Content Suite. Mitel Live Content Suite Installation and Administrator Guide Release 1.1

MITEL. Live Content Suite. Mitel Live Content Suite Installation and Administrator Guide Release 1.1 MITEL Live Content Suite Mitel Live Content Suite Installation and Administrator Guide Release 1.1 NOTICE The information contained in this document is believed to be accurate in all respects but is not

More information

VMware AirWatch Database Migration Guide A sample procedure for migrating your AirWatch database

VMware AirWatch Database Migration Guide A sample procedure for migrating your AirWatch database VMware AirWatch Database Migration Guide A sample procedure for migrating your AirWatch database For multiple versions Have documentation feedback? Submit a Documentation Feedback support ticket using

More information

Cloudera s Enterprise Data Hub on the Amazon Web Services Cloud: Quick Start Reference Deployment October 2014

Cloudera s Enterprise Data Hub on the Amazon Web Services Cloud: Quick Start Reference Deployment October 2014 Cloudera s Enterprise Data Hub on the Amazon Web Services Cloud: Quick Start Reference Deployment October 2014 Karthik Krishnan Page 1 of 20 Table of Contents Table of Contents... 2 Abstract... 3 What

More information

PaperClip32. Revision 2.0

PaperClip32. Revision 2.0 PaperClip32 Quick Start Guide Revision 2.0 Copyright Information Copyright 2003, PaperClip Software, Inc. The PaperClip32 product name and PaperClip Logo are registered trademarks of PaperClip Software,

More information

Mozy. Administrator Guide

Mozy. Administrator Guide Mozy Administrator Guide Preface 2017 Mozy, Inc. All rights reserved. Information in this document is subject to change without notice. The software described in this document is furnished under a license

More information

enicq 6 Installation Guide

enicq 6 Installation Guide Vermont Oxford Network enicq 6 Documentation enicq 6 Installation Guide Release 1.4 Published January 2018 2018 Vermont Oxford Network. All Rights Reserved. enicq 6 Installation Guide Introduction Welcome

More information

ControlPoint. Advanced Installation Guide. September 07,

ControlPoint. Advanced Installation Guide. September 07, ControlPoint Advanced Installation Guide September 07, 2017 www.metalogix.com info@metalogix.com 202.609.9100 Copyright International GmbH., 2008-2017 All rights reserved. No part or section of the contents

More information

User Manual. Active Directory Change Tracker

User Manual. Active Directory Change Tracker User Manual Active Directory Change Tracker Last Updated: March 2018 Copyright 2018 Vyapin Software Systems Private Ltd. All rights reserved. This document is being furnished by Vyapin Software Systems

More information

Tzunami Deployer Oracle WebCenter Interaction Exporter Guide

Tzunami Deployer Oracle WebCenter Interaction Exporter Guide Tzunami Deployer Oracle WebCenter Interaction Exporter Guide Supports extraction of Oracle WebCenter Interaction components and migrate to Microsoft SharePoint using Tzunami Deployer Version 2.8 Table

More information

Administrator for Enterprise Clients: User s Guide. Second Edition

Administrator for Enterprise Clients: User s Guide. Second Edition Administrator for Enterprise Clients: User s Guide Second Edition The correct bibliographic citation for this manual is as follows: SAS Institute Inc. 2002. Administrator for Enterprise Clients: User s

More information

Status Web Evaluator s Guide Software Pursuits, Inc.

Status Web Evaluator s Guide Software Pursuits, Inc. Status Web Evaluator s Guide 2018 Table of Contents Introduction... 2 System Requirements... 2 Contact Information... 2 Installing Microsoft IIS... 2 Verifying Microsoft IIS Features... 9 Installing the

More information

INSTALLATION AND SET UP GUIDE

INSTALLATION AND SET UP GUIDE INSTALLATION AND SET UP GUIDE This guide will help IT administrators to install and set up NVivo Server. It provides step by step instructions for installing the software, configuring user permissions

More information

DIGIPASS Authentication for Check Point VPN-1

DIGIPASS Authentication for Check Point VPN-1 DIGIPASS Authentication for Check Point VPN-1 With Vasco VACMAN Middleware 3.0 2007 Integration VASCO Data Security. Guideline All rights reserved. Page 1 of 51 Disclaimer Disclaimer of Warranties and

More information

Deploying VMware Identity Manager in the DMZ. SEPT 2018 VMware Identity Manager 3.3

Deploying VMware Identity Manager in the DMZ. SEPT 2018 VMware Identity Manager 3.3 Deploying VMware Identity Manager in the DMZ SEPT 2018 VMware Identity Manager 3.3 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ If you have

More information

User Guide. Version 8.0

User Guide. Version 8.0 User Guide Version 8.0 Contents 1 Getting Started... iii 1.1... About... iii 2 Logging In... 4 2.1... Choosing Security Questions... 4 3 The File Manager... 5 3.1... Uploading a file... 6 3.2... Downloading

More information

FastStats Integration

FastStats Integration Guide Improving results together 1 Contents Introduction... 2 How a campaign is conducted... 3-5 Configuring the integration with PureResponse... 4-17 Using Cascade with the PureResponse platform... 17-10

More information

PROXY Pro Deployment Tool v10.0. User Guide October 2017

PROXY Pro Deployment Tool v10.0. User Guide October 2017 PROXY Pro Deployment Tool v10.0 User Guide October 2017 Table of contents 1. System Requirements...3 2. Target Computer Requirements...4 3. Deployment Tool Operation...5 3.1 Loading a Host Install File...6

More information

MicroStrategy Academic Program

MicroStrategy Academic Program MicroStrategy Academic Program Creating a center of excellence for enterprise analytics and mobility. HOW TO DEPLOY ENTERPRISE ANALYTICS AND MOBILITY ON AWS APPROXIMATE TIME NEEDED: 1 HOUR In this workshop,

More information

Upgrading Good Mobile Control and Good Messaging

Upgrading Good Mobile Control and Good Messaging Good Mobile Messaging Server Version 8.3.2 (SQL Version) Good Mobile Control Server 2.7.0 for Microsoft Windows Exchange Upgrading Good Mobile Control and Good Messaging Updated: 03/29/16 1 Introduction...

More information

INSTALLATION GUIDE Spring 2017

INSTALLATION GUIDE Spring 2017 INSTALLATION GUIDE Spring 2017 Copyright and Disclaimer This document, as well as the software described in it, is furnished under license of the Instant Technologies Software Evaluation Agreement and

More information

This guide details the deployment and initial configuration necessary to maximize the value of JetAdvantage Insights.

This guide details the deployment and initial configuration necessary to maximize the value of JetAdvantage Insights. HP JetAdvantage Insights Deployment Guide This guide details the deployment and initial configuration necessary to maximize the value of JetAdvantage Insights. 1. Overview HP JetAdvantage Insights provides

More information

EventMaster PLUS! Version 4 Installation and Upgrade Guide. Enterprise Deployment Microsoft SQL Server

EventMaster PLUS! Version 4 Installation and Upgrade Guide. Enterprise Deployment Microsoft SQL Server EventMaster PLUS! Version 4 Installation and Upgrade Guide Deployment Microsoft SQL Server EventMaster4 PLUS! EventMaster4 PLUS! EventMaster4 PLUS! EventMaster4 PLUS! Please send any comments regarding

More information

Monarch Installation and Activation Guide. Version 15.x

Monarch Installation and Activation Guide. Version 15.x Monarch Installation and Activation Guide Version 15.x Datawatch Corporation makes no representation or warranties with respect to the contents of this manual or the associated software and especially

More information

RWT Network System Installation Guide

RWT Network System Installation Guide RWT Network System Installation Guide Copyright 2003, Talking Fingers, Inc. Page 1 of 48 This document is Copyright 2003 by Talking Fingers, Inc. All rights are reserved. This document may not be copied

More information

The following topics describe how to work with reports in the Firepower System:

The following topics describe how to work with reports in the Firepower System: The following topics describe how to work with reports in the Firepower System: Introduction to Reports Introduction to Reports, on page 1 Risk Reports, on page 1 Standard Reports, on page 2 About Working

More information

INSTALLATION AND USER S GUIDE OfficeCalendar for Microsoft Outlook

INSTALLATION AND USER S GUIDE OfficeCalendar for Microsoft Outlook INSTALLATION AND USER S GUIDE OfficeCalendar for Microsoft Outlook Sharing Microsoft Outlook Calendar and Contacts without Exchange Server Contents What is OfficeCalendar? Sharing Microsoft Outlook Calendars

More information

RED IM Integration with Bomgar Privileged Access

RED IM Integration with Bomgar Privileged Access RED IM Integration with Bomgar Privileged Access 2018 Bomgar Corporation. All rights reserved worldwide. BOMGAR and the BOMGAR logo are trademarks of Bomgar Corporation; other trademarks shown are the

More information

PROMODAG REPORTS Getting started. On-Premises and Hybrid environments

PROMODAG REPORTS Getting started. On-Premises and Hybrid environments PROMODAG REPORTS 10.3 Getting started On-Premises and Hybrid environments 2 Getting started with Promodag Reports COPYRIGHTS Copyright @ 1999-2017 PROMODAG SA. All rights reserved. Information in this

More information

User Guide. Version R94. English

User Guide. Version R94. English AuthAnvil User Guide Version R94 English March 8, 2017 Copyright Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept EULATOS as updated

More information

Web Console Setup & User Guide. Version 7.1

Web Console Setup & User Guide. Version 7.1 Web Console Setup & User Guide Version 7.1 1 Contents Page Number Chapter 1 - Installation and Access 3 Server Setup Client Setup Windows Client Setup Mac Client Setup Linux Client Setup Interoperation

More information

NBC-IG Installation Guide. Version 7.2

NBC-IG Installation Guide. Version 7.2 Installation Guide Version 7.2 2017 Nuance Business Connect 7.2 Installation Guide Document Revision History Revision Date August 8, 2017 Revision List Updated supported SQL Server versions June 14, 2017

More information

KYOCERA Net Admin Installation Guide

KYOCERA Net Admin Installation Guide KYOCERA Net Admin Guide Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held liable for

More information

VMware Identity Manager Connector Installation and Configuration (Legacy Mode)

VMware Identity Manager Connector Installation and Configuration (Legacy Mode) VMware Identity Manager Connector Installation and Configuration (Legacy Mode) VMware Identity Manager This document supports the version of each product listed and supports all subsequent versions until

More information

INSTALLATION AND SET UP GUIDE

INSTALLATION AND SET UP GUIDE INSTALLATION AND SET UP GUIDE This guide will help IT administrators to install and set up NVivo Server. It provides step by step instructions for installing the software, configuring user permissions

More information

Connectware Manager Getting Started Guide

Connectware Manager Getting Started Guide Connectware Manager Getting Started Guide 90000699_B 2004, 2005 Digi International Inc. Digi, Digi International, the Digi logo, the Digi Connectware log, the Making Device Networking Easy logo, Digi

More information

Attix5 Pro Storage Platform Console

Attix5 Pro Storage Platform Console Attix5 Pro Storage Platform Console V7.0.1 User Manual for Microsoft Windows Your guide to managing the Attix5 Pro backup environment using the Storage Platform Console. 0 Copyright notice and proprietary

More information

Tzunami Deployer Oracle WebCenter Interaction Exporter Guide

Tzunami Deployer Oracle WebCenter Interaction Exporter Guide Tzunami Deployer Oracle WebCenter Interaction Exporter Guide Supports extraction of Oracle WebCenter Interaction components and migrate to Microsoft SharePoint using Tzunami Deployer Version 3.2 Table

More information